firebrick fb2900 user manual · 2020. 5. 26. · firebrick fb2900 user manual ix 16. vrrp ..... 111...

289
FireBrick FB2900 User Manual FB2900 Versatile Network Appliance

Upload: others

Post on 07-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • FireBrick FB2900

    User Manual

    FB2900 Versatile Network Appliance

  • FireBrick FB2900 User ManualThis User Manual documents Software version V1.54.101Copyright © 2012-2018 FireBrick Ltd.

  • iv

    Table of ContentsPreface ................................................................................................................................. xxii1. Introduction .......................................................................................................................... 1

    1.1. The FB2900 ............................................................................................................... 11.1.1. Where do I start? .............................................................................................. 11.1.2. What can it do? ................................................................................................ 11.1.3. Ethernet port capabilities .................................................................................... 21.1.4. Differences between the devices in the FB2x00 series .............................................. 21.1.5. Software features .............................................................................................. 2

    1.2. About this Manual ....................................................................................................... 31.2.1. Version ........................................................................................................... 31.2.2. Intended audience ............................................................................................. 31.2.3. Technical details ............................................................................................... 31.2.4. Document style ................................................................................................. 31.2.5. Document conventions ....................................................................................... 31.2.6. Comments and feedback .................................................................................... 4

    1.3. Additional Resources ................................................................................................... 41.3.1. Technical Support ............................................................................................. 41.3.2. IRC Channel .................................................................................................... 51.3.3. Application Notes ............................................................................................. 51.3.4. Training Courses ............................................................................................... 5

    2. Getting Started ...................................................................................................................... 62.1. IP addressing .............................................................................................................. 62.2. Accessing the web-based user interface ........................................................................... 6

    2.2.1. Setup wizard .................................................................................................... 72.2.1.1. Login username/password ........................................................................ 92.2.1.2. WAN/PPPoE settings .............................................................................. 92.2.1.3. LAN settings ......................................................................................... 92.2.1.4. Initial config .......................................................................................... 9

    3. Configuration ....................................................................................................................... 103.1. The Object Hierarchy ................................................................................................. 103.2. The Object Model ...................................................................................................... 10

    3.2.1. Formal definition of the object model ................................................................. 113.2.2. Common attributes .......................................................................................... 11

    3.3. Configuration Methods ............................................................................................... 113.4. Data types ................................................................................................................ 11

    3.4.1. Sending and receiving values ............................................................................ 123.4.2. Lists of values ................................................................................................ 123.4.3. Set of possible values ...................................................................................... 123.4.4. Dates, times, and durations ............................................................................... 123.4.5. Colours .......................................................................................................... 123.4.6. Passwords and secrets ...................................................................................... 133.4.7. IP addresses ................................................................................................... 13

    3.4.7.1. Simple IP addresses .............................................................................. 133.4.7.2. Subnets and prefixes ............................................................................. 133.4.7.3. Ranges ................................................................................................ 133.4.7.4. Prefix filters ......................................................................................... 14

    3.5. Web User Interface Overview ...................................................................................... 143.5.1. User Interface layout ........................................................................................ 14

    3.5.1.1. Customising the layout .......................................................................... 153.5.2. Config pages and the object hierarchy ................................................................. 15

    3.5.2.1. Configuration categories ......................................................................... 163.5.2.2. Object settings ...................................................................................... 17

    3.5.3. Navigating around the User Interface .................................................................. 183.5.4. Backing up / restoring the configuration .............................................................. 19

  • FireBrick FB2900 User Manual

    v

    3.6. Configuration using XML ........................................................................................... 193.6.1. Introduction to XML ........................................................................................ 193.6.2. The root element - ............................................................................. 203.6.3. Viewing or editing XML .................................................................................. 203.6.4. Example XML configuration ............................................................................. 21

    3.7. Downloading/Uploading the configuration ...................................................................... 223.7.1. Download ...................................................................................................... 233.7.2. Upload .......................................................................................................... 23

    4. System Administration .......................................................................................................... 244.1. User Management ...................................................................................................... 24

    4.1.1. Login level ..................................................................................................... 244.1.2. Configuration access level ................................................................................ 254.1.3. Login idle timeout ........................................................................................... 254.1.4. Restricting user logins ...................................................................................... 26

    4.1.4.1. Restrict by IP address ............................................................................ 264.1.4.2. Logged in IP address ............................................................................. 264.1.4.3. Restrict by profile ................................................................................. 26

    4.1.5. Password change ............................................................................................. 264.1.6. One Time Password (OTP) ............................................................................... 26

    4.2. General System settings .............................................................................................. 274.2.1. System name (hostname) .................................................................................. 274.2.2. Administrative details ...................................................................................... 274.2.3. System-level event logging control ..................................................................... 284.2.4. Home page web links ...................................................................................... 28

    4.3. Software Upgrades ..................................................................................................... 284.3.1. Software release types ...................................................................................... 28

    4.3.1.1. Breakpoint releases ............................................................................... 294.3.2. Identifying current software version .................................................................... 294.3.3. Internet-based upgrade process .......................................................................... 29

    4.3.3.1. Manually initiating upgrades ................................................................... 304.3.3.2. Controlling automatic software updates ..................................................... 30

    4.3.4. Manual upgrade .............................................................................................. 314.4. Global LED control ................................................................................................... 314.5. Boot Process ............................................................................................................. 31

    4.5.1. LED indications .............................................................................................. 324.5.1.1. Status LED indications .......................................................................... 324.5.1.2. Port LEDs ........................................................................................... 32

