Uploaded by GEO LEE

secflow-1p

advertisement
Installation and
Operation Manual
SecFlow-1p
Industrial IoT Gateway
Version 5.0
© 2019–2022 RAD Data Communications Ltd.
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD"). No part
of this publication may be reproduced in any form whatsoever without prior written approval by RAD
Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets, and other
intellectual property or other proprietary rights relating to this manual and to the SecFlow-1p and any
software components contained therein are proprietary products of RAD protected under international
copyright law and shall be and remain solely with RAD.
The SecFlow-1p product name is owned by RAD. No right, license, or interest to such trademark is
granted hereunder, and you agree that no such right, license, or interest shall be asserted by you with
respect to such trademark. The RAD name, logo, logotype, and the product names Airmux, IPmux,
MiNID, MiCLK, Optimux, and SecFlow are registered trademarks of RAD Data Communications Ltd. All
other trademarks are the property of their respective holders.
You shall not copy, reverse compile, or reverse assemble all or any portion of the Manual or the
SecFlow-1p. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute,
license, or sell any product that supports substantially similar functionality as the SecFlow-1p, based on
or derived in any way from the SecFlow-1p. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the SecFlow-1p package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof. Upon such
termination by RAD, you agree to return to RAD the SecFlow-1p and all copies and portions thereof.
Contact Information
For further information, contact RAD at the address below, or contact your local business partner.
International Headquarters
North American Headquarters
24 Raoul Wallenberg St., Tel Aviv 6971923, Israel
Tel 972-3-6458181 | Fax 972-3-7604732
Email market@rad.com
900 Corporate Drive, Mahwah, NJ 07430, USA
Tel 201-529-1100 | Toll Free: 800-444-7234 | Fax: 201-529-5777
Email market@radusa.com
www.rad.com | radcare-online.rad.com
Publication No. 768-205-05/22
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the SecFlow-1p to be delivered hereunder shall be
free of defects in material and workmanship under normal use and service for a period of twelve (12)
months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by reason of
material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the
option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of
equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the
event that RAD requests the return of equipment, each party shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has been
subjected to misuse, neglect, accident, or improper installation, or if repairs or modifications were made
by persons other than RAD's own authorized service personnel, unless such repairs by others were made
with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties
which extend beyond the face hereof, including, but not limited to, warranties of merchantability and
fitness for a particular purpose, and in no event shall RAD be liable for consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not limited to,
lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale,
handling, repair, maintenance, or use of the SecFlow-1p, and in no event shall RAD's liability exceed the
purchase price of the SecFlow-1p.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to
SecFlow-1p and for ensuring that replacements and other adjustments required in connection with the
said warranties are satisfactory.
Software components in the SecFlow-1p are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a particular
purpose. RAD shall not be liable for any loss of use, interruption of business, or indirect, special,
incidental or consequential damages of any kind. In spite of the above, RAD shall do its best to provide
error-free software products and shall offer free Software updates during the warranty period under
this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims,
demands, or actions arising out of or relating to this Agreement and the SecFlow-1p shall not exceed the
sum paid to RAD for the purchase of the SecFlow-1p. In no event shall RAD be liable for any indirect,
incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been advised of
the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Safety and Disposal (English)
General Safety Instructions
The following instructions serve as a general guide for the safe installation and operation of
telecommunications products. Additional instructions, if applicable, are included inside the manual.
This equipment is not suitable for use in locations where children are likely to be present.
Safety Symbols
This symbol indicates potential safety hazards regarding product operation
or maintenance to the equipment.
This symbol may appear on the equipment or in the text. It indicates
potential safety hazards regarding product operation or maintenance to
operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Hot surface! Contact may cause burn. Do not touch.
Protective ground: the marked lug or terminal should be connected to the
building protective ground bus (to be performed by skilled personnel only).
Safety and Disposal (English)
6
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable is attached near the
optical transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:
Before turning on the equipment, make sure that the fiber-optic cable is
intact and is connected to the transmitter.
• Do not attempt to adjust the laser drive current.
• Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
• The use of optical devices with the equipment increases eye hazard.
• Use of controls, adjustments, or performing procedures other than those
specified herein may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
•
Some products may be equipped with a replaceable battery. There is danger
of explosion if batteries are mishandled or incorrectly replaced. On systems
with replaceable batteries, replace only with the same manufacturer and
type or equivalent type recommended by the manufacturer per the
instructions provided in the product service manual. Do not disassemble
batteries or attempt to recharge them outside the system. Do not dispose of
batteries in fire. Dispose of batteries properly in accordance with the
manufacturer’s instructions and local regulations.
In some cases, the users may insert their own SFP laser transceivers into the product. Users are alerted
that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are
used. In particular, users are warned to use only agency approved products that comply with the local
laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation, and maintenance of this
product. Only qualified, authorized, and skilled service personnel should carry out adjustment,
maintenance, or repairs to this product. No installation, adjustment, maintenance, or repairs should be
performed by either the operator or the user.
Handling Energized Products
General Safety Practices
Do not touch or tamper with the power supply when the power cord is connected. Line voltages may be
present inside certain products even when the power switch (if installed) is in the OFF position or a fuse
Safety and Disposal (English)
7
is blown. For DC-powered products, although the voltages levels are usually not hazardous, energy
hazards may still exist.
Before working on equipment connected to power lines or telecommunication lines, remove jewelry or
any other metallic object that may come into contact with energized parts.
Unless otherwise specified, all products are intended to be grounded during normal use. Grounding is
provided by connecting the mains plug to a wall socket with a protective ground terminal. If a ground
lug is provided on the product, it should be connected to the protective ground at all times, by a wire of
diameter 18 AWG or wider. Rack-mounted equipment should be mounted only in grounded racks and
cabinets. These procedures should be performed by skilled personnel only.
Always make the ground connection first and disconnect it last. Do not connect telecommunication
cables to ungrounded equipment. Make sure that all other cables are disconnected before
disconnecting the ground.
Some products may have panels secured by thumbscrews with a slotted head. These panels may cover
hazardous circuits or parts, such as power supplies. These thumbscrews should therefore always be
tightened securely with a screwdriver after both initial installation and subsequent access to the panels.
Before connecting or disconnecting the AC or DC mains connector to/from the
device, the user should validate that the Power switch in the control panel is set to
OFF.
Warning
The Power switch can be activated only after the AC or DC mains connector is
connected to the device.
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power to the
product is 16A (20A for USA and Canada). The circuit breaker in the building installation should have
high breaking capacity and must operate at short-circuit current exceeding 35A (40A for USA and
Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power switch is
provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected
in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed
in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Safety and Disposal (English)
Note
8
The Denmark power cord is not provided with the equipment and should
comply with IEC and the local electrical code.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference to the
ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, when connecting the DC supply, pay attention
to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the installation
complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power to the
product is 16A (20A for USA and Canada). The circuit breaker in the building installation should have
high breaking capacity and must operate at short-circuit current exceeding 35A (40A for USA and
Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate the
circuit breaker of the panel board that services the equipment and switch it to the OFF position. When
connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the
positive pole, and last the negative pole. Switch the circuit breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated in the
building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Connecting Data and Telecommunication Cables
Data and telecommunication interfaces are classified according to their safety status.
The following table lists the status of several standard interfaces. If the status of a given port differs
from the standard one, a notice is given in the manual.
Safety and Disposal (English)
Ports
Safety Status
V.11, V.28, V.35, V.36, RS-530, X.21,
10BASE-T, 100BASE-T, 1000BASE-T,
Unbalanced E1, E2, E3, STM, DS-2, DS-3,
S-Interface ISDN, Analog voice E&M
ES1
9
Electrical energy source class 1
Ports which do not present a safety hazard. Usually up to
30 VAC or 60 VDC.
xDSL (without feeding voltage),
Balanced E1, T1, Sub E1/T1, POE
Input DC Voltage up to 60 VDC
FXS, FXO
ES2
Electrical energy source class 2
ES3
Electrical energy source class 3
Input DC Voltage up to 72 VDC
AC power source declared
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a
qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables. Do not
disconnect the ground connection before disconnecting all telecommunication cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra
caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The
grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk, there are
restrictions on the diameter of wires in the telecom cables, between the equipment and the mating
connectors.
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Warning
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such
cases, a notice is given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Safety and Disposal (English)
10
Electromagnetic Compatibility (EMC)
The equipment is designed and approved to comply with the electromagnetic regulations of major
regulatory bodies. The following instructions may enhance the performance of the equipment and
provide better protection against excessive emission and better immunity against disturbances.
A good ground connection is essential. When installing the equipment in a rack, make sure to remove all
traces of paint from the mounting points. Use suitable lock-washers and torque. If an external grounding
lug is provided, connect it to the ground bus using braided wire as short as possible.
The equipment is designed to comply with EMC requirements when connecting it with unshielded
twisted pair (UTP) cables with the exception of 1000BaseT ports that must always use shielded twisted
pair cables of good quality (CAT 5E or higher). However, the use of shielded wires is always
recommended, especially for high-rate data. In some cases, when unshielded wires are used, ferrite
cores should be installed on certain cables. In such cases, special instructions are provided in the
manual.
Disconnect all wires which are not in permanent use, such as cables used for one-time configuration.
The compliance of the equipment with the regulations for conducted emission on the data lines is
dependent on the cable quality. The emission is tested for UTP with 80 dB longitudinal conversion loss
(LCL).
Unless otherwise specified or described in the manual, ES1 and ES2 electrical energy sources provide
protection against surges on the data lines. Primary protectors should be provided in the building
installation.
The equipment is designed to provide adequate protection against electrostatic discharge (ESD).
However, it is good working practice to use caution when connecting cables terminated with plastic
connectors (without a grounded metal hood, such as flat cables) to sensitive data lines. Before
connecting such cables, discharge yourself by touching ground or wear an ESD preventive wrist strap.
FCC-15 User Information
This equipment has been tested and found to comply with the limits of the Class A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with
the Installation and Operation Manual, may cause harmful interference to the radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case
the user will be required to correct the interference at his own expense.
Safety and Disposal (English)
11
Canadian Emission Requirements
This Class A digital apparatus meets all the requirements of the Canadian Interference-Causing
Equipment Regulations.
Warning per EN 55032 (CISPR 32)
This equipment is compliant with Class A of CISPR 32. In a residential
environment, this equipment may cause radio interference.
Warning
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the unit’s use,
customers should provide for its collection for reuse, recycling, or other form
of environmentally conscientious disposal.
Sécurité et élimination (français)
Instructions générales de sécurité
Les instructions suivantes servent de guide général d'installation et d'opération sécurisées des produits
de télécommunications. Des instructions supplémentaires sont éventuellement indiquées dans le
manuel.
Cet équipement ne convient pas pour une utilisation dans des endroits où des enfants sont
susceptibles d’être présents.
Symboles de sécurité
Ce symbole indique des dangers potentiels pour la sécurité relatifs au
fonctionnement du produit ou la maintenance de l'équipement.
Ce symbole peut apparaitre sur l'équipement ou dans le texte. Il indique des
risques potentiels de sécurité pour l'opérateur ou le personnel de service,
quant à l’utilisation du produit ou à sa maintenance.
Avertissement
Danger de choc électrique ! Evitez tout contact avec la surface marquée tant
que le produit est sous tension ou connecté à des lignes externes de
télécommunications.
Surface chaude! Tout contact peux causer des brulures. Ne pas toucher.
Mise à la terre de protection : la cosse ou la borne marquée devrait être
connectée à la prise de terre de protection du bâtiment (à effectuer
uniquement par du personnel qualifié).
Sécurité et élimination (français)
13
Certains produits peuvent être équipés d'une diode laser. Dans de tels cas,
une étiquette indiquant la classe laser (ainsi que d'autres avertissements le
cas échéant) sera jointe près du transmetteur optique. Le symbole
d'avertissement laser peut aussi être joint.
Veuillez observer les précautions suivantes :
Avant la mise en marche de l'équipement, assurez-vous que le câble de
fibre optique est intact et qu'il est connecté au transmetteur.
• Ne tentez pas d'ajuster le courant de la commande laser.
• N'utilisez pas des câbles ou connecteurs de fibre optique cassés ou sans
terminaison et n'observez pas directement un rayon laser.
• L'usage de périphériques optiques avec l'équipement augmentera le
risque pour les yeux.
• L'usage de contrôles, ajustages ou procédures autres que celles
spécifiées ici pourrait résulter en une dangereuse exposition aux
radiations.
ATTENTION : Le rayon laser peut être invisible !
•
Certains produits peuvent être équipés d'une pile remplaçable. Il existe un
risque d'explosion si les piles sont manipulées ou remplacées de manière
incorrecte. Sur les systèmes dotés de piles remplaçables, remplacez celles-ci
uniquement par des piles de même marque et de même type ou un type
équivalent recommandé par le fabricant conformément aux instructions
fournies dans le manuel d'entretien du produit. Ne démontez pas les piles et
n'essayez pas de les recharger en dehors du système. Ne jetez pas les piles
au feu. Jetez les piles conformément aux instructions du fabricant et aux
réglementations locales.
Les utilisateurs pourront, dans certains cas, insérer leurs propres émetteurs-récepteurs Laser SFP dans le
produit. Les utilisateurs sont avertis que RAD ne pourra pas être tenue responsable de tout dommage
pouvant résulter de l'utilisation d'émetteurs-récepteurs non conformes. Plus particulièrement, les
utilisateurs sont avertis de n'utiliser que des produits approuvés par l'agence et conformes à la
réglementation locale de sécurité laser pour les produits laser de classe 1.
Respectez toujours les précautions standards de sécurité durant l'installation, l'opération et la
maintenance de ce produit. Seul le personnel de service qualifié, autorisé et compétent devrait
effectuer l'ajustage, la maintenance ou les réparations de ce produit. Aucune opération d'installation,
d'ajustage, de maintenance ou de réparation ne devrait être effectuée par l'opérateur ou l'utilisateur.
Sécurité et élimination (français)
14
Manipuler des produits sous tension
Règles générales de sécurité
Ne pas toucher ou altérer l'alimentation en courant lorsque le câble d'alimentation est branché. Des
tensions de lignes peuvent être présentes dans certains produits, même lorsque le commutateur (s'il est
installé) est en position OFF ou si le fusible est rompu. Pour les produits alimentés par CC, les niveaux de
tension ne sont généralement pas dangereux mais des risques de courant peuvent toujours exister.
Avant de travailler sur un équipement connecté aux lignes de tension ou de télécommunications, retirez
vos bijoux ou tout autre objet métallique pouvant venir en contact avec les pièces sous tension.
Sauf s'il en est autrement indiqué, tous les produits sont destinés à être mis à la terre durant l'usage
normal. La mise à la terre est fournie par la connexion de la fiche principale à une prise murale équipée
d'une borne protectrice de mise à la terre. Si une cosse de mise à la terre est fournie avec le produit, elle
devrait être connectée à tout moment à une mise à la terre de protection par un conducteur de
diamètre 18 AWG ou plus. L'équipement monté en châssis ne devrait être monté que sur des châssis et
dans des armoires mises à la terre. Ces procédures doivent être effectuées uniquement par du
personnel qualifié.
Branchez toujours la mise à la terre en premier et débranchez-la en dernier. Ne branchez pas des câbles
de télécommunications à un équipement qui n'est pas mis à la terre. Assurez-vous que tous les autres
câbles sont débranchés avant de déconnecter la mise à la terre.
Certains produits peuvent avoir des panneaux sécurisés par des vis papillons avec une tête fendue. Ces
panneaux peuvent couvrir des circuits ou des composants dangereux, tels que les alimentations
électriques. Ces vis papillons devront par conséquent être solidement serrées avec un tournevis après
chaque installation initiale et chaque accès ultérieur aux panneaux.
Avertissement
Avant de brancher ou de débrancher le connecteur secteur AC ou DC de
l'appareil, l'utilisateur doit vérifier que l'interrupteur d'alimentation du
panneau de commande soit bien sur OFF.
L'interrupteur d'alimentation ne peut être activé qu'après que le connecteur
secteur AC ou DC soit connecté à l'appareil.
Connexion au courant du secteur
Assurez-vous que l'installation électrique est conforme à la réglementation locale.
Sécurité et élimination (français)
15
Branchez toujours la fiche de secteur à une prise murale équipée d'une borne protectrice de mise à la
terre.
La capacité maximale permissible en courant du circuit de distribution de la connexion alimentant le
produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du bâtiment
devrait avoir une capacité élevée de rupture et devrait fonctionner sur courant de court-circuit
dépassant 35A (40A aux Etats-Unis et Canada).
Branchez toujours le câble d'alimentation en premier à l'équipement puis à la prise murale. Si un
commutateur est fourni avec l'équipement, fixez-le en position OFF. Si le câble d'alimentation ne peut
pas être facilement débranché en cas d'urgence, assurez-vous qu'un coupe-circuit ou un disjoncteur
d'urgence facilement accessible est installé dans le bâtiment.
Le disjoncteur devrait déconnecter simultanément les deux pôles si le système de distribution de
courant est de type IT.
Note
Le cordon d'alimentation du Danemark n'est pas fourni avec l'équipement et
doit être conforme à la CEI et au code électrique local.
Connexion d'alimentation CC
Sauf s'il en est autrement spécifié dans le manuel, l'entrée CC de l'équipement est flottante par rapport
à la mise à la terre. Tout pôle doit être mis à la terre en externe.
A cause de la capacité de courant des systèmes à alimentation CC, des précautions devraient être prises
lors de la connexion de l'alimentation CC pour éviter des courts-circuits et des risques d'incendie.
Assurez-vous que l'alimentation CC est isolée de toute source de courant CA (secteur) et que
l'installation est conforme à la réglementation locale.
La capacité maximale permissible en courant du circuit de distribution de la connexion alimentant le
produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du bâtiment
devrait avoir une capacité élevée de rupture et devrait fonctionner sur courant de court-circuit
dépassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des câbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas
sous tension. Localisez le coupe-circuit dans le tableau desservant l'équipement et fixez-le en position
OFF. Lors de la connexion de câbles d'alimentation CC, connectez d'abord le conducteur de mise à la
terre à la borne correspondante, puis le pôle positif et en dernier, le pôle négatif. Remettez le coupecircuit en position ON.
Un disjoncteur facilement accessible, adapté et approuvé devrait être intégré à l'installation du
bâtiment.
Sécurité et élimination (français)
16
Le disjoncteur devrait déconnecter simultanément les deux pôles si l'alimentation en courant CC est
flottante.
Connexion de câbles de données et de télécommunications
Les interfaces de données et de télécommunications sont classées selon leur niveau de sécurité.
Le tableau suivant liste les statuts de plusieurs interfaces standards. Si le statut d’un port donné diffère
d’un standard, une notification sera fournie dans le manuel.
Ports
Niveau de sécurité
V.11, V.28, V.35, V.36, RS-530, X.21,
10BASE-T, 100BASE-T, 1000BASE-T,
asymétrique E1, E2, E3, STM, DS-2, DS3, S-Interface ISDN (RNIS), Voix
analogique E&M
ES1
Source d'énergie électrique de classe 1
Ports qui ne présentent pas un danger pour la sécurité.
Généralement jusqu’à 30 VAC (courant alternatif) ou 60 VDC
(courant continu).
xDSL (sans tension d’alimentation),
symétrique E1, T1, Sub E1/T1, POE
Tension d'entrée DC jusqu'à 60 VDC
FXS, FXO
ES2
Source d'énergie électrique de classe 2
ES3
Source d'énergie électrique de classe 3
Tension d'entrée DC jusqu'à 72 VDC
Source d'énergie CA déclarée
Toujours connecter un port donné à un port de même niveau de sécurité. En cas de doute, solliciter
l’assistance d’un ingénieur de sécurité qualifié.
Toujours s’assurer que l’équipement est relié à la terre avant de connecter des câbles de
télécommunications. Ne pas déconnecter la connexion à la terre avant la déconnexion de tous les câbles
de télécommunications.
Certains circuits SELV et non-SELV utilisent les memes connecteurs. Soyez prudents lors de la connexion
des câbles. Une extrême prudence est requise en cas d’orages.
En cas d’utilisation de cables blindés ou coaxiaux, vérifier qu’il y a bien une connexion à la terre aux deux
extrémités. Le raccordement à la terre et la liaison à la prise de terre doivent être conformes à la
réglementation locale.
Il se peut que le câblage de télécommunications dans le bâtiment soit endommagé ou présente un
danger d’incendie en cas de contact entre des câbles externes dénudés et les lignes électriques AC
(courant alternatif). Afin de réduire le risque, il y a une limitation du diamètre des fils dans les câbles de
télécommunications, entre l’équipement et les connecteurs homologues.
Sécurité et élimination (français)
17
Pour réduire les risques d’incendie, utiliser seulement des cordons de
télécommunications 26 AWG ou de section supérieure.
Avertissement
Certains ports sont uniquement adaptés à une connexion à un câblage interne ou à un câblage non
exposé. Dans ce cas, une notification sera fournie dans les instructions d’installation.
Ne pas tenter de démonter l’équipement ou le matériel de connexion.
Compatibilité Electromagnétique (CEM)
L'équipement est conçu et approuvé pour se conformer aux réglementations électromagnétiques des
principaux organismes de réglementation. Les instructions suivantes peuvent améliorer les
performances de l'équipement et fournir une meilleure protection contre les émissions excessives et
une meilleure immunité contre les perturbations.
Une bonne connexion à la terre est essentielle. Lors de l'installation de l'équipement dans un rack,
veillez à éliminer toute trace de peinture des points de montage. Utilisez des rondelles de blocage et un
couple appropriés. Si une cosse de mise à la terre externe est fournie, connectez-la au bus de terre à
l'aide d'un fil tressé aussi court que possible.
L’équipement est conçu pour répondre aux exigences CEM lors de la connexion avec des câbles à paires
torsadées non blindées (UTP), à l’exception des ports 1000BaseT, qui doivent toujours utiliser des câbles
à paires torsadées blindés de bonne qualité (CAT 5E ou supérieure). Cependant, l'utilisation de câbles
blindés est toujours recommandée, en particulier pour les données à haut débit. Dans certains cas,
lorsque des câbles non blindés sont utilisés, des noyaux en ferrite doivent être installés sur certains
câbles. Dans ce cas, des instructions spéciales sont fournies dans le manuel.
Débranchez tous les câbles qui ne sont pas utilisés de manière permanente, tels que les câbles utilisés
pour une configuration unique.
La conformité de l'équipement à la réglementation en matière d'émission conduite sur les lignes de
données dépend de la qualité du câble. L'émission est testée pour des câbles UTP avec un
affaiblissement de conversion longitudinale (LCL) de 80 dB.
Sauf indication contraire ou décrite dans le manuel, les sources d'énergie électrique ES1 et ES2 offrent
protection contre les surtensions sur les lignes de données. Des protections primaires doivent être
fournies dans l’installation du bâtiment.
Sécurité et élimination (français)
18
L'équipement est conçu pour fournir une protection adéquate contre les décharges électrostatiques
(DES). Toutefois, il est recommandé de faire preuve de prudence lors du raccordement de câbles munis
de connecteurs en plastique (sans capot métallique mis à la terre, tels que des câbles plats) sur des
lignes de données sensibles. Avant de connecter ces câbles, déchargez-vous en touchant le sol ou portez
un bracelet antistatique.
FCC-15 Information Utilisateur
Cet équipement a été testé et déclaré conforme aux limites d’un appareil numérique de classe A,
définies à la section 15 du règlement de la FCC. Ces limites sont conçues pour fournir une protection
raisonnable contre les interférences nuisibles lorsque l'équipement est utilisé dans un environnement
commercial. Cet équipement génère, utilise et peut émettre de l'énergie de fréquence radio, s'il n'est
pas installé et utilisé conformément au Manuel d'Installation et d'Utilisation, il peut provoquer des
interférences nuisibles aux communications radio. L'utilisation de cet équipement dans une zone
résidentielle est susceptible de provoquer des interférences nuisibles, dans ce cas, l'utilisateur sera tenu
de corriger les interférences à ses frais.
Exigences d’émissions canadiennes
Cet appareil numérique de Classe A répond a toutes les exigences de la réglementation canadienne sur
les équipements causant des interférences.
Avertissement: EN 55032 (CISPR 32)
Cet appareil est conforme a la Classe A de la CISPR 32. Dans un
environnement résidentiel, il peut provoquer des interférences radio.
Avertissement
Sécurité et élimination (français)
19
Élimination du produit
Afin de faciliter la réutilisation, le recyclage ainsi que d'autres formes de
récupération d'équipement mis au rebut dans le cadre de la protection de
l'environnement, il est demandé au propriétaire de ce produit RAD de ne pas
mettre ce dernier au rebut en tant que déchet municipal non trié, une fois
que le produit est arrivé en fin de cycle de vie. Le client devrait proposer des
solutions de réutilisation, de recyclage ou toute autre forme de mise au
rebut de cette unité dans un esprit de protection de l'environnement,
lorsqu'il aura fini de l'utiliser.
Sicherheit und Entsorgung (Deutsch)
20
Sicherheit und Entsorgung (Deutsch)
Allgemeine Sicherheitsanleitung
Die folgenden Anleitungen dienen als allgemeiner Leitfaden für die sichere Installation und Bedienung
von Telekommunikationsprodukten. Zusätzliche Anleitungen sind im Nutzerhandbuch vorhanden.
Dieses Gerät ist nicht für die Verwendung an Orten geeignet, an denen sich Kinder aufhalten können.
Sicherheitssymbole
Dieses Symbol kann auf ihren Geraeten oder im Text auftauchen. Es weist
den Nutzer oder das Servicepersonal auf möglche Gefahren bei der
Bedienung der Geräte hin.
Achtung
Gefahr eines elektrischen Schlages! Vermeiden Sie jeglichen Kontakt mit der
gekennzeichneten Oberfläche während das Gerät unter Spannung steht
oder an auβenliegende Telekommunikationsleitungen angeschlossen ist.
Schutzerdung: Die gekennzeichnete Mutter oder das Terminal müssen an
den Anschluss der Haupterdung des Gebäudes angeschlossen sein.
Sicherheit und Entsorgung (Deutsch)
21
Einige Produkte können mit einer Laserdiode ausgestattet sein. In solchen
Fällen muβ ein Aufkleber mit der Laserklasse und entsprechenden
Warnungen neben dem optischen Transmitter angebracht sein. Das
Warnsymbol für Laser kann zusätzlich angebracht sein.
Bitte beachten Se die folgenden Vorsichtsmaβnahmen:
Vor der Inbetriebnahme des Gerätes, vergewissern Sie sich, daβ das
optische Glasfaserkabel unbeschädigt ist und an den Transmitter
angeschlossen ist.
• Versuchen Sie nicht, den durch den Laser fliessenden Strom zu
regulieren.
• Verwenden Sie keine gebrochenen oder anderweitig unvollständige
Glasfaserkabel oder Stecker. Blicken Sie nicht in den Laserstrahl.
• Die Benutzung optischer Komponenten zusammen mit Ihrem Gerät
erhöhen die Gefahr für Ihre Augen.
• Die Benutzung von Bedienelementen, die Geräteeinstellung oder die
Ausführung von Prozessen, die hier nicht aufgeführt sind, können zu
gefährlicher Strahlung führen.
ACHTUNG: Der Laserstrahl kann unsichtbar sein!
•
In einigen Fällen werden Nutzer eigene SFP-Lasertransceiver in das Gerät einführen. Nutzer sind darauf
hingewiesen, dass RAD nicht verantwortlich zeichnet für Beschädigungen, die von nicht kompatiblen
Transceivern herrühren. Nutzer seien ferner darauf hingewiesen, daβ ausschlieβlich amtlich zugelassene
Produkte eingesetzt werden sollten, die den ortsüblichen Sicherheitsbestimmungen für Lasergeräte der
Laserklasse 1 entsprechen.
Beachten Sie ferner die üblichen Sicherheitsmaβnahmen während der Installation, des Betriebs, der
Wartung oder der Reparatur des Gerätes. Installationen, Einstellungen und Reparaturen sollten weder
vom Nutzer oder dem zuständigen Operator durchgeführt werden.
Umgang mit Geräten unter Spannung
Grundlegende Sicherheitsmaβnahmen
Berühren oder verändern Sie das Netzteil nicht wenn das Stromkabel angeschlossen ist. Einige Bauteile
im Gerät können auch dann unter Spannung stehen, wenn der Ein/Aus-Schalter auf Aus steht (sofern
vorhanden) oder eine Sicherung defekt ist. Für Produkte, die unter Gleichstromspannung (DC) stehen,
besteht ebenfalls die Gefahr eines elektrischen Schlages, auch wenn die angelegte Spannung in der
Regel nicht gefährlich ist.
Sicherheit und Entsorgung (Deutsch)
22
Legen Sie Schmuck oder sonstige Metallobjekte ab, bevor Sie mit Geräten arbeiten, die an das Netz oder
Telekommunikationsleitungen angeschlossen sind, um zu verhindern, daβ dies mit spannungsgeladenen
Bauteilen in Berührung kommen.
Falls nicht anders angegeben, sollten alle Produkte bei normalem Gebrauch geerdet werden. Die Erdung
erfolgt durch den Anschlss an eine Steckdose mit Schutzerdung. Wenn das Gerät mit einer
Erdungslasche ausgestattet ist, sollte diese immer an die Schutzerde angeschlossen sein mit einem
Kabel, das einen Durchmesser von mindestens 18 AWG aufweist. Geräte für die Rack-Montage sollten
ausschlieβlich in geerdeten Racks oder Schränken montiert werden.
Schlieβen Sie grundsätzlich zuerst die Schutzerde an und klemmen Sie diese zuletzt ab. Schlieβen Sie
keine Telekommunikationskabel an nicht geerdete Geräte an. Stellen Sie sicher, dass alle anderen Kabel
abgeklemmt sind, bevor Sie die Erdung abklemmen.
Die Frontpanele einiger Geräte sind mit Flügelschrauben mit Schlitz gesichert. Diese Paneele decken
gefährliche Schalkreise oder Teile, wie zum Beispiel Netzteile ab. Diese Flügelschrauben sollten daher
immer mittels eines Schraubenziehers sicher angezogen werden nach der Erstinstallation und jedem
späterem Zugriff auf die Paneele.
Vor dem Anschließen oder Trennen des AC- oder DC-Netzsteckers an das/vom
Gerät, sollte der Benutzer sicherstellen, dass der Netzschalter im Bedienfeld auf OFF
gestellt ist.
Achtung
Der Netzschalter kann erst aktiviert werden, nachdem der AC- oder DC-Netzstecker
mit dem Gerät verbunden ist.
Anschluss an eine Wechselstromquelle (AC)
Stellen Sie sicher, daβ die elektrische Installation den örtlichen Bestimmungen entspricht.
Stecken Sie den Stecker immer in eine Steckdose mit Schutzerdung ein.
Der maximal mögliche Stromfluss im Bereich des Verteilerstromkreis, der die Stromversorgung des
Gerätes sicherstellt, ist 16 A (20A in den USA und in Kanada). Der Schutzschalter in der
Gebäudeinstallation muss starke Ströme unterbrechen können und muss den Stromfluss bei 35A (40A in
den USA und Kanada) unterbrechen.
Schlieβen Sie das Netzkabel zuerst an das Gerät und dann an die Steckdose an. Falls ein Ein/Aus-Schalter
zur Verfügung steht, schalten Sie diesen auf AUS (OFF). Falls das Netzkabel im Notfall nicht schnell
herausgezogen werden kann, stellen Sie sicher, daβ ein Schutzschalter oder Notschalter Bestandteil der
elektrischen Installation des Gebäudes ist.
Falls die Stromversorgung über einen IT Netz-Verteiler erfolgt, muss der Schalter die Stromversorgung
zu beiden Polen gleichzeitig unterbrechen.
Sicherheit und Entsorgung (Deutsch)
23
Anschluss an eine Gleichstromquelle (DC)
Falls im Benutzerhandbuch (Manual) nicht anderweitig beschrieben, schwankt die Gleichstromzufuhr
relativ zur Erdung. Jeder einzelne Pol kann von aussen geerdet werden.
Aufgrund der Fähigkeit, hohe Stromflüsse zu verarbeiten, muss sorgfältig vorgegangen werden beim
Anschluss der Gleichstromquelle, um Kurzschlüsse und Brände zu vermeiden.
Stellen Sie sicher, daβ Gleichstromquellen (DC) von Wechselstromquellen (AC) isoliert sind und daβ die
Installation den örtlichen Richtlinien entspricht.
Der maximal mögliche Stromfluss im Bereich des Verteilerstromkreis, der die Stromversorgung des
Gerätes sicherstellt, ist 16 A (20A in den USA und in Kanada). Der Schutzschalter in der
Gebäudeinstallation muss starke Ströme unterbrechen können und muss den Stromfluss bei 35A (40A in
den USA und Kanada) unterbrechen.
Vor dem Anschluss der Gleichstrom-Speisekabel ist sicher zu stellen, daβ kein Strom über den
Gleichstromkreis flieβt. Finden Sie den Schutzschalter an der Schalttafel, die das Gerät bedient, und
schalten Sie ihn auf AUS (OFF). Wenn Sie die Gleichstrohmdrähte anschlieβen, schliessen Sie zuerst den
Erdungsdraht an das zugehörige Terminal an, dann den Pluspol und zuletzt den Minuspol. Schalten Sie
den Schutzschalter zurück auf AN (ON).
Ein verfügbares nicht angeschlossenes Gerät, das ordnungsgemäβ genehmigt und abgenommen wurde,
sollte in die bestehende Installation eingebaut werden.
Falls die Gleichstromspannung schwankt, muss der Schalter beide Pole gleichzeitig trennen.
Anschluss von Daten- und Telekommunikationskabeln
Daten- und Telekommunikationsschnittstellen sind gemäβ ihrem Sicherheitsstatus klassifiziert.
Verschiedene Standardschnittstellen sind zusammen mit ihrem jeweiligen Sicherheitsstatus in der
folgenden Tabelle aufgeführt. Auf eventuelle Abweichungen vom Standardsicherheitsstatus wird im
Benutzerhandbuch (Manual) gesondert hingewiesen.
Sicherheit und Entsorgung (Deutsch)
Schnittstellen
Sicherheitsstatus
V.11, V.28, V.35, V.36, RS-530, X.21,
10BASE-T, 100BASE-T, 1000BASE-T,
Unsymmetrisches E1, E2, E3, STM, DS-2,
DS-3, S-Schnittstelle ISDN,
Analogsprache E&M
ES1
24
Elektrische Energiequelle Klasse 1
Anschlüsse, die kein Sicherheitsrisiko darstellen,
normalerweise bis zu 30 VAC oder 60 VDC.
xDSL (ohne einspeisende Spannung),
symmetrisches E1, T1, Sub-E1/T1, POE
Eingangs-Gleichspannung bis zu 60 VDC
FXS, FXO
ES2
Elektrische Energiequelle Klasse 2
ES3
Elektrische Energiequelle Klasse 3
Eingangs-Gleichspannung bis zu 72 VDC
AC-Spannungsquelle deklariert
Verbinden Sie Anschlüsse, die denselben Sicherstatus aufweisen. Wenn Sie nicht sicher sind, wenden Sie
sich bitte an einen qualifizierten Sicherheitsingenieur.
Vergewissern Sie sich immer, daβ das Gerät geerdet ist bevor Sie Telekommunikationskabel
anschlieβen. Klemmen Sie die Erdung nie ab, bevor Sie Telekommunikationskabel abklemmen.
Einige SELV und Nicht-SELV-Stromkreise nutzen dieselben Stecker. Seien Sie vorsichtig, wenn Sie Kabel
anschlieβen. Seien Sie besonders vorsichtig während einem Gewitter.
Wenn Sie abgeschirmte -, oder Koaxialkabel nutzen, stellen Sie sicher, daβ diese an beiden Enden eine
gute Erdung aufweisen.
Wenn auβenliegende Kabel und Wechselstromleitungen (AC) in Kontakt kommen, kann die Verkabelung
innerhalb des Gebäudes beschädigt werden oder einen Brand auslösen. Um dieses Risiko zu verringern,
gibt es Bestimmungen zum Durchmesser von Telekommunikationskabeln zwischen den Geräten und
den Anschlüssen.
Um das Brandrisiko zu reduzieren, setzen Sie ausschließlich 26 AWG oder
dickere Telekommunikationskabel ein.
Achtung
Einige Anschlüsse eignen sich lediglich für Verbindungen zu gebäude-internen oder nicht
außenliegenden Verkabelungen. Auf solche Fälle wird in der Installationsanleitung gesondert
hingewiesen.
Versuchen Sie nicht, die vom Carrier erhaltene Ausrüstung oder Verbindungselemente zu manipulieren.
Sicherheit und Entsorgung (Deutsch)
25
Elektromagnetische Kompatibilität (EMC)
Die Ausrüstung ist ausgelegt und anerkannt für die Erfüllung elektromagnetischer Bestimmungen der
Regulierungsbehörden. Die nachfolgenden Anleitungen sind darauf ausgerichtet, die Leistungsfähigkeit
der Ausrüstung zu erhöhen und besseren Schutz gegen extreme Emissionen und besseren Schutz gegen
Störungen zu gewährleisten.
Eine gute Erdung ist wesentlich. Wenn die Ausrüstung in einem Rack montiert wird, stellen Sie sicher,
daβ jegliche Farbspuren von den Befestigungspunkten entfernt sind. Benutzen Sie geeignete
Sicherungsscheiben und das richtige Drehmoment. Falls eine externe Erdungsmutter zur Verfügung
steht, schließen Sie diese an den Erdbus an mittels kürzestmöglichem verdrillten Draht.
Die Ausrüstung ist ausgelegt, um den Anforderungen der EMC zu entsprechen, wenn man sie mit nicht
abgeschirmten und verdrillten (UTP) Kabeln anschließt mit Ausnahme von 1000BaseT-Anschlüssen, die
grundsätzlich mit abgeschirmten verdrillten Kabeln hoher Qualität (CAT 5E oder besser) erfordern. Im
Allgemeinen ist die Verwendung von abgeschirmten Kabeln immer empfohlen, besonders für schnellen
Datendurchsatz. Beim Einsatz nicht abgeschirmter Kabel wird in manchen Fällen empfohlen, einen
Ferritkern an bestimmten Kabeln anzubringen. In diesen Fällen werden im Benutzerhandbuch
gesonderte Anleitungen bereitgestellt.
Klemmen Sie alle Kabel ab, die nicht permanent in Gebrauch sind, wie zum Beispiel solche, die fuer eine
einmalige Konfiguration eingesetzt wurden.
Die Einhaltung der Regeln für elektromagnetische Leitungsemissionen an den Datenleitungen hängt von
der Kabelqualität ab. Die Emission wurde für UDP mit 80 db Längsumwandlungsdämpfung (LCL)
getestet.
Falls im Benutzerhandbuch nicht anders spezifiziert oder beschrieben, Elektrische Energiequelles ES1
und ES2 Anschlüsse lediglich Schutz gegen Überspannungen in den Datenleitungen. Primäre Protektoren
müssen innerhalb der Gebäudeinstallation bereitgestellt werden.
Die Ausrüstung ist ausgelegt, ausreichenden Schutz gegen elektrostatische Entladung (ESD) zu bieten. Es
ist jedoch empfehlenswert, vorsichtig zu agieren, wenn Kabel mit Plastikanschlüssen (ohne geerdete
Metallhalterung wie bei flachen Kabeln) und empfindliche Datenleitungen angeschlossen werden. Vor
dem Anschliessen solcher Kabel, entladen Sie sich selbst durch Berührung des Bodens oder durch das
Tragen eines ESD-präventiven Bandes um das Handgelenk.
FCC-15 Informationen für Nutzer
Diese Ausrüstung wurde getestet und bewegt sich innerhalb der Grenzwerte für Class A-Digitalgeräte
gemäß Artikel 15 der FCC-Regeln. Diese Grenzwerte wurden festgelegt, um angemessenen Schutz gegen
schädliche Einflüsse sicherzustellen wenn die Geräte in einer kommerziellen Umgebung betrieben
Sicherheit und Entsorgung (Deutsch)
26
werden. Diese Geräte produzieren, konsumieren und strahlen möglicherweise Energie im
Radiofrequenzbereich ab, die schädliche Auswirkungen auf den Funkverkehr haben kann, falls sie nicht
gemäß dem Benutzerhandbuch (Installation and Operation Manual) installiert wurden. Es ist
wahrscheinlich, daβ der Betrieb dieser Geräte in einem Wohngebiet zu Störungen führt, die der
Betreiber auf eigene Kosten zu beseitigen hat.
Kanadische Emissionsbestimmungen
Dieses digitale Gerät der Klasse A erfüllt alle Vorgaben der Kanadischen Regulierungen für Geräte, die
Störeffekte haben können (Canadian Interference-Causing Equipment Regulation).
EN 55032 (CISPR 32) Warnung
Das vorliegende Gerät fällt unter die Funkstörgrenzwertklasse A. In
Wohngebieten können beim Betrieb dieses Gerätes Rundfunkströrungen
auftreten, für deren Behebung der Benutzer verantwortlich ist.
Achtung
Entsorgung des Produktes
Um die Wiedernutzung, die Wiederverwertung oder andere Formen der
Wiederaufbereitung von stillgelegten Geräten zum Schutz der Umwelt zu
gewährleisten, ist der Besitzer des RAD-Produktes verpflichtet, die
Entsorgung als unsortierter Abfall am Ende des Lebenszyclus des Produktes
zu unterlassen. Wenn das Gerät ausser Betrieb genommen wird, hat der
Kunde dieses Gerät einer umweltverträglichen Wiederverwendung,
Wiederverwertung oder Entsorgung zuzuführen.
EU Declaration of Conformity
EU Declaration of Conformity
SecFlow-1p Declaration of Conformity
27
Environmental Compliance Statement
Environmental Compliance Statement
Environmental Compliance Statement
28
Contents
1
Introduction ..............................................................................................................................42
1.1 Overview......................................................................................................................................... 42
Product Options ............................................................................................................................. 42
Features ......................................................................................................................................... 43
1.3 New in this Version......................................................................................................................... 46
1.5 Technical Specifications.................................................................................................................. 48
Hardware Specifications ................................................................................................................ 48
Software Specifications.................................................................................................................. 56
2
Installation and Setup ................................................................................................................62
2.5 Safety .............................................................................................................................................. 62
Laser Safety .................................................................................................................................... 63
Grounding ...................................................................................................................................... 64
2.6 Site Requirements and Prerequisites ............................................................................................. 64
Power ............................................................................................................................................. 65
Ambient Requirements .................................................................................................................. 65
2.7 Package Contents ........................................................................................................................... 65
2.8 Physical Installation ........................................................................................................................ 66
Required Equipment ...................................................................................................................... 66
Wall Mounting ............................................................................................................................... 66
Installing Antennas ........................................................................................................................ 68
Installing a SIM Card ...................................................................................................................... 70
Installing an SFP ............................................................................................................................. 71
Installing a Memory Card ............................................................................................................... 73
Connecting to a Management Console.......................................................................................... 73
Connecting to Power ..................................................................................................................... 74
Connecting to Ethernet Equipment ............................................................................................... 79
Connecting to Serial Equipment .................................................................................................... 80
Connecting to a Dry Contacts Terminal ......................................................................................... 80
Installing the GNSS Antenna .......................................................................................................... 83
2.15 Basic Connectivity Tests ............................................................................................................... 85
3
Operation and Maintenance ...................................................................................................... 86
3.1 Turning On the Unit ........................................................................................................................ 86
SecFlow-1p
Contents
30
3.2 Indicators ........................................................................................................................................ 86
3.3 FD Button........................................................................................................................................ 89
3.5 Startup ............................................................................................................................................ 90
Applicability and Scaling ................................................................................................................ 90
Configuration and Software Files................................................................................................... 90
Loading Sequence .......................................................................................................................... 91
3.6 Working with Custom Configuration Files ...................................................................................... 92
Applicability and Scaling ................................................................................................................ 93
Factory Defaults ............................................................................................................................. 93
Saving Configuration Changes ....................................................................................................... 93
Confirming the Startup Configuration File..................................................................................... 94
On-Net Zero Touch ........................................................................................................................ 95
Off-Net Zero Touch ........................................................................................................................ 99
3.7 Configuration and Management .................................................................................................. 103
3.8 CLI-Based Configuration ............................................................................................................... 104
Working with SSH......................................................................................................................... 104
Login ............................................................................................................................................. 105
Using the CLI ................................................................................................................................ 107
Using Scripts ................................................................................................................................. 126
Examples ...................................................................................................................................... 126
3.9 Web-based Configuration ............................................................................................................ 127
Logging In ..................................................................................................................................... 127
Navigating the Web Interface ...................................................................................................... 128
Graphical Controls ....................................................................................................................... 131
Dynamic Tables ............................................................................................................................ 131
Containers (LXD) .......................................................................................................................... 133
Firewall ......................................................................................................................................... 133
3.10 SNMP-Based Network Management ......................................................................................... 134
Configuring SecFlow-1p for SNMP Management Access............................................................. 134
Working with RADview ................................................................................................................ 134
3.11 NETCONF-Based Network Management .................................................................................... 135
3.12 Turning Off the Unit ................................................................................................................... 135
4
Ports........................................................................................................................................ 136
4.2 Cellular Ports ................................................................................................................................ 137
Applicability and Scaling .............................................................................................................. 137
Standards Compliance ................................................................................................................. 137
Functional Description ................................................................................................................. 137
SecFlow-1p
Contents
31
Factory Defaults ........................................................................................................................... 145
Configuring a Cellular Port ........................................................................................................... 146
Viewing Cellular Port Status......................................................................................................... 152
Viewing Cellular Port Status using Swagger................................................................................. 157
4.3 Ethernet Ports .............................................................................................................................. 160
Applicability and Scaling .............................................................................................................. 161
Functional Description ................................................................................................................. 161
Factory Defaults ........................................................................................................................... 162
Configuring Ethernet Port Parameters ........................................................................................ 162
Configuration Errors..................................................................................................................... 165
Viewing Ethernet Port Status ....................................................................................................... 165
Viewing Ethernet Port Statistics .................................................................................................. 167
4.4 Flash (SD Card) Ports .................................................................................................................... 169
Factory Default............................................................................................................................. 169
Configuring Flash Ports ................................................................................................................ 169
Viewing Flash Status .................................................................................................................... 170
4.5 PPP Ports ...................................................................................................................................... 170
Standards Compliance ................................................................................................................. 170
Functional Description ................................................................................................................. 171
Factory Defaults ........................................................................................................................... 174
Configuring Ports ......................................................................................................................... 174
Configuration Errors..................................................................................................................... 176
Viewing Port Status ...................................................................................................................... 177
4.6 Serial Ports .................................................................................................................................... 177
Applicability and Scaling .............................................................................................................. 178
Standards ..................................................................................................................................... 178
Functional Description ................................................................................................................. 178
Factory Defaults ........................................................................................................................... 181
Configuring Serial Port Parameters ............................................................................................. 182
Configuring the Terminal Server .................................................................................................. 183
Configuring the Tunnel ................................................................................................................ 185
Viewing Status Information ......................................................................................................... 186
Configuration Errors..................................................................................................................... 187
4.7 Virtual Ports .................................................................................................................................. 188
Applicability and Scaling .............................................................................................................. 188
Benefits ........................................................................................................................................ 189
Factory Defaults ........................................................................................................................... 189
Configuring Virtual Ports.............................................................................................................. 189
Viewing Virtual Port Status .......................................................................................................... 190
Viewing Virtual Port Statistics ...................................................................................................... 190
SecFlow-1p
Contents
32
4.8 VLAN Ports .................................................................................................................................... 191
Applicability and Scaling .............................................................................................................. 191
Functional Description ................................................................................................................. 191
Factory Defaults ........................................................................................................................... 192
Configuring VLAN Port Parameters.............................................................................................. 192
Configuration Errors..................................................................................................................... 194
Viewing VLAN Port Status ............................................................................................................ 194
Viewing VLAN Port Statistics ........................................................................................................ 195
4.9 WiFi ............................................................................................................................................... 196
Applicability and Scaling .............................................................................................................. 197
Standards Compliance ................................................................................................................. 197
Functional Description ................................................................................................................. 197
Factory Defaults ........................................................................................................................... 198
Configuring WLAN Port Parameters ............................................................................................ 199
Examples ...................................................................................................................................... 202
Testing WiFi.................................................................................................................................. 203
5
Management and Security ....................................................................................................... 204
5.1 Access Control List (ACL) .............................................................................................................. 204
Applicability and Scaling .............................................................................................................. 205
Standards Compliance ................................................................................................................. 205
Benefits ........................................................................................................................................ 205
Functional Description ................................................................................................................. 205
Factory Defaults ........................................................................................................................... 207
Configuring ACL ............................................................................................................................ 207
Examples ...................................................................................................................................... 210
Configuration Errors..................................................................................................................... 211
Viewing ACL Status....................................................................................................................... 211
Viewing ACL Statistics .................................................................................................................. 212
5.2 Authentication via RADIUS Server ................................................................................................ 212
Applicability and Scaling .............................................................................................................. 213
Standards Compliance ................................................................................................................. 213
Benefits ........................................................................................................................................ 213
Functional Description ................................................................................................................. 213
Factory Defaults ........................................................................................................................... 214
Configuring RADIUS Server Parameters....................................................................................... 215
Viewing RADIUS Statistics ............................................................................................................ 216
5.3 Authentication via TACACS+ Server ............................................................................................. 217
Applicability and Scaling .............................................................................................................. 217
SecFlow-1p
Contents
33
Standards Compliance ................................................................................................................. 217
Benefits ........................................................................................................................................ 218
Functional Description ................................................................................................................. 218
Factory Defaults ........................................................................................................................... 220
Configuring TACACS+ Entities ...................................................................................................... 220
Examples ...................................................................................................................................... 223
Configuration Errors..................................................................................................................... 224
Viewing TACACS+ Statistics .......................................................................................................... 224
5.4 DHCP Server.................................................................................................................................. 226
Applicability and Scaling .............................................................................................................. 226
Standards Compliance ................................................................................................................. 226
Benefits ........................................................................................................................................ 226
Functional Description ................................................................................................................. 227
Factory Defaults ........................................................................................................................... 230
Configuring DHCP Server ............................................................................................................. 231
Configuration Errors..................................................................................................................... 240
5.5 DHCPv6 Server .............................................................................................................................. 242
Applicability and Scaling .............................................................................................................. 242
Standards Compliance ................................................................................................................. 242
Benefits ........................................................................................................................................ 243
Functional Description ................................................................................................................. 243
Factory Defaults ........................................................................................................................... 245
Configuring DHCPv6 Server.......................................................................................................... 245
Configuration Errors..................................................................................................................... 249
5.6 Management Access Methods ..................................................................................................... 250
Applicability and Scaling .............................................................................................................. 251
Functional Description ................................................................................................................. 251
Factory Defaults ........................................................................................................................... 251
Configuring Management Access ................................................................................................ 252
5.7 Management Ports ....................................................................................................................... 252
Applicability and Scaling .............................................................................................................. 253
Factory Defaults ........................................................................................................................... 253
5.8 Management Source IP Address .................................................................................................. 254
Applicability and Scaling .............................................................................................................. 254
Functional Description ................................................................................................................. 255
Configuring the Management Protocols Source IP Address ........................................................ 255
5.9 NETCONF-Based Network Management ...................................................................................... 255
Applicability and Scaling .............................................................................................................. 256
Standards Compliance ................................................................................................................. 256
SecFlow-1p
Contents
34
Benefits ........................................................................................................................................ 256
Functional Description ................................................................................................................. 256
Factory Defaults ........................................................................................................................... 264
Configuring NETCONF Parameters............................................................................................... 265
Examples ...................................................................................................................................... 265
5.10 Public Key Infrastructure ............................................................................................................ 266
Applicability and Scaling .............................................................................................................. 266
Standards Compliance ................................................................................................................. 266
Functional Description ................................................................................................................. 266
Factory Defaults ........................................................................................................................... 267
Configuring X.509 Entities ............................................................................................................ 267
Configuration Errors..................................................................................................................... 270
Viewing Certificates Status .......................................................................................................... 272
5.11 SNMPv3 Management................................................................................................................ 273
Applicability and Scaling .............................................................................................................. 273
Standards Compliance ................................................................................................................. 273
Functional Description ................................................................................................................. 274
Factory Defaults ........................................................................................................................... 275
Configuring SNMPv3 Parameters ................................................................................................ 275
Examples ...................................................................................................................................... 283
5.12 User Access ................................................................................................................................. 288
Applicability and Scaling .............................................................................................................. 288
Factory Defaults ........................................................................................................................... 288
Functional Description ................................................................................................................. 288
Access Policy ................................................................................................................................ 291
Configuring Access Policy............................................................................................................. 292
Configuration Errors..................................................................................................................... 294
Configuring Users ......................................................................................................................... 295
Examples ...................................................................................................................................... 297
Viewing User Access Status ......................................................................................................... 299
5.13 Zone-based Stateful Firewall ...................................................................................................... 301
Functional Description ................................................................................................................. 302
Configuring the Firewall ............................................................................................................... 305
6
Traffic Processing ..................................................................................................................... 329
6.1 Bridge............................................................................................................................................ 329
Applicability and Scaling .............................................................................................................. 329
Standards Compliance ................................................................................................................. 329
Benefits ........................................................................................................................................ 329
SecFlow-1p
Contents
35
Functional Description ................................................................................................................. 330
Factory Defaults ........................................................................................................................... 334
Configuring the Bridge ................................................................................................................. 335
Examples ...................................................................................................................................... 338
Viewing Bridge Status .................................................................................................................. 341
Configuration Errors..................................................................................................................... 343
6.2 DNP3 Gateway.............................................................................................................................. 345
Configuring DNP3 Gateway ......................................................................................................... 345
6.3 GRE Tunneling .............................................................................................................................. 346
Applicability and Scaling .............................................................................................................. 346
Standards Compliance ................................................................................................................. 346
Functional Description ................................................................................................................. 347
Factory Defaults ........................................................................................................................... 348
Configuring Tunneling .................................................................................................................. 348
Configuration Errors..................................................................................................................... 351
Examples ...................................................................................................................................... 352
Viewing GRE Status ...................................................................................................................... 352
6.4 IPsec .............................................................................................................................................. 354
Applicability and Scaling .............................................................................................................. 356
Standards Compliance ................................................................................................................. 356
Benefits ........................................................................................................................................ 356
Functional Description ................................................................................................................. 356
Configuring IPsec.......................................................................................................................... 362
Configuration Errors..................................................................................................................... 369
6.5 Network Address Translator (NAT) .............................................................................................. 370
Applicability and Scaling .............................................................................................................. 370
Functional Description ................................................................................................................. 371
Configuring Network Address Translator (NAT) .......................................................................... 373
Viewing NAT Translation Table .................................................................................................... 375
Viewing NAT Statistics ................................................................................................................. 376
Configuration Errors..................................................................................................................... 377
6.6 Policy-Based Routing (PBR) .......................................................................................................... 379
Applicability and Scaling .............................................................................................................. 379
Benefits ........................................................................................................................................ 379
Functional Description ................................................................................................................. 379
Factory Defaults ........................................................................................................................... 380
Configuring PBR ........................................................................................................................... 380
Configuration Errors..................................................................................................................... 382
6.7 Quality of Service (QoS)................................................................................................................ 382
SecFlow-1p
Contents
36
Applicability and Scaling .............................................................................................................. 382
Benefits ........................................................................................................................................ 382
Functional Description ................................................................................................................. 383
Factory Defaults ........................................................................................................................... 383
Classifier ....................................................................................................................................... 383
Traffic-Class .................................................................................................................................. 388
Queuing........................................................................................................................................ 390
6.8 Router ........................................................................................................................................... 400
Applicability and Scaling .............................................................................................................. 400
Standards Compliance ................................................................................................................. 400
Benefits ........................................................................................................................................ 401
Functional Description ................................................................................................................. 401
Factory Defaults ........................................................................................................................... 403
Configuring the Router ................................................................................................................ 404
Viewing Router Information ........................................................................................................ 413
Viewing Router Statistics ............................................................................................................. 423
Configuration Errors..................................................................................................................... 424
6.9 Routing Protocol BGP ................................................................................................................... 426
Applicability and Scaling .............................................................................................................. 427
Standards Compliance ................................................................................................................. 427
Benefits ........................................................................................................................................ 427
Functional Description ................................................................................................................. 427
Factory Defaults ........................................................................................................................... 432
Configuring BGP ........................................................................................................................... 433
Example........................................................................................................................................ 448
Configuration Errors..................................................................................................................... 449
Viewing BGP Status ...................................................................................................................... 452
6.10 Routing Protocol OSPF................................................................................................................ 462
Applicability and Scaling .............................................................................................................. 462
Standards Compliance ................................................................................................................. 462
Benefits ........................................................................................................................................ 462
Functional Description ................................................................................................................. 463
Factory Defaults ........................................................................................................................... 466
Configuring OSPF ......................................................................................................................... 468
Example........................................................................................................................................ 475
Configuration Errors..................................................................................................................... 476
Viewing OSPF Status .................................................................................................................... 477
Viewing OSPF Statistics ................................................................................................................ 480
Testing OSPF ................................................................................................................................ 481
6.11 Tunneling .................................................................................................................................... 481
SecFlow-1p
Contents
37
Applicability and Scaling .............................................................................................................. 481
Standards Compliance ................................................................................................................. 481
Functional Description ................................................................................................................. 482
Factory Defaults ........................................................................................................................... 484
Configuring Tunnels ..................................................................................................................... 484
Examples ...................................................................................................................................... 487
Configuration Errors..................................................................................................................... 489
Viewing Tunnel Status.................................................................................................................. 490
6.12 Virtual Router Redundancy Protocol (VRRP) .............................................................................. 495
Standards Compliance and MIBs ................................................................................................. 495
Functional Description ................................................................................................................. 495
Factory Defaults ........................................................................................................................... 496
Configuring VRRP ......................................................................................................................... 496
Configuration Errors..................................................................................................................... 498
Viewing VRRP Status .................................................................................................................... 499
Viewing VRRP Summary............................................................................................................... 500
7
Containerization ...................................................................................................................... 502
7.1 Applicability and Scaling ............................................................................................................... 502
7.2 Functional Description.................................................................................................................. 502
Containers .................................................................................................................................... 503
Snapshots ..................................................................................................................................... 504
Images .......................................................................................................................................... 504
Profiles ......................................................................................................................................... 505
Network ....................................................................................................................................... 505
7.3 Factory Defaults............................................................................................................................ 505
7.4 Configuring LXD Containers .......................................................................................................... 506
CLI Configuration.......................................................................................................................... 506
Web Configuration....................................................................................................................... 506
7.5 Example: Suricata TAP Mode Container....................................................................................... 520
Creating Internal Bridges ............................................................................................................. 521
Creating a Container Based on Image.......................................................................................... 522
Checking Communication ............................................................................................................ 525
Establishing SSH Access ............................................................................................................... 525
Updating Suricata Rules ............................................................................................................... 526
Configuring Syslog........................................................................................................................ 526
Checking Syslog Connectivity ....................................................................................................... 526
7.6 Viewing Container Status ............................................................................................................. 527
SecFlow-1p
Contents
38
8
Timing and Synchronization ..................................................................................................... 529
8.1 GNSS location reporting ............................................................................................................... 529
Functional Description ................................................................................................................. 529
Factory Defaults ........................................................................................................................... 529
Configuring GNSS ......................................................................................................................... 530
Viewing GNSS Status .................................................................................................................... 530
Examples ...................................................................................................................................... 531
8.2 Date and Time .............................................................................................................................. 533
Applicability and Scaling .............................................................................................................. 533
Standards Compliance ................................................................................................................. 533
Benefits ........................................................................................................................................ 533
Functional Description ................................................................................................................. 533
Factory Defaults ........................................................................................................................... 534
Configuring Date and Time .......................................................................................................... 534
Examples ...................................................................................................................................... 536
Viewing Status.............................................................................................................................. 537
8.3 Daylight Saving Time .................................................................................................................... 538
Applicability and Scaling .............................................................................................................. 538
Functional Description ................................................................................................................. 538
Factory Defaults ........................................................................................................................... 539
Configuring Daylight Saving Time Scheduling .............................................................................. 539
Examples ...................................................................................................................................... 540
Configuration Errors..................................................................................................................... 540
Viewing Scheduled Daylight Saving Time .................................................................................... 541
9
Administration......................................................................................................................... 542
9.1 Product Information ..................................................................................................................... 542
Applicability and Scaling .............................................................................................................. 542
Standards Compliance ................................................................................................................. 542
Setting Parameters ...................................................................................................................... 542
Example........................................................................................................................................ 543
9.2 File Operations ............................................................................................................................. 546
Applicability and Scaling .............................................................................................................. 546
Functional Description ................................................................................................................. 546
Copying Files ................................................................................................................................ 548
Viewing Copy Status..................................................................................................................... 550
Viewing Information on Files ....................................................................................................... 550
Deleting Files ................................................................................................................................ 553
Examples ...................................................................................................................................... 553
SecFlow-1p
Contents
39
9.3 Resetting to Default...................................................................................................................... 557
Resetting to Factory Defaults ...................................................................................................... 557
Resetting to User Defaults ........................................................................................................... 559
Restarting SecFlow-1p ................................................................................................................. 559
9.4 Inventory ...................................................................................................................................... 559
Applicability and Scaling .............................................................................................................. 560
Standards Compliance ................................................................................................................. 560
Benefits ........................................................................................................................................ 560
Viewing Inventory Information .................................................................................................... 560
Examples ...................................................................................................................................... 562
9.5 Login Banner ................................................................................................................................. 563
Applicability and Scaling .............................................................................................................. 564
Functional Description ................................................................................................................. 564
Configuring Login Banners ........................................................................................................... 564
Example........................................................................................................................................ 565
10 Monitoring and Diagnostics...................................................................................................... 566
10.1 Dry Contacts ............................................................................................................................... 566
Applicability and Scaling .............................................................................................................. 566
Functional Description ................................................................................................................. 566
Factory Defaults ........................................................................................................................... 566
Configuring Alarms....................................................................................................................... 566
10.2 Syslog .......................................................................................................................................... 569
Applicability and Scaling .............................................................................................................. 570
Standards Compliance ................................................................................................................. 570
Functional Description ................................................................................................................. 570
Factory Defaults ........................................................................................................................... 571
Configuring Syslog Parameters .................................................................................................... 572
Example........................................................................................................................................ 573
Configuration Errors..................................................................................................................... 574
Viewing Syslog Statistics .............................................................................................................. 574
10.3 Performance Management ........................................................................................................ 575
Functional Description ................................................................................................................. 575
Factory Defaults ........................................................................................................................... 576
Configuring Performance Management ...................................................................................... 577
Viewing Performance Management Configuration ..................................................................... 578
Examples ...................................................................................................................................... 579
Configuration Errors..................................................................................................................... 580
10.4 Detecting Problems .................................................................................................................... 580
SecFlow-1p
Contents
40
Controlling Popup Behavior ......................................................................................................... 581
Alarms and Events........................................................................................................................ 581
10.5 Running a Ping Test .................................................................................................................... 582
Applicability and Scaling .............................................................................................................. 582
Functional Description ................................................................................................................. 582
Configuring a Ping Test ................................................................................................................ 583
Examples ...................................................................................................................................... 584
10.6 Tracing the Route ....................................................................................................................... 584
Applicability and Scaling .............................................................................................................. 584
Running Trace Route.................................................................................................................... 584
10.7 Technical Support ....................................................................................................................... 585
11 Software Upgrade .................................................................................................................... 586
11.1 Compatibility Requirements....................................................................................................... 587
11.2 Impact ......................................................................................................................................... 587
11.3 Prerequisites ............................................................................................................................... 587
SFTP/FTP/TFTP Prerequisites ....................................................................................................... 587
Software Packs ............................................................................................................................. 588
11.4 Upgrading Software via CLI ........................................................................................................ 588
Verifying the Host Parameters..................................................................................................... 588
Pinging the PC .............................................................................................................................. 589
Activating the SFTP Server ........................................................................................................... 589
Activating the TFTP Server ........................................................................................................... 589
Downloading the New Device Software Release File .................................................................. 590
Activating the Device Software .................................................................................................... 590
Activating the Software ............................................................................................................... 592
11.5 Verifying Upgrade Results .......................................................................................................... 592
11.6 Restoring the Previous Version .................................................................................................. 593
A
Connection Data ...................................................................................................................... 594
A.1 Ethernet Connector ...................................................................................................................... 594
A.3 Serial Port ..................................................................................................................................... 594
B
598
SecFlow-1p
1. Introduction
42
1 Introduction
1.1 Overview
SecFlow­1p is an industrial IoT gateway, a member of RAD’s SecFlow suite of ruggedized Ethernet
products.
This is an open platform hosting third-party software, besides its communication capabilities.
In its maximum configuration, SecFlow-1p can support four GbE Copper ports and two GbE SFP ports,
two serial ports (single RS-232 port or one RS-232 plus one RS-485/2W), built-in WiFi modem, GPS
receiver for location indication and a cellular modem with two SIM cards or two modems for maximum
link resiliency.
SecFlow-1p is equipped with serial interfaces for connectivity of legacy equipment. As a gateway it
converts legacy serial protocols to modern IP-based protocols, enabling seamless communication from
the IP SCADA to both the old and new RTUs. This provides a single box solution for multi-service
applications and smooth migration to all-IP networks.
SecFlow-1p features DIN-rail mounting, IP30 protection level, wide operating temperature range (-40°C
to 65°C) without fans, or regular temperature range (-20°C to 60°C) for desktop application.
Product Options
SecFlow-1p can be ordered in the following configurations:
•
Without LTE and Wifi modules
•
With LTE, without Wifi
•
With Wifi, without LTE
•
With both LTE and Wifi
•
With 2 x 10/100/1000BASE-T ports or with 2 x 1000FX + 4 x 10/100/1000BASE-T ports
(“Superset”)
It can also be ordered for use with AC or DC power supply. DIN rail power supply is also available.
SecFlow-1p
1. Introduction
43
Features
Connectivity
SecFlow-1p provides rich WAN connectivity over diverse access technologies, including Ethernet,
IP/MPLS, WLAN and 4G/LTE.
Hybrid WAN connectivity with ACTIVE/ACTIVE support enables high availability service using multiple
links.
SecFlow-1p provides Ethernet, LTE and WiFi LAN connectivity.
Management and Security
The digital transformation accelerates the pace of adoption of new services. SecFlow-1p is designed to
simplify operations, while providing the service provider with visibility to its branch office demarcation.
SecFlow-1p incorporates secure Zero-Touch-Provisioning mechanisms for agile and seamless vCPE
deployment, reducing truck rolls and minimizing mass deployment operating costs.
To automate setting up of overlay connectivity to the data center, SecFlow-1p can be integrated with
the service provider’s SDN controllers or orchestration systems, using NETCONF/YANG modeling.
SecFlow-1p can also be managed via WEB, CLI or by RADview.
Management Capabilities
•
Secure remote management via any port using SSH, SNMP, NETCONF/YANG, or RADview, RAD’s
SNMP-based management system
•
Zero Touch, allowing SecFlow-1p to receive software and configuration files automatically
without having to manually log into SecFlow-1p. Supported over VPN and Public networks.
•
Performance Management – SecFlow-1p maintains performance management (PM) statistics.
The PM statistics are collected into a file that can be read using RAD’s RV PM-portal for further
analysis and presentation.
•
SecFlow-1p access control lists (ACLs) flexibly filter management traffic. Data ACLs with a single
Permit rule are also supported for IPsec only, to set the traffic permitted through the IPsec
tunnel and thus protected by IPsec.
SecFlow-1p
1. Introduction
44
Console Port
vCPE-OS can be installed on a white box with the following ports:
•
USB port for installation of vCPE-OS image from disk-on-key
•
Mini USB or serial (RS-232 or similar) port to which a console can be connected for management
via CLI
Note
The mini USB port has neither configuration nor monitoring parameters.
File Transfer Protocols
vCPE-OS supports SCP, SFTP, FTP and FTPs client functionality.
Security Protocols
SecFlow-1p supports the security protocols listed below, ensuring client-server communication privacy
and correct user authentication:
•
SNMPv3 (provides secure access to the device by authenticating and encrypting packets
transmitted over the network)
•
RADIUS (client authentication)
•
TACACS+ (client authentication)
•
SSHv2 for Secure Shell communication session
DHCP and DHCPv6 Client and Server
SecFlow-1p supports Dynamic Host Configuration Protocol (DHCP) server functionality for IPv4 clients.
Based on the Bootstrap Protocol (BOOTP), DHCP server assigns to DHCP clients IPv4 addresses from
configured pools, as well as various configuration parameters (DHCP options), in response to the
broadcast requests of DHCP clients. This functionality eliminates the need to assign an IP address for
each potential client.
SecFlow-1p supports DHCP and DHCPv6 client functionality working opposite IPv4 and IPv6 servers to
get network IP addressing as well as other configuration parameters (DHCP options) that facilitate the
device’s ZT functionality.
SecFlow-1p
1. Introduction
45
Traffic Processing
Layer-3 Forwarding
SecFlow-1p provides Layer-3 forwarding, with multiple Virtual Routing and Forwarding instances (VRFs).
Up to 10 routers and 32 router interfaces are supported.
SecFlow-1p supports static routing definitions, Border Gateway Protocol (BGP) and OSPF.
Network Address Translation (NAT)
SecFlow-1p supports Network Address Translation (NAT), a method that maps IP addresses (IPv4 only)
from one IP domain to another in an attempt to provide transparent routing to hosts.
IPsec Tunneling
SecFlow-1p supports IPsec on router interfaces to secure private communication across public IP
networks.
GRE Tunneling
SecFlow-1p supports Generic Routing Encapsulation (GRE) protocol, which sets up Layer-3 point-to-point
connectivity between two remote sites (over an underlay Layer-3 network).
Layer-2 Forwarding
SecFlow-1p supports up to two bridges and up to 32 bridge ports. The bridge ports can be bound to
Ethernet ports. The bridge entity enables users to perform local switching.
Layer-3 Quality of Service (QoS)
SecFlow-1p supports Quality of Service (QoS), i.e. traffic management, on Ethernet and Cellular ports to
ensure that traffic with specific characteristics, such as management, is guaranteed specific bandwidth
with minimum delay.
QoS support also includes classification – classifying traffic into traffic-classes on the ingress directions of
a port. Traffic class defines actions such as fixed Class of Service (CoS) mapping on the ingress direction
of an Ethernet port and DSCP marking.
SecFlow-1p
1. Introduction
46
Monitoring and Diagnostics
SecFlow-1p offers several types of diagnostic procedures:
•
Fault Propagation
•
Syslog – Syslog protocol generates and transports event notification messages from SecFlow-1p
to servers across IP networks.
•
Ping Test – SecFlow-1p can ping a remote IP host to check SecFlow-1p IP connectivity with that
host.
•
Trace Route – SecFlow-1p can quickly trace a route through the network from SecFlow-1p.
Timing
You can configure the SecFlow-1p internal real-time clock as free running or with Network Time Protocol
(NTPv4).
1.2 New in this Version
Feature
Cards and Ports
Blank APN name is now supported to allow the
cellular network to determine the correct APN
PPPoE (Point-to-Point Protocol over Ethernet)
is now supported
PPP (Point-to-Point Protocol) is now supported
for Cellular ports
Displaying the devices connected to the access
point is enabled
Viewing Cellular Port Status using Swagger is
enabled
Rest API Get support is added for cellular ports
Dual SIM protection is added to Cellular
Interface
Two new 450 MHz modems are supported by
the LTE interface
Comments
SecFlow-1p
1. Introduction
Feature
47
Comments
Dual LTE modems are supported
Serial ports are now supported
Terminal Server is supported
Serial Tunneling is supported
Serial to DNP3 tunneling over TCP/IP is
supported
Cellular interface display is reorganized to
display more parameters.
The device can be now managed via serial
port.
The device can be now managed via SMS.
MAC access control can be now enabled over
the Ethernet ports.
New Hardware
Support
SFP-30H is now supported
Monitoring and
Diagnostics
GNSS functionality has been added to the
device
GPON SFP is now supported
A new ordering option includes 3 digital input
and 1 digital output “I/O ALARM” pins (dry
contacts)
Dry contacts can be set based on pre-defined
events
RADview can collect device statistics (CPU,
memory and Ethernet ports) for generation of
CSV files to 3rd party PM applications
Management and
Security
Enhanced ACL management (logging, accessgroup parameters added)
GRE over IPsec is supported in "Tunnel Mode“
DHCP option 66 (tftp-server-name) was added
IPsec authentication using X.509 certificate,
with SCEP server is enabled
Traffic Processing
Address with prefix length 32 is allowed for
interface bound to virtual port
The default ordering option includes
2 digital input and 2 digital output
pins.
SecFlow-1p
1. Introduction
Feature
Comments
PBR enhanced features have been added to
the device
Ethernet Local switching has been added
VRRP is now supported.
Administration
Unsigned software update files are now
rejected for the purpose of security
OS patch mechanism has been added
Configuration file can be now uploaded and
stored on SD card
Factory Default Button is now supported from
the device panel
1.3 Technical Specifications
Note
Asterisk (*) marking the feature means that the feature will be released in a
future version. Some of these features are described in the manual and
marked with the asterisk.
Hardware Specifications
Interfaces
Ethernet
2 x 10/100/1000BASE-T ports
2 x 1000FX, 4 x 10/100/1000BASE-T ports
LTE
LTE modem with dual SIM
Wi-Fi
802.11b/g/n/ac dual band
Serial ports
1 RS-232 interface
2 RS-232 interfaces
48
SecFlow-1p
1. Introduction
1 RS-232, 1 RS-485 interfaces
Connector: RJ-45
GNSS
GPS – American (default)
Galileo – European
SD Card
1 port
Max size: 32GB
Modems
Dual SIM
Cellular
Modem
LTE bands – see Table below
Firmware
Upgrade
FOTA (Firmware upgrade Over the Air)
EVDO networks (technology backward compatible)
Configurable PAP, CHAP
Cellular
Authentication
SIM Card
Mini SIM, 25 mm x 15 mm (0.98 in x 0.59 in
Form factor: 2FF
WiFi Module
IEEE 802.11ac/a/b/g/n
Dual band 2.4 GHz or 5 GHz (software selectable)
Up to 8 users
Integrated LTE Modems
LTE Ordering Code
Modem Category and Frequency Bands
L1
CAT 4 EMEA/Korea/Thailand
LTE FDD: B1/B3/B5/B7/B8/B20
LTE TDD: B38/B40/B41
WCDMA: B1/B5/B8
GSM: B3/B8
49
SecFlow-1p
L3
1. Introduction
CAT 4 Australia/New Zealand/Taiwan/Brazil
LTE FDD: B1/B2/B3/B4/B5/B7/B8/B28
LTE TDD: B40
WCDMA: B1/B2/B5/B8
GSM: B2/B3/B5/B8
L4
CAT 4 North America, Verizon wireless + AT&T LTE
LTE FDD: B2/B4/B5/B12/B13/B14/B66/B71
WCDMA: B2/B4/B5
L450A
L450B
CAT 4 450MHz for private LTE networks
LTE-FDD: B3/7/20/31/72
CAT 4 450MHz for private LTE networks
LTE-FDD: B3/20/87
50
SecFlow-1p
1. Introduction
51
Antennas
Depending on the ordering option, your package may include a number of antennas supplied along with
the modems. For instructions on the antenna installation, refer to Installing Antennas.
Cellular Antennas – Embedded
Embedded LTE (L1, L3)
Description
Embedded antenna for
devices with L1 and L3
cellular modem
Embedded LTE (L4)
Embedded LTE (L450A, L450B)
Embedded antenna for
devices with L4 cellular
modem
Embedded antenna for devices
with L450 cellular modem
Photo
Frequencies
690-960
699-960
1400-2170
1710-2690
2300-2700
452.5 – 467.5
620 – 960
1170 – 1180
1560 – 1660
1710 – 2170
2300 – 2700
Impedance
50 Ohms
50 Ohms
50 Ohms
Polarization
Linear
Linear
Linear
Gain
4 dBi avg.
3 dBi typ.
4.94 dB max.i
VSWR
<2
<3:1; <5:1 at 2500-2690MHz
<2.65
IP/IK ratings
IP67
IP67, IK09
IP67
Connector type
SMA male
SMA male
SMA male
Cable
none
none
none
SecFlow-1p
1. Introduction
Cellular Antennas – External
Description
SF-ANT3G-2M(5M)
SF-ANT4G-2M(5M)
SF-ANT-LTE700-7DBI-MGNT
Outdoor antenna 3G cellular
modem,2 m (5 m) connecting
cable, 824-894 MHz/900
MHz/1800 MHz/1900 MHz
Outdoor antenna for 4G
cellular modem, 2 m (5 m)
connecting cable, 699-960
MHz/1710-2170 MHz/25002690 MHz
Outdoor magnetic base
antenna for LTE options
AMPS (824-894 MHz)
4G/LTE
700-960 MHz
ISM (868 MHz)
699-960 MHz /
1710-2170 MHz
GSM (900 MHz)
1710-2170 MHz /
2500-2700 MHz
DCS (1800 MHz)
2500-2690 MHz
Photo
Electrical Specifications
Frequencies
PCS (1900 MHz)
3G (UMTS 2.1 GHz)
WIFI / BLUETOOTH (2.4 GHz)
Impedance
50 Ohms
50 Ohms
50 Ohms
Polarization
Linear
Vertical
-
Gain
2.2 dBi avg.*
3 dBi typ.
7.0 dBi
VSWR
<2.6:1**
699-960 MHz <5:1 /
< 2.5
1710-2690 MHz <3:1***
IP/IK ratings
IP67
IP67, IK09
-
Connection Specifications
Connector
type
FME female
SMA male
SMA male
Cable
RG174U
RG174
RG195
52
SecFlow-1p
Cable length
1. Introduction
SF-ANT3G-2M(5M)
SF-ANT4G-2M(5M)
SF-ANT-LTE700-7DBI-MGNT
2m/5m
2m/5m
3m
*Antenna gain depend on size of the ground plane
**VSWR stated when measured with 2.5m RG174 on 50x50cm ground-plane
***Values stated when measured on 50x30cm ground plane
GPS Antenna
SF-ANT-GPS-PAS-3DBI-MAG/3M
Description
GPS passive antenna, 3m
Photo
Electrical Specifications
Center Frequency
1575.42 ± 3 MHz
Band Width
CF ± 5 MHz
Impedance
50 Ohms
Polarization
RHCP
Gain (Zenith)
3 dBic
VSWR
1.5
Connection Specifications
Connector type
SMA male
Cable
RG174
Cable length
3m
WiFi Antenna
SF-ANT-WIFI-DUALBAND-3DBI-SMA
Description
WiFi dual band antenna, 3 dBi, for options with WiFi modem
53
SecFlow-1p
1. Introduction
SF-ANT-WIFI-DUALBAND-3DBI-SMA
Photo
Electrical Specifications
Frequencies
2.4–2.5 GHz
5.15–5.85 GHz
Impedance
50 Ohms
Polarization
Linear Vertical
Gain
2.37 dBi
IP/IK ratings
2.93 dBi
IP-65
Connection Specifications
Connector type
RP-SMA male straight connector
Cable
RG-178 coaxial cable
Management and Diagnostics
Console Port
Ethernet port with the highest number (4 or 6, according to the device ordered), RJ-45
connector
Note: Console cable is not included and must be ordered separately (see Optional
Accessories).
LEDs
Including alarm indication and cellular RSSI level
Dry Contacts
2 In, 2 Out
3 In, 1 Out (special ordering option)
Maximum rating: 60 VDC, 1A
Maximum switching power: 30W, 37.5VA
54
SecFlow-1p
1. Introduction
General
Compliance Enhanced EMI and immunity according to
EN 50121-4*
EUCE
FCC and TUV for North America
EMC Class A
Environment
Storage
-40 to 85°C (-40 to 185°F)
Temperature
Operating
DIN rail: -40 to 65°C (-40 to 149°F)
Temperature
Humidity
Up to 90%
Physical
Height mm
(in)
138 (5.43)
Width
53.3 (2.1)
Depth
123.3 (4.85)
Weight
0.88 kg (1.94 lb)
Power
Wide Range Input 10.8-26.4 VDC @ 1-0.5A
Voltage
EXT AC Power
Supply
90–240VAC
Power
Consumption
< 12W
55
SecFlow-1p
1. Introduction
Software Specifications
Management
Configuration
Web-based interface using HTTPS or HTTP
CLI with password-protected access
Protocols
NETCONF server (v1.0/v1.1)/ YANG
SNMP v2/v3
Telnet, SSH v2, HTTPS server, TFTP/SFTP
Users
User roles and privileges
Monitoring and
Diagnostics
Syslog
Traceroute, ping
Alarm and event logs
DHCP Server
IPv4, IP subnet pools support 256 addresses
IP Addressing and Routing
Addressing
IPv4 and IPv6
Routing
Protocols
OSPF v2, BGP v4
VRRP*
IP-BFD for fast route propagation*
Routing
Static
Technologies
Policy-based
VRF (10), RIF (32)
NAT
Static/dynamic
56
SecFlow-1p
1. Introduction
NAPT/NAT
DHCP
Client, server, relay
IP helper addresses
DNS
Server
Timing
Date and
Time
Local time setting
Protocol
SNTPv4
IP Quality of Service
Classification and
Priority
IP-based (DiffServ)
Queuing
Class-based, SPQ, WFQ
Traffic Processing
Shaping
Egress Queues
4 queues per port
Classification
Port-based, 802.1p, DSCP
Scheduling
Strict Priority / WRR
Marking, remarking
Security
Access Lists
Standard and extended
Firewall
Zone-based, stateful
Session
Monitoring and limiting
Authentication
Locally, RADIUS, TACACS+ (also for
authorization and accounting)
Port-based: 802.1X* on Ethernet and Wi-Fi
57
SecFlow-1p
Public Keys
1. Introduction
Public Key Infrastructure with X.509
certification for Zero Touch
Certificates with SCEP CA server
Features
Login lockout
IP VPNs
Protocols
Policy- and route-based IPsec, GRE
GREoIPsec
IKEv1 (main and aggressive mode), IKEv2, SHA2
L3 mGRE DMVPN*
L3 IPsec VPN
PPPoE supporting Broadband or LTE access
IKE Algorithms
AES CBC 128 and 256, SHA-1, SHA-2 256 and 512
IKE Hashing
Algorithms
SHA1-96-HMAC, SHA2-256-128-HMAC, SHA2-512-256HMAC
ESP Algorithms
AES CBC 128 and 256, AES GCM 128 and 256, AES
GMAC 128 and 256, null encryption, SHA-1, SHA-2 256
and 512
DH Groups
1 (768-bit modulus)
2 (1024-bit modulus)
5 (1536-bit modulus)
14 (2048-bit modulus)
19 (256-bit elliptic curve)
20 (384-bit elliptic curve)
Technologies
NAT traversal
Interoperability with SCEP server 2012 and higher
Advanced Technologies
Containers
LXC/LXD
58
SecFlow-1p
1. Introduction
Zone-based Firewall
Type
Stateless (ACL-like)
Stateful (monitor connection state; e.g. only allow to start a
connection from inside the organization)
IPv4 and IPv6 NAT
SNAT, DNAT
REDIRECT
Masquerading (PAT)
Security Measures
DDOS protection: SYN and RST flood prevention
Configuration
via Web GUI
Rules
Interfaces are assigned to zones, for which a set of rules is
configured
IPv4 and IPv6
Can be limited to specific days, dates and times
Number of connections per rule can be limited
Rule hits reported to local LINUX Syslog
Geo IP: Block or allow traffic based on source or destination
country (requires Internet connection
DPI: Layer 7 rules (e.g. block Skype)
Web content filtering (requires
internet connection, for periodic
list updates)
Blacklisting of URL or IP, based on categories (e.g. ads, gambling)
Blacklisting of phrases, based on categories
Limiting downloadable files by extension
DNS Proxy: black list filtering, downloadable periodically from
the Internet
Integrated Routing and Bridging (IRB)
Operation Mode
VLAN aware VLAN un-aware
Static or Dynamic MAC addresses
QoS
VLAN tagging and un-tagging
59
SecFlow-1p
1. Introduction
802.1p priority tagging
ToS/CoS and CoS/ToS mapping
Max number of bridges
2
Max number of bridge
ports
32
Max MAC addresses per 512
bridge
Wi-Fi
Radio mode 802.11a/b/g/n/ac
Security
WPA2-AES
Users
8 concurrent
SSID
6
Bands
2.5Ghz and 5Ghz
Cellular and GPS
LTE
Single SIM
Dual SIM
Dual LTE modems
Operation Modes
PPP, Eth/DHCP
GPS
Location reporting
OAM
SLA
Monitoring
ICMP echo, UDP echo
60
SecFlow-1p
ZTP
1. Introduction
On-net
Off-net (over unsecured network) performs secure “call
home” using Public Key Infrastructure (X.509)
61
2 Installation and Setup
This chapter provides installation instructions for the SecFlow-1p systems including:
•
General description of the equipment enclosure and its panels
•
Mechanical and electrical installation instructions
After the system is installed, it must be configured in accordance with the specific user's requirements.
The preliminary system configuration is always performed by means of a supervision terminal
(procedures for using the terminal are detailed in the Operation and Mainenace chapter). After the
preliminary configuration, the system can also be managed by means of SNMP-based network
management stations, e.g., RADview with an integrated SecFlow-1p Network Management tool.
2.1 Safety
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Protective earth: the marked lug or terminal should be connected to the
building protective earth bus.
LINE VOLTAGE
Before connecting the product to the power line, make sure the voltage of
the power source matches the requirements of the product, as marked on
the label located near the power connectors.
SecFlow-1p
2. Installation and Setup
63
Caution
This equipment contains Electrostatic Discharge (ESD) sensitive components.
Use ESD protection before servicing or installing components of this system.
Caution
Changes or modifications made to this device that are not expressly
approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
Caution
Remove the power cord from a power-supply unit before installing it or
remove it from the device. Otherwise, as a result, the power supply or the
device could be damaged. (The device can be running while a power supply
is being installed or removed, but the power supply itself should not be
connected to a power source.)
Caution
The unit is designated to operate in environments of up to 75 degrees
ambient temperature.
Caution
Use Safety approved AC/DC adapter, according to IEC/EN 60950-1 or IEC/EN
62368-1 with rated voltage of 12/24 VDC, certified as LPS.
Caution
Installing or removing a SIM card during modem operation can damage the
modem. Make sure either the modem is disabled (cellular disable) or
SecFlow-1p is turned off, before manipulating the SIM card.
Laser Safety
SecFlow-1p includes Class 1 lasers. For your safety:
Do not look directly into the optical connectors while the unit is
operating. The laser beams are invisible.
• Do not attempt to adjust the laser drive current.
The use of optical instruments with this product will increase eye hazard.
Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an
optical instrument.
Use of controls or adjustment or performing procedures other than those
specified herein may result in hazardous radiation exposure.
•
SecFlow-1p
2. Installation and Setup
64
Grounding
For your protection and to prevent possible damage to equipment when a
fault condition, e.g., a lightning stroke or contact with high voltage power
lines, occurs on the lines connected to the equipment, the chassis must be
properly grounded (earthed) at any time. Any interruption of the protective
(grounding) connection inside or outside the equipment, or the
disconnection of the protective ground terminal can make this equipment
dangerous. Intentional interruption is prohibited.
2.2 Site Requirements and Prerequisites
Warning
SecFlow-1p must be installed by qualified personnel according to the
National Electrical Code or Local Electrical Regulation.
Always observe standard safety precautions during installation, operation,
and maintenance of this product.
This is a radio device. To avoid radiation-related health problems per EN
62311:2008, the minimum distance from the human body to an operating
product should be at least 25 cm.
Warning
Note
Before connecting this product to a power source, make sure to read the
Handling Energized Products section at the beginning of this manual.
Caution
SecFlow-1p is intended for installation in a Restricted Access Location.
Caution
SecFlow-1p does not have a power switch, and therefore will start
operating as soon as power is applied to one of the power supply inlets.
The external circuit breaker used to protect the input power line can be used
as an ON/OFF power switch, or an external ON/OFF switch may be installed.
SecFlow-1p
2. Installation and Setup
65
Power
Available power input versions and their respective maximum current are shown in the table below.
Power Inputs and Max Current
DC Power Input
Max Input Current [A]
12V
1A
24V
0.5
Ambient Requirements
The ambient storage temperature range of SecFlow-1p is -40 to 85°C (-40 to 185°F). Operating
temperature is -20 to 65°C (-4 to 149°F); humidity up to 90%.
SecFlow-1p has no fans and is cooled mainly by free air convection. Keep 10 cm distance from top and
bottom between SecFlow-1p and any other nearby device for proper cooling using natural air flow.
2.3 Package Contents
The SecFlow-1p package includes the following items:
•
SecFlow-1p unit
•
CBL-ETH/STP/STR/1M – Console port cable (if ordered)
•
External desktop AC power supply kit (if /ACEX option is ordered)
•
Terminal block power plug (if /DC option is ordered)
Note
If /DC option is ordered, the power supply must be provided by the customer.
However, you can also order this option and SF-AC-12VDC-20W power
supply, allowing both DIN rail installation and connecting to AC power.
•
SF-AC-12VDC-20W, external DIN Rail AC to 12VDC 20W power supply for SF-1P/DC devices (if
ordered)
•
Optional: One or two cellular antennas as per ordering option
•
Optional: Two WiFi antennas as per the ordering option
SecFlow-1p
2. Installation and Setup
•
Optional: A GPS antenna as per the ordering option
•
Optional: CBL-RJ45/D9/F/6FT – Serial port cable with male RJ-45 and female DB-9 connector
•
Optional: CBL-SF-RJ45-RS485 – Serial port open cable with male RJ-45 connector
66
2.4 Physical Installation
SecFlow-1p is designed as a fixed unit connected in its rear side to an industry-standard DIN rail. The
DIN-rail mount is the default SecFlow-1p setup.
RAD products must be transported to installation sites in their original packaging.
Failing to do so may damage the equipment and voids the warranty.
Warning
Required Equipment
SecFlow-1p needs no special tools for installation. You need a screwdriver to remove the unit from a 35
mm DIN rail.
The cables needed to connect to SecFlow-1p depend on your specific application. You can prepare the
appropriate cables yourself in accordance with the information given in the Connection Data appendix,
or you can order cables from RAD.
Wall Mounting
The following mounting instructions assume that a standard DIN rail has been previously installed. If one
has not, use the installation instructions that come with the DIN rail to mount the DIN rail on the wall.
Locate the DIN mounting brackets on the back of the device.
 To mount SecFlow-1p:
1. Place the device with the DIN rail guide on the upper edge of the DIN rail.
2. Snap it in with a downward motion.
SecFlow-1p
2. Installation and Setup
Step 1
Step 2
DIN Rail Mounting
 To remove SecFlow-1p from the DIN rail:
1. Pool the latch downwards with the aid of a screwdriver to loosen the lower clamp.
2. Slide the device out and up at the lower edge of the DIN rail.
Caution
Product installation must be vertical so that the device bottom panel faces
downwards.
67
SecFlow-1p
2. Installation and Setup
Step 3
Step 1
Step 2
SecFlow-1p Dismantling
Installing Antennas
The number and type of antennas supplied with SecFlow-1p depends on the ordering option. For the
technical specifications of the supplied antennas, refer to Antennas.
For optimal signal performance, it is recommended to connect both antennas of the same type that
come with the device.
68
SecFlow-1p
Note
2. Installation and Setup
If you connect only one antenna, verify that it is connected to the upper
(MAIN) connector on the front panel.
 To install the antenna:
•
Screw the antenna on the appropriate connector.
Connectors
The LTE connectors are located on the front panel and designated LTE/LTE1/LTE2 MAIN and
LTE/LTE1/LTE2AUX.
The WiFi connectors are located on the top panel and designated WIFI MAIN and WIFI AUX.
For LTE and GPS antennas, SMA female connectors are used.
69
SecFlow-1p
Note
2. Installation and Setup
70
In the dual-LTE modem platform, GPS antenna is connected to the modem in
slot 1 (specified as Lx1 in the ordering string SF-1P/@/#/$/Lx1/Lx2/&/H1)
and coordinates are sent from modem slot one only.
For WiFi antennas, RP-SMA connectors are used.
Antenna
Caution
SecFlow
Make sure you use the correct connector for each antenna type.
LTE Antennas
If a single LTE antenna is used, the main antenna supports both Rx and Tx. Adding a second antenna
splits Tx and Rx to one antenna each.
Installing a SIM Card
SecFlow-1p provides cellular interface that requires an active SIM card. The SIM cards compartment on
the bottom panel can house up to two SIM cards ensuring redundancy and backup of network
connectivity.
Note
SIM changing on-the-fly is not allowed. To change the SIM cards, you have to
power the device off and turn it on again once the changing is completed.
SecFlow-1p
2. Installation and Setup
71
 To install a SIM card into SecFlow-1p:
1. Make sure the device power is turned off.
2. Unscrew the screw fastening the cover of the SIM compartment.
3. Open the cover and insert the SIM card into one of the slots. Make sure the card direction
match the corresponding icon on the front panel.
4. Close the cover and fasten the screw with the screwdriver.
 To remove a SIM card from SecFlow-1p:
1. Make sure the device power is turned off.
2. Unscrew the screw fastening the cover of the SIM compartment.
3. Open the cover and press on the SIM card against the horizontal slot as on the figure below. You
can use any fitting tool, for example a small screwdriver or a pen.
The card comes out.
4. Carefully remove the SIM card from the slot.
5. Close the cover and fasten the screw with the screwdriver.
Installing an SFP
You can install a recognized SFP module with an RJ-45 copper or LC fiber optic connector into a SecFlow1p Ethernet SFP port.
Third-party SFP optical transceivers must be agency-approved, complying
with the local laser safety regulations for Class I laser equipment. The laser
product must be safety approved to IEC 60825 and CDRH registered.
Caution
When calculating optical link budget, always take into account adverse
effects of temperature changes, optical power degradation, and so on. To
compensate for signal loss, leave a 3 dB margin. For example, instead of
maximum receiver sensitivity of -28 dBm, consider the sensitivity measured
at the Rx side to be -25 dBm. Information about Rx sensitivity of fiber optic
interfaces is available in the Pluggable Transceivers data sheet.
SecFlow-1p
2. Installation and Setup
72
 To install the SFP:
1. Lock the wire latch of the SFP module by lifting it up until it clicks into place, as illustrated on the
picture below.
Note
Some SFP models have a plastic door instead of a wire latch.
Locking the SFP Wire Latch
2. Carefully remove the dust covers from the SFP slot.
3. Insert the rear end of the SFP into the socket, and push slowly backwards to mate the
connectors until the SFP clicks into place. If you feel resistance before the connectors are fully
mated, retract the SFP using the wire latch as a pulling handle, and then repeat the procedure.
Caution
Insert the SFP gently. Using force can damage the connecting pins.
4. Remove the protective rubber caps from the SFP modules.
 To remove the SFP module:
1. Disconnect the fiber optic cables from the SFP module.
2. Unlock the wire latch by lowering it downwards (as opposed to locking).
3. Hold the wire latch and pull the SFP module out of the Ethernet port.
SecFlow-1p
Caution
2. Installation and Setup
73
Do not remove the SFP while the fiber optic cables are still connected. This
may result in physical damage (such as a chipped SFP module clip or socket),
or cause malfunction (e.g., the network port redundancy switching may be
interrupted).
Installing a Memory Card
Memory card slot is located on the bottom panel of SecFlow-1p and is designated SD.
 To install a memory card to SecFlow-1p:
•
Insert the card to the slot marked SD.
 To remove a memory card from SecFlow-1p:
•
Press on the memory card against the horizontal slot. You can use any fitting tool, for example a
small screwdriver or a pen.
Connecting to a Management Console
You can connect one of the SecFlow-1p Ethernet ports to a laptop equipped with a management
application, such as PuTTY, via an 8-pin RJ-45 connector. This port is the Ethernet port with the highest
number, according to the device ordered:
•
6 for 4U2S configurations
•
4 for 2U configurations.
Refer to the Connection Data appendix for the connector pinout.
Caution
Console cables must have a frame ground connection. Use ungrounded
cables when connecting a supervisory terminal to a DC-powered unit with
floating ground. Using improper console cable may result in damage to the
supervisory terminal port.
 To connect to a management console:
1. Connect the RJ-45 connector of CBL-ETH/STP/STR/1M cable, available from RAD, to the unit’s
Ethernet port 4.
SecFlow-1p
2. Installation and Setup
74
2. Connect the other end of the CBL-ETH/STP/STR/1M cable to a computer equipped with an ASCII
terminal emulation application.
Note
After completing the configuration of the management console, disconnect
the cable and leave the Ethernet port open.
Connecting to Power
SecFlow-1p has the power input designated according to the device ordering option:
•
ACEX – external AC power adaptor
•
DC – Wide Range 12/24V input voltage (10.8-26.4 VDC)
Before connecting any cables and before switching on this instrument, the
protective ground terminal of this instrument must be connected to the
protective ground conductor. Any interruption of the protective (grounding)
conductor (inside or outside the instrument) or disconnecting the protective
ground terminal can make this instrument dangerous. Intentional
interruption is prohibited.
Grounding
The SecFlow-1p grounding connector is located on its bottom panel, as shown in the figure below.
 To install the grounding wire:
1. Prepare a grounding wire terminated by a crimped lug with hole diameter 11-14 AWG as shown
in the below figure.
SecFlow-1p
2. Installation and Setup
75
2. Use a suitable crimping tool to fasten the lug securely to the wire.
3. Adhere to your company’s policy as to the wire gauge and the number of crimps on the lug.
11-14 AWG
SecFlow-1p Grounding Lug
4. Apply some anti-oxidant onto the metal surface.
5. Mount the lug on the grounding posts, replace the spring-washers and fasten the bolts. Avoid
using excessive torque.
Caution
Do not remove the earth connection unless all power supply connections are
disconnected.
Caution
Protective earth: the marked lug or terminal should be connected to the
building protective earth bus.
Connecting to DC Power
If /DC option is ordered, the power supply must be provided by the customer. RAD provides a 3-prong
terminal block power plug for DC power connection.
Note
You can also order this option and SF-AC-12VDC-20W power supply, allowing
both DIN rail installation and connecting to AC power.
Caution
SecFlow-1p should be powered from external, separately approved and
suitably rated power supply, providing SELV output.
To wire the voltage, use the supplied plug connector (see figures below), according to the pinout shown
on the DC power terminal located on the device bottom panel.
SecFlow-1p
2. Installation and Setup
Plug Connector Wiring
DC Power Terminal
 To connect the device to a DC power source:
1. Strip 7 mm (1/4 inch) of insulation from the leads (copper wire within the range of 10 to 18
AWG).
2. Release two terminal screws on the plug.
3. Push the lead into the plug terminal block up to its insulating sleeve.
4. When the lead is in position, fasten the screw to secure the lead.
5. Verify that the lead is securely held.
6. Insert the plug into the socket on the device.
7. Secure the plug by tightening the two screws.
8. Connect the leads to an external DC power source (color code the wiring according to local
standards to ensure that the input power and ground lines are easily distinguished).
9. Turn on the power to the feed lines at the supply circuit-breaker.
10. Verify that the power supply PWR LED is green.
Connecting to AC Power
If /ACEX option is ordered, an external desktop AC power supply kit is supplied (see the figure below).
76
SecFlow-1p
2. Installation and Setup
77
If you want a DIN Rail power supply, RAD offers SF-AC-12VDC-20W power supply, allowing both DIN rail
installation and connecting to AC power (see below). SF-AC-12VDC-20W power supply is actually The
ACEX power supply with DIN rail mounting brackets.
SecFlow-1p
2. Installation and Setup
 To connect the device to an AC power source:
1. Release two terminal screws on the terminal block plug.
2. Insert the orange lead of the ACEX/SF-AC-12VDC-20W power supply to the right socket of the
plug and the white lead – into the middle socket.
3. Fasten the screws on the plug.
4. Verify that the lead is securely held.
78
SecFlow-1p
2. Installation and Setup
79
5. Insert the plug into the socket on the device.
DC Power Terminal
6. Secure the plug by tightening the two screws.
7. Connect the power supply to the power cord.
8. Connect the power cord to the AC mains.
9. Turn on the power to the feed lines at the supply circuit-breaker.
10. Verify that the power supply PWR LED is green.
Connecting to Ethernet Equipment
SecFlow-1p is connected to Ethernet equipment via the fiber optic SFP transceiver with LC connector or
the electrical port with the standard RJ-45 connectors.
 To connect to Ethernet equipment with the fiber optic interface:
•
Connect SecFlow-1p to the Ethernet equipment at customer premises using the standard fiber
optic cable terminated with LC connector.
 To connect to Ethernet equipment with copper interface:
•
Connect SecFlow-1p to the Ethernet equipment at customer premises using the standard CAT5
cable or better terminated with RJ-45 connector.
SecFlow-1p
2. Installation and Setup
Connecting to Serial Equipment
SecFlow-1p serial ports are terminated in RJ-45 connectors. The user serial equipment standard ports
have DB-9 connectors. Refer to the Connection Data appendix for the RJ-45 connector pinout.
 To connect to serial equipment:
•
Connect the RJ-45 serial port to serial equipment at customer premises using
CBL-RJ45/D9/F/6FT cable terminated with the RJ-45 connector.
Connecting to a Dry Contacts Terminal
Note
A circuit intended for connection to the Dry Contact interface should be
limited to 60 VDC maximum, 1A maximum, 37.5 VA maximum, under normal
and single fault condition.
SecFlow-1p performs discrete IO tunneling via a terminal block located on the bottom.
Dry Contacts Terminal Block
The supported input alarm is:
•
typical – 48 VDC
•
minimal – 9 VDC
•
maximal – 60 VDC
When the administrative status of the dry contacts is enabled, on the state change (SET/CLEAR) of any
defined input or output alarm, the following reports are sent:
•
Syslog event
•
Device log event
•
SNMP trap
80
SecFlow-1p
2. Installation and Setup
81
The default ordering option of the device features 2 inputs and 2 outputs.
In addition to the default 2inx2out configuration of Dry Contact block, another ordering option
(designated /3DI) is available, allowing to expand of number of analog inputs to three.
2inx2out Option
Pins 1-3 implement the Dry Contacts Output Module. Pin #3 is the output common. Pins #1 and #2 are
normally-open relays that can be defined as two independent alarm outputs. Once the configured alarm
occurs, the relay change its state to “close”.
Pins 4-6 implement the Dry Contacts Input Module. Pin #5 is the input common. Pins #4 and #6 are
inputs that can be defined as two independent alarm inputs. A syslog event occurs on each change in
the input state.
Input
Output
d-in2 Common d-in1 Common d-out2 d-out1
6
5
4
3
1
2
N/O
N/O
Dry Contacts Interface Diagram – Default (2inx2out) option
Refer to the table below for the terminal block pinout.
SecFlow-1p
2. Installation and Setup
82
Dry Contacts Pinout – Default (2inx2out) option
DC CON Pin
6
5
4
3
2
1
Signal Name
DIN2
COM-DIN
DIN1
COM-DOUT
DOUT2
DOUT1
3inx1out Option
In this option, pin 1 implements the Dry Contacts Output Module. Pin #3 is the output common. Pin #1 is
normally-open relay that can be defined as alarm output. Once the configured alarm occurs, the relay
changes its state to “close”.
Pins 2, 4, 6 implement the Dry Contacts Input Module. Pin #5 is the input common. Pins #2 #4 and #6
are inputs that can be defined as three independent alarm inputs. A syslog event occurs on each change
in the input state.
This option is shown in the diagram below.
Dry Contacts Interface Diagram – (3inx1out) option
Refer to the table below for the terminal block pinout.
SecFlow-1p
2. Installation and Setup
83
Dry Contacts Pinout
DC CON Pin
6
5
4
3
2
1
Signal Name
DIN2
COM-DIN
DIN1
COM-DOUT
DIN3
DOUT1
 To connect the discrete channel to digital input/output:
1. Strip the insulation of your power supply wires according to the dimensions shown below.
Terminal Block Wire Stripping
2. Place each wire lead into the appropriate TB plug terminal according to the terminal block
scheme.
3. Tighten the terminal screws to close them.
4. Isolate the exposed terminal screws/wire leads using a plastic sleeve or insulating tape to avoid
a short circuit.
Installing the GNSS Antenna
Use of SecFlow­1p with the GNSS ordering option requires installation of a GNSS antenna on the roof of
the building.
Positioning the GNSS Antenna
Damage to an antenna or GNSS receiver is more often due to lightning strikes on nearby objects, rather
than direct strikes on the antenna. These direct or indirect lightning strikes are likely to induce damaging
voltages in the antenna system. Therefore, it is advisable to place the GNSS antenna below and at least
15 meters away from towers, lightning rods, or structures that attract lightning.
SecFlow-1p
2. Installation and Setup
84
Mounting the Lightning Arrestor
It is recommended to install a Lightning Arrestor to further protect your GNSS circuit from lightning
strikes. A Lightning Arrestor is able to handle lightning currents by reducing the pulse energy of the input
surge.
GNSS In-Line Lightning Arrestor
 To mount the Lightning Arrestor:
1. Mount the Lightning Arrestor on good earth ground (low impedance), between the GNSS
antenna and the point where the cable enters the building.
2. Connect the GNSS antenna on the roof to the surge side connector at the top of the Lightning
Arrestor using the shortest possible interconnection cable.
3. Connect the protected side connector at the bottom of the Lightning Arrestor to the GPS
receiver (the device) using a coax cable.
4. If the coax cable length connecting the Lightning Arrestor to the GPS receiver is no longer than
20 m, no further safety measures are required.
For longer cable distances, a further fine protector may be needed to protect the receiver
against induced voltages caused by magnetic coupling. If this is the case, contact RAD Technical
Support for more information.
Mounting GNSS In-Line Lightning Arrestor
SecFlow-1p
2. Installation and Setup
2.11 Basic Connectivity Tests
Caution
Before leaving the installation site, it is highly recommended that you test
network connectivity between the device and the remote network
management station (for example, by sending a ping).
85
3
Operation and Maintenance
3.1 Turning On the Unit
When turning on SecFlow-1p, it is useful to monitor the power-up sequence.
Caution
SecFlow-1p does not have a power on/off switch, and will start operating as
soon as power is applied.
 To turn on SecFlow-1p:
1. Connect SecFlow-1p to power (see detailed instructions in Connecting to Power). The PWR and
RUN indicators light up and remain lit as long as SecFlow-1p is powered. The PWR indicator
lights up immediately upon turning on, while the RUN indicator lights up in about two minutes.
2. After startup ends, you may log in, using the supervision terminal.
3.2 Indicators
The SecFlow-1p unit’s LED indicators are located on the device’s front panel. These LEDs enable the user
to quickly observe the state of the device. Each LED has a default “normal” functionality.
Note
Depending on the ordering option, some LEDs may not exist.
The following tables summarize the normal functions of the SecFlow-1p LED indicators per device.
SecFlow-1p
3. Operation and Maintenance
87
SecFlow-1p Front Panel
LED Indicators
Name
LED Color
Function
ALM
Green/Red
Red on: The device has at least one active alarm
RUN
Green
Green blinking: The device is under test
Note: Only tests that stop port traffic (such as Ethernet port loopback),
affect the ALM LED.
On: Normal operation, system is up
Off: No power or at early boot stage
• Fast blinking: Linux loading
Blinking: During Zero Touch procedure, see also the Zero Touch table
below.
SecFlow-1p
3. Operation and Maintenance
Name
LED Color
Function
AUX
Green/Red
Red blinking: ZTP is in process
Green on: Device has a running container
Green blinking: Reboot without ZTP is in process
PWR
Green
On – Power is on
LINK/ACT 1 to 6
Green
On – Link is synchronized
Off – Power is off
SIM1, SIM2
Green
LTE
Green
Blinking – Data is being transmitted or received on the link
Single LTE modem platform:
• On – SIM card is enabled and inserted
• Off – no SIM card in the slot or SIM card is disabled
• Blinking – SIM card is connected to mobile network
Dual LTE modem platform (SIM1 and SIM2 are acting as LTE modem 1
and modem 2 LEDs):
• On – SIM card is enabled and inserted
• Off – no SIM card in the slot or SIM card is disabled
• Blinking – SIM card is connected to mobile network
Presents RSSI indication, as follows:
•
•
•
•
•
Four LEDs ON – Excellent signal; RSSI [dBm}: S > -60
Three lower LEDs ON – Good signal; RSSI [dBm}: -60 > S > -75
Two lower LEDs ON – Fair signal; RSSI [dBm}: -75 > S > -85
One lower LED ON – Poor signal; RSSI [dBm}: -85 > S > -105
All LEDs OFF – No signal; RSSI [dBm}: S < -105
Notes:
• RSSI value and LEDs are updated every five seconds.
• LEDs indicate status according to maximal value between two
antennas. For example, if one antenna RSSI is -90 dBm and the
second is -70 dBm, this means that the signal strength is good and
the three lower LEDs should be on.
• In the dual-LTE modem platform, the RSSI indication is presented
for the modem in slot 1 only
• In the dual-LTE modem platform, SIM1 and SIM2 are acting as LTE
modem 1 and modem 2 LEDs
WiFI
Green
On: WiFi physical link is up
Blinking: WiFi passes data
Note: Wi-Fi LED indicator is working only on devices with WiFi
functionality (“WF” ordering options)
88
SecFlow-1p
3. Operation and Maintenance
Name
LED Color
Function
Serial S1-S2
Green
TX blinking – Port is transmitting data
TX/RX LED
89
RX blinking – Port is receiving data
The stages of Zero Touch procedure are displayed by the RUN and ALM LEDs as in the table below. In
addition to the LEDs, the particular ZTP operation is displayed by corresponding messages in the CLI.
Zero Touch Status – RUN LED
RUN LED - Green
Status
Blinking: one long, then three short and fast
Bootstrapping phase of Zero Touch is performed
Blinking: one long, then one short and fast
Bootstrapping is in progress: connecting to bootstrap server,
downloading configuration, downloading software, rebooting
Blinking: long
Call-home phase of Zero Touch is performed
On
Zero Touch procedure is completed successfully
ALM LED is blinking at the same rate as RUN to
indicate the current Zero Touch stage
Zero Touch procedure error
3.3 FD Button
You can restore the device to Default configuration using the Factory Default Button present on the
bottom panel.
SecFlow-1p
3. Operation and Maintenance
90
 To restore the device to Factory Default configuration:
1. Insert a pin into the opening marked FD and hold it pressed for 5 seconds (or more)
2. Wait for the ping reply to default IP 169.254.1.1 via Port 6.
3. Then you can open a SSH session to the device.
3.5 Startup
Applicability and Scaling
All configuration and software files, as well as the loading sequence, are applicable to all SecFlow-1p
versions.
Configuration and Software Files
SecFlow-1p supports the following files:
•
Software (two software packs: sw-pack-1, 2). The software files are named according to the
current version, for example Syncope-v5.0.0.5002.iso, where 5.0.0.5 is the version number. The
file Syncope-v5.0.0.5002.iso is the SecFlow-1p image used for installation onto a disk on key.
•
Configuration – running-config, rollback-config, startup-config, user-default-config, factorydefault-config, restore-point-config
•
Zero touch configuration – zero-touch-config-xml
•
DB schema – db-schema
•
DB configuration – db-config
•
Scheduler log – schedule-log
•
Alarm and event logs – log, brief-log
•
Performance management data – pm-0
•
User files – You can store files under any name, for any purpose (e.g. configuration or log
backup) in the user directory.
SecFlow-1p
•
3. Operation and Maintenance
91
Syslog accounting local log – accounting-log
Refer to File Operations in the Administration chapter for details on file operations.
Software Files
At any time, SecFlow-1p has at least one and possibly two software packs, named sw-pack-1 and
sw-pack-2. Only one of these software packs is installed and active.
Configuration Files
SecFlow-1p supports the following configuration files, containing configuration settings:
•
factory-default-config – contains the manufacturer default settings. At startup,
factory-default-config is loaded if startup-config, rollback-config, and user-default-config are
missing or invalid.
•
rollback-config – serves as a backup for startup-config. At startup, rollback-config is loaded if it
exists and is valid, and if startup-config is missing or invalid.
•
restore-point-config – created by SecFlow-1p when software is installed with restore point
option.
•
running-config – contains the current configuration that the device is running. This file is deleted
and rebuilt at device reboot.
•
startup-config – contains saved non-default user configuration. This file is not automatically
created. You can use the save or copy command to create it. At startup, startup-config is loaded
if it exists and is valid.
•
user-default-config – contains default user configuration. This file is not automatically created.
You can use the copy command to create it. At startup, user-default-config is loaded if
startup-config and rollback-config, are missing or invalid.
Note
Configuration files should contain only printable ASCII characters (0x20–0x7E),
<Enter> (0x0D), <Line Feed> (0x0A), and <Tab> (0x09).
Loading Sequence
At startup, the device attempts to load configuration files in the following sequence until a valid one is
found:
SecFlow-1p
•
startup-config
•
rollback-config
•
user-default-config
•
factory-default-config
3. Operation and Maintenance
92
If an error is encountered while loading a file, the default is to ignore the error and continue loading.
You can use the on-configuration-error command to change this behavior, to either stop loading the file
when the first error is encountered, or reject the file and reboot; after rebooting, the next file in the
loading sequence is loaded).
To display the parameter values after startup, use the info [detail] command.
3.6 Working with Custom Configuration Files
In large deployments, often a central network administrator sends configuration files to the remote
locations and all that remains for the local technician to do is replace the IP address in the file or other
similar minor changes, and then download the file to the device. Alternatively, the technician can
download the file as is to the device, log in to the device and make the required changes, and then save
the configuration.
To download the configuration file, use the global copy command (refer to the Administration chapter).
After downloading the configuration file, the unit must be reset in order to execute the file. After the
unit completes its startup, the custom configuration is complete.
To ease deployment of large numbers of devices, you can automatically distribute software and
configuration files in the following ways:
•
Use On-Net Zero Touch provisioning (ZTP) to enable units to automatically receive an IP address,
and software and configuration files (see On-Net Zero Touch for details).
•
Use PPPoE (Point-to-Point Protocol over Ethernet) to establish a management channel through
which an IP address can be acquired (refer to Point-to-Point Protocol over Ethernet (PPPoE) in
the Management and Security chapter, for details). For instance, the IP address can be acquired
from a broadband remote access server (BRAS). The BRAS then notifies a Radius server, which in
turn reports to a management system, such as RADview, that a new device is up. The
management system then sends software and configuration files to the device.
SecFlow-1p
3. Operation and Maintenance
93
Applicability and Scaling
Zero Touch is applicable to all the SecFlow-1p versions.
Factory Defaults
Off-Net Zero Touch via bootstrap server is by default disabled (no ztc-bootstrap).
Saving Configuration Changes
You must save your configuration if you wish to have it available, as it is not saved automatically.
You can save your configuration as follows:
•
Use the save command to save running-config as startup-config.
•
Use the copy command to copy running-config to startup-config or user-default-config.
Additionally, some commands erase the configuration saved in startup-config by copying another file to
it and then resetting the device. The figure below indicates the commands that copy to startup-config,
and whether the device resets after copying.
 To save the user configuration in startup-config:
1. Enter: save
2. At any level, enter: copy running-config startup-config
SecFlow-1p
3. Operation and Maintenance
94
 To save the user default configuration in user-default-config:
•
At any level, enter: copy running-config user-default-config.
Confirming the Startup Configuration File
SecFlow-1p supports the enabling of active confirmation of the startup-config file following reboot.
Confirmation of startup-config prevents loss of the management link to a remote device due to
erroneous configuration.
If you enable the startup-confirm-required request, the next time the device reboots, you must enter
the global command startup-config-confirm in order to confirm startup-config within the configured
timeout period. (This command is only relevant if you run startup-confirm-required and then reboot the
device; otherwise, it is masked.)
If you confirm the new startup-config within the configured timeout period, SecFlow-1p loads startupconfig and copies running-config or any other user-specified configuration file to rollback-config.
If you do not succeed to confirm the new startup-config before timeout, the device rejects
startup-config, reboots, and attempts to load the next available configuration file (rollback-config,
user-default-config, factory-default-config).
 To enable startup-config confirmation following reboot;
•
At the admin# prompt enter:
startup-confirm-required [time-to-confirm <minutes>] [rollback {startup-config |
user-default-config | factory-default-config | running-config}]
The <minutes> parameter defines the confirmation timeout, range 1–65535 (default 5). If
rollback <config-file> is specified, the specified configuration file is copied to rollback-config.
For example, entering rollback user-default-config copies user-default-config to rollback-config.
Note
If rollback is not specified and rollback-config is invalid or does not exist, the
device copies running-config to rollback-config upon execution of
startup-confirm-required.
SecFlow-1p
3. Operation and Maintenance
95
On-Net Zero Touch
The on-net Zero Touch feature allows SecFlow-1p to receive software and configuration files
automatically, when SecFlow-1p is located in the same network, eliminating the need to manually log
into SecFlow-1p in order to transfer the required files to it.
The following zero touch mechanisms enable automatic provisioning of SecFlow-1p:
•
Zero Touch via DHCP – SecFlow-1p retrieves configuration information from the DHCPv4 server
(see Zero Touch via DHCP/DHCPv6).
•
Zero Touch via DHCPv6 – SecFlow-1p retrieves configuration information from the DHCPv6
server (see Zero Touch via DHCP/DHCPv6).
•
Zero Touch via trap – SecFlow-1p sends a notification trap to the management system (see Zero
Touch via Trap), so that the management system can perform the appropriate provisioning.
Zero Touch via DHCP/DHCPv6
This section describes Zero Touch provisioning via DHCP (for IPv4) or DHCPv6 for (DHCPv6).
Prerequisites
•
A Zero Touch Configuration (ZTC) XML file, containing directives regarding downloading and
installation of software and configuration files. See ZTC File Structure for details on how to
prepare this file.
•
A DHCPv4/DHCPv6 server for providing the TFTP server address, in addition to the usual IP
address, default gateway, etc.
•
A TFTP server from which to download the following:
 ZTC file
 Software image file, if required by the directives
 Configuration file, if required by the directives
Sequence
1. At reboot, SecFlow-1p obtains a DHCPv4 lease from the DHCPv4 server and/or a DHCPv6 lease
from the DHCPv6 server. If SecFlow-1p receives more than one lease that contains ZTC
directives (from multiple interfaces), it processes them one by one. After the first one is
finished, either successfully or not (e.g. reaching a timeout during file download), the device
proceeds with the directives received in the second lease.
SecFlow-1p
3. Operation and Maintenance
96
2. For DHCP: The lease provides the device IP address (for device management), TFTP server IP
address, either via option 150, or as a string via option 66 (the string is interpreted as an IP
address rather than a device name). Option 66 is valid only if the string is formatted as
(‘xxx.xxx.xxx.xxx’). Optionally, the DHCP lease provides the path and/or the file name of the ZTP
file via DHCP option 67.
3. For DHCPv6: The lease provides the device IP address (for device management), TFTP server
address via CableLabs vendor-specific (17) sub-option 32, provided that SecFlow-1p supports it.
If multiple TFTP server addresses are received, only the first one is used. Optionally, the DHCPv6
lease provides the path and/or the file name of the ZTP file via DHCPv6 sub-option 33.
4. If a valid file name is not obtained, SecFlow-1p tries to download the file considering the option
67 as a path, and the default file name rad.xml is added to it. If this attempt fails as well, the
third time SecFlow-1p uses the path rad/ with the file name rad.xml.
5. If the last attempt fails, the ZTC process finishes unsuccessfully and SecFlow-1p sends the event
download_end with error indication.
6. If the ZTC file is loaded successfully, SecFlow-1p sends the event download_end (with success
indication) to any configured network managers, and saves the ZTC file as
zero-touch-config-xml.
7. If zero-touch-config-xml contains directives for a software file, SecFlow-1p does one of the
following, according to the action specified in the directives:
 upgrade-only – Load software file if it is newer than the active software image.
 downgrade-only – Load software file if it is older than the active software image.
 replace – Load software file if different from the active software image.
8. If zero-touch-config-xml contains directives for a configuration file, then if the action specified
in the directives is replace-cfg, SecFlow-1p loads the specified configuration file if it is different
than the last configuration file loaded via the ZTC mechanism, and saves it as specified by
startup-config.
9. If a software file was downloaded, SecFlow-1p installs it as the active software pack.
10. If a software file and/or configuration file was downloaded, SecFlow-1p reboots. After startup,
the normal startup loading sequence is performed, so that if startup-config is loaded in the
sequence, SecFlow-1p executes the CLI commands in the file.
If the ZTC process ends successfully, SecFlow-1p sends the event download_end (with success
indication) to any configured network managers.
If an error occurs in the ZTC process, SecFlow-1p does the following:
•
Sends the event download_end (with failed indication) to any configured network managers
SecFlow-1p
3. Operation and Maintenance
•
Starts a timer lasting about 2-4 minutes
•
When the timer expires, SecFlow-1p again attempts the ZTC process.
97
ZTC File Structure
This section describes the ZTC directives in the ZTC file, which is written in standard XML, based on the
NETCONF schema. The file can contain directives for one or more devices. This flexibility enables the use
of one ZTC file per device, or one ZTC file for all devices. ZTC File Example shows a ZTC file containing
directives for SecFlow-1p.
The directives are enclosed in the element pair <zero-touch-configuration>
</zero-touch-configuration>. The ZTC directives for a particular device are enclosed by an element pair.
The element contents are according to the chassis name in the inventory display (refer to Resetting to
Default). The file can contain software-related directives and/or configuration-related directives for
each device.
The following software directives supply information about the software file to download:
•
sw-version – version of the software to download; must be formatted in the same way as the
chassis software revision displayed in the inventory display (refer to Inventory).
•
sw-action – software installation to perform:
 upgrade-only – Load software file if sw-version specifies a newer version than the chassis
software revision.
 downgrade-only – Load software file if sw-version specifies an older version than the
chassis software revision.
 replace – Load software file if sw-version specifies a version that is different from the
chassis software revision.
•
sw-src-file – path and name of the software to download
•
sw-dst-file – file name for saving the downloaded software:
 sw-pack-<n> – File is saved as the specified name, if it is not the active software.
 auto – File is saved as follows:

If there is an unused software pack number, and there is enough space in the file
system, then the file is saved as sw-pack-<n>, where <n>is the smallest unused software
pack number.

If all software packs numbers are in use, or if there is not enough space to save the
software, then the file is saved as sw-pack-<n>, where <n>is the software pack number
of the oldest version.
The following configuration directives supply information about the configuration file to download:
SecFlow-1p
3. Operation and Maintenance
98
•
cfg-version – version of configuration to download
•
cfg-action – action to take regarding configuration:
 replace-cfg – Load configuration file if cfg-version is different than the last ZTC configuration
version.
•
cfg-src-file – path and name of the configuration file to download
•
cfg-dst-file – specifies the name under which to save the downloaded configuration file; must
contain startup-config
ZTC File Examples
In this example, the software pack is to be chosen automatically (auto).
<rpc message-id="1" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<config>
<zero-touch-configuration xmlns="http://www.rad.com/schema/zero-touchconfiguration/1.0">
<SF-1p>
<sw-version>5.0.0(0.05)</sw-version>
<sw-action>replace</sw-action>
<sw-src-file>sw-pack_test.bin</sw-src-file>
<sw-dst-file>auto</sw-dst-file>
<cfg-version>pcpe_2.2</cfg-version>
<cfg-action>replace-cfg</cfg-action>
<cfg-src-file>cfg_file.txt</cfg-src-file>
<cfg-dst-file>startup-config</cfg-dst-file>
</SF-1p>
</zero-touch-configuration>
</config>
</edit-config>
</rpc>

In this example, the software pack is entered manually (sw-pack-2).
<rpc message-id="1" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<config>
<zero-touch-configuration xmlns="http://www.rad.com/schema/zero-touchconfiguration/1.0">
SecFlow-1p
3. Operation and Maintenance
99
<SF-1p>
<sw-version>5.0.0(0.05)</sw-version>
<sw-action>replace</sw-action>
<sw-src-file>sw-pack_test.bin</sw-src-file>
<sw-dst-file>sw-pack-2</sw-dst-file>
<cfg-version>rados_2</cfg-version>
<cfg-action>replace-cfg</cfg-action>
<cfg-src-file>cfg_file.txt</cfg-src-file>
<cfg-dst-file>startup-config</cfg-dst-file>
</SF-1p>
</zero-touch-configuration>
</config>
</edit-config>
</rpc>
Zero Touch via Trap
SecFlow-1p supports a bootstrap trap.
If a management station address is configured (typically in user-config), you can specify that SecFlow-1p
send a trap periodically to the management station (usually RADview) to notify it of its existence in the
network (by default, this trap is not sent).
 To enable sending the trap:
1. Navigate to configure management snmp.
The config>mngmnt>snmp# prompt is displayed.
2. Configure target and target-params (Refer to Configuring SNMPv3 Parameters for more
information).
3. Enter:
bootstrap-notification
SecFlow-1p sends the systemBootstrap trap every 120–240 seconds, until the command
no bootstrap-notification is entered, or the management station acknowledges the trap. If
SecFlow-1p reboots before the trap is acknowledged, it resumes sending the trap after it
completes its startup.
Off-Net Zero Touch
This section describes Zero Touch provisioning with bootstrap server over public network.
SecFlow-1p
3. Operation and Maintenance
100
During off-net Zero Touch process, SecFlow-1p retrieves an Artifact file containing bootstrapping data
from the bootstrap server to establish a secured connection with NOC.
Prerequisites
•
Information elements essential for Zero Touch procedure (see Public Key Infrastructure for
details on Certificates and X.509):
 UUID – Device MAC address
 a private key securely stored in the device
 X.509 v3 CA Certificate signed by RAD CA
 X.509 v3 Device Certificate signed by RAD CA (optionally)
An additional element is the path to the bootstrap server.
•
A bootstrap server that holds the entire bootstrapping data.
•
An Artifact file created for the particular device, recognized by its UUID and stored on the
bootstrap server. The Artifact is a zipped ZT file that can contain all or some of the following
files:
 bootstrap.cfg –configuration file
 config_manager.cer – configuration manager X.509 certificate file
 bootstrap.xml – SW pointer XML file
•
Configured NTP server (optionally)
•
Configured DHCP or DHCPv6 client (optionally)
Sequence
1. When SecFlow-1p device is powered on, it either obtains its networking configuration from a
service-provider controlled DHCP server, or starts ZT process with a static IP if configured so.
Then it connects to the bootstrap server via a secured connection, according to its
preconfigured bootstrap server path and based on its preinstalled X.509 certificates. After
mutual or one-way authentication, the device obtains the pre-prepared Artifact from the
bootstrap server. In case of one-way authentication, a password should be configured. Upon
extracting the bootstrapping data, SecFlow-1p acts according to the obtained bootstrapping
data.
2. After successful SecFlow-1p bootstrapping (which may include SW upgrade, applying
configuration and device reboot), SecFlow-1p can open a secure connection to the IPsec/VPN
Gateway in the NOC.
SecFlow-1p
3. Operation and Maintenance
101
3. When a secure connection between SecFlow-1p and the NOC is established, SecFlow-1p may
call home, i.e. send an enrollment trap to the deployment-specific network manager. When
network manager receives the device call, it acts according to the corresponding ZT entry,
registers the device and performs complementary provisioning actions.
ZT process with TFTP bootstrapping always precedes ZT with bootstrap server, in other words, if both ZT
processes are enabled, only TFTP bootstrapping is performed. However, if during the ZT process DHCP
options of TFTP server are not received, TFTP bootstrapping is not performed, while ZT connection to
the bootstrap server is initiated.
Exceptional Cases
If the device fails to connect to the bootstrap server, it stops the ZT procedure and attempts to access
the bootstrap server in intervals between two to four minutes.
If the device successfully completed the Artifact downloading, but the Artifact is corrupted, according to
the following criteria, it stops the ZT procedure:
•
The archived .gz file cannot be extracted by the device
•
After successful extraction, one of the following files is missing or having an unexpected name:
 configuration file (.cgf)
 SW image pointer XML file
 RV Configuration manager X.509 certificate
•
After successful extraction, the format of one of the following files is corrupt:
 configuration file (.cgf)
 SW image pointer XML file
 RV Configuration manager X.509 certificate
If the device successfully completed the Artifact downloading, but software download failed, it stops the
ZT procedure, terminates all configuration actions (for example, copying received configuration file to
startup-config) and attempts to access the bootstrap server in intervals between two to four minutes.
If the device successfully completed the bootstrapping phase, but failed during the call-home phase, it
stops the ZT procedure, applies user-default-config to startup-config, saves and reboots. The ZT
procedure is repeated after the reboot. The failure of the call-home is defined according to the following
criteria:
•
The entry in bootstrapServerTable is configured with bootstrapServerRevertiveMode = yes (3)
•
ZT with the bootstrap server is not confirmed by manager (bootstrapServerConfirmCmd is not
set to off (2)) within a timeout of 600 sec.
SecFlow-1p
3. Operation and Maintenance
102
Configuring Off-Net Zero Touch
 To configure ZTC parameters:
1. Navigate to config>mngmnt>access# prompt.
2. Perform the required tasks according to the following table.
Task
Command
Comments
Start Zero Touch
Configuration process after
the next reboot
ztc-after-reboot
Type no ztc-after-reboot to start
ZTC immediately.
Enabling off-net Zero Touch
Configuration with bootstrap
server
ztc-bootstrap [url <url-string>]
[non-revertive] [password
<password-string> [hash]]
Type no ztc-bootstrap to disable
off-net ZTC with bootstrap server.
url-string–URL of the bootstrap
server
non-revertive - SecFlow-1p does
not wait for confirmation of ZTC
process by ztc-bootstrap-confirm
password-string – Bootstrap server
password
Confirming successful
completion of off-line Zero
Touch
ztc-bootstrap-confirm
Disabling off-net Zero Touch
TFTP provisioning
[no] ztc-tftp disable
Note
If ZTC revertive mode is set (by
omitting non-revertive in ztcbootstrap), you need to confirm
successful completion; otherwise,
ZTC process will be initiated again
after rollback.
You have to enable the bootstrapping revertive mode to allow the RADview
configuration manager to confirm the entire ZT process as a part of call-home
phase, before device re-initiate the entire ZT process. Nevertheless, this is an
optional procedure that you may choose not to use.
Example
The following is an example of the configuration required for ZTP.
#===============Define config for ZTP
configure management
==========#
SecFlow-1p
3. Operation and Maintenance
103
access
ztc-bootstrap no-revertive
ztc-tftp-disable
exit all
#===============Define VLAN for Management/Service
configure port
ethernet 1
vlan <WAN_VLAN_ID>
no shutdown
exit all
==========#
configure Router 1
name "Router#1"
dhcp-client
duid-type en
dhcpv6-option-request vendor-specific-information-17
exit
interface 1
bind ethernet 1 vlan <WAN_VLAN_ID>
dhcp
dhcp-client
client-id mac
exit
dhcpv6-client
ipv6-autoconfig
no shutdown
Note
The dhcpv6-option-request vendor-specific-information-17 command in the
above configuration, requests the DHCP server to provide the address of the
bootstrap server to SecFlow-1p.
3.7 Configuration and Management
Usually, initial configuration of the management parameters is performed via an ASCII terminal. Once
the management flows and corresponding router interface have been configured, it is possible to access
SecFlow-1p via NETCONF or SNMP for operation configuration. See Configuring SecFlow-1p for SNMP
Management Access for an example of management configuration. For details on configuring the
router, refer to the Router section in the Traffic Processing chapter.
The following table summarizes management options for SecFlow-1p.
SecFlow-1p
3. Operation and Maintenance
Port
Manager
Location
Transport Method
Management
Protocol
Application
Ethernet
FE/GbE/
10GbE
Local, remote
Inband
SSH
RADview (see Working with
RADview below)
104
Terminal emulation application (see
Working with SSH below)
Note
NETCONF
Third-party NETCONF client
See NETCONF-Based Network
Management below.
SNMP
Third-party NMS (see SNMP-Based
Network Management below)
By default, the terminal, SSH, NETCONF, and SNMP management access
methods are enabled. See Configuring Management Access for details on
how to enable/disable a particular method.
3.8 CLI-Based Configuration
SecFlow-1p supports the RAD-OS CLI engine. CLI sessions should be open remotely, by SSH.
SecFlow-1p supports up to ten concurrent CLI sessions – one local and nine remote.
Working with SSH
You can connect to SecFlow-1p via SSH using a program, such as PuTTY.
Typically, the SSH host is a PC or Unix station with the appropriate suite of TCP/IP protocols.
The management port is the Ethernet port with the highest number, according to the device ordered:
•
6 for 4U2S configurations
•
4 for 2U configurations.
The management interface is set in factory defaults as follows.
For 4U2S (superset) configurations:
interface 32
SecFlow-1p
3. Operation and Maintenance
105
address 169.254.1.1/16
bind ethernet 6
dhcp-client
client-id mac
exit
no shutdown
For 2U configurations:
interface 32
address 169.254.1.1/16
bind ethernet 4
dhcp-client
client-id mac
exit
no shutdown
You can use a SSH host connected directly or via a local area network.
Login
SecFlow-1p supports various access levels to prevent unauthorized modification of the operating
parameters. Refer to User Access in the Management and Security chapter for more information on the
SecFlow-1p
3. Operation and Maintenance
106
access levels, as well as a list of the default users defined in the device and information on configuring
additional users.
Note
The superuser (su) can perform all the activities supported by the SecFlow-1p
management facility.
You can log into your device with your username and password.
If you fail to log in to the terminal five times (due to wrong username or password) in less than five
minutes, from the same IP address, the device does the following:
•
Blocks further login attempts from the same IP for five minutes. Attempts from remote are
answered with immediate TCP reset, without trying to authenticate the user. Blocks any
management protocol from the same IP, such as SNMP and NETCONF, for five minutes.
•
Logs the failed_login event, with the maximum number of attempts exceeded string.
When the locking period is over, the device lifts the block, even if there were further attempts during
this time. Afterwards, you can fail five more attempts before being locked again.
Note
•
•
•
An SNMP access attempt with wrong credentials does not count as a
failed login attempt, and the user is not blocked due to it.
You can display information on recent failed login attempts (of sources
that failed since last being unblocked) by invoking the show failed-loginattempts command (under the management level). Refer to Viewing
Failed Login Attempts in the Management and Security chapter.
<CR> for either username or password is ignored, and is not considered a
failed login attempt.
Logging In
 To log in to SecFlow-1p:
1. At the user prompt (user>), enter the user name and press <Enter>.
The password prompt (password>) appears.
2. Enter the password (default is 1234) and press <Enter>.
The base prompt SF-1p# appears.
Note
You can display a banner at login. Refer to the Administration chapter for
details.
SecFlow-1p
3. Operation and Maintenance
107
Changing Password
It is recommended that you change the users’ default passwords to prevent unauthorized access to the
unit using the special option chngpass. This option is also useful in case the user has forgotten their
password.
 To change/restore a password:
1. At the User prompt (config>mngmnt# user>), enter chngpass and press <Enter>.
2. Enter user as user name and press <Enter> to receive a temporary password. With this
password you can enter as user and change the password to your own.
A key code is displayed.
3. Send the key code to RAD Technical Support department.
RAD technical support department will generate a temporary password which is valid for a
single login.
4. Use this temporary password to log in and set a new permanent user name and password.
Lost Superuser Password
If you have lost your superuser password, contact Technical Support via the RADcare Online portal or by
email.
Using the CLI
The CLI consists of commands organized in a tree structure of levels, starting at the base level. Each level
(also referred to as context) can contain levels and commands (see Navigating for more information on
the levels and commands available in SecFlow-1p). The level is indicated by the CLI prompt.
Note
Most commands are available only in their specific context. Global commands
are available in any context. You can enter ? at any level to display the
available commands.
CLI Prompt
The base level prompt contains the device name, which is SecFlow-1p by default (the device name can
be configured in the system level; refer to Device Information in the Administration chapter). The
prompt ends with $, #, or >, depending on the type of entity being configured and the user level.
SecFlow-1p
3. Operation and Maintenance
108
If a new dynamic entity is being configured, the last character of the prompt is $. Examples of dynamic
entities include flows, QoS profiles, and OAM CFM entities.
If a new dynamic entity is not being configured, the last character of the prompt is > (for tech or user
access levels) or # (for other access levels).
Note
The examples in this manual use # as the last character of the prompt, unless
the creation of a new dynamic entity is being illustrated.
After you type a command at the CLI prompt and press <Enter>, SecFlow-1p responds according to the
command entered.
CLI Inactivity Timeout
If a CLI session is inactive (i.e. no input received) for ten minutes (the default) or the number of minutes
configured in the inactivity timer (refer to timeout and console-timeout configuration in the Control
Ports section of the Management and Security chapter), the device terminates the session and logs the
logout event, with the due to inactivity timeout string.
Navigating
To navigate down the tree, enter the name of the next level. The prompt then reflects the new location.
To navigate up, use the global command exit. To navigate all the way up to the root, enter exit all.
At the prompt, one or more level names separated by a space can be typed, followed (or not) by a
command. If only level names are typed, navigation is performed and the prompt changes to reflect the
current location in the tree. If the level names are followed by a command, the command is executed,
but no navigation is performed and the prompt remains unchanged.
Note
To use show commands without navigating, type show followed by the level
name(s) followed by the rest of the show command.
In the following example, the levels and command were typed together and therefore no navigation was
performed, so the prompt did not change.
configure system date-and-time date-format yyyy-mm-dd
show configure system system-date
2013-06-10
15:08:20 UTC +00:00
In the following example, the levels were typed separately and the navigation is reflected by the
changing prompt.
configure
config# system
config>system# date-and-time
SecFlow-1p
3. Operation and Maintenance
109
config>system>date-time# date-format yyyy-mm-dd
config>system>date-time# exit
config>system# show system-date
2013-06-10
15:13:23 UTC +00:00
config>system#
Full-Path Command
Full-path command allows you to enter a CLI command anywhere in the tree as if the current level was
the CLI root, by preceding the command or level change with a backslash character. The device executes
the command as if it were invoked from the CLI root.
If you enter a level change (preceded by \) without a command, the CLI does not return to the prompt of
the level that the command was invoked from, but remains at the changed level. For example, the
\configure system command, when invoked from any level in the CLI tree, returns the SF1p>config>system# prompt. However, if you enter a level change followed by a command, the system
performs the command and then returns the prompt of the level that the command was invoked from.
For example, if following the command SF-1p>admin>scheduler#, you enter \configure system name
my-device, the latter command sets the device name to my-device and then returns the prompt mydevice>admin>scheduler#.
Note
Before executing a full path command, the CLI engine exits to the CLI root.
Some commands (e.g. ping) behave differently, depending on the location
they were executed from. The following command, for example, would use a
router 1 source address, although executed from router 2:
SF-1p>config>router(2)# \configure router 1 ping 192.168.1.1
Command Tree
The tree command displays a hierarchical list of all the commands in the CLI tree, starting from the
current context.
 To view the entire CLI tree (commands only):
1. At the root level, type tree.
SF-1p# tree
|
+---admin
|
|
|
+---factory-default-all
|
|
|
+---factory-default
|
|
SecFlow-1p
3. Operation and Maintenance
110
|
+---license
|
|
|
|
|
+---license-enable
|
|
|
|
|
+---show summary
|
|
|
|
|
+---show SF-1p-id|
|
|
|
|
+---reboot
|
|
|
+---scheduler
|
|
|
|
|
+---clear-finished-schedules
more..
2. Press <Enter> to see more or <CTRL-C> to return to the prompt.
When adding the detail parameter, the output also includes the parameters and values for each
command.
 To view the CLI tree including all parameters and values:
1. Navigate to the required context by typing level names separated by a space and press <Enter>.
2. Type tree detail and press <Enter>.
config# tree detail
configure
|
+---access-control
|
|
|
+---access-list [{ipv4|ipv6}] <acl-name>
|
|
no access-list <acl-name>
|
|
|
|
|
+---delete <sequence-number>
|
|
|
|
|
+---deny udp <src-address> [<src-port-range>] <dst-address>
[<dst-port-range>] [dscp <dscp-value>] [log] [sequence
<sequence>]
|
|
|
deny tcp <src-address> [<src-port-range>] <dst-address>
[<dst-port-range>] [dscp <dscp-value>] [log] [sequence
<sequence>]
|
|
|
deny icmp <src-address> <dst-address> [icmp-type <icmp-type-number>]
[icmp-code <icmp-code-number>] [dscp <dscp-value>] [log]
[sequence <sequence>]
|
|
|
deny ip [protocol <ip-protocol-number>] <src-address> <dst-address>
3. Press <Enter> to see more or <CTRL-C> to return to the prompt.
SecFlow-1p
3. Operation and Maintenance
Command Structure
CLI commands have the following basic format:
command [parameter]{ value1 | value2 | … | valuen } [ optional-parameter <value> ]
where:
{}
Indicates that one of the values must be selected
[]
Indicates an optional parameter
<>
Indicates a value to be typed by the user according to parameter
requirements
You can type only as many letters of the level, command, or parameter as required by the system to
identify it. For example, you can enter config manag to navigate to the management level.
Special Keys
The following keys are available at any time:
?
List all commands and levels available at the current level.
<Tab>
Command-line completion; complete the unambiguous characters
of the command, and display a list of available commands
beginning with those characters (as when pressing ?).
↑
Display the previous command (history forward).
↓
Display the next command (history backward).
<Backspace>
Delete character before cursor.
<Delete>
Delete character before cursor.
<-
Move cursor one character left.
->
Move cursor one character right.
<Alt>+B, <Esc>+B
Move cursor left one word (or go to start of word).
<Alt>+D, <Esc>+D
Delete until end of word starting from the cursor.
<Alt>+F, <Esc>+F
Move cursor right one word (or go to end of word).
<Ctrl>+<_>
Exit CLI.
or
<Ctrl>+<Shift>+<->
<Ctrl>+A
Move cursor to start of line.
<Ctrl>+B
Move cursor one character left.
<Ctrl>+C
Interrupt current command.
111
SecFlow-1p
3. Operation and Maintenance
<Ctrl>+D
Delete character to right of cursor.
<Ctrl>+E
Move cursor to end of line.
<Ctrl>+G
Return to upper level.
<Ctrl>+H
Delete character to left of cursor.
<Ctrl>+K
Delete text from cursor to end of line.
<Ctrl>+L
Redisplay current line.
<Ctrl>+P
Display the previous command (history forward).
<Ctrl>+Q
Resume transmission (XON).
<Ctrl>+S
Pause transmission (XOFF).
<Ctrl>+U
Delete text up to cursor.
<Ctrl>+W
Delete word to the left of cursor.
<Ctrl>+Y
Paste text last deleted by a shortcut.
<Ctrl>+Z
Navigate to base level.
112
Getting Help
You can get help in the following ways:
•
Type help to display general help (see General Help).
•
Type help <command> to display information on a command and its parameters (see Command
Help).
•
Type ? to display the commands available in the level (see Level Help).
•
Use <Tab> while typing commands and parameters, for string completion (see Command-Line
Completion).
•
Use ? after typing a command or parameter, for interactive help (see Interactive Help).
General Help
Enter help at any level to display general CLI help, including:
•
Short description of CLI interactive help
•
Commands and levels available at the current level
•
Globally available commands
•
CLI special keys (hotkeys)
SecFlow-1p
•
Output modifiers for filtering output
•
URLs for device manual and shelf view manual
3. Operation and Maintenance
Example of help command output from the root level:
1. Full help - 'help <cmd>'.
2. To complete level name, command, keyword, argument - <tab> ('conf<tab>' =>
'configuration').
3. To display all currently valid levels, commands, keywords or arguments '?' ('name ?' => '<name-of-device>').
Commands and levels:
admin
+ Administrative commands
configure
+ Configure device
file
+ File commands
logon
- Logon as Debug user
on-configuration-error
- Behavior for configuration error
Global commands:
copy
- Copy file
echo
- Displays a line of text (command) on the
screen
exec
- Execute script of CLI commands
exit
- Returns to the next higher command level
(context)
help
- Displays information regarding commands
in the current level
history
- Displays the history of commands issued
since the last restart
info
- Displays the current device configuration
level-info
- Displays the current device configuration
- commands from the current level only
logout
- Logs the device off
ping
- Ping
[no] popup-suspend
- Suspends popup messages
save
- Save current settings
[no] schedule
- Schedule a command to run in a future
time
trace-route
- Traceroute
tree
- Displays the command levels from the
current context downwards
Hotkeys:
Ctrl-H, Del, Backspace
-Delete character left of cursor
Ctrl-D
-Delete character right of cursor
Ctrl-U
-Delete text up to cursor
Ctrl-K
-Delete text from cursor to end of line
Ctrl-W
-Delete word left of cursor
Alt-D, Esc-D
-Delete word right of cursor
Ctrl-Y
-Paste last deleted text
Tab
-Completion token
?
-Interactive help token
Ctrl-P, Up arrow
-History forward
Down arrow
-History backward
Ctrl-B, Left arrow
-Move cursor left one character
113
SecFlow-1p
3. Operation and Maintenance
Right arrow
-Move cursor right one character
Ctrl-A
-Move cursor to beginning of line
Ctrl-E
-Move cursor to end of line
Alt-B, Esc-B
-Move cursor left one word
Alt-F, Esc-F
-Move cursor right one word
Ctrl-L
-Redisplay current line
Ctrl-S
-Pause transmission (XOFF)
Ctrl-Q
-Resume transmission (XON)
Ctrl-C
-Interrupt current command
Ctrl-G
-Return to upper level
Ctrl-Z
-Return to CLI root
Ctrl-_
-Exit CLI
Output Modifiers (usage: 'command | modifier'):
begin <regular-expression>
-Start printing once expression found
exclude <regular-expression>
-Print lines not containing expression
include <regular-expression>
-Print lines containing expression
Show commands can be printed repeatedly by appending 'refresh' to them
SF-1p Installation and Operation Manual
: https://www.rad.com/docs/877
Command Help
Enter help <command> to display command and parameter information.
config>system# help name
- name <name-of-device>
- no name
<name-of-device> : Device name [0..255 chars]
Level Help
Enter ? at the command prompt to display the commands available in the current level.
file# ?
delete
dir
show
show
show
show
show
show
show
show
show
banner-text
configuration-files
copy
factory-default-config
rollback-config
schedule-log
startup-config
sw-pack
user-default-config
- Delete file
- Display file directory
-
Display banner
Displays configuration files properties
Display Copy progress
Display factory-default-config
Display rollback-config
Display schedule-log
Display startup-config
Display SW packs
Display user-default-config
114
SecFlow-1p
3. Operation and Maintenance
115
Command-Line Completion
Command-line completion saves you command-line entry time and reminds you the syntax of
command-line entities (levels, commands, parameters, and profiles).
In a command-line, SecFlow-1p completes command-line entities, when you press <Tab> immediately
following a string (one or more characters).
Some user-defined entity names can be completed as well. If you enter an entity name that does not
exist in the database, SecFlow-1p creates this entity with the selected name.
•
If the command-line entity name can be completed in only one way, when you press <Tab>,
SecFlow-1p autocompletes the entire name and appends a space.
•
If the command-line entity name can be completed in more than one way, SecFlow-1p appends
the characters that are common to all possibilities, and displays a list of the completion
possibilities beginning with those characters.
•
If the string is already a complete entity name (level/command/parameter/ profile) or cannot be
completed to a complete name, no completion is done.
•
Pressing <Tab> following a complete command name (followed by a space), displays a list of
available command arguments, if they exist (same behavior as ?).
•
Pressing <Tab> following a string and a space returns a CLI error: Ambiguous Command. This is
because the string entered could be completed to more than one command and is therefore
ambiguous.
•
Pressing <Tab> at the beginning of a command line behaves like a regular tab, and unlike ?, does
not display a list of available commands.
The following tables show examples of string completion.
Level
String
Possibilities for Completion
Result After Pressing <Tab>
file
show c
show configuration-files
show copy
show co
file
show con
show configuration-files
show
configuration-files<space>
config>sys
name
name
name
config
mgm
No possibilities
mgm
SecFlow-1p
3. Operation and Maintenance
116
Interactive Help
To get interactive help, type ?.
In general, typing a ? directly after a string displays possibilities for string completion, while typing
<space> and then a ? displays possibilities of the next argument.
When a <CR> appears in a ? list, the string you entered is itself a valid command needing no further
additions. Pressing <Enter> executes the command or navigates to the indicated level.
Typing ? immediately after a command or partial command with no space before the ?, tells SecFlow-1p
to display all possibilities for completing the string. Help output is always followed by the string you
typed with the cursor at the end of the string waiting for input.
config>system# date?
date-and-time
config>system# date
admin# fact?
factory-default-all
factory-default
- Configure date and time
- Return to factory default and reboot
- Return to factory default configuration and
reboot
admin# fact
admin# factory-default?
factory-default-all
- Return to factory default and reboot
<CR>
admin# factory-default
Current configuration will be erased and device will reboot with factory default
configuration. Are you sure
? [yes/no] _
When a string cannot be completed, SecFlow-1p displays “cli error: Invalid Command”.
admin# stac?
# cli error: Invalid Command
admin# stac
file# da ?
# cli error: Invalid Command
file# da
Typing <?> after a space between a command or level name and the ? tells SecFlow-1p to display
possibilities of the next argument. If the string preceding the ? is ambiguous or invalid, an explanatory
message is displayed. The string does not have to be a complete command.
If there is only one possible command starting with that string, pressing <Enter> will execute the
command. If there is more than one command that starts with the string, the CLI displays a message
that it can’t clarify which command you want.
admin# factory?
factory-default-all
- Return to factory default and reboot
SecFlow-1p
3. Operation and Maintenance
factory-default
117
- Return to factory default configuration
and reboot
A command followed by a ? without a space, shown above, returns a list of possible completions. The
same command followed by a space and then ? returns an ambiguous command message. This means
the string entered could be completed to more than one command and is therefore ambiguous, as
shown below.
admin# factory ?
# cli error: Ambiguous Command
admin# factory
A string that is a complete command name followed by a space ? displays all possible command
parameters.
The next example shows a complete command to which a parameter could be appended. It also shows
how a string that is a complete command is executed by pressing <CR>, or <Enter>.
config>reporting# pm-collection system interval ?
<seconds>
: Duration [1..900]
Scheduling CLI Commands
You can schedule the execution of CLI commands at a future date and time. By default, no scheduling is
configured.
The global schedule command is used to configure the scheduling of a command. You can specify any
command to be scheduled except the logout command.
When you schedule a command, before saving it, SecFlow-1p prefixes the command with the path from
which the schedule command was executed. To specify a CLI command with a full CLI level path, you
should schedule it at the CLI root level.
SecFlow-1p tests the command that is configured as scheduled in the same way that it would be tested
when executed; if the tests fail, you are notified of this, but the command is still scheduled, since it may
be valid when the scheduled time arrives.
The following types of schedules can be configured:
In <minutes>
Executed once, after the specified number of minutes. This type of
schedule is not saved in nonvolatile (permanent) SecFlow-1p
memory; it is deleted at device reboot whether or not it was
executed.
At <date-and-time>
Executed once at the specified date and time. This type of schedule
can be optionally saved in permanent memory, in order to be
available after device reboot.
SecFlow-1p
Note
3. Operation and Maintenance
118
Schedules for date and time are saved in system local time. If the local time
changes, SecFlow-1p does not modify the schedules to compensate for the
change; therefore, changing the time can cause schedules to be executed
twice or not executed at all.
Schedules are marked as finished after they are executed.
When executing scheduled commands, SecFlow-1p assumes a Yes answer for any confirmation
questions. When a scheduled command is executed, it is sent to TACACS+ and Syslog accounting, as if it
were executed by a CLI user.
Configuring Command Scheduling
 To schedule a command:
•
In any level, enter the schedule command according to the type of schedule:
 In <minutes> – Enter:
schedule <name> in <minutes> [repeat-forever] “<command>”
The schedule is saved with its name set to <name>, and the specified <command> is executed
after the specified amount of <minutes> has elapsed, regardless of changes to the local system
time.
Range for <minutes>: 1–14400 [10 days]
repeat-forever: Repeat schedule at specified intervals forever.
 At <date-and-time> – Enter:
schedule <name> at {january | february | march | april | may | june | july | august |
september | october | november | december} <dd> <yyyy> <hh>:<mm> <command>
[volatile | nonvolatile]
The schedule is saved with its name set to <name> (in permanent memory if nonvolatile was
specified), and the specified <command> is executed at the specified date and time. If the local
system time is changed after the schedule is configured, the scheduled command might not be
executed, or might be executed twice.
Note
An invalid date and time is not allowed; however, a date and time in the past
is allowed; a schedule with its date and time in the past will never be executed
unless the device date/time is changed such that the schedule date and time is
no longer in the past
SecFlow-1p
3. Operation and Maintenance
Note
Schedules can be added or deleted, but not changed. If you wish to
change the details of a schedule, you have to delete it and then
recreate it with the changes.
 To delete schedules:
•
To delete a specific schedule, in any level enter:
no schedule <name>
•
To delete all finished schedules, navigate to the admin scheduler level and enter:
clear-finished-schedules
Viewing Scheduling Information
You can view the following scheduled information:
•
Commands, with or without details of the commands
•
Daylight saving time (For an explanation on the configuration of daylight saving time, refer to
Daylight Saving Time)
Note
You can also enter the info command from the root of the device to view all
commands of the device, including scheduled commands (see Viewing the
Device Configuration below).
 To view scheduling without command details:
•
119
Navigate to the admin scheduler level and enter:
show scheduler
admin scheduler
admin>scheduler# show scheduler
Current date:
13 June 2017
09:36:55
UTC
+00:00
Schedule Name
Type
Prm Fin Activation
--------------------------------------------------------------reportpm
Once (In) No Yes -schedulepm
Once (In) No Yes -Syslogfacility
Once (In) No No
0 day(s),
Summer Time
Start (Date) : 21 June 2017 01:00
End
(Date) : 27 October 2017 12:59
Offset
: 60
00:04:03
SecFlow-1p
3. Operation and Maintenance
Reboot is not scheduled
 To view scheduling with command details:
•
Navigate to the admin scheduler level and enter:
show scheduler-details
admin scheduler
admin>scheduler# show scheduler-details
Current date:
13 June 2017
09:40:00
Schedule Name
Type
Permanent
Finished
Activation In(Seconds)
:
:
:
:
:
UTC
+00:00
reportpm
Once (In)
No
Yes
--
Command : configure system date-and-time config reporting pm
Schedule Name
Type
Permanent
Finished
Activation In(Seconds)
:
:
:
:
:
schedulepm
Once (In)
No
Yes
--
Command : config reporting pm
Schedule Name
Type
Permanent
Finished
Activation In(Seconds)
:
:
:
:
:
Syslogfacility
Once (In)
No
No
0 day(s), 00:00:38
Command : configure system syslog device facility local1
Summer Time
Start (Date) : 21 June 2017 01:00
End
(Date) : 27 October 2017 12:59
Offset
: 60
Reboot is not scheduled
120
SecFlow-1p
3. Operation and Maintenance
121
Scheduling Display Parameters
Parameter
Description
Current date
Current date and time, and current offset from UTC
Schedule Name
Name of schedule
Type
Type of schedule:
• Once (In) – to be executed in specified number of minutes
• Once (At) – to be executed at a specified date and time
Prm/Permanent
Indicates if schedule is saved in permanent memory
Fin/Finished
Indicates if schedule is marked as finished
Activation
In output of show scheduler, indicates the amount of time before the scheduled
command will be executed, according to the type of schedule:
• Once (In) – Amount of time before the scheduled command will be executed, in the
form <hh:mm:ss>, <1 day hh:mm:ss> or <ddd days, hh:mm:ss>
• Once (At) – Date and time at which the scheduled command will be executed
• For either type, -- is displayed if the schedule is marked as finished.
Activation (Local
Time)
In output of show scheduler-details for schedule type Once (At), displays the date and
time at which the scheduled command will be executed.
Activation In
(Seconds)
In output of show scheduler-details for schedule types Once (In) and Once (At), displays
the amount of time before the scheduled command will be executed.
Command
In output of show scheduler-details, displays the scheduled command.
Start (Date)
For one-shot daylight saving time scheduling, displays daylight saving time start date and
time.
End (Date)
For one-shot daylight saving time scheduling, displays daylight saving time end date and
time.
Start (Recurring)
For recurring daylight saving time scheduling, displays the configured week of the
month, weekday, month, and time for daylight saving time start.
End (Recurring)
For recurring daylight saving time scheduling, displays the configured week of the
month, weekday, month, and time for daylight saving time end.
Start
For recurring daylight saving time scheduling:
• If the device is currently not in daylight saving time, displays the next scheduled date
and time for daylight saving time to start.
• If the device is currently in daylight saving time, displays the date and time at which
the daylight saving time started.
End
For recurring daylight saving time scheduling, displays the next scheduled date and time
for daylight saving time end.
SecFlow-1p
3. Operation and Maintenance
Parameter
Description
Offset
Number of minutes to move the clock during daylight saving time
122
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a command scheduling
configuration error is detected.
Message
Cause
Corrective Action
Schedule with this name
already configured
You tried to create a new schedule
with a name that is used by an
existing schedule.
Specify a name that is not being used by
an existing schedule.
Warning: Scheduled
command failed sanity
The command that you specified to
schedule may fail when executed.
Check the command; if changes are
needed, delete the schedule and
re-enter it with the changed command.
The logout command may
not be scheduled
You specified the logout command as
the command to schedule.
None. You are not allowed to schedule
the logout command.
Viewing the Device Configuration
You can enter the info command at the device root, to view all commands that have been configured for
the device. This includes scheduled commands, as they are global commands. See an example in the
Examples below.
 To view commands of a device:
•
At the device root, type info.
Refreshing Output
You can specify that SecFlow-1p should periodically refresh the output of a show command.
 To periodically refresh the output of a show command:
•
Append refresh [<sec>] to the command. The allowed range for <sec> is 3–100 seconds (default
is 5 seconds).
SecFlow-1p
3. Operation and Maintenance
SecFlow-1p enters refresh mode and displays the output of the command periodically, along
with an indication of how to exit refresh mode, at the interval specified by <sec>. You cannot
enter any commands while SecFlow-1p is in refresh mode.
To exit refresh mode, type <ESC> or <Ctrl>+C.
The example below shows the result of refreshing the RADIUS statistics every 15 seconds, and typing
<Ctrl>+C after the status is displayed twice.
config# show management radius statistics refresh 15
Server 1
Server 2
Server 3
Server 4
--------------------------------------------------------------Access Requests
0
0
0
0
Access Retransmits
0
0
0
0
Access Accepts
0
0
0
0
Access Rejects
0
0
0
0
Access Challenges
0
0
0
0
Malformed Response
0
0
0
0
Bad Authenticators
0
0
0
0
Pending Requests
0
0
0
0
Timeouts
0
0
0
0
Unknown Types
0
0
0
0
Packets Dropped
0
0
0
0
Counter Discontinuity 0
0
0
0
To exit the refresh-mode press ESC or Ctrl+C
Filtering Output
Some commands, such as info and show display large amounts of information as their output. It is
possible to control the type and amount of information displayed, by filtering the output.
To filter a command’s output, append to the command:
| [include | exclude | begin] <filter-expression>
Keyword
Description
include
The output includes only lines that match the filter expression.
exclude
The output includes only lines that do not match the filter
expression.
begin
The output starts with the first line that matches the filter
expression and continues with all further lines.
<filter-expression>
A filter expression is a regular expression that defines what to
exclude, include or match at the beginning. Filter expressions can
contain letters, numbers, and metacharacters (see below). Filter
expressions are case sensitive.
One and only one keyword is allowed. If no keyword is specified, no filtering is performed.
123
SecFlow-1p
3. Operation and Maintenance
124
The following example illustrates filtering output.
config>system# info detail | include date
date-and-time
date-format yyyy-mm-dd
Metacharacters
Metacharacters are characters with special meaning. They allow you to define filter criteria, while not
being part of the filter criteria themselves. Some are placeholders or wildcards. Some allow you to
define ranges of characters to either include or exclude. You can construct complex filter expressions to
see the exact output you want. The following table describes filter metacharacters.
Metacharacter
Description
Example
.
Matches any single character.
r.t matches the strings rat, rut, and r t, but not
root.
$
Matches the end of a line.
device$ matches the end of the string header
device but not the string header device-name.
^
Matches the beginning of a line.
^device matches the beginning of the string
device loaded from but not the string header
device-name.
*
Matches zero or more occurrences of
the preceding character.
.* means match any number of any characters.
\
This character is used to treat the
following metacharacter as an
ordinary character.
\$ is used to match the $ character rather than
match the end of a line.
Matches any one of the characters
between the brackets.
r[aou]t matches rat, rot, and rut, but not ret.
Ranges of characters are specified by
a beginning character (c1), a hyphen,
and an ending character (c2); multiple
ranges can be specified as well.
[A-Za-z] matches any upper or lower case
letter.
[]
[c1-c2]
[^c1-c2]
To match any character except those
in the range, use ^ as the first
character after the opening bracket.
|
Logical OR two conditions together
\. is used to match a period rather than match
any single character.
[0-9] matches any digit.
[^269A-Z] matches any character except 2, 6, 9,
and uppercase letters.
(band|comp) matches the lines bandwidth cir
999936 cbs 65535 and compensation 0.
SecFlow-1p
3. Operation and Maintenance
125
Metacharacter
Description
Example
+
Matches one or more occurrences of
the character or filter expression
immediately preceding it.
9+ matches 9, 99, and 999
“”
Matches the string enclosed in the
quotation marks. The string may
include spaces. See Regular
Expression Syntax.
“e s” matches "double star"
{i}
Matches a specific number (i) or
range (i through j) of instances of the
preceding character.
A[0-9]{3} matches A followed by exactly three
digits, i.e. it matches A123 but not A1234.
{i,j}
[0-9]{4,6} matches any sequence of 4, 5, or 6
digits.
Regular Expression Syntax
A filter expression is a regular expression. A regular expression can be composed of characters and
metacharacters. Any combination of metacharacters can be used. If you want spaces as part of the filter
expression, enclose the expression with quote metacharacters. All characters found after a space not
enclosed by quotes are ignored by the CLI.
The following table provides some example of regular expressions and the resulting string that will be
used to filter the CLI output.
Regular Expression
Resulting Filter String
“str”
str
“s t r”
str
“str
“str
“str\”str”
str”str
“str\”str
“str\”str
“str”str
str
\”str”
\”str”
“str1” | include str2
First expression – str1, second expression – str2
SecFlow-1p
3. Operation and Maintenance
126
Enabling Entities
Some dynamic entities are created as inactive by default. After the configuration is completed, the
no shutdown command activates the entity, as shown below.
configure system syslog device
config>system>syslog(device)# severity-level critical
config>system>syslog(device)# no shutdown
config>system>syslog(device)# exit
config>system#
The shutdown command is also used to deactivate/disable a hardware element (such as a port), while
no shutdown enables/activates it.
Using Scripts
CLI commands can be gathered into text files. They may be created using a text editor, by recording the
user commands or by saving the current configuration.
These files can be configuration files or scripts. Configuration files have specific names and contain CLI
commands that SecFlow-1p can use to replace the current configuration, while scripts contain CLI
commands that add to the current configuration. Configuration files can be imported from and exported
to RAD devices via file transfer protocols.
For more information on configuration files, refer to the description in the Administration chapter.
In order to execute a CLI script, you have to copy/paste it to the CLI terminal, or send it to SecFlow-1p
via the RADview Jobs mechanism, CLI script option.
To execute a script, run the commit command.
Examples
 To schedule shutdown of the syslog device in five minutes:
config>system>syslog(device)# schedule sched1 in 5 "shutdown"
 To schedule copying a log file in two hours:
schedule sched-copy-2hrs in 120 “copy log tftp://1.1.1.1”
SecFlow-1p
3. Operation and Maintenance
127
 To schedule copying a log file on April 2 at 6:00, with the schedule saved in permanent memory:
schedule sched-copy-Apr2 at april 2 2015 06:00 “copy log tftp://1.1.1.1” permanent
save
 To display commands configured for the device (including scheduled shutdown command):
SF-1p# info
configure
echo "System Configuration"
#
System Configuration
system
date-and-time
date-format mm-dd-yyyy
echo "NTP (Network Time Protocol)"
#
NTP (Network Time Protocol)
ntp
server 1
exit
exit
summer-time date june 21 2017 01:00 october 27 2017 12:59
exit
schedule "sched1" in 5 "configure system syslog device shutdown"
3.9 Web-based Configuration
Logging In
You can configure and manage SecFlow-1p locally or remotely using its web interface. Supported
browsers are the following:
• Google Chrome
•
Microsoft Internet Explorer
•
Microsoft Edge
•
Apple Safari
•
Mozilla Firefox
SecFlow-1p
Note
3. Operation and Maintenance
128
To prevent configuration errors, flush the browser’s cache whenever you
return to the same screen.
 If you have trouble with the web interface:
•
Enable scripts.
•
Make sure that local and organizational firewalls allow access to the destination IP address.
•
Disable pop-up blocking software, such as Google Popup Blocker. You may also have to
configure spyware and adware protecting software to accept traffic from/to the destination IP
address.
 To log into SecFlow-1p via the web interface:
1. In the web browser, navigate to the SecFlow-1p IP address, using HTTPS protocol (https://).
The SecFlow-1p login prompt appears.
2. Enter the relevant credentials (see Login), and click <Login>.
The main menu is displayed.
You can log out by clicking the
icon on the top right. After 5 minutes of user inactivity, the logout is
performed automatically, and you are returned to the login page.
If you have lost your superuser password, contact Technical Support via the RADcare Online portal or by
email.
Navigating the Web Interface
You can navigate between the dialogs using the following methods:
•
Navigation tree (on the left of the screen)
•
Top path
•
Web browser ‘Back’ and ‘Forward’ controls
•
Clicking on an entry in a table
•
Creating a new entry in a dynamic table
A navigation tree is displayed on the left, as shown below. The tree featuring expandable/collapsible
branches is organized according to the CLI hierarchy.
SecFlow-1p
3. Operation and Maintenance
129
To see clearer the configuration parameters on the right, you can hide (and restore) the navigation tree
using the
button in the upper part of the screen.
The navigation tree contains two types of icons.
SecFlow-1p
This type of icon denotes a simple menu item
corresponding configuration screen.
This type of icon denotes a menu
the arrow on the right.
3. Operation and Maintenance
130
that should be pressed to open the
that can be expanded to submenus using
In addition to these submenus, there are also general parameters that can be configured by selecting
this option.
SecFlow-1p
3. Operation and Maintenance
131
Graphical Controls
The WEB GUI commands are similar to the CLI commands with the following main differences:
•
A CLI action command is presented by a button.
•
A Boolean CLI command (command with a no-form but without arguments) is presented by a
check-box (with “shutdown” is an exception and presented as pull-down menu).
•
A CLI command with a no-form and one or more arguments is presented as a check-box (for the
no-form) and the appropriate fields for the arguments
You can toggle between light and dark screen modes by clicking
The ‘Save’ button
and
buttons.
in the top right corner copies the running-config to the startup-config.
The ‘Reboot’ button
in the top right corner is used to reboot the device. When clicked, the
following display appears:
Click “Reboot Now” to confirm.
Dynamic Tables
Dynamic tables are used in screens serving to add and remove entries. For example, in the screen below
you can add SNMP users.
SecFlow-1p
3. Operation and Maintenance
132
Clicking on an ‘Add (…)’ button opens a new dialog (navigation) with the parameters and information of
the selected entity. Fill in the fields of the new entry.
Two buttons, ‘Submit’ and ‘Cancel’ act as follows:
•
‘Submit’ – commits the data entered so far in the dialog to the device and opens a new dialog
(navigation) with the parameters and information of the selected entity. In the case of failure,
an error message is displayed.
•
‘Cancel’ – clears the data entered so far in the dialog (reads again the current configuration from
the device).
SecFlow-1p
3. Operation and Maintenance
Containers (LXD)
This menu option opens the Containers web page that allows you to configure virtualization in
SecFlow-1p. Using Containers, you can create and edit instances, images and profiles. For more
information, refer to Containerization chapter.
Firewall
This menu option activates RAD firewall and data filtering application. For more information, refer to
Zone-based Stateful Firewall.
133
SecFlow-1p
3. Operation and Maintenance
134
3.10 SNMP-Based Network Management
Configuring SecFlow-1p for SNMP Management Access
SecFlow-1pcan be managed via SSH or by any SNMP-based network management station (NMS),
provided you preconfigure the basic parameters using a terminal connected to the SecFlow-1p control
port.
In the case that SecFlow-1p is to be managed by the RADview family of network management stations,
IP communication must be established with the management station, as well as with the standalone
RADview stations.
 To configure SecFlow-1p for management access:
1. Add a router interface, bind it to the Ethernet port, and add a static route to the next hop.
#*********************Configuring_Router_Interface*************
configure router 1
interface 1
bind Ethernet 1
address 172.18.141.39/24
no shutdown
exit
static-route 172.17.0.0/16 address 172.18.141.1
exit all
save
Working with RADview
RADview is a Windows- or Linux-based modular, client server, scalable management system that can be
used in a distributed network topology or single-station configuration. RADview features Element
Manager System (EMS) functionality (referred to as ‘system’) and the following optional modules:
RADview is a Windows- or Linux-based modular, client server, scalable management system that can be
used in a distributed network topology or single-station configuration. RADview features Element
Manager System (EMS) functionality (referred to as ‘system’) and the following optional modules:
•
Domain Orchestrator –creates, configures, and manages virtual machines and containers within
RAD’s customer edge devices.
•
Service Manager (SM) – end-to-end intuitive, error-free Carrier Ethernet service provisioning for
Ethernet and TDM products; calculates the shortest path.
SecFlow-1p
•
3. Operation and Maintenance
135
Performance Monitor (PM) – portal for service SLA monitoring for both carriers and their
customers.
RADview supports the following optional modules and functionalities for SecFlow-1p products, as
described in the following table:
Modules/Functionalities
SecFlow-1p
Element Management System
(EMS)
-
Service Manager (SM)
-
Performance Monitor (PM)

D-NFV Orchestrator
Container Management
Tasks

Faults

Shelf View
-
3.11 NETCONF-Based Network Management
This feature is applicable to all SecFlow-1p versions.
For a full explanation and instructions on how to configure and monitor the device using NETCONF, see
the NETCONF-Based Network Management chapter below.
3.12 Turning Off the Unit
 To power off the unit:
•
Remove the power cord from the power source.
4 Ports
SecFlow-1p supports the following port types:
•
Physical: Ethernet (including SFP), Cellular
•
Virtual and internal Ethernet
•
VLAN
 To display the operational summary for all ports:
1. At the prompt config>port#, enter:
show summary
The ports operational status is displayed.
config>port# show summary
Panel
Name
Admin Oper
Speed
----------------------------------------------------------------------------Ethernet 1
Ethernet 1
Down
Down
0
Ethernet 2
Ethernet 2
Down
Down
0
Ethernet 3
Ethernet 3
Up
LLD
0
Ethernet 4
Ethernet 4
Up
Up
1G
Ethernet 5
Ethernet 5
Up
LLD
0
Ethernet 6
Ethernet 6
Up
LLD
0
Ethernet wan-switch Ethernet wan-switch
Up
Up
0
Ethernet lan-switch Ethernet lan-switch
Up
Up
0
Cellular lte
Cellular lte
Down
Down
0
WLAN 1
WLAN 1
Up
Up
0
WLAN 2
WLAN 2
Up
Up
0
Virtual 1
Virtual 1
Down
Down
0
Virtual 2
Virtual 2
Down
Down
0
Virtual 3
Virtual 3
Down
Down
0
Virtual 4
Virtual 4
Down
Down
0
Virtual 5
Virtual 5
Down
Down
0
Virtual 6
Virtual 6
Down
Down
0
Virtual 7
Virtual 7
Down
Down
0
Virtual 8
Virtual 8
Down
Down
0
Virtual 9
Virtual 9
Down
Down
0
Virtual 10
Virtual 10
Down
Down
0
SecFlow-1p
4. Ports
4.1 Cellular Ports
SecFlow-1p supports the cellular modem interface (LTE module) in both PPP and Eth/DHCP modes of
operation.
Applicability and Scaling
This feature is applicable to SecFlow-1p with LTE ordering options.
Standards Compliance
ETSI TS 127 060 (3GPP TS 27.060)
3GPP TS 29.061
RFC 1661
The Point-to-Point Protocol (PPP)
3GPP TS 23.060
Functional Description
Packet Domain Access Interfaces and Reference Points
The following figure shows the packet domain access interfaces and reference points.
137
SecFlow-1p
4. Ports
138
In the above diagram, the Cellular dongle is the Modem Termination (MT), and the Terminal Equipment
(TE) is the SecFlow-1p cellular interface.
The cellular interface also includes configuration for the cellular modem (MT), such as the pin code.
IP-Based Services
In a mobile network using Long Term Evolution (LTE) architecture, bearers are the tunnels used to
connect the user equipment to Packet Data Networks (PDNs) such as the Internet. In practice, bearers
are concatenated tunnels that connect the user equipment to the PDN through the Packet Data
Network Gateway (P-GW).
3G PPP supports bearers (tunnels) with IP-based services.
The SecFlow-1p cellular interface supports two IP-based service modes:
•
PPP relay mode – Underlying Layer-2 is PPP.
•
Ethernet/DHCP mode – Underlying Layer-2 is Ethernet.
PPP Relay Mode
The following figure illustrates IP bearer in PPP relay mode.
SecFlow-1p
4. Ports
139
IP-Based Services: PPP Mode
In this mode, PPP is negotiated between Terminal Equipment (TE) and the modem with Link Control
Protocol (LCP) and Internet Protocol Control Protocol (IPCP) to obtain the interface IP address.
As TE transmits an IPCP request from an IP address, the modem relays this request to the network, and
as soon as it receives an answer, it responds to TE.
After the establishment of the connection, data is transmitted in PPP frames.
Note
SecFlow-1p supports PPP negotiation of IPv4 addresses only.
PPP negotiation is illustrated in the following figure.
SecFlow-1p
Ethernet/DHCP Mode
The following figure illustrates IP bearer in Ethernet/DHCP mode.
4. Ports
140
SecFlow-1p
4. Ports
141
In this mode, TE opens a transparent channel to the GGSN and obtains its IP address by DHCP with the
GGSN. After the IP address is obtained, the channel is used for data transfer over Ethernet packets.
Note
SecFlow-1p supports DHCPv4 for IPv4.
The following diagram illustrates DHCPv4 negotiation.
SecFlow-1p
4. Ports
142
Cellular Interface IP Address
As part of the network synchronization process, the modem cellular interface obtains dynamically an IP
address from the network.
Receive Signal Strength Indicator (RSSI)
RSSI measures in a single figure both the usable signal and the noise (in dBm), with -50 a perfect signal
and -120 when you fall off the network.
•
High signal: -50 to -75 dBm
•
Medium signal: -76 to -90 dBm
SecFlow-1p
•
Low signal: -91 to -100 dBm
•
Poor signal: -101 to -120 dBm
4. Ports
Cellular Group (Dual SIM) Protection
Cellular interface supports dual SIM protection. Each of the SIM cards may operate in a different
operation mode (PPP relay or IP).
Once enabled (cellular group set to ‘no shutdown’), the redundancy mechanism will select which SIM
would be the active one.
The redundancy mechanism is operating according to the following scheme:
1. The Primary and Secondary interfaces are assigned by the user.
2. The device tries to connect to the Primary interface.
3. The device disconnects from the primary interface upon the following events:
 SIM failure (see ‘SIM failure’ definition below) declared after reconnect tryouts during
‘connect-timeout’ time
 Interface (SIM) shutdown
4. The modem is reset and tries to connect to the secondary interface. Once connected:
 If revertive mode is configured, the device is reset and tries to move back to the primary
interface upon time-to-revert expired
 If non-revertive is considered, the device is reset and tries to move back to the primary
interface upon the secondary interface failure.
143
SecFlow-1p
4. Ports
144
Once the active cellular interface is changed, the Router Interface IP address is deleted, and a new IP
address is learned from the new active cellular interface.
The SIM failure is declared upon on of the following:
• Oper status is ‘Down’
•
No registration or registration denied for ‘connect-timeout’ period (the device could not
reconnect)
•
RSSI is below the minimum threshold for ‘connect-timeout’ period
•
No IP is retrieved from cellular network for ‘connect-timeout’ period (the device could not
reconnect)
Dual Modems
The devices supporting two modems (according to the ordering options) feature dual modem
functionality. 4.1In this mode each of the two modems is represented by a dedicated SIM and can
connect to another cellular network or cellular provider. 4.1The two modems are working
simultaneously and independently from one another. 4.1Each of the modems is bound to a different IP
interface (Router Interface).
SecFlow-1p
4. Ports
145
The two modems are always ‘ON’, the traffic redirection and redundancy mechanisms are at the IP level.
The configuration refers to the cellular interface in the case of Dual modem in the following way:
•
Modem 1: ‘lte-1’
•
Modem 2: ‘lte-2’
Factory Defaults
By default, cellular ports have the following configuration.
Parameter
Description
Default Value
radio-access-technology
2G/3G/4G access permissions
radio-2g
dialer-number
Cellular network dialer number
*99#
name
Cellular interface name
cellular#1
pin
SIM PIN code
0
queue-group
Attaching queue group profile to the
port
no queue-group
rssi-threshold
RSSI thresholds for TCA event
-100 (lower threshold) -90
(higher threshold)
shutdown
Disconnect/connect modem from
cellular network
shutdown
SecFlow-1p
4. Ports
Parameter
Description
Default Value
shutdown
shutdown/no shutdown of the
cellular protection group
shutdown
revertive/non-revertive
Revertive mode for the protection
group
revertive
time-to-revert (minutes)
The time to stay on the secondary
cellular interface before trying to
reconnect back to primary (revertive
mode)
240
connect-timeout (sec)
Time of the failure persisting before
switching to the standby SIM
30
146
Configuring a Cellular Port
 To configure the cellular interface:
1. Configure the cellular interface parameters (see below).
2. If one of the SIM’s operates in Ethernet/DHCP mode, configure the router interface with DHCP
enable (refer to Configuring Router Interfaces).
3. Bind the cellular interface to the router interface (refer to Configuring Router Interfaces).
 To configure the cellular port parameters:
1. Navigate to the following:
 configure port cellular lte to configure the single cellular port
 configure port cellular lte-1 to configure the first cellular port for a dual modem device
SecFlow-1p

4. Ports
147
configure port cellular lte-2 to configure the second cellular port for a dual modem device.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring the cellular
protection level
cellular-protection
See Configuring Cellular Protection
Clearing cellular interface
counters of the active SIM
clear statistics
Configuring cellular
interface name
name <interface-name>
no name <interface-name>
interface-name – cellular interface
name; character string
Configuring cellular
modem operation mode,
either single SIM (#1 or #2)
or dual SIM protection
mode
mode {dual-sim | sim { 1 |
2}}
Default: dual-sim
Configuring the sim level
sim
See Configuring the SIM level
Displaying the cellular
connection status of the
active SIM
show status
Saving/removing the
Network Connectivy
configuraton
no shutdown
shutdown
• no shutdown – The Network
Connectivy configuration is saved;
used later to configure PPP or WWAN
when binding the interface to an
upper layer interface (such as Router
Interface).
• shutdown – The Network Connectivy
configuration is removed.
Note: When the Network Connectiviity
configuration is removed, the oper status
alarm turns on; and when it is saved, the
alarm turns off.
Configuring Cellular Protection
If you selected the dual-sim mode, you can configure the following cellular protection parameters.
SecFlow-1p
4. Ports
148
 To configure cellular protection:
1. At the prompt config>port>cellular(<port-index>)#, enter:
cellular-protection
The system switches to the cellular-protection context.
2. Perform the required tasks according to the following table.
Task
Command
Comments
Select revertive or non revertive
SIM redundancy scheme
[no] revertive
Traffic is switched back to the primary
port after it recovers.
no revertive sets the port recovery mode
to non-revertive. Traffic continues being
transmitted over the secondary port
after the primary port recovers.
Configuring the primary sim in the
cellular protection scheme
primary-sim {1 | 2}
Select primary SIM in the protection
scheme
Default: 1
Setting the time to stay on the
secondary cellular interface
before switching back to primary
(revertive mode in dual SIM
redundancy)
time-to-revert <minutes>
Setting the time before switching
to the standby SIM
connect-timeout <seconds>
The primary port resumes transmitting
traffic once the link has been restored
and the specified time has elapsed.
Possible Values: 2..14,400 minutes
Possible values: 30..600 seconds
Configuring the SIM Level
Two SIM cards can be relevant for dual sim protection, each having different network configuration.
Some of the parameters are configured on the specific SIM level.
 To configure the SIM level:
1. At the prompt config>port>cellular(<lte, lte-1, lte-2>)>, enter:
sim #
The system switches to the sim context.
2. Perform the required tasks according to the following table.
SecFlow-1p
4. Ports
Task
Command
Comments
Configuring SIM cellular
provider Access Point Name
(APN)
apn-name <name>
name – SIM cellular provider APN
For example: apn-name
internet.golantelecom.net.il
149
The APN contains the settings to set up a
connection to the gateway between your
carrier's cellular network and the public
Internet (or private network)
Leaving APN name blank allows the cellular
network to determine the correct APN
Configuring cellular network
dial sequence
dialer-number <dialstring>
dial-string – cellular network dialer number.
The modem uses this number in the ATD
command to dial into the cellular network to
set up a data call.
Possible values: string (excluding the ATD
string)
Configuring SIM PIN code
pin <pin-number>
pin-number – SIM PIN code number
Possible values: 0-9999
Notes:
• Required for a locked SIM. Pin code is
required to allow the modem (MT) to
communicate with the SIM.
• When you configure a PIN, you should
configure the modem with this code
(AT+CPIN).
Configuring type of cellular
network that modem can
connect to
radio-access-technology
<access-technology>
access-technology – allowed radio access
technology for this modem
Possible values: 2g, 3g, 4g, 2g/3g, 3g/4g,
2g/3g/4g
Note: The configuration applies according to
the modem capabilities. For example, for a 3G
modem, the default 2G/3G/4G is NA (only 3G
is possible). For a 2G/3G modem, the
2G/3G/4G configuration is actually 2G/3G.
SecFlow-1p
4. Ports
Task
Command
Comments
Configuring RSSI thresholds for
TCA event
rssi-threshold <lowthreshold> <highthreshold>
low-threshold – When RSSI goes below this
value, a TCA event is issued to indicate too
low receive power.
Possible values: -50 to -120 dBm
150
high-threshold – When RSSI goes above this
value, a TCA event is issued to indicate
receive power recovered.
Possible values: -50 to -120 dBm
Selecting LTE bands enabled on
the modem
lte-bands <band1>[
<band2>] [<band3>]
[<band4>] [<band5>]
[<band6>]
This parameter is relevant if 'radio-accesstechnology' includes 4G
Possible Values for different ordering options:
• L1: b1, b3, ,b5, b7, b8, b20, b38, b40, b41,
any
• L3: b1, b2, b3, b4, b5, b7, b28, b40, any
• L4: b2, b4,b5, b12, b13, b14, b66, b71,
any
Default: any
• L450A: b3, b7, b20, b31, b72
• L450B: b3, b20, b87
Default: b3
If ‘any’ is configured, no additional band can
be configured
Configuring PDP type to set
data call mode per 3GPP
definitions
pdp-type {ip | relayedppp}
Default: ip
Configuring CHAP hostname
chap-hostname <name>
name –CHAP hostname
Possible values: 1-80 character string
[no] chap-hostname
[name]
SecFlow-1p
4. Ports
Task
Command
Comments
Configuring CHAP default
password
chap-password
<pass> [{hash}]
pass – CHAP password
Possible values: 1-40 character string
[no] chap-password
[name]
hash – password encrypted
Possible values: hash, “”
151
Notes:
• If you enter a clear password (chappassword), the device encrypts it, saves
the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
• If you enter an encrypted password (chappassword hash) the device saves the
encrypted password in pppSecuritySecret
and sets pppSecuritySecretType to ‘off’.
Configuring the SIM name
Configuring PAP credentials
(not when pdp-type is ip)
no name [name]
name <name>
name – SIM name
Possible values: 1-80 character string
pap-username <name>
password <pass> [{hash}]
name – PAP username; string
Possible values: string up to 80 characters
[no] pap-username
[name]
pass – PAP password
Possible values: string up to 80 characters
Notes:
• If you enter a clear password (pappassword), the device encrypts it, saves
the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
• If you enter an encrypted password (pappassword hash) the device saves the
encrypted password in pppSecuritySecret
and sets pppSecuritySecretType to ‘off’.
Refusing CHAP authentication
(not when pdp-type is ip)
[no] refuse-chap
Refusing PAP authentication
(not when pdp-type is ip)
[no] refuse-pap
Refusing no authentication (not
when pdp-type is ip)
[no] refuse-no-auth
SecFlow-1p
4. Ports
152
Viewing Cellular Port Status
You can display the status and configuration of an individual cellular port.
 To display the status of a specific cellular port:
•
At the prompt config>port>cellular(<port-index>)#, enter:
show status
The cellular port status parameters are displayed. The parameters are described in the following
table.
 To display cellular port lte status:
Interface Status:
Administrative Status
Operational Status
IP Address
IP Gateway
:
:
:
:
Up
Up
20.20.20.5
20.20.20.1
Cellular Modem Information
Modem
: MultiConnect Cell 100
Firmware
: Revision: EC25EFAR06A03M4G
Mode
: sim-2
IMEI
: 08976543987234
SIM Information
SIM
SIM Status
Provider name
MCC
MNC
IMSI
ICCID
MSISDN
: SIM1
: Ready
: Cellcom
: 123
: 456
: 313460000000001
: 1123456789000
: 972551234567
Cellular Connectivity Information
Cellular Network Connection: Connected
Registration Status
: Registered, roaming
RAT Selected
: TDD LTE
LAC/TAC
: 50
Cell ID
: 10
Band
: LTE Band 6
Channel
: 100
Uplink BW
: 1.4MHz
Downlink BW
: 1.4MHz
SecFlow-1p
4. Ports
Signal Quality
RSSI
: -67 dbm
RSRP
: -90 dbm
RSRQ
: -8.5db
SINR
: 6 db
Traffic Statistics
Counter
Total Packets
Total Octets
Packets dropped
Packets errors
Overflows
Rx
22567
22567
22567
22567
22567
Tx
45897
45897
45897
45897
45897
The fields are explained in the table below.
Parameter
Description
Interface Status
Administative status
Cellular interface administrative status
Possible values:
• Up – the port is enabled
• Down – the port is deabled
Operational Status
Operation status of the cellular port
Possible values:
• Up – the ‘dial in’ to the network was successful and connected
• Down – Data call is disconnected
IP Address
IP address acquired from the cellular network (IPCP/DHCP phase)
Possible values: None, IPv4 address
Note: Each time the cellular interface fails, the Interface IP address is cleared
and set after the end of the initiated IPCP/DHCP stage.
IP Gateway
The gateway IP address acquired from the cellular network
Cellular Modem Information
Modem name
Manufacturing information of the cellular modem
Modem firmware
Modem firmware
Mode
Modem operation mode
Possible Values: dual-sim, sim 1, sim 2
This field is not displayed for a dual modem device
153
SecFlow-1p
4. Ports
Parameter
Description
IMEI
International Mobile Station Equipment (modem HW identifier)
SIM Information
SIM
Name of the active SIM
Possible Values: sim1, sim2
SIM Status
SIM operational status
Possible Values: not-inserted, general-failure, ready, unknow, locked-pinrequired, locked-puk-required
Provider Name
Cellular provider name
MCC
Mobile Country Code
MNC
Mobile Network Code
IMSI
International Mobile Subscriber Identity
ICCID
Integrated Circuit Card Identifier: SIM serial number
MSISDN
A number uniquely identifying a subscription in a mobile network (SIM burnt
number)
Cellular Connectivity
Information
Cellular network connection
Status of cellular connection. Possible values:
•
•
•
•
Registration Status
Unknown – No modem, no SIM, SIM locked, or modem failure
Connecting – dial mode is either dialing or ringing
Connected
Failed
Cellular network registration status. Possible Values:
•
•
•
•
•
•
Registered, home network
Registered, roaming
Not Registered, MT not searching
Not Registered, trying to attach
Denied
Unknown
RAT Selected
Radio Access Technology selected
LAC/TAC
Tracking Area Code
Cell ID
Cell ID
Band
Frequency Band
154
SecFlow-1p
4. Ports
Parameter
Description
Channel
Rx Channel
Uplink Bandwidth
Uplink Bandwidth
155
Possible Values: Unknown, 1.4MHz, 3MHz, 5MHz, 10Mhz, 15MHz,
20MHz
Downlink Bandwidth
Downlink Bandwidth
Possible Values: Unknown, 1.4MHz, 3MHz, 5MHz, 10Mhz, 15MHz,
20MHz
Signal Quality
RSSI
Received Signal Strength Indication of cellular radio signal (in dbm)
RSRP
Reference signal received power (dbm), applicable for LTE only
Possible values: -140 dBm to – 44 dBm with 1 dB resolution
RSRQ
Reference signal received quality (db), applicable for LTE only
Possible values: -3…-19.5 dB with 0.1 dB resolution
SINR
Signal To Interference Plus Noise Ratio (db), applicable for LTE only
Possible values: -20…+50 dB with 0.1 dB resolution
Traffic Statistics
Rx Total Packets
Number of packets received from cellular interface
Tx Total Packets
Number of packets transmitted to cellular interface
Rx Total Octets
Number of bytes transmitted to cellular interface
Tx Total Octets
Number of bytes received from cellular interface
Rx packets Dropped
Number of valid packets received from cellular interface that were dropped
Rx packets Errors
Number of errored packets received from cellular interface that were dropped
Tx packets Dropped
Number of valid packets at transmit direction to cellular interface that were
dropped
Tx packets Errors
Number of errored packets at transmit direction to cellular interface that
were dropped
Tx Overflows
Number of transmit queue overflows
Rx Overflows
Number of receive queue overflows
If pdp-type is ‘relayed-ppp’, the PPP status is also displayed.
PPP Status
SecFlow-1p
4. Ports
156
LCP
--------------------------------------------------------------------State
: Opened
MRU Local : 1280
Peer : 1500
Authentication
--------------------------------------------------------------------Of Us : CHAP
State : Completed
Identity : Hostname
IPCP
--------------------------------------------------------------------State
: Opened
Local Address : 20.20.20.5
Peer Address : 20.20.20.2
Parameter
Description
LCP
State
LCP status
Possible Values: Initial, Starting, Closed, Stopped, Closing, Stopping, Request-Sent,
Ack-Received, Ack-Sent, Opened
MRU Local
Local PPP MRU size advertized in LCP negotiations
MRU Peer
Peer PPP MRU size received in LCP negotiations
Authentication
Of Us
Authentication protocol of the device
Possible Values: CHAP, PAP, None
State
Authentication phase state
Possible Values: Initial, Completed, In Progress, Failed
Identity
Authentication identity
IPCP
State
IPCP status
Possible Values: Initial, Starting, Closed, Stopped, Closing, Stopping, Request-Sent,
Ack-Received, Ack-Sent, Opened
Local Address
IPCP local IP address
Peer Address
IPCP remote IP address
SecFlow-1p
4. Ports
157
Viewing Cellular Port Status using Swagger
SecFlow-1p supports Swagger, an interactive user-friendly API explorer that enables you to design, build,
document, and simulate sending REST API calls to SecFlow-1p API directly from your browser.
The documentation that you build describes what each vCPE‑OS API function does, its request
parameters, and response objects, all without any indication of code implementation.
The Swagger UI makes an existing YAML document interactive. You can access the YAML files of each
device per port (according to REST API), and perform operations on the YAML’s functions. It is possible
to build functions, specify the function parameters, and what the functions do. Swagger uses these
YAML files for documentation.
 To retrieve the cellular port status:
1. Configure the management:
configure
management
login-user su
level virt
password 1234
no shutdown
2. Enter the Swagger portal:
http://<ip-address>:8008/swagger
 The Swagger portal opens:
SecFlow-1p
4. Ports
158
SecFlow-1p
3. In the Swagger portal, above the functions, click
The Available authorizations box opens.
4. Ports
159
.
4. Wait for some time to see the asterisks appear.
5. Click the Close Button to finish authentication.
6. Click Try it out. If you would like to get results for a specific entity, under Parameters, enter id of
that entity. Click Execute.
Each request in Swagger shows the equivalent Curl command.
You can copy/paste the curl command into your computer, which has curl installed, to run the
same API call.
SecFlow-1p
4. Ports
7. If you entered the correct credentials, Server response displays Code of 200 (Successful
operation) and Response body shows the requested information.
4.2 Ethernet Ports
SecFlow-1p is connected to Ethernet equipment via the following interfaces:
160
SecFlow-1p
•
2 x 10/100/1000BASE-T ports
•
2 x 1000FX, 4 x 10/100/1000BASE-T ports (“superset”)
4. Ports
161
In addition, two internal Ethernet ports (ethernet lan-switch and ethernet wan-switch) considered
as Ethernet ports without physical level are used for bridge switching.
Applicability and Scaling
This feature is applicable to all the SecFlow-1p versions.
Functional Description
The Ethernet ports are disabled by default, with one exception. The factory default configuration
enables and contains configuration of router 1 interface 32, attached to the last RJ-45 Ethernet port. The
router interface is configured to non-forwarding mode, to limit it to management traffic. No VLAN is
configured, assuming management traffic is likely to be untagged.
Internal Ethernet Ports
Two internal Ethernet ports (ethernet lan-switch and ethernet wan-switch) considered as Ethernet ports
without physical level are used for bridge switching.
When configuring some of the Ethernet port functionalities, the following should be taken into account:
•
If a bridge is configured on lan-switch or wan-switch port, ACL/802.1X/QoS/PBR/force-nexthop/mac-access-control configuration is effective on this port; this functionality configured on
Ethernet port members (physical ports) of this switch port is ignored.
•
If bridge is not configured, ACL/802.1X/QoS/PBR/force-next-hop/mac-access-control
configuration is effective on the physical ports; this functionality configured on lan-switch/wanswitch ports is ignored.
Quality of Service (QoS)
SecFlow-1p supports QoS (traffic management) on Ethernet ports.
Configuration of QoS requires that you first configure the Ethernet port with the following features (see
table below):
•
Classifier
SecFlow-1p
•
4. Ports
162
Traffic-class (TC) action option:
 Marking
 Traffic-classes per port: 20
For full details on how to configure QoS, refer to Quality of Service (QoS) in the Traffic Processing
chapter.
MAC Access Control
Flooding a device with MAC addresses and filling its MAC address table is a well-known attack. Bridges,
for example, flood packets of unknown MAC destination to all ports, a process that impairs performance
and generates excessive traffic on all ports. MAC access control allows the user to limit the number of
source MAC addresses allowed to send traffic to a port. If you know which legitimate devices are going
to be connected to a port, you can whitelist them, and reject other addresses. This can be done by
entering the mac-access-control level.
Factory Defaults
By default, Ethernet ports have the following configuration.
Parameter
Description
Default Value
egress-mtu
Packet size
1790
name
Port name
Ethernet <port-name>
shutdown
Administrative status
Shutdown
Note: Exception is the no shutdown default
status of the last RJ-45 Ethernet port (lan4)
Configuring Ethernet Port Parameters
1. Navigate to configure port ethernet <port-name> to select the Ethernet port to configure.
Physical port names correspond to the front panel designation. Internal Ethernet port names are
lan-switch and wan-switch.
2. Enter all necessary commands according to the tasks listed below.
SecFlow-1p
4. Ports
Task
Command
Comments
Administratively enabling
port
no shutdown
Enter shutdown to disable the port.
This command is inactive for internal
ports.
Binding ACL to the port
access-group <acl-name> in
[{ipv4 | ipv6}]
acl-name: 1-80 characters
163
no access-group in {ipv4 |
ipv6}
Clearing ACL statistics
clear-access-list-statistics [in]
[{ipv4 | ipv6}]
Setting maximum frame
size (in bytes) to transmit
egress-mtu <68–12288>
Mapping the traffic
originated by a router
interface to its egress port
force-next-hop [next-hop <ipaddress>]
no force-next-hop
Configuring MAC access
control
mac-access-control
Assigning description to
port
[no] name <port-name>
Configuring collection of
performance management
statistics for the port, that
are presented via the
RADview Performance
Management portal
[no] pm-collection interval
Binding PBR rule to the
port
Frames above the specified size are
fragmented or discarded.
See Configuring MAC Access Control
below.
port-name – 0-64 characters
Note: Configured name included in
events and traps.
<seconds>
Note: In addition to enabling PM
statistics collection for the ports, it
must be enabled for the device.
Refer to Performance Management in
the Monitoring and Diagnostics
chapter for details.
policy-based-route priority
<priority> match-acl <name>
{next-hop <ip-address>}
interface <type, index>
See Configuring PBR
no policy-based-route priority
<priority>
Associating a queue group
profile with the port
[no] queue-group profile
<queue-group-profile-name>
Displaying ACL statistics
show access-list statistics [in]
[{ipv4|ipv6}]
See Viewing Ethernet Port Statistics
below.
SecFlow-1p
4. Ports
Task
Command
Comments
Displaying the summary of
ACLs bound to the VLAN
show access-list summary
Displays ACL summary at the current
level
164
See Ethernet Port Status below.
Displaying the port
statistics
show statistics
See Viewing Ethernet Port Statistics
Displaying the port status
show status
See Viewing Ethernet Port Status
Configuring VLAN port
vlan <vlan-id>
See VLAN Ports for details on VLAN
port configuration.
Type no vlan <vlan-id> to delete the
Ethernet port VLAN.
Note: You can delete a VLAN port only
when its administrative status is down.
Configuration required for QoS
Enabling classifier at the
port level
[no] classifier {ingress}
ingress – classifier classification
direction is ingress, i.e. from port to
application. For example, router
interface.
Enter no classifier { ingress } to remove
a classifier.
For details on how to configure
classifier parameters, refer to Port
Classification in the Traffic Processing
chapter.
Defining a traffic-class
entity
traffic-class <tc-name>
tc-name – traffic class name.
Possible values: variable length string,
up to 32 characters.
Enter no traffic-class <tc-name> to
remove the traffic-class entity.
For details on how to configure trafficclass parameters, refer to Traffic-Class.
Configuring MAC Access Control
 To configure MAC Access Control:
1. Navigate to configure port ethernet <port-name> mac-access-control.
SecFlow-1p
4. Ports
165
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring static MAC
address
mac <mac-address>
mac: Valid unicast MAC address
no mac <mac-address>
no mac: Any hex string
formatted as MAC address
Disabling MAC access
control
[no] shutdown
By default, MAC access control
is disabled.
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Address not found
You tried to delete a non-existing
static MAC address
Address must be unicast MAC not
owned by the device
mac-address must be a valid
unicast MAC address not owned by
the device.
Corrective Action
Viewing Ethernet Port Status
You can display the status and configuration of an individual Ethernet port.
 To display the status of a specific Ethernet port:
•
At the prompt config>port>eth(<port-name>)#, enter:
show status
The Ethernet port status parameters are displayed. The parameters are described in the
following table.
 To display Ethernet port 1 status:
# configure port ethernet 1
config>port>eth(1)# show status
SecFlow-1p
4. Ports
Name
: Ethernet 1
Administrative Status
Operational Status
Connector Type
Speed And Duplex
MAC Address
:
:
:
:
:
Up
Up
RJ45 Ethernet
100 Half Duplex
00-08-A2-0B-95-58
 To display Ethernet lan-switch port status:
# configure port ethernet lan-switch
config>port>eth(lan-switch)# show status
Name Ethernet lan-switch
Administrative Status
Operational Status
Connector Type
Speed And Duplex
MAC Address
:
:
:
:
:
Up
Up
RJ45 Ethernet
1000 Full Duplex
00-55-66-77-02-42
Parameter
Description
Name
Port name
Administrative Status
Possible values: Up, Down,
Operational Status
Possible values: Up, Down,
Connector Type
Possible value: RJ45 Ethernet
Speed and Duplex
Possible values:
-10 Half Duplex
10 Full Duplex
100 Half Duplex
100 Full Duplex
MAC Address
MAC address, formatted 00-00-00-00-00-00
Note: Ethernet 1 address is considered the system MAC address. It is used
when SecFlow-1p host has to uniquely identify itself, such as when
providing a MAC address on which to base the license file.
 To display an SFP port status:
# configure port ethernet 1
config>port>eth(1)# show status
Name
: Ethernet 1
166
SecFlow-1p
Administrative Status
Operational Status
Connector Type
Speed And Duplex
MAC Address
4. Ports
:
:
:
:
:
167
Up
Up
SFP in
1000 Full Duplex
02-09-C0-95-BB-E3
SFP
---------------------------------------------------------Connector Type
: LC
Manufacturer Name
: RAD Data Comm.
Manufacturer Part Number
: SFP-6D
Typical Maximum Range (Meter)
: 10000
Wave Length (nm)
: 1310.00
Fiber Type
: SM
 To display the ACL status of the Ethernet port:
1. Navigate to the corresponding Ethernet port and enter show access-list summary command.
The following information is displayed:
show access-list-summary
ACL Name
Type Bound to
Direction
----------------------------------------------------------------------------ip_port6_v4
IPv4 Ethernet 6
In
icmp_port6_v6
IPv6 Ethernet 6
In
Viewing Ethernet Port Statistics
The following port statistics can be displayed for an Ethernet port. The counters are described in the
following table.
Running
----------------------------------------------------------------------------Counter
Rx
Tx
Total Frames
3539
10
Total Octets
236594
1060
Multicast Frames
213
-Error Frames
99999
99999
Undersize Errors
99999
-Discard Frames
--
99999
SecFlow-1p
4. Ports
Parameter
Description
Total Frames
Total number of frames received/transmitted
Total Octets
Total number of bytes received/transmitted
Error Frames
Total number of error frames received/transmitted
Undersize Frames
Total number of undersize (less than 64 octets) received frames that
were discarded
Multicast Frames
Total number of multicast frames received
Discard Frames
Total number of discarded Tx frames
168
 To display the ACL statistics for the Ethernet port:
1. Navigate to the corresponding Ethernet port and enter show access-list statistics in [{ipv4 |
ipv6}].
The following statistical information is displayed:
show access-list-statistics
IPv4
access list:
ip_port6_v4
(Inbound)
Bound to:
Ethernet 6
Matches counted for: 0 days 0 hours 51 minutes 43 seconds
Sequence Action Protocol Source
Port Destination
Port ICMP Type Code DSCP
Log
Matches
----------------------------------------------------------------------------------------------------------10
permit
ip
172.18.92.111
172.18.92.78
disable
(200 matches)
show access-list-statistics in ipv6
IPv6
access list:
ip_port6_v6
(Inbound)
Bound to:
Ethernet 6
Matches counted for: 0 days 0 hours 26 minutes 41 seconds
Sequence Action Protocol Source Port
Destination Port
ICMP TypeCode DSCP Log
Matches
----------------------------------------------------------------------------10
permit icmp
fd00:0::72e6:73f8:4b79 fd00::fd75:3fea:ecc6:a999
disable
(3 matches)
SecFlow-1p
4. Ports
169
4.3 Flash (SD Card) Ports
Flash is supported by devices that have SD-card ports. Files on flash memory can be listed by media-dir
command. They are considered local and can be source or destination of copy (see Copying Files).
Factory Default
By default, Flash media (SD card) functionality is disabled.
Configuring Flash Ports
 To enable the flash port:
1. Navigate to file# and type flash-enable, to enable the port permanently.
2. The flash status is available upon typing show flash-status.
 To list the files in the flash media plugged into the device:
1. Navigate to file# and type media-dir media flash <number> [folder <folder-name>].
The flash contents are displayed as follows. If you specified a folder name, the command prints a
list of files and folders in it. Otherwise, the root contents are displayed. Either slash or backslash
can serve as folder delimiter.
SF-1p>file# media-dir media flash 1
Name
Size
Status
(kilobytes)
----------------------------------------------------------------------------System Volume Information
-Folder
sw_pack_21
542453
userscriptTFTP
4
234
4
Test_Reports
-Folder
accountTFTP
3
facTFTP
1
rollTFTP
4
scLogTFTP
5
startupTFTP
4
SecFlow-1p
4. Ports
Viewing Flash Status
You can display the status and configuration of an individual flash port.
 To display the status of flash port:
file# show flash-status
Admin Status
Operational Status
Port
Name
Manufacturer
SD Version
Capacity (megabytes)
:
:
:
:
:
:
:
Enabled
Media Is Plugged In And Operational
1
SDCIT
TI : 0x5449
3.0
29856
4.4 PPP Ports
SecFlow-1p supports a single Point-to-Point Protocol (PPP) session over Ethernet (PPPoE) interfaces.
PPP provides a standard method for transporting multiprotocol datagrams over point-to-point links.
Standards Compliance
RFC 1332 - The PPP Internet Protocol Control Protocol (IPCP)
RFC 1334 - PPP Authentication Protocols
RFC 1661 - The Point-to-Point Protocol (PPP)
RFC 1994 - PPP Challenge Handshake Authentication Protocol (CHAP)
RFC 2516 - A Method for Transmitting PPP Over Ethernet (PPPoE)
RFC 5072 - IP Version 6 over PPP
170
SecFlow-1p
4. Ports
171
Functional Description
PPPoE Session Establishment
PPPoE is used to build PPP sessions and encapsulate PPP packets over Ethernet. PPPoE is useful for
device auto-configuration, typically for authentication.
You can have a single PPPoE session on one router interface.
On Ethernet interfaces, you are required to establish a PPPoE session before starting PPP negotiation
(see PPP Negotiation below). You can establish the PPPoE session only on a router interface that is
bound to a PPP port that is bound to an operational Ethernet port.
Note
There is no command to explicitly enable PPPoE. It is enabled on PPP ports
that are bound to an Ethernet port.
A PPPoE session is established as follows:
1. SecFlow-1p sends a session initiation (PADI).
 If after sending a session initiation (PADI), SecFlow-1p does not receive an offer (PADO)
within four seconds, SecFlow-1p resends the request (PADI) and doubles the waiting period.
 If SecFlow-1p does not receive an offer after four retries (five including the first), it restarts
the session initiation process (i.e. resends a PADI and waits up to four seconds).
2. When SecFlow-1p receives an offer (PADO), one of the following takes place:
 If a service name is configured, SecFlow-1p accepts the first offer it receives.
 If a service name is not configured, SecFlow-1p accepts the first offer it receives containing
the same service name tag.
3. After sending an offer (PADR), SecFlow-1p waits for session confirmation.
 If SecFlow-1p does not receive a session confirmation (PADS) within four seconds, SecFlow1p resends the request (PADR) and doubles the waiting period.
 If SecFlow-1p does not receive an offer after four retries (five including the first), it restarts
the session initiation process (i.e. resends a PADI and waits up to four seconds).
4. If a PPPoE session is terminated (receives PADT packe) or rejected, SecFlow-1p retries to
establish a PPPoE session (by sending a PADI).
5. If a PPPoE session is terminated due to a lower layer state changed to down, SecFlow-1p retries
to establish a PPPoE session (by sending a PADI) as soon as the physical layer is up and there is
Layer-2 connectivity.
SecFlow-1p
4. Ports
172
PPP Negotiation
SecFlow-1p negotiates a PPP session on any router interface that is bound to a PPP port (refer to
Configuring Router Interface in the Traffic Processing chapter).
Note
If the PPP port is bound to an Ethernet port, PPP starts only after a PPPoE
session has been established (see PPPoE Session Establishment above). If the
PPP port is bound to a cellular port, PPP starts as soon as the cellular port is
bound is operationally up.
There are three phases in PPP negotiation:
•
Link establishment
•
Authentication (optional)
•
Network Control Protocols
PPP Link Establishment Phase
The first phase in PPP negotiation requires establishing a link.
PPP establishes a link as follows:
1. SecFlow-1p requests a Link Control Protocol (LCP), with the understanding that SecFlow-1p
accepts the first legal LCP that it receives.
 If SecFlow-1p does not receive a response within four seconds, it resends the request and
doubles the waiting period.
 If SecFlow-1p does not receive a response after four retries (five including the first), it
restarts the LCP negotiation process (i.e. resends a configuration request and waits up to
four seconds).
2. If the peer rejects the LCP request, SecFlow-1p resends the request and doubles the waiting
period.
 If SecFlow-1p does not receive a response after four retries (five including the first), it
restarts the LCP negotiation process (i.e. resends a configuration request and waits up to
four seconds).
3. If a PPP session is terminated due to reception of an LCP Terminate-Request packet, SecFlow-1p
retries to establish a PPP session.
4. If LCP fails, SecFlow-1p raises the lcp-failure alarm.
SecFlow-1p
4. Ports
173
PPP Authentication Phase
Note
Authentication is optional.
PPP supports two authentication methods: Password Authentication Protocol (PAP) and Challenge
Handshake Authentication Protocol (CHAP).
CHAP is the recommended method. PAP is not secure as the username, as it passes the password in the
clear.
Authentication is unidirectional. The methods used to authenticate a peer are not necessarily the
methods that a peer uses for authentication.
SecFlow-1p performs PAP authentication only after a username and password are configured.
Chap authentication uses the challenge-response method.
When a CHAP challenge is received, SecFlow-1p does the following:
•
If the username in the challenge matches a login-user, the login-user and its password are used.
•
If the username in the challenge does not match any of the login-users, the device uses the
default CHAP password, if one is configured.
If the username does not match any of the login-users and a default CHAP password is not
configured, the CHAP authentication fails.
SecFlow-1p also supports configuration of a CHAP hostname.
•
•
By default (i.e. a CHAP hostname is not configured), SecFlow-1p identifies itself by its system
name. If a CHAP hostname is configured, the device uses it to identify itself, instead of the
system name.
•
SecFlow-1p supports configuration of the authentication methods that it may accept if
requested by a peer.
•
If during the authentication phase, SecFlow-1p does not receive a response from the server
within four seconds, it does the following:
 Resends the request and doubles the waiting period.
 If a PPPoE session was established and SecFlow-1p does not receive a response after four
retries (Five including the first), it must terminate the PPPoE session (by sending a PADT)
and try negotiating it anew (by sending a PADI).
PPP Network Control Protocols (NCP) Phase
Once the authentication phase has completed successfully (or if you skipped authentication, once link
establishment has completed successfully), SecFlow-1p begins the NCP phase, i.e. negotiating the set of
supported network control protocols – IPCP and IPv6CP.
SecFlow-1p performs the NCP phase, as follows:
SecFlow-1p
4. Ports
1. SecFlow-1p begins Internet Protocol Control Protocol (IPCP) negotiation.
2. If SecFlow-1p does not receive a response within four seconds, it resends the request and
doubles the waiting period.
3. If the peer rejects IPCP, SecFlow-1p waits four seconds, resends the request, and doubles the
waiting period for four retries (five including the first).
4. If IPCP is terminated due to receiving a Terminate Request packet, SecFlow-1p retries to
establish IPCP.
5. SecFlow-1p begins IPv6 Control Protocol (IPv6CP) negotiation (same as steps 2 to 4 for IPCP
negotiation).
Factory Defaults
By default, PPP ports have the following configuration.
Parameter
Description
Default Value
name
Port name
name “PPP <port-name>”
refuse-chap
Refuse CHAP authentication
no refuse-chap
refuse-no-auth
Refuse no authentication
refuse-no-auth
refuse-pap
Refuse PAP authentication
refuse-pap
pppoe
PPPoE configuration
pppoe
service-name
PPPoE service name
no service-name
Configuring Ports
PPP Port
 To configure the PPP port:
1. Navigate to configure port ppp <number> to select the PPP port to configure.
2. Enter all necessary commands according to the tasks listed below.
174
SecFlow-1p
4. Ports
Task
Command
Comments
Binding PPP to a lower
layer (Ethernet)
[no] bind ethernet <port>
port – Ethernet port
no bind
Configuring CHAP
hostname
[no] chap-hostname [name]
name –CHAP hostname
Possible values: 1-80 character string
Configuring CHAP
default password
chap-password
<pass> [{hash}]
pass – CHAP password
Possible values: 1-80 character string
[no] chap-password [name]
hash – password encrypted
Possible values: hash, “”
chap-hostname <name>
175
Notes:
• If you enter a clear password (chappassword), the device encrypts it,
saves the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
• If you enter an encrypted password
(chap-password hash) the device saves
the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
Configuring port name
Configuring PAP
credentials
no name [name]
name – port name
Possible values: 1-80 character string
pap-username <name>
password <pass> [{hash}]
name – PAP username; string
Possible values: string up to 80 characters
[no] pap-username [name]
pass – PAP password
Possible values: string up to 80 characters
name <name>
Notes:
• If you enter a clear password (pappassword), the device encrypts it,
saves the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
• If you enter an encrypted password
(pap-password hash) the device saves
the encrypted password in
pppSecuritySecret and sets
pppSecuritySecretType to ‘off’.
Configuring PPPoE
pppoe
For detailed nformation on PPPoE
configuration, see PPPoE below.
SecFlow-1p
4. Ports
Task
Command
Refusing CHAP
authentication
[no] refuse-chap
Refusing PAP
authentication
[no] refuse-pap
Refusing no
authentication
[no] refuse-no-auth
176
Comments
PPPoE Port
 To configure PPPoE:
3. Navigate to configure port ppp <number> pppoe.
4. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring service
name
service-name <string>
[no] service-name [string]
service-name –service
name
Possible values: string up
to 80 characters
Displaying PPPoE status
show status
See Viewing Port Status
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Cannot execute: too
long password
You tried to configure an unencrypted
password (PAP or CHAP) of more than
80 characters.
Shorten the password.
SecFlow-1p
4. Ports
177
Viewing Port Status
PPPoE
You can display the status and configuration of an individual PPP port, which is configured with PPPoE,
provided it is bound to a router interface.
Note
If the PPP port, which is configured with PPPoE, is not bound to a router
interface, the following output is displayed: PPP is not bound to an interface.
 To display status of PPP port 1 configured with PPPoE (and bound to a router interface):
configure port ppp 1 pppoe
config>port>ppp(1)>pppoe# show status
Router Interface
: Router 1/If 2
Physical Port
: Ethernet 1
State
: Up
Service Name Requested : Song
PPP Configured with PPPoE Port Status Parameters
Parameter
Description
Router Interface
Router/router interface
Physical Port
Physical interface under the router interface
Possible values: string
State
PPPoE state
Possible values: Up, Down, Lower Layer Down, Admin Disabled
Service Name Requested
Service name
4.5 Serial Ports
This section describes the SecFlow-1p serial ports, as well as applications running over them – terminal
server and serial tunneling.
SecFlow-1p
4. Ports
178
Applicability and Scaling
1 or 2 serial ports are available on the device, depending on the ordering option. The serial port can be
of the RS-232 or RS-485 type, depending on the hardware.
Only one tunnel can be created per port.
Only one terminal server can be created per port.
Standards
The SecFlow-1p serial ports comply with RS-232 and RS-485 standards (depending on the hardware).
Functional Description
Serial Interfaces
The maximum latency allowed before transmitting an IP packet can be configured in the range of 2 to
255 milliseconds. The longer the latency is, the more serial characters can be grouped in one packet.
The serial port speed can be configured to the following values: 300, 600, 1200, 2400, 4800, 9600,
19200, 38400, 57600, and 115200 kbps.
You can also configure the bus idle time, which is the number of Rx bits considered as a single message.
By default, the bus idle time is set by the device to the minimum value allowed for the configured baud
rate, according to the following table:
Minimum Idle Time per Baud Rate
Baud Rate
Minimum Idle Time
300
30
600
60
1200
120
2400
240
4800
480
9600
1000
19200
2000
SecFlow-1p
4. Ports
Baud Rate
Minimum Idle Time
38400
4000
57600
6000
115200
12000
179
The number of data bits in a transmission unit can be configured in the range of 5 to 8.
The parity bit type (the parity is a simple error detection code). The user can configure even or odd
parity. By default parity is configured to none, which means that it is not used.
The number of stop bits (buffer between transmission units) can be set to 1 or 2.
The device allows you to configure a delay (in milliseconds) before starting to transmit. This can be
useful to prevent many RTUs from answering at the same time. The default delay is 10 milliseconds and
the configurable range is 1..10000.
Terminal Server
Terminal server is an application that can be configured over serial ports. It translates serial traffic
incoming from a serial port to IP packets (TCP or UDP), which are sent over an IP network (and vice
versa). This way a user with an IP device such as a laptop can manage a serial device such as RTU.
Terminal server and serial tunneling are mutually exclusive.
The user can telnet the terminal server (on a TCP or UDP port) and be connected to the serial port the
terminal server is configured on. The terminal server converts the user’s IP traffic to serial traffic, and
vice versa.
A complementary terminal server application is to configure a Telnet TCP server on one device and a
client on another. The client opens a connection, a kind of tunnel, to the server, allowing serial devices
connected to the two devices to pass serial traffic between them, over IP network.
Terminal server parameters are configured on the system and the serial port levels, as follows:
•
parameters that are relevant to both serial ports are configured on the system level; these
parameters have the same values for both ports
•
shutdown of the entire feature is also configured on the system level (per device)
•
the actual terminal server with its proper protocol per port is configured on the port level
SecFlow-1p
4. Ports
180
System Level Configuration
You can set a dead peer timeout (in the range of 1 to 1440 minutes, i.e. one day) for terminal server
traffic over TCP. If no traffic is sent over a connection for the configured duration, the device closes the
connection, making room for another. If no dead-peer-timeout is configured, the TCP connection expires
only if closed by a FIN packet or if administratively aborted by the disconnect command.
The command is irrelevant for UDP traffic, which is a connectionless protocol.
The terminal server functionality is disabled by default. However, it can be enabled even if the essential
configuration (e.g. local IP address) is missing. Even being useless in this case, it will become operational
once the missing configuration is added.
Port Level Configuration
The local IP address (i.e. owned by the device), on which the terminal server listens, is configured via the
local-address command in the configure>port>serial>terminal-server level. A user telneting this address
will be connected by the terminal server to the serial port on which it is configured. Traffic sent by the
user will appear on any device connected to the serial port, and vice versa.
Note
Configuring the local address is mandatory.
If the address is not owned by the device, the terminal server is not
operational, even if it is enabled. It will start being operational once the
address is owned by the device.
Some terminal clients require the null-CR mode functionality. When enabled, the device drops a null
character if it arrives immediately after a carriage return (^M or ASCII 0x0d).
Some terminal clients require this mode to be enabled, and some disabled. Null-CR mode is disabled by
default.
Serial Tunneling
Serial tunneling is an application that can be configured over a serial port, to create an IP tunnel
between one or more opposite devices with serial ports. Serial traffic passes through the tunnel
encapsulated in IP packets, between the tunnel endpoints.
Terminal server and serial tunneling are mutually exclusive.
The tunnel can be point-to-point, point-to-multipoint or multipoint-to-multipoint. Each endpoint can be
designated master or slave. Master traffic is sent to all slaves, and slave traffic is sent to all masters.
SecFlow-1p
4. Ports
181
The tunnel addresses and roles are configured by means of the address command. The user can
designate the local device as master. Otherwise, the peer is the master (the default setting).
When configuring the tunnel, note the following:
•
There are no default addresses. Without configuring them the tunnel is useless, even if it is
enabled.
•
If the local address is not owned by the device, this address will not be operational, even if this
address is enabled. Both devices will start being operational once the address is owned by the
device.
•
If the remote address is owned by the device or if there is no IP connectivity to it, this address
(and its local peer) will not be operational, even if it is enabled. It (and its local) will start being
operational once the address is not owned by the device and there is IP connectivity to it.
•
If the user repeats the command with the same local and remote addresses, the command is
accepted, replacing the previous instance. The only thing that can change in this case is the
master status.
•
Traffic is not passed between masters or between slaves on the same tunnel.
•
Traffic from a slave reaches all the masters on the tunnel.
•
Traffic from a master reaches all the slaves on the tunnel.
•
The tunnel can be enabled even if essential configuration (i.e. addresses) is missing. It would be
useless in this case but will become operational the moment the missing configuration is added.
Factory Defaults
SecFlow-1p is supplied with all serial ports disabled. Other parameter defaults are listed in the table
below.
Parameter
Default Value
allowed-latency (msec)
16
baud-rate (kbps)
9600
bus-idle
auto
parity
none
data-bits
8
stop-bits
1
SecFlow-1p
4. Ports
Parameter
Default Value
tunnel level
disabled
buffer-mode
byte
null-cr-mode
disabled
telnet-client-tcp server-address
No Telnet client exists by default
telnet-server-tcp port
No Telnet server exists by default
telnet-server-udp port
No Telnet server exists by default
address local
By default no adresses are configured
master-remote
buffer-mode
byte
transport-layer
udp
terminal-server
disabled
dead-peer-timeout <minutes>
10
buffer-mode
byte
Configuring Serial Port Parameters
 To configure the serial port parameters:
1. Navigate to configure port serial <port number> to select the serial port to configure.
The config>port>serial>(<port>)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Administratively enabling
port
no shutdown
Using shutdown disables the port
Configuring the allowed
latency
allowed-latency
{milliseconds <number>}
Possible Values: 2-255
182
SecFlow-1p
4. Ports
183
Task
Command
Comments
Configuring the BAUD rate
baud-rate {speed}
Possible Values: 300, 600, 1200, 2400, 4800, 9600, 19200,
38400, 57600, 115200
If bus-idle is bits and number-of-bits is less than the
allowed minimum (see the Minimum Idle Time per Baud
Rate table above), the rate may be rejected by the
device.
Configuring the bus idle
time in bits
bus-idle {auto | bits
<number-of-bits>}
<number-of-bits>: The maximum value is 100000. The
minimum depends on the configured baud rate (see the
Minimum Idle Time per Baud Rate table above).
Clearing statistics
clear-statistics
Configuring the number of
data bits
data-bits<number-of-bits>
Configuring the parity
type
parity {none | even | odd}
Displaying the port status
show status
Disable port
shutdown
Configuring the number of
stop bits
stop-bits <number-of-bits>
Possible Values: 1,2
Terminal server level
terminal-server 1
Only one terminal server can be configured per port.
[no] terminal-server 1
See Configuring the Terminal Server below.
Tunnel level
tunnel <1..10>
See Configuring the Tunnel Parameters below
Setting Tx delay, in
milliseconds
tx-delay
1..10000
Possible Values: 5-8
Configuring the Terminal Server
 To configure the terminal server on the port level:
1. Navigate to configure port serial <port> terminal-server 1.
The config>port>serial>(<port>) terminal-server (1)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
SecFlow-1p
4. Ports
184
Task
Command
Comments
Disconnecting the session
(administratively aborting
an active TCP connection)
disconnect port <number>
Port number of the session to be disconnected:
2001..65534
Enabling the null CR mode
[no] null-cr-mode
Displaying the status
show status
Configuring a TCP Telnet
client application over the
terminal server
[no] telnet-client-tcp serveraddress <ip-address> port
<port-number>
The client establishes a connection to a preconfigured
TCP telnet server, and once the connection is alive the
serial ports behind both the client and server can pass
traffic to each other.
No Telnet client exists by default.
A serial port is limited to one Telnet application.
ip-address: Telnet server address (valid unicast IPv4
address)
<port-number>: 2001..65534
Note: A TCP Telnet client can be configured regardless of
the terminal server administrative or operational status.
However, if the terminal server is not operational, neither
is the Telnet client.
Configuring a TCP Telnet
server application over the
terminal server.
[no] telnet-server-tcp port
<port-number>
No telnet server exists by default
A serial port is limited to one Telnet application.
<port-number> - Port The telnet server listens on
Possible Values: 2001..65534
Note: A TCP Telnet server can be configured regardless of
the terminal server administrative or operational status.
However, if the terminal server is not operational, neither
is the Telnet server.
Configuring a UDP Telnet
server application over the
terminal server.
telnet-server-udp port <portnumber> client <client-ipaddress>
No telnet server exists by default
A serial port is limited to one Telnet application.
<port-number> - Port the Telnet server listens on
Possible Values: 2001..65534
<client-ip-address>: IPv4 unicast address
Note: A UDP Telnet server can be configured regardless
of the terminal server administrative or operational
status. However, if the terminal server is not operational,
neither is the Telnet server.
SecFlow-1p
4. Ports
185
 To configure the terminal server on the system level:
1. Navigate to configure system serial terminal-server 1.
The config>system>serial> terminal-server (1)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring buffer mode
buffer-mode {byte | frame}
Configuring dead peer
detection timeout
dead-peer-timeout <minutes>
no dead-peer-timeout
Configuring device IP
address to listen on
[no] local-address <ipaddress>
Disabling terminal server
functionality
[no] shutdown
<minutes>: 1..1440
Configuring the Tunnel
 To configure the tunnel parameters:
1. Navigate to configure port serial <port number> tunnel <1..10> to select the tunnel to
configure.
The config>port>serial>(<port>)# tunnel <tunnel> prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring the tunnel
local/remote addresses
and roles
address local <local-ipaddress> remote <remoteip-address> [master-local
| master-remote]
By default no adresses are configured
no address local <local-ipaddress> remote <remoteip-address>
<local-ip-address>: Valid unicast IPv4 address
Up to 10 peers can be configured per tunnel.
remote-ip-address (Peer IP address): Valid unicast IPv4
address
The local and remote addresses must be different but
belong to the the same IP version.
master-local – the peer is slave
master-remote – the peer is master
Default: master-remote
SecFlow-1p
4. Ports
Task
Command
Configuring the buffer
mode
buffer-mode {byte |
frame}
Disabling serial tunnel
shutdown
186
Comments
Terminal server and serial tunneling are mutual exclusive.
A tunnel becomes operational if it is enabled and has the
required configuration, which is:
• Local (i.e. source) unicast IPv4 address is owned by
the device.
• Remote (i.e. destination) unicast IPv4 address is not
owned by the device and has the same IP version as
the local address.
Configuring the transport
layer
transport-layer {tcp | udp}
The tunnel is opened on port 9850 + tunnel number.
Viewing Status Information
 To view the status of a serial port:
1. Navigate to config>port> serial (<port>)#
2. Type show status.
The port status and statistics are displayed, for example as follows:
# show configure port serial 1
Administrative Status
Interface Type
BAUD Rate
Data Bits
Stop Bits
Parity
Allowed Latency (milliseconds)
Tx Delay (milliseconds)
Rx
Tx
Rx
Tx
Bytes
Bytes
Errors
Errors
:
:
:
:
status
: Up
: RS-232
: 9600
: 8
: 1
:
: 16
: 10
0
0
0
0
#
 To view the status of a terminal server:
1. Navigate to config>port> serial (<port>) terminal-server (1)#
SecFlow-1p
4. Ports
187
2. Type show status.
The status is displayed, for example as follows:
Admin Status
: Enabled
Local IP address
: 192.168.1.1
Buffer Mode
: Byte
Dead Peer Detection (Minutes): 10
Null CR Mode
: Off
TCP Telnet Server Ports
configured**
: 2001-2009 **displayed if TCP or UDP telnet server is
Connections **displayed if TCP Telnet server is configured and has active connections**
Port | Source IP address | Destination IP address
-------------------------------------------------2001 | 10.10.10.10
| 192.168.1.1
Configuration Errors
The tables below list messages generated by SecFlow-1p when a configuration error on serial ports is
detected.
Message
Description
Telnet application is already
configured on this port
One Telnet application (TCP or UDP server, or TCP client) is
already configured on this port
Invalid unicast IP address
The address is not a valid unicast IPv4 address
No such addresses
You are trying to delete a pair of addresses that is not configured.
Maximum number of peers is
configured
You are trying to configure more than 10 peers per tunnel.
Local and remote must be valid unicast
IP addresses
The local and remote addresses must be valid unicast IP
addresses.
Local and remote addresses must be
different
The local and remote addresses must be different.
Cannot enable serial tunnel on port
with active terminal server
Terminal server and serial tunneling are mutual exclusive.
Maximum number of terminal servers
is configured on this port
Only one terminal server can be configured per port.
SecFlow-1p
4. Ports
Message
Description
Invalid unicast IP address
You are trying to configure an IP address which is not a valid
unicast IPv4 address
Maximum number of IP addresses is
configured
Only one local IP address is supported for configuring the
terminal server.
Cannot enable terminal server on port
with active serial tunnel
Terminal server and serial tunneling are mutual exclusive.
Bus idle configuration is below
minimum for this baud rate
You are trying to configure the bus idle time to less than the
minimum allowed for the baud rate.
Value may not be higher than 100000
The bus idle time cannot be set above 100000.
Value must be at least <allowedminimum>
The bus idle time cannot be set below the allowed minimum (see
the Minimum Idle Time per Baud Rate table above).
Maximum number of tunnels is
configured on this port
You are trying to configure more than one tunnel per port.
UDP port is in use by terminal server
on another serial port
UDP port is in use by terminal server on another serial port
TCP port is in use by terminal server on
another serial port
TCP port is in use by terminal server on another serial port
Same tunnel ID, remote address need
same buffer mode on all ports
If there is another tunnel (on different port) with the same ID and
remote address, they must have the same buffer-mode (both
either byte of frame)
4.6 Virtual Ports
Virtual ports are predefined fixed logical ports used as reference points through which virtualization
functions can connect to SecFlow-1p logical networking elements.
Virtual ports also provide connection between components.
SecFlow-1p requires 10 predefined virtual ports.
Applicability and Scaling
This feature is applicable to all the SecFlow-1p versions.
188
SecFlow-1p
4. Ports
189
Benefits
Virtual ports provide flexible binding of ports, networking functions, and virtualization layer.
Factory Defaults
By default, virtual ports have the following configuration.
Parameter
Description
Default Value
name
Assigns a port name
no name
Virtual # of port
shutdown
Sets virtual port administrative
status
shutdown
Configuring Virtual Ports
 To configure a virtual port:
1. Navigate to configure port virtual <port-name>.
The configure> port>virtual (<port-name>)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Administratively enabling port
no shutdown
Enter shutdown to disable the port.
Setting maximum frame size (in
bytes) to transmit
egress-mtu <68–12288>
Frames above the specified size are
fragmented or discarded.
Mapping the traffic originated by a
router interface to its egress port
force-next-hop [next-hop <ipaddress>]
Assigning description to port
[no] name <port-name>
no force-next-hop
port-name – 0-64 characters
Note: Configured name included in
events and traps.
Enter no name to revert the name to
its default value (virtual < port-name>).
SecFlow-1p
4. Ports
policy-based-route priority
<priority> match-acl <name>
{next-hop <ip-address> |
interface <type, index>}
Bind PBR rule to the port
190
See Configuring PBR
no policy-based-route priority
<priority>
Displaying the port statistics
show statistics
See Viewing Virtual Port Statistics
Displaying the port status
show status
See Viewing Virtual Port Status
Configuring VLAN port
vlan <vlan-id>
See VLAN Ports for details on VLAN
port configuration.
Type no vlan <vlan-id> to delete the
Ethernet port VLAN.
Note: You can delete a VLAN port only
when its administrative status is down.
Viewing Virtual Port Status
The following port status can be displayed for a virtual port.
Name
Administrative Status
Operational Status
MAC Address
:
:
:
:
My Port
Up
Up
41-41-42-42-43-43
Parameter
Description
Name
Port name
Administrative Status
Possible values: Up, Down
Operational Status
Possible values: Up, Down
MAC Address
MAC address, formatted 00-00-00-00-00-00
Viewing Virtual Port Statistics
The following port statistics can be displayed for a virtual port. The counters are described in the
following table.
SecFlow-1p
4. Ports
191
Running
----------------------------------------------------------------------------Counter
Rx
Tx
Total Frames
3539
10
Total Octets
236594
1060
Discard Frames
-213
Parameter
Description
Total Frames
Total number of frames received/transmitted
Total Octets
Total number of bytes received/transmitted
Discard Frames
Total number of discarded Tx frames
4.7 VLAN Ports
SecFlow-1p supports the creation of VLAN ports over Ethernet and Virtual ports, thus providing single
VLAN tag encapsulation.
Applicability and Scaling
This feature is applicable to all the SecFlow-1p versions.
Functional Description
VLAN port configuration is similar to Ethernet port configuration. You can configure traffic management,
and binding entities (such as router interface) to port. However, in VLAN ports, you cannot configure
physical properties, such as auto negotiation.
Note
VLAN tags have 0x8100 Ethertype. Other Ethertypes are not configurable or
recognized.
SecFlow-1p
4. Ports
192
Factory Defaults
By default, VLAN ports have the following configuration on creation.
Parameter
Description
Default Value
name
Assign a port name
no name
VLAN #
shutdown
Administrative status
shutdown
Configuring VLAN Port Parameters
 To configure the VLAN port parameters:
1. For Ethernet port VLAN: Navigate to configure port ethernet<port-name> vlan <vlan-id> to
select the VLAN port to configure. VLAN ID can be 0-4094.
For Virtual port VLAN:
Navigate to configure port virtual <port-name> vlan <vlan-id>. VLAN ID can be 0-4094.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Binding ACL to the port
access-group <acl-name> in [{ipv4 |
ipv6}]
Ethernet port VLAN only
no access-group in {ipv4 | ipv6}
Clearing ACL statistics
clear-access-list-statistics [in]
[{ipv4|ipv6}]
Clearing statistics
clear-statistics
Setting maximum frame size (in
bytes) to transmit
egress-mtu <68–12288>
Mapping the traffic originated
by a router interface to its
egress port
force-next-hop [next-hop <ipaddress>]
no force-next-hop
Ethernet port VLAN only
Frames above the
specified size are
fragmented or discarded.
SecFlow-1p
4. Ports
Task
Command
Comments
Configuring the VLAN port name
name
name – 0-64 character
string
193
Enter no name to revert
the name to its default
value (VLAN #).
Bind PBR rule to the port
policy-based-route priority <priority>
match-acl <name> {next-hop <ipaddress> | interface <type, index>}
See Configuring PBR
no policy-based-route priority
<priority>
Binding PBR rule to this entity
policy-based-route priority <priority>
match-acl <name> {next-hop <ipaddress> } interface <type, index>
no policy-based-route priority
<priority>
priority <number> - set
PBR rule priority per
interface; the lower is
the number, the higher is
the priority
Possible values: 1 –
4294967295
match-acl <name> attach ACL to PBR rule
Possible values: 1–80
characters string
next-hop <ip-address> –
Set next hop IP address
to define the direction of
PBR rule
interface <type, index> –
Set interface to define
the direction of PBR rule.
Possible values:
• ethernet < portname>
• ethernet < portname> vlan <vlannumber>
virtual <port-number>
SecFlow-1p
4. Ports
194
Task
Command
Comments
Displaying the summary of ACLs
bound to the VLAN
show access-list summary
Displays ACL summary at
the current level
See Viewing VLAN Port
Status below.
Displaying the port statistics
show statistics
See Viewing VLAN Port
Statistics
Displaying the port status
show status
See Viewing VLAN Port
Status
Administratively disabling the
port
shutdown
Entering no shutdown
enables the port.
Note: shutdown is
possible only when the
port is not bound to any
entity (router interface,
bridge port, and more).
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Upper layer is bound to this
VLAN port
You tried performing shutdown while
port was bound to an entity.
Unbind port from all entities and then
perform shutdown.
Viewing VLAN Port Status
The following port status can be displayed for a VLAN port.
Name
Administrative Status
Operational Status
MAC Address
:
:
:
:
My Port
Up
Up
41-41-42-42-43-43
SecFlow-1p
4. Ports
Parameter
Description
Name
Port name
Administrative Status
Possible values: Up, Down
Operational Status
Possible values: Up, Down
MAC Address
MAC address, formatted 00-00-00-00-00-00
195
 To display the ACL status for the VLAN:
1. Navigate to configure port ethernet<port-name> vlan <vlan-id> and enter the show access-list
summary command.
The following status information is displayed:
show access-list-summary
ACL Name
Type Bound to
Direction
----------------------------------------------------------------------------ip_port1_v4
IPv4 Ethernet 1 Vlan 100
In
ip_port1_v6
IPv6 Ethernet 1 Vlan 100
In
Viewing VLAN Port Statistics
The following port statistics can be displayed for a VLAN port. The counters are described in the
following table.
config>port>eth(4)>vlan(200)# show statistics
Running
----------------------------------------------------------------------------Counter
Rx
Tx
Total Frames
3539
10
Total Octets
236594
1060
Discard Frames
-99999
Parameter
Description
Total Frames
Total number of frames received/transmitted
Total Octets
Total number of bytes received/transmitted
Discard Frames
Total number of discarded Tx frames
SecFlow-1p
4. Ports
196
 To display the ACL statistics for the VLAN:
1. Navigate to configure port ethernet<port-name> vlan <vlan-id> and enter show access-list
statistics in [{ipv4 | ipv6}].
The following statistical information is displayed:
show access-list-statistics
IPv4 access list:
Listv4
(Inbound)
Bound to:
Ethernet 1 Vlan 100
Matches counted for: 0 days 0 hours 5 minutes 43 seconds
Sequence Action Protocol Source
Port Destination
Port ICMP Type Code DSCP Log
Matches
----------------------------------------------------------------------------40
permit tcp
10.10.10.100
20.20.20.100
1024
enable (289317 matches)
50
permit tcp
10.10.10.100
20.20.20.100
600
disable (288857 matches)
60
deny
tcp
10.10.10.100
20.20.20.100
400
disable (288216 matches)
IPv6 access list:
Listv6
(Inbound)
Bound to:
Ethernet 1 Vlan 100
Matches counted for: 0 days 0 hours 6 minutes 6 seconds
Sequence Action Protocol Source
Port Destination
Port
ICMP Type Code DSCP Log Matches
----------------------------------------------------------------------------40
permit tcp 2005:db8:21:444::1 2006:db8:21:444::1 1024
disable (307566 matches)
50
permit tcp 2005:db8:21:444::1 2006:db8:21:444::1 600
disable (307162 matches)
60
deny
tcp 2005:db8:21:444::1 2006:db8:21:444::1 400
disable (306710 matches)
4.8 WiFi
SecFlow-1p can be equipped with a WiFi modem for wireless local area networking, in addition to its
main modem.
WiFi interface provides a single access point, within the frequencies bands of 2.4 GHz and 5GHz.
SecFlow-1p
4. Ports
197
Applicability and Scaling
WiFi modem is installed on SecFlow-1p devices with WF ordering option. Devices with dual modems
cannot hold a WiFi modem.
SecFlow-1p supports up to two WiFi bands (2.5Ghz and 5Ghz) and up to six SSIDs.
Standards Compliance
Relevant sections of IEEE 802.11
Functional Description
WiFi Band Level
SecFlow-1p supports underlying dual-band WiFi interfaces:
•
UHF - 2.4GHz
•
SHF - 5GHz
For each WiFi band, SecFlow-1p supports the following configurations:
•
Radio mode (802.11a/b/g/ng/na/ac or auto)
•
Operating channel for the WiFi interface
Virtual AP Level
SecFlow-1p supports multiple virtual Access Points (vAPs), which are statically allocated to the WiFi
band. SecFlow-1p supports 2.4GHz and 5GHz bands, which cannot work simultaneously. 3 vAPs are
supported per WiFi band.
Once you configure the WiFi interface, you can bind a router interface to a vAP, in order to create a
separate subnet for each vAP (see Configuring Router Interfaces).
Note
As binding vAP to the router interface is not part of the end-user
configuration, binding commands must be included in the device configuration
file received from the NoC.
SecFlow-1p
4. Ports
198
For each vAP, SecFlow-1p supports the following configurations:
•
vAP SSID
•
SSID broadcast (true | false)
•
Security type
•
Encryption type
•
Authentication type
•
Authentication password (stored as hash string)
•
vAP max associated clients
•
vAP partitioning
•
vAP MAC filtering policy
SecFlow-1p supports configuration of MAC filtering table per vAP. The table can contain at least 50 MAC
addresses. The policy of MAC filtering (allow/deny) is configured independently per vAP.
SecFlow-1p provides WiFi Protected Setup (WPS) functionality that can be applied only to a particular
vAP at any given time.
If you change the vAP during an active vAP session, the session is discarded.
Multicast to Unicast Conversion
When media is streamed, unicast is preferred to multicast, due to the following reasons:
•
Multicast traffic is susceptible to packet loss, which reduces media quality.
•
Unicast traffic operates at higher data rates.
SecFlow-1p supports multicast to unicast conversion of packets. It duplicates multicast streams to WiFi
clients that joined that stream, by changing the multicast MAC address of the stream frames received
over the upstream SecFlow-1p interface into the WiFi client’s unicast MAC address.
This conversion provides higher quality video transmission to a larger number of clients.
Factory Defaults
By default, WLAN ports have the following configuration on creation.
SecFlow-1p
4. Ports
Parameter
Description
Default Value
radio-mode
Wireless LAN interface operating
radio mode
auto
channel
Wireless LAN interface operating
channel
255 (auto)
Enable vAP
no shutdown
Access-point parameters
shutdown
no ssid
ssid
broadcast-ssid
Enable SSID broadcast
broadcast-ssid
security
vAP security method
none
encryption
vAP encryption method
none
authentication
vAP authentication method
none
password
Preshared key for PSK
authentication
no password
max-clients
Maximum clients allowed on vAP
8
wlan-partition
Enabling WLAN partitioning
no wlan-partition
wps
Enabling WPS
no wps
mac-filter-enable
Enabling MAC filter on vAP
no mac-filter-enable
Configuring WLAN Port Parameters
 To configure the WLAN port parameters with CLI:
1. Navigate to configure port wlan <port> to select the WLAN port to configure.
2. Perform the required tasks according to the following table.
199
SecFlow-1p
4. Ports
200
Task
Command
Comments
Configuring Virtual Access Point
(vAP) number
access-point <ap-number>
ap-number – Access Point number
Possible values:
1-3 on 2.4GHz band (wlan1 1-3 shown as
AP1, AP2, AP3)
4-6 on 5GHz band (wlan2 1-3 shown as
AP4, AP5, AP6)
2.4 GHz and 5GHz bands cannot work
simultaneously.
Commands under access-point (apnumber)
Configuring Virtual Access Point
authentication
authentication
<authentication>
authentication – virtual access point
authentication method
Possible values: none, psk, radius
Note: When security is set to none,
authentication can be set to none only.
Enabling/disabling SSID broadcast
[no] broadcast-ssid
Configuring Virtual Access Point
encryption
encryption <encryption>
encryption – virtual access point
encryption method
Possible values: none, ccmp
Note: When security is set to none,
encryption can be set to none only.
Mapping the traffic originated by a
router interface to its egress port
force-next-hop [next-hop
<ip-address>]
Adding filtered MAC address
[no] mac-filter [address
<client-mac-address>]
no force-next-hop
client-mac-address - EUI-48 MAC address
Notes:
• Command is accumulative.
• Up to 50 Mac addresses are
supported.
• The no mac-filter address [<clientmac-address>] command deletes the
specific entry.
• The no mac-filter command clears
the entire table.
Enabling MAC filter on Access Point
[no] mac-filter-enable [deny
| allow]
SecFlow-1p
4. Ports
201
Task
Command
Comments
Configuring maximum clients
allowed on Access Point
max-clients <max-clients>
max-clients – maximum clients allowed
on Access Point
Possible values: 1-8
Configuring Virtual Access Point
password
password <pass-key> [hash]
pass-key – preshared key for PSK
authentication
Possible values: character string
Binding PBR rule to the port
no password
policy-based-route priority
<priority> match-acl <name>
{next-hop <ip-address>}
interface <type, index>
See Configuring PBR
no policy-based-route
priority <priority>
security – virtual access point security
method
Possible values: none, wpa2
Configuring Virtual Access Point
security
security <security>
Enabling/disabling access point
operation
[no] shutdown
Configuring Access Point SSID
ssid <ssid>
Configuring Access Point
partitioning
[no] wlan-partition
Configuring WPS
[no] wps
WPS can only be enabled on one vAP.
Configuring WLAN interface
operating channel
channel < channel>
channel – channel number
Possible values: 1-196, 255 (auto)
SSID – Service Set Identifier; WiFi
network name
Possible values: 1-32 character string
Note: Values 1-13 are selectable on
WLAN 1 (2.4GHz) only.
SecFlow-1p
4. Ports
Task
Command
Comments
Configuring WLAN interface
operating radio mode
radio-mode < radio-mode>
Possible values:
802.11b
802.11g
auto
802.111a
802.11ng
802.11na
802.11ac
202
Notes:
• 802.11b, 802.11g, 802.11ng and auto
are only selectable on 2.4GHz band
(WLAN 1)
• 802.11a, 802.11na, 802.11ac and
auto are only selectable on 5GHz
band (WLAN 2)
Examples
echo "Wlan - Port Configuration"
#
Wlan - Port Configuration
wlan 1
radio-mode auto
channel 255
access-point 1
ssid "QA-PCPE-260-Pass"
broadcast-ssid
password "2419756A246CC8BB07943FA7C3A163EC" hash
security wpa2
encryption ccmp
authentication psk
max-clients 8
no wlan-partition
no wps
no mac-filter-enable
no shutdown
exit
access-point 2
ssid "QA-PCPE-260-No-Pass"
broadcast-ssid
no password
security none
encryption none
authentication none
max-clients 8
no wlan-partition
SecFlow-1p
4. Ports
203
no wps
no mac-filter-enable
no shutdown
exit
Testing WiFi
When the WiFi access point is configured, client cellular devices can discover the network name (ssid) in
the list of available networks, if the name is allowed for advertising (broadcast ssid value is set to yes).
SecFlow-1p
5. Management and Security
204
5 Management and Security
This chapter describes the following:
•
Access Control List (ACL)
•
Management access methods
•
Management and configuration options
•
Management-related features
Usually, initial configuration of the management parameters is performed via an ASCII terminal. Once a
router interface has been configured, it is possible to access SecFlow-1p via NETCONF or SNMP for
operation configuration. For details on configuring the router, refer to Router.
The following table summarizes management options for SecFlow-1p.
Port
Manager
Location
Transport
Method
Management
Protocol
Application
Ethernet
FE/GbE
Local, remote
Inband
SSH
Terminal emulation application (refer
to Working with SSH)
SNMP
Third-party NMS
Note
By default, the terminal and SNMP management access methods are enabled.
See the following section for details on enabling/disabling a particular
method.
5.1 Access Control List (ACL)
SecFlow-1p supports Access Control Lists (ACLs) to flexibly filter incoming and outgoing IPv4 and IPv6
traffic.
SecFlow-1p
5. Management and Security
205
Applicability and Scaling
This feature is applicable to all versions of SecFlow-1p.
The number of rules an ACL can contain is limited by the hardware device.
Standards Compliance
RFC 1812 - Requirements for IP Version 4 Routers
Benefits
Service providers use ACLs to maintain network security by preventing malicious traffic from entering
the device. ACLs can be used to save network resources by dropping unwanted packets.
Functional Description
Devices featuring ACLs can flexibly filter management and user traffic, by denying or permitting IP
packets to enter the host, according to the packet’s source/destination address, protocol type, or other
criteria.
ACL entries are sequentially numbered rules containing statements (Deny, Permit, or Remark) and
conditions. Statements in the access list are sorted and checked in ascending order of the statements’
sequence numbers. Remarks are free-text ACL entries used for commenting and visually organizing
ACLs.
Packets are permitted or denied access, based on the following mandatory conditions:
•
protocol (IP, TCP, UDP, and ICMP)
•
source IP address
•
destination IP address
The following parameters are optional:
•
source port, if the protocol is TCP or UDP
•
destination port, if the protocol is TCP or UDP
•
DSCP value
SecFlow-1p
5. Management and Security
•
sequence number
•
ICMP type and code, if the protocol is ICMP
•
IP protocol number, if the protocol is IP
206
The ACL structure is illustrated in the Management-Level Tasks section.
If there is a need to add a rule between already existing rules with consecutive numbers, the rules can
be interspaced to accommodate additional rules between them. For example, if you apply resequencing
to an ACL including rules 1, 2, and 3, with an interspacing value of 30, the rule numbers change to 30, 60
and 90. Sequence numbers can also be set at the rule level.
ACLs are referred by name, which have to be unique, even for different IP version ACLs. To be active an
ACL has to be bound to an entity, which could be physical or logical port. The ACL can filter incoming or
outgoing traffic. One IPv4 and one IPv6 may be bound to an entity in each direction.
Binding Access Control Lists
Once created, ACLs are applied (bound) to an entity, which could be physical or logical port. The ACL can
filter incoming or outgoing traffic. One IPv4 and one IPv6 may be bound to an entity in each direction.
If an entity bound to an ACL is deleted, all associated ACLs are automatically detached.
Multiple access lists can be configured; however, only one IPv4 ACL can be attached per management
entity (and it must be in the incoming direction) or port. An additional IPv6 ACL may coexist with one
IPv4 access list on the same interface / management entity.
Filtering
Packets attempting to enter an entity to which the ACL is bound are checked against the access list rules,
one by one. Access of matching packets is denied (packets are dropped) or permitted (packets are
forwarded), as directed by the ACL statement. ACL has three types of rules:
Remark
Free-text comment used as a bookmark in an ACL for better arrangement
Deny
ACL rule specifying fields to match. Matching packet is dropped if it was not permitted by a
previous rule.
Permit
ACL rule specifying fields to match. Matching packet is permitted if it was not denied by a
previous rule.
Fields to match are IP addresses, upper-layer protocols, ports, and other IP packet fields.After a match,
the rest of the rules are ignored. Packets not matching any rule are dropped. Empty ACLs deny access of
all packets matched to them.
SecFlow-1p
5. Management and Security
207
If a packet is denied, SecFlow-1p sends an ICMP Destination Unreachable message. To protect the
network from bandwidth exhaustion attack, the unreachable messages rate is limited for all denied
packets.
When a rule match occurs, an entry is added to the event log if logging is enabled. To prevent log
overflow, it is possible to disable logging (per rule or device) or define the minimal logging interval of
packets matching ACL entries (per device).
Note
By default, logging is disabled. If you choose to enable it, the default logging
interval is five minutes.
Two packets matching the same rule on the same entity in the same direction are logged only if the time
between them exceeds the logging interval.
Statistics
The device collects ACL statistics per router, SecFlow-1p and management entity. The statistic counters
include the number of rule matches that occurred since the counters were last cleared. The statistic
counters are cleared upon device reboot. The user may also clear ACL statistics of any entity.
Factory Defaults
Parameter defaults are alphabetically listed in the tables below.
Topic
Parameter
Default Value
Access List
access-list type
ipv4
All ACL Rules
ACL statement sequence
Highest number in use in the ACL plus 10
Deny/Permit Rule
dst-port-range
All values are filtered.
sequence-number
The last sequence number in use increased by
ten.
src-port-range
All values are filtered.
Configuring ACL
The ACL configuration tasks are performed at the access control and management levels.
SecFlow-1p
5. Management and Security
208
 To configure ACL:
1. Create an access control list.
2. Add deny and permit rules to the ACL.
3. Bind the ACL to a management entity (See Configuring Ethernet Port Parameters for binding an
Ethernet port or Configuring VLAN Port Parameters for binding a VLAN port).
Access-Control-Level Tasks
The following commands are available in the CLI access-control context: config>access-control#. The
exception to this are the deny, permit, and remark commands, which are performed in the access-list
(acl_name) context: configure>access-control>access-list (acl_name)#.
Task
Command
Comments
Creating and
deleting an ACL
access-list [{ipv4 | ipv6}] <acl_name>
You create an ACL by assigning a name and
specifying the ACL IP type. The ACL names
must be unique.
no access-list <acl_name>
The ACL name contains up to
80 alphanumeric characters.
access-list level commands (delete, deny, permit, remark)
Removing rules
from an ACL
delete <sequence-number>
Possible values for sequence-number:
1–2147483648.
Adding deny
rules to an ACL
deny {tcp|udp} {any|<src-address>[/<srcprefix-length>]} [<src-port-range>]
{any|<dst-address>[/<dst-prefix-length>]}
[<dst-port-range>] [dscp <dscp-value>] [log]
[sequence <sequence-number>]
Possible values for sequence:
1–2147483648
deny icmp {any|<src-address>[/<src-prefixlength>]} {any|<dst­address>[/<dst­prefixlength>]} [icmp-type <icmp-type-number>
[icmp­code <icmp-code-number>]] [dscp
<dscp-value>] [log] [sequence <sequencenumber>]
deny ip [protocol <ip-protocol-number>]
{any|<src-address>[/<src-prefix-length>]}
{any|<dst­address>[/<dst­prefix-length>]}
[log] [sequence <sequence­number>]
log enables logging match events of the
rule into the event log and sending SNMP
traps.
Note: If the ACL already has a statement
with the same sequence number, the old
statement is replaced with the new one.
SecFlow-1p
5. Management and Security
Task
Command
Comments
Adding permit
rules to an ACL
permit {tcp | udp} <src-address> [<src-portrange>] <dst-address> [<dst-port-range>]
[log] [sequence <sequence-number>]
Possible values for sequence:
1–2147483648.
permit icmp {any | <src-address> [/<srcprefix-length>]} {any | <dst­address>
[/<dst­prefix-length>]} [icmp-type <icmptype-number> [icmp­code <icmp-codenumber>]] [dscp <dscp-value>] [log]
[sequence <sequence-number>]
209
Note: If the ACL already has a statement
with the same sequence number, the old
statement is replaced with the new one.
permit ip [protocol <ip-protocol-number>]
{any | <src­address> [/<src­prefix­length>]}
{any | <dst­address> [/<dst­prefix­length>]}
[log] [sequence <sequence­number>]
Adding remarks
to an ACL
remark <description> [sequence <sequencenumber>]
The description contains up to 255
characters.
Resequencing the
rules in an ACL
resequence access-list <acl-name>
[<number>]
number – difference between consecutive
ACL rule numbers
Possible values for number:
1–100000
Setting the
logging interval
of all ACLs
logging access-list <interval>
no logging access-list
Enable logging at the maximum rate of the
value set at Access Control level. <0> is
equivalent to no logging access-list
command.
no logging access-list disables event
logging for all rules in the ACL.
Management-Level Tasks
The following commands are available in the CLI management context:
configure>management>access#.
SecFlow-1p
5. Management and Security
210
Task
Command
Comments
Binding the ACL to a
management entity
and defining the ACL
direction
access-group <acl-name>
When binding the ACL to the management entity,
or when adding/editing rules in an ACL that is
bound to the management entity, the rules must
conform to the following limitations:
no access-group {in} {ipv4 | ipv6}
The protocol rules must be of TCP/UDP type.
The destination address must be set to any.
The source port must be set to any.
The destination port must be tcp/830
(NETCONF), tcp/22 (SSH), udp/161 (SNMP), or
any
• DSCP, IP precedence, and P-bit cannot be used.
•
•
•
•
Clearing ACL
statistics
clear-statistics {ipv4|ipv6}
Displaying ACL
statistics
show statistics {ipv4|ipv6}
See Management Statistics below.
Displaying the
summary of ACLs
bound to a
management entity
show access-list summary
Displays ACL status at the current level
Examples
 To create a management ACL:
The example below illustrates a typical ACL applied to the incoming management traffic:
•
Allows SSH (TCP port 22) traffic from any source
•
Denies incoming SNMP (UDP PORT 161) connections from any source, except for 192.168.1.0
subnet
access-control>access-list(mng)#
remark Allow incoming SSH traffic
permit tcp any any 22
remark Allow SNMP traffic coming from 192.168.1.0 subnet
permit udp 192.168.1.0/24 any 161
remark Deny incoming SNMP traffic
deny udp any any 161
SecFlow-1p
5. Management and Security
211
The table below summarizes the rules configured for the ACL. Items in red are either implied or
unavailable for the current parameter or serve as system settings that cannot be changed. The deny rule
appearing in the bottom row is a system rule that is used to deny all non-compliant data.
Sequence
Number
Action
Protocol
Source IP
TCP/UDP
Source Port
Dest. IP
TCP/UDP Dest. Port
Log
10
Permit
TCP
Any
Any
Any
22
No
20
Permit
UDP
192.168.1.0/24
Any
Any
161
No
30
Deny
UDP
Any
Any
Any
161
Yes
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
Maximum number of rules
exceeded
You tried to add more rules than the
device can support
Delete unnecessary rules and add a
new rule once again.
Only TCP, UDP or IP rules can
be in traffic
The ACL is bound to an entity and ICMP
protocol is used.
Choose TCP, UDP or IP protocols.
Only TCP or UDP rules can be
in management ACL
The ACL is bound to management and a
protocol other than TCP or UDP is used.
Choose TCP or UDP protocol.
Sequence number is out of
range
The specified or calculated sequence
number is out of the allowed range
Change the number.
No such access-list
A non-existing ACL cannot be bound to
the entity.
Check if the ACL name is correct.
Viewing ACL Status
The ACL status displays information on the ACL name, type (IPv4 or IPv6), direction, and the entity that
the ACL is bound to at the respective level.
 To display the ACL status (management):
•
At the config>mngmnt>access# prompt, enter show access-list summary.
The following status information is displayed:
ACL Name
Type
Bound to
Direction
---------------------------------------------------------------
SecFlow-1p
4v
5. Management and Security
IPv4
mng
212
In
Viewing ACL Statistics
The ACL statistic counters gather information, per router, router interface or for management, on the
number of rule matches registered on the ACL since the last reboot or counter clearing.
Note
All ACLs have an implied last rule that denies all packets. The device does not
provide statistic counters for this rule. If you intend to collect statistics on the
number of packets discarded by the default ACL mechanism, you must add the
deny ip any any rule at the end of the ACL.
Management Statistics
 To display the ACL statistics (management):
1. At the config>mngmnt>access# prompt, enter show statistics ipv4 access-list (for IPv4) or show
statistics ipv6 access-list (for IPv6).
The following statistic information is displayed:
IPv4 access list: 4v
(in)
Bound to: Management
Matches counted for: 0 days 0 hours 2 minutes 33 seconds
--------------------------------------------------------------10
permit tcp 172.17.154.154/24 any 22 (0 matches)
20
permit tcp 172.17.154.154/24 any 830 (0 matches)
30
permit udp 172.17.154.154/24 any 161 (0 matches)
 To delete ACL statistics (management):
•
At the config>mngmnt>access# prompt, enter clear-statistics.
The statistics counters are cleared.
5.2 Authentication via RADIUS Server
RADIUS (Remote Authentication Dial-In User Service) is an AAA (authentication, authorization, and
accounting) client/server protocol that secures networks against unauthorized access. RADIUS is used to
SecFlow-1p
5. Management and Security
213
authenticate users and authorize their access to the requested system or service. The RADIUS client
communicates with the RADIUS server using a defined authentication sequence.
Note
SecFlow-1p supports RADIUS functionality; it cannot function as a RADIUS
server.
Applicability and Scaling
This feature is applicable to all the device versions.
SecFlow-1p doesn’t support RADIUS accounting.
Standards Compliance
RFC 2865, Remote Authentication Dial In User Service (RADIUS)
RFC 2618, RADIUS Authentication Client MIB
Benefits
The RADIUS protocol allows centralized authentication and access control, avoiding the need to
maintain a local user database on each device in the network.
Due to its generic nature, service providers and enterprises use the RADIUS protocol to easily manage
access to the Internet, internal networks, wireless networks, and integrated email services. These
networks may incorporate DSL, access points, VPNs, network ports, and more.
Functional Description
RADIUS servers have built-in mapping of users to service-types. Note that each user has the rights of all
users above it. All users have default password 1234. It is highly recommended to change the default
password when setting up your device. (Refer to Working with SSH on how to change a password.)
SecFlow-1p
5. Management and Security
214
RADIUS Service-Types
Name
Prompt
RADIUS Service-Type (User Access Level)
user
device-name%
1 (login)
tech
device-name%
7 (NAS prompt)
oper
device-name#
8 (authenticate only)
su
device-name#
6 (administrative)
When a user attempts to log in to SecFlow-1p, the following occurs:
1. User is prompted to enter their username and password.
2. RADIUS client submits an authentication request to the RADIUS server. The username and
encrypted password is transmitted over the network. (A hash code is generated over the
entered password and a previously defined shared secret (string of free text) is transmitted
between the RADIUS server and SecFlow-1p.)
3. The RADIUS server verifies the user information against a database stored at the RADIUS server,
and sends one of the following responses:
 Access Rejected – User is not authenticated and access to all resources is denied. User is
prompted to reenter their username and password.
 Access Accepted – User is authenticated. Access to the requested network resources is
granted. The RADIUS service-type is sent, indicating what services the user can access.
Verifying Credential s and Privileges
vi a RADIUS Data Base
Logon Request t o vCPE-OS
Management
Work Station
Network
Logging on to vCPE-OS or
Returning Authentication Error
vCPE
Operating
Syst em
RADIUS
Server
Access Accepted or Denied
Shared Secret
Factory Defaults
By default, no RADIUS servers are defined. When the RADIUS server is first defined, it is configured as
shown below.
SecFlow-1p
5. Management and Security
Parameter
Description
Default Value
address
IP address of server
0.0.0.0
key
Key
“ “ hash
retry
Max number of authentication attempts
3
timeout
Time interval between two authentication attempts
3 seconds
auth-port
UDP port used for authentication
1812
215
Configuring RADIUS Server Parameters
SecFlow-1p provides connectivity to up to four RADIUS authentication servers. You have to specify
access parameters such as Radius server ID, associated server IP addresses, the number of allowed
authentication request attempts, etc.
 To define RADIUS server parameters:
1. At the config>mngmnt>radius# prompt, type server <server-id> to specify which server to
configure. server-id can be 1-4.
The config>mngmnt>radius>server(<server-id>)# prompt is displayed.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Comments
Assigning an IP address to the RADIUS
server
address <ip-address>
A valid unicast IP address
Defining the UDP port to be used for
authentication key
auth-port <udp-port-number>
Possible values: 1–65535
Defining a non-disclosed string
(shared secret) used to encrypt the
user password.
key <string>
The shared secret is a secret
key consisting of free text
(1-79 characters) known to
the client and the server for
encryption.
Defining the number of
authentication request attempts
retry <number-of-retries>
Possible values: 0–10
Defining timeout (in seconds) for
response from RADIUS server
timeout <seconds>
Possible values: 1–5
SecFlow-1p
5. Management and Security
216
Viewing RADIUS Statistics
 To display RADIUS statistics:
•
At the config>mngmnt>radius# prompt, enter:
show statistics.
RADIUS statistics appear as shown below.
config>mngmnt>radius# show statistics
Server1
Server2
Server3 Server4
-------------------------------------------------------------------------Access Requests
:
0
0
0
0
Access Retransmits :
0
0
0
0
Access Accepts
:
0
0
0
0
Access Rejects
:
0
0
0
0
Access Challenges
:
0
0
0
0
Malformed Response :
0
0
0
0
Bad Authenticators :
0
0
0
0
Pending Requests
:
0
0
0
0
Timeouts
:
0
0
0
0
Unknown Types
:
0
0
0
0
Packets Dropped
:
0
0
0
0
Counter Discontinuity:
0
0
0
0
Counter
Description
Access Requests
Number of Access-Requests packets sent to RADIUS server
Access Retransmits
The number of RADIUS Access-Request packets retransmitted to RADIUS
server
Access Accepts
Number of Access-Accept packets sent to RADIUS server
Access Rejects
Number of Access-Reject packets received from the RADIUS server
Access Challenges
Number of Access-Challenge packets sent to RADIUS server
Malformed Response
Number of malformed Access-Requests packets received
Bad Authenticators
Number of Access-Requests packets with invalid Signature attributes
received
Pending Requests
The number of RADIUS Access-Request packets destined for this server
that have not yet timed out or received a response. This counter is
incremented when an Access-Request is sent and decremented due to
receipt of an Access-Accept, Access-Reject or Access-Challenge, a timeout
or retransmission.
SecFlow-1p
5. Management and Security
217
Counter
Description
Timeouts
Number of times a server did not respond, and the RADIUS server re-sent
the packet
Unknown Types
Number of RADIUS packets of unknown type which were received
Packets Dropped
Number of incoming packets silently discarded for some reason other
than malformed, bad authenticators or unknown types
Counter Discontinuity
Number of centiseconds since the last discontinuity in the RADIUS Client
counters. A discontinuity may be the result of a reinitialization of the
RADIUS Client module within the managed entity.
 To clear RADIUS statistics:
•
At the config>mngmnt>radius# prompt, enter:
clear statistics
The RADIUS statistics are cleared.
5.3 Authentication via TACACS+ Server
TACACS+ (Terminal Access Controller Access Control System Plus) is a security application that provides
access control for routers, network access servers, and other networked computing devices via one or
more centralized servers. TACACS+ provides separate authentication, authorization, and accounting
services. It is used to communicate between the switch and an authentication database. As TACACS+ is
based on TCP, implementations are typically resilient against packet loss.
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
TACACS+ Protocol Version 1.78 (IETF draft-grant-tacacs-02)
SecFlow-1p
5. Management and Security
218
Benefits
The TACACS+ protocol allows centralized authentication and access control, avoiding the need to
maintain a local user data base on each device on the network. The TACACS+ server encrypts the entire
body of the packet, but leaves a standard TACACS+ header.
Customers do not have to adapt their TACACS+ server privilege levels to RAD CLI default values; CLI
levels can be remapped in accordance with the customer’s TACACS+ levels.
Functional Description
TACACS+ is a protocol that provides access control for routers, network access servers, and other
networked computing devices via one or more centralized servers. TACACS+ is based on the AAA model:
•
Authentication – The action of determining identity of a user
•
Authorization – The action of determining what a user is allowed to do. It can be used to
customize the service for the particular user.
•
Accounting – The action of recording what a user is doing, and/or has done
Note
TACACS+ performs authorization according to the user level; it does not send
each command to the server for authorization.
The TACACS+ client can be configured to use authentication/authorization with or without accounting
functionality.
When configuring users on external TACACS+ servers, see User Access to define authorization levels for
SecFlow-1p users. Note that each user has the rights of all users below it, in addition to those explained
in its description.
Level
User
Allowed Actions
Description
3
user
Monitoring
Commands that do not affect services, traffic, or
configuration
6
tech
Diagnostics
Commands that may affect services and traffic, but are
not saved in the database
9
oper
Configuration
Commands that change configuration parameters
permanently
12
su
User management
Commands that manage users in the database
SecFlow-1p
5. Management and Security
219
Components
The TACACS+ remote access environment has three major components: access client, TACACS+ client,
and TACACS+ server.
•
The access client is an entity which seeks the services offered by the network.
•
TACACS+ client, running on SecFlow-1p, processes the requests from the access client and
passes this data to TACACS+ server for authentication.
•
TACACS+ server authenticates the request, and authorizes services over the connection. The
TACACS+ server does this by matching data from the TACACS+ client`s request with entries in a
trusted database.
TACACS+ server decides whether to accept or reject the user's authentication or authorization. Based on
this response from the TACACS+ server, the TACACS+ client decides whether to establish the user's
connection or terminate the user's connection attempt. The TACACS+ client also sends accounting data
to the TACACS+ server to record in a trusted database.
TACACS+ uses TCP for its transport and encrypts the body of each packet. TACACS+ client and server can
agree to use any port for authentication and accounting. TACACS+ supports authentication by using a
user name and a fixed password.
Accounting
SecFlow-1p supports up to five accounting groups, with up to five TACACS+ servers per group. However,
each TACACS+ server can be bound to a single accounting group only.
A group can be defined with its own accounting level:
•
Shell accounting, which logs the following events:
 Successful logon
 Logon failure
 Logout
 SecFlow-1p - terminated management session
•
System accounting, which logs alarms and events
•
Command accounting, which logs CLI commands and level changes executed by the user or the
SecFlow-1p scheduler
Mapping Privilege Levels
SecFlow-1p supports software configuration of mapping CLI levels to TACACS+ privilege levels.
SecFlow-1p
5. Management and Security
220
•
There are 16 TACACS+ privilege levels.
•
You can map a CLI level to multiple TACACS+ levels.
•
You cannot map a TACACS+ level to multiple CLI levels. If the command is repeated for a
TACACS+ level, the new mapping replaces the old one.
•
You can unmap both TACACS+ and CLI levels, with the exception of su, which must be mapped
to at least one TACACS+ level.
Factory Defaults
By default, no TACACS+ servers are defined. When the TACACS+ server is first defined, it is configured as
shown below.
Parameter
Default Value
key
Empty string
retry
1
timeout
5 seconds
authentication-port
49
accounting-port
49
Administrative status
shutdown
Accounting group membership
None
Configuring TACACS+ Entities
TACACS+ Server
SecFlow-1p provides connectivity to up to five TACACS+ authentication servers. You must specify the
associated server IP address, key, number of retries, etc.
Note
If you intend to use TACACS+ for authentication, verify that TACACS+ is
selected as a level-1 authentication method.
SecFlow-1p
5. Management and Security
221
 To configure a TACACS+ server:
1. At the config>mngmnt>tacacsplus# prompt, type server <ip-address> to specify the server IP
address.
The config>mngmnt>tacacsplus>server (<ip-address>)# prompt is displayed.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Comments
Defining the TCP port to be
used for accounting
accounting-port
<port-number>
Possible values: 1–65535
Defining the TCP port to be
used for authentication
authentication-port
<port-number>
Possible values: 1–65535
Binding accounting group to
TACACS+ server
group <string>
no group detaches accounting group from
server.
Defining a non-disclosed
string (shared secret) used to
encrypt the user password
key <string> [hash]
The shared secret is a secret key consisting of
free text known to the client and the server
for encryption.
The hash keyword denotes that the string is
hashed, rather than clear text; usually it is
added by the device after hashing the clear
text that the user enters, before saving it in
the database.
If you enter the password as a text string, do
not use the hash parameter. Use it only if you
are specifying the password as a hashed
value (obtained by using the info command
to display TACACS+ data).
Defining the number of
authentication request
attempts
retry
<number-of-retries>
Permanently set to 1
Defining timeout (in
seconds) for response from
TACACS+ server
timeout <seconds>
Possible values: 1–30
Administratively enabling
server
no shutdown
shutdown administratively disables the
server
Displaying statistics
show statistics
Clearing statistics
clear-statistics
SecFlow-1p
5. Management and Security
222
Accounting Groups
 To configure accounting groups:
1. At the config>mngmnt>tacacsplus# prompt, type group <group-name> to configure an
accounting group with the specified name.
The config>mngmnt>tacacsplus>group (<group-name>)# prompt is displayed.
2. To define the accounting for the group, enter:
accounting [shell] [system] [commands]
Note
•
•
You can enter any combination of the parameters shell, system, or
commands, but you must enter at least one of them.
Type no accounting to disable TACACS+ accounting for the group.
3. Type exit to return to the TACACS+ level.
The config>mngmnt>tacacsplus# prompt is displayed.
4. Type server <ip-address> to select the TACACS+ server to which to bind the group.
The config>mngmnt>tacacsplus>server (<ip-address>)# prompt is displayed.
5. At the config>mngmnt>tacacsplus>server (<ip-address>)# prompt, enter group < group-name>
to bind the previously defined accounting group to the TACACS+ server.
Mapping CLI Levels to TACACS+ Privilege Levels
 To map a CLI level to a TACACS+ privilege level:
1. At the config>mngmnt>tacacsplus# prompt, type
privilege-level <tacacs-privilege-level> { su | oper | tech | user}.
The tacacs-privilege-level value can be 0-15.
Note
Type no privilege-level <tacacs-privilege-level> to remove TACACS+ privilege
level mapping.
SecFlow-1p
5. Management and Security
Examples
Defining Server
The example below illustrates the procedure for defining a TACACS+ server.
•
Server IP address: 175.18.172.150
•
Key: TAC_server1
exit all
configure management tacacsplus
server 175.18.172.150
key TAC_server1
no shutdown
exit all
save
 To display the configuration from the above example:
# configure management tacacsplus server 175.18.172.150
config>mngmnt>tacacsplus>server(175.18.172.150)# information detail
key "244055BF667B8F89225048C6571135EF" hash
retry 1
timeout 5
authentication-port 49
accounting-port 49
no group
no shutdown
Defining Accounting Group
The example below illustrates the procedure for defining an accounting group.
•
Group name: TAC1
•
Accounting: Shell, system, and commands
•
Bound to server defined in the example above.
exit all
configure management tacacsplus
group TAC1
accounting shell system commands
exit
server 175.18.172.150
group TAC1
exit all
configure management tacacsplus server 175.18.172.150
config>mngmnt>tacacsplus>server(175.18.172.150)# info detail
223
SecFlow-1p
5. Management and Security
224
key "244055BF667B8F89829AB8AB0FE50885" hash
retry 1
timeout 5
authentication-port 49
accounting-port 49
group "TAC1"
no shutdown
Mapping CLI Level to Privilege Level
 To map TACACS+ level 7 to the CLI user level:
configure management tacacsplus privilege-level 7 user
 To delete the mapping of TACACS+ level 7 to the CLI user level:
configure management tacacsplus no privilege-level 7
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
su level must be mapped to a
TACACS+ level
You tried removing the last mapping of su, but su
must be mapped to at least one TACACS+ level.
Leave at least one
mapping of su.
Viewing TACACS+ Statistics
 To display TACACS+ statistics:
•
At the config>mngmnt>tacacsplus>server (<ip-address>)# prompt, type:
show statistics.
The TACACS+ statistic counters are displayed.
config>mngmnt>tacacsplus>server(175.18.172.150)$ show statistics
Requests
0
Request Timeouts
0
Unexpected Responses
0
Server Error Responses 0
Incorrect Responses
0
SecFlow-1p
Transaction Successes
Transaction Failures
Pending Requests
5. Management and Security
225
0
0
0
Counter
Description
Requests
Number of authentications performed toward a specific TACACS+
server
Request Timeouts
Number of transaction timeouts that occurred between the client
and server
Unexpected Responses
Number of times the TACACS+ client receives a TACACS+ packet that
is not expected at that time. Usually, this occurs due to a delayed
response to a request that has already timed out
Server Error Responses
Number of errors received from the TACACS+ server
Incorrect Responses
Number of times the TACACS+ client:
• Fails to decrypt the packet
• Detects an invalid field in the TACACS+ packet
• Receives a response that is not valid according to the initial
request
Transaction Successes
Number of successful transactions between the client and TACACS+
server
Transaction Failures
Number of times the TACACS+ client’s request is aborted by the
TACACS+ server or the server fails to respond after maximum retry is
exceeded
Pending Requests
Number of TACACS+ client’s requests minus number of TACACS+
server responses or timeouts
 To clear TACACS+ statistics:
•
At the config>mngmnt>tacacsplus>server (<ip-address>)# prompt, type:
clear-statistics.
TACACS+ statistic counters are set to 0.
SecFlow-1p
5. Management and Security
226
5.4 DHCP Server
SecFlow-1p supports Dynamic Host Configuration Protocol (DHCP) server functionality for IPv4 clients.
Based on the Bootstrap Protocol (BOOTP), DHCP server assigns to DHCP clients IPv4 addresses from
configured pools, as well as various configuration parameters (DHCP options), in response to the
broadcast requests of DHCP clients. This functionality eliminates the need to manually assign an IP
address for each potential client.
It is possible to configure a single DHCP server instance. It can be bound to any VRF.
Note
•
•
DHCP server, client applications are independent. You can configure
neither or any combination of them.
DHCP server is not supported on tunnel interfaces.
Applicability and Scaling
This feature is applicable to all SecFlow-1p versions.
Standards Compliance
RFC 951 – Bootstrap Protocol
RFC 1542 – Clarifications and Extensions for the Bootstrap Protocol (relay agent requirements)
RFC 2131 – Dynamic Host Configuration Protocol
RFC 2132 – DHCP Options and BOOTP Vendor Extensions (basic DHCP options)
Benefits
The main benefits of DHCP servers are:
•
Reduced costs of IP addresses – There is no need to buy and manage an IP address for each
potential client. For example, there is no need to manually assign an address for each machine
that is connected to the network, even briefly or rarely.
SecFlow-1p
5. Management and Security
227
•
Reduced access costs – Dynamic addresses are cheaper than static addresses.
•
Reduced client configuration costs – DHCP ease of configuration leads to fast deployment and
less operational overhead. There is no need to manually configure connectivity parameters on
each client, except for very basic configuration (and sometimes not even this). The DHCP server
can even start a zero touch configuration process, which completely configures the client
without network manager intervention.
•
Centralized management – Network managers only need to configure a single central server. If a
global parameter, e.g. DNS server, is changed, there is no need to manually configure all the
clients in the network.
Functional Description
The following describes the DHCP flow, from the time the client sends a broadcast DHCP request and
until the IP addresses are distributed.
1. The DHCP client sends to the DHCP server a broadcast DHCP request.
2. Any listening DHCP server can assign an IP address to the DHCP client (based on information
sent by the client), as well as other options. Before assigning an IP address, the server pings it. If
a reply is received, this means the address is a conflict, meaning it is an address that is already
occupied. The conflict enters the conflicts table.
3. DHCP server sends back to the client a lease offer, containing an IP address and possibly other
parameters. It sends its IP address in option 54 (server identifier) to the client.
Note
If the DHCP server offers a lease and the client then sends a DHCP request
with an IP address of a different server (in option 54), the server assumes that
the request is no longer relevant, and return the offered address to the pool of
available addresses.
4. The DHCP client accepts the offer. If the DHCP client received more than one lease offer, it
chooses a lease; usually the first one it received.
5. Before accepting a lease, a typical client sends a gratuitous ARP to the IP address it is about to
use. If two replies are received, the client should decline the lease, and the server places the IP
address into the conflicts table.
6. The server acknowledges the lease.
SecFlow-1p saves the lease in a database that includes all active and inactive leases. The lease database
with address binding (IP address to client hardware address) resides in permanent memory that
withstands reboot. If possible, SecFlow-1p assigns to clients the same IP addresses they previously had.
SecFlow-1p
5. Management and Security
228
The lease is usually granted for a limited time; therefore, the DHCP client should renew it before it
expires. A DHCP client may also release a lease once is no longer needed.
The server does not delete a binding from the database when a lease expires. However, if a new client
asks for an address and the server does not have a free address, then one of the unused addresses from
the database may be used.
The server also saves a table of conflicts. A conflict is an IP address that the server tried to assign but
found out it is already occupied. The server does not assign an address from the conflicts table unless all
non-conflicting addresses belong to active leases.
If you change the configuration so that it renders active leases invalid (such as changing a pool’s range of
addresses or network, excluding an address), the server removes the leases from the binding database.
Addresses in the conflict database that are no longer valid are also removed.
The device may function as DHCP client or server at the same time.
DHCP Options
The following Tx options (i.e. sent from server to client) are supported by RAD DHCP server and RAD
clients:
•
Default routers (3) – one or two
•
Lease time (51) – offered lease time
•
Server identifier (54) – IP address of the server offering the lease; not configurable
The following Tx options are supported by RAD DHCP server, but unsupported by RAD clients:
•
Domain name system (DNS) servers (6) – one or two
•
Domain name (15)
•
NetBIOS name server (44)
•
NetBIOS node type [b, p, m, or h] (46)
The following Rx options (i.e. sent from client to server) are supported by RAD DHCP server and RAD
clients:
•
Lease time (51) – requested lease time
•
Server identifier (54) – IP address of the server whose offer is accepted (also used by clients to
send unicast messages to the server)
•
Client identifier (61) – client unique identifier (typically MAC address, but can be any other
string)
SecFlow-1p
5. Management and Security
229
The following Rx options are supported by RAD clients, but ignored by RAD DHCP server:
•
Host name (12) – client host name
•
Vendor class identifier (60) – client vendor identifier
Note
•
•
Options 66 (TFTP server name), 67 (boot file name), and 150 (TFTP server
address) are not supported by RAD DHCP server although RAD clients use
them for the zero touch configuration process.
Unsupported received DHCP options are ignored. They do not invalidate a
request.
Manual Bindings
In cases when it is important that a client, usually a router or server, not change its address, it is possible
to configure manual bindings, i.e. IP addresses that are manually mapped to clients. This directs the
server to grant fixed addresses to specific clients (usually recognized by their MAC address).
DHCP Lease Offer Message
When offering a lease, the server builds a DHCPOFFER message, locates the assigned IP address, and
adds the following options:
•
DHCP message type (53) – 2, in case of a DHCP offer
•
Subnet mask (1) – The subnet mask of the client, taken from the host or network command of
the pool configuration.
•
Lease time (51) – Time the lease is valid
•
Renewal (T1) time value (58) – time (in seconds) at which the client should transition to the
renewing state.
 If the offered lease time is infinite, this option is not sent. Otherwise it is set to the default,
which is 0.5 of the lease time.
•
Rebinding (T1) time value (59) – Time (in seconds) at which the client should transition to the
rebinding state.
 If the offered lease time is infinite, this option is not sent. Otherwise, it is set to the default,
which is 0.875 of the lease time.
•
Server identifier (54) – IP address of the server
•
Any of the following options, if configured:
 Default router (3) – one or two IP addresses
SecFlow-1p





•
5. Management and Security
230
DNS server (6) – one or two IP addresses
Domain name (15) – a string
TFTP server name (66) – a string
NetBIOS name server (14) – one or two IP addresses.
NetBIOS node type (46) – b, p, m, or h
The end option (255) – Marks the end of valid information in the vendor field.
Factory Defaults
By default, no DHCP server or DHCP server pool is defined. When a DHCP server or DHCP server pool is
first defined, it is configured as shown below.
Parameter
Default Value
DHCP server
number
1
clear
--
bind
router 1
exclude-address
--
shutdown
no shutdown
pool
no pool
tftp-server-name
no tftp-server-name
DHCP server pool
address-range
no address-range
client-identifier
no client-identifier
default-router
no default-router
dns-server
no dns-server
domain-name
no domain-name
hardware-address
no hardware-address
host
no host
lease-default
no lease-default
netbios-name-server
no netbios-name-server
SecFlow-1p
5. Management and Security
Parameter
Default Value
netbios-node type
no netbios-node type
network
no network
relay-information
no relay-information
231
Configuring DHCP Server
You can configure a single DHCP server as follows:
1. Globally enable DHCP server functionality (the default).
2. By default, no DHCP server exists. Create a single instance of DHCP server.
3. Exclude addresses that should never be assigned to clients; typically addresses that are statically
configured on servers or routers.
4. Configure DHCP pools containing:
 Range of addresses (or a single address) to assign to clients
 Various DHCP options to send to clients
 Definitions of clients eligible to get lease from the pool
5. Host and subnetwork inherit options from larger networks (simplifying the configuration):
 For example, a global pool (e.g. 192.168.0.0) can contain global options, such as domain
name.
 Additional pools are set for subnets (e.g. 192.168.1.0 and 192.168.2.0), each with its own
default gateway.
 To configure the DHCP server:
1. Navigate to configure system [no] dhcp-server [<number>}.
The config>system>dhcp-server# prompt is displayed.
Note
•
•
<number> is the number of the dhcp-server, which can only be 1.
Type no dhcp-server to remove the DHCP server from the router.
2. At the config>system>dhcp-server# prompt, enter the necessary commands according to the
tasks listed below.
SecFlow-1p
5. Management and Security
232
Task
Command
Comments
Binding DHCP server to
router
bind router <number>
number – router number
Clearing DHCP server
bindings, conflicts, or
statistics
clear {binding {address <ipv4address> | all} | conflict
{address <ipv4-address> | all}}
• You can clear the entire DHCP
server binding database, or
binding of a specific address.
• When clearing a specific
address, if ipv4-address does
not exist in the database, an
error message is generated:
No such address.
• You can clear the entire
conflicts database, or a
specific conflicting address.
• Clearing all conflicts clears
both abandoned (declined by
clients) and blocked (already
in use) addresses.
Configuring the IP address
that is not to be offered to a
client
[no] exclude-address <ipv4address>
A single address to be excluded
can be configured per command.
Note: The DHCP server works only
on the router to which it is bound.
If the bound router does not exist,
the DHCP server is idle.
Repeating this command adds
new excluded addresses; it does
not replace previous excluded
addresses.
Note: Excluded addresses are
typically addresses that are
statically configured on servers or
routers.show
Configuring DHCP server pool
[no] pool
See Configuring DHCP Server
Pool.
Typing no pool removes the DHCP
server pool and the configuration
related to it (IP address ranges
and DHCP options).
Displaying DHCP server
bindings
show binding
See Viewing DHCP Server Binding
SecFlow-1p
5. Management and Security
233
Task
Command
Comments
Displaying DHCP server
conflicts
show conflict
See Viewing DHCP Server Conflict
Displaying DHCP server
statistics
show statistics
See Viewing DHCP Server
Statistics
Disabling/enabling DHCP
server functionality
[no] shutdown
DHCP server functionality is
enabled by default.
Notes:
• The DHCP client functions are
not affected by this command.
• When disabled, the rest of the
server configuration is
ignored.
Configuring DHCP Server Pool
By default, no DHCP server pool exists. The following procedure describes how to create a DHCP server
pool. Each pool must be assigned a unique name.
The DHCP server offers leases based on the pools’ configurations.
 To configure the DHCP server pool:
1. Navigate to configure system [no] dhcp-server pool [name].
The config>system>dhcp-server>pool# prompt is displayed.
2. At the config>system>dhcp-server>pool# prompt, enter the necessary commands according
to the tasks listed below.
Note
•
•
Typing no pool removes the DHCP server pool, as well as the configuration
related to it.
You must assign a unique pool name of 1 to 80 characters
Task
Command
Comments
Configuring range of IP
addresses that server can
assign to clients
[no] address-range
<start-ip> <end-ip>
start-ip – lowest IPv4 address of the range
(relevant only for pool
bound to network)
end-ip – highest IPv4 address of the range
Notes:
SecFlow-1p
Task
5. Management and Security
Command
234
Comments
• An address range can be configured only if
the pool is bound to a network. It is
irrelevant if the pool is bound to a host.
• The address range must be inside the
pool’s subnet (configured with the
network command).
• If no range is configured, the default value
is the entire subnet of the pool.
• A single range can be configured per pool.
• Typing no address-range <start-ip> <endip> deletes an existing range. If the
specified range is not exactly the one
configured by the command, range is not
deleted.
Configuring client
identifier (DHCP option
61)
client-identifier <uniqueidentifier>
no client-identifier
Client identifier (option 61) is used for manual
binding, i.e. assigning a preconfigured IP
address to a specific client.
unique-identifier – client identifier; 1-255
character string
Notes:
• Client identifier can be configured only if
the pool is bound to a host (using host
command).
• If the command is repeated, it replaces
the previous one.
• Either client identifier or hardware
address can be configured; not both.
• You cannot configure a client identifier
already configured on another pool.
• Typing no client-identifier removes the
client identifier from the pool.
• Client identifier can be a hexadecimal
number or a string
• String format is <string>
• Hexadecimal number format is 1:<hex>
Configuring default
router (DHCP option 3)
default-router <address>
[<address-2>]
no default-router
address – default router IPv4 address
address-2 – second default router IPv4
address
Notes:
SecFlow-1p
Task
5. Management and Security
Command
235
Comments
• Repeating this command replaces the
previous one.
• address-2 must be different than address1.
Configuring Firewall
server (DHCP option 6)
dns-server <address>
[<address-2>]
address – DNS server IPv4 address
(mandatory)
no dns-server
address-2 – second DNS server IPv4 address
(optional)
Notes:
• Repeating this command replaces the
previous one.
• address-2 must be different than address1.
Configuring domain
name (DHCP option 15)
Configuring client
hardware address (MAC
address)
domain-name <domain>
no domain-name
hardware-address <macaddress>
no hardware-address
Domain – domain name; 1-255 character
string
Note: Repeating this command replaces the
previous one.
MAC address is used for manual binding, i.e.
assigning a preconfigured IP address to a
specific client.
mac-address – client MAC address
Notes:
• The hardware address can be configured
only if the pool is bound to a host
(configured with the host command).
• Repeating this command replaces the
previous one.
• Either client identifier or hardware
address can be configured; not both.
• You cannot configure a hardware address
already configured on another pool.
Configuring client IP
address and prefix length
host <ipv4-address>/
<prefix-length>
no host
Ipv4-address – client IPv4 address
Prefix-length – client IP prefix length
Possible values: 1-32
Notes:
SecFlow-1p
Task
5. Management and Security
Command
236
Comments
• If no host is invoked while client identifier
or hardware address is configured, the
device deletes the configured client
identifier or hardware address.
• Repeating this command replaces the
previous one.
• Either the host or network command can
be configured; not both.
• The address (while taking into account the
prefix length) must be a unicast address.
• The same pair of address and prefix length
may not be configured on more than one
pool.
• The mask (reflecting the prefix length) is
passed to the client in option 1.
Learning pool
configuration from DHCP
client
[no] learn-from-dhcpclient router <router>
interface <interface>
router, interface – router interface from
which to learn DHCP information
Configuring lease default
validity time (DHCP
option 51)
lease-default {time
<days> [<hours>
[<minutes>]] | infinite}
Possible values: 60-8640000 seconds (100
days); infinite (lease never expires, unless the
client releases it.)
no lease-default
Notes:
• If you configure lease validity time to
between 60 and 8640000 (100 days)
seconds, the server grants it.
• If you configure less than 60 seconds, the
server offers 60 seconds.
• If you configure more than 8640000
seconds, the server offers 8640000
seconds.
• If the client does not send option 51, i.e. it
does not state for how much time it
requires the lease, the server offers the
default lease time (one day, unless
otherwise configured).
• Repeating this command replaces the
previous one.
SecFlow-1p
5. Management and Security
237
Task
Command
Comments
Configuring NetBIOS
name server (DHCP
option 44)
netbios-name-server
<address> [<address-2>]
address – NetBIOS name server IPv4 address
no netbios-name-server
address-2 – Second NetBIOS name server IPv4
address
Note: Repeating this command replaces the
previous one.
Configuring NetBIOS
node type (DHCP option
46)
netbios-node-type
<type>
Type – NetBIOS node type
Possible values: b, p, m, h
no netbios-node-type
Note: Repeating this command replaces the
previous one.
Configuring client
network IPv4 address and
mask
network <ipv4address>/<prefix-length>
Ipv4-address – client IP address
no network
Prefix-length – client IP prefix length
Possible values: 1-32
Notes:
• If the network is deleted or changed in
such a way that the configured ranges are
not in it, the device deletes the ranges
that are out of the newly configured
network.
• Repeating this command replaces the
previous one.
• Either the host or network command can
be configured; not both.
• The IP address (while taking into account
the prefix length) must be a subnet
address.
• The same pair of address and prefix length
cannot be configured on more than one
pool.
Configure relay agent
information (DHCP
option 82)
relay-information circuitid <circuit-id>
relay-information
remote-id <remote-id>
no relay-information
Matching the received option 82 with the
configuration determines the clients that can
receive offers of the pool.
Notes:
• Repeating this command replaces the
previous one.
• Either circuit-id or remote-id can be
specified, as only one of them can be
matched with received option 82.
SecFlow-1p
5. Management and Security
Task
Command
238
Comments
• Option 82 cannot be matched with a hex
pattern.
• The relay agent information option can be
configured only if the pool is bound to a
network.
The same pair of address and prefix length
cannot be configured on more than one pool.
tftp-server-name
<name>
no tftp-server-name
Configure TFTP server
name (DHCP option 66)
Viewing DHCP Server Binding
You can display the DHCP server binding database, which includes all IP addresses that have already
been assigned, lease expiration time and date, and the hardware addresses of the clients.
 To display the DHCP server binding information:
•
At the config>system>dhcp-server# prompt, enter show binding.
The DHCP server binding information is displayed.
IP Address
:
Binding State:
Bound to
:
MAC
:
ID
:
Lease Time
:
Expires At
:
192.168.1.1
active
11:22:33:44:55:66
0x01 rad111
864000 seconds
1949/10/01 01:11:12
DHCP Server Binding Parameters
Counter
Description
IP Address
Lease IPv4 address
Binding State
Binding state.
Possible values: free, offered, active, expired,
released, abandoned, permanent, bootp,
blocked
Bound to MAC
Client MAC address
Possible values: MAC address, formatted
xx:xx:xx:xx:xx:xx
SecFlow-1p
5. Management and Security
Counter
Description
Bound to ID
Client ID
239
Possible values: Hex string. Readable characters
are printed as is; for non-readable, the hex
value is printed preceded by 0x; for example:
0x01 rad111.
Lease Time
Lease time in seconds
Expires At
Lease expiration date and time, formatted as
other date and time parameters in the device
Viewing DHCP Server Conflict
You can display the DHCP server conflict information, which includes all address conflicts that have been
recorded by the DHCP server, including:
•
Abandoned addresses – addresses that clients have declined (they expire after a timeout)
•
Blocked addresses – addresses that were in use without the server assigning them.
 To display the DHCP server conflict information:
•
At the config>system>dhcp-server# prompt, enter show conflict.
The DHCP server conflict information is displayed.
IP Address
Expires in
--------------------------1.1.1.1
-- seconds
100.100.100.100 390 seconds
DHCP Server Conflict Parameters
Counter
Description
IP Address
Conflict IPv4 address
Expires in
Time (in seconds) remaining before the conflict expires
Possible values:
-- – if there is no expiration time, such as for blocked
addresses
number – if there is an expiration time, such as for
abandoned addresses
SecFlow-1p
5. Management and Security
240
Viewing DHCP Server Statistics
You can display the DHCP server statistics.
 To display the DHCP server statistics:
•
At the config>system>dhcp-server# prompt, enter show statistics.
The DHCP server statistics are displayed.
Address Type Total
------------------Free
10
Offered
1
Active
100
Expired
2
Released
-Abandoned
-Permanent
-Bootp
-Blocked
1
DHCP Server Statistics Counters
Counter
Description
Free
Total number of free addresses
Offered
Total number of offered addresses
Active
Total number of active addresses
Expired
Total number of expired addresses
Released
Total number of released addresses
Abandoned
Total number of abandoned addresses
Permanent
Total number of permanent addresses
Bootp
Total number of bootp addresses
Blocked
Total number of blocked addresses
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
SecFlow-1p
5. Management and Security
241
Message
Cause
Corrective Action
No such address
You tried clearing an IPv4 address
that does not exist in the database.
Make sure the address is in the
database.
The pool is not bound to network
You tried to configure a range of
addresses for a pool that has not
been bound to a network.
Bind the pool to a network using
the network command.
Range is not inside the pool’s
network
You tried to configure a range that
is not in the pool’s subnet.
Configure a range inside the pool’s
subnet, using the network
command.
Range is already configured
You can only configure a single
range per pool. You already
configured a range for the pool.
Delete the existing address range,
and then configure a new range.
Range does not exist
You tried to delete an address
range that is not exactly the same
as the one configured.
Delete the exact address range that
you configured.
The pool is not bound to host
You tried to configure a network
while a host is configured.
Unbind the pool from the network,
and bind it to a host using the host
command.
You tried to configure a client
identifier (option 61) or hardware
address (MAC) for a pool that is not
bound to a host.
Bind the pool to a host using the
host command.
Cannot have both client-identifier
and hardware-address
You configured a client identifier
when a hardware address is
already configured, or vice versa.
Remove the client identifier or
hardware address configuration.
Client identifier configured on
different pool
You tried to configure a client
identifier that has already been
configured on another pool.
Configure a unique client identifier.
Hardware address configured on
different pools.
You tried to configure a hardware
address that has already been
configured on another pool.
Configure a unique hardware
address.
The pool is bound to network
You tried configuring a host while
pool was bound to a network.
Unbind the pool from the network.
Invalid address or prefix length
You entered a non-unicast address.
Enter a valid unicast address
(taking into account the prefix
length).
SecFlow-1p
5. Management and Security
Message
Cause
Corrective Action
Address and prefix configured on
another pool
You configured the same pair of
address and prefix length on
another pool.
Configure a unique address and
prefix length pair.
The pool is bound to host
You tried configuring a network
while pool was bound to a host.
Unbind the pool from the host.
Invalid address or prefix length
In case of a host: You entered a
non-unicast address.
Enter a valid unicast IP address
(taking into account the prefix
length).
In case of a network: You entered a
non-subnet address.
Enter a valid subnet IP address
(while taking into account the
prefix length).
242
5.5 DHCPv6 Server
SecFlow-1p supports Dynamic Host Configuration Protocol Version 6 (DHCPv6) server functionality for
IPv6 clients. DHCPv6 server assigns to DHCPv6 clients IPv6 addresses from configured pools, in response
to broadcast requests of DHCPv6 clients. This functionality eliminates the need to manually assign an IP
address for each potential client. In addition, layer-2 or layer-3 DHCP relays can negotiate DHCP
information on behalf of a client, if the client and server are not directly connected.
You can configure a single DHCP server on any VRF (router instance).
Note
•
•
DHCPv6 server, relay, and client applications are independent. You can
configure neither or any combination of them.
DHCP server is not supported on tunnel interfaces.
Applicability and Scaling
This feature is applicable to ODM HW devices with an embedded router.
Standards Compliance
[RFC 3315] – Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
SecFlow-1p
5. Management and Security
243
[RFC 3633] – IPv6 Prefix Options for DHCPv6
[RFC 3646] – DNS Configuration Options for DHCPv6
[RFC 4862] – IPv6 Stateless Address Autoconfiguration
Benefits
The main benefits of DHCP servers are:
•
Reduced costs of IP addresses – There is no need to buy and manage an IP address for each
potential client. For example, there is no need to manually assign an address for each machine
that is connected to the network, even briefly or rarely.
•
Reduced access costs – Dynamic addresses are cheaper than static addresses.
•
Reduced client configuration costs – DHCP ease of configuration leads to fast deployment and
less operational overhead. There is no need to manually configure connectivity parameters on
each client, except for very basic configuration (and sometimes not even this). The DHCP server
can even start a zero touch configuration process, which completely configures the client
without network manager intervention.
•
Centralized management – Network managers only need to configure a single central server. If a
global parameter, e.g. DNS server, is changed, there is no need to manually configure all the
clients in the network.
Functional Description
DHCPv6 server can operate in two modes:
•
Stateless mode – The client derives its IP address from Router Advertisements (RA) and the
server only provides options that cannot be obtained by RA, such as DNS server address.
Stateful mode – The server provides IP addresses as well, and saves the bindings (IP address to
hardware address) in permanent memory. This enables it to grant clients the same addresses
they previously had, to minimize the possibility of their addresses being replaced.
If it is important to preconfigure an address, typically of a router or a server, it is possible to configure a
manual binding, which directs the server to grant a fixed address to a specific client (recognized by MAC
address or other data).
•
The following describes the DHCP flow, from the time the client sends a broadcast DHCP request and
until the IP addresses are distributed.
SecFlow-1p
5. Management and Security
244
1. The DHCP client sends to the DHCP server a broadcast DHCP request (requesting a lease). If the
client and server are not directly connected to each other, the DHCP messages can be
forwarded by a DHCP Layer 2 or Layer 3 relay agent.
2. The DHCP relay agent (if one exists) intercepts the request and broadcasts it toward the DHCP
server.
3. Any listening DHCP server can assign an IP address to the DHCP client (based on information
sent by the client or relay agent), as well as other options.
4. DHCPv6 server sends the client a client identifier option (1) in DHCPv6 messages. The identifier
it carries is called DUID (DUID types: LLT, EN, and LL).
Note
If the DHCP server offers a lease and the client then sends a DHCP request
with an IP address of a different server (in option 54), the server assumes that
the request is no longer relevant, and returns the offered address to the pool
of available addresses.
5. The relay agent (if one exists) forwards the lease offer to the client.
6. The DHCP client accepts the offer. If the DHCP client received more than one lease offer, it
chooses a lease; usually the first one it received.
7. Before accepting a lease, a typical client sends a gratuitous ARP to the IP address it is about to
use. If two replies are received, the client should decline the lease, and the server places the IP
address into the conflicts table.
8. The server acknowledges the lease.
SecFlow-1p saves the lease in a database that includes all active and inactive leases. The lease database
with address binding (IP address to client hardware address) resides in permanent memory that
withstands reboot. If possible, SecFlow-1p assigns to clients the same IP addresses they previously had.
The lease is usually granted for a limited time; therefore, the DHCP client should renew it before it
expires. A DHCP client may also release a lease once is no longer needed.
The server does not delete a binding from the database when a lease expires. However, if a new client
asks for an address and the server does not have a free address, then one of the unused addresses from
the database may be used.
SecFlow-1p may function as DHCP client or server at the same time.
In cases when it is important that a client, usually a router or server, not change its address, it is possible
to configure manual bindings, i.e. IP addresses that are manually mapped to clients. This directs the
server to grant fixed addresses to specific clients (usually recognized by their MAC address).
SecFlow-1p
5. Management and Security
Factory Defaults
By default, no DHCPv6 server or DHCPv6 server pool is defined. When a DHCPv6 server or DHCPv6
server pool is first defined, it is configured as shown below.
Parameter
Default Value
DHCP server
number
1
pool
no pool
DHCP server pool
address-prefix
no address-prefix
length
64
valid-lifetime
86400 (one day)
preffered-lifetime
86400 (one day)
dns-server
no dns-server
domain-search-list
no domain-search-list
learn-from-dhcpv6-client
no learn-from-dhcpv6-client
Configuring DHCPv6 Server
You can configure the DHCP server as follows:
1. By default, no DHCPv6 server exists. Create a single instance of DHCPv6 server over any VRF
supported in the router.
2. Configure DHCP pools containing:
 Range of addresses (or a single address) to assign to clients
 Various DHCP options to send to clients
 Definitions of clients eligible to get lease from the pool
3. Host and subnetwork inherit options from larger networks (simplifying the configuration):
 For example, a global pool (e.g. 192.168.0.0) can contain global options, such as domain
name.
 Additional pools are set for subnets (e.g. 192.168.1.0 and 192.168.2.0), each with its own
default gateway.
245
SecFlow-1p
5. Management and Security
246
 To configure the DHCPv6 server:
1. Navigate to configure system dhcpv6-server [<number>].
Note
•
•
<number> is the number of the dhcpv6-server, which can only be 1.
Type no dhcpv6-server to remove the DHCPv6 server from the router.
2. At the config>system>dhcpv6-server (1)# prompt, perform the required tasks according to
the following table.
Task
Command
Comments
Configuring DHCP server pool
[no] pool
See Configuring DHCP Server Pool.
Typing no pool removes the DHCP
server pool and the configuration
related to it (IP address ranges and
DHCP options).
Displaying DHCP server bindings
Note
show binding
See Viewing DHCP Server Binding
Unlike DHCPv4 server, the DHCPv6 server (once created) is always enabled
and there is no command to disable it. However, you have to bind it to an
interface to make it work.
Configuring DHCP Server Pool
By default, no DHCPv6 server pool exists. The following procedure describes how to create a DHCPv6
server pool. Each pool must be assigned a unique name.
The DHCPv6 server offers leases based on the pools’ configurations.
 To configure the DHCPv6 server pool:
1. Navigate to configure system dhcp-server pool [name].
2. At the config>system>dhcp-server>pool# prompt, perform the required tasks according to
the following table.
Note
•
•
Typing no pool removes the DHCPv6 server pool, as well as the
configuration related to it.
You must assign a unique pool name of 1 to 80 characters.
SecFlow-1p
5. Management and Security
Task
Command
Comments
Configuring IPv6 prefix for
address assignment
address-prefix <prefix>/<length>
[lifetime {<valid-lifetime>
<preferred-lifetime> | infinite}]
prefix – IPv6 prefix
no address-prefix <prefix>/<length>
247
length – IPv6 prefix; 0-128
valid-lifetime – 60-8640000 (one
minute to one hundred days)
preferred-lifetime – 60-8640000
(one minute to one hundred days)
Notes:
• A pool may be associated with
multiple address prefixes. If the
command is repeated with a
different prefix and length it is
added to the configuration. If it is
repeated with the same prefix
and length it replaces the
previous command for that prefix
and length. The reason to do this
is to change the lifetime.
• There may not be more than one
pool with the same address
prefix. If you try to configure this,
the command is rejected, with
the error: Address prefix in use in
another pool
• If infinite is specified, octets 1821 and 22-25 are 0xffffffff.
• preferred-lifetime may not be
greater than valid-lifetime. If you
configure this, the command is
rejected, with the error:
Preferred lifetime may not be
greater than valid lifetime
Configuring DNS server (DHCPv6
option 23)
dns-server <ipv6-address> [<ipv6address-2>]
ipv6-address – DNS server IPv6
address
no dns-server
ipv6-address-2 – second DNS server
IPv6 address
Notes:
• Repeating this command replaces
the previous one.
• address-2 must be different than
address-1.
SecFlow-1p
5. Management and Security
Task
Command
Comments
Configuring domain search list
(DHCPv6 option 24)
domain-search-list <domain-name>
domain-name - 1-255 character
string
no domain-search-list [<domainname>]
248
Notes:
• Repeating this command adds it
to the configuration.
• If domain-name is omitted (in the
no form), the entire list is
deleted.
• If the name is not FQDN,
SecFlow-1p rejects the command
and prints:
cli_error: Name must be FQDN
Learning pool configuration
from DHCPv6 client
[no] learn-from-dhcpv6-client
router <router> interface
<interface> [stateless]
router, interface – router interface
from which to learn DHCPv6
information
no learn-from-dhcpv6-client DHCPv6 server does not pass to
clients information learned from a
DHCPv6 client.
learn-from-dhcpv6-client - DHCPv6
server passes to clients information
learned from a DHCPv6 client,
including IP addresses learned from
PD.
learn-from-dhcpv6-client stateless DHCPv6 server passes to clients
information learned from a DHCPv6
client, except IP addresses learned
from PD.
Viewing DHCP Server Binding
You can display the DHCP server binding database, which includes all IP addresses that have already
been assigned, lease expiration time and date, and the hardware addresses of the clients.
 To display the DHCP server binding information:
•
At the config>system>dhcp-server# prompt, enter show binding.
The DHCP server binding information is displayed.
SecFlow-1p
5. Management and Security
249
config>system>dhcp6-server(1)# show binding
Interface
: Ethernet 1
Client DUID
: LL 1 00:01:02:03:04:05
Client IPv6 Address : dead:beef:ffff:1::1/128
State
: Bound
Lease Time (seconds): 86400
Expires (seconds)
: 125
DHCPv6 Server Binding Parameters
Counter
Description
Interface
Interface from which the lease request was received
Client DUID
Possible sets of values (depends on DUID type):
• LLT, hardware type (a number), time, link-layer address
• EN, enterprise number, identifier (string)
• LL, hardware type (a number), link-layer address
Client IPv6 Address
Lease IPv6 address / prefix length
State
Binding state.
Possible values: Abandoned, Bound, Init, Reconfigure, Release,
Renewing, Requesting, Selecting
Lease Time
Lease time in seconds
Possible values: Infinite, <number of seconds>
Expires
Lease expiration time in seconds
Possible values: Infinite, <number of seconds>
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
No such address
You tried clearing an IPv6
address that does not exist in
the database.
Make sure the address is in the
database.
An address cannot be
configured more than once
You configured the same
value for address-2 and
address.
address-2 must be different from
address.
SecFlow-1p
5. Management and Security
250
Message
Cause
Corrective Action
A different prefix name is
associated with this interface
You tried to repeat the
command with a different
prefix name than previously
configured.
Repeat the command with the same
prefix name as previously
configured.
Address prefix in use in
another pool
You configured another pool
with the same prefix.
Configure pool with a unique address
prefix.
DHCP client is configured on
this interface
The DHCPv6 client, server
and relay functions are
mutual exclusive on an
interface.
You tried to configure the
DHCPv6 server or relay on
the same interface on which
a DHCPv6 client is enabled
DHCP relay is configured on
this interface
The DHCPv6 client, server
and relay functions are
mutual exclusive on an
interface.
You tried to configure the
DHCPv6 server or client on
the same interface on which
a DHCPv6 client is enabled
Preferred lifetime may not be
greater than valid lifetime
You configured preferred
lifetime to a value greater
than valid lifetime.
Configure preferred lifetime to a
value not greater than valid lifetime.
Name must be FQDN
The domain name
configured under domainsearch-list command is not a
fully qualified domain name
(FQDN).
Configure a fully qualified domain
name.
5.6 Management Access Methods
SecFlow-1p can be managed either locally from a terminal directly attached to the serial port, or
remotely, through any port, via SSH, SNMP, Web or NETCONF. Management can be limited by ACLs or
by configuring router ports as non-forwarding (effectually limiting them to management traffic).
SecFlow-1p
Note
5. Management and Security
251
The device can be managed with IP only on router 1.
Applicability and Scaling
This feature is applicable to all SecFlow-1p options.
Functional Description
You can enable or disable access to the SecFlow-1p management system via SSH, SNMP, or NETCONF
applications. By disabling SSH, SNMP, or NETCONF, you prevent unauthorized access to the system
when security of the SecFlow-1p IP address has been compromised. When SSH, SNMP, and NETCONF
are disabled, SecFlow-1p can be managed via an ASCII terminal only. A CLI session can be opened locally
from the terminal connected to the dedicated serial port. Additionally, you can enable or disable file
transfer via SFTP/SCP.
Factory Defaults
By default, access is enabled for all the applications.
In the default factory configuration, SecFlow-1p allows management from the OOB management port.
The default factory configuration includes the following:
•
Allows untagged management access from the OOB port
•
Default IP address of the Router Interface is 169.254.1.1/16
•
No default Gateway configuration
•
Allows local management access using a PC to SecFlow-1p:
 When PC uses DHCP, access to SecFlow-1p is automatically established (PC address defaults
to 169.254.x.y as no DHCP server  Microsoft protocol).
•
Not backward compatible to user configuration CLI scripts that configure OOB port
The factory default configuration is only loaded if there is no startup-config or user-default-config (for
example, after executing the factory-default command).
SecFlow-1p
5. Management and Security
252
If you copy a script and paste it to the terminal after factory-default-config is loaded, it is important to
verify that the configuration in the script does not conflict with the factory default configuration.
You can delete the factory default configuration. You can also replace the factory-default with a
download of a fresh startup-config, by performing Reset.
You can add an additional IP address over the RI to allow remote access.
When accessing remotely, it is possible to delete the local IP 169.254.1.1/16.
Configuring Management Access
This section describes how to configure general management parameters for SFTP, SNMP, SCP and SSH.
See NETCONF-Based Network Management section for management by NETCONF.
 To configure management access:
1. Navigate to configure management access.
2. At the config>mngmnt>access# prompt, enter the necessary commands according to the tasks
listed below.
Task
Command
Comments
Allowing SFTP access
sftp
Typing no sftp blocks access by SFTP
Allowing SNMP access
snmp
Typing no snmp blocks access by SNMP
Allowing SSH (Secure Shell) access
ssh
Typing no ssh blocks access by SSH
Allowing SCP access
scp
Typing no scp blocks access by SCP
5.7 Management Ports
SecFlow-1p can be managed either from a serial port set as a console or from remote, through any port.
You can configure the console parameters, including the security timeout and screen size from which
you are accessing the device.
SecFlow-1p
5. Management and Security
253
Applicability and Scaling
This feature is applicable to all the device versions.
Factory Defaults
Parameter
Default Value
console-timeout limited
10 (minutes)
length
20
serial-port-console
serial-port-console
timeout limited
10 (minutes)
Task
Command
Comments
Defining whether in case of
serial console inactivity, device
remains connected or
disconnects after a specified
time period
console-timeout forever
console-timeout forever – no timeout.
console-timeout limited
<minutes>
If you define a timeout, the timeout
value can be 1–60. The default is 10
minutes.
Defining the terminal screen
size (number of rows to
display)
length <number-of-rows>
The number of rows to print before
pausing, or 0 for no pausing (no limit on
the number of lines displayed).
Possible values: 0-255
SecFlow-1p
5. Management and Security
254
Task
Command
Comments
Using serial port as console
serial-port-console
The serial port configured as console is
the last one (the one with the highest
number)
no serial-port-console
Management connectivity via serial port
can be resumed in one of the following
ways:
• Entering serial-port-console
command via remote access (Inband
or OOB via SNMP).
• Setting to default configuration, by
using the FD button on the bottom
panel (as described in FD Button
section).
Note: If serial-port-console setting in the
running config and in the startup-config
(or other configuration file that will be
loaded) is different, the device will
reboot twice.
Defining whether in case of
SSH session inactivity, device
remains connected or
disconnects after a specified
time period
timeout forever
timeout forever – no timeout.
timeout limited
<minutes>
If you define a timeout, the timeout
value can be 1–60. The default is 10
minutes.
5.8 Management Source IP Address
The management source IP address provides a single point of contact for management applications that
interface with SecFlow-1p.
Applicability and Scaling
This feature is applicable to all the device versions.
SecFlow-1p
5. Management and Security
255
Functional Description
When a router interface responds to management packets, the responding packet source IP address is
set to the router interface IP address. If the router interface sends a management packet that is not a
response, the packet source IP address is set to the SecFlow-1p management source IP address. If the
management source IP address is not configured or the corresponding router interface is down, the
packet source IP address is set to the router interface IP address. You can configure a single
management source address for IPv4 and IPv6 to be used in all client management applications,
including: SNMPv3 (for trap), RADIUS, TACACS+, Syslog, SNTP, SFTP, and SCP.
Configuring the Management Protocols Source IP Address
 To configure the management protocols source IP address:
1. Navigate to configure management.
The config> mngmnt# prompt is displayed.
2. Type management-address <ip-address>
Note
According to the format of the IP address (IPv4 or IPv6), it is saved as the IPv4
or IPv6 management source IP address.
The management protocols source IP address is set to the specified IP address.
3. To delete the IPv4 or IPv6 management address, type:
no management-address {ipv4 | ipv6}
5.9 NETCONF-Based Network Management
NETCONF/YANG, a management interface equivalent to SNMP/MIB, enables the remote manager to
configure and monitor the device.
•
Network Configuration Protocol (NETCONF) 1.1 – a protocol that provides mechanisms to install,
manipulate, and delete the configuration of network devices. NETCONF carries configuration
data and operations as requests and replies using RPCs encoded in XML over a connectionoriented transport (SSH).
SecFlow-1p
•
5. Management and Security
256
YANG – a data modeling language used to model configuration and state data manipulated by
the NETCONF, NETCONF RPCs, and NETCONF notifications.
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
The supported NETCONF versions are based on the following standards:
•
RFC 6241 (06/2011), Network Configuration Protocol (NETCONF) 1.1
•
RFC 6020 (10/2010), YANG 1.0 - A Data Modeling Language for the Network Configuration
Protocol (NETCONF)
•
RFC 6022, YANG Module for NETCONF Monitoring
•
RFC 6243, With-defaults Capability for NETCONF
•
RFC 5277, NETCONF Event Notifications
•
RFC 6470, NETCONF Base Notifications
Benefits
•
Based on transactions, NETCONF reduces the burden on the network management station.
•
Error recovery and sequencing tasks are removed from the management side.
•
YANG enables writing automatic scripts on the management side. YANG models are richer than
MIB, in that you can formally specify capability options, i.e. what is allowed and not allowed on
the device. In MIB, you can only write a description.
•
Enhanced capabilities, in comparison to SNMP.
Functional Description
NETCONF is a session-based network management protocol that uses XML-encoded remote procedure
calls (RPCs) and configuration data to manage network devices.
SecFlow-1p
5. Management and Security
257
The mandatory transport protocol for NETCONF is SSH. The default TCP port assigned for this mapping is
830. A NETCONF server implementation listens for connections to the NETCONF subsystem on this port.
Use of a dedicated port makes it easier for the NETCONF server to identify and filter NETCONF traffic.
The following are characteristics of transactions:
•
Transactions are indivisible; all-or-nothing.
•
There is no internal order inside a transaction. It is a set of all-at-once changes; not a sequence.
•
Parallel transactions do not interfere with each other; no-crosstalk.
•
Committed data always-sticks, i.e. it remains in the system even if fail-over, power failure,
restart, or more occurs; done-is-done.
The following deployment model shows the communication between the device (NETCONF server;
equivalent to SNMP agent) and management station (NETCONF client; equivalent to SNMP manager).
NETCONF/YANG Deployment Model
Note
NETCONF Support
Configuration Data Stores
<running>
NETCONF sessions, similar to CLI sessions, generate session start and session
end events. These generated events are added by default to the event log.
SecFlow-1p
<startup>
5. Management and Security
• Running and Startup data stores locking
• Copy of Running  Startup
• Copy of Startup  Running (requires reboot)
Base Capabilities
:base:1.1
:writable-running
Direct writes to the <running> configuration data store.
:startup
Separate running and startup configuration data stores
:rollback-on-error
Upon error in <edit-config> operation, the processing is stopped
and the configuration is restored to its previous state.
Other Capabilities
:with-defaults
:notifications
:interleave
• Default-handling modes supported by the server
• The only supported mode is “trim”.
• The ability to process and send event notifications
• The same NETCONF session is used for normal operations and
for notifications
Base Operations
<get>
<get-config>
•
•
•
•
<copy-config>
•
•
•
•
•
•
<delete-config>
•
<lock>
•
<unlock>
•
<close-session>
•
<kill-session>
•
<edit-config>
<get> (filter)  data
<get-config> (source, filter)  data
The only supported Filter type is “subtree”.
Subtree filtering: Supports namespace selection, containment
nodes, selection nodes, and content match nodes; when a
content match node is used, it must be a list key.
Target
Default-operation
Test-option: Default behavior is test-then-set.
Error-option: stop-on-error, continue-on-error, rollback-on-error
Config
258
SecFlow-1p
5. Management and Security
259
Additional Operations
<get-schema>
• per RFC 6022, schema retrieval from the server
Miscellaneous Features
NETCONF sessions
Up to 10 concurrent
AAA
• Common NETCONF and CLI users
• SSH does the authentication and authorization.
Default credentials
Username = su, Password = 1234
NETCONF port
indexes:
Ethernet ports on the chassis "main/1", "main/2", etc. (instead of
"ethernet 1", "ethernet 2" in CLI).
YANG Support
All SecFlow-1p features are supported with private YANG models, which are based on the CLI tree and
commands.
The models are organized in hierarchical order. Each private model has its defined prefix, which is used
in the model itself and when imported by other models.
The corresponding file names are the same as the model name with the extension “.yang”.
Prefixes
No.
Module
Prefix
1
rad-root
root
2
rad-admin
admin
3
rad-admin-scheduler
rad-scheduler
4
rad-admin-software
software
5
rad-configure
configure
6
rad-configure-access-control
access-control
7
rad-configure-bridge
bridge
8
rad-configure-crypto
crypto
9
rad-configure-management
mgmt
10
rad-configure-management-access
mgmt-access
12
rad-configure-management-netconf
mgmt-netconf
SecFlow-1p
5. Management and Security
13
rad-configure-management-radius
radius
14
rad-configure-management-snmp
rad-snmp
15
rad-configure-management-tacacsplus
tacacs
16
rad-configure-oam
oam
17
rad-configure-oam-twamp
twamp
18
rad-configure-oam-twamp-controller
twamp-controller
19
rad-configure-oam-twamp-controller-peer
twamp-peer
20
rad-configure-oam-twamp-controller-peer-show
twamp-show
21
rad-configure-oam-twamp-responder
twamp-responder
22
rad-configure-port
port
23
rad-configure-port-cellular
cellular
24
rad-configure-port-ethernet
eth
25
rad-configure-port-ethernet-show
eth-show
28
rad-configure-port-ppp
ppp
30
rad-configure-port-virtual
virtual
31
rad-configure-port-virtual-show
virtual-show
32
rad-configure-reporting
reporting
33
rad-configure-router
router
34
rad-configure-router-bgp
bgp
35
rad-configure-router-bgp-show
bgp-show
36
rad-configure-router-bgp-policy
bgp-policy
37
rad-configure-router-interface
rif
38
rad-configure-router-interface-ospf
rif-ospf
39
rad-configure-router-interface-show
rif-show
40
rad-configure-router-nat
nat
41
rad-configure-router-ospf
ospf
42
rad-configure-router-show
router-show
43
rad-configure-router-tunnel-interface
tunnel-interface
44
rad-configure-system
system
260
SecFlow-1p
5. Management and Security
45
rad-configure-system-date-and-time
tod
46
rad-configure-system-dhcp-server
dhcp-server
47
rad-configure-system-syslog
syslog
48
rad-configure-virtualization
virt
49
rad-file
file
Note
261
RAD recommends getting the YANG models of the actual units from the
product’s schema, using the <get schema> NETCONF operation.
CLI commands, not used for configuration tasks, are mapped to YANG RPCs.
Read-only nodes (config false in YANG) are always under “show” containers. The “show” containers are
interleaved with config true nodes, i.e. not in separate state branches. Show commands have an implicit
“all” parameter, i.e. the entire data is provided without a filtering possibility.
NETCONF Notifications
Event notifications can be received over a NETCONF session by means of subscription, which serves as
an agreement and method to receive the notifications. Subscription is bound to the session lifetime.
Using this functionality, SecFlow-1p can:
•
Create notification subscription
•
Allow event filtering upon subscription creation
•
Send event notifications to the NETCONF client as the events occur within the system
•
Support replay of locally logged notifications
The same NETCONF session is used for both normal operations and for notifications.
SecFlow-1p supports NETCONF base notifications.
For each RAD generic alarm or event, there is a corresponding private NETCONF notification.
SecFlow-1p supports masking of NETCONF notifications using common alarm module capabilities.
To create a subscription and initiate a flow of notifications, the following message sequence is
established between NETCONF client(C) and server(S). The subscription specifies a <startTime>, so the
server starts by replaying logged notifications.
SecFlow-1p
5. Management and Security
In the following example, the subscription specifies a <startTime> and <stopTime>, so it starts by
replaying logged notifications. Then it returns to the state of a normal command-response NETCONF
session, after the <replayComplete> and <notificationComplete> notifications are sent, and it is
available to process <rpc> requests.
262
SecFlow-1p
5. Management and Security
263
Subscription Creation
Only the default NETCONF event stream is supported, i.e. the stream that includes all the notifications.
It is not possible to create other event streams.
It is possible to create a single notification subscription per NETCONF session.
Multiple simultaneous notification subscriptions are supported, one subscription per NETCONF session.
Logging and Replay
When NETCONF is enabled, usually, upon the device startup, a designated notification log is created.
This cyclic volatile notification log is large enough to store the last 1000 notifications. The log creation
does not depend on the subscription requests.
Alarm acknowledgement and manual clearing of the alarm log affect neither the notification log, nor
the replayLogCreationTime parameter.
SecFlow-1p
5. Management and Security
264
Notification transmission rate in a replay is limited to 10pps in total, for all notification subscriptions.
Replay notifications are sent before any notification that have occurred during the replay. In other
words, notifications are sent in ascending order of eventTime.
Standard Notifications
The following standard notifications are supported:
•
netconf-capability-change - Generated when the NETCONF server detects that the server
capabilities have changed
•
netconf-session-start - Generated when a NETCONF server detects that a NETCONF session has
started
•
netconf-session-end - Generated when a NETCONF server detects that a NETCONF session has
terminated
Standard YANG model as per RFC 6470 is supported.
Private Notifications
Private notifications are associated with RAD common (generic) alarms and events. When an alarm or
event is generated, the corresponding NETCONF notification is generated as well.
A private notification includes the following attributes:
•
Source ID - the name of the entity that caused the notification
•
Description - the compound description of the notification
•
Severity - severity values according to ITU-T X.733
•
Clear Reason - the reason for clearing the alarm (relevant only for cleared alarms)
Notification transmission rate is limited to 10pps in total, for all notification subscriptions.
Private notifications can be masked using the relevant reporting CLI commands, e.g. alarm-sourceattribute, mask-minimum-severity.
Factory Defaults
The following is the default configuration of NETCONF.
SecFlow-1p
5. Management and Security
Parameter
Description or value
inactivity-timeout
time 10 (ten minutes)
no shutdown
NETCONF is enabled.
265
Configuring NETCONF Parameters
 To configure NETCONF parameters:
1. Navigate to configure management netconf.
The config>mngmnt>netconf# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Defining NETCONF session
inactivity timeout
inactivity-timeout {time
<minutes> | infinite}
minutes: 1-60
Disabling NETCONF
shutdown
Type no shutdown to enable
NETCONF.
Examples
 To configure NETCONF session inactivity timeout to 15 minutes:
config>mngmnt>netconf# inactivity-timeout time 15
config>mngmnt>netconf#
 To configure NETCONF session inactivity timeout to be infinite:
config>mngmnt>netconf# inactivity-timeout infinite
 To disable NETCONF:
config>mngmnt>netconf# shutdown
SecFlow-1p
5. Management and Security
266
5.10 Public Key Infrastructure
SecFlow-1p supports X.509 standard that provides infrastructure for public key certificates. It is used in
various applications, such as Zero Touch configuration.
Applicability and Scaling
This feature is applicable to all the device versions.
The certificates supported by SecFlow-1p have CER format and PEM encoding. Other formats and
encodings of certificate files should be converted to CER and PEM before you can use them in SecFlow1p. Authentication with Certificate Authority allows secured communication over public network with
off-net Zero Touch provisioning.
Standards Compliance
RFC 5280 Internet X.509 Public Key Infrastructure Certificate
Functional Description
The certificate is used for initial authentication when SecFlow-1p applies to a third-party entity to
establish a secured tunnel or secured association (SA). When the SA (SSL, TLS) is established, it starts
with a mutual handshake process, when each side of SA has to provide authentication (mutual
authentication). It is secure and handy to use X.509 certificates (using RSA keys) during the process.
When both sides proved their authentication, they can proceed, exchange the keys and start to encrypt
the transmitted packets.
A certificate signed by RAD’s CA can be provided to each device.
There are two types of certificates to check the identity of the opposite side:
•
device certificate
•
CA server certificate
Signing the device’s certificate is done by a private key of the CA. CA has a public key and a private key.
The public key is located in its certificate. When the device certificate is created, it is sent to the CA
server, which signs the certificate with its private key and returns it to the sender. At the end of the
SecFlow-1p
5. Management and Security
267
process, the device certificate is created that relates, for example, the serial number of the device with
the public key of the device and all is signed in a secured way by the private key of the CA server.
For authentication, it is enough to send the device certificate. The other side can see the public key of
the device is related to the same device with a specific serial number. Now, it should be proved that the
certificate is authentic. The other side should have the certificate of CA. It takes the CA certificate
(containing the CA public key), runs it over the signature made by the private key of the CA and sees if it
is authentic. It means that binding (serial number and the device public key) is authentic and secure. It
can then identify the device by its public key.
Factory Defaults
By default, no RSA keys are defined.
Configuring X.509 Entities
This section describes how to manage SecFlow-1p certificates and keys.
 To configure RSA keys:
1. Navigate to configure crypto key.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Deleting RSA key pair
delete-rsa label <key-name>
Generating RSA key pair
generate-rsa [label <key-name>]
Comments
<key-name> – If a label is not
specified, the device uses a string
combining the configured host
name and IP domain name, with a
dot between them, if both are nonempty strings
The key-name should be up to 64
characters.
Importing RSA key pair
import-rsa key-label <key-name>
key-url <key-url>
SecFlow-1p
5. Management and Security
268
Task
Command
Comments
Displaying own RSA public key
show public-key-rsa
The command prints all the public
RSA keys stored in the device
 To configure public key infrastructure (PKI):
1. Navigate to configure crypto pki.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Authenticating CA by
importing CA certificate
authenticate certificate-name
<certificate-name> [certificate-url
<url> [fingerprint <fingerprint>]]
The certificate size is limited to 64kB
Deleting the certificate
delete-certificate certificatename <certificate-name>
Deleting the CRL
delete-crl crl-name <crl-name>
Creating CSR for
enrollment by a CA
enroll [certificate-folder-url
<certificate-folder-url>]
[certificate-name <certificatename>] [fingerprint <fingerprint>]
[common-name <cn>] [locality
<locality>] [state <state>] [email
<email>] [organization <org>]
[organizational-unit <ou>]
[country <country>] [challengepassword <password>] [serialnumber {dmi | value <serialnumber>}]
certificate-url – CA certificate URL
<certificate-folder-url>: string 1-200 characters
The following formats are valid:
• TFTP:
tftp://<server-ip-address>/<path>
tftp://<server-hostname>/<path>
• SCEP:
http://<ca-ip-address>/<path>
http://<ca-hostname>/<path>
Before enrolling with SCEP, you must import the
certificate of the signing CA (with the
authenticate command).
Make sure not to set every parameter-string
value with its maximum length, keeping in mind
that the total maximum CLI command length is up
to 650 characters.
SecFlow-1p
Task
5. Management and Security
Command
269
Comments
<fingerprint>: string 1-128 characters
Certificate name and fingerprint are only used by
SCEP (other methods require them in the import
command)
<common-name> (string up to 64 characters) CSR common name that you can specify. If it is
not specified, the device uses the configured
<hostname>.<IP domain name> (or <hostname> if
the domain name is not configured)
<locality>: string 1-128 characters
<state>: string 1-128 characters
<email>: string 1-128 characters
<org>: string 1-64 characters describing the
organization
<ou>: string 1-32 characters describing the
organizational unit
<country>: ISO 3166 two-letter country code
<password>: string 1-80 characters; this password
is not part of the certificate; you should save it in
a secured place, as it may be asked by the CA
manager in the case when changes (e.g. revoking
the certificate) are desired
Device hardware serial number:
• dmi (the serial number is taken from the linux
command dmidecode -s system-serialnumber)
• value <0-64 characters>
Exporting CRL
export-crl crl-name <crl-localname> url <destination-url>
Importing certificate
import-certificate certificatename <certificate-name>
[certificate-url <url> [fingerprint
<fingerprint-string>]]
Importing CRL
import-crl crl-name <crl-localname> crl-url <crl-url>
SecFlow-1p
5. Management and Security
Task
Command
Creating permanent selfsigned certificate
self-sign-certificate certificatename <certificate-name>
[common-name <cn>]
Displaying certificates
stored in the device
show certificate-summary [owner
{self|ca}] [{valid-only|invalidonly}]
Displaying a certificate by
name
show certificate certificate-name
<certificate-name>
Displaying all the CRLs in
the device
show crl-summary
270
Comments
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
Maximum number of RSA keys
was exceeded
You tried configuring more than
one pair of RSA keys.
Currently, only a single pair of keys is
supported. Delete the keys and
generate a new pair.
Common name (hostname.ipdomain-name) too long
The common name comprised
of “hostname” and “ip-domainname” exceeds 64 characters.
Specify a common name that is less than
64 characters.
Common name too long
You specified a CSR common
name that exceedes 64
characters
Specify a common name that is less than
64 characters
No RSA keys found
You tried displaying the missing
keys.
Set a new pair of RSA keys or wait till
the end of the key generation process.
Illegal character; command
aborted
You entered a non-printable
character.
Repeat your input with printable
characters only.
File is too big; command aborted
You tried using a larger
certificate file.
Use certificates which size do not
exceed 64kB.
Invalid certificate; command
aborted
You entered an invalid
certificate.
Enter a valid certificate.
SecFlow-1p
5. Management and Security
271
Message
Cause
Corrective Action
CA name cannot be resolved;
command aborted
CA name does not match one
configured or received by DNS.
Provide another CA name, check the
path and connection to the server.
TFTP to the CA failed; command
aborted
TFTP connection to CA fails.
Check the path and connection to TFTP.
Wrong fingerprint; command
aborted
The fingerprint does not match
the one in the certificate.
Verify the fingerprint.
RSA label (name) already exists
The specified key-name already
exists.
Specify another key-name.
RSA key does not exist
You tried to delete a
nonexistent RSA key.
Certificate name already exists
A certificate of this name exists
No such certificate
A certificate of this name does
not exist
Certificate name must be
specified
In case of SCEP, certificate
name must be specified.
Certificate name is only used by
SCEP
You specified a certificate name
with a method other than SCEP
Fingerprint is only used by SCEP
You specified a fingerprint with
a method other than SCEP
Cannot find valid CA certificate
that was imported with SCEP
You are trying to enroll without
a valid CA certificate that was
imported with SCEP
Cannot find CA certificate for
authentication
You are trying to enroll without
a valid CA certificate for
authentication
Cannot find CA certificate for
encryption
You are trying to enroll without
a valid CA certificate for
encryption
No such CRL
The CRL to delete or export
does not exist.
CRL name already exists
A CRL of this name already
exists.
Specify another CRL-name.
CA address must be a valid
unicast IP address
You entered an invalid IP
address.
Enter a unicast IPv4 or IPv6 address.
Specify another certificate name.
SecFlow-1p
5. Management and Security
Message
Cause
This CA is not configured
No CA with ca-ip-address or cahostname is configured
Corrective Action
Viewing Certificates Status
 To display the SecFlow-1p CA-signed or self-signed certificates:
config>crypto# pki show certificate self
# Certificate data:
-----BEGIN CERTIFICATE----MIIDTjCCAjYCAXgwDQYJKoZIhvcNAQELBQAwYjELMAkGA1UEBhMCSUwxEzARBgNV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-----END CERTIFICATE----config>crypto# pki show certificate ca
# Certificate data:
-----BEGIN CERTIFICATE----MIIDlzCCAn+gAwIBAgIJAIgL2Jgnyb72MA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNV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SecFlow-1p
5. Management and Security
273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-----END CERTIFICATE-----
5.11 SNMPv3 Management
Simple Network Management Protocol (SNMP) is an application layer protocol that provides a message
format for communication between managers and agents.
SecFlow-1p supports SNMPv3, the latest SNMP version to date, including SNMPv2 coexistence mode.
SNMPv3 provides secure access to devices in the network by using authentication and data encryption.
SNMP allows you to remotely manage multiple units from a central workstation using a network
management system.
SNMPv3 allows data to be collected securely from SNMP devices. Confidential information such as
SNMP commands can thus be encrypted to prevent unauthorized parties from being able to access
them.
Note
SNMPv1 is not supported.
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
The supported SNMP versions are based on the following standards:
•
RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working Group
SecFlow-1p
5. Management and Security
274
•
RFC 1902, Structure of Management Information for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group
•
RFC 1903, Textual Conventions for Version 2 of the Simple Network Management Protocol
(SNMPv2). SNMPv2 Working Group
•
RFC 1904, Conformance Statements for Version 2 of the Simple Network Management
Protocol (SNMPv2). SNMPv2 Working Group
•
RFC 1905, Protocol Operations for Version 2 of the Simple Network Management Protocol
(SNMPv2). SNMPv2 Working Group
•
RFC 1906, Transport Mappings for Version 2 of the Simple Network Management Protocol
(SNMPv2)
•
RFC 1907, Management Information Base for Version 2 of the Simple Network Management
Protocol (SNMPv2). SNMPv2 Working Group
•
RFC 1908, Coexistence between Version 1 and Version 2 of the Internet-standard Network
Management Framework. SNMPv2 Working Group
•
RFC 2104, Keyed Hashing for Message Authentication
•
RFC 2271, Architecture for Describing SNMP Management Frameworks
•
RFC 2272, message processing and dispatching for the Simple Network Management Protocol
(SNMP)
•
RFC 2273, SNMPv3 Applications
•
RFC 2274, User-Based Security Model (USM) for version 3 of the Simple Network Management
Protocol (SNMPv3)
•
RFC 2275, View-Based Access Control Model (VACM) for the Simple Network Management
Protocol (SNMP)
•
RFC 3412, Version 3 Message Processing and Dispatching
•
RFC 3414, User-based Security Model for SNMPv3
•
RFC 3416, Update for RFC 1904
Functional Description
In an SNMP configuration, one or more administrative computers manage a group of hosts or devices.
Each managed system continuously executes a software component called agent, which reports
information via SNMP back to the managing workstations.
SecFlow-1p
5. Management and Security
275
Factory Defaults
The following is the default configuration of the SNMP parameters:
•
SNMP engine ID set to device MAC address
•
View named “internet” providing access to IETF MIBs and IEEE MIBs
•
User named "initial", with security level no authentication and no privacy
•
Group for SNMPv3 named "initial":
 Security levels – no authentication and no privacy, authentication and no privacy,
authentication and privacy
 User – “initial”
 Views for read/write/notify – "internet"
•
Notifications with tag “unmasked” for the device traps
Configuring SNMPv3 Parameters
SNMPv3 provides secure SNMP access to the device by authenticating and encrypting packets
transmitted over the network.
The SNMPv3 manager application in RADview-EMS provides a user-friendly GUI interface to configure
SNMPv3 parameters. If you intend to use it, you must first use the device CLI to create users with the
required encryption method and security level, as the application can create users based only on
existing users; the new user has the same encryption method, and the same security level or lower. The
SecFlow-1p default configuration provides one standard user named “initial” with no encryption and the
lowest security level (see Factory Defaults for details).
A Network Management Station (NMS) relies on traps in order to display device alarms. As traps are not
reliable, the NMS needs to be aware which traps got lost and be able to ask a device to resend them.
This mechanism is called trap synchronization.
NMSs (targets; such as RADview or third party) may be organized into trap sync groups in order to
provide redundancy between these NMSs. You can define the tags and target parameters in each trap
sync group – for example, you can define one trap sync group for critical alarms such as linkDown and
coldStart, and another group for all other traps.
Each trap is sent to all targets attached to the group, and therefore it is recommended to set identical
traps masking for all group members.
SecFlow-1p
Note
5. Management and Security
•
•
•
276
SecFlow-1p supports up to ten trap synchronization groups.
A single trap synchronization group can support multiple NMS.
If you would like all NMS to receive all traps, there is no need to configure
trap synchronization groups.
Follow this procedure to configure SNMPv3:
1. Set SNMP engine ID if necessary.
2. Add users, specifying authentication protocol and privacy protocol.
3. Add groups, specifying security level, protocol, and views.
4. Connect users to groups.
5. Add notification entries with assigned traps and tags.
6. Configure target parameter sets to be used for targets.
7. Configure targets (SNMPv3 network management stations to which SecFlow-1p should send
trap notifications), specifying target parameter sets, notification tags, and trap synchronization
groups if applicable.
 To configure SNMPv3 parameters:
1. Navigate to configure management snmp.
The config>mngmnt>snmp# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Note
When you enter password parameters, they should contain at least eight
characters
Task
Command
Level
Comments
Configuring group
access-group <group-name>
{ snmpv1c | snmpv2c | usm }
{ no-auth-no-priv | auth-no-priv
| auth-priv }
snmp
Entering no access-group <groupname> {snmpv1|snmpv2c|usm}
{no-auth-no-priv| auth-nopriv|auth-priv} deletes the group.
SecFlow-1p
5. Management and Security
277
Task
Command
Level
Comments
Defining how to
match the context
sent in frames by
the NMS
context-match {exact | prefix}
snmp>access-group
exact – Match the entire context.
Setting view for
traps
notify-view <name>
snmp>access-group
Setting view with
read-only access
read-view <name>
snmp>access-group
Setting view with
write access
write-view <name>
snmp>access-group
Administratively
enabling group
no shutdown
snmp>access-group
Using shutdown disables the
group.
Enabling bootstrap
notification
bootstrap-notification
snmp
Entering no bootstrap-notification
disables bootstrap notification.
Configuring
community
community <community-index>
snmp
Configuring name
name <community-string>
snmp>community
Configuring
security name
sec-name <security-name>
snmp>community
Configuring
transport tag
tag <transport-tag>
snmp>community
This should normally be left set to
the default value.
Administratively
enabling
community
no shutdown
snmp>community
Entering shutdown disables
community.
Notifying of
configuration
change
config-change-notification
snmp>
Entering no config-changenotification does not notify of
configuration change.
Configuring
notification
notify <notify-name>
snmp>
prefix – Match the first part of the
context.
Note: SecFlow-1p automatically
identifies the NMS context,
therefore you can configure exact
match. Normally prefix is used for
devices with multiple instances.
See the description of the view
command for information on how
to limit the parts of the MIB
hierarchy that the view can access.
SecFlow-1p
5. Management and Security
278
Task
Command
Level
Comments
Assigning trap to
notification
bind <trap-name>
snmp>notify
You can assign more than one trap
to a notification, in separate
commands.
Assigning tag to
notification, to be
used to identify
the notification
entry when
configuring target
tag <tag-value>
snmp>notify
Administratively
enabling
notification
no shutdown
snmp>notify
Configuring
notification filter
to define access to
a particular part of
the MIB hierarchy
for trap variables
notify-filter <name>
<sub-tree-oid>
snmp
• name – Name of filter
• sub-tree-oid – OID that defines
the MIB subtree
Specifying the part
of the subtree OID
to use in order to
define the MIB
subtree
mask [<mask>]
snmp>notify-filter
The mask is comprised of binary
digits (for example, the mask 1.1.1
converts OID 1.3.6.7.8 to 1.3.6). It is
not necessary to specify a mask if
sub-tree-oid is the OID that should
be used to define the MIB subtree.
Defining whether
traps with trap
variables
belonging to the
MIB subtree are
sent
type {included | excluded}
snmp>notify-filter
• included – Traps with trap
variables belonging to the MIB
subtree are sent.
• excluded – Traps with trap
variables belonging to the MIB
subtree are not sent.
Administratively
enabling
notification filter
no shutdown
snmp>notify-filter
Configuring
notification filter
profile
notify-filter-profile
<params-name>
snmp
params-name – specifies the target
parameter set to associate with the
profile
SecFlow-1p
5. Management and Security
279
Task
Command
Level
Comments
Configuring
notification filter
profile name
profile-name <argument>
snmp>filter-profile
argument – specifies notification
filter to associate with the profile
Administratively
enabling
notification filter
profile
no shutdown
snmp>filter-profile
Connecting
security name to
group (e.g.
connecting user or
community to
group)
security-to-group
{ snmpv2c | usm }
sec-name <security-name>
snmp
Specifying group to
which to connect
security name
group-name <group-name>
snmp>security-to-g
roup
Administratively
enabling
security-to-group
entity
no shutdown
snmp>security-to-g
roup
Using shutdown disables the
security-to-group entity.
Setting SNMP
engine ID, as MAC
address, IPv4
address, IPv6
address, or string
snmp-engine-id
mac [ <mac-address> ]
snmp
If you use the mac option and don’t
specify the MAC address, the SNMP
engine ID is set to the device MAC
address.
snmp-engine-id
ipv4 [ <ip-address> ]
If you use the ipv4 or ipv6 option
and don’t specify the IP address,
the SNMP engine ID is set to the
device IP address.
snmp-engine-id
ipv6 [ <ip-address> ]
snmp-engine-id text <string>
Configuring target
(SNMPv3 network
manager)
target <target-name>
snmp
Specifying target
address as IP
address or OAM
port
address udp-domain
<ip-address>
snmp>target
address oam-domain
<oam-port>
Using no security-to-group
removes security-to-group entity.
Using no target removes target.
SecFlow-1p
5. Management and Security
280
Task
Command
Level
Comments
Assigning tag(s) to
target (the tag(s)
must be defined in
notification
entries)
tag-list <tag>
snmp>target
If you specify more than one tag,
you must enclose the list in quotes;
however, if you are specifying just
one tag, the quotes are optional.
tag-list [ <tag> ]
tag-list [ <tag1>
<tag2>…<tagn> ]
Specifying set of
target parameters
for target
target-params <params-name>
snmp>target
Specifying the trap
synchronization
group to be
associated with
the SNMP target
(NMS)
trap-sync-group <group-id>
snmp>target
• If the group does not exist, it is
created.
• Enter no trap-sync-group
<group-id> to remove the
manager (NMS) from the group.
If the removed manager was
the last to be associated with
the trap-sync-group, the group
is automatically deleted.
• SecFlow-1p supports up to ten
trap synchronization groups.
Administratively
enabling target
no shutdown
snmp>target
Using shutdown disables the
target.
Configuring set of
target parameters,
to be assigned to
target
target-params
<target-param-name>
snmp
Using no target-params removes
target parameters.
Specifying
message
processing model
(SNMP version) to
be used when
generating SNMP
messages for the
set of target
parameters
message-processing-model
{ snmpv1 |snmpv2c | snmpv3 }
snmp>target
SecFlow-1p
5. Management and Security
281
Task
Command
Level
Specifying user on
whose behalf
SNMP messages
are to be
generated for the
set of target
parameters
security
[ name <security-name> ]
[ level { no-auth-no-priv |
auth-no-priv | auth-priv } ]
snmp>target
Specifying SNMP
version to be used
when generating
SNMP messages
for the set of
target parameters
version { snmpv1 | snmpv2c |
usm }
snmp>target
Use usm for SNMPv3 version.
Administratively
enabling target
parameters
no shutdown
snmp>targetparams
Using shutdown disables target
parameters.
Configuring target
parameters and
tags for trap
synchronization
group
trap-sync-group <group-id>
snmp
The trap synchronization group
must be previously defined at the
target level.
Specifying tags in
trap-sync-group
tag-list <list>
snmp>trap-sync-gr
oup
To remove the tag list, enter: no
tag-list.
Specifying set of
target parameters
in trap-sync-group
target-params <params-name>
snmp>trap-sync-gr
oup
To remove the set of target
parameters, enter: no
target-params <params-name>.
Configuring user
user <security-name>
[md5-auth [ {des | aes128 | non
e} ] ]
snmp
If you don’t specify the
authentication method when
creating a user, the default is MD5
with DES privacy protocol. To
create a user with no
authentication, specify none-auth.
user <security-name>
[sha-auth [ {des | aes128 | none
}]]
user <security-name>
[none-auth]
Comments
Typing no user <security-name>
deletes the user.
SecFlow-1p
5. Management and Security
282
Task
Command
Level
Comments
Setting user
authentication
password and
optional key for
changes
authentication
[ password <password> ]
[ key <key-change> ]
snmp>user
Using no authentication disables
the authentication protocol.
Setting user
privacy password
and optional key
for changes
privacy
[ password <password> ]
[ key <key-change> ]
snmp>user
Using no privacy disables privacy
protocol
Administratively
enabling user
no shutdown
snmp>user
• You must define the
authentication and privacy
method before you can enable
the user, unless the user was
defined with no authentication
(none-auth).
• Using shutdown disables the
user.
Defining access to
a particular part of
the MIB hierarchy
view <view-name>
<sub-tree-oid>
snmp
view-name – name of view, which
can be associated to a group as a
notify, read, or write view
Note: Password minimum length is
10 for AES128 and 8 for DES.
sub-tree-oid – OID that defines the
MIB subtree (for example 1.3.6.1
represents the Internet hierarchy)
Specifying the part
of the subtree OID
to use in order to
define the MIB
subtree
mask <mask>
snmp>view
The mask is comprised of binary
digits (for example, the mask 1.1.1
converts OID 1.3.6.7.8 to 1.3.6). It is
not necessary to specify a mask if
sub-tree-oid is the OID that should
be used to define the MIB subtree.
Defining whether
access to the MIB
subtree is allowed
type {included | excluded}
snmp>view
included – Allow access to the
subtree.
Administratively
enabling view
no shutdown
excluded – Do not allow access to
the subtree.
snmp>view
SecFlow-1p
5. Management and Security
Task
Command
Level
Displaying trap
synchronization
groups and
members for
SNMPv3 manager
groups
show trap-sync
snmp
Displaying SNMPv3
information, such
as the number of
times the SNMPv3
engine has booted,
and how long since
the last boot
show snmpv3 information
snmp
Comments
Examples
 To create an SNMPv3 user and connect it to group:
•
User named “MD5_priv”:
 Security level – MD5 authentication, DES privacy
•
Group named "MD5Group":
 All security levels
 Contains set of views named "internet" (from default configuration)
exit all
configure management snmp
#********* Configure user MD5_priv with authentication method MD5 with DES privacy protocol
user MD5_priv md5-auth des
privacy password MD654321
authentication password MD654321
no shutdown
exit
#******** Configure access group MD5Group with various authentication and privacy options
access-group MD5Group usm no-auth-no-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
283
SecFlow-1p
access-group MD5Group usm auth-no-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
access-group MD5Group usm auth-priv
context-match exact
read-view internet
write-view internet
notify-view internet
no shutdown
exit
#******** Connect user MD5_priv to group MD5Group
security-to-group usm sec-name MD5_priv
group-name MD5Group
no shutdown
exit all
save
 To create notifications:
•
Notification named “TrapPort”:
 Tag=“Port”
 Bound to ethLos, sfpRemoved
•
Notification named “TrapPower”:
 Tag=“Power”
 Bound to powerDeliveryFailure, systemDeviceStartup
exit all
configure management snmp
#******** Configure notification TrapPort
notify TrapPort
tag Port
bind ethLos
bind sfpRemoved
no shutdown
exit
#******** Configure notification TrapPower
notify TrapPower
tag Power
bind powerDeliveryFailure
bind systemDeviceStartup
no shutdown
exit all
save
5. Management and Security
284
SecFlow-1p
5. Management and Security
285
 To create target parameters and target:
•
Target parameters named “TargParam1”:
 Message processing model SNMPv3
 version USM


•
User “MD5_priv”
Security level authentication and privacy
Target named “TargNMS1”:
 Target parameters “TargParam1”
 Tag list=“Port”, “Power”
 IP address 192.5.4.3
exit all
configure management snmp
#******** Configure target parameters TargParam1
target-params TargParam1
message-processing-model snmpv3
version usm
security name MD5_priv level auth-priv
no shutdown
exit
#******** Configure target TargNMS1
target TargNMS1
target-params TargParam1
tag-list “port power”
address udp-domain 192.5.4.3
no shutdown
exit
 To create communities, target parameters, and target for network devices that are working with
SNMPv1:
•
Community “read”:
 Name: “public”

•
Community “write”:
 Name: “private”

•
Security name: “v1_read” (defined in default configuration)
Security name: “v1_write” (defined in default configuration)
Community “trap”:
 Name: “public”
SecFlow-1p

•
Security name: “v1_trap” (defined in default configuration)
Target parameters named “snv1”:
 Message processing model SNMPv1
 Version SNMPv1


•
5. Management and Security
Security name: “v1_trap”
Security level: no authentication and no privacy
Target named “NMSsnmpv1”:
 Target parameters “snv1”
 Tag list=“unmasked”
 IP address 192.5.6.7
exit all
#******** Configure communities
configure management snmp
snmpv3
community read
name public
sec-name v1_read
no shutdown
exit
community write
name private
sec-name v1_write
no shutdown
exit
community trap
name public
sec-name v1_trap
no shutdown
exit
#******** Configure target parameters
target-params snv1
message-processing-model snmpv1
version snmpv1
security name v1_trap level no-auth-no-priv
no shutdown
exit
#******** Configure target
target NMSsnmpv1
target-params snv1
tag-list unmasked
address udp-domain 192.5.6.7
no shutdown
exit all
save
286
SecFlow-1p
5. Management and Security
 To display SNMPv3 information:
configure management snmp
config>mngmnt>snmp# show snmpv3 information
SNMPv3
: enable
Boots
: 2
Boots Time (sec) : 102
EngineID
: 800000a4030020d2202416
 To configure trap synchronization:
•
Trap synchronization group 1:
 Members NMS1 and NMS2
 Target parameters “TargParam1” (from previous example)
 Tag list=“Port”, “Power” (from previous example)
•
Trap synchronization group 2:
 Members NMS3 and NMS4
exit all
configure management snmp
#******** Configure targets and trap synchronization group
target NMS1
trap-sync-group 1
exit
target NMS2
trap-sync-group 1
exit
target NMS3
trap-sync-group 2
exit
target NMS4
trap-sync-group 2
exit
trap-sync-group 1
tag-list “port power”
target-params TargParam1
exit all
save
 To display trap synchronization configured in the above example:
config>mngmnt>snmp# show trap-sync
Group ID Member
--------------------------------------------------------------1
NMS1
1
NMS2
2
NMS3
2
NMS4
287
SecFlow-1p
5. Management and Security
288
5.12 User Access
SecFlow-1p management software allows you to define new users, and their management and access
rights.
Applicability and Scaling
This feature is applicable to all the versions of SecFlow-1p.
Factory Defaults
By default, the following users exist, with default password 1234:
•
su
•
oper
•
tech
•
user
•
netconf-su
The default users cannot be deleted, but can be disabled (shut down).
Functional Description
SecFlow-1p supports the following user access levels:
•
Superuser (su) can perform all the activities supported by the system, including creating new
users, changing its and other user access levels and passwords, and deleting and disabling other
users.
•
Operator (oper) can perform all the activities, including those that change configuration
permanently. Cannot define, delete, or disable other users.
•
Technician (tech) can monitor the device (info, show status, show statistics). Can use commands
that may temporarily impair services or traffic but not saved in database.
•
User (user) can monitor the device (info, show status, show statistics). Can use commands that
do not impair services, affect traffic, or change configuration
SecFlow-1p
5. Management and Security
289
•
Linux User (linux-user) can access and monitor the device Linux shell. This level can be accessed
by a logged-in su. The user invoking this command undergoes re-authentication, after which
SecFlow-1p opens a Linux bash shell with read-only rights. The initial SecFlow-1p session is
suspended as long as the Linux shell is active. Once the Linux shell is logged off, the initial
session resumes with SecFlow-1p CLI. The inactivity timeout for linux-user is inherited from the
underlying su.
•
Netconf Superuser (netconf-su) can be used in Netconf sessions only. Can perform all the
activities supported by the system, including creating new users, changing its and other user
access levels and passwords, and deleting and disabling other users.
•
Linux Network Administrator (linux-net-admin) has rights to manage networking.
•
Linux Technician (linux-tech) has rights to manage virtualization, networking and processes.
The regular, non-Linux users (oper, tech, user) cannot define, delete or disable other users, or change
their own access levels. They are allowed to change their current passwords. All users can view all CLI
levels. Each user can execute its allowed functionality, as well as those of lower levels.
The Linux users do not have SecFlow-1p CLI, and they cannot execute any of its commands.
Caution
Configuration changes are not saved in SecFlow-1p configuration files; they
may conflict or interfere with SecFlow-1p and may not survive software
installation.
In addition to passwords, SecFlow-1p can be configured to use a more robust and secure public key user
authentication method for SSH sessions.
Password Hashing
You can specify a user’s password as a text string or as a hashed value, that you obtain by using info
detail to display user data.
SecFlow-1p
Note
5. Management and Security
•
•
290
User passwords are stored in a database so that the system can perform
password verification when a user attempts to log in. To preserve
confidentiality of system passwords, the password verification data is
typically stored after a one-way hash function is applied to the password,
in combination with other data. When a user attempts to log in by
entering a password, the same function is applied to the entered value
and the result is compared with the stored value.
A cryptographic hash function is a deterministic procedure that takes an
arbitrary block of data and returns a fixed-size bit string, the
(cryptographic) hash value, such that any change to the data changes the
hash value.
SSH Authentication
SecFlow-1p supports management by SSHv2, enabling user authentication using one of two methods:
•
Password (default) – SecFlow-1p has default usernames and passwords.
•
Public key (1024-bit RSA) – more robust and secure
SMS Management
Devices with cellular L1/L3/L4 modems can be managed by SMS. The user can configure one or more
numbers from which commands are accepted, along with the CLI level allowed for each number. The
calling number can be (optionally) verified by a one-time code sent to it.
Note
The device phone number (MSISDN) is displayed in the show status command
in the configure>port>cellular level.
Up to 10 authorized numbers allowed to manage the device with SMS can be configured using the
caller-id command in the configure>management>access>sms level. You can also specify the authorized
CLI level (su, oper, tech or user), su being the default.
Callers are independent and can send commands simultaneously. The device executes them in the order
they were received.
You can allow SMS management with and without authentication. If authentication is disabled, any SMS
from a configured caller ID is respected.
SecFlow-1p
5. Management and Security
291
When OTP (one time password) authentication is enabled and the device receives an SMS from an
authorized caller, it returns the following SMS, with a random 6-character password:
Verification code: <password>
Send code back via SMS
Do not reply unless you initiated the connection
The caller must return the password by SMS.
If wrong password is returned or the password is not returned in 5 minutes, the command is not
executed, and the device returns the following SMS:
Authentication failed; the command is aborted.
OTP authentication is enabled by default.
The commands sent via SMS are the usual CLI commands, with the following characteristics:
•
The command must be a full path command; otherwise it will fail.
•
A command may span multiple SMS messages.
Access Policy
The access policy allows specifying up to three user authentication methods (local, RADIUS, TACACS+). If
an authentication method is not available, the next method is used, if applicable.
It also defines if the Off-Net ZTP (see Off-Net Zero Touch) is used.
Functional Description
Non-Linux users are authenticated by internal SecFlow-1p system with the methods configured in the
auth­policy command in the management>access level (local, TACACS+, or RADIUS).
Note
While non-Linux users can be authenticated with TACACS+ or RADIUS, the
Linux and Netconf-su users cannot, as they are limited to local authentication.
Factory Defaults
By default, authentication is via the locally stored database (1st-level local).
SecFlow-1p
5. Management and Security
292
Configuring Access Policy
 To define the access policy:
•
At the config>mngmnt>access# prompt, enter the necessary commands according to the tasks
listed below.
Task
Command
Binding the ACL to a
management entity and
defining the ACL direction
access-group <acl-name> in
[{ipv4|ipv6}]
Specifying authentication
method via local database or
RADIUS/ TACACS+ servers,
and the preferable order of
methods
auth-policy 1st-level {local | radius
| tacacs+} [2nd-level {local | radius
| tacacs+ | none}] [3rd-level {local
| none}]
Comments
no access-group in {ipv4|ipv6}
SecFlow-1p first attempts
authentication via the server
specified by 1st-level. If the server
does not answer the authentication
request, then SecFlow-1p attempts
to authenticate via the server
specified by 2nd-level. If the server
does not answer the authentication
request, then SecFlow-1p attempts
to authenticate according to
3rd-level:
• local – SecFlow-1p
authenticates via the local
database and doesn’t procced
to any further level
• none – No further
authentication is done, and the
authentication request is
rejected.
Notes:
If at any time in this process, an
authentication server rejects an
authentication request, SecFlow-1p
ends the authentication process
and does not attempt
authentication at the next level.
Rejecting default login
password
[no] ban-default-login-password
Logging in with the default user
password is forbidden
Selecting a certificate to use
for FTPS
ftps [certificate <certificate-name>]
<certificate-name>: 1-64 characters
SecFlow-1p
5. Management and Security
293
Task
Command
Comments
Defining character
combinations that may not
be used in a login password
login-password-black-list <bannedstring>
banned-string - String not allowed
in login password
no login-password-black-list
[banned-string]
Possible values: 4-20 characters
string
Typing no login-password-black-list
without the [banned-string] results
in deleting all the black lists.
Configuring requirements to
provide a strong login
password
login-password-properties mincharacters <min-characters> mindigits <min-digits> min-symbols
<min-symbols> max-consecutive
<max-consecutive> lifetime
{infinite | days <number>}
[no] login-password-properties
min-character–Minimum number
of characters a login password
must contain
min-digits–Minimum number of
digits a login password must
contain
min-symbols–Minimum number of
non-alphanumeric symbols a login
password must contain
max-consecutive–Maximum
number of consecutive
(incremental or decremental)
alphanumeric characters a login
password may contain
infinite | days <number>–
Password lifetime
Enabling/disabling REST get
interface and selecting
certificate to use for it
rest-get [certificate <certificatename>]
Configuring SMS
management
sms
See Configuring SMS management
Configuring the acceptable
SSH encryption algorithms
ssh-encryption {all | algorithm
<algorithm-1> [algorithm-2]
[algorithm-3] [algorithm-4]
[algorithm-5] [algorithm-6]}
All or any six of the following
algorithms can be set:
<certificate-name>: 1-64 characters
no rest-get
•
•
•
•
•
•
•
aes-cbc-128
aes-cbc-192
aes-cbc-256
aes-ctr-128
aes-ctr-192
aes-ctr-256
3des-cbc-168
SecFlow-1p
5. Management and Security
Task
Command
294
Comments
• arc4-128
• arc4-256
Enabling/disabling
virtualization REST
management and selecting
certificate to use for it
virtualization-rest [certificate
<certificate-name>]
Enabling/disabling web
management and selecting
certificate to use for it
web [certificate <certificatename>]
<certificate-name>: 1-64 characters
no virtualization-rest
<certificate-name>: 1-64 characters
no web
Configuring SMS Management
The following commands are available in the sms level, at the configure>management>access>sms#
prompt.
Task
Command
Comments
Configuring SMS
management
authentication mode
authentication {otp}
Possible Values: authentication otp
no authentication
no authentication
[no] authentication {otp}
Default: authentication otp
caller-id <phone-number> [level
<oper | su | tech | user>]
phone-number – authorized caller number
(string of up to 15 numeric characters). Phonenumber can contain digits only; it must also
contain the country prefix (without +)
Configuring SMS
management authorized
caller
no caller id <phone-number>
No caller is configured by default.
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
Too many characters
You tried to configure a
string for a forbidden
password containing more
than 20 or less than 4
characters
Configure a string 4–20 characters
long.
Too little characters
SecFlow-1p
5. Management and Security
Message
Cause
Corrective Action
Black list is full
You tried to configure more
than 100 combinations of
forbidden passwords.
Delete unnecessary combinations
and configure a new one.
min-symbols + min-digits may
not exceed 20
You tried to set the loginpassword-properties
command with the sum of
min-symbols and min-digits
greater than 20 (the
maximum password size).
Set other values for the min-symbols
and min-digits parameters.
Caller ID may be up to 15
digits
phone-number can contain
digits only; it must also
contain the country prefix
(without +)
Maximum number of callers is
configured
You tried to configure more
than 10 numbers
295
Configuring Users
 To add a new user:
1. Verify that you are logged on as superuser (su).
2. Navigate to the management context (config>mngmnt).
3. Enter login-user, followed by a new user name if you intend to create a new user, or an existing
name, if you intend to change previously defined user.
Notes
•
•
Maximum user name length is 20 characters.
User names are not case-sensitive, that is, “user123” and “UsEr123” is the
same name.
4. The prompt changes to config>mngmnt>login-user<user-name>#.
5. Enter the necessary commands according to the tasks listed in the table below.
SecFlow-1p
5. Management and Security
296
Task
Command
Comments
Specifying user
authentication method
authenticationmethod {password |
public-key}
Default user authentication method is
password. SecFlow-1p has default usernames
and passwords.
If you change the authentication method of a
user with access level su to public key, and no
public key has been defined, you are warned
that the super user is going to be disabled, and
prompted to confirm the operation.
Note: You can create a public key, by
configuring config>mngmnt>login-user<username> public-key <public-key>. Alternately, you
can create a public key using any application
that supports SSHv2 RSA 1024-bit key
generation.
Defining a user access level
level { su | oper |
tech | user | linuxuser | netconf-su |
linux-net-admin
|linux-tech}
su – superuser
oper – operator
tech – technician
user – read only
linux-user – linux read-only
netconf-su – Netconf superuser
linux-net-admin – linux network and
virtualization administrator
linux-tech –linux network, virtualization and
processes technician
Specifying user password
password <password>
[hash]
Maximum password length is as follows:
• Non-hashed – 20 characters
• Hashed:
• 40 characters for SHA1
• 144 characters for SHA512+SALT
• 103 characters for linux-user
The use of the hash function is illustrated in the
example below.
Note: If you try to set a password that has been
defined as a forbidden combination of
characters, the password will be rejected with
the following error message: Invalid password.
SecFlow-1p
5. Management and Security
297
Task
Command
Comments
Setting user public key for
authentication
public-key <publickey>
Public key configuration is relevant only for the
public key authentication method.
Public key format: “ ssh-rsa <space> public key
string <space> comment “ [1..512 chars]
Use the Base64 encoding (ASCII ‘A’ to ‘Z’, ‘a’ to
‘z’, ‘0’ to ‘9’, ’+’, ‘/’ and ‘space’) for the public
key configuration.
Entering no public-key deletes the public key.
Note: SecFlow-1p does not have default public
keys.
Enabling/disabling a user
shutdown
no shutdown
Default users (su, oper, tech, user) can be
disabled, but cannot be deleted.
You can delete dynamic users, including those at su level. You cannot delete default users.
 To delete an existing user:
•
At the config>mngmnt# prompt, enter no login-user <user_name>.
The specified user is deleted.
 To view all connected users:
•
At the config>mngmnt# prompt, enter show users.
A list of all connected users is displayed, showing their access level, the type of connection, and
the IP address from which they are connected.
Examples
Defining Users
 To define a new user:
•
User name – staff
•
Access level – su
•
Password – 1234
SecFlow-1p
5. Management and Security
exit all
configure management
login-user staff
level su
password 1234
# Password is encrypted successfully
no shutdown
exit
 To add a new user with a hashed password:
1. Define a new user with a text password.
2. Use info detail to display the password hash value.
3. Define another user with the hashed password from the info detail output.
The second user can log in with the text password defined in Step 1.
For example, to add the following users:
•
User name – staff1
•
User password – 4222
•
User name – staff2
•
User password – hash of 4222 (user staff2 can log in with password 4222)
exit all
configure management
login-user staff1
level su
password 4222
# Password is encrypted successfully
no shutdown
exit
exit all
configure management login-user staff1 info detail
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
exit all
configure management
login-user staff2
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
exit
exit all
298
SecFlow-1p
5. Management and Security
configure management login-user staff2 info detail
level su
password "3fda26f8cff4123ddcad0c1bc89ed1e79977acef" hash
no shutdown
Deleting Users
 To delete an existing user:
1. Verify that you are logged on as superuser (su).
2. Navigate to the management context (config>mngmnt).
3. Enter no login-user, followed by the name of the user that you intend to delete.
Viewing User Access Status
Viewing Failed Login Attempts
All unsuccessful user login attempts are registered and can be displayed using a show command.
 To display the unsuccessful logging attempts:
•
At the config>mngmnt# prompt, enter show failed-login-attempts.
The details of each attempt are displayed.
Recent Failed Login Attempts
Source
Attempts First Attempt
Blocked for
------------------------------------------------------1.1.1.1
5
302 seconds ago 277 seconds
100.100.100.100 2
100 seconds ago --
Source
Source address of the unsuccessful login
Attempts
Number of failed login attempts since the source was unblocked for
the last time
First Attempt
The first failed login attempt recorded from the source
Blocked for
Time remaining till the source will be unblocked for login
299
SecFlow-1p
5. Management and Security
300
Viewing SSH Server Information
You can display the fingerprint of the SSH server public key.
 To display the SSH server information:
•
At the config>mngmnt# prompt, enter show ssh-server fingerprint.
The SSH fingerprint information stored on the SSH server is displayed.
configure management
config>mngmnt# show ssh-server fingerprint
RSA key fingerprint is ef:ab:28:81:53:c2:a3:8d:77:0d:06:e7:89:2b:81:9c
Viewing Users
 To view all connected users:
•
At the config>mngmnt# prompt, enter show users.
A list of all connected users is displayed, showing their access level, the type of connection, and
the IP address from which they are connected.
configure management
config>mngmnt# show users
Num
User
Access Level Source
IP Address
----------------------------------------------------------------------------1.
su
Su
Terminal 0.0.0.0
2.
su
Su
Netconf
172.17.160.69
3.
su
Su
SSH
172.17.180.87
Viewing User Information
The details of the currently logged-in users are available in the show users-details screen.
The screen for show users-details provides the following information:
User
User name
Level
User access level
Popup
Alarm/event popup status (enabled or disabled)
From
Source IP address of the management session, followed by protocol
type (serial, SSH, NETCONF)
For (sec)
Duration of the current management session in seconds
SecFlow-1p
5. Management and Security
301
 To display the user information:
•
In the configure>management# prompt, enter show users-details.
configure management
config>mngmnt# show users-details
User:su Level:su Popup:Enabled
From:Serial For(sec):94
User:su Level:su Popup:Enabled
From:172.17.180.87/SSH For(sec):13
User:su Level:su Popup:Enabled
From:172.17.160.69/Netconf For(sec):77
5.13 Zone-based Stateful Firewall
SecFlow-1p features a Zone-based stateful Firewall that is configured via Web GUI. Interfaces are
assigned to zones, for which set of rules are configured. It supports both IPv4 and IPv6 rules. The rules
include IP source and destination networks, IP host addresses, TCP/IP ports and IP protocols. Rules can
be limited to specific days, dates and times and number of connections per rule can be limited.
The firewall also supports IPv4 and IPv6 NAT, SNAT, DNAT, REDIRECT and Masquerading (also known as
NAPT).
It supports Geo IP which means that it can block or allow traffic based on source or destination country
This feature requires Internet connection for the FW to download IP addresses of different regions.
It is possible to enable DDOS protection, by limiting SYN and RST flood packets.
The firewall supports Web URL, application and DNS filtering. This feature also requires Internet
connection, for periodic list updates.
It is also possible to create black lists of URLs or IP addresses, based on categories (e.g. ads, gambling),
black lists of phrases, based on categories and limit downloadable files by extension.
The Firewall supports DNS proxy including black list filtering. The list is downloadable periodically from
the Internet.
SecFlow-1p
5. Management and Security
302
Functional Description
Zones
A Zone is a logical area where ports and related devices having the same trust levels reside. Zones
establish the security borders of a network. A zone defines a boundary where traffic is subject to policy
restrictions as it crosses to another region of a network. An inspection policy is applied to traffic moving
between the zones. Inter-zone policies offer considerable flexibility, so different inspection policies can
be applied to multiple host groups connected to the same router interface.
After creating a Zone, one or more interfaces are assigned to it.
Stateless and Stateful Packet Filtering
SecFlow-1p Firewall supports statefull packet filtering.
Stateless Packet Filtering
A stateless firewall filter, also known as an access control list (ACL), does not statefully inspect traffic.
Instead, it evaluates packet contents statically and does not keep track of the state of network
connections.
The basic purpose of a stateless firewall filter is to enhance security through the use of packet filtering.
Packet filtering enables you to inspect the components of incoming or outgoing packets and then
perform the actions you specify on packets that match the criteria you specify. A typical use of a
stateless firewall filter is to protect the Routing Engine processes and resources from malicious or
untrusted packets.
SecFlow-1p
5. Management and Security
303
Stateful Packet Filtering
A stateful firewall monitors the full state of active network connections. This means that stateful
firewalls are constantly analyzing the complete context of traffic and data packets, seeking entry to a
network rather than discrete traffic and data packets in isolation.
Once a certain kind of traffic has been approved by a stateful firewall, it is added to a state table and can
travel more freely into the protected network. Traffic and data packets that do not complete the
required handshake successfully are blocked. By taking multiple factors into consideration before adding
a type of connection to an approved list, such as TCP stages, stateful firewalls are able to observe traffic
streams in their entirety.
Rules
Firewall rules are used to filter network traffic between Zones. To filter traffic means to accept, drop or
reject traffic based on the filtering conditions specified in the rule.
A rule must be configured for each traffic direction.
When a packet enters the Firewall, it is compared against the first rule in the rule set and progresses one
rule at a time, moving from top to bottom in sequence. When the packet matches the selection
parameters of a rule, the rule's action is executed and the search of the rule set terminates for that
packet. This is referred to as “first match wins”. If the packet does not match any of the rules, it gets
caught by the default rule number 65535, which denies all packets and silently discards them.
Each rule is associated with a number from 1 to 65534. The number is used to indicate the order of rule
processing. Multiple rules can have the same number, in which case they are applied according to the
order in which they have been added.
Based on the match of the rules, an action can be applied. Action means that packets or sessions can be
accepted, dropped or rejected:
•
Accept – Session is forwarded between the zones
•
Drop – Session gets dropped silently with no indication being sent to the client or server
•
Reject – Session is rejected by sending a TCP RST packet in both directions. RST packet is also
seen on the attached appliance.
The following Advanced Configuration Options can be applied to rules.
SecFlow-1p
5. Management and Security
304
Logging
It is possible to activate logging of all rule actions. Several log levels are available: Debug, Notice, Info,
Warning, Error, Critical, Alert, and Emergency. Choose a level dependent on the log info you want to be
available.
Time-based Rules
Under Advanced rule setting it is possible to activate a rule based on week days, between certain dates
and between certain times of the day.
NAT
NAT is a tool that lets you share a single public IP address with a whole private subnet, and to run public
servers with private non-routable addresses. Suppose you have a typical low-cost DSL Internet account.
You have only a single public IP address, and a LAN of 25 workstations, laptops, and servers, protected
by a NAT firewall. Your entire network will appear to the outside world as a single computer. Source NAT
(SNAT) rewrites the source addresses of all outgoing packets to the firewall address.
It works the other way as well. While having public routable IP addresses is desirable for public services,
like web and mail servers, you can get by on the cheap without them and run public servers on private
addresses. Destination NAT (DNAT) rewrites the destination address, which is the firewall address, to
the real server addresses, then SecFlow-1p forwards incoming traffic to these servers.
SecFlow-1p uses the following techniques (actions): Masquerade, Destination NAT, Source NAT or
Redirect.
•
Masquerade. IP masquerading is a technique that hides an entire IP address space, consisting of
private IP addresses, behind a single IP address in another, usually public address space. The
hidden addresses are changed into a single (public) IP address as the source address of the
outgoing IP packets so they appear as originating not from the hidden host but from the routing
device itself. Because of the popularity of this technique to conserve IPv4 address space, the
term NAT has become virtually synonymous with IP masquerading.
•
Destination NAT. Destination network address translation (DNAT) is a technique for
transparently changing the destination IP address of an end route packet and performing the
inverse function for any replies. Any router situated between two endpoints can perform this
transformation of the packet. DNAT is commonly used to publish a service located in a private
network on a publicly accessible IP address. This use of DNAT is also called port forwarding,
or DMZ when used on an entire server, which becomes exposed to the WAN, becoming
analogous to an undefended military demilitarised zone (DMZ).
SecFlow-1p
5. Management and Security
305
•
Redirect. A special case of DNAT is REDIRECT. Packets are redirected to a local port of the
router, enabling for example transparent proxying.
•
Source NAT (SNAT). Source NAT (SNAT) rewrites the source addresses of all outgoing packets to
the firewall address. For SNAT the user has to specify the new source-IP explicitly. For routers
with a static IP address SNAT is the best choice because it is faster than MASQUERADE (better
for dynamic IP) which has to check the current IP address of the outgoing network interface at
every packet.
Under Advanced Configuration Options, you can activate logging of all NAT actions. Several log levels
are available: Debug, Notice, Info, Warning, Error, Critical, Alert, and Emergency. Choose a level
dependent on the log info you want to be available.
Configuring the Firewall
Firewall Configuration Sequence
Below are the configuration tasks that you need to follow:
1. Create Interfaces with Interface name and function (see Configuring Objects)
2. Create Zones and assign Interfaces to zones (see Configuring Objects)
3. Configure Networks (see Configuring Objects)
4. Create Firewall rules between Zones.
Note
Hosts, TCP/UDP ports and URLs are other objects that can be configured
Configuring Objects
Before you configure the Firewall and NAT rules you need to define Interfaces, Zones, Hosts, Networks,
URLs and Ports found under OBJECTS on the main menu.
SecFlow-1p
5. Management and Security
Click on OBJECTS and select the fields:
-
Interfaces: Give each interface a name that will be used when you define Zones.
-
Zones: A Zone consists of one interface or a group of interfaces that follow the same rule
-
Hosts: Set a specific host device (IP address).
-
Networks: Set an IP network address and a network mask.
-
URLs: Type URL addresses that will appear when building Firewall rules
-
Ports: A list of TCP ports that will be available when building the Firewall rules
Creating Interfaces
 To create the interfaces:
1. From the top menu, select Objects>Interfaces and follow the instructions on the screen.
In the example below four interfaces are created.
306
SecFlow-1p
5. Management and Security
307
Creating Zones
 To create a zone:
1. From the top menu, select Objects>Zones and follow the instructions on the screen.
In the example below three zones are created with the above four interfaces assigned to them.
Configuring Rules
RAD Firewall allows you to select Create New rules, Delete Selected, Disable Selected and Enable
Selected.
Disable Selected allows you to keep the rule in inactive state. A disabled rule can be enabled again any
time.
In the upper right side of the screen you can select Save and Apply or Commit.
SecFlow-1p
5. Management and Security
Save and Apply saves and activates all rules in the running config. Next time you reboot the CPE, the
rules will not be enabled. This makes it possible to reverse all Firewall rules by rebooting the CPE.
Commit saves the rules in the startup configuration. The rules will be activated once the CPE is
rebooted.
Important!
When “Save and Apply” is selected, ACL and NAT rules
configured in the device on the regular CLI/Web platforms are
removed.
Note
Firewall rules are uni-directional.
 To configure a rule:
1. Click on the Filter tab -> Create New. The Filter (Rule) configuration window opens.
2. Select the rule number.
Note
When assigning the number, note that Firewall is parsing the rules starting
from the lowest number.
3. Enter a meaningful rule name.
4. Select the address family: IPv4+IPv6, IPv4 or IPv6.
5. Select the In Zone.
6. Select the Out Zone.
Note
Prior to selection of In and Out zone, fill in the Zone table under
OBJECT>Zones)
7. Select the Source by entering TCP or UDP ports from the drop-down list.
308
SecFlow-1p
Note
5. Management and Security
Source Port for a connection is typically random and in most cases should not be
configured.
309
SecFlow-1p
5. Management and Security
310
8. Select the Destination Port from the drop-down list.
Note
TCP/UDP IP ports can be modified and expanded under
OBJECTS>Ports.
9. Select the relevant Protocol from the drop-down list.
10. Select the Action: Drop, Accept or Reject.
11. Configure the advanced options if needed (see below).
12. Click Submit.
 To configure the rule advanced options:
1. Click Advanced.
2. Select the log level (Debug, Notice, Info, Warning, Error, Critical, Alert, Emergency).
3. Type the log prefix.
4. Select the connection state to be filtered out the following: NEW, RELATED, ESTABLISHED
INVALID, UNTRACKED. This selection helps you inspect and restrict connections to services
based on their connection state. You can allow or deny access based on the following
connection states:
 NEW — A packet requesting a new connection (for example, an HTTP request).
 ESTABLISHED — A packet that is part of an existing connection.
 RELATED — A packet that is requesting a new connection but is part of an existing
connection. For example, FTP uses port 21 to establish a connection, but data is transferred
on a different port (typically port 20).
 INVALID — A packet that is not part of any connections in the connection tracking table.
 UNTRACKED – A packet was marked as NOTRACK in the raw table.
5. If you want to limit the number of connections, select the maximum number of allowed
connections.
6. If needed, add filters that block connection to source or destination countries. The list of these
countries can be configured under App Layer> Geo-IP rule set.
Note
To enable GEO-IP updates, go to OPERATIONS>Advanced Settings>GEO IP
Settings. The actual Geo-IP addresses per country need to be updated via
online Internet connectivity.
7. Select the Week days (from Sunday to Saturday), Date start, Date stop, Time start, Time stop.
SecFlow-1p
5. Management and Security
8. Click Submit.
Note
Advanced options and Description fields will be implemented in the future
Firewall versions.
Configuring the NAT
Note
Before configuring the NAT, first create the interfaces as described above.
 To configure the NAT:
1. Click on the NAT tab -> Create New. The NAT configuration window opens.
2. Select the NAT number
Note
When assigning the number, note that Firewall is parsing the rules starting
from the lowest number.
3. Select the NAT name.
4. Select the address family: IPv4+IPv6, IPv4 or IPv6.
5. Select the Action: Masquerade, Destination NAT, Source NAT or Redirect.
311
SecFlow-1p
 To configure the Masquerade NAT:
1. Select Masquerade under Action.
2. Select the Out interface.
3. Select the relevant Protocol from the drop-down list.
4. Type the Original Source IP Address.
5. Select Original Source Port (1..65535).
6. Configure the advanced options if needed (see below).
7. Click Submit.
 To configure the Source NAT:
1. Select Source NAT under Action.
2. Select the Out interface.
3. Select the relevant Protocol from the drop-down list.
5. Management and Security
312
SecFlow-1p
5. Management and Security
4. Type the Original Source IP Address.
5. Select Original Source Port (1..65535).
6. Type the Modified Source IP Address.
7. Select Modified Source Port (1..65535).
8. Configure the advanced options if needed (see below).
9. Click Submit.
Note
Source NAT needs at least "Out interface", "Protocol" and "Modified
Destination IP Address" and "Protocol" options to be configured.
 To configure the Destination NAT:
1. Select Destination NAT under Action.
2. Select the In interface.
3. Select the relevant Protocol from the drop-down list.
4. Type the Original Destination IP Address.
5. Select Original Destination Port (1..65535).
6. Type the Modified Destination IP Address.
7. Select Modified Destination Port (1..65535).
8. Configure the advanced options if needed (see below).
9. Click Submit.
Note
Destination NAT needs at least "Modified Destination IP Address" and
"Protocol" options to be configured.
 To configure the Redirect NAT:
1. Select Redirect under Action.
2. Select the In interface.
3. Select the relevant Protocol from the drop-down list.
4. Type the Original Destination IP Address.
5. Select Original Destination Port (1..65535).
6. Type the Modified Destination IP Address.
313
SecFlow-1p
5. Management and Security
314
7. Configure the advanced options if needed (see below).
8. Click Submit.
 To configure the NAT advanced options:
1. Click Advanced.
2. Select the log level.
3. Click Submit.
Configuring the App Layer
Creating GEO-IP Sets
The GEO-IP set is used to block requests and messages to/from hosts with IP address from specified
countries.
The GEO-IP sets are used by the rules. To configure the rule advanced options, see Configuring Rules.
 To create a GEO-IP Set:
1. Navigate to App Layer> GEO-IP rule Sets > click Create New
2. Enter a meaningful name.
3. Select the countries to add to the blacklist
4. Click Submit.
SecFlow-1p
5. Management and Security
315
Configuring DPI Filters
DPI filter is a process running independently of the rule filter. This means that both Rule Filter and DPI
filter are processed independently.
The DPI filter can identify layer 7 applications, such as Youtube, Zoom, Netflix, Gmail, Microsoft365 and
Facebook etc.
 To create a DPI filter:
1. Navigate to App Layer>App Layer Filter>DPI filter>Create New.
2. Under Mode, select Layer7_proto, URL or NETWORK.
 If Layer7_proto is selected, Applications/Layer 7 protocols can be selected from a predefined filter list.
 If URL is selected, the device will try to translate the URL address to a valid IP address using
a DNS server on the device or check a DNS server on the Internet. If no response from a DNS
server is received, the URL will not be accepted.
 If NETWORK is selected, a network with network mask can be entered.
SecFlow-1p
5. Management and Security
316
3. Under Actions, select Accept or Drop.
Advanced options allow the user to perform other actions, for example to mark the packets with DSCP
value.
The DHCP value can be later used for QoS or policy-based routing decisions.
Configuring the DNS Filter
The DNS filter enabels blocking DNS requests from specified suspicious websites, webpages, and IP
addresses, using defined adware/malware blacklists.
SecFlow-1p
DNS Filter Configuration
 To configure the DNS Daemon:
1. Navigate to App Layer> DNS Filter > click Edit
5. Management and Security
317
SecFlow-1p
5. Management and Security
318
2. Select the interface the daemon listens for suspicious requests.
If you don’t select an interface, the DNS filter is disabled.
3. Select the Enable DNS Filter check box.
4. In the ACL list field, enter a AC list, or AC lists IP addresses, if reuired. The firewall will not filter
the IP addresses entered in this list.
The AC lists are typically internal domains.
5. In the Forwarders list field, enter the address of the DNS server that is used to forwad DNS
queries for external DNS names to DNS servers outside the network.
6. Select the Enable Adware/Malware Hosts updates check box to enable updates.
7. In the Adware/Malware Hosts Online source field, enter the web site address that contains the
adware/malware blacklist used by the DNS filter.
8. Select the Adware/Malware Hosts Update frequency.
9. Click Submit.
 To configure the DNS Filter:
1. Navigate to App Layer> DNS Filter >Configuration
2. Under DNS Filter Settings view the following:
 Listen on (Enable DNS) - displays the interface the daemon listens to, as selected in the DNS
Daemon.
 DNS Filter (Domains Blacklisting) - displays the DNS filter status, as selected in the DNS
Daemon.
 ACL List - displays the AC list, or lists, entered in the DNS Daemon.
 Forwarders list – displays the address of the DNS server that is used to forwad DNS queries,
as entered the DNS Daemon.
3. Under Blacklisted Hosts Database set and view the following:
 Update from local file – enables you to upload the adware/malware blacklist database that
resides on the device to be used by the DNS filter. Click Upload DB, then select the required
blacklist database.
 Online Database Source (Known Malware/Adware) – displays the web site address,
entered in the DNS Daemon.
 Blacklists Update Frequency – displays the frequency the adware/malware blacklist is
updated, entered in the DNS Daemon.
To update the adware/malware blacklist at a specific time, click Update now.
SecFlow-1p
5. Management and Security
4. On the Configuration tab, on the left top side click Apply+Commit
Apply +Commit - the system saves the filters in the startup configuration. The filters will be
activated once the CPE is rebooted.
Setting and Downloading DNS Filter Logs
You can display and download logs that contain either DNS requests, or blocked IP addresses.
 To set and download DNS filter logs:
1. Navigate to App Layer> DNS Filter >Logs
2. Under Filtering set the following:
 Log Type - select the required log type
 Max lines - select the maximum number of lines to display in a log
 Update Interval - select logs update frequency
 String filter - enter a grep regular expression to filter the log entries
319
SecFlow-1p

3.
5. Management and Security
320
String filter limit - enter the number of log entries that should be checked to match the
string filter
DNS filter Access Table - displays the logs
Configuring the Web Content Filter
The Web Content Filter blocks access from specified inappropriate or unsafe specified web content, and
from specified file types. If using a secure connection, a HTTPs proxy resides between the computer
running the firewall and the websites, for handling secure connections requests.
WEB content Filter Configuration
 To configure the E2Guaridan Daemon:
1. Navigate to App Layer> WEB content Filter > click Edit
SecFlow-1p
5. Management and Security
321
2. Select the Enable E2Guaridan check box to enable the Web Content Filter daemon.
3. Select the Enable Transparent HTTPs proxy check box, if using a secure connection.
4. In the HTTP port field, leave the default port number, or enter the required number.
5. In the HTTPs port field, leave the default port number, or enter the required number.
6. Select the Enable Blacklists check box to block phrases, custom lists and file extension as
specified in the Phrase and Files lists tab.
7. Select the Enable Blacklists updates check box to enable updates.
8. In the Blacklists Online source, enter the web site address that contains the blacklists used by
the Web content filter.
9. Select the Blacklists source Update frequency.
10. Click Edit, to edit the Block-page template .
The Block-page template is the template of the message that users receive when entering a
blocked page.
11. Click Submit.
 To configure the Web Content Filter:
1. Navigate to App Layer>Web Content Filter >Configuration
2. Under Proxy Settings view the following:
 Enable Daemon - displays if the Web Content filter status, as selected in the E2Guaridan
Daemon.
SecFlow-1p



5. Management and Security
322
Enable HTTPs Transparent proxy - displays the proxy’s status as selected in the E2Guaridan
Daemon.
HTTP port - displays the HTTP port number as entered in the E2Guaridan Daemon.
HTTPs port - displays the HTTPs port number as entered in the E2Guaridan Daemon.
3. Under Blacklists Online Database view the Blacklists status, as selected in the E2Guaridan
Daemon.
4. Under Certificate Authority, if using SSL for a secure connection (HTTPs) click Create New CA,
then do the following:
 From the Key length list, select the certificate’s Key length in bits.
 From the Digest Algorithm list, select the certificate’s digest algorithm.
 In the Lifetime(days) field enter the number of days the certificate will be valid for.
 In the Common Name field, enter a meaningful name for the certificate.
 It is optional to enter a Country Code, State or Province name, City name , Orginaztion
name and Orginzation Unit name.
 Click Submit, then return to the Configuration tab.
5. Click Phrases Lists>Edit to configure the phrases lists to block.
SecFlow-1p
5. Management and Security
323
Do the following:
 In the Name field enter a meaningful name.
 From the Category list, selected the phrases to be filtered.
 In the Custom phrases field, if required, enter custom phrases as explained when clicking
.

Click Submit.
The Phrases Lists tab is displayed, the blocked phrases are indicated by the
custom lists are displayed.
icon, and the
6. Click Files Lists>Edit to select the file types to block.
Do the following:
 In the Name field enter a meaningful name.
 From the Available File Types Blacklists, select the file types to block.
 In the Mime field, enter the media, or content type to block.
 In the Exception url list field, enter the URLs from which blocked files can be downloaded.
 In the Exception site list field, enter the sites from which blocked files can be downloaded.
 Click Submit.
The Files Lists tab is displayed, the blocked file extensions are indicated by the
icon, the
SecFlow-1p
5. Management and Security
blocked MIME extensions and the domains and sites from which blocked files can be
downloaded are displayed.
7. On the Configuration tab, on the left top side click Apply+Commit
Apply +Commit - the system saves the filters in the startup configuration. The filters will be
activated once the CPE is rebooted.
Setting and Downloading Web Content Filter Logs
You can display and download logs that contain blocked phrases and files.
 To set and download Web content filter logs:
1. Navigate to App Layer> Web Content Filter >Logs
2. Under Filtering set the following:
 Max lines - select the maximum number of lines to appar in the log
 Update Interval - select the log’s update frequency
 String filter - enter a grep regular expression to filter the log entries
324
SecFlow-1p


5. Management and Security
String filter limit- enter the number of log entries that should be checked, to match the
string filter
E2Guradian Access Table – TBD
3. Click
, or
.
Displaying the System Log and System Information
The system log, Firewall statistics, Processes information, Interfaces information, Routes information
and Connections information are found under SYSTEM.
Configuring Advanced Settings
Advanced settings are found under OPERATIONS> Advanced settings and cover the following
operations.
325
SecFlow-1p
5. Management and Security
Database Operations
Download database: This function allows the user to download the Firewall database to the local
storage on the computer
Upload database: This function allows the user to upload the Firewall database stored on the local
storage on the computer to the CPE
326
SecFlow-1p
Note
5. Management and Security
327
The Firewall database cannot be uploaded/downloaded using the CLI
command.
Local Backup: This function allows the user to backup the Firewall database to the local CPE storage
Local Restore: This function allows the user to upload the Firewall database from the local CPE storage
Reset to Factory Defaults: This operation resets the Firewall database.
Note
The Firewall database cannot be reset using the CLI command.
Firewall Settings
The advanced Firewall settings are as follows:
•
Enable Generate IPv6 Rules: enables the Firewall to generate IPv6 rules
•
Enable SYN-flood Protection: enables the Firewall to monitor SYN-Flood packets and limit the
number of half open sessions
•
Drop Excessive TCP RST Packet: enables the Firewall to drop excessive TCP RST packets
•
Drop Invalid Packet: enables the Firewall to Drop Excessive invalid packets
•
Block Bogon Networks: Bogons include IP packets on the public Internet containing addresses
that are not in any range allocated or delegated by the Internet Assigned Numbers
Authority (IANA)
•
Block Bogus Packets: Block bogus (fake) IP addresses
DPI (Deep Packet Inspection) Engine Settings
•
Enable LOW CPU utilization: enables the Firewall to perform deep packet inspection, using the
application layer firewall, which uses up a large amount of CPU.
To enable or disable the above settings, click
required option/s.
and in the displayed window select or clear the
SecFlow-1p
5. Management and Security
GEO-IP Settings
The advanced GEO-IP setting are as follows:
•
Enable GEO-IP Updates: This menu item enables the Firewall to update the GEO-IP list used
under APP LAYER>GEO-IP rule-sets
•
GEO-IP Update Frequency: This function allows the user to set the frequency of updates.
These settings require the device to have Internet access.
328
6 Traffic Processing
6.1 Bridge
The SecFlow-1p bridge is a Layer-2 networking device that creates a single, aggregate network from
multiple communication networks or network segments. SecFlow-1p supports VLAN-unaware bridge
and VLAN-aware bridge.
Applicability and Scaling
SecFlow-1p supports up to two independent bridges (bridge #1 for LAN ports, bridge #2 for WAN ports),
up to 32 bridge ports, and at least 512 MAC entries per bridge. Bridge ports can be bound uniquely to
Ethernet and virtual ports. Only one bridge port can be assigned to a specific port.
The SecFlow-1p bridge is a Layer-2 forwarding entity that can work in VLAN-aware or VLAN-unaware
mode.
Standards Compliance
IEEE 802.1D
IEEE 802.1Q
Benefits
The bridge enables performing local switching.
SecFlow-1p
6. Traffic Processing
330
Functional Description
Architecture
The bridge is one of the networking components that can perform layer-2 connectivity between
ethernet ports and the router.
The device hardware design is based on the CPU connected to the LAN and WAN switches which provide
the LAN ports and WAN ports, respectively (see the diagram below).
LAN
Switch
CPU
Figure #1: pCPE HW structure
WAN
Switch
When operating the pCPE device as a router without local switching on LAN or WAN ports, the LAN and
WAN switchs are transparent and provide the following ports connectivity to the router.
When operating the pCPE device as a router with local switching on LAN ports, the LAN switch provides
the bridge functionality between Ethernet physical ports and the router.
SecFlow-1p
6. Traffic Processing
331
Packet Walkthrough in VLAN-Unaware Mode
The SecFlow-1p bridge in VLAN-unaware mode supports the following packet walkthrough:
•
The bridge receives all packets (no restrictions).
•
In Filter mode, the bridge learns the packet source MAC address and adds it to the MAC table
with the corresponding source port.
•
The bridge forwards multicast and unicast packets, as follows:
 Flood broadcast – The bridge forwards multicast packets to all ports (except the packet
source port).
 The bridge forwards unicast packets to the destination port:

According to the packet’s destination in the MAC table (entries are dynamic provided by
learning source MAC addresses or static by configuration)

Flooded to all ports (except the packet source port) in case of a destination MAC that
does not exist in the MAC table

Flooded to all ports (except packet source port) in case of transparent mode
•
The bridge transmits packet as is (no modifications)
Note
In VLAN-unaware mode, legal packets are always forwarded (to a specific port
or flooded to all ports).
Packet Walkthrough in VLAN-Aware Mode
The SecFlow-1p bridge in VLAN-aware mode forwards packets according to MAC address and VLAN, that
is, by creating VLAN domains on the bridge.
It supports VLAN membership table that defines VLAN membership per bridge port as follows:
•
By default, a port doesn’t have VLAN membership.
SecFlow-1p
6. Traffic Processing
332
•
VLAN domain is defined by configuration and includes all ports with a specific VLAN
membership.
•
VLAN membership table defines whether Egress bridge port transmits packets with or without
VLAN tag.
The SecFlow-1p bridge in VLAN-aware mode supports the following packet walkthrough:
•
The bridge receives packets according to the port definition:
 In case of enabled Ingress filtering, SecFlow-1p discards incoming frames for VLANs that do
not include the port in their members set. In case of disabled Ingress filtering, the port
accepts all incoming frames.
 In case of Accept frame type set to tag-only, the bridge discards untagged frames received
at the port. If it is set to all, untagged frames received at the port are accepted and assigned
to a VID based on the VID set for this port (VLAN ID).
•
In Filter mode, the bridge learns the packet source MAC address and VLAN per VLAN domain
and adds it to the MAC table with the corresponding source port.
•
The bridge forwards as follows:
 Flood broadcast – The bridge forwards multicast packets per VLAN domain to all ports
(except packet source port)
 The bridge forwards unicast packets to the destination port per VLAN domain:

According to the packet’s destination in the MAC table (entries are dynamic provided by
learning source MAC addresses or static by configuration)

Flooded per VLAN domain to all ports (except the packet source port) in case of a
destination MAC that does not exist in the MAC table

Flooded per VLAN domain to all ports (except packet source port) in case of transparent
mode
•
The bridge transmits packets according to port definitions in VLAN membership table:
 Tagged – the bridge transmits with VLAN tag
 Untagged – the bridge transmits without VLAN tag
In VLAN-aware mode, the SecFlow-1pbridge can stack or strip VLAN tags on an ingress bridge port to
achieve double-VLAN support.
VLAN Membership
SecFlow-1p bridge supports VLAN domain definition per bridge entity, in VLAN-aware mode only.
For each VLAN domain, SecFlow-1pbridge supports the following VLAN membership table configuration
parameters:
SecFlow-1p
6. Traffic Processing
•
VLAN-ID
•
Egress tagged ports (the ports belong to VLAN domain and transmit tagged packets)
•
Egress untagged ports (the ports belong to VLAN domain and transmit untagged packets)
333
MAC Table
SecFlow-1p bridge erases MAC table every aging time period, implementing by this MAC table aging
mechanism.
It can clear MAC table learned entities with MAC table clear command.
SecFlow-1pbridge supports the following static MAC configuration parameters:
•
Available for VLAN-aware mode only
•
Add / remove static entry
•
Static entries include:
 VLAN
 MAC address
 Bridge port
SecFlow-1p bridge supports MAC table show per bridge entity with the following information
•
For VLAN-unaware mode:
 MAC address
 Received bridge port
 Status: static / dynamic
•
For VLAN-aware mode:
 VLAN-ID
 MAC address
 Received bridge port
 Status: static / dynamic
Bridge Operation
There are 2 bridges to operate:
• Bridge #1 is the LAN bridge; it bridges Ethernet 3..6 ports and the Ethernet lan-switch port that
connects the router.
SecFlow-1p
•
6. Traffic Processing
334
Bridge #2 is the WAN bridge; it bridges Ethernet 1 and Ethernet 2 ports and the Ethernet wanswitch port that connects the router.
Setting a bridge is allowed only when all its related ports are not bound to the upper layer (router) and
do not have ACL, QoS, PBR and force-next-hop configuration.
VLAN unaware bridge operates as follows: once the user activates the bridge ports and binds them to
the physical port, the activated bridge ports are forwarding traffic.
VLAN aware bridge operates as follows: once the user activates the bridge ports, binds them to the
physical port and defines VLAN membership for bridge ports, only the activated bridge ports with VLAN
membership are forwarding traffic.
Factory Defaults
By default, no bridge is configured in SecFlow-1p. When you create a bridge, by default it does not
contain any bridge ports.
The following table shows the default configuration of a bridge and bridge port once they are created.
Parameter
Description
Default Value
name
Bridge name
BRIDGE <bridge-number>
filtering
Bridge forwarding mode
enable
vlan-aware
disable
aging-time
Aging time for MAC table entries
300
vlan
Configure aware bridge VLAN membership
no VLANS
name
Bridge port name
BP <port-number>
shutdown
Administrative status of bridge port
shutdown
accept-frame-type
Accepting all received packets
all
bind
Bind bridge port to lower layer
no bind
ingress-filtering
Enable ingress filtering
disable
ingress-tag-handling
Defines ingress VLAN stacking/stripping mode and effects
the egress direction with the opposite operation
none
pvid
Configure PVID
1
Bridge Port
SecFlow-1p
6. Traffic Processing
335
Configuring the Bridge
 To configure the bridge:
1. At the config# prompt, enter bridge <number>; number can be 1 (for Ethernet 3..6 ports) and 2
(for Ethernet 1 and Ethernet 2 ports).
2. At the prompt, enter all necessary commands according to the tasks listed below.
Note
Creating a bridge is allowed only when its ports are not bound to any entity
and have no configuration of ACL, QoS, PBR and force-next-hop.
Note
Deleting a bridge (no bridge <number>) is allowed only when all bridge ports
are not active.
Task
Command
Comments
Defining aging time for
MAC table entries
(seconds)
aging-time <seconds>
seconds – aging time
Possible values: 60 – 15300 sec
Clearing MAC table
learned MAC addresses
clear-mac-table
Enabling/disabling filtering
forwarding mode
filtering
filtering:
no filtering
• For VLAN-unaware mode, enables filtering
frames received according to the learned MAC
address
• For VLAN-aware mode, enables filtering frames
received according to the learned MAC address
and VLAN
MAC table is erased every aging time period.
no filtering:
• For VLAN-unaware mode, enables transparent
bridge forwarding mode. In this mode, the
bridge forwards all frames received to all ports
(flooding)
• For VLAN-aware mode, VLAN-aware
transparent forwarding
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Assigning a name to the
bridge
[no] name <bridge-name>
bridge-name – name assigned to bridge
Possible values: 1-32 character string
336
To delete the bridge name, type no name.
Defining the behavior and
attributes of bridge ports
port <port-number>
Possible values: 1-32
To delete a bridge port, enter
no port <port-number>.
Note: You can delete a bridge port only if it is not
active.
For detailed configuration of bridge ports, see
Configuring Bridge Ports.
Configuring static MAC
address entry in MAC table
[no] static-mac <vlan-id>
<mac-address> <bridgeport>
Appears in vlan-aware mode only.
vlan-id – Possible values: 1–4094
mac-address – xx-xx-xx-xx-xx-xx (hex format,
x=0..F)
bridge-port – bridge port number
To delete a static MAC address entry from the MAC
table, type no static-mac <vlan-id> <mac-address>
<bridge-port>
Displaying MAC address
table
show mac-address-table
{static | dynamic | all}
all – static and dynamic MAC addresses
Displaying VLAN members
show vlans
See Viewing VLANs
Displaying the bridge ports
number, status, and
Ethernet ports bound to
them
show summary
Appears in vlan-aware mode only
Defining VLAN
membership specifications
vlan <vlan-id>
Appears in vlan-aware mode only
no vlan <vlan-id>
Possible values: 1–4094
See Viewing MAC Table
See Viewing Bridge Status
Type no vlan <vlan-id> to delete the VLAN from the
VLAN membership table.
See Configuring VLAN
Enabling or disabling Layer
2 bridging according to the
VLAN tag
vlan-aware
no vlan-aware
You can change the mode only when there are no
active bridge ports.
SecFlow-1p
6. Traffic Processing
337
Configuring Bridge Ports
The following commands are available in the port level, at the config>bridge(<bridgenumber>)>port(<port-number>)# prompt.
Note that port 1 (reserved for WAN switching) and port 2 (reserved for WAN switching) have special
destinations and cannot be connected to any Ethernet port.
Task
Command
Comments
Defining whether to accept
all packets or VLAN-tagged
packets only
accept-frame-type {all | vlan-only}
Appears in vlan-aware mode only
Binding a bridge port to
physical or virtual port
bind ethernet <port name>
Notes:
no bind
• You can bind only one bridge port to a
specific port.
• You can bind the bridge port only to an
existing port that is not bound to any entity,
such as router interface or another bridge
port.
• You can enter no bind to remove a bound
port.
bridge 1 bind options are as follows: ethernet
lan1, ethernet lan2, ethernet lan3, ethernet
lan4, ethernet lan-switch.
bridge 2 bind options are as follows: ethernet
wan1, ethernet wan2, ethernet wan-switch.
Binding bridges 1 and 2 to other ports is not
allowed.
Enabling/disabling ingress
filtering according to
defined VLANs
Configuring ingress VLAN
stacking/stripping mode
that effects the egress
direction with the opposite
operation
ingress-filtering
Appears in vlan-aware mode only
no ingress-filtering
When ingress filtering is enabled, SecFlow-1p
discards incoming frames for VLANs that do not
include the port in their member set.
When it is disabled, the port accepts all incoming
frames.
ingress-tag-handling {none |
stacking | stripping } [ vlan-id <vlanid> ]
Appears in vlan-aware mode only
stacking – tag stacking
stripping – tag stripping
vlan-id – VLAN ID assigned whenever the chosen
mode is stacking
Possible values: 1 – 4094
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Assigning a name to the
bridge port
[no] name <port-name>
port-name – bridge port name
Possible values: 1-32 character string
338
To delete the bridge port name, enter no name.
Assigning default port
VLAN ID to untagged
traffic
pvid <vlan-id>
Administratively
enabling/disabling the
bridge port
[no] shutdown
Appears in vlan-aware mode only
Possible values: 1 – 4094
To administratively disable the bridge port, enter
shutdown.
Setting the port to ‘no shutdown’ is allowed only
when port is not bound to another bridge port.
Note: Shutting down the bridge port does not
stop the traffic.
Configuring VLAN
The following commands are available in the vlan level, at the config>bridge(<bridgenumber>)>vlan(<vlan-id>)# prompt.
Task
Command
Defining a list of egress tagged ports
tagged-port <port-list>
Comments
no tagged-port <port-list>
Defining a list of egress untagged ports
untagged-port <port-list>
no untagged-port <port-list>
Examples
Note
To configure the bridge, you have first to delete the default router interface.
 To configure a VLAN-unaware bridge:
con
#
echo "Port Configuration"
Port Configuration
port
ethernet 3
no shutdown
//**Connecting the port to traffic generator**//
SecFlow-1p
#
#
6. Traffic Processing
339
exit
ethernet 4
//** Connecting the port to traffic generator**//
no shutdown
exit
ethernet lan-switch
//**Configuring the lan-switch port**//
no shutdown
exit
exit
echo "Bridge Configuration"
Bridge Configuration
bridge 1
//**Configuring bridge 1, by default it’s vlan unaware**//
echo "Bridge Port Configuration"
Bridge Port Configuration
port 1
bind ethernet lan-switch //**Binding lan-switch port**//
no shutdown
exit
port 3
bind ethernet 3 //**Binding the port connected to traffic generator**//
no shutdown
exit
port 4
bind ethernet 4 //**Binding the port connected to traffic generator**//
no shutdown
exit
exit
router 1
name "Router#1"
interface 1
//**Creating router interface to connect to lan-switch port that
is connected to bridge**//
address 10.0.0.1/24
bind ethernet lan-switch //**Binding to lan-swtich port**//
dhcp-client
client-id mac
exit
no shutdown
exit
exit
 To configure a VLAN-aware bridge:
exit all
con
echo "Terminal Configuration"
#
Terminal Configuration
terminal
timeout forever
console-timeout forever
exit
echo "Port Configuration"
#
Port Configuration
port
SecFlow-1p
#
#
#
6. Traffic Processing
ethernet 3
//**Connecting the port to traffic generator**//
no shutdown
//**Connecting the port to traffic generator**//
exit
ethernet 4
no shutdown
exit
ethernet lan-switch
//**Configuring lan-switch port**//
vlan 200
//**Configuring VLAN at lan-switch port**//
no shutdown
//**Activating VLAN **//
exit
no shutdown
//**Activating the port**//
exit
exit
echo "Bridge Configuration"
Bridge Configuration
bridge 1
//**Configuring bridge 1**//
vlan-aware
//**Enabling vlan aware mode**//
filtering
echo "VLAN Configuration"
VLAN Configuration
vlan 200
//**Configuring vlan at bridge**//
tagged-port 1,3..4 //**Configure vlan tagged ports**//
exit
echo "Bridge Port Configuration"
Bridge Port Configuration
port 1
bind ethernet lan-switch //**Binding lan-switch port**//
no shutdown
exit
port 3
bind ethernet 3
//**Binding the port connected to traffic generator**//
no shutdown
exit
port 4
bind ethernet 4
//**Binding the port connected to traffic generator**//
no shutdown
exit
exit
router 1
name "Router#1"
//**Creating router interface to be connected to the
lan-switch port which is connected to the bridge**//
interface 1
address 10.0.0.1/24
bind ethernet lan-switch vlan 200 //**Binding to lan-switch port with the
same vlan**//
dhcp-client
client-id mac
exit
no shutdown
exit
exit
340
SecFlow-1p
6. Traffic Processing
341
Viewing Bridge Status
Viewing Bridge Summary
 To display the bridge summary:
•
At the config>bridge(bridge_number)# prompt, enter show summary.
The summary is displayed.
config>bridge(1)# show summary
Num
Admin Status
Bind
-------------------------------------------------------------------------1
Up
Eth lan-switch
2
Up
Eth 3
3
Up
Eth 4
The above fields are:
Num
Bridge port number
Admin Status
Entry status
Possible values: Up, Down
Bind
Port the bridge port bound to
Viewing MAC Table
You can display the MAC table, which provides information on static and dynamic addresses, and the
bridge ports associated with them.
 To display the MAC address table:
•
At the config>bridge(bridge number)# prompt, enter show mac-address-table all.
The MAC address table is displayed.
Note
VLAN-unaware mode:
SecFlow-1p displays only the first 1000 entries. To view the entire MAC table,
download it to your PC using SFTP. For this, refer to File Operations.
SecFlow-1p
6. Traffic Processing
config>bridge(1)# show mac-address-table all
VLAN-aware mode:
config>bridge(1)# show mac-address-table all
Total MAC Addresses
: 3
Static MAC Addresses : 1
Dynamic MAC Addresses : 2
VLAN Static MAC Address Port Status
----------------------------------------------------------------------------100
12-12-12-11-15-14
1
Static
VLAN Learned MAC Address Port Status
----------------------------------------------------------------------------100
00-10-94-00-00-06
3
Dynamic
100
00-55-66-77-01-42
1
Dynamic
VLAN-unaware mode:
config>bridge(1)# show mac-address-table all
Total MAC Addresses
: 3
Static MAC Addresses : 1
Dynamic MAC Addresses : 2
Static MAC Address Port Status
----------------------------------------------------------------------------12-12-12-11-15-14
1
Static
Learned MAC Address Port Status
----------------------------------------------------------------------------00-10-94-00-00-06
3
Dynamic
00-55-66-77-01-42
1
Dynamic
The above fields are:
Total MAC Addresses
Total number of entries in the MAC address table
Static MAC Addresses
Number of static entries in the MAC address table
Dynamic MAC Addresses
Number of dynamic entries in the MAC address table
VLAN
VLAN ID domain
MAC Address
Learned MAC address in MAC Address table
Port
Received bridge port
342
SecFlow-1p
6. Traffic Processing
Status
343
Entry status
Possible values: Static, Dynamic
Viewing VLANS
 To display VLAN domain members:
•
At the config>bridge(bridge_number)# prompt, enter show vlans.
The VLAN members are displayed per VLAN.
config>bridge(1)# show vlans
VLAN ID
: 100
-------------- :
Tagged Ports
: 1..4
Untagged Ports : 0
Configuration Errors
SecFlow-1p generates the following messages when it detects a configuration error.
Message
Cause
Corrective Action
Cannot create – LAN
ports are bound to
another entity or have
configuration of ACL,
QoS, PBR or force-nexthop
You tried to create bridge 1 while Ethernet
3..6 ports were bound to other ports or have
configuration of ACL, QoS, PBR or force-nexthop
Cannot create – WAN
ports are bound to
another entity or have
configuration of ACL,
QoS, PBR or force-nexthop
You tried to create bridge 2 while Ethernet
1..2 ports were bound to other ports or have
configuration of ACL, QoS, PBR or force-nexthop
Port does not exist
You tried binding the bridge port to a port
that does not exist.
Select another port that does exist,
or create a port and then bind the
bridge port to it.
Port is already bound
You tried binding the bridge port to a port
that is already bound to another entity.
Unbind the port from the other
entity.
SecFlow-1p
6. Traffic Processing
Message
Cause
Corrective Action
Upper layer is bound to
bridge port
You tried to delete a bridge while there are
ports bound by upper layer entity
Unbind the port from the upper
layer entity
Cannot modify – there
are active bridge ports”
You tried to change the VLAN
aware/unaware mode on a bridge with
active bridge ports
Set admin status of the active
bridge ports to “down”, then you
can change the bridge mode
Cannot modify – bridge
port is active
You tried to unbind or modify an active
bridge port
Set admin status of the active
bridge ports to “down”, then you
can unbind or modify it.
Cannot bind – port do not
exist
You tried to bind a non-existing port
Cannot bind – port is
already bound
You tried to bind a port that is already bound
to a bridge port or router interface.
344
LAN ports can be bound once in bridge 1
WAN ports can be bound once in bridge 2
lan-switch port can be bound once in bridge
1 and once by router interface
wan-switch port can be bound once in bridge
2 and once by router interface
lan-switch and wan-switch ports with
defined VLAN ports can be bound to bridge
port and router interface
Cannot modify – bridge
port is not bound
You tried to enable a bridge port, which is
not bound to a lower layer port.
Bound the bridge port to a lower
layer port.
Bridge port is already
assigned to membership
list
You tried to add a bridge port that is already
assigned to another membership set
Exclude the bridge port from
another membership set, then you
can add it to the new list
Cannot bind – port does
not belong to bridge 1
bridge 1 bind options are as follows:
bridge 1 bind options are as follows:
ethernet 3, ethernet 4, ethernet 5, ethernet
6, ethernet lan-switch.
Binding to another port is not allowed.
Cannot bind – port does
not belong to bridge 2
bridge 2 bind options are as follows:
ethernet 1, ethernet 2, ethernet wanswitch.
Binding to another port not allowed.
SecFlow-1p
6. Traffic Processing
345
6.2 DNP3 Gateway
DNP3 (Distributed Network Protocol) is a set of communications protocols used in SCADA applications.
features gateway functionality between a DNP3 TCP client (master) and a DNP3 Serial RTU.
A DNP3 gateway is configured with a terminal server using a TCP port with the number equal or higher
than 20000.
Configuring DNP3 Gateway
The figure below demonstrates the DNP3 gateway configuration.
Ser ial 1
ETH1:1 - 192.168.40.10
Gat eway
DNP3 RTU
192.168.40.11
S1
S2
ETH1
DNP3 Client
Ser ial 2
Sec Flow-1p
DNP3 RTU
DNP3 Gateway Example
 To configure the DNP3 gateway:
*** Activate terminal server***
configure
system
serial
terminal-server
no shutdown
exit
exit
exit
*** Assign serial port for DNP3 RTU connection and gateway using terminal server***
port
serial 1
no shutdown
terminal-server 1
local-address 192.168.40.10
telnet-server-tcp port 20000
exit
exit
SecFlow-1p
6. Traffic Processing
346
serial 2
no shutdown
terminal-server 1
local-address 192.168.40.10
telnet-server-tcp port 20001
exit
exit
exit
*** Assign the gateway IP interface***
router 1
name "Router#1"
interface 32
address 192.168.40.10 /24
bind ethernet 6
dhcp-client
client-id mac
exit
no shutdown
exit
exit
exit
6.3 GRE Tunneling
SecFlow-1p supports Generic Routing Encapsulation (GRE) protocol, which sets up point-to-point tunnels
between two sites and encapsulates other protocols. SecFlow-1p supports point-to-point GRE spoke
functionality.
Applicability and Scaling
This feature is applicable to all versions of SecFlow-1p.
Standards Compliance
RFC 2784
Generic Routing Encapsulation (GRE)
RFC 4087
IP Tunnel MIB
SecFlow-1p
6. Traffic Processing
347
Functional Description
The terminology used in this section is described in the following table:
Term
Stands For
Description
GRE
Generic Routing
Encapsulation
Protocol that sets up point-to-point tunnels between two sites and
encapsulates other protocols
Hub
Central router
Spoke
All devices that contact the hub (central router)
GRE Tunneling
GRE tunneling is accomplished through routable tunnel endpoints that operate on top of existing
endpoints.
Routers use GRE to send traffic through an intervening network that does not support the protocols or
addresses of incoming packets. GRE encapsulates packets into another IP packet + IP header. For
example, you can create an IPv4 tunnel to send IPv6 traffic through a network that handles IPv4 traffic.
The device complies with the Generic Routing Encapsulation standard (RFC 2784).
A GRE encapsulated packet has the form:
--------------------------------|
Delivery Header
|
--------------------------------|
GRE Header
|
--------------------------------|
Payload packet
|
--------------------------------SecFlow-1p supports configuration of tunnel interfaces under the router level.
You can configure the tunnel MTU, or calculate it based on the MTU of the media the tunnel passes
through.
SecFlow-1p supports IP fragmentation and defragmentation in tunnels, for packets that are larger than
the tunnel IP MTU.
SecFlow-1p
6. Traffic Processing
348
Both delivery (encapsulating) and payload (encapsulated) protocols can be either IPv4 or IPv6,
independently of each other.
A GRE tunnel remains operationally up once you configure it with the following:
•
A valid tunnel source address or interface
•
A valid, routable tunnel destination IP address
•
A valid IP address for the tunnel
A GRE tunnel becomes operationally down under any of the following conditions:
•
There is no route to the tunnel destination address.
•
The interface that anchors the tunnel source is down.
•
The route to the tunnel destination address is through the tunnel itself.
Factory Defaults
Parameter
Description
Default Value
ip-mtu
IP MTU of tunnel
For IPv4 – 1476
For IPv6 - 1456
Configuring Tunneling
Use the commands in the following procedure to create a point-to-point GRE tunnel.
•
Configure tunnel address – the IP address defined on the tunnel interface
•
Configure tunnel source.
•
Configure tunnel destination.
 To configure tunneling:
1. Navigate to configure router <number> to select the router interface on which to configure GRE
tunneling.
2. At the config>router(<number>)# prompt that is displayed, enter
tunnel-interface <number> gre-ip
SecFlow-1p
6. Traffic Processing
349
The config>router(<number>)>tunnel-interface(<number>) is displayed.
The tunnel is identified by this number.
3.
Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Defining tunnel IP address
and prefix length
ip-address <ip-address/prefixlength>
Entering no ip-address removes the
tunnel IP address.
ip-address – valid unicast IPv4 or nonlink-local IPv6 address with compatible
prefix length
Notes:
• A tunnel can have only one
address. If you repeat the
command, the last instance applies.
• The tunnel address cannot be the
address of another tunnel or of a
router interface.
• Both ends of the tunnel should be
on the same network.
Defining tunnel IP MTU
ip-mtu <number>
Entering no ip-mtu removes IP MTU
from the tunnel interface.
Possible values: 0 (no IP MTU),
128-65535
Note: 0 means that the MTU is to be
calculated according to the delivery
protocol. For IPv4 it is 1476 and for
IPv6 1456.
Binding PBR rule to the
port
policy-based-route priority
<priority> match-acl <name>
{next-hop <ip-address>}
interface <type, index>
See Configuring PBR
no policy-based-route priority
<priority>
Displaying tunnel status
show status
See Viewing GRE Status
Defining tunnel
destination IP address
tunnel-destination <ipaddress>
Entering no tunnel-destination
removes the address.
Possible values: Valid unicast IPv4 or
non-link-local IPv6 address
SecFlow-1p
Task
6. Traffic Processing
Command
350
Comments
Notes: The source and destination
addresses must be both IPv4 or IPv6.
Configuring GREoIPsec
underlay destination
tunnel-underlay-destination
<IP address>
Entering no tunnel-underlaydestination removes the address.
Possible values: Valid unicast IPv4 or
non-link-local IPv6 address
Notes: The source and destination
addresses must be both IPv4 or IPv6.
Configuring GREoIPsec
underlay source
tunnel-underlay-source [<ipaddress>] [router-interface
<number>]
Entering no tunnel-underlay-source
removes the address.
Possible values:
ip-address – valid unicast IPv4 or nonlink local IPv6 address
number - number of a non-loopback
router interface
Notes:
• Either IP address or router
interface number must be defined;
not both.
• The tunnel and the router interface
anchoring it must be on the same
router.
The source and destination addresses
must be both IPv4 or IPv6.
Defining source IP address
or router interface number
used to bind the tunnel to
a router interface
tunnel-source [<ip-address>]
[router-interface <number>]
Entering no tunnel-source removes
the address.
Possible values:
ip-address – valid unicast IPv4 or nonlink local IPv6 address
number - number of a non-loopback
router interface
Notes:
• Either IP address or router
interface number must be defined;
not both.
• The tunnel and the router interface
anchoring it must be on the same
router.
SecFlow-1p
Task
6. Traffic Processing
Command
351
Comments
• The source and destination
addresses must be both IPv4 or
IPv6.
 To remove a GRE tunnel:
1. Navigate to configure router <number> to select the router interface from which to remove a
GRE tunnel.
2. At the config>router(<number>)# prompt that is displayed, enter no tunnel-interface
<number>.
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
Tunnel exists with a different
type
You tried changing the type of
an existing tunnel.
Create a new tunnel of the new type.
Maximum number of tunnels
exceeded
You tried to create more
tunnels than your device
allows.
Invalid address; enter a unicast
address
You tried to enter a broadcast
or multicast address as the
tunnel address.
Enter a valid unicast IPv4 or IPv6 address
with a compatible prefix-length.
The address is assigned to
another interface
You tried to configure the
tunnel with an address of an
already existing tunnel or
router interface.
Assign a unique address to the tunnel.
Configure either source address
or interface, not both
You tried to configure the
router interface anchoring the
tunnel with both an address
and interface.
Remove one of the configurations:
either the address or interface.
SecFlow-1p
6. Traffic Processing
352
Message
Cause
Corrective Action
Source and destination must be
both IPv4 or both IPv6
You tried to configure tunnel
destination with an IPv4
address while the tunnel source
is an IPv6 address.
Define destination and source with same
type of IP address – both IPv4 or both
IPv6.
You tried to configure tunnel
source with an IPv4 address
while the tunnel destination is
an IPv6 address.
Examples
 To configure a tunnel from Router A to Router B:
# Router A
tunnel-interface 1 gre-ip
tunnel-source 2.2.2.2
tunnel-destination 2.2.2.1
ip-address 10.10.10.1/30
exit
 To configure a tunnel from Router B to Router A:
# Router B
tunnel-interface 1 gre-ip
tunnel-source 2.2.2.1
tunnel-destination 2.2.2.2
ip-address 10.10.10.2/30
exit
Viewing GRE Status
You can display the current GRE tunnel status.
 To display GRE tunnel status:
•
At the config>router(<number>)>tunnel-interface(<number>)# prompt, enter:
show status
The GRE tunnel status is displayed.
config>router(1)>tunnel-interface(1)$ show status
SecFlow-1p
6. Traffic Processing
Tunnel
: 1
Tunnel Name
: tunnel1
Type
: GRE-IP
Status
Admin
: Enabled
Oper
: Up
Tunnel Attachment Circuit: Bridge 1 Port 1
Tunnel Address
: 10.10.10.1/30
Tunnel Source
Interface
: Router Interface 1/2 (Ethernet lan2/1)
Address
: 1.1.1.1
Tunnel Destination
: 2.2.2.2
IP MTU
: 1476 (Calculated)
Up For (seconds)
Input
Bytes
Packets
Output
Bytes
Packets
: 0 Day(s), 0:52:13
: 10000
: 150
: 5000
: 100
Parameter
Description
Tunnel
Tunnel number
Type
Tunnel type
Possible value: GRE or IPsec
Status
Tunnel administrative and operational status
Possible values:
• Up
• NotConfigured
• LLD - Lower Layer Down
• No Route To Destination
Tunnel IP address
Tunnel Address
Possible values:
Tunnel Source Interface
• -- (Tunnel address is not configured.)
• <IPv4 or IPv6 unicast address>/<prefix length>
Router interface anchoring the tunnel
Possible values:
• -- (No interface is configured.)
• Router Interface <router number>/<interface number>
353
SecFlow-1p
6. Traffic Processing
Parameter
Description
Tunnel Source Address
Tunnel source IP address
Possible values:
• -- (Tunnel source IP address is not configured.)
• IPv4 or IPv6 unicast address
Tunnel destination IP address
Possible values:
• -- (Tunnel destination IP address is not configured.)
• IPv4 or IPv6 unicast address
Tunnel Destination
IP MTU
Tunnel IP MTU
Possible values: --, number
• If Tunnel IP MTU configuration method is non-zero, it is printed
• If Tunnel IP MTU configuration method is zero:
o If tunnel source address type is IPv4, 1476 is printed.
o If tunnel source address type is IPv6, 1456 is printed.
o If tunnel source address type is unknown, -- is printed.
Up For (seconds)
Tunnel uptime
Possible values: Time in seconds; Display hint: ddd Days, hh:mm:ss
Input Bytes
Number of Rx bytes since tunnel uptime
Inout Packets
Number of Rx packets since tunnel uptime
Output Bytes
Number of Tx bytes since tunnel uptime
Output Packets
Number of Tx packets since tunnel uptime
Last Registration
Last registration request status
Possible values:
•
•
•
•
-- (registration was not sent; no entry in this table for the tunnel)
Registering
ACK (ACK received)
NAK (NAK received)
6.4 IPsec
IPsec is a protocol suite for securing private communication across IP networks.
354
SecFlow-1p
6. Traffic Processing
355
SecFlow-1p supports IPsec on router interfaces having an IPv4 address, with the following main
features:
•
Tunnel mode
•
ESP with the following algorithms: AES CBC 128 and 256, AES GCM 128 and 256, AES GMAC 128
and 256, null encryption, SHA-1, SHA-2 256 and 512
•
DH groups:
 1 (768-bit modulus)
 2 (1024-bit modulus)
 5 (1536-bit modulus)
 14 (2048-bit modulus)
 19 (256-bit elliptic curve)
 20 (384-bit elliptic curve)
•
IKEv1 (main and aggressive mode) and IKEv2
•
IKE authentication with pre-shared keys
•
IKE algorithms AES CBC 128 and 256, SHA-1, SHA-2 256 and 512
•
Configurable IKE identities enable IPsec between peers, whose IP address is unknown at the
time of configuration
•
IPsec over GRE
•
Policy-based and Route-based IPsec
•
Simple redundancy mechanism for route-based IPsec tunnels
•
IPv4 and IPv6
•
NAT traversal
•
Transport (underlay) router can differ from the router on which the tunnel is configured.
In tunnel mode, SecFlow-1p adds an IPsec header before the original packet, then encapsulates it with a
new IP header, whose source and destination addresses are those of the tunnel peers. This mode is
usually used between two gateways protecting the machines behind them.
IPsec tunnels always ensure the integrity of the traffic they protect. Encryption is optional. SecFlow-1p
supports Encapsulating Security Protocol (ESP), which provides both integrity and confidentiality (i.e.
encryption). ESP operates on top of IP, using IP protocol 50.
SecFlow-1p
6. Traffic Processing
356
Applicability and Scaling
This feature is applicable to all the device versions.
AH is not supported, since similar functionality can be achieved having ESP with null encryption.
SecFlow-1p supports up to four proposals (policies). Up to 20 crypto maps can be configured. Up to 20
transform sets can be configured.
Only tunnel mode of operation is supported; transport mode is not supported.
Standards Compliance
RFC 5996
RFC 7383
Internet Key Exchange Protocol Version 2 (IKEv2)
Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation
Benefits
IPsec automatically secures applications at the IP layer.
Functional Description
The terminology used in this section is described in the following table:
Term
Stands For
Description
ESP
Encapsulating Security Payload
Protocol that provides origin authenticity, integrity, and
confidentiality protection of IP packets
IKE
Internet Key Exchange
ISAKMP
Internet Security Association and
Key Management Protocol
Provides a framework for agreeing to the format of SA
attributes, and for negotiating, modifying, and deleting SAs.
IPsec
IP Security
A protocol suite for securing private communication across
IP networks
PSK
Pre-shared key
Authentication method for IPsec phase-one (IKE) policies
PFS
Perfect Forward Secrecy
DH group
Diffie-Hellman group
SecFlow-1p
6. Traffic Processing
357
Term
Stands For
Description
SA
Security Association
Relationship between two or more entities (VPN Hubs and
Spokes) that describes how the entities will utilize security
services to communicate securely.
Crypto Map
SecFlow-1p supports the configuration of crypto maps - IPsec profiles that determine how IPsec tunnels
are established and maintained.
Crypto maps define tunnel policies. These policies determine how IPsec processes data packets.
A valid crypto map should be configured with the following:
•
At least one IPsec phase one (IKE) policy
•
At least one source and one destination protected network
•
Peer address
•
At least one transform set
After a crypto map is configured, and is associated with an operational router interface, SecFlow-1p
establishes and maintains an IPsec tunnel.
You can associate multiple crypto maps with one router interface. For each map, SecFlow-1p maintains
a separate tunnel. When a packet enters or has to be forwarded, SecFlow-1p tries to match it against
the maps’ protected networks in the order of the map sequence numbers (lowest first). If multiple maps
have the same number, they are checked in the order of their names (lowest first). A packet is handled
by the first crypto map that matches it. Whatever the map does with it is final, even if the packet
matches another map (with lower priority).
Outgoing packets whose source and destination IP addresses match the crypto map protected network
configuration, are processed by the crypto map before being forwarded. Incoming packets matching the
configuration (after reversing its source and destination) are expected to be IPsec protected as well. If
not, they are discarded.
Packets whose source and destination IP addresses do not match the crypto map protected network
configuration, are not processed by the crypto map (in both directions). They may be handled by a
different crypto map, should they match its rules; otherwise, they are forwarded in the clear.
SecFlow-1p supports crypto map binding to a router or tunnel interface. A map can be associated with
multiple interfaces, and multiple maps may be associated with one interface.
SecFlow-1p
6. Traffic Processing
358
Security Associations (SAs)
A Security Association (SA) is a relationship between two peers that describes how the entities will
utilize security services to communicate securely.
This relationship is represented by a set of information that can be considered a contract between the
entities. The information must be agreed upon and shared between all the entities.
ISAKMP (IKE) provides the protocol exchanges to establish a security association between negotiating
entities followed by the establishment of a security association by these negotiating entities on behalf of
ESP.
Each SA (IKE) has its own lifetime. When it expires, the SA is deleted.
Transform Sets
SecFlow-1p supports the configuration of up to 20 transform sets, which define the algorithms to be
used in IPsec phase 2.
Internet Security Association and Key Management Protocol (ISAKMP)
ISAKMP provides a framework for agreeing to the format of SA attributes, and for negotiating,
modifying, and deleting SAs.
An initial protocol exchange allows a basic set of security attributes to be agreed upon. This basic set
provides protection for subsequent ISAKMP exchanges. It also indicates the authentication method and
key exchange that will be performed as part of the ISAKMP protocol. After the basic set of security
attributes is agreed upon, initial identity authenticated, and required keys generated, the established SA
can be used for the protection of the VPN tunnels.
ISAKMP implementation guards against denial of service, replay/reflection, and man-in-the-middle
(attacks against protocols).
A security association (SA) is a set of policy and key(s) used to protect information. ISAKMP SA is the
shared policy and key(s) used by the negotiating peers to protect their communication.
ISAKMP uses the Internet Key Exchange (IKEv1) for the authentication and encryption establishment.
Internet Key Exchange (IKE)
IKE negotiates the IPsec security associations (SAs). This process requires that the IPsec systems first
authenticate themselves to each other and establish ISAKMP (IKE) shared keys.
SecFlow-1p
6. Traffic Processing
359
If IKEv2 is configured, the device must support fragmentation by sending
IKEV2_FRAGMENTATION_SUPPORTED notification in the IKE_SA_INIT exchange. If the peer does not
support fragmentation, the tunnel is established without fragmentation support. If the peer supports
fragmentation it is up to the initiator to decide on it. If the device is the initiator, fragmentation is
available, with MTU of 576 for IPv4 and 1280 for IPv6.
Phase 1
In Phase 1, two IPsec peers establish a secure, authenticated channel to communicate. This process is
called the ISAKMP Security Association (SA) or IKE Security Association.
The authentication is supported with Pre-Shared Keys.
Policies
SecFlow-1p supports the configuration of up to twenty IPsec phase-one (IKE) policies.
The following elements are configurable:
•
Authentication method (currently only the PSK (Pre-Shared Keys) method is supported.)
•
Encryption algorithm
•
Key exchange algorithm – Diffie-Hellman group
•
Hashing algorithm
•
SA lifetime
•
Exchange mode
Phase-one policies (i.e. proposals) are globally configured. Each has a sequence number that determines
its priority (lowest number has the highest priority). They are proposed to the peers in the same order
by all the IPsec tunnels.
If IKEv2 is configured, SecFlow-1p acts as both initiator and responder, that is, it accepts tunnel initiation
from a peer, and if the peer does not initiate the tunnel, it initiates the tunnel itself.
SecFlow-1paccepts the first policy that a peer has proposed that it supports. If the mandatory elements
are configured, SecFlow-1p starts negotiating the IPsec tunnel with the configured peer.
If the process fails, SecFlow-1p retries, using a backoff algorithm, after 1 second, 2, 4, 8, 16, 32 and 64
seconds; then restarts the sequence.
If the peer does not answer, or the peer responds but the parties cannot agree, SecFlow-1p raises an
alarm.
SecFlow-1p
6. Traffic Processing
360
SecFlow-1p drops packets, incoming or outgoing, which are supposed to pass through an IPsec tunnel, if
that tunnel is not established.
Diffie Hellman
DH (Diffie-Hellman) describes a means for two parties to agree upon a shared secret. This secret may
then be converted into cryptographic keying material for other (symmetric) algorithms. The DiffieHellman key agreement requires that both the sender and recipient of a message have key pairs. The
private key of each member is never sent over the insecure channel. The public key is generated from
the private key by each member and is the one sent over the insecure channel. By combining one's
private key and the other party's public key, both parties can compute the same shared secret number.
This number can then be converted into cryptographic keying material. That keying material is typically
used as a key-encryption key (KEK) to encrypt the IPsec tunnel traffic. This key is kept secret and never
exchanged over the insecure channel.
D-H groups are identified by a group number. The higher the group number, the higher the security
level.
Pre-shared Keys (PSKs)
SecFlow-1p supports the configuration of up to twenty pre-shared keys (PSKs) for IKE phase-1
authentication.
You configure PSKs at the Crypto level for pairs of addresses and prefix lengths. SecFlow-1p uses the one
with the longest prefix match.
You can configure PSKs for hosts or subnets. If a key is shared across a subnet, all the IPsec tunnels
opposite peers on that subnet use the same key. This is less recommended as a breached key affects the
security of multiple tunnels. When SecFlow-1p looks for a pre-shared key to use, if there is a key for the
peer address, it uses it. If there is no key for the peer, it uses the key configured for the subnet with the
longest prefix that contains the peer address.
The encryption, hash, and authentication algorithm for use with a pre-shared key are part of the state
information distributed with the key itself. Each peer must have a unique ID and common shared key
known to the remote peer.
Exchange Modes
There are two Exchange modes: Main and Aggressive.
Main mode is the more secure option for Phase1 as it involves identity protection.
A session flow is as follows:
SecFlow-1p
6. Traffic Processing
361
•
A session begins with the initiator sending a proposal to the responder describing what
encryption and authentication protocols are supported, the lifetime of the keys, and if phase 2
perfect forward secrecy should be implemented. The proposal may contain several offerings.
The responder chooses from the offerings and replies to the initiator.
•
The next exchange passes Diffie-Hellman public keys and other data. All further negotiation is
encrypted within the IKE SA.
•
The third exchange authenticates the ISAKMP session. Once the IKE SA is established, IPsec
negotiation (Quick Mode) begins.
In Aggressive mode, the negotiation is quicker since the session is completed in only three messages.
The disadvantage is that the identity of the peers is not protected.
The first two messages negotiate policy, exchange Diffie-Hellman public values and ancillary data
necessary for the exchange, and identities. In addition, the second message authenticates the
responder. The third message authenticates the initiator and provides a proof of participation in the
exchange.
•
The initiator sends a request with all required SA information.
•
The responder replies with authentication and its ID.
•
The initiator authenticates the session in the follow-up message.
Phase 2
In this phase, the negotiation of SA to secure the IPsec tunnel, is completed.
Perfect Forward Secrecy (PFS)
PFS forces a new D-H key exchange for each phase-2 tunnel, deriving phase-2 keys independent from
and unrelated to the preceding keys.
PFS is a part of the key agreement session and serves to ensure that a session key derived from a set of
long-term public and private keys are not compromised if one of the (long-term) private keys is
compromised in the future. The VPN (IPsec) sessions can negotiate new keys for every communication,
and if a key is compromised only the specific session it protected is revealed.
PFS uses the D-H groups as well, but independently of phase 1.
SecFlow-1p
6. Traffic Processing
362
NAT Traversal
SecFlow-1p supports NAT traversal. NAT traversal changes the packets header so that they can pass NAT
without the protected data being changed by the NAT. You cannot configure NAT traversal, as it is
activated automatically when SecFlow-1p learns that an IPsec connection is passing through NAT.
Route-Based IPsec Tunnels
SecFlow-1p supports IPsec tunnels, with IPv4 as delivery and payload protocols, each one independently
of the other.
Configuring IPsec
This section describes how to configure SecFlow-1p with IPsec at the Cryptography level.
 To configure IPsec:
1. Navigate to configure crypto.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Creating crypto map
crypto-map <name>
name – crypto map name
Possible values: 1-80 character string
no crypto-map <name>
Configuring IPsec phase 2
policy
ipsec-transform-set <name>
no ipsec-transform-set <name>
See Configuring Crypto Map for available
crypto map configuration tasks.
name –IPsec transform set name
Possible values: 1-80 character string
See Configuring IPsec Transform Set for
available transform set configuration tasks.
SecFlow-1p
6. Traffic Processing
363
Task
Command
Comments
Configuring IKE pre-shared
key (PSK)
isakmp-key <pre-shared-key>
{address <peer-ip-address>
[/<peer-ip-prefix-length>] |
hostname <hostname>}
The pre-shared authentication method (only
available method) requires configuration of
PSKs for pairs of address and prefix length.
no isakmp-key address <peerip-address> [/<peer-ip-prefixlength>]
pre-shared-key – IKE pre-shared key
Possible values: 1-255 character string
peer-ip-address – IKE peer IP address
Possible values: IPv4 address
peer-ip-prefix-length – IKE peer IP prefix
length
Possible values: 0-32
hostname – hostname of IKE peer
Possible value: 1-255 character string
Notes:
• PSKs can be configured for hosts or
subnets. peer-ip-address must be a host
address if IKE key peer address type is 32,
and a subnet (in accordance with IKE peer
address prefix length.
• The prefix length must agree with the
address (e.g. a host address can only be
configured with a prefix length of 32).
• If you configure a PSK for an existing pair
of address and prefix length, the new
command replaces the previous.
Configuring IPsec Phase 1
policy
isakmp-policy <sequencenumber>
sequence-number – IKE policy priority
Possible values: number
no isakmp-policy <sequencenumber>
Note: You can configure up to twenty policies.
For full configuration of IKE policies, see
Configuring IKE Policy.
Configuring Crypto Map
This section describes how to configure a Crypto Map. Once the Crypto Map is configured, you associate
it to a router (see Configuring Router Interfaces) or tunnel interface (See Configuring Tunnel
Interfaces).
 To configure a crypto map:
1. Navigate to configure crypto crypto-map (<name>).
SecFlow-1p
6. Traffic Processing
364
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring local IKE
identity
ike-identity-local {defaultaddress | address <ipaddress> | defaulthostname | hostname
<hostname>}
IKE peer can be identified either by IP
address or by hostname, if IP address is
unknown.
ike-identity-remote
{default-address | address
<ip-address> | hostname
<hostname>}
IKE Peer can be identified either by IP
address or by hostname, if IP address is
unknown.
Configuring IKE SA
lifetime
ike-sa-lifetime <seconds>
Possible values: 60-86400
Configuring IKE SA
negotiation mode
ike-sa-negotiation {main |
aggressive}
Relevant only for ike-version 1
Configuring IKE version
ike-version {1 | 2}
Configuring destination
address to protect
match-destination
address <ipaddress>/<prefix-length>
Configuring remote IKE
identity
no match-destination
address <ipaddress>/<prefix-length>
Configuring source
address to protect
match-source {address
<ip-address>/<prefixlength> | interface
<interface-name>}
no match-source {address
<ip-address>/<prefixlength> | interface
<interface-name>}
For local identity, the default hostname
(which is the device hostname defined as
the MAC address) can be used.
For remote identity, you have to provide the
hostname.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Configuring IPsec peer IP
address
peer-address <ip-address>
ip-address – IP address of the peer with
which the IPsec tunnel is to be established
Possible values: IPv4 address
no peer-address
365
Notes:
• You can configure only one instance of
this command in a crypto map. If you
repeat the command, the last instance
applies.
• no peer-address (the default) sets the
peer address to 0.
Configuring SA lifetime
sa-lifetime [seconds
<seconds>] [kilobytes
<kilobytes>]
no sa-lifetime
seconds – SA lifetime in seconds
Possible values: 60-86400
kilobytes – SA lifetime in kilobytes
Possible values: 76800 – 110592000
Notes:
• You can configure only one instance of
this command in a crypto map. If you
repeat the command, the last instance
applies.
• The command must have at least one
argument.
• The SA is invalidated if the seconds or
kilobytes reach the maximum time
before the SA is renewed.
• no sa-lifetime sets seconds to 3600 and
kilobytes to 4608000 (the defaults).
Configuring Crypto Map
priority
sequence-number
<number>
no sequence-number
number – crypto map priority
Possible values: 1-1000
Notes:
• You can configure only one instance of
this command in a crypto map. If you
repeat the command, the last instance
applies.
• no sequence-number sets number to 10
(the default).
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Associating IPsec phase 2
transform set with crypto
map
transform-set <name-1>
[name-2 [name-3 [name4]]]
name-x – IPsec phase 2 transform set
created at Crypto level (see Configuring
IPsec)
Possible values: 1-80 character string
no transform-set
366
Notes:
• You can configure only one instance of
this command in a crypto map. If you
repeat the command, the last instance
applies.
• no transform-set (the default) sets
name-x to empty string.
Configuring IPsec Transform Set
This section describes how to create an IPsec transform set at the Crypto level. After the Transform Set
has been created and configured, you can bind it to a Crypto Map (see Configuring Crypto Map above).
 To configure IPsec transform set:
1. Navigate to configure crypto ipsec-transform-set <name>.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring IPsec phase 2
algorithms
algorithms <first transform
set algorithm> [second
transform set algorithm]
First transform set algorithm –used for
encryption
Possible values: esp-aes-cbc-128, esp-aescbc-256, esp-aes-gcm-128, esp-aes-gcm256, esp-null, esp-aes-gmac-128, esp-aesgmac-256
Second transform set algorithm –used for
authentication
Possible values: esp-sha1, esp-sha2-256,
esp-sha2-512
Notes:
• You can configure one instance of the
command in a transform set. If you
repeat the command, the last instance
applies.
SecFlow-1p
Task
6. Traffic Processing
Command
367
Comments
• If you configure the first transform set
algorithm (encryption) with an
algorithm used for both encryption
and authentication (esp-aes-gcm-128,
esp-aes-gcm-256, esp-aes-gmac-128,
or esp-aes-gmac-256), you cannot
configure a second algorithm (for
authentication). In this case, the
second algorithm default (esp-sha1)
does not appear in the info command
output.
• If you select for the first transform set
algorithm (encryption) one of the
encryption only algorithms (esp-aescbc-128, esp-aes-cbc-256, or esp-null),
you must select one of the following
second authentication algorithms: espsha1, esp-sha2-256, or esp-sha2-512.
Otherwise, the second algorithm
default (esp-sha1) is selected. Also, the
info command output specifies
whether esp-sha1 was selected as
default or explicitly specified.
Configuring IKE Policy
 To configure an IKE policy:
1. Navigate to configure crypto isakmp-policy <sequence-number>, where sequence number
signifies the IKE policy priority.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Configuring
authentication method
(pre-share)
authentication {pre-share }
Comments
SecFlow-1p
6. Traffic Processing
368
Task
Command
Comments
Configuring encryption
algorithm
encryption {aes-cbc-128 | aes-cbc256}
Possible values: aes-cbc-128, aes-cbc256 (the default)
Note: You can configure only one
instance of the command in a policy.
If you repeat the command, the last
instance applies.
Configuring key exchange
algorithm (Diffie-Hellman
group)
group {1 | 2 | 5 | 14 | 19 | 20}
group – Diffie-Hellman group
Possible values:
1 – 768-bit modulus
2 – 1024-bit modulus
5 – 1536-bit modulus
14 – 2048-bit modulus
19 – 256-bit elliptic curve
20 – 384-bit elliptic curve (default)
Notes:
• You can configure only one
instance of the command in a
policy. If you repeat the
command, the last instance
applies.
• Groups 1, 2, and 5 are not
considered secured and 14 is
acceptable, but not recommended
• If you configure 1, 2, 5, or 14,
SecFlow-1p accepts the command,
but generates the following
message: WARNING: This
algorithm does not provide an
adequate security level against
modern threats and should not
be used to protect sensitive
information.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Configuring hashing
algorithm
hash {sha1 | sha2-256 | sha2-512}
hash – hashing algorithm
369
Possible values:
sha1 – 96-bit (default)
sha2-256 – 128-bit
sha2-512 – 256-bit
Note: You can configure only one
instance of the command in a policy.
If you repeat the command, the last
instance applies.
Configuration Errors
The following table lists the messages generated by SecFlow-1p when a configuration error is detected.
Message
Cause
Corrective Action
Too many crypto maps
You tried configuring more
than twenty crypto maps.
Remove crypto maps that you no longer
need.
IP address already configured
You tried configuring a crypto
map with an IP address (source
or destination) that was
already used in another crypto
map command.
Configure the crypto map command
with a unique IP address.
Too many IP addresses
You tried configuring more
than twenty addresses (source
or destination) on the crypto
map.
Remove IP addresses that you do not
need.
The interface must be a tunnel
interface
You tried configuring a nontunnel interface.
Configure a tunnel interface.
A source interface is already
configured
You tried configuring an
address or another interface,
while one interface has been
already configured.
A source IP address is already
configured
You tried configuring an
interface, while an address has
already been configured.
SecFlow-1p
6. Traffic Processing
370
Message
Cause
Corrective Action
Too many transform sets
You tried configuring more
than one transform set on the
crypto map.
Remove transform set that you do not
need.
Too many keys
You tried configuring more
than twenty IKE pre-shared
keys.
Remove keys that you do not need.
Too many policies
You tried configuring more
than twenty IKE policies.
Remove policies that you do not need.
Configure either source address or
interface, not both
You tried to configure the
router interface anchoring the
tunnel with both an address
and interface.
Remove one of the configurations:
either the address or interface.
Source and destination must be
both IPv4 or both IPv6
You tried to configure tunnel
destination with an IPv4
address while the tunnel
source is an IPv6 address.
Define destination and source with
same type of IP address – both IPv4 or
both IPv6.
You tried to configure tunnel
source with an IPv4 address
while the tunnel destination is
an IPv6 address.
Too many mappings
You tried configuring more
than one mapping per tunnel.
No such mapping
You tried to delete a
nonexistent mapping.
6.5 Network Address Translator (NAT)
Network Address Translation (NAT) is a method that maps IP addresses (IPv4 only) from one IP domain
to another in an attempt to provide transparent routing to hosts.
Applicability and Scaling
•
20,000 entries in the mapping table
•
Up to 32 NAT rules of static NAT, NAPT and Outside to Inside (Static IP:Port)
SecFlow-1p
6. Traffic Processing
371
Functional Description
Traditionally, NAT devices connect networks and hosts having private unregistered addresses to a global
public network with globally unique registered addresses.
IP Address translation is required for the following reasons:
•
The network's internal IP addresses cannot be used outside the network, either because they
are invalid for use outside, or because the internal addressing must be kept private from the
external network.
•
Lack of public IP addresses and the need to represent as many hosts as possible (using private IP
addresses) via a single public address. NAT uses the IP address resource in an efficient way.
The terminology used in this section is described in the following table:
Inside network
Private network side of the NAT function
Outside network
Public network side of the NAT function
Inside local address
IP address assigned to a host on the inside network. This is the address
configured as a parameter of the computer OS or received via dynamic
address allocation protocols, such as DHCP. The address is not likely a
legitimate IP address assigned by the Network Information Center (NIC) or
service provider.
Inside global address
Legitimate IP address assigned by the NIC or service provider; represents one
or more inside local IP addresses to the outside world.
Outside local address
IP address of an outside host as it appears to the inside network. Not
necessarily a legitimate address, it is allocated from an address space routable
on the inside.
Outside global address
IP address assigned to a host on the outside network by the host owner. The
address is allocated from a globally routable address or network space.
Inside network
Private network side of the NAT function
NAT Functionality: Address Translation
NAT translates in the following ways:
•
NAT translations:
 Inside to Outside: Inside (private) IP SA (Inside local)  Outside (public) IP SA (Inside global)
SecFlow-1p

•
6. Traffic Processing
372
Outside to Inside: Outside (public) IP DA (Inside global)  Inside (private) IP DA (Inside local)
NAPT translations – TCP and UDP sessions are translated with port number, in addition to the IP
address:
 Inside to Outside: Inside (private) IP SA:Port (inside local)  Outside (public) IP SA:Port
(Inside global)
 Outside to Inside: Outside (public) IP DA:Port (Inside global)  Inside (private) IP DA:Port
(Inside local)
Traffic that does not match NAT entries, is forwarded per router regular path.
Inside Network
Outside Network
DA
Outside Global
SA
Inside Global
Outside
Host
DA
Outside Local
SA
Inside Local
Inside
Host
NAT
SA
Outside Global
SA
Outside Local
DA
Inside Global
DA
Inside Local
Translate
Supported NAT Types
SecFlow-1p supports the following NAT types:
•
Static (One to One) NAT with the following properties:
 One to One – Translates a single private IPSA to a single public IPSA; does not translate port
 Bidirectional – Sessions can be initiated both from the Inside and Outside
•
NAPT/PAT: In this mode, many hosts on the private (Inside) network are represented by a single
public (Outside) IP, using the TCP or UDP port number to differentiate between the different
sessions.
In this mode, many different IPs (IP:Port) are translated into a single IP:Port, while the translated
port is used to differentiate between the sessions ( as translated IP uses the same IP).
 Many to One – Translate IP and Port for TCP/UDP sessions.
 Unidirectional – Sessions can be initiated only from the Inside
 TCP/UDP – Port mapping functionality valid for TCP/UDP sessions only.
SecFlow-1p
•
6. Traffic Processing
373
Outside destination to Inside hole punching (Static Port configuration):
 One to One – Translates IP DA:Port from the Outside to the Inside
 Unidirectional – Sessions can be initiated only from the Outside.
NAT supports symmetric operation, meaning that NAT sessions are identified by both IPSA (:Port) and IP
DA (:Port).
NAT Instances
SecFlow-1p supports a single instance of NAT, which may be configured over each one of the SecFlow1p VRFs.
Configuring Network Address Translator (NAT)
You can configure a single instance of NAT over one of the device VRFs.
 To configure NAT:
1. At the config>router(<number>)# prompt, enter:
nat
The config>router(<number>)>nat# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring or deleting a
NAT exclude expression
nat-exclude-source-ip <source-ip>
It is possible to add multiple
NAT exclude expressions (up to
10)
no nat-exclude-source-ip <sourceip>
SecFlow-1p
6. Traffic Processing
374
Task
Command
Comments
Configuring, modifying, or
deleting a NAT rule from the
inside to outside
nat-inside-source-static <inside-ip> {
ip <outside-ip> | interface <rif-id> }
inside-ip – IPv4 address of
Inside IP station
no nat-inside-source-static <insideip>
ip – Ipv4 address for translation
interface – number of outside
facing router interace whose IP
address is used for IP
translation.
Notes:
• The static NAT configuration
must be unique, i.e. no
other static NAT entry can
use the same inside local IP
(source IP) or inside global IP
(translated IP).
A NAT rule that is missing info
(yet to be configured) is saved
and applied once you configure
the missing info. There is no
sanity reject.
Configuring, modifying, or
deleting a NAPT rule from
the inside to outside
nat-inside-source-static-port {tcp |
udp} <inside-ip> <port> { ip
<outside-ip> <port>|interface <RIid> <port>}
source – source address
translation
no nat-inside-source-static-port tcp
<inside-ip> <port>
ip – IPv4 address for translation
no nat-inside-source-static-port udp
<inside-ip> <port>
<inside ip/prefix> - IP subnet of
inside Inside network
interface – number of outside
facing router interface whose IP
address is used for IP translation
tcp - range of IP ports to be
used for TCP port translations
udp - range of IP ports to be
used for UDP port translations
Possible values:
start-port : 1024 (default)–
65535
size : 1 – 64511 (default)
SecFlow-1p
6. Traffic Processing
Task
Command
Configuring, modifying, or
deleting a NAPT rule from
the inside to outside
nat-inside-overload source <inside
ip/prefix> { ip <outside-ip> |
interface <RI number> } [ tcp < startport> <size> ] [udp < start-port>
<size> ]
375
Comments
no nat-inside-overload source
<inside ip/prefix> <outside-ip>
no nat-inside-overload source
<inside ip/prefix> interface <RI
number>
Configuring or modifying
NAT translation table entry
timeout
nat-timeout [ tcp < tcp-timeout>] [
udp <udp-timeout> ] [ other <othertimeout> ]
tcp - expiration timeout of TCP
entries in NAT translation table
udp - expiration timeout of UDP
entries in NAT translation table
other - expiration timeout of
other protocol entries in NAT
translation table
Possible values: 60-432000
Default: 60
Displaying NAT translation
table
show nat-translations
Clearing NAT translation
table
clear nat-translations
Displaying NAT statistics
counters
show nat-statistics
Clearing NAT statistics
counters
clear nat-statistics
Viewing NAT Translation Table
You can display the NAT translation table.
 To display the NAT translation table:
•
At the config>router(<number>)>nat # prompt, enter:
show nat-translations
The NAT translation table is displayed.
See Viewing NAT Translation
Table
SecFlow-1p
6. Traffic Processing
config router 1 nat
config>router(1)>nat# show nat-translations
Number of entries : 1
Entry Protocol Inside Local
Inside Global
----------------------------------------------------------------------------1
ICMP
30.30.30.30:1
20.20.20.30:1
The above fields are:
Number of Entries
Total number of entries in the translation table
Possible values: 0-1000
Entry
Entry number
Possible values: 1-1000
Protocol
The associated router interface ID
Possible values: TCP, UDP, ICMP, Other
Inside Local
Inside local address or address/port
Possible Values: IP address: port, where port=1-65535
Note: For Other protocol, only IP address is displayed.
Inside Global
Translated inside global address or address/port
Possible Values: IP address: port, where port=1-65535
Note: For Other protocol, only IP address is displayed.
Viewing NAT Statistics
You can display NAT statistics counters.
 To display NAT statistics:
•
At the config>router(<number>)>nat # prompt, enter:
show nat-statistics
The NAT statistics are displayed.
config>router(1)>nat# show nat-statistics
Translated packets Inside to Outside : 62
Translated packets Outside to Inside : 69
The above fields are:
Translated packets Inside to
Outside
Number of packets translated by NAT at the Inside to Outside direction
376
SecFlow-1p
Translated packets Outside to
Inside
6. Traffic Processing
377
Number of packets translated by NAT at the Outside to Inside direction
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Cannot delete; interface associated
with the router
You tried to delete a router entity
that has router interfaces
associated with it.
Disassociate router interfaces from
router.
Cannot set address; DHCP enabled
You tried adding an IPv4 address
when DHCP is enabled.
Disable DHCP.
Cannot set address; too many
addresses already configured
You tried adding an IP address, but
the amount of IP addresses already
reached its limit.
Delete one of the associated
addresses before associating a new
IP address.
Cannot set address; invalid
You tried adding a multicast IP
address or an interface IPv4
address with prefix length 32 (,
which is only allowed for loopback
interface).
When configuring static-route, you
tried to do one of the following:
• Add a multicast IP network
address.
• Add an IP network address
when it was not allowed.
Use /31 prefix-length on non pointto-point interface cautiously
You tried adding anIPv4 interface
address with prefix length 31.
Cannot modify; activated router
interface
You tried modifying or removing a
bound port while the router
interface was activated (no
shutdown).
You tried adding, modifying, or
removing a VLAN while the router
interface was activated (no
shutdown).
Shut down the router interface and
try again.
SecFlow-1p
6. Traffic Processing
378
Message
Cause
Corrective Action
Cannot enable; IPv4 address exists
You tried enabling DHCP even
though manual IPv4 address exists.
Cannot enable; DHCPv6 is enabled
You tried enabling DHCP even
though DHCPv6 is enabled.
Disable DHCPv6.
Cannot set; DHCPv6 client is
already defined
You tried enabling DHCPv6 client
when there is already one defined
in the device.
Remove existing DHCPv6 client.
Cannot enable; DHCP (v4) is
enabled
You tried enabling DHCPv6 while
DHCPv4 is enabled.
Disable DHCPv4.
Cannot set; Router Interface is
loopback interface
You tried enabling DHCPv6 client
while router interface is defined as
loopback interface.
Associate DHCPv6 client with a
router interface that is not defined
as a loopback interface.
Cannot activate; must be bound to
port
You tried activating a router
interface, which is neither a
loopback interface nor bound to a
port.
Bind the router interface to a
loopback interface or a port.
Cannot activate; bound port in use
by another router interface
You tried activating the router
interface, while the bound port is
already in use by another router
interface.
Cannot activate; bound port+vlan
in use by another router interface
You tried activating the router
interface that is bound to port +
vlan, while bound pair port+vlan is
already in use by another router
interface.
Cannot activate; ip address is set
You tried activating the router
interface bound to PPP port, when
IP address was set.
Cannot activate; dhcp is enable
You tried activating the router
interface bound to PPP port, when
DHCP is enabled.
Address is not IPv4 address.
You configured the IP address of
Inside IP station with a non-IPv4
address.
Configure the IP address of Inside
IP station with an IPv4 address.
SecFlow-1p
6. Traffic Processing
Message
Cause
Timeout is out of range
Expiration timeout of
TCP/UDP/other protocol entries in
NAT translation table is out of the
allowed range (60-43200).
379
Corrective Action
6.6 Policy-Based Routing (PBR)
Policy-based routing allows you to use a policy to bypass the normal routing rules.
Applicability and Scaling
No forwarding is allowed between VRFs.
Only Ethernet, virtual and VLAN ports can be ingress ports.
Benefits
PBR rules can bypass any Layer 3 routing/forwarding thus enabling routing resiliency.
Functional Description
You can set the following PBR entities:
•
ACL – to classify specific traffic
•
Policy – to define where to define the traffic captured by ACL
•
Attach the policy to ingress interface
When PBR is defined on specific ingress interface, the incoming traffic on this ingress interface captured
by the ACL is directed according the policy definition. PBR rule direction is set by the next hop IP address
or by an egress interface.
PBR provides classification based on ACL capabilities and supports:
•
IPv4, IPv6
SecFlow-1p
•
Match options:
 Source IP/prefix-len
 Destination IP/prefix-len
 Source port range
 Destination port range
 Protocol (protocol number, i.e. icmp-1, tcp-6, udp-17)
SecFlow-1p PBR policy supports the following destination definitions:
•
Next hop address
•
Egress interface:
 Broadcast interface with static/dynamic IP address
 Point-to-point interface
SecFlow-1p PBR is supported for the following ingress interfaces:
•
Ethernet ports
•
VLAN ports
•
Virtual ports
Factory Defaults
By default, no PBR exists.
Configuring PBR
 To configure PBR:
1. Create an ACL profile (see Configuring ACL).
2. Define policy on an ingress interface:
a. Match ACL
b. Set direction (next-hop or interface)
c. Set priority
6. Traffic Processing
380
SecFlow-1p
6. Traffic Processing
381
 To define policy on the ingress port:
1. For Ethernet port: Navigate to configure port ethernet <port-name> to select the Ethernet port
on which PBR is configured.
For Ethernet VLAN: Navigate to configure port ethernet <port-name>vlan<vlan-id> to select the
VLAN port on which PBR is configured.
For Virtual port: Navigate to configure port virtual <port-name> to select the Virtual port on
which PBR is configured.
For Cellular port: Navigate to configure port cellular <port-name> to select the Cellular port on
which PBR is configured.
For Wireless port: Navigate to configure port wlan <port-name> access-point <ap-number> to
select the Wireless port on which PBR is configured.
For IP tunnel: Navigate to configure router*(<number>)> tunnel-interface(<number>) to select
the IP tunnel on which PBR is configured.
2. At the prompt, enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Binding PBR rule to this
entity
policy-based-route priority
<priority> match-acl <name> {nexthop <ip-address> | interface <type,
index>}
priority <number> - set PBR rule priority
per interface; the lower is the number, the
higher is the priority
no policy-based-route priority
<priority>
match-acl <name> - attach ACL to PBR rule
Possible values: 1 – 4294967295
Possible values: 1–80 characters string
next-hop <ip-address> – Set next hop IP
address to define the direction of PBR rule
interface <type, index> – Set interface to
define the direction of PBR rule.
Possible values:
• ethernet < port-name>
• ethernet < port-name> vlan <vlannumber>
• virtual <port-number>
• cellular < port-name>
• wlan < port-name> + ap
• router(<number>)>tunnel-interface(<n
umber>)
SecFlow-1p
6. Traffic Processing
382
Configuration Errors
Message
Cause
Corrective Action
PBR rule address type mismatch
In the PBR rule you defined the
address families of the ACL profile
and IP-next-hop are not identical.
Set matching address type for ACL
profile and IP-next-hop.
6.7 Quality of Service (QoS)
SecFlow-1p supports Quality of Service (QoS), i.e. traffic management, on Ethernet ports to ensure that
traffic with specific characteristics, such as management, is guaranteed specific bandwidth with
minimum delay.
QoS support also includes classification – classifying traffic into traffic-classes on the ingress directions of
a port. Traffic class defines actions such as fixed Class of Service (CoS) mapping on the ingress direction
of an Ethernet port and DSCP marking.
Applicability and Scaling
This feature is applicable to all ETX‑1p versions.
The following quantity of QoS elements can be configured in the device:
•
Classifier rules per ingress port: 10
•
Traffic-classes per port: 20
•
Shaper profiles: 20
•
Queue-block profiles: 10
•
Queue-group profiles: 10
Benefits
QoS allows you to optimize bandwidth for traffic at different requirements of speed and quality,
avoiding the allocation of excessive bandwidth.
SecFlow-1p
6. Traffic Processing
383
SecFlow-1p Quality of Service (QoS) traffic prioritization improves the performance level of data flow.
Functional Description
QoS Components
QoS components include:
•
Classifyer (see Classifyer)
•
Traffic Class (see Traffic-class)
•
Queueing (see Queuing)
Factory Defaults
See the following sections for each QoS type’s specific defaults.
Classifier
supports classifying traffic into traffic classes on the ingress direction of a port.
It is possible to define up to ten classifier rules per ingress direction on the Ethernet ports.
Applicability and Scaling
This feature is applicable to all SecFlow-1p devices.
Functional Description
Classifying consists of a set of sequentially numbered rules (similar to ACLs), with the following rule
types:
•
Match – defines a classifier action rule for forwarding packets
•
Delete – deletes a classifier rule or comments
•
Comment – text used for commenting and visually organizing the rules
•
Resequence – updates the sequence numbers of existing classifier actions and comments
SecFlow-1p
6. Traffic Processing
384
Each classifier rule can have an unlimited number of match options.
The following table specifies the criteria.
Classification Criteria
Rule Criterion
Rule Value/Range
Comments
Any
-
Allows match any rules
Layer-3
IP DSCP
Range [0–63]
IP protocol
Value
Source IP address
IP address/length
IPv4 or Ipv6
Destination IP address
IP address/length
Ipv4 or Ipv6
TCP Source Port
Range
IP Layer 4
TCP Destination Port
Range
IP Layer 4
UDP Source Port
Range
IP Layer 4
UDP Destination Port
Range
IP Layer 4
Layer-4
The action rule that you define in the classifier is used to perform classification on the forwarding
frames entering the ingress direction of the port. Those packets that match the defined rules go through
the port.
Traffic packets filtered by the classification rule, enter the traffic-class (defined in the classifier), where
the defined action (e.g. fixed CoS mapping) is performed on the packets.
Benefits
With classifying, you can maintain QoS by classifying traffic classes that set traffic CoS and define other
actions.
Factory Defaults
By default, no classifiers are configured.
SecFlow-1p
6. Traffic Processing
385
Configuring Port Classification
This section describes how to create a classifier for an Ethernet port.
 To configure classifying for a port:
1. For Ethernet port: Navigate to configure port ethernet <port-num> classifier ingress } to select
the Ethernet port classifier to configure.
Where
Ingress indicates that the classifier classification direction is from port to application.
2. At the prompt, perform all required tasks according to the following table.
Task
Command
Comments
Entering free text among the
classifier rules
comment <description>
[sequence <number>]
description - free text describing the following
rules
Possible values: variable length string, up to 252
characters
sequence - sequence number (priority) of the
comment
Possible values: 1-4294967295
Deleting a classifier rule or
comment
delete <sequence-number>
sequence - sequence number of the
match/drop/comment to be deleted
Possible values: 1-4294967295
SecFlow-1p
6. Traffic Processing
386
Task
Command
Comments
Defining a classifier action
rule for forwarding frames
match [{dscp <x..y> |
[protocol <number>] [src-ip
<ip-addr>[/<prefix-length>]]
[dst-ip <ip-addr>[/<prefixlength>]] [tcp-src-port
<x..y>] [tcp-dst-port <x..y>]
[udp-src-port <x..y>] [udpdst-port <x..y>] to-tc <tcname> [sequence
<number>]
dscp – range of IP DSCP values to compare with
Possible values: 0-63
match any to-tc <tc-name>
[sequence <number>]
protocol – value of the IPv4 header Protocol
field or the IPv6 header Next Header field to
compare with
Possible values: 0-255
src-ip – IP address or IP subnet to match against
the packet's source IP address
dst-ip – IP address or IP subnet to match against
the packet's destination IP address
tcp-src-prt – range of TCP source port numbers
to compare with
Possible values: 0-65535
tcp-dst-prt – range of TCP destination port
numbers to compare with
Possible values: 0-65535
udp-src-prt - the range of UDP source port
numbers to compare with
Possible values: 0-65535
udp-dst-prt – range of UDP destination port
numbers to compare with
Possible values: 0-65535
any – Any incoming frame is matched.
Possible value: 0
sequence – sequence number (priority) of the
rule
Possible values: 1-4294967295
to-tc – name of associated tc (traffic-class).
Define this traffic-class using the traffic-class
command (see Configuring Traffic-Class).
Possible values: variable length string, up to 252
characters
Notes:
• Up to five criteria can be specified; they
must be in the same order in which they
appear in the command syntax.
• The same string may be used in separate
match commands of the same classifier.
SecFlow-1p
6. Traffic Processing
387
Task
Command
Comments
Resequencing the rules (of
existing classifier actions and
comments)
resequence [<step>]
If you need to add a rule between existing rules
with consecutive sequence numbers, use this
command to add space between the rule
sequence numbers.
The <step> parameter specifies the interspacing
value. For example, if you apply resequence 30
to a port classification that contains rules 1, 2,
and 3, the rule sequence numbers change to 30,
60, and 90.
step – step between sequence numbers
Possible values: 1-10000
Default: 10
Displaying a sorted list of
port classifier actions
Note
show status
See Viewing Port Classifier Status.
You can remove a classifier from a port, by entering at the prompt,
no classifier ingress.
Viewing Port Classifier Status
You can display the status and configuration of an Ethernet port ingress Classifier.
The following example shows the Ethernet port classifier ingress status.
 To display Ethernet Classifier (ingress) status:
config>port>Ethernet 1> classifier(ingress)# show status
Ingress Classification Rules:
Number of Classification Rules (by this port)
: 10
Sequence
10
20
26
30
40
Action TC Name
_
Match Kuku1
Match Tutu1
Match Tutu1
Match Susu1
Match Fufu1
Admin
Up
Up
Up
Down
N/A
Hits
1200
300
300
0
0
SecFlow-1p
6. Traffic Processing
388
Port Status Parameters
Parameter
Description
Direction (Ingress)
Shows classifier direction (always ingress)
Number of Classification
Rules (by this port)
Possible values: 0-9999
The number of classifier actions defined for this port
Sequence
The sequence number (priority) of the classifier rule
Possible values: 1-4294967295
Action
The type of action
Possible value: Match
TC Name
The name of the associated TC
Possible values: variable length string, up to 252 characters
TC Admin
The administrative status of the associated TC
Possible values: Up, Down, N/A
Hits
The number of incoming frames that matched the rule
Traffic-Class
Traffic packets, filtered by the classifier rules, enter the traffic-class for performing the defined actions
(e.g mapping to transmit queues). SecFlow-1p supports fixed Class of Service (CoS) mapping on the
ingress direction of an Ethernet port and marking of DSCP on traffic class in ingress port (LAN).
Applicability and Scaling
This feature is applicable to all SecFlow-1p devices.
Functional Description
Traffic-Class
Traffic packets that match the rules defined in the classifier are forwarded to the traffic-class defined in
the rules, provided that you defined for the port a traffic-class by that name, and it is in no shutdown
state.
Several rules can point to the same traffic-class.
It is possible to configure up to 20 traffic-classes per port.
SecFlow-1p
6. Traffic Processing
389
CoS Mapping
Packets that enter the TC (traffic-class) can be mapped to a fixed CoS value defined in the TC definition
on the port, or if not defined, to CoS 7 (the default; lowest priority). The packet’s meta-data is marked
with the fixed CoS value across the forwarding path toward the transmit queues.
A packet is transmitted to the queue corresponding to its CoS value. CoS 0 is mapped to Queue 0, …, CoS
7 is mapped to Queue 7.
Marking
Packets that enter the TC (traffic-class) can have their DSCP marked to a value defined in the TC
definition on the port, as follows:
•
DSCP with a pushed IP header (fixed value); possible values: 0-63
If not defined, DSCP is marked with pushed IP header 0.
Configuring Traffic-Class
 To configure a Traffic-Class:
1. Navigate to configure port ethernet <port-index> traffic-class (<tc-name>) to select the
Ethernet port traffic-class to configure. tc-name can be an up to 32-character string.
2. At the prompt, perform all required tasks according to the following table.
Task
Command
Comments
Defining traffic class CoS
(CoS Mapping) by a fixed
value
cos fixed <cos-value>
cos-value – the CoS assigned to the trafficclass (fixed value)
Possible values: 0-7
no cos
Default: 7 (lowest priority)
0 is the highest priority.
CoS 0 is mapped to Queue 0, CoS 1 to Queue
1,…, CoS 7 to Queue 7.
Enter no cos to delete the CoS definition.
Defining the traffic class
with fixed marking
mark {dscp-fixed <dscpvalue>}
no mark
Enabling/disabling
traffic-class activity
shutdown
no shutdown (default)
dscp-value possible values: 0-63
Enter no mark to delete the marking
definition.
SecFlow-1p
Note
6. Traffic Processing
390
You can remove a traffic-class, by entering at the prompt,
no traffic-class <tc-name>.
Example
The following example shows how to configure Ethernet port with traffic-class and fixed CoS mapping,
and define port classification rules.
•
Create traffic-class src_ip-Dst_ip on Ethernet port 1.
•
Define CoS mapping of packets that enter traffic-class src_ip-Dst_ip to CoS 0 (highest priority),
so that packets are transmitted to corresponding Queue 0.
•
Define classifier on ingress direction of port traffic with match rule that determines which
incoming packets are forwarded to traffic-class src_ip-Dst_ip.
•
Create traffic-class src_ip-Dst_ip2 on Ethernet port 1.
•
Define CoS mapping of packets that leave traffic-class src_ip-Dst_ip to CoS 1, so that packets are
transmitted to corresponding Queue 1.
exit all
con port ethernet 1
traffic-class src_ip-Dst_ip
cos fixed 0
exit
classifier ingress
match src-ip 10.10.10.10/32 dst-ip 20.20.20.20/32 to-tc src_ip-Dst_ip
exit
traffic-class src_ip-Dst_ip2
cos fixed 1
exit
Queuing
In order to facilitate congestion management, you can sort traffic by applying queue group profiles and
queue block profiles to queue block entities.
You can also apply shaper profiles to queue group blocks.
SecFlow-1p
6. Traffic Processing
391
Queueing
ETX‑1p traffic management entities are called queue groups. They are configured over physical ports
and represents hierarchical structure of queue-blocks. The queue blocks consist of internal queues. The
queue groups have the following basic structure:
•
1 level (level-0) with 1 queue-block
•
Shaper towards physical port
Shapers operate at per-scheduling-element level to shape traffic into a required traffic profile (CIR).
Level-0
Q
7
Q
6
Q
5
Q
4
Q
3
Q
2
Q
1
Q
0
Scheduler
Shaper
Physical port
Scheduling
SecFlow-1p supports a combination of traffic scheduling techniques, whereby applications requiring low
latency and jitter are mapped to Strict priority queues, while other services are mapped to the
remaining slots using weighted fair queuing (WFQ)
•
The Strict priority queues ensure minimal latency and jitter for the RT traffic, even when a large
amount of bursty data traffic is sent over the same uplink. Strict priority traffic is always
processed first, while flows mapped to the WFQ slots are buffered until the strict priority
queues are empty.
•
The WFQ technique avoids scheduling starvation of lower priority queues and ensures relatively
fair allocation of bandwidth by sharing it among all flows. In this manner, packets belonging to
lower classes of service are not penalized when higher priority queues are not empty and may
still receive transmission time. QoS-conformant scheduling is handled by assigning different
weights to the various queues instead of equally dividing overall bandwidth among all active
flows.
You can map packets to queues according to the packet’s CoS, with CoS 7 mapped to the lower priority
queue (Queue 7), and CoS 0 to the highest (Queue 0).
SecFlow-1p
6. Traffic Processing
392
QoS Data Flow
The following is a description of a full featured packet QoS walkthrough from when the packet is
received in the ingress port.
•
A packet is received in the ingress port.
•
The classifier checks if the incoming traffic matches the rules – first rule is checked first. If the
packet matches the rules, it is classified into the defined TC (traffic-class).
•
The traffic-class ingress actions (fixed CoS mapping, marking) are operated on the packet.
•
The packet is forwarded to a forwarder (router, virtualization, etc).
•
The packet is transmitted from the forwarder to the egress port.
•
Packet is mapped to level-0 queue-block while queue is mapped according to CoS
•
Shaping action is operated on transmit packets towards egress port
•
The packet is transmitted.
SecFlow-1p QoS Data Flow
SecFlow-1p
6. Traffic Processing
Use Case: Prioritization of Management and User Traffic
User traffic - VoIP
Management
User traffic - data
Q
7
Q
6
Q
5
Q
4
Q
3
Q
2
Q
1
Q
0
Scheduler
Ethernet Port
In this case, QoS does the following:
•
Classifies each type of traffic to traffic-class and sets CoS
•
Sets queues as follows:
 Queue 0 to strict with rate limit
 Queue 1 to strict with rate limit
 All other queues to WFQ
•
Traffic is mapped to queues according to CoS.
Configuration Method
You configure QoS in two parts.
•
•
On the physical port, you configure:
 Classifier: classifier match rules into TC
 TC actions: fixed CoS, marking
 Queue-group
On the QoS level, you configure:

shaper-profile

queue-block-profile

queue-group-profile
393
SecFlow-1p
6. Traffic Processing
394
Shaper Profiles
ETX‑1p supports shaper profiles applied to queue group blocks.
Factory Defaults
By default, there is no shaper profile configured.
Configuring Shaper Profiles
You can configure Shaper profiles and apply them to queue group blocks as needed.
 To add a Shaper profile:
1. Navigate to configure qos.
The config>qos# prompt is displayed.
2. Type shaper-profile <shaper-profile-name>
A Shaper profile with the specified name is created and the config>qos>shaper-profile(<shaperprofile-name>)$ prompt is displayed. The new Shaper profile parameters (except for name) are
configured by default as described in Factory Defaults.
3. Configure the Shaper profile as described in Configuring Shaper Profile Parameters.
 To configure Shaper profiles:
1. Navigate to configure qos shaper-profile <shaper-profile-name> to select the Shaper profile to
configure.
The config>qos>shaper-profile(<shaper-profile-name>)# prompt is displayed.
2. Perform the required tasks according to the following table.
Note
To delete a profile, make sure it is used in any queue-group (including the case
when the queue-group is not in use).
Task
Command
Comments
Specifying the CIR (Kbps) and
CBS (bytes) bandwidth limits
bandwidth [cir <cir-kbit-sec>]
CIR allowed values:
• Range: 0 – 4294967295 (in
kbps)
• Default: 1000000
SecFlow-1p
6. Traffic Processing
395
Example
 To create and configure a Shaper profile named Shap2:
•
CIR = 99,840 Kbps
exit all
configure qos shaper-profile Shap2
bandwidth cir 99840
exit all
Queue Block Profiles
In order to facilitate congestion management, you can sort traffic by applying queue block profiles to
queue block entities. A queue block profile contains entries for queues 0–7 (queue 0 has the highest
priority), with the following parameters:
•
Scheduling method:
 Strict – high-priority queues that are always serviced first. If a lower-priority queue is being
serviced and a packet enters a higher queue, that queue is serviced immediately.
 WFQ (weighted fair queuing) – If one port does not transmit, its unused bandwidth is shared
by the ‘transmitting’ queues. WFQ frames are transmitted only after transmission of any
frames associated with Strict queues is completed.
•
Bandwidth:
 CIR – Defines the Committed Information Rate (CIR) for the current profile. The CIR specifies
a bandwidth with committed service guarantee (“green bucket” rate).
 EIR – Defines the Excess Information Rate (EIR). The EIR specifies an extra bandwidth with
no service guarantee (“yellow bucket” rate).
Factory Defaults
ETX‑1p provides a default queue block profile named DefaultQueueBlock1, which defines queues 0–7 as
follows:
•
Scheduling method – WFQ
•
CIR = 0 kbps
•
EIR = 1000000 kbps
The default profile is shown below.
config>qos# info d
echo "Queue Block Profile Configuration"
SecFlow-1p
#
6. Traffic Processing
Queue Block Profile Configuration
queue-block-profile "DefaultQueueBlock1"
queue 0
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 1
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 2
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 3
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 4
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 5
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 6
bandwidth cir 0 eir 1000000
scheduling wfq
exit
queue 7
bandwidth cir 0 eir 1000000
scheduling wfq
exit
exit
exit
exit
config>qos#
The default profile cannot be deleted.
Adding Queue Block Profiles
This section explains how to define queue block profiles.
 To add a queue block profile:
1. Navigate to configure qos.
396
SecFlow-1p
6. Traffic Processing
397
The config>qos# prompt is displayed.
2. Type:
queue-block-profile <queue-block-profile-name> [number-of-queues <number>]
A queue block profile with the specified name, and number of queues, is created, and the
following prompt is displayed: config>qos>queue-block-profile(<queue-block-profile-name>)$
The queues for the new profile are configured by default as described in Factory Defaults.
3. Configure the queue block profile as described in Configuring Queue Block Profile Parameters.
Configuring Queue Block Profile Parameters
 To configure a queue block profile:
1. Navigate to config qos queue-block-profile <queue-block-profile-name> to select the queue
block profile to configure.
The config>qos>queue-block-profile(<queue-block-profile-name>)# prompt is displayed.
2. Perform the following for each queue that you wish to configure:
a. To configure a queue, enter:
queue <queue-ID>
The following prompt is displayed:
config>qos>queue-block-profile(<queue-block-profile-name>)>queue(<queue-ID>)#.
b. Perform the required tasks according to the following table.
c. Type exit to return to the queue block profile context.
Note
To delete a profile, make sure it is used in any queue-group (including the case
when the queue-group is not in use).
Task
Command
Comments
Defining queue bandwidth
attributes
bandwidth [cir <cir-kbitsec>] [eir <eir-kbit-sec>]
CIR allowed values:
• Range: 0 – 4294967295 (in kbps)
• Default: 0
EIR allowed values:
• Range: 0 – 4294967295 (in kbps)
• Default: 1000000 kbps (1Gbps)
CIR + EIR must not exceed the maximum available
bandwidth.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Setting scheduling method
scheduling {strict | wfq }
Default: wfq
Queues defined as strict must be the highest
priority queues in a mixed structure.
Example
 To create and configure a queue block profile named QBlockProf1:
•
Queue 0 set to strict scheduling and cir 524,288
•
Queue 1 set to strict scheduling and eir 212,992
•
Queues 2 and 3 set to WFQ scheduling
exit all
configure qos queue-block-profile QBlockProf1
queue 0
scheduling strict
cir 524288
exit
queue 1
scheduling strict
eir 212992
exit
queue 2
scheduling wfq
exit
queue 3
scheduling wfq
exit
exit all
Queue Group Profiles
In order to facilitate congestion management, you can sort traffic by applying queue group profiles.
Factory Defaults
ETX‑1p provides a default queue group profile named DefaultQueueGroup1, configured as shown:
#
Queue Group Configuration
queue-group-profile "DefaultQueueGroup1"
queue-block 0/1
profile "DefaultQueueBlock1"
no shaper
398
SecFlow-1p
6. Traffic Processing
399
Adding Queue Group Profiles
 To add a queue group profile:
1. Navigate to configure qos.
The config>qos# prompt is displayed.
2. Type:
queue-group-profile <queue-group-profile-name>.
A queue group profile with the specified name is created and the following prompt is displayed:
config>qos>queue-group-profile(<queue-group-profile-name>)$
The queue group profile parameters are configured by default as described in Factory Defaults.
3. Configure the queue group profile as described in Configuring Queue Group .
Configuring Queue Group Parameters
 To configure a queue group profile:
1. Navigate to config qos queue-group-profile <queue-group-profile-name> to select the queue
group profile to configure.
The config>qos>queue-group-profile(<queue-group-profile-name>)# prompt is displayed.
2. Select a queue block in level 0 to configure:
queue-block 0/1
The following prompt is displayed:
config>qos>queue-group-profile(<q-grp-profile-name>)>queue-block(<level/ID>)#
3. Perform the required tasks according to the following table.
4. If you wish to configure another queue block, type exit to return to the queue group profile
context, and start again at step 2.
Task
Command
Assigning a queue block profile
profile <queue-block-profile-name>
Assigning a shaper profile
shaper profile <shaper-profile-name>
Comments
Examples
Note
This example uses the Shaper profile and queue block profile created in the
examples in the preceding sections.
SecFlow-1p
6. Traffic Processing
 To create and configure a queue group profile named QGroupProf1:
•
Queue block 0/1:
 Queue block profile: QBlockProf1
 Shaper profile: Shap2
exit all
configure qos queue-group-profile QGroupProf1
queue-block 0/1
profile QBlockProf1
shaper profile Shap2
exit all
6.8 Router
SecFlow-1p provides Layer-3 forwarding, with multiple (up to 10) Virtual Routing and Forwarding
instances (VRFs).
Applicability and Scaling
This feature is applicable to all SecFlow-1p versions.
ARP table is limited to 255 entries.
Fragmentation does not work on the router interface. Configure the MTU value manually under the
corresponding port.
Standards Compliance
RFC 1812 – Requirements for IP Version 4 Routers
RFC 2460 – Internet Protocol, Version 6 (IPv6) Specification
RFC 2464 – Transmission of IPv6 Packets over Ethernet Networks
RFC 4291 – IP Version 6 Addressing Architecture
RFC 4294 – IPv6 Node Requirements
RFC 4862 – IPv6 Stateless Address Autoconfiguration
400
SecFlow-1p
6. Traffic Processing
401
RFC 2766 – Traditional IP Address Translator
RFC 3489 – Simple Traversal of User Datagram Protocol through Network Address Translator (STUN)
RFC 7857 –Traditional IP Address Translator
RFC 2131 – Dynamic Host Configuration Protocol
RFC 2132 – DHCP Options and BOOTP Vendor Extensions
RFC 1701 – Generic Routing Encapsulation (GRE)
RFC 2890 – Key and Sequence Number Extensions to GRE
ARP Parameters – Address Resolution Protocol (ARP) Parameters
RFC 5859 – TFTP Server Address Option for DHCPv4
Benefits
The router provides IP Routing and Forwarding for IPv4 and IPv6 packets.
Functional Description
SecFlow-1p Layer-3 forwarding has the following main features:
•
Up to 10 routers are supported. Only router 1 can be used for management.
•
The maximum number of router interfaces (including loopback interfaces) is 32.
Note
You may create router interfaces numbered 1-32 in any router (they need not
be contiguous or start at 1), as long as the total number of router interfaces in
the device does not exceed 32
•
IPv4 and IPv6 are both supported.
•
Static routing definitions, BGP, OSPFv2 are supported.
•
You can configure a management IP address, which is used as a source address in sessions that
are initiated by the device, such as ping.
SecFlow-1p
6. Traffic Processing
402
The router maintains a table of IPv6 neighbors, via discovery of neighboring IPv6 nodes. It is
recommended to manage SecFlow-1p via a router interface defined as a loopback interface, as this
router interface remains active. To ensure that packets generated by the router are transmitted with the
loopback IP address, you need to define the management source IP address for IPv4 and IPv6 (refer to
Management Source IP Address in the Management and Security chapter).
Router interface that resides directly on a port uses that port’s MAC address.
The control packets transmitted by the router have a configurable IP DSCP value, so that each router
entity can control its traffic priority by setting its DSCP value for its protocols (see Configuring the
Router on how to configure the DSCP).
The embedded router supports the Border Gateway Protocol (BGP) – See Routing Protocol BGP.
DHCP Client
SecFlow-1p supports DHCP and DHCPv6 client functionality.
Each SecFlow-1p router interface can either have a static IP address assigned to it or can be configured
to acquire a dynamic address via DHCP.
DHCP client configuration is performed inside a router interface.
A router interface supports only one instance of DHCP client, and a DHCP client instance can be bound
to only one router interface.
The DHCPv6 client supports prefix delegation. It can receive from the provider a prefix, out of which
shorter prefixes can be allocated to the user-side router interfaces and the machines behind them. The
prefixes are passed to those machines by IPv6 router advertisements. They cannot be passed with
DHCPv6 server.
RA also passes DNS server addresses and hostname information. Dynamically received data is passed if
none is configured. Otherwise, the configured data is passed. This enables the device to be a DNS proxy,
publishing its own address as DNS server to the user hosts behind it, while using dynamically received
DNS server addresses as the next resolver for its own use.
Note
If a DHCPv6 client is configured to receive prefix delegation information, it
cannot receive an address for its router interface, and vice versa. To work with
PD, you can configure SecFlow-1p to receive an address from a DHCPv6 client
(without PD), and initiate a ZTP process; the ZTP configuration file can
statically configure the address, and activate PD. Another option is to use RA
for receiving address and DHCPv6 client for PD.
SecFlow-1p
6. Traffic Processing
403
Crypto Map
SecFlow-1p supports binding of a defined crypto map (see Configuring Crypto Map) to a router
interface. One map can be associated with multiple interfaces, and multiple maps (up to five) can be
associated with one interface.
If the router interface has multiple IP addresses, by default the lowest one is used as the IPsec tunnel
source.
You can bind a predefined crypto map to an address (even if the router interface has a single address).
In this case:
•
The tunnel source is the one configured.
•
If the interface does not own the configured address, SecFlow-1p ignores the configuration and
behaves as if the map is not bound to the interface.
Factory Defaults
By default, no router interfaces exist. The other router parameters are configured as shown in the
following table.
By default, the source management IP address for IPv4/IPv6 is not configured.
Parameter
Default
Remarks
name
"Router#1”
dhcp-client duid-type
ll
dhcp-client host-name
sys-name
In the DHCP client, the device
name is used as the host name.
dhcp-client vendor-class-id
ent-physical-name
In the DHCP client, the entity
physical name is used as the
vendor class ID.
tunnel-interface
gre-ip
Tunnel type, when tunneling is
configured
SecFlow-1p
6. Traffic Processing
404
Configuring the Router
The router functionality allows SecFlow-1p to establish links to Ethernet ports via SVIs, or to peers that
provide the 1588v2 master clock, or to establish PPPoE sessions via PPP ports.
 To configure the router:
1. At the config# prompt, enter:
router <number>
The config>router(<number>)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Configuring BGP
[no] bgp <as-number>
as-number – local AS
Possible values: 1-4294967295,
Default: 0
See Routing Protocol BGP
Deleting dynamic ARP entities
clear-arp-table [<address>]
Clearing IPv6 neighbor table
clear-neighbor-table
Configuring DHCP client for the
router interface
dhcp-client
Specify the IP address to clear
only the entries corresponding
to it.
Commands in level dhcp-client
Providing host name to DHCP
server
host-name <string>
host-name sys-name
no host-name
Providing vendor ID to DHCP
server
vendor-class-id <string>
vendor-class-id
ent-physical-name
You can specify a name, or
specify sys-name to indicate
that the system name should be
used as the host name.
You can specify an ID, or specify
ent-physical-name to indicate
that the device name should be
used as the vendor ID.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Configuring DHCP client to
request DHCPv6 server for
option 17
dhcpv6-option-request
[vendor-specific-information17]
Relevant for IPv6.
Vendor specific information
option 17 is used to pass data
needed for the Zero Touch
process.
no dhcpv6-option-request
405
Notes:
• The command behaves the
same regardless of whether
you specify vendor-specificinformation-17 optional
keyword.
• If you repeat the command,
the last instance replaces
the previous.
Entering no dhcpv6-optionrequest results in DHCP client
not explicitly requesting option
17.
Configuring DHCPv6 Unique
Identifier (DUID) type
duid-type {en | ll}
Relevant for IPv6.
• en –enterprise number (type
2); comprises an enterprise
number (RAD’s is 164) and
an identifier (MAC address
of the port out of which the
request is sent)
ll – link layer address (type 3);
comprises a hardware type (1
for Ethernet) and a link-layer
address (MAC address of the
port out of which the request is
sent)
Configuring DNS server
dns-name-server <ip-address>
[priority <priority>]
Type [no] dns-name-server <ipaddress> to delete the DNS
server.
ip-address can be IPv4 or IPv6
priority
Possible values: 1–255
Configuring DSCP value for
router entity traffic
dscp <number>
Possible values: 0–63
Default: 0
SecFlow-1p
6. Traffic Processing
406
Task
Command
Comments
Creating a router interface
interface <interface-num>
[{loopback } ]
interface-num – a unique
number assigned to the router
interface
Possible values: 1–32
loopback – sets router interface
as loopback
Type no interface number to
delete a router interface.
See the Configuring Router
Interfaces section for a list of
tasks that can be configured on
a router interface.
Assigning name to router
name <string>
Alphanumeric string
Enter no name to remove
router name.
Enabling, or disabling and
deleting Network Address
Translator (NAT)
nat
Typing no nat disables and
deletes the existing NAT
configuration, including. all
mapping table entries.
Note: You can configure a single
instance of NAT over each one
of the supported VRFs.
For details on configuring NAT
parameters, see Configuring
Network Address Translator
(NAT)
Configuring OSPF
ospf
See Configuring OSPF at the
Router Level
Creating a prefix-list policy
profile for the router
prefix-list <name> {ipv4|ipv6}
Name – unique prefix-list policy
profile name.
1-252 characters
Entering no prefix-list <name>
deletes the router’s prefix-list
policy profile.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Resequencing policy profile
resequence <name>
name –policy profile to
resequence; 1..252 characters
407
number – steps between policy
rules entries numbers
Possible values: 1-100000
Default: 10
Creating the router’s route-map
policy profile
route-map <name>
name – route-map policy profile
unique name. 1-252 characters
Entering no route-map <name>
deletes the router’s route-map
policy profile.
Enabling the static route and the
next gateway (next hop) using
the next hop’s IP address
static-route
<IP-address/IP-mask-of-static-ro
ute> address
<IP-address-of-next-hop>
[metric <metric>][ install | noinstall ]
no static-route <IP
Address/prefix-length> address
<address>
The next hop must be a subnet
of one of the router interfaces.
To set the default-gateway,
configure static route of address
0.0.0.0/0 to next hop default
gateway address. Entering no
static-route deletes static route
entry.
Metric specifies the priority of
the static route
Possible values: 1–255
Note: the value of 255 is
considered as unreachable and
the appropriate route is not be
added to the routing table.
Default: 1
install option forwards a specific
route entry into the FIB.
no-install option does not
forward a specific route entry
into the FIB.
SecFlow-1p
6. Traffic Processing
408
Task
Command
Comments
Enabling the static route and the
router interface number toward
which the destination subnet is
to be routed
static-route
<IP-address/IP-mask-of-static-ro
ute> interface
<router-interface-num> [metric
<metric>][ install | no-install ]
no static-route deletes static
route entry.
no static-route <IP
Address/prefix-length> interface
<router-interface>
<priority> should be an integer
in range 1–255.
Metric specifies the priority of
the static route: 1–255 (default:
1).
Note: the value of 255 is
considered as unreachable and
the appropriate route is not be
added to the routing table.
Install option forwards a specific
route entry into the FIB.
No-install option does not
forward a specific route entry
into the FIB.
Configuring tunnel interface
tunnel-interface <number>
[gre-ip | ipsec]
number – tunnel number 1-256
Entering no tunnel-interface
<number> deletes the tunnel
interface.
See Port Classification for more
details
See Viewing ARP Table
Displaying the address
resolution protocol (ARP) table,
which lists the original MAC
addresses and the associated
(resolved) IP addresses
show arp-table
[ address <ip-address> ]
Displaying DNS resolver
show dns-resolver
Displaying IPv6 neighbors table
show neighbor-table [address
<ip-address>]
See Viewing IPv6 Neighbors
Displaying the IPv4 or IPv6 RIB
(Routing Information Base) table
show rib { ipv4 | ipv6 }
See Viewing RIB
Displaying VRRP summary
show vrrp-summary
Note: The ARP table is limited to
255 entries.
SecFlow-1p
6. Traffic Processing
409
Task
Command
Comments
Displaying the routing table
show routing-table [ address
<IP-address/IP-mask> ]
[protocol {dynamic|static}]
IP-address/IP-mask – View
routing information for a
specific IP address of a specified
prefix length.
See Viewing Routing
Information
Displaying the interface table
show summary-interface
See Viewing Router Interface
Status
Configuring Router Interfaces
You can configure up to 32 router interfaces.
 To configure a router interface:
1. At the config>router(<number>)# prompt, enter:
interface <interface-num> [loopback]
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Assigning an IP address and
prefix length to the router
interface
address
<IP-address/prefix-length>
The IP address can be IPv4 (e.g. 10.10.10.1)
or IPv6 format (e.g.
10:10:10:10:10:10:10:10)
no address
<IP-address/prefix-length>
Prefix length:
• For vitual ports: IPv4 1–32; IPv6 1–128
• For other ports: IPv4 1–31; IPv6 1–127
You cannot define an IP address if the
router interface is bound to a PPP port.
Binding router interface to a
port (Cellular, Ethernet,
Virtual, or PPP), or access
point
bind cellular < port-name>
bind ethernet <port-name> [vlan
<vlan-id>]
bind virtual <port-index> [vlan
<vlan-id>]
bind ppp <port-number>
bind wlan [slot/]port accesspoint <ap-number>
no bind
• port-number (port-name) – number
(name) of device interface port
connected to the router interface.
• vlan-id - port number of the VLAN port
connected to the router interface
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Associating router interface
with a crypto map
crypto-map <name> [address
<ip-address>]
name – crypto map name
Possible values: 1-80 character string
no crypto-map <name>
ip-address – local peer IP address
410
Notes:
• You can associate up to five crypto
maps with one interface.
• If no address is specified, ip-address is
an empty string.
If the specified crypto map is not
defined, SecFlow-1p ignores this
configuration and behaves as if it is not
bound to it.
Enabling/disabling DHCP
client
Configuring DHCP client for
the router interface
dhcp
no dhcp
You cannot enable DHCP (for IPv4) in the
following cases:
•
•
•
•
Router interface is bound to a PPP port.
IPv4 address is configured.
Router interface is not unnumbered.
DHCPv6 is enabled.
dhcp-client
Command in level dhcp-client
Providing client ID (DHCP
option 61) to DHCP server
client-id id <string>
client-id mac
You can specify an ID, or specify mac to
indicate that the device MAC address
should be used as the client ID.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Enabling or disabling DHCPv6
client for the router interface
dhcpv6-client [pd name <prefixname>] [rapid-commit]
no dhcpv6-client
You can enable DHCPv6 client provided
that the following conditions exist:
411
• Router entity is Router # 1.
• There is no other DHCPv6 client defined
in the device.
• DHCPv4 is not enabled.
• The router interface is not defined as
loopback.
It is optional to enable rapid commit or
prefix delegation (pd).
prefix-name – 1-255 character string
Note:
• If the command is repeated, the last
instance applies.
DHCPv6 client, server, and relay are
mutually exclusive on the same interface.
Therefore, it is possible to enable a client,
only if neither a relay nor a server are
configured on the router interface.
Enabling DHPv6 server
dhcpv6-server pool <pool-name>
[rapid-commit] [preference
<value>]
no dhcpv6-server
pool – defines the pool name
rapid-commit – enables DHCPv6 rapid
commit
preference (optional) – configures
preference in DHCPv6 advertisement
messages; possible values: 0 to 255
The DHCPv6 client and server functions are
mutually exclusive on an interface.
Enabling/disabling IP
forwarding
ip-forwarding
Configuring IPv6 address from
prefix
ipv6-address-prefix <prefixname> <prefix-length> [noautoconfig]
no ipv6-address-prefix <prefixname>
If you repeat the command with the same
prefix name, the new command replaces
the previous one.
If you try to repeat the command with a
different prefix name, SecFlow-1p rejects
the command
SecFlow-1p
6. Traffic Processing
412
Task
Command
Comments
Enabling or disabling IPv6
autoconfiguration on router
interface
ipv6-autoconfig
no ipv6-autoconfig
Enter no ipv6-autoconfig to disable IPv6
autoconfiguration.
Configuring interface
management access
management-access {allow-all |
allow-ping}
You can set management access to
allow-all for up to two router interfaces.
Enter no management-access to remove
management access from router interface.
name <interface-name>
Assigning a name to the
router interface
no name
Configuring OSPF
ospf
Enabling or disabling IPv6
router-advertisement
router-advertisement
Displaying ACL summary
show access-list summary
See Viewing Access List Status.
Displaying crypto map
information
show crypto-map-status
[<name>]
name – crypto map name
Possible values: 1-80 character string
Note: If name is specified, the command
displays the data of only that crypto map.
Otherwise, the command displays data of
all the crypto maps associated with the
interface.
See Configuring OSPF at the Interface
Level
no router-advertisement
For a detailed description of the crypto
map parameters, see Viewing Crypto Map
Information below.
Displaying router interface
status
show status
See Viewing Router Interface Status.
Administratively enabling or
disabling the router interface
no shutdown
Entering shutdown disables the interface.
Enable sending of ICMP
Unreachable messages for the
router interface
unreachables
shutdown
no unreachables
Deleting a Router
You can delete a router if there are no router interfaces associated with it.
SecFlow-1p
6. Traffic Processing
 To delete a router:
•
At the config# prompt, enter:
no router <number>
Deleting a Router Interface
 To delete a router interface:
•
At the config>router(<number>)# prompt, enter:
no interface <interface-num>
Viewing Router Information
You can view information on each router by using the show summary-interface command.
 To display the router information:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show summary-interface.
The router interface information is displayed.
config>router(1)# show summary-interface
Router Interface: 1
Name:
RI 1
Admin:Up
Oper: LLD
Bound to:
172.17.161.101/24
ethernet lan1
(manual)
(preferred)
Router Interface: 2
Name:
RI 2
Admin:Up
10.10.10.1/24
Oper: Up
Bound to:
ethernet lan2
(manual)
(preferred)
The above fields are:
Router Interface (number)
Unique number assigned to the router interface
Name
Name of the router interface (alphanumeric string)
413
SecFlow-1p
Admin
6. Traffic Processing
Administrative status:
• Up – ready to pass packets
• Down
Oper
Operational status:
• Up – ready to pass packets
• Down
• LLD – Lower Layer Down; down due to state of lowerlayer interface(s)
Bound to
The port that the router interface is bound to
IP Addresses
IP Address/prefix length
IPv4 or IPv6 address and prefix length
Note: Supported for DHCPv6
origin
Origin of the IP address.
Possible origins are:
• other – for example, link local address
• manual – indicates that the address was manually
configured to a specified address
• dhcp – indicates an address that was assigned to this
system by a DHCP server
• link layer – indicates an address created by IPv6 stateless
auto-configuration
• random – indicates an address chosen by the system at
random
status
Status of the IP address.
Available statuses (from the IPv6 Stateless Address
Autoconfiguration protocol) are:
•
•
•
•
•
•
•
•
preferred (default)
deprecated
invalid
inaccessible
unknown
tentative
duplicate
optimistic
414
SecFlow-1p
6. Traffic Processing
415
Viewing Access List Status
You can view the access list summary using the show access-list summary command.
 To view access-list summary:
1. Navigate to configure router <number> interface <number>.
2. At the config>router(<number>) interface (<number>)# prompt that is displayed, enter show
access-list summary.
3. The access list summary is displayed.
ACL Name Type Bound To Direction
----------------------------------my-acl
IPv4 RI 1/1
Inbound
Viewing ARP Table
 To display the ARP table:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show arp-table.
The ARP table is displayed.
config>router(1)# show arp-table
IP Address
MAC Address
Status
--------------------------------------------------------------172.17.161.1
E0-2F-6D-12-95-42
Dynamic
Viewing Crypto Map Information
You can view information on a specific crypto map or all configured crypto maps using the show cryptomap-status command.
 To display the crypto map information:
1. Navigate to configure router <number>interface<number>.
2. At the config>router(<number> interface (<number>))# prompt that is displayed, enter show
crypto-map-status.
config>router(1)interface(1)# show crypto-map-status
Crypto Map
: my-map-1
Tunnel Peers
: 10.10.10.1 --- 20.20.20.1
Security Association
: Up 111 minutes ago
SecFlow-1p
6. Traffic Processing
IKE
Version
SA Negotiation Mode
Authentication
Encryption
Hashing
Diffie Hellman Group
In SPI
Out SPI
Reauthentication in
Transform Set
Algorithms
In SPI
Out SPI
Remaining Lifetime
In Kilobytes
Out Kilobytes
Seconds
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
2
:
Main
Pre-shared secret
AES-CBC-256
SHA1-96-HMAC
20
7423470e4a9ab53b
987279bf53131617
10 minutes
ESP-AES-GCM-256
c8a473f3
ca7455fb
10000
2000
100
The above fields are:
Tunnel Peers
Local peer --- remote peer
Possible values: ip-address
Local Protected Networks
Local protected network.
Possible values: <ip-address>/<prefix-length>
•
Remote Protected Networks
Remote protected network.
Possible values: <ip-address>/<prefix-length>
•
Security Association
SA status and SA age
Possible values:
SA status – Connecting, Down, Up
SA age – <number> minutes ago
IKE
Version
IKE version
Possible values: 1, 2
SA Negotiation Mode
IKE SA negotiation mode
Possible values: Aggressive, Main
416
SecFlow-1p
6. Traffic Processing
Authentication
IKE authentication method
Possible value: Pre-shared secret
Encryption
IKE encryption algorithm
Possible value: AES-CBC-128, AES-CBC-256
Hashing
IKE hashing algorithm
Possible values: SHA1-96-HMAC, SHA2-256-128-HMAC,
SHA2-512-256-HMAC
Diffie Hellman Group
IKE Diffie Hellman group
Possible values: 1, 2, 5, 14, 19, 20
In SPI
IKE in SPI
Possible values: string
Out SPI
IKE out SPI
Possible values: string
Re-authentication in
Time to IKE key re-authentication
Possible values: <number> minutes/hours/days
Transform Set
Algorithms
Transform set first algorithm
Possible values: ESP-AES-CBC-128, ESP-AES-CBC-256, ESPAES-GCM-128, ESP-AES-GCM-256, ESP-NULL, ESP-AESGMAC-128, ESP-AES-GMAC-256
Transform set second algorithm
Possible values: ESP-SHA1-96-HMAC, ESP-SHA2-256-128HMAC, ESP-SHA2-512-256-HMAC
In SPI
Transform set in SPI
417
SecFlow-1p
Out SPI
6. Traffic Processing
418
Transform set in SPI
Remaining Lifetime
In Kilobytes
Transform set remaining lifetime (in kilobytes)
Out Kilobytes
Transform set remaining lifetime (out kilobytes)
Seconds
Transform set remaining lifetime (seconds)
Viewing IPv6 Neighbors
You can view information on each IPv6 neighbor by using the show neighbor-table command.
 To display the neighbor table:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show neighbor-table.
The IPv6 neighbors are displayed.
config>router(1)# show neighbor-table
IPv6 Address
MAC address
State Interface
=============================================================================
1234:1234:1234:1234:1234:1234:1234:1234 01-01-01-01-01-01 reachable
1
1234:1234:1234:1234:1234:1234:1234:1234 01-01-01-01-01-01 incomplete 28
FE80::200:E8FF:FE00:2A2B
00-00-e8-00-2a-2b stale
2
The above fields are:
IPv6 address
Neighbor IPv6 address
MAC address
Neighbor MAC address
State
The Neighbor Unreachability Detection state for the interface when the
address mapping in this entry is used:
•
•
•
•
•
•
•
reachable – confirmed reachability
stale – unconfirmed reachability
delay – waiting for reachability confirmation before entering probe state
probe – actively probing
invalid – invalidated mapping
unknown – state cannot be determined for some reason
incomplete – address resolution is being performed
SecFlow-1p
interface
6. Traffic Processing
Router interface number
Viewing RIB
You can view the RIB (Routing Information Base) by using the command show rib. This command is
available in the CLI contexts for IPv4 or IPv6, at the router level: config>router(<number>)#.
 To display the IPv4 RIB:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show rib ipv4.
The IPv4 RIB is displayed.
config>router(1)# show rib ipv4
* = Active Route
Network
> Next Hop
RI Proto Metric
=============================================================================
* 0.0.0.0/0
> 172.17.171.1
2 Static
1
* 2.2.2.0/24
> 172.17.171.205
2 BGP
* 3.3.3.0/24
> 0.0.0.0
1 Local
0
3.3.3.0/24
> 172.17.171.205
2 BGP
* 111.222.111.0/24
> 0.0.0.0
2 Local
0
111.222.111.0/24
> 172.17.171.205
2 BGP
 To display the IPv6 RIB:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show rib ipv6.
The IPv6 RIB is displayed.
config>router(1)# show rib ipv6
* = Active Route
Network
> Next Hop
RI Proto Metric
=============================================================================
* ::/0
> 11:11:11:11::1
1 Static
1
* 11:11:11:11::/64
> ::
1 Local
0
* abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
1 Static
1
* fe80::/64
> ::
1 Local
0
The above fields are:
Status (Active Route)
Marks with a “*” an ‘Active Route’, i.e. route entry is forwarded to the FIB
(Forwarding Information Base)
419
SecFlow-1p
6. Traffic Processing
Network
420
IPv4 or IPv6 network address (prefix and prefix length)
IPv4 prefix length can be 0–32; IPv6 prefix length can be 0–128.
Next hop
Route entry next hop IP address
RI
Local interface through which the next hop of this route should be reached
Protocol
Source protocol
Metric
Route entry metric
Viewing Routing Information
You can view all routing information or only information on dynamic or static routes, for all IP addresses
or for a specific IP address and prefix length of a dynamic or static by using the show routing-table
command:
config>router(<number>)>show routing-table [ address <IP-address/IP-mask> ]
[ protocol { dynamic | static } ].
 To display the routing table:
config>router(1)# show routing-table
IP address/prefix
Next Hop
interface
Protocol
Metric
====================================================================
172.17.175.0/24
172.177.170.100
1
Static
250
172.17.176.0/24
0.0.0.0
3
Local
0
1.1.1.1/32
0.0.0.0
4
Local
0
The above fields are:
IP address/prefix
IPv4 or IPv6 address and prefix length
Next Hop
Route entry next hop IP address
Interface
Router interface number
Protocol
Source protocol:
• static
• local
• bgp
Metric
Route entry metric
When protocol is BGP, this is blank.
SecFlow-1p
6. Traffic Processing
421
Viewing Router Interface Status
You can view the router interface status by using the show status command:
config>router(<number>) >interface(<interface-num>) >show status.
 To display the router interface status:
1. Navigate to configure router <number> interface <number>.
2. At the config>router(<number>) interface(<number>)# prompt that is displayed, enter show
status.
The router interface status is displayed.
config>router(1)>interface(1)# show status
Admin: Up
Oper: Up
Ip Addresses:
30.30.30.11/24 (dhcp) (preferred)
IPv4 Default Router : 30.30.30.1
DHCP Client Information
DHCP Status : Holding Lease
Server : 30.30.30.1
Router : 30.30.30.1
Lease Obtained : 2017-02-10 18:21:20
Expires : 2017-02-10 18:26:20
Lease Renewal: : 2017-02-10 18:23:50
Rebinding: : 2017-02-10 18:25:42
TFTP Server : -Bootfile Name : -Host Name : -Static Routes : --
The above fields are:
Admin
Administrative status:
• up – ready to pass packets
• down
Oper
Operational status:
• up – ready to pass packets
• down
IP Addresses
SecFlow-1p
6. Traffic Processing
IP Address/prefix length IPv4 or IPv6 address and prefix length
Note: Supported for DHCPv6
origin
Origin of the IP address.
Possible origins are:
•
•
•
•
•
status
other
manual
DHCP
link layer
random
Status of the IP address.
Available statuses (from the IPv6 Stateless Address Autoconfiguration
protocol) are:
•
•
•
•
•
•
•
•
IPv4 Default Router
preferred (default)
deprecated
invalid
inaccessible
unknown
tentative
duplicate
optimistic
IP address of the IPv4 default router
DHCP Client Information (Section appears only when DHCP is enabled.)
Status
DHCP client operational status. Available options are:
•
•
•
•
•
•
Server
Holding Lease
Not Holding Lease
Failed to Obtain Lease
Waiting for Lease
Initializing
No Lease Address In Use
Displays client server’s address
422
SecFlow-1p
Router
6. Traffic Processing
423
List of default routers, in order of preference
If the first router is in use, (active) is displayed following its address.
The first router is not in use if:
• There is a different static default router.
• The DHCP default router is invalid, i.e., not on the device’s networks.
Lease Obtained
Date and time when the DHCP lease was obtained
Expires
Date and time when the DHCP lease will expire, if not renewed
Lease Renewal
Date and time when the device will try to renew the DHCP lease.
renewal time = (expired - obtained) * 0.5
If the lease last chance for renewal time passes, -- is displayed. Otherwise,
the next renewal time is displayed, as follows:
• Date and time, formatted like other date and time values in the device (by
default as dd mm-yyyy hh:mm:ss)
• If real time clock is not available, time in seconds since startup.
Rebinding
Date and time when the device will try to rebind the DHCP lease
TFTP Server
IP address of TFTP server, received by DHCP
Boot file Name
File to obtain from TFTP server, received by DHCP
Host Name
Host name, received by DHCP
Static Routes
File to obtain from TFTP server, received by DHCP
Viewing Router Statistics
You can view the router statistics using the show statistics command.
 To view router IPv4 traffic statistics:
1. Navigate to configure router <number>.
2. At the config>router(<number>) # prompt that is displayed, enter show statistics ipv4 traffic.
The router interface IPv4 traffic statistics are displayed.
IPv4 statistics:
In:
Receives:
18446744073709551616 Octets:
18446744073709551616
SecFlow-1p
Multicast Packets: 18446744073709551616
Broadcast Packets: 18446744073709551616
No Routes:
4294967296
Unknown Protocols:
4294967296
Forward Packets: 18446744073709551616
Reassembled Ok:
4294967296
Discards:
4294967296
Out:
Requests:
18446744073709551616
Forward Packets:
18446744073709551616
Fragmentation Required:
4294967296
Fragmentation Fails:
4294967296
Transmits:
18446744073709551616
Multicast Packets: 18446744073709551616
Broadcast Packets: 18446744073709551616
6. Traffic Processing
424
Multicast Octets:18446744073709551616
Header Errors:
4294967296
Address Errors:
4294967296
Truncated Packets:
4294967296
Reassembled Required:
4294967296
Reassembled Fails:
4294967296
Delivers:
18446744073709551616
No Routes:
4294967296
Discards:
4294967296
Fragmentation Ok:
4294967296
Fragmentation Creates:
4294967296
Octets:
18446744073709551616
Multicast Octets: 8446744073709551616
 To view router IPv6 traffic statistics:
1. Navigate to configure router <number>.
2. At the config>router(<number>)# prompt that is displayed, enter show statistics ipv6 traffic.
The router interface IPv6 traffic statistics are displayed.
IPv6 statistics:
In:
Receives:
18446744073709551616
Multicast Packets: 18446744073709551616
Broadcast Packets: 18446744073709551616
No Routes:
4294967296
Unknown Protocols:
4294967296
Forward Packets:
18446744073709551616
Reassembled Ok:
4294967296
Discards:
4294967296
Out:
Requests:
18446744073709551616
Forward Packets:
18446744073709551616
Fragmentation Required:
4294967296
Fragmentation Fails:
4294967296
Transmits:
18446744073709551616
Multicast Packets: 18446744073709551616
Broadcast Packets: 18446744073709551616
Octets:
18446744073709551616
Multicast Octets:18446744073709551616
Header Errors:
4294967296
Address Errors:
4294967296
Truncated Packets:
4294967296
Reassembled Required:
4294967296
Reassembled Fails:
4294967296
Delivers:
18446744073709551616
No Routes:
4294967296
Discards:
4294967296
Fragmentation Ok:
4294967296
Fragmentation Creates:
4294967296
Octets:
18446744073709551616
Multicast Octets:18446744073709551616
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
SecFlow-1p
6. Traffic Processing
425
Message
Cause
Corrective Action
Cannot delete; interface associated
with the router
You tried to delete a router entity
that has router interfaces
associated with it.
Disassociate router interfaces from
router.
Cannot set address; DHCP enabled
You tried adding an IPv4 address
when DHCP is enabled.
Disable DHCP.
Cannot set address; too many
addresses already configured
You tried adding an IP address, but
the amount of IP addresses already
reached its limit.
Delete one of the associated
addresses before associating a new
IP address.
Cannot set address; invalid
You tried adding a multicast IP
address or an interface IPv4
address with prefix length 32 (,
which is only allowed for loopback
interface).
When configuring static-route, you
tried to do one of the following:
• Add a multicast IP network
address.
• Add an IP network address
when it was not allowed.
Use /31 prefix-length on non pointto-point interface cautiously
You tried adding anIPv4 interface
address with prefix length 31.
Cannot modify; activated router
interface
You tried modifying or removing a
bound port while the router
interface was activated (no
shutdown).
Shut down the router interface and
try again.
You tried adding, modifying, or
removing a VLAN while the router
interface was activated (no
shutdown).
Cannot enable; IPv4 address exists
You tried enabling DHCP even
though manual IPv4 address exists.
Cannot enable; DHCPv6 is enabled
You tried enabling DHCP even
though DHCPv6 is enabled.
Disable DHCPv6.
Cannot set; DHCPv6 client is
already defined
You tried enabling DHCPv6 client
when there is already one defined
in the device.
Remove existing DHCPv6 client.
SecFlow-1p
6. Traffic Processing
426
Message
Cause
Corrective Action
Cannot enable; DHCP (v4) is
enabled
You tried enabling DHCPv6 while
DHCPv4 is enabled.
Disable DHCPv4.
Cannot set; Router Interface is
loopback interface
You tried enabling DHCPv6 client
while router interface is defined as
loopback interface.
Associate DHCPv6 client with a
router interface that is not defined
as a loopback interface.
Cannot activate; must be bound to
port
You tried activating a router
interface, which is neither a
loopback interface nor bound to a
port.
Bind the router interface to a
loopback interface or a port.
Cannot activate; bound port in use
by another router interface
You tried activating the router
interface, while the bound port is
already in use by another router
interface.
Cannot activate; bound port+vlan
in use by another router interface
You tried activating the router
interface that is bound to port +
vlan, while bound pair port+vlan is
already in use by another router
interface.
Cannot activate; ip address is set
You tried activating the router
interface bound to PPP port, when
IP address was set.
Cannot activate; dhcp is enable
You tried activating the router
interface bound to PPP port, when
DHCP is enabled.
Address is not IPv4 address.
You configured the IP address of
Inside IP station with a non-IPv4
address.
Configure the IP address of Inside
IP station with an IPv4 address.
Too many crypto maps associated
with the interface
You tried associating more than
five crypto maps with the router
interface.
Disassociate at least one crypto
map from the router interface.
6.9 Routing Protocol BGP
BGP (Border Gateway Protocol) is a path-vector protocol for dynamic routing, used for route distribution
between Autonomous Systems (AS) across the internet and other large networks.
SecFlow-1p
6. Traffic Processing
427
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
RFC 4271 - A Border Gateway Protocol 4 (BGP-4)
RFC 4893 - BGP Support for Four-octet AS Number Space
RFC 5396 - Textual Representation of Autonomous System (AS) Numbers
RFC 2385 - Protection of BGP Sessions via the TCP MD5 Signature Option
RFC 2545 - Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing
The following BGP features are not supported:
•
Graceful restart (RFC 4724)
•
Interaction with ECMP
Benefits
Dynamic routing protocols enable routing tables to automatically adapt to changing networks. BGP is
the de-facto standard in the internet for communicating routing information between Autonomous
Systems (AS), making it the only option for AS boundary routers (ASBR) to enable route communication
with other ASes.
Functional Description
BGP is intended for use on customer-premises equipment (CPE) at the boundary of a large customer
network that is an independent ‘stub’ AS connected to only one other AS (the service provider network).
BGP functionality is explained in the following sections.
Dynamic Routing Protocols
Routers direct packets through their various interfaces according to their routing tables, which specify
an exit interface for each destination IP network. While routing tables can include static, manually
SecFlow-1p
6. Traffic Processing
428
configured routes, an optimized routing table requires knowledge of remote network topology and
complex path calculations. Dynamic routing protocols define how routers communicate network
topology with each other and how they accordingly calculate optimized network paths and create their
routing tables.
The internet is divided into Autonomous Systems (AS). An AS is usually the network of an Internet
Service Provider (ISP) or another large organization that administers the AS-internal routing policy.
Routing information inside each AS is communicated and determined by an Interior Gateway Protocol
(IGP) such as OSPF; routing information between ASes is communicated by the Border Gateway Protocol
(BGP).
BGP: Path-Vector Routing
BGP is a path-vector routing protocol. As opposed to link-state protocols, in which network topology is
communicated throughout a network, and as opposed to distance-vector protocols, in which routers
communicate destination distances, routers using a path-vector protocol communicate actual paths, or
routes, to destinations.
In BGP, communicated paths for each destination contain the IP address of the first hop, and the list of
ASes, by AS numbers (ASN), which need to be traversed to reach the destination. BGP aggregates routes,
and, to prevent loops and to choose among the path alternatives, each BGP router decides which actual
routes to adopt among BGP updates received from its neighbors and which of its known routes to
advertise to its neighbors. BGP makes these decisions using optimization algorithms and (in other BGP
implementations) additional criteria from a locally configurable policy.
BGP Neighbors
BGP is configured only on AS Boundary Routers (ASBR). Each BGP router recognizes a limited list of BGP
neighbors from which it receives route updates and to which it advertises route updates. A BGP
neighbor relationship needs to be manually defined on both BGP routers. BGP routers identify neighbors
by their IP addresses and AS numbers.
BGP neighbors always belong to the IPv4 unicast address family, and can optionally belong to the IPv6
unicast address family.
AS-Internal Destination Injection
To be able to advertise its local AS-internal destinations to the rest of the internet, BGP needs to know
what destination networks are included in its local AS. BGP can become aware of these networks in
several configurable ways:
•
BGP can be configured to redistribute static routes from the router’s routing table.
SecFlow-1p
6. Traffic Processing
429
•
BGP can be configured to redistribute connected networks.
•
BGP can be configured to redistribute routes from the AS’ IGP (OSPF). Supported only for IPv4
address family.
•
Specified network addresses can be manually configured in BGP. These destinations are
advertised only if they are found in the local routing table.
AS Numbers (ASN)
BGP communicates paths as a list of numbers of the ASes that need to be traversed to reach
destinations. Generally, ASNs uniquely define the AS, and are allocated for the individual AS by the
Internet Assigned Numbers Authority (IANA); however, ISPs can define private ASes for their customer
networks with ASNs in the range 64512–65534.
Limiting Received Routes
The number of routes received can be limited for each neighbor. When the number of received routes
reaches 90% of the configured value, the device generates an alarm and sends an SNMP trap. When the
configured value is exceeded, the session goes down for five minutes.
BGP Session Timers
BGP neighbors send each other keep-alive messages to confirm the connection’s health. Two
parameters are defined:
keepalive is the interval, in seconds, between messages confirming connection health to the neighbor. If
the value is 0, these messages are disabled.
holdtime is the interval, in seconds, after which the connection with the neighbor is considered down if
no keep-alive messages have been received from the neighbor. If the value is 0, the neighbor is never
considered down.
Upon session initiation, the neighbors negotiate for each of these two parameters and then both use the
lower of their values. Negotiated values can be viewed (see Viewing Neighbor Connection Status).
Either both parameters must be non-zero or both must be zero.
Routing Preferences
When there are conflicts between routes received from different sources, such as static routes,
connected networks, and BGP routes, the router’s Routing Table Manager (RTM) chooses among the
SecFlow-1p
6. Traffic Processing
430
sources according to configurable source preference indices (lowest number indicates highest priority).
Separate preference indices are defined for BGP routes received from BGP neighbors in the same AS
(Internal BGP) and for BGP routes received from BGP neighbors in other ASes (External BGP).
BGP Path Attributes
Path attributes are contained in BGP update packets. The path attributes of advertised routes are used
to select the route from multiple routes, and to propagate policy.
BGP path attributes have the following types:
Well-known mandatory
Must be supported and propagated
Well-known discretionary
Must be supported; propagation optional
Optional transitive
Marked as partial if unsupported by neighbor
Optional nontransitive
Deleted if unsupported by neighbor
The following table lists the path attributes.
Name
Description
Path Type
1 Origin
Origin type (IGP, EGP, or unknown)
Well-known mandatory
2 AS Path
List of autonomous systems which
the advertisement has traversed
Well-known mandatory
3 Next Hop
External peer in neighboