This document is protected by copyright and distributed under licenses restricting its use, copying,
distribution, and decompilation. No part of this document may be reproduced in any form by any means
without prior written authorization of Nortel Networks, Inc. Documentation is provided “as is” without
warranty of any kind, either express or implied, including any kind of implied or express warranty of noninfringement or the implied warranties of merchantability or fitness for a particular purpose.
U.S. Government End Users: This document is provided with a “commercial item” as defined by FAR
2.101 (Oct 1995) and contains “commercial technical data” and “commercial software
documentation” as those terms are used in FAR 12.211-12.212 (Oct 1995). Government End Users
are authorized to use this documentation only in accordance with those rights and restrictions set forth
herein, consistent with FAR 12.211- 12.212 (Oct 1995), DFARS 227.7202 (JUN 1995) and DFARS
252.227-7015 (Nov 1995).
Nortel Networks, Inc. reserves the right to change any products described herein at any time, and
without notice. Nortel Networks, Inc. assumes no responsibility or liability arising from the use of
products described herein, except as expressly agreed to in writing by Nortel Networks, Inc. The use
and purchase of this product does not convey a license under any patent rights, trademark rights, or
any other intellectual property rights of Nortel Networks, Inc.
Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Check Point, OPSEC, and SmartUpdate are trademarks of Check Point Software Technologies Ltd.
FireWall-1 and VPN-1 are registered trademarks of Check Point Software Technologies Ltd.
Chapter 3: Browser-Based Interface forms reference 33
BBI main menu selections 33
System form 34
NSF 5100 Ticker form 34
Cluster forms 38
Director(s) form 38
Time forms 40
Logs forms 42
Warnings form 49
Network forms 50
DNS form 51
Ports form 52
Routes forms 54
Network/Routes/OSPF forms 59
DHCP Relay forms 69
Interfaces form 74
Bridges form 78
VRRP form 80
GRE Tunnels form 82
Status forms 85
This Quick Guide describes the Nortel Switched Firewall Browser-Based Interface (BBI). The
components and features of the BBI can be used as an alternative to the Nortel Switched
Firewall Command Line Interface (CLI) documented in the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, (213455-L).
Who should use this book
This Quick Guide is intended for network installers and system administrators engaged in
configuring and maintaining a network. Installers and administrators must be familiar with
Ethernet concepts and IP addressing.
How this book is organized
The chapters in this book are organized as follows:
Chapter 1, Introduction,on page 11 describes how to enable and access the BBI.
216383-D October 2005
Chapter 2, Basics of the Browser-Based Interface, on page 17 describes the BBI global
commands, the BBI page components, and how to access the context-sensitive online Help for
referencing page fields, buttons, and labels.
Chapter 3, Browser-Based Interface forms reference, on page 33 describes in detail all of the
The following table describes the typographic styles used in this book.
Table 1 Typographic conventions
Typeface or
Symbol
AaBbCc123This fixed-width type is used for names of
AaBbCc123This italicized type shows book titles, special
AaBbCc123This fixed-width, bold type appears in com-
<AaBbCc123> Italicized type within angle brackets appears
[ ]Command items shown inside square brack-
|Command items separated by the vertical bar
MeaningExample
commands, files, and directories used within
the text.
It also depicts on-screen computer output and
prompts.
terms, or words to be emphasized.
mand examples. It shows text that must be
typed in exactly as shown.
in command examples as a parameter placeholder. Replace the indicated text with the
appropriate real name or value when using the
command. Do not type the brackets.
ets are optional and can be used or excluded
as the situation demands. Do not type the
brackets.
depict a list of possible values, only one of
which should be entered. The vertical bar is
considered to mean “or.”
View the readme.txt file.
Main#
Read your User’s Guide
thoroughly.
Main# sys
To establish a Telnet
session, enter:
host# telnet<IP address>
host# ls [-a]
System# autonegon|off
8 Preface
This can also be used to separate different
selections within a window-based menu bar.
<Key>Non-alphanumeric keyboard items are shown
in regular type inside brackets. When
directed, press the appropriate key.
This section explains how to get help for Nortel products and services.
Getting help from the Nortel web site
The best way to get technical support for Nortel products is from the Nortel Technical Support
web site at: www.nortel.com/support.
This site provides quick access to software, documentation, bulletins, and tools to address
issues with Nortel products.
Use the Nortel Technical Support web site to do the following:
download technical information, including the following items:
software
documentation
product bulletins
search the Technical Support web site and the Nortel Knowledge Base for answers to
technical questions
sign up for automatic notification of new software and documentation for Nortel
equipment
open and manage technical support cases
Getting help over the telephone from a Nortel Solutions
Center
If you do not find the information you require on the Nortel Technical Support web site, you
can get help over the telephone from a Nortel Solutions Center. You must have a Nortel
support contract to use the Nortel Solutions Center.
To reach a Nortel Solutions Center, do one of the following;
In North America, call 1–800–4NORTEL (1–800–466–7835).
Outside North America, go to the following web site to obtain the telephone number for
Using an Express Routing Code to get help from a specialist
You can find Express Routing Codes (ERC) for many Nortel products and services on the
Nortel Technical Support web site. ERCs allow you to connect directly to service and support
organizations based on specific products or services.
To locate the ERC for your product or service, go to www.nortel.com/erc.
Getting help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or authorized
reseller, contact the technical support staff for that distributor or reseller.
10 Preface
216383-D October 2005
CHAPTER 1
Introduction
This chapter explains how to enable the Browser-Based Interface (BBI), set up your web
browser, and launch the BBI to access the Nortel Switched Firewall (NSF) systemmanagement features from your web browser.
Characteristics of the BBI
Following are the characteristics of the BBI:
Intuitive interface structure.
Configuration and monitoring functions similar to those available through the Command
Line Interface (CLI).
Access using HTTP, or secure HTTPS using Secure Socket Layer (SSL).
No installation required; the BBI is part of the Firewall OS software.
Upgrades with future software releases (as available).
216383-D October 2005
Runs up to ten BBI sessions simultaneously.
Online context-sensitive Help for each BBI page.
Online task-based Help for a variety of common procedures from each BBI page.
A Check Point policy to allow management station access for HTTP or HTTPS traffic
A PC or workstation with network access to the Firewall host IP address
A Frame-capable web browser software, such as the following:
Netscape Navigator 4.6 or higher
Internet Explorer 5.5 or higher
JavaScript enabled in your web browser
Java 2 Runtime Environment SE plug-in, version 1.2.4-01 or higher
NOTE – JavaScript is different from Java. Ensure that JavaScript is enabled in your web
browser.
Enabling the BBI
Before you can access the BBI, you must perform some configuration at the CLI. For
information about accessing and using the CLI, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference,(213455-L).
CLI configuration tasks
Following are the CLI configuration tasks required to enable access to the BBI:
Enable the BBI.
Generate a temporary certificate (if using HTTPS).
Apply the changes.
Use the access list to permit remote access to trusted clients.
Use the Check Point SmartDashboard on your SMART Client to add a security policy that
You can enable the BBI for HTTP, HTTP and HTTPS, or you can fully disable the BBI. TIP:
The default setting for the BBI is enabled for HTTP access and disabled for HTTPS access.
NOTE – HTTP is not a secure protocol. All data (including passwords) between an HTTP
client and the Nortel Switched Firewall is not encrypted and is subject only to weak
authentication. If secure remote access is required, use HTTPS.
To explicitly allow remote BBI access, enter the following commands in the CLI:
To enable HTTP access:
>> # /cfg/sys/adm/web/http/ena
To enable HTTPS access using SSL:
>> # /cfg/sys/adm/web/ssl/ena
Generating a temporary certificate if using HTTPS
216383-D October 2005
An SSL server certificate is required for HTTPS access to the BBI. The Firewall can generate
a temporary, self-signed certificate. Use the following commands to create a default certificate:
>> SSL configuration# certs/serv/gen <Name><Country code><Key size>
Do you want to generate a self-signed certificate with the generated
Key? y
where Name is the common name that appears on the certificate, Country code is a two-letter
code (US for the United States of America, CA for Canada, JP for Japan, and so on), and Key size is 512, 1024, or 2048 bits. For example:
>> SSL configuration# certs/serv/gen Nortel US 1024
NOTE – When you log in to the BBI with the temporary certificate, you are warned that the
certificate is not signed or authenticated. Permit use of the temporary certificate only during
initial configuration, where the system is not attached to active networks that can be a source
of attack. Install a signed and authenticated certificate prior to connecting any untrusted
network.
Using the access list to permit remote access to trusted clients
If you already configured the access list for Telnet or SSH, you need not repeat the process.
Otherwise, to permit access to only trusted clients, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, Part No. 213455-L.
Adding a security policy that allows BBI traffic
Use the Check Point SmartDashboard on your SMART Client to add a security policy that
allows BBI traffic.
The firewall policy should be constructed as follows:
Source: IP address of the SMART Client or IP address range of the management network
Destination: Host IP address of the Firewall
Service: HTTP for non-secure access, or SSL for HTTPS access
Action: Allow—select Nortel Switched Firewall
Setting up the web browser
Most web browsers work with JavaScript by default and require no additional setup. Check the
features and configuration of your web browser to ensure JavaScript is enabled.
NOTE – JavaScript is not the same as Java. Ensure that JavaScript is enabled in your web
browser.
Starting the BBI
When the Firewall and browser setup is complete, use the following steps to launch the BBI:
1.Start your web browser.
2.Enter one of the following in the URL field of the web browser:
a)host IP address
b) host IP address as a name (when IP address is assigned a name on the local domain name
d) virtual IP address (see Using the VRRP virtual IP address to access the NSF BBI)
The NSF login window opens.
3.Log in (see Logging in).
4.Allow the main page to load (see Loading the main page on page 16).
Using the VRRP virtual IP address to access the NSF BBI
To use the VRRP virtual IP address for firewall access by web browser, enable management
support for the VRRP interface.
Use the following CLI command to enable management support for the VRRP interface:
/cfg/net/if #/mgmt/ena/apply
The virtual IP address is specified with the ip1 or ip2 command in the CLI menu. For more
information, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference,
Part No. 213455-L.
Using the VRRP interface IP address enhances firewall security, because users can configure
the VRRP interface with the user-defined CheckPoint policies. SSI traffic is separate from the
CheckPoint policies.
Logging in
To log in, enter the account name and password for the system administrator or operator
account (see Figure 1 on page 16). For more login and password information, see the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, (213455-L).
When the valid account name and password combination is entered on the login window, the
BBI default page appears in your browser viewing window (see Figure 2).
Figure 2 NSF BBI main page
16 Introduction
NOTE – A delay of a few seconds can occur while the default page collects data from all of the
cluster components. Do not stop the browser while loading is in progress.
216383-D October 2005
CHAPTER 2
Basics of the Browser-Based
Interface
Interface components
The Nortel Switched Firewall (NSF) Browser-Based Interface (BBI) main page has eight
component areas (see Figure 3).
The two main page tabs are Wizards and Config (see Figure 3 on page 17).
Wizards provides access to wizards that guide users through the processes of initial
configuration, interface and bridge addition, Check Point Firewall configuration,
routes and gateway configuration, DHCP Relay configuration, and OSPF configuration (see Figure 4 and Figure 5). To use the wizards, select Initial Configuration,
Add, or Configure, and follow the instructions on the page. Click the plus sign (+)
adjacent to a selection to expand it and reveal its associated subcategories. To see
each of the initial Wizards pages, see Chapter 3, Browser-Based Interface forms ref-
erence.
Config is the default tab for the BBI main page and provides access to all of the
monitoring and configuration functions (see Figure 6 on page 20).
The History list displays the path to the current page. Up to nine of the most recently
visited pages are listed, most recent first. TIP: Click a list item to go directly to that page.
Forms display area
The Forms display area contains fields that display information or allow you to specify
information for configuring the system. The fields are different for each subpage.
Global command buttons
The global command buttons are always available at the top of each form (see Figure 3 on
page 17 and Figure 7).
Figure 7 Global command buttons
The global commands summon forms used for saving, examining, or canceling
configuration changes, for logging out, and for displaying Help information for the current
page (see Global command forms on page 24).
Director status appears on the left side of the forms display area, under the Monitor
System bar. Director status summarizes the status of the cluster, including CPU, memory,
and hard disk. The Firewall icon appears on the right side of the forms display area under
the Monitor System bar. TIP: Click the Firewall icon to go directly to the
Administration/Monitor/Director(s) form (see Figure 71 on page 103).
216383-D October 2005
The Firewall host IP address and Management IP address (MIP) appear under the
Firewall icon.
The status icon for the firewall appears between the addresses.
TIP: Click the Firewall icon to go directly to the Administration/Monitor/Director(s)
form (see Figure 71 on page 103).
oWhen the status icon is green, the firewall is operating, and when the status icon
is red, the firewall is offline.
Current alarms provides the current status of all active alarms.
The Browser-Based Interface for the Nortel Switched Firewall provides a variety of levels of
control. TIP: To access the full functionality of the BBI, you must log in as administrator
(username admin).
The BBI allows you to administer the NSF in the following manner (see Table 1).
Table 1 NSF administration
NSF functionAdministration method
Create a configurationUse the Config functions or Wizards.
Submit form changesClick Update or Submit on the form.
View pending changesClick global Diff.
Clear pending changesClick global Revert to cancel all pending changes.
Apply changesClick global Apply.
Up to ten simultaneous browser connections are allowed. When multiple CLI or BBI sessions
are open concurrently, only pending changes, made during your current session, are affected
by use of the global Diff, Revert, or Logout commands. However, when multiple CLI or BBI
administrators apply changes to the same set of parameters concurrently, the latest applied
changes take precedence. TIP: See Figure 75 on page 107, Administration/Monitor/GUI Lock
form. To prevent conflicts, any user logged in as administrator (username admin) can take
control of the GUI lock before changing or creating a configuration.
Pending change exceptions
After submission, most changes are considered pending and are not immediately put into effect
or permanently saved. However, changes to the date or time zone, and users and passwords
take effect as soon as the form is submitted. See Cluster/Time/Current Time form on page 40
and Administration/Users/General form on page 110.
Lost changes
Changes are lost if a new form is selected or the session is ended without submitting the
information to the pending configuration. Click Update or Submit on the form to submit
changes to the pending configuration.
Pending changes are also discarded if you do not submit them before the inactivity timeout
value on BBI sessions elapses. The BBI inactivity timeout value is five minutes and cannot be
changed.
Creating a configuration
To create a configuration, do the following:
1) Select the appropriate menu item and subpage.
2) Modify fields in the appropriate forms display areas.
3) Click Update to submit the changes to the pending configuration.
Viewing pending changes
To view pending changes before they are applied, do the following:
1) Click global Diff .
2) View the global Diff form.
3) Click Back to return to the current form.
Clearing pending changes
To clear pending changes, do one of the following:
Click global Revert and return to the configuration. TIP: You cannot use the global
Revert command to restore the previous configuration after you submit the Apply
command.
Close the browser.
Submitting changes
To submit the form changes for application, do the following:
1) Click global Apply. TIP: The global Apply command allows updates on multiple forms
to be put into effect all at once. The Apply function validates the changes to the
configuration before applying them, and Apply fails if invalid settings are used. See
Figure 75 on page 107, Administration/Monitor/GUI Lock form. To prevent conflicts, any
user logged in as administrator (username admin) can take control of the GUI lock before
changing or creating a configuration.
See Global command forms for details on using Apply, Diff, Revert, and Logout.
Global command forms
The global command buttons are always available at the top of each form.
These buttons summon forms used to save, examine, or cancel configuration changes, log out,
and to display Help information. Each global command form provides options to verify or
cancel the command.
Apply Changes
Use the global Apply Changes form to check the validity of the pending configuration changes
for the current session, and to save the configuration changes and put them into effect (see
Figure 8).
Figure 8 Apply form
The global Apply form includes the following items:
Apply Changes list: to use this menu, select one of the following commands and click
When selected, this command updates the Nortel Switched Firewall with any pending
configuration changes. Pending changes are first validated for correctness (see
Validate Configuration on page 25). If no problems are found, the changes are applied
and put into effect. If problems are found, applicable warning and error messages are
displayed. Warnings are allowed, and the changes are applied and put into effect.
Errors are not allowed, and the changes are not applied.
This command has no effect on pending changes in other open CLI or BBI sessions.
See Figure 75 on page 107 for information about taking control of the GUI lock.
Validate Configuration
When selected, this option validates pending changes for the current session, but does
not apply them. The pending configuration changes are examined to ensure that they
are complete and consistent.
If problems are found, the following types of messages are displayed:
Warnings are in yellow. Warnings identify conditions you should consider, but
which do not cause errors or prevent configuration application.
Errors are in red. Errors identify serious configuration problems that require
correction. Uncorrected errors cause the Apply Changes command to fail.
If the configuration is valid, select Apply Changes and click Submit to apply the
changes.
216383-D October 2005
Run a Security Audit
When selected, this command lists security information. Security information
includes the status for remote management features such as Telnet, SSH, and the BBI
for the cluster. The IP addresses that access the remote management features are also
listed. The Run Security Audit command also lists users configured with default
passwords that require change.
Submit button: Click to perform the action selected in the Apply Changes list.
Back button: Click to return to the previously viewed form without applying changes.
The global Diff command displays the Pending Updates form. Pending Updates provides a list
of the pending configuration changes for the current session (see Figure 9).
Figure 9 Diff form
The list displays a change record for each submitted update. Each record can consist of many
modifications, depending upon the complexity of the form and changes submitted.
Modifications are color-coded as follows:
Green: New items that will be added to the configuration when the global Apply
command is given and verified.
Blue: Existing items that will be modified.
Red: Configuration items that will be deleted.
The Diff list is cleared when configuration changes are applied or reverted, or when you log
out or close the browser window.
NOTE – The Diff form does not include pending changes made in other concurrent CLI or BBI
The global Revert command displays the Revert Changes form. Use Revert to cancel pending
configuration changes (see Figure 10).
Figure 10 Revert form
The global Revert form includes the following items:
Revert button: Click Revert to cancel the pending configuration changes for the current
session. TIP: Applied changes are not affected. Pending changes made in other open CLI
or BBI sessions are not affected. See Figure 75 on page 107, Administration/Monitor/GUI
Lock form. To prevent conflicts, any user logged in as administrator (username admin)
can take control of the GUI lock before changing or creating a configuration.
Back button: Click Back to return to the previously viewed form without canceling
Use the global Logout form to terminate the current user session (see Figure 11).
Figure 11 Logout form
Back
Logout
The global Logout form includes the following items:
Logout button: Click Logout to terminate the current user session. TIP: Any
configuration changes made during this session that have not been applied are lost. This
command has no effect on pending changes in other open CLI or BBI sessions.
Back button: Click Back to return to the previously viewed form without logging out.
The global Help form provides assistance with forms and tasks in the BBI. Two kinds of Help
are available: context-sensitive Help and task-based Help.
Context-sensitive Help
Context-sensitive Help displays detailed information about the currently displayed form in the
BBI forms area. Click global Help to view a new window showing Help information
appropriate to your current options (see Figure 12).
Figure 12 Context-sensitive Help form
Help topic
menu
Subpage menu
Pages
Ta sk sL oa d
Close
Forms area
216383-D October 2005
The context-sensitive Help window consists of the following areas:
Subpage menu: Click Pages to display Help for the selected form. Click Ta sk s to activate
the task-based Help system.
Help topic menu: Select a new Help topic using the menu on the left side of the Help
window. Each main menu item is listed, along with the submenu items under the current
selection. Select a different menu item to display its submenu list. Select any submenu
item to display Help for that form.
Load: Click Load to display the form referenced on the bar.
Forms area: This area displays detailed information about the selected topic.
Close button: Click Close to close the context-sensitive Help window.
Task-based Help
Task-based Help directs the administrator through the steps of various common procedures. To
access task-based Help, click global Help and then click the Tasks bar. The task Help menu
appears in a new window with information appropriate for the current BBI form (see Figure
13):
Figure 13 Task-based Help form
Task topic
menu
Subpage menu
PageTasks
CloseForms area
Load Page
link
The task-based Help window consists of the following areas:
Subpage menu: Click Pages to display Help for the selected form. Click Ta sk s to activate
the task-based Help system (see Figure 13).
Task topic menu: Select from a list of tasks using the menu on the left side of the Help
window. Each main task item is listed, along with the subtasks under the current selection.
Select a different subtask to reveal the steps required to complete it.
Forms area: This area displays the steps required to complete the selected subtask.
When you select System, the Main page, also known as the Monitor System form, is displayed
as shown in Monitor System form. For more information about the System form, see Interface
components on page 17.
Figure 14 Monitor System form
NSF 5100 Ticker form
NSF 5100 Ticker provides a real-time view of the following Firewall status and statistic
information:
Use the NSF 5100 Ticker launch form to launch the Ticker. TIP: The Ticker cannot launch if
pop-up blockers are enabled (see NSF 5100 Ticker launch form).
NOTE – Java 2 Runtime Environment SE plug-in, version 1.2.4-01 or higher, is required.
When you launch the Ticker, if the Java plug-in is not present, the Ticker downloads it from
the java.sun.com web site. If the system is not connected to the Internet, an error message
appears in the Ticker window.
Figure 15 NSF 5100 Ticker launch form
216383-D October 2005
Click Launch on the NSF 5100 Ticker Launch form to launch the Ticker report.
Use the Ticker report form to view the statistics provided by the Ticker.
Minute provides a list to select the current minute.
Click Save to submit the date and time changes and to put the changes into immediate
effect. Note that changes to the date and time zone are unlike most changes; they are not
considered pending after submission.
Timezone provides a list to select the region.
Click Save to submit the time zone changes and to put the changes into immediate effect.
Note that changes to the date and time zone are unlike most changes; they are not
considered pending after submission.
Cluster/Time/NTP Servers form
Use the Cluster/Time/NTP Servers form to specify the Network Time Protocol (NTP) servers
(see Cluster/Time/NTP Servers).
Figure 21 Cluster/Time/NTP Servers
216383-D October 2005
NTP servers are used by the NTP client on the NSF to synchronize its clock. The system
should have access to at least three servers to compensate for discrepancies between the
servers.
Use the Cluster/Logs/ELA form to configure Event Logging API (ELA) (see
Cluster/Logs/ELA form).
ELA allows Firewall log messages to be sent to a Check Point SmartCenter Server for display
through the Check Point SmartView Tracker.
Figure 23 Cluster/Logs/ELA form
216383-D October 2005
NOTE – Configure an ELA service on the Check Point management station and transfer a SIC
Certificate for the service to the Firewall to enable ELA logging. For configuration details, see
the Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference, (213455-L).
The Cluster/Logs ELA (Check Point ELA Log) form is divided into the following two
sections:
Management Station IP provides an entry field to specify the IP address of the Check
Point SmartCenter Server where the Firewall log messages are sent.
Minimum Severity provides a list that specifies the severity of messages logged and sent
to the ELA service.
emerg
alert
crit
err
warning
notice
info
debug
Management Station DN is the designated name of the Check Point SmartCenter Server.
Update submits the form changes to the pending configuration.
Pull SIC Certificate displays the following fields:
Firewall Director IP provides a list to specify the IP address of the individual Firewall for
update. TIP: Do not use the MIP address.
OPSEC Application Name is the name of the ELA service configured on the Check Point
SmartCenter Server. Use the name specified when creating the OPSEC application in the
Check Point SmartDashboard. TIP: Use a different OPSEC application for each Firewall.
OPSEC Password is the password used to configure the ELA service on the Check Point
Management Station.
OPSEC Password (again) is used to verify the password.
Submit is used to submit the form and update the certificate on the specified Firewall.
Use the Cluster/Logs/Archive form to specify system log rotation and system log archiving
parameters (see Cluster/Logs/Archive form).
Figure 24 Cluster/Logs/Archive form
216383-D October 2005
Fields and buttons on the Cluster/Logs/Archive form are as follows:
Email specifies an e-mail address for the administrator receiving the log.
SMTP Server IP specifies the IP address of the SMTP server in dotted decimal notation.
TIP: The SMTP Server must be configured to accept messages from the Firewall and a
Check Point policy must be present to allow these messages through the Firewall.
Rotate Size specifies the maximum size the log reached before rotation. If this parameter
is set at 0, then the size is ignored and only the log rotate interval is used.
Interval specifies, in days and hours, the interval at which the system log file is rotated.
Update submits the form changes to the pending configuration.
Log file rotation
Log files are rotated when the file reaches a specific size or age.
If the log file rotate size is set to 0, the file size is ignored and the rotate interval is used to
determine log rotation. TIP: Set the rotate interval in days and hours.
NOTE – The NSF provides administrators with the option to configure Layer 2 and Layer 3
firewalls. The Layer 2 and Layer 3 firewall configuration procedures differ only in the
configuration of the IP addresses. A Layer 3 firewall requires valid IP addresses for address 1
and address 2. A Layer 2 firewall requires no IP addresses. For detailed Layer 2 and Layer 3
configuration, see Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference,
(213455-L).
DNS form
Use the Network/DNS form to specify the Domain Name Service (DNS) servers. Multiple
servers are allowed (see Network/DNS form).
Figure 26 Network/DNS form
216383-D October 2005
Fields and buttons on the Network/DNS form are as follows:
IP Address specifies the IP address of a configured DNS server.
Action displays a Delete button if a DNS server is present.
New DNS IP provides an entry field to specify a new DNS server address. TIP: Use
dotted decimal notation.
Update submits the DNS server address changes to the pending configuration.
Use the Network/Routes/Proxy ARP (Address Resolution Protocol) form to view and
configure the Proxy ARP status and addresses that allow the Firewall to respond to Proxy ARP
requests (see Network/Routes/Proxy ARP form).
Figure 32 Network/Routes/Proxy ARP form
216383-D October 2005
The Network/Routes/Proxy ARP form is divided into the following two sections:
General
Proxy ARP Addresses
Fields and buttons on the form are as follows:
General
Proxy Status contains a list displaying the following selections:
oDisabled disables Proxy ARP for the cluster.
oEnabled enables Proxy ARP for the cluster.
Update submits the Proxy status change to the pending configuration.
Proxy ARP Addresses
IP Address lists the IP addresses for which the Proxy provides ARPs in the cluster.
VRRP Group lists the VRRP group, if VRRP is set up, for which the Proxy provides
ARPs in the cluster.
Action provides the delete selection used to delete the IP address if at least one Proxy
Router Id 1 provides an entry field to set the OSPF Router ID for the first Firewall host.
TIP: OSPF uses the router ID to identify the routing device. If no router ID is specified, or
if the router ID is set to 0.0.0.0, the Firewall host is automatically selected as the router ID.
Router Id 2 provides an entry field to set the OSPF Router ID for the second Firewall host.
Save Setting submits the changes to the pending configuration.
Network/Routes/OSPF/Area Indexes form
Use the Network/Routes/OSPF/Area Indexes form to view and change the OSPF Area Index
settings (see Network/Routes/OSPF/Area Indexes form).
Figure 35 Network/Routes/OSPF/Area Indexes form
Fields and buttons on the Network/Routes/OSPF/Area Indexes form are as follows:
Id provides the index number for the Area Index attached to the Firewall.
Enabled indicates whether the Area Index is enabled or disabled.
Area Id provides the IP address identifying the Area Index.
Type indicates whether the Area Index is Transit (default) or Stub.
Actions provides the following selections if an Area ID is present:
Delete deletes the Area Index adjacent to the button.
Modify opens a form for modifying the Area Index adjacent to the button.
Add New Area Index opens a form for configuring a new Area Index (see
Network/Routes/OSPF/Area Indexes Add Area Index form on page 61).
Use the Network/Routes/OSPF/Interfaces form to display and change the OSPF Interfaces
settings that are required to attach an IP network to an OSPF area (see
Network/Routes/OSPF/Interfaces form).
Figure 37 Network/Routes/OSPF/Interfaces form
Fields and buttons on the Network/Routes/OSPF/Interfaces form are as follows:
Id provides a numerical ID, between 1 and 255, for the interface.
Enabled indicates OSPF Interfaces status as Yes or No.
Area Index sets the OSPF area index to attach to the network for the current IP interface.
Action provides a Modify button used to access a form to modify or update the OSPF
Interfaces. The Modify form displays a modified interface if interfaces are present (see
Network/Routes/OSPF/Interfaces Modify form on page 63).
Priority provides a list to set the GRE Tunnel priority used to elect a Designated Router
(DR) and Backup Designated Router (BDR) for the area. TIP: A value of 0 specifies that
the elected GRE Tunnel is DROTHER and cannot be used as a DR or BDR.
Cost1 provides an entry field to set the cost of output routes for the first Firewall host.
TIP: Cost is based on bandwidth. Low cost indicates high bandwidth.
Cost 2 provides an entry field to sets the cost of output routes for the second Firewall host.
Hello provides an entry field to set the hello interval in seconds. TIP: The value must be
the same on all routing devices within the area.
Dead provides an entry field to set the router dead interval value, in seconds. TIP: The
dead value is typically four times the value of "hello." This value must be the same on all
routing devices within the same area.
Transmit provides a list to set the transmit delay, in seconds. TIP: This value must be the
same on all routing devices within the area.
Retransmit provides a list to set the time interval, in seconds, between each transmission
of LSAs to adjacencies on this GRE Tunnel. TIP: This value must be the same on all
routing devices within the area.
Authentication provides a list to set the authentication type.
Key provides an entry field to specify the password to be used for OSPF authentication.
TIP: Specify a type 1 (plain text) password of up to 16 characters.
MD5 Auth Key provides an entry field to set the password to be used for OSPF
authentication. TIP: Specify a password of up to 16 characters.
Update submits the OSPF GRE changes to the pending configuration and returns to the
Network/Routes/OSPF/GRE form.
Back returns to the Network/Routes/OSPF/GRE Tunnels page without submitting the
Use the Network/Interfaces form to view and configure the settings for individual interfaces
(see Network/Interfaces form).
Figure 48 Network/Interfaces form
The Firewall can be configured with up to 255 IP interfaces, each representing the Firewall on
the IP subnet. Fields and buttons on the Network/Interfaces form are as follows:
Id specifies the numerical ID, between 1 and 255, for the interface and can be used to
specify the interface when configuring a new route.
Enabled
Yes indicates that the interface is enabled.
No indicates that the interface is disabled.
Address1 specifies the IP address of the interface. TIP: Use the dotted decimal notation.
Address2 specifies the second IP address of the interface. TIP: Address2 is used in an
active-active and active-standby VRRP configuration.
Vlan Id specifies the numerical ID for a VLAN on the interface.
Port associates the interface with a single port.
VRRP specifies the Virtual Router ID and IP address of IP interfaces configured for high-
availability and active-active. TIP: Use the virtual IP address to access the firewall with
enhanced security.
Enabled indicates that high availability VRRP is enabled. TIP: Two Firewall hosts
must be in the cluster to apply high availability VRRP. High availability VRRP
cannot be enabled when active-active VRRP or ClusterXL is enabled.
Active-Active provides a list with the following two selections:
Disabled indicates that active-active VRRP is disabled.
Enabled indicates that active-active VRRP is enabled. TIP: Two Firewall hosts must
be in the cluster to apply active-active VRRP. Active-active VRRP cannot be enabled
when high availability VRRP or ClusterXL is enabled.
ClusterXL provides a list with the following two selections:
Enabled indicates that ClusterXL is enabled. TIP: Two Firewall hosts must be in the
cluster in order to apply ClusterXL. ClusterXL cannot be enabled when high
availability VRRP or active–active is enabled.
Disabled indicates that ClusterXL is disabled.
Advertisement Interval is used to set the interval between advertisement messages. TIP:
Set the advertisement interval in seconds between 3 and 3600.
Garp Broadcast Interval is used to set the value that, when multiplied by the
Advertisement Interval, determines the interval between Gratuitous ARP (GARP)
messages. TIP: The interval between GARP messages is set, in seconds, between 2 and
100.
216383-D October 2005
Garp Delay Interval displays, and permits setting of, the current GARP Delay Interval in
seconds. TIP: The default value is 1 and the range is between 1 and 600, in seconds.
Advance FailOver Check
Enabled indicates that AFC is enabled and the system is set to ARP before initiating a
failover caused by missed VRRP advertisements.
Disabled indicates that AFC is disabled.
Preferred Master provides a list with the following three selections:
disabled
host 1
host 2
Update submits the changes to the pending configuration.
Bridge Statistics (see Network/Status/Bridge Statistics form on page 87)
Bridge Mac Entries (see Network/Status/Bridge Mac Entries form on page 88)
Network/Status/Interface form
The Network/Status/Interface form provides runtime information for all Ethernet ports on the
Firewall. Information includes errors, dropped packets, overruns, and frames for all
transmitted and received packets, in addition to number of carriers and overruns for all
transmitted (TX) packets (see Network/Status/Interface form). The Firewall Director list
provides the option of selecting all or individual interfaces.
Use the Network/Status/Bridge Mac Entries form to display the bridge MAC entries for the
selected Firewall Director (see Network/Status/Bridge Mac Entries form).
Figure 59 Network/Status/Bridge Mac Entries form
Fields and buttons on the Network/Status/Bridge Mac Entries form are as follows:
Firewall Director provides a list to select the Firewall Director for bridge MAC entry
display.
Refresh provides the information for the selected Firewall Director.
Bridge No. provides the numerical ID of the bridge.
Port provides the port number of the bridge.
Mac Address provides the MAC Address of the bridge.
Features provides the Check Point license features.
Synchronization form
Use the Firewall/Synchronization form to display the cluster synchronization status and enable
or disable cluster synchronization (see Firewall/Synchronization form).
Figure 64 Firewall/Synchronization form
NOTE – Firewall synchronization provides for stateful failover of open sessions when a master
is backed up by the backup master.
Fields and buttons on the Firewall/Synchronization form are as follows:
Status displays a list providing two selections:
Enabled indicates that cluster synchronization is enabled.
Disabled indicates that cluster synchronization is disabled.
Save Settings submits the changes to the pending configuration.
The Firewall/SMART Clients form displays, and allows modification to, SMART Clients
addresses. This form also provides a field to add a new SMART Client (see Firewall/SMART
Clients form).
Figure 65 Firewall/SMART Clients form
216383-D October 2005
Fields and buttons on the Firewall/SMART Clients form are as follows:
IP Address provides the IP Address of any configured SMART Clients.
Action provides fields to delete or modify any present SMART Clients.
New SMART Client IP provides a field to enter a new SMART Client IP address.
Update submits the new SMART Client IP address to the pending configuration.
The SecurID form provides access to a two-factor form method for centralized authentication
and management (see Firewall/SecurID form). For more information about SecurID, see the
Nortel Switched Firewall 5100 Series User’s Guide and Command Reference (213455-L).
Figure 66 Firewall/SecurID form
The SecurID form is divided into two sections.
Fields and buttons on the SecurID Interface Settings section are as follows:
SecurID Interface IP Address specifies the Master Firewall external interface used to
communicate with the SecurID server.
Click Update to submit the SecurID interface address change to the pending
configuration.
Fields and buttons on the Import SecurID Configuration section are as follows:
File specifies the SecurID configuration file name. TIP: Click Browse to locate and select
a file name.
Click Import to import the SecurID configuration specified in the sdconf.rec file.
Use the Operation/Configuration form to export or import configuration files (see
Operation/Configuration form).
Figure 68 Operation/Configuration form
The Operation/Configuration form is divided into two sections:
Export Cluster Configuration
Import Cluster Configuration
Fields and buttons on the form are:
Export Cluster Configuration
Secret key provides a case-sensitive entry field to create a secret key used to encrypt
the settings. TIP: The secret key must be supplied again when the configuration is
imported.
oExport is used to export the configuration. TIP: Depending on the browser type,
the administrator can have the option to send output to a file or to the display.
Output is sent to the display can be captured using Copy and Paste functions.
Import Cluster Configuration
File provides a field to type in a configuration file name to import.
oBrowse provides access to a library of configuration files, if available, for
selection of a configuration file to import.
Secret key provides a case-sensitive entry field. TIP: The import secret key is used to
PREVIOUSCONFIGURATIONSETTINGS, BYTHEIMPORTEDCONFIGURATION. ALLCHANGES
PENDINGATTHETIMEOFTHEIMPORTARELOST. THE REVERTCOMMANDCANNOTBEUSED
TORECOVERTHEPREVIOUSCONFIGURATION.
Image Update forms
Operation/Image Update provides two forms:
Packages (see Operation/Image Update/Packages form)
Patches (see Operation/Image Update/Patches form on page 101)
Operation/Image Update/Packages form
Use the Operation/Image Update/Packages form to obtain information about software running
on the firewall and to update the NSF software from the browser (see Operation/Image
Update/Packages form).
Figure 69 Operation/Image Update/Packages form
The Operation/Image Update/Packages form is divided into the following two sections: