This document is protected by copyright and distributed under licenses restricting its use, copying,
distribution, and decompilation. No part of this document may be reproduced in any form by any means
without prior written authorization of Nortel Networks, Inc. Documentation is provided “as is” without
warranty of any kind, either express or implied, including any kind of implied or express warranty of noninfringement or the implied warranties of merchantability or fitness for a particular purpose.
U.S. Government End Users: This document is provided with a “commercial item” as defined by FAR
2.101 (Oct 1995) and contains “commercial technical data” and “commercial software
documentation” as those terms are used in FAR 12.211-12.212 (Oct 1995). Government End Users
are authorized to use this documentation only in accordance with those rights and restrictions set forth
herein, consistent with FAR 12.211- 12.212 (Oct 1995), DFARS 227.7202 (JUN 1995) and DFARS
252.227-7015 (Nov 1995).
Nortel Networks, Inc. reserves the right to change any products described herein at any time, and
without notice. Nortel Networks, Inc. assumes no responsibility or liability arising from the use of
products described herein, except as expressly agreed to in writing by Nortel Networks, Inc. The use
and purchase of this product does not convey a license under any patent rights, trademark rights, or
any other intellectual property rights of Nortel Networks, Inc.
Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Check Point, OPSEC, and SmartUpdate are trademarks of Check Point Software Technologies Ltd.
FireWall-1 and VPN-1 are registered trademarks of Check Point Software Technologies Ltd.
Chapter 3: Browser-Based Interface forms reference 33
BBI main menu selections 33
System form 34
NSF 5100 Ticker form 34
Cluster forms 38
Director(s) form 38
Time forms 40
Logs forms 42
Warnings form 49
Network forms 50
DNS form 51
Ports form 52
Routes forms 54
Network/Routes/OSPF forms 59
DHCP Relay forms 69
Interfaces form 74
Bridges form 78
VRRP form 80
GRE Tunnels form 82
Status forms 85
This Quick Guide describes the Nortel Switched Firewall Browser-Based Interface (BBI). The
components and features of the BBI can be used as an alternative to the Nortel Switched
Firewall Command Line Interface (CLI) documented in the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, (213455-L).
Who should use this book
This Quick Guide is intended for network installers and system administrators engaged in
configuring and maintaining a network. Installers and administrators must be familiar with
Ethernet concepts and IP addressing.
How this book is organized
The chapters in this book are organized as follows:
Chapter 1, Introduction,on page 11 describes how to enable and access the BBI.
216383-D October 2005
Chapter 2, Basics of the Browser-Based Interface, on page 17 describes the BBI global
commands, the BBI page components, and how to access the context-sensitive online Help for
referencing page fields, buttons, and labels.
Chapter 3, Browser-Based Interface forms reference, on page 33 describes in detail all of the
The following table describes the typographic styles used in this book.
Table 1 Typographic conventions
Typeface or
Symbol
AaBbCc123This fixed-width type is used for names of
AaBbCc123This italicized type shows book titles, special
AaBbCc123This fixed-width, bold type appears in com-
<AaBbCc123> Italicized type within angle brackets appears
[ ]Command items shown inside square brack-
|Command items separated by the vertical bar
MeaningExample
commands, files, and directories used within
the text.
It also depicts on-screen computer output and
prompts.
terms, or words to be emphasized.
mand examples. It shows text that must be
typed in exactly as shown.
in command examples as a parameter placeholder. Replace the indicated text with the
appropriate real name or value when using the
command. Do not type the brackets.
ets are optional and can be used or excluded
as the situation demands. Do not type the
brackets.
depict a list of possible values, only one of
which should be entered. The vertical bar is
considered to mean “or.”
View the readme.txt file.
Main#
Read your User’s Guide
thoroughly.
Main# sys
To establish a Telnet
session, enter:
host# telnet<IP address>
host# ls [-a]
System# autonegon|off
8 Preface
This can also be used to separate different
selections within a window-based menu bar.
<Key>Non-alphanumeric keyboard items are shown
in regular type inside brackets. When
directed, press the appropriate key.
This section explains how to get help for Nortel products and services.
Getting help from the Nortel web site
The best way to get technical support for Nortel products is from the Nortel Technical Support
web site at: www.nortel.com/support.
This site provides quick access to software, documentation, bulletins, and tools to address
issues with Nortel products.
Use the Nortel Technical Support web site to do the following:
download technical information, including the following items:
software
documentation
product bulletins
search the Technical Support web site and the Nortel Knowledge Base for answers to
technical questions
sign up for automatic notification of new software and documentation for Nortel
equipment
open and manage technical support cases
Getting help over the telephone from a Nortel Solutions
Center
If you do not find the information you require on the Nortel Technical Support web site, you
can get help over the telephone from a Nortel Solutions Center. You must have a Nortel
support contract to use the Nortel Solutions Center.
To reach a Nortel Solutions Center, do one of the following;
In North America, call 1–800–4NORTEL (1–800–466–7835).
Outside North America, go to the following web site to obtain the telephone number for
Using an Express Routing Code to get help from a specialist
You can find Express Routing Codes (ERC) for many Nortel products and services on the
Nortel Technical Support web site. ERCs allow you to connect directly to service and support
organizations based on specific products or services.
To locate the ERC for your product or service, go to www.nortel.com/erc.
Getting help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or authorized
reseller, contact the technical support staff for that distributor or reseller.
10 Preface
216383-D October 2005
CHAPTER 1
Introduction
This chapter explains how to enable the Browser-Based Interface (BBI), set up your web
browser, and launch the BBI to access the Nortel Switched Firewall (NSF) systemmanagement features from your web browser.
Characteristics of the BBI
Following are the characteristics of the BBI:
Intuitive interface structure.
Configuration and monitoring functions similar to those available through the Command
Line Interface (CLI).
Access using HTTP, or secure HTTPS using Secure Socket Layer (SSL).
No installation required; the BBI is part of the Firewall OS software.
Upgrades with future software releases (as available).
216383-D October 2005
Runs up to ten BBI sessions simultaneously.
Online context-sensitive Help for each BBI page.
Online task-based Help for a variety of common procedures from each BBI page.
A Check Point policy to allow management station access for HTTP or HTTPS traffic
A PC or workstation with network access to the Firewall host IP address
A Frame-capable web browser software, such as the following:
Netscape Navigator 4.6 or higher
Internet Explorer 5.5 or higher
JavaScript enabled in your web browser
Java 2 Runtime Environment SE plug-in, version 1.2.4-01 or higher
NOTE – JavaScript is different from Java. Ensure that JavaScript is enabled in your web
browser.
Enabling the BBI
Before you can access the BBI, you must perform some configuration at the CLI. For
information about accessing and using the CLI, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference,(213455-L).
CLI configuration tasks
Following are the CLI configuration tasks required to enable access to the BBI:
Enable the BBI.
Generate a temporary certificate (if using HTTPS).
Apply the changes.
Use the access list to permit remote access to trusted clients.
Use the Check Point SmartDashboard on your SMART Client to add a security policy that
You can enable the BBI for HTTP, HTTP and HTTPS, or you can fully disable the BBI. TIP:
The default setting for the BBI is enabled for HTTP access and disabled for HTTPS access.
NOTE – HTTP is not a secure protocol. All data (including passwords) between an HTTP
client and the Nortel Switched Firewall is not encrypted and is subject only to weak
authentication. If secure remote access is required, use HTTPS.
To explicitly allow remote BBI access, enter the following commands in the CLI:
To enable HTTP access:
>> # /cfg/sys/adm/web/http/ena
To enable HTTPS access using SSL:
>> # /cfg/sys/adm/web/ssl/ena
Generating a temporary certificate if using HTTPS
216383-D October 2005
An SSL server certificate is required for HTTPS access to the BBI. The Firewall can generate
a temporary, self-signed certificate. Use the following commands to create a default certificate:
>> SSL configuration# certs/serv/gen <Name><Country code><Key size>
Do you want to generate a self-signed certificate with the generated
Key? y
where Name is the common name that appears on the certificate, Country code is a two-letter
code (US for the United States of America, CA for Canada, JP for Japan, and so on), and Key size is 512, 1024, or 2048 bits. For example:
>> SSL configuration# certs/serv/gen Nortel US 1024
NOTE – When you log in to the BBI with the temporary certificate, you are warned that the
certificate is not signed or authenticated. Permit use of the temporary certificate only during
initial configuration, where the system is not attached to active networks that can be a source
of attack. Install a signed and authenticated certificate prior to connecting any untrusted
network.
Using the access list to permit remote access to trusted clients
If you already configured the access list for Telnet or SSH, you need not repeat the process.
Otherwise, to permit access to only trusted clients, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, Part No. 213455-L.
Adding a security policy that allows BBI traffic
Use the Check Point SmartDashboard on your SMART Client to add a security policy that
allows BBI traffic.
The firewall policy should be constructed as follows:
Source: IP address of the SMART Client or IP address range of the management network
Destination: Host IP address of the Firewall
Service: HTTP for non-secure access, or SSL for HTTPS access
Action: Allow—select Nortel Switched Firewall
Setting up the web browser
Most web browsers work with JavaScript by default and require no additional setup. Check the
features and configuration of your web browser to ensure JavaScript is enabled.
NOTE – JavaScript is not the same as Java. Ensure that JavaScript is enabled in your web
browser.
Starting the BBI
When the Firewall and browser setup is complete, use the following steps to launch the BBI:
1.Start your web browser.
2.Enter one of the following in the URL field of the web browser:
a)host IP address
b) host IP address as a name (when IP address is assigned a name on the local domain name
d) virtual IP address (see Using the VRRP virtual IP address to access the NSF BBI)
The NSF login window opens.
3.Log in (see Logging in).
4.Allow the main page to load (see Loading the main page on page 16).
Using the VRRP virtual IP address to access the NSF BBI
To use the VRRP virtual IP address for firewall access by web browser, enable management
support for the VRRP interface.
Use the following CLI command to enable management support for the VRRP interface:
/cfg/net/if #/mgmt/ena/apply
The virtual IP address is specified with the ip1 or ip2 command in the CLI menu. For more
information, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference,
Part No. 213455-L.
Using the VRRP interface IP address enhances firewall security, because users can configure
the VRRP interface with the user-defined CheckPoint policies. SSI traffic is separate from the
CheckPoint policies.
Logging in
To log in, enter the account name and password for the system administrator or operator
account (see Figure 1 on page 16). For more login and password information, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, (213455-L).
When the valid account name and password combination is entered on the login window, the
BBI default page appears in your browser viewing window (see Figure 2).
Figure 2 NSF BBI main page
16 Introduction
NOTE – A delay of a few seconds can occur while the default page collects data from all of the
cluster components. Do not stop the browser while loading is in progress.
216383-D October 2005
CHAPTER 2
Basics of the Browser-Based
Interface
Interface components
The Nortel Switched Firewall (NSF) Browser-Based Interface (BBI) main page has eight
component areas (see Figure 3).
The two main page tabs are Wizards and Config (see Figure 3 on page 17).
Wizards provides access to wizards that guide users through the processes of initial
configuration, interface and bridge addition, Check Point Firewall configuration,
routes and gateway configuration, DHCP Relay configuration, and OSPF configuration (see Figure 4 and Figure 5). To use the wizards, select Initial Configuration,
Add, or Configure, and follow the instructions on the page. Click the plus sign (+)
adjacent to a selection to expand it and reveal its associated subcategories. To see
each of the initial Wizards pages, see Chapter 3, Browser-Based Interface forms ref-
erence.
Config is the default tab for the BBI main page and provides access to all of the
monitoring and configuration functions (see Figure 6 on page 20).
The History list displays the path to the current page. Up to nine of the most recently
visited pages are listed, most recent first. TIP: Click a list item to go directly to that page.
Forms display area
The Forms display area contains fields that display information or allow you to specify
information for configuring the system. The fields are different for each subpage.
Global command buttons
The global command buttons are always available at the top of each form (see Figure 3 on
page 17 and Figure 7).
Figure 7 Global command buttons
The global commands summon forms used for saving, examining, or canceling
configuration changes, for logging out, and for displaying Help information for the current
page (see Global command forms on page 24).
Director status appears on the left side of the forms display area, under the Monitor
System bar. Director status summarizes the status of the cluster, including CPU, memory,
and hard disk. The Firewall icon appears on the right side of the forms display area under
the Monitor System bar. TIP: Click the Firewall icon to go directly to the
Administration/Monitor/Director(s) form (see Figure 71 on page 103).
216383-D October 2005
The Firewall host IP address and Management IP address (MIP) appear under the
Firewall icon.
The status icon for the firewall appears between the addresses.
TIP: Click the Firewall icon to go directly to the Administration/Monitor/Director(s)
form (see Figure 71 on page 103).
oWhen the status icon is green, the firewall is operating, and when the status icon
is red, the firewall is offline.
Current alarms provides the current status of all active alarms.
The Browser-Based Interface for the Nortel Switched Firewall provides a variety of levels of
control. TIP: To access the full functionality of the BBI, you must log in as administrator
(username admin).
The BBI allows you to administer the NSF in the following manner (see Table 1).
Table 1 NSF administration
NSF functionAdministration method
Create a configurationUse the Config functions or Wizards.
Submit form changesClick Update or Submit on the form.
View pending changesClick global Diff.
Clear pending changesClick global Revert to cancel all pending changes.
Apply changesClick global Apply.
Up to ten simultaneous browser connections are allowed. When multiple CLI or BBI sessions
are open concurrently, only pending changes, made during your current session, are affected
by use of the global Diff, Revert, or Logout commands. However, when multiple CLI or BBI
administrators apply changes to the same set of parameters concurrently, the latest applied
changes take precedence. TIP: See Figure 75 on page 107, Administration/Monitor/GUI Lock
form. To prevent conflicts, any user logged in as administrator (username admin) can take
control of the GUI lock before changing or creating a configuration.
Pending change exceptions
After submission, most changes are considered pending and are not immediately put into effect
or permanently saved. However, changes to the date or time zone, and users and passwords
take effect as soon as the form is submitted. See Cluster/Time/Current Time form on page 40
and Administration/Users/General form on page 110.
Lost changes
Changes are lost if a new form is selected or the session is ended without submitting the
information to the pending configuration. Click Update or Submit on the form to submit
changes to the pending configuration.
Pending changes are also discarded if you do not submit them before the inactivity timeout
value on BBI sessions elapses. The BBI inactivity timeout value is five minutes and cannot be
changed.
Creating a configuration
To create a configuration, do the following:
1) Select the appropriate menu item and subpage.
2) Modify fields in the appropriate forms display areas.
3) Click Update to submit the changes to the pending configuration.
Viewing pending changes
To view pending changes before they are applied, do the following:
1) Click global Diff .
2) View the global Diff form.
3) Click Back to return to the current form.
Clearing pending changes
To clear pending changes, do one of the following:
Click global Revert and return to the configuration. TIP: You cannot use the global
Revert command to restore the previous configuration after you submit the Apply
command.
Close the browser.
Submitting changes
To submit the form changes for application, do the following:
1) Click global Apply. TIP: The global Apply command allows updates on multiple forms
to be put into effect all at once. The Apply function validates the changes to the
configuration before applying them, and Apply fails if invalid settings are used. See
Figure 75 on page 107, Administration/Monitor/GUI Lock form. To prevent conflicts, any
user logged in as administrator (username admin) can take control of the GUI lock before
changing or creating a configuration.
See Global command forms for details on using Apply, Diff, Revert, and Logout.
Global command forms
The global command buttons are always available at the top of each form.
These buttons summon forms used to save, examine, or cancel configuration changes, log out,
and to display Help information. Each global command form provides options to verify or
cancel the command.
Apply Changes
Use the global Apply Changes form to check the validity of the pending configuration changes
for the current session, and to save the configuration changes and put them into effect (see
Figure 8).
Figure 8 Apply form
The global Apply form includes the following items:
Apply Changes list: to use this menu, select one of the following commands and click
When selected, this command updates the Nortel Switched Firewall with any pending
configuration changes. Pending changes are first validated for correctness (see
Validate Configuration on page 25). If no problems are found, the changes are applied
and put into effect. If problems are found, applicable warning and error messages are
displayed. Warnings are allowed, and the changes are applied and put into effect.
Errors are not allowed, and the changes are not applied.
This command has no effect on pending changes in other open CLI or BBI sessions.
See Figure 75 on page 107 for information about taking control of the GUI lock.
Validate Configuration
When selected, this option validates pending changes for the current session, but does
not apply them. The pending configuration changes are examined to ensure that they
are complete and consistent.
If problems are found, the following types of messages are displayed:
Warnings are in yellow. Warnings identify conditions you should consider, but
which do not cause errors or prevent configuration application.
Errors are in red. Errors identify serious configuration problems that require
correction. Uncorrected errors cause the Apply Changes command to fail.
If the configuration is valid, select Apply Changes and click Submit to apply the
changes.
216383-D October 2005
Run a Security Audit
When selected, this command lists security information. Security information
includes the status for remote management features such as Telnet, SSH, and the BBI
for the cluster. The IP addresses that access the remote management features are also
listed. The Run Security Audit command also lists users configured with default
passwords that require change.
Submit button: Click to perform the action selected in the Apply Changes list.
Back button: Click to return to the previously viewed form without applying changes.
The global Diff command displays the Pending Updates form. Pending Updates provides a list
of the pending configuration changes for the current session (see Figure 9).
Figure 9 Diff form
The list displays a change record for each submitted update. Each record can consist of many
modifications, depending upon the complexity of the form and changes submitted.
Modifications are color-coded as follows:
Green: New items that will be added to the configuration when the global Apply
command is given and verified.
Blue: Existing items that will be modified.
Red: Configuration items that will be deleted.
The Diff list is cleared when configuration changes are applied or reverted, or when you log
out or close the browser window.
NOTE – The Diff form does not include pending changes made in other concurrent CLI or BBI
The global Revert command displays the Revert Changes form. Use Revert to cancel pending
configuration changes (see Figure 10).
Figure 10 Revert form
The global Revert form includes the following items:
Revert button: Click Revert to cancel the pending configuration changes for the current
session. TIP: Applied changes are not affected. Pending changes made in other open CLI
or BBI sessions are not affected. See Figure 75 on page 107, Administration/Monitor/GUI
Lock form. To prevent conflicts, any user logged in as administrator (username admin)
can take control of the GUI lock before changing or creating a configuration.
Back button: Click Back to return to the previously viewed form without canceling
Use the global Logout form to terminate the current user session (see Figure 11).
Figure 11 Logout form
Back
Logout
The global Logout form includes the following items:
Logout button: Click Logout to terminate the current user session. TIP: Any
configuration changes made during this session that have not been applied are lost. This
command has no effect on pending changes in other open CLI or BBI sessions.
Back button: Click Back to return to the previously viewed form without logging out.
The global Help form provides assistance with forms and tasks in the BBI. Two kinds of Help
are available: context-sensitive Help and task-based Help.
Context-sensitive Help
Context-sensitive Help displays detailed information about the currently displayed form in the
BBI forms area. Click global Help to view a new window showing Help information
appropriate to your current options (see Figure 12).
Figure 12 Context-sensitive Help form
Help topic
menu
Subpage menu
Pages
Ta sk sL oa d
Close
Forms area
216383-D October 2005
The context-sensitive Help window consists of the following areas:
Subpage menu: Click Pages to display Help for the selected form. Click Ta sk s to activate
the task-based Help system.
Help topic menu: Select a new Help topic using the menu on the left side of the Help
window. Each main menu item is listed, along with the submenu items under the current
selection. Select a different menu item to display its submenu list. Select any submenu
item to display Help for that form.
Load: Click Load to display the form referenced on the bar.
Forms area: This area displays detailed information about the selected topic.
Close button: Click Close to close the context-sensitive Help window.
Task-based Help
Task-based Help directs the administrator through the steps of various common procedures. To
access task-based Help, click global Help and then click the Tasks bar. The task Help menu
appears in a new window with information appropriate for the current BBI form (see Figure
13):
Figure 13 Task-based Help form
Task topic
menu
Subpage menu
PageTasks
CloseForms area
Load Page
link
The task-based Help window consists of the following areas:
Subpage menu: Click Pages to display Help for the selected form. Click Ta sk s to activate
the task-based Help system (see Figure 13).
Task topic menu: Select from a list of tasks using the menu on the left side of the Help
window. Each main task item is listed, along with the subtasks under the current selection.
Select a different subtask to reveal the steps required to complete it.
Forms area: This area displays the steps required to complete the selected subtask.
30 Basics of the Browser-Based Interface
216383-D October 2005
Loading...
+ 130 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.