    5. Event Logging ..................................................................................................................... 335.1. Overview .................................................................................................................. 33

    5.1.1. Log targets ..................................................................................................... 335.1.1.1. Logging to Flash memory ...................................................................... 335.1.1.2. Logging to the Console .......................................................................... 34

    5.2. Enabling logging ....................................................................................................... 345.3. Logging to external destinations ................................................................................... 34

    5.3.1. Syslog ........................................................................................................... 345.3.2. Email ............................................................................................................ 35

    5.3.2.1. E-mail process logging .......................................................................... 365.4. Factory reset configuration log targets ........................................................................... 365.5. Performance .............................................................................................................. 365.6. Viewing logs ............................................................................................................. 36

    5.6.1. Viewing logs in the User Interface ..................................................................... 365.6.2. Viewing logs in the CLI environment ................................................................. 37

    5.7. System-event logging ................................................................................................. 375.8. Using Profiles ........................................................................................................... 37

    6. Interfaces and Subnets .......................................................................................................... 386.1. Relationship between Interfaces and Physical Ports .......................................................... 38

  • FireBrick FB2900 User Manual

    vi

    6.1.1. Port groups .................................................................................................... 386.1.2. Interfaces ....................................................................................................... 39

    6.2. Defining port groups .................................................................................................. 396.3. Defining an interface .................................................................................................. 40

    6.3.1. Defining subnets ............................................................................................. 406.3.1.1. Source filtering ..................................................................................... 416.3.1.2. Using DHCP to configure a subnet .......................................................... 416.3.1.3. Using SLAAC (IPv6 router announcements) to configure a subnet ................. 426.3.1.4. IPv6 prefix delegated subnets .................................................................. 42

    6.3.2. Setting up DHCP server parameters .................................................................... 426.3.2.1. Fixed/Static DHCP allocations ................................................................ 436.3.2.2. Restricted allocations ............................................................................. 436.3.2.3. Special DHCP options ........................................................................... 44

    6.3.3. DHCP Relay Agent ......................................................................................... 456.4. Physical port settings .................................................................................................. 45

    6.4.1. Disabling auto-negotiation ................................................................................ 456.4.2. Setting port speed ............................................................................................ 456.4.3. Setting duplex mode ........................................................................................ 466.4.4. Defining port LED functions ............................................................................. 46

    7. Session Handling ................................................................................................................. 487.1. Routing vs. Firewalling ............................................................................................... 487.2. Session Tracking ....................................................................................................... 48

    7.2.1. Session termination .......................................................................................... 497.3. Session Rules ............................................................................................................ 49

    7.3.1. Overview ....................................................................................................... 497.3.2. Processing flow ............................................................................................... 507.3.3. Defining Rule-Sets and Rules ............................................................................ 53

    7.3.3.1. Recommended method of implementing firewalling .................................... 547.3.3.2. Changes to session traffic ....................................................................... 557.3.3.3. Graphing and traffic shaping ................................................................... 567.3.3.4. Configuring session time-outs ................................................................. 567.3.3.5. Load balancing ..................................................................................... 567.3.3.6. Clashes ............................................................................................... 577.3.3.7. NAT-PMP / PCP (Port Control Protocol) .................................................. 57

    7.4. Network Address Translation ....................................................................................... 587.4.1. When to use NAT ........................................................................................... 587.4.2. NAT ALGs .................................................................................................... 597.4.3. Setting NAT in rules ........................................................................................ 597.4.4. What NAT does .............................................................................................. 607.4.5. NAT with PPPoE ............................................................................................ 607.4.6. NAT with Dongles .......................................................................................... 607.4.7. NAT with other types of external routing ............................................................ 617.4.8. Mixing NAT and non NAT ............................................................................... 617.4.9. Carrier grade NAT .......................................................................................... 617.4.10. Using NAT setting on subnets ......................................................................... 61

    8. Routing .............................................................................................................................. 638.1. Routing logic ............................................................................................................ 638.2. Routing targets .......................................................................................................... 64

    8.2.1. Subnet routes .................................................................................................. 648.2.2. Routing to an IP address (gateway route) ............................................................. 648.2.3. Special targets ................................................................................................ 65

    8.3. Dynamic route creation / deletion ................................................................................. 658.4. Routing tables ........................................................................................................... 658.5. Bonding ................................................................................................................... 658.6. Route overrides ......................................................................................................... 66

    9. Profiles ............................................................................................................................... 67

  • FireBrick FB2900 User Manual

    vii

    9.1. Overview .................................................................................................................. 679.2. Creating/editing profiles .............................................................................................. 67

    9.2.1. Timing control ................................................................................................ 679.2.2. Tests ............................................................................................................. 68

    9.2.2.1. General tests ........................................................................................ 689.2.2.2. Time/date tests ..................................................................................... 689.2.2.3. Ping tests ............................................................................................. 68

    9.2.3. Inverting overall test result ................................................................................ 699.2.4. Manual override .............................................................................................. 699.2.5. Scripting ........................................................................................................ 699.2.6. LED .............................................................................................................. 70

    10. Traffic Shaping .................................................................................................................. 7110.1. Graphs and Shapers .................................................................................................. 71

    10.1.1. Graphs ......................................................................................................... 7110.1.2. Shapers ........................................................................................................ 7210.1.3. Ad hoc shapers ............................................................................................. 7210.1.4. Long term shapers ......................................................................................... 72

    10.2. Multiple shapers ...................................................................................................... 7310.3. Basic principles ....................................................................................................... 73

    11. PPPoE .............................................................................................................................. 7411.1. Types of DSL line and router in the United Kingdom ..................................................... 7411.2. Definining PPPoE links ............................................................................................. 75

    11.2.1. IPv6 ............................................................................................................ 7511.2.2. Additional options ......................................................................................... 75

    11.2.2.1. MTU and TCP fix ............................................................................... 7511.2.2.2. Service and ac-name ............................................................................ 7611.2.2.3. Logging ............................................................................................. 7611.2.2.4. Speed and graphs ................................................................................ 76

    12. Tunnels ............................................................................................................................. 7712.1. IPsec (IP Security) ................................................................................................... 77

    12.1.1. Introduction .................................................................................................. 7712.1.1.1. Integrity checking ................................................................................ 7712.1.1.2. Encryption ......................................................................................... 7712.1.1.3. Authentication .................................................................................... 7812.1.1.4. IKE ................................................................................................... 7812.1.1.5. Manual Keying ................................................................................... 7812.1.1.6. Identities and the Authentication Mechanism ............................................ 79

    12.1.2. Setting up IPsec connections ........................................................................... 7912.1.2.1. Global IPsec parameters ....................................................................... 7912.1.2.2. IKE proposals ..................................................................................... 8012.1.2.3. IKE roaming IP pools .......................................................................... 8012.1.2.4. IKE connections .................................................................................. 80

    12.1.2.4.1. IKE connection mode and type ................................................... 8012.1.2.4.2. IKE and IPsec proposal lists ....................................................... 8012.1.2.4.3. Authentication and IKE identities ................................................ 8112.1.2.4.4. IP addresses ............................................................................. 8212.1.2.4.5. Road Warrior connections .......................................................... 8212.1.2.4.6. Routing ................................................................................... 8212.1.2.4.7. Other parameters ...................................................................... 82

    12.1.2.5. Setting up Manual Keying .................................................................... 8312.1.2.5.1. IP endpoints ............................................................................. 8312.1.2.5.2. Algorithms and keys ................................................................. 8312.1.2.5.3. Routing ................................................................................... 8312.1.2.5.4. Mode ...................................................................................... 8412.1.2.5.5. Other parameters ...................................................................... 84

    12.1.3. Using EAP with IPsec/IKE ............................................................................. 84

  • FireBrick FB2900 User Manual

    viii

    12.1.4. Using certificates with IPsec/IKE ..................................................................... 8412.1.4.1. Creating certificates ............................................................................. 86

    12.1.5. Choice of algorithms ...................................................................................... 8712.1.6. NAT Traversal .............................................................................................. 8812.1.7. Configuring a Road Warrior server ................................................................... 8812.1.8. Connecting to non-FireBrick devices ................................................................. 90

    12.1.8.1. Using StrongSwan on Linux ................................................................. 9012.1.8.2. Setting up a Road Warrior VPN on an Android client ................................ 9112.1.8.3. Setting up a Road Warrior VPN on an iOS (iPhone/iPad) client .................... 9112.1.8.4. Manual keying using Linux ipsec-tools ................................................... 92

    12.1.9. High availability L2TP ................................................................................... 9312.2. FB105 tunnels ......................................................................................................... 93

    12.2.1. Tunnel wrapper packets .................................................................................. 9412.2.2. Setting up a tunnel ......................................................................................... 9412.2.3. Viewing tunnel status ..................................................................................... 9512.2.4. Dynamic routes ............................................................................................. 9512.2.5. Tunnel bonding ............................................................................................. 9512.2.6. Tunnels and NAT .......................................................................................... 96

    12.2.6.1. FB2900 doing NAT ............................................................................. 9612.2.6.2. Another device doing NAT ................................................................... 96

    12.3. Ether tunnelling ....................................................................................................... 9613. USB Port .......................................................................................................................... 98

    13.1. USB configuration .................................................................................................... 9813.1.1. 3G dongle configuration ................................................................................. 98

    14. System Services ................................................................................................................. 9914.1. Protecting the FB2900 .............................................................................................. 9914.2. Common settings ..................................................................................................... 9914.3. HTTP Server configuration ...................................................................................... 100

    14.3.1. Access control ............................................................................................. 10014.3.1.1. Trusted addresses .............................................................................. 100

    14.3.2. HTTPS access ............................................................................................. 10114.4. Telnet Server configuration ...................................................................................... 102

    14.4.1. Access control ............................................................................................. 10214.5. DNS configuration .................................................................................................. 103

    14.5.1. Blocking DNS names ................................................................................... 10314.5.2. Local DNS responses .................................................................................... 10314.5.3. Auto DHCP DNS ........................................................................................ 103

    14.6. NTP configuration .................................................................................................. 10314.7. SNMP configuration ............................................................................................... 10414.8. RADIUS configuration ............................................................................................ 104

    14.8.1. RADIUS server (platform RADIUS) ............................................................... 10414.8.2. RADIUS client ............................................................................................ 104

    14.8.2.1. RADIUS client settings ...................................................................... 10414.8.2.2. Server blacklisting ............................................................................. 105

    15. Network Diagnostic Tools .................................................................................................. 10615.1. Firewalling check ................................................................................................... 10615.2. Access check ......................................................................................................... 10715.3. Packet Dumping ..................................................................................................... 107

    15.3.1. Dump parameters ......................................................................................... 10815.3.2. Security settings required .............................................................................. 10815.3.3. IP address matching ..................................................................................... 10915.3.4. Packet types ................................................................................................ 10915.3.5. Snaplen specification .................................................................................... 10915.3.6. Using the web interface ................................................................................ 10915.3.7. Using an HTTP client ................................................................................... 110

    15.3.7.1. Example using curl and tcpdump .......................................................... 110

  • FireBrick FB2900 User Manual

    ix

    16. VRRP ............................................................................................................................. 11116.1. Virtual Routers ...................................................................................................... 11116.2. Configuring VRRP ................................................................................................. 112

    16.2.1. Advertisement Interval .................................................................................. 11216.2.2. Priority ....................................................................................................... 112

    16.3. Using a virtual router .............................................................................................. 11216.4. VRRP versions ...................................................................................................... 112

    16.4.1. VRRP version 2 .......................................................................................... 11216.4.2. VRRP version 3 .......................................................................................... 113

    16.5. Compatibility ......................................................................................................... 11317. VoIP ............................................................................................................................... 114

    17.1. What is VoIP? ....................................................................................................... 11417.2. Registration and Proxies .......................................................................................... 114

    17.2.1. Registrar ..................................................................................................... 11417.2.2. Proxy ......................................................................................................... 114

    17.3. Home/office phone system ....................................................................................... 11517.4. Network Address Translation .................................................................................... 11517.5. Number plan .......................................................................................................... 11617.6. Telephone handsets ................................................................................................. 11617.7. VoIP call carriers ................................................................................................... 11717.8. Hunt groups ........................................................................................................... 118

    17.8.1. Ring Type .................................................................................................. 11817.8.2. Ring order .................................................................................................. 11917.8.3. Overflow .................................................................................................... 11917.8.4. Out of hours ............................................................................................... 119

    17.9. Call pickup/steal ..................................................................................................... 11917.10. Busy lamp field .................................................................................................... 12017.11. Using RADIUS .................................................................................................... 120

    17.11.1. RADIUS accounting ................................................................................... 12017.11.2. RADIUS authentication ............................................................................... 120

    17.11.2.1. Call routing by RADIUS ................................................................... 12117.12. Call recording ...................................................................................................... 12217.13. Voicemail and IVR services ................................................................................... 12317.14. Call Data Records ................................................................................................. 12317.15. Technical details ................................................................................................... 12417.16. Custom tones ....................................................................................................... 124

    18. BGP ............................................................................................................................... 12618.1. What is BGP? ........................................................................................................ 12618.2. BGP Setup ............................................................................................................ 126

    18.2.1. Overview .................................................................................................... 12618.2.2. Standards .................................................................................................... 12618.2.3. Simple example setup ................................................................................... 12718.2.4. Peer type .................................................................................................... 12718.2.5. Route filtering ............................................................................................. 128

    18.2.5.1. Matching attributes ............................................................................ 12818.2.5.2. Action attributes ................................................................................ 128

    18.2.6. Well known community tags .......................................................................... 12918.2.7. Announcing black hole routes ........................................................................ 12918.2.8. Grey holes .................................................................................................. 13018.2.9. Announcing dead end routes .......................................................................... 13018.2.10. Bad optional path attributes .......................................................................... 13018.2.11. element ..................................................................................... 13118.2.12. , and other elements ............................................................ 13118.2.13. Route feasibility testing ............................................................................... 13118.2.14. Diagnostics ................................................................................................ 13118.2.15. Router startup and shutdown ........................................................................ 131

  • FireBrick FB2900 User Manual

    x

    18.2.16. TTL security ............................................................................................. 13219. OSPF .............................................................................................................................. 133

    19.1. What is OSPF? ...................................................................................................... 13319.2. OSPF Setup ........................................................................................................... 133

    19.2.1. Overview .................................................................................................... 13319.2.2. Standards .................................................................................................... 13319.2.3. Simple example setup ................................................................................... 13419.2.4. config element .................................................................................. 134

    20. Internet Service Providers ................................................................................................... 13520.1. Background ........................................................................................................... 135

    20.1.1. How it all began .......................................................................................... 13520.1.2. Point to Point Protocol .................................................................................. 13520.1.3. L2TP ......................................................................................................... 13520.1.4. Broadband .................................................................................................. 13620.1.5. RADIUS ..................................................................................................... 13620.1.6. BGP .......................................................................................................... 136

    20.2. Incoming L2TP connections ..................................................................................... 13620.3. The importance of CQM graphs ................................................................................ 13720.4. Authentication ........................................................................................................ 13720.5. Accounting ............................................................................................................ 13820.6. RADIUS Control messages ...................................................................................... 13820.7. PPPoE .................................................................................................................. 13820.8. Typical configuration .............................................................................................. 138

    20.8.1. Interlink subnet ............................................................................................ 13820.8.2. BGP with carrier .......................................................................................... 13920.8.3. RADIUS session steering .............................................................................. 13920.8.4. L2TP endpoints ........................................................................................... 14020.8.5. ISP RADIUS ............................................................................................... 140

    21. Command Line Interface .................................................................................................... 141A. Factory Reset Procedure ...................................................................................................... 142B. CIDR and CIDR Notation ................................................................................................... 144C. MAC Addresses usage ........................................................................................................ 146

    C.1. Multiple MAC addresses? ......................................................................................... 146C.2. How the FireBrick allocates MAC addresses ................................................................ 147

    C.2.1. Interface ...................................................................................................... 147C.2.2. Subnet ......................................................................................................... 147C.2.3. PPPoE ......................................................................................................... 147C.2.4. Base MAC ................................................................................................... 147C.2.5. Running out of MACs ................................................................................... 148

    C.3. MAC address on label .............................................................................................. 148C.4. Using with a DHCP server ........................................................................................ 148

    D. Scripted access .................................................................................................................. 149D.1. Tools ..................................................................................................................... 149D.2. Access control ........................................................................................................ 149

    D.2.1. Username and password ................................................................................. 149D.2.2. OTP ............................................................................................................ 149D.2.3. Allow list .................................................................................................... 149D.2.4. Allowed access ............................................................................................. 149

    D.3. XML data for common functions ............................................................................... 149D.4. XML data from diagnostics and tests .......................................................................... 150

    D.4.1. Cross site scripting security ............................................................................ 150D.4.2. Arguments to scripts ...................................................................................... 150

    D.5. Special URLs ......................................................................................................... 151D.6. Web sockets ........................................................................................................... 151

    E. VLANs : A primer ............................................................................................................. 152F. Supported L2TP Attribute/Value Pairs ................................................................................... 153

  • FireBrick FB2900 User Manual

    xi

    F.1. Start-Control-Connection-Request ............................................................................... 153F.2. Start-Control-Connection-Reply .................................................................................. 153F.3. Start-Control-Connection-Connected ............................................................................ 154F.4. Stop-Control-Connection-Notification .......................................................................... 154F.5. Hello ..................................................................................................................... 154F.6. Incoming-Call-Request .............................................................................................. 154F.7. Incoming-Call-Reply ................................................................................................ 155F.8. Incoming-Call-Connected .......................................................................................... 155F.9. Outgoing-Call-Request .............................................................................................. 155F.10. Outgoing-Call-Reply ............................................................................................... 156F.11. Outgoing-Call-Connected ......................................................................................... 156F.12. Call-Disconnect-Notify ............................................................................................ 156F.13. WAN-Error-Notify ................................................................................................. 156F.14. Set-Link-Info ......................................................................................................... 156F.15. Notes ................................................................................................................... 157

    F.15.1. BT specific notes ......................................................................................... 157F.15.2. IP over LCP ............................................................................................... 157

    G. Supported RADIUS Attribute/Value Pairs for L2TP operation ................................................... 158G.1. Authentication request .............................................................................................. 158G.2. Authentication response ............................................................................................ 159

    G.2.1. Accepted authentication ................................................................................. 159G.2.1.1. Prefix Delegation ................................................................................ 160

    G.2.2. Rejected authentication .................................................................................. 161G.3. Accounting Start ..................................................................................................... 161G.4. Accounting Interim .................................................................................................. 162G.5. Accounting Stop ...................................................................................................... 163G.6. Disconnect ............................................................................................................. 163G.7. Change of Authorisation ........................................................................................... 163G.8. Filter ID ................................................................................................................ 164G.9. Notes ..................................................................................................................... 165

    G.9.1. L2TP relay .................................................................................................. 165G.9.2. LCP echo and CQM graphs ............................................................................ 166G.9.3. IP over LCP ................................................................................................. 166G.9.4. Closed User Group ........................................................................................ 167G.9.5. Routing table ............................................................................................... 167

    H. Supported RADIUS Attribute/Value Pairs for VoIP operation .................................................... 168H.1. Authentication request .............................................................................................. 168H.2. Authentication response ............................................................................................ 169

    H.2.1. Challenge authentication ................................................................................ 169H.2.2. Accepted authentication (registration) ............................................................... 169H.2.3. Accepted authentication (invite) ....................................................................... 169H.2.4. Rejected authentication .................................................................................. 170

    H.3. Accounting Start ..................................................................................................... 170H.4. Accounting Interim .................................................................................................. 170H.5. Accounting Stop ...................................................................................................... 171H.6. Disconnect ............................................................................................................. 171H.7. Change of Authorisation ........................................................................................... 172

    I. FireBrick specific SNMP objects ........................................................................................... 173I.1. Monitoring information .............................................................................................. 173I.2. BGP information ...................................................................................................... 173I.3. IPsec information ...................................................................................................... 173I.4. L2TP information ..................................................................................................... 174I.5. VoIP information ...................................................................................................... 175I.6. CPU usage information .............................................................................................. 175I.7. Running Statistics ..................................................................................................... 176

    J. Command line reference ...................................................................................................... 177

  • FireBrick FB2900 User Manual

    xii

    J.1. General commands ................................................................................................... 177J.1.1. Trace off ...................................................................................................... 177J.1.2. Trace on ....................................................................................................... 177J.1.3. Uptime ......................................................................................................... 177J.1.4. General status ................................................................................................ 177J.1.5. Memory usage ............................................................................................... 177J.1.6. Process/task usage .......................................................................................... 177J.1.7. Login ........................................................................................................... 177J.1.8. Logout ......................................................................................................... 178J.1.9. See XML configuration ................................................................................... 178J.1.10. Load XML configuration ............................................................................... 178J.1.11. Show profile status ....................................................................................... 178J.1.12. Enable profile control switch .......................................................................... 178J.1.13. Disable profile control switch ......................................................................... 178J.1.14. Show RADIUS servers .................................................................................. 178J.1.15. Show DNS resolvers ..................................................................................... 178

    J.2. Networking commands .............................................................................................. 179J.2.1. Subnets ........................................................................................................ 179J.2.2. Ping and trace ............................................................................................... 179J.2.3. Show a route from the routing table .................................................................. 179J.2.4. List routes .................................................................................................... 179J.2.5. List routing next hops ..................................................................................... 179J.2.6. See DHCP allocations ..................................................................................... 180J.2.7. Clear DHCP allocations .................................................................................. 180J.2.8. Lock DHCP allocations ................................................................................... 180J.2.9. Unlock DHCP allocations ................................................................................ 180J.2.10. Name DHCP allocations ................................................................................ 180J.2.11. Show ARP/ND status .................................................................................... 180J.2.12. Show VRRP status ....................................................................................... 180J.2.13. Send Wake-on-LAN packet ............................................................................ 180

    J.3. Firewalling commands ............................................................................................... 181J.3.1. Check access to services ................................................................................. 181J.3.2. Check firewall logic ....................................................................................... 181

    J.4. USB/dongle commands ............................................................................................. 181J.4.1. Show dongle connectoons ............................................................................... 181J.4.2. Reset USB interface and all attached devices ...................................................... 181J.4.3. Reset PPP/Dongle data connection .................................................................... 181

    J.5. L2TP commands ...................................................................................................... 181J.6. BGP commands ....................................................................................................... 181J.7. OSPF commands ...................................................................................................... 182J.8. PPPoE commands ..................................................................................................... 182J.9. VoIP commands ....................................................................................................... 182J.10. Dongle/USB commands ........................................................................................... 182J.11. Advanced commands ............................................................................................... 182

    J.11.1. Panic .......................................................................................................... 182J.11.2. Reboot ........................................................................................................ 182J.11.3. Screen width ............................................................................................... 182J.11.4. Make outbound command session ................................................................... 183J.11.5. Show command sessions ............................................................................... 183J.11.6. Kill command session ................................................................................... 183J.11.7. Flash memory list ......................................................................................... 183J.11.8. Delete block from flash ................................................................................. 183J.11.9. Boot log ..................................................................................................... 183J.11.10. Flash log ................................................................................................... 183

    K. Constant Quality Monitoring - technical details ....................................................................... 184K.1. Broadband back-haul providers .................................................................................. 184

  • FireBrick FB2900 User Manual

    xiii

    K.2. Access to graphs and csvs ........................................................................................ 184K.2.1. Trusted access .............................................................................................. 184K.2.2. Dated information ......................................................................................... 185K.2.3. Authenticated access ...................................................................................... 185

    K.3. Graph display options .............................................................................................. 185K.3.1. Scaleable Vector Graphics .............................................................................. 185K.3.2. Data points .................................................................................................. 186K.3.3. Additional text ............................................................................................. 186K.3.4. Other colours and spacing .............................................................................. 186

    K.4. Overnight archiving ................................................................................................. 187K.4.1. Full URL format ........................................................................................... 187K.4.2. load handling ............................................................................................... 188

    K.5. Graph scores ........................................................................................................... 188K.6. Creating graphs, and graph names .............................................................................. 188

    L. Hashed passwords .............................................................................................................. 189L.1. Password hashing .................................................................................................... 189

    L.1.1. Salt ............................................................................................................. 189L.2. One Time Password seed hashing ............................................................................... 190

    M. Configuration Objects ........................................................................................................ 192M.1. Top level ............................................................................................................... 192

    M.1.1. config: Top level config ................................................................................ 192M.2. Objects .................................................................................................................. 193

    M.2.1. system: System settings ................................................................................. 193M.2.2. link: Web links ............................................................................................ 194M.2.3. user: Admin users ........................................................................................ 195M.2.4. eap: User access controlled by EAP ................................................................. 195M.2.5. log: Log target controls ................................................................................. 196M.2.6. log-syslog: Syslog logger settings .................................................................... 196M.2.7. log-email: Email logger settings ...................................................................... 197M.2.8. services: System services ............................................................................... 197M.2.9. http-service: Web service settings .................................................................... 198M.2.10. dns-service: DNS service settings .................................................................. 199M.2.11. dns-host: Fixed local DNS host settings .......................................................... 199M.2.12. dns-block: Fixed local DNS blocks ................................................................ 200M.2.13. radius-service: RADIUS service definition ...................................................... 200M.2.14. radius-service-match: Matching rules for RADIUS service ................................. 201M.2.15. radius-server: RADIUS server settings ............................................................ 203M.2.16. telnet-service: Telnet service settings .............................................................. 203M.2.17. snmp-service: SNMP service settings ............................................................. 204M.2.18. time-service: System time server settings ........................................................ 204M.2.19. ethernet: Physical port controls ..................................................................... 205M.2.20. link-activity: LED link monitoring ................................................................. 206M.2.21. sampling: Packet sampling configuration ........................................................ 206M.2.22. portdef: Port grouping and naming ................................................................. 207M.2.23. interface: Port-group/VLAN interface settings .................................................. 207M.2.24. subnet: Subnet settings ................................................................................ 209M.2.25. vrrp: VRRP settings .................................................................................... 210M.2.26. dhcps: DHCP server settings ......................................................................... 210M.2.27. dhcp-attr-hex: DHCP server attributes (hex) .................................................... 211M.2.28. dhcp-attr-string: DHCP server attributes (string) ............................................... 211M.2.29. dhcp-attr-number: DHCP server attributes (numeric) ......................................... 212M.2.30. dhcp-attr-ip: DHCP server attributes (IP) ........................................................ 212M.2.31. pppoe: PPPoE settings ................................................................................. 212M.2.32. ppp-route: PPP routes .................................................................................. 214M.2.33. usb: USB 3G/dongle settings ........................................................................ 214M.2.34. dongle: 3G/dongle settings ........................................................................... 214

  • FireBrick FB2900 User Manual

    xiv

    M.2.35. route: Static routes ...................................................................................... 216M.2.36. network: Locally originated networks ............................................................. 216M.2.37. blackhole: Dead end networks ....................................................................... 217M.2.38. loopback: Locally originated networks ............................................................ 217M.2.39. ospf: Overall OSPF settings .......................................................................... 218M.2.40. namedbgpmap: Mapping and filtering rules of BGP prefixes ............................... 219M.2.41. bgprule: Individual mapping/filtering rule ....................................................... 219M.2.42. bgp: Overall BGP settings ............................................................................ 220M.2.43. bgppeer: BGP peer definitions ...................................................................... 220M.2.44. bgpmap: Mapping and filtering rules of BGP prefixes ....................................... 222M.2.45. cqm: Constant Quality Monitoring settings ...................................................... 222M.2.46. l2tp: L2TP settings ...................................................................................... 224M.2.47. l2tp-outgoing: L2TP settings for outgoing L2TP connections .............................. 225M.2.48. l2tp-incoming: L2TP settings for incoming L2TP connections ............................. 226M.2.49. l2tp-relay: Relay and local authentication rules for L2TP ................................... 228M.2.50. fb105: FB105 tunnel definition ..................................................................... 229M.2.51. fb105-route: FB105 routes ............................................................................ 230M.2.52. ipsec-ike: IPsec configuration (IKEv2) ........................................................... 230M.2.53. ike-connection: connection configuration ........................................................ 231M.2.54. ipsec-route: IPsec tunnel routes ..................................................................... 233M.2.55. ike-roaming: IKE roaming IP pools ................................................................ 233M.2.56. ike-proposal: IKE security proposal ............................................................... 233M.2.57. ipsec-proposal: IPsec AH/ESP proposal .......................................................... 234M.2.58. ipsec-manual: peer configuration ................................................................... 234M.2.59. ping: Ping/graph definition ........................................................................... 235M.2.60. profile: Control profile ................................................................................. 236M.2.61. profile-date: Test passes if within any of the time ranges specified ....................... 237M.2.62. profile-time: Test passes if within any of the date/time ranges specified ................. 237M.2.63. profile-ping: Test passes if any addresses are pingable ....................................... 238M.2.64. shaper: Traffic shaper .................................................................................. 238M.2.65. shaper-override: Traffic shaper override based on profile ................................... 239M.2.66. ip-group: IP Group ...................................................................................... 239M.2.67. route-override: Routing override rules ............................................................ 239M.2.68. session-route-rule: Routing override rule ......................................................... 240M.2.69. session-route-share: Route override load sharing ............................................... 240M.2.70. rule-set: Firewall/mapping rule set ................................................................. 241M.2.71. session-rule: Firewall rules ........................................................................... 242M.2.72. session-share: Firewall load sharing ............................................................... 243M.2.73. voip: Voice over IP config ........................................................................... 243M.2.74. carrier: VoIP carrier details .......................................................................... 245M.2.75. telephone: VoIP telephone authentication user details ........................................ 246M.2.76. tone: Tone definitions .................................................................................. 247M.2.77. ringgroup: Ring groups ................................................................................ 248M.2.78. etun: Ether tunnel ....................................................................................... 249M.2.79. dhcp-relay: DHCP server settings for remote / relayed requests ........................... 249

    M.3. Data types ............................................................................................................. 249M.3.1. ppp-dump: PPP dump format ......................................................................... 249M.3.2. autoloadtype: Type of s/w auto load ................................................................ 250M.3.3. config-access: Type of access user has to config ................................................ 250M.3.4. user-level: User login level ............................................................................ 250M.3.5. eap-subsystem: Subsystem with EAP access control ........................................... 250M.3.6. eap-method: EAP access method ..................................................................... 251M.3.7. syslog-severity: Syslog severity ....................................................................... 251M.3.8. syslog-facility: Syslog facility ......................................................................... 251M.3.9. http-mode: HTTP/HTTPS security mode .......................................................... 252

  • FireBrick FB2900 User Manual

    xv

    M.3.10. radiuspriority: Options for controlling platform RADIUS response prioritytagging ................................................................................................................. 252M.3.11. radiustype: Type of RADIUS server ............................................................... 253M.3.12. month: Month name (3 letter) ....................................................................... 253M.3.13. day: Day name (3 letter) .............................................................................. 253M.3.14. port: Physical port ...................................................................................... 253M.3.15. Crossover: Crossover configuration ................................................................ 254M.3.16. LinkSpeed: Physical port speed ..................................................................... 254M.3.17. LinkDuplex: Physical port duplex setting ........................................................ 254M.3.18. LinkFlow: Physical port flow control setting .................................................... 254M.3.19. LinkClock: Physical port Gigabit clock master/slave setting ................................ 255M.3.20. LinkLED: LED settings ............................................................................... 255M.3.21. LinkPower: PHY power saving options .......................................................... 255M.3.22. LinkFault: Link fault type to send .................................................................. 255M.3.23. LEDColour: Which colour LED .................................................................... 255M.3.24. LEDBlink: LED blink speed ......................................................................... 256M.3.25. sampling-protocol: Sampling protocol ............................................................ 256M.3.26. trunk-mode: Trunk port mode ....................................................................... 256M.3.27. ramode: IPv6 route announce level ................................................................ 256M.3.28. dhcpv6control: Control for RA and DHCPv6 bits ............................................. 257M.3.29. bgpmode: BGP announcement mode .............................................................. 257M.3.30. sampling-mode: Sampling mode .................................................................... 257M.3.31. sfoption: Source filter option ........................................................................ 257M.3.32. pppoe-mode: Type of PPPoE connection ......................................................... 257M.3.33. pppoe-calling: Additional prefix on PPPoE calling ID ....................................... 258M.3.34. pdp-context-type: Type of IP connection ......................................................... 258M.3.35. ipsec-type: IPsec encapsulation type ............................................................... 258M.3.36. ipsec-auth-algorithm: IPsec authentication algorithm ......................................... 258M.3.37. ipsec-crypt-algorithm: IPsec encryption algorithm ............................................. 259M.3.38. peertype: BGP peer type .............................................................................. 259M.3.39. ha-set: High availability set ID ...................................................................... 259M.3.40. radius-nas: NAS IP to report ......................................................................... 259M.3.41. ike-authmethod: authentication method ........................................................... 260M.3.42. ike-mode: connection setup mode .................................................................. 260M.3.43. ike-PRF: IKE Pseudo-Random Function ......................................................... 260M.3.44. ike-DH: IKE Diffie-Hellman group ................................................................ 260M.3.45. ike-ESN: IKE Sequence Number support ........................................................ 260M.3.46. ipsec-encapsulation: Manually keyed IPsec encapsulation mode .......................... 261M.3.47. switch: Profile manual setting ....................................................................... 261M.3.48. dynamic-graph: Type of dynamic graph .......................................................... 261M.3.49. firewall-action: Firewall action ...................................................................... 261M.3.50. voip-format: Number presentation format ........................................................ 261M.3.51. uknumberformat: Number formatting option .................................................... 262M.3.52. recordoption: Recording option ..................................................................... 262M.3.53. ring-group-order: Order of ring ..................................................................... 262M.3.54. ring-group-type: Type of ring when one call in queue ........................................ 262M.3.55. record-beep-option: Record beep option .......................................................... 263

    M.4. Basic types ............................................................................................................ 263Index .................................................................................................................................... 266

  • xvi

    List of Figures2.1. Initial web page in factory reset state ...................................................................................... 72.2. Setup Wizard ...................................................................................................................... 83.1. Main menu ....................................................................................................................... 153.2. Icons for layout controls ..................................................................................................... 153.3. Icons for configuration categories ......................................................................................... 163.4. The "Setup" category .......................................................................................................... 163.5. Editing an "Interface" object ................................................................................................ 173.6. Show hidden attributes ....................................................................................................... 173.7. Attribute definitions ........................................................................................................... 183.8. Navigation controls ............................................................................................................ 184.1. Setting up a new user ......................................................................................................... 244.2. Software upgrade available notification ................................................................................. 304.3. Manual Software upload ..................................................................................................... 317.1. Example sessions created by drop and reject actions ................................................................ 507.2. Processing flow chart for rule-sets and session-rules ................................................................ 52C.1. Product label showing MAC address range .......................................................................... 148

  • xvii

    List of Tables2.1. IP addresses for computer ..................................................................................................... 62.2. IP addresses to access the FireBrick ....................................................................................... 62.3. IP addresses to access the FireBrick ....................................................................................... 63.1. Special character sequences ................................................................................................. 204.1. User login levels ............................................................................................................... 254.2. Configuration access levels .................................................................................................. 254.3. General administrative details attributes ................................................................................. 274.4. Attributes controlling auto-upgrades ...................................................................................... 304.5. Global LED control ........................................................................................................... 314.6. Status LED indications ....................................................................................................... 325.1. Logging attributes .............................................................................................................. 345.2. System-Event Logging attributes .......................................................................................... 376.1. Port LED functions ............................................................................................................ 466.2. LED Link/Activity settings .................................................................................................. 466.3. Example modified Port LED functions .................................................................................. 477.1. Action attribute values ........................................................................................................ 508.1. Example route targets ......................................................................................................... 6412.1. IPsec algorithm key lengths ............................................................................................... 8312.2. IKE / IPsec algorithm proposals .......................................................................................... 8714.1. List of system services ...................................................................................................... 9914.2. List of system services .................................................................................................... 10015.1. Packet dump parameters .................................................................................................. 10815.2. Packet types that can be captured ...................................................................................... 10917.1. Ring Type ..................................................................................................................... 11817.2. Ring Order .................................................................................................................... 11917.3. Access-Accept ............................................................................................................... 12217.4. Default tones ................................................................................................................. 12418.1. Peer types ..................................................................................................................... 12718.2. Communities ................................................................................................................. 12918.3. Network attributes .......................................................................................................... 13119.1. OSPF config attributes .................................................................................................... 134C.1. DHCP client names used .................................................................................................. 148D.1. Special URLs ................................................................................................................. 151F.1. SCCRQ .......................................................................................................................... 153F.2. SCCRP .......................................................................................................................... 153F.3. SCCCN .......................................................................................................................... 154F.4. StopCCN ........................................................................................................................ 154F.5. HELLO .......................................................................................................................... 154F.6. ICRQ ............................................................................................................................. 154F.7. ICRP ............................................................................................................................. 155F.8. ICCN ............................................................................................................................. 155F.9. OCRQ ............................................................................................................................ 155F.10. OCRP .......................................................................................................................... 156F.11. OCCN .......................................................................................................................... 156F.12. CDN ............................................................................................................................ 156F.13. WEN ............................................................................................................................ 156F.14. SLI .............................................................................................................................. 156G.1. Access-request ................................................................................................................ 158G.2. Access-Accept ................................................................................................................ 159G.3. Access-Reject ................................................................................................................. 161G.4. Accounting-Start ............................................................................................................. 161G.5. Accounting-Interim ...................................................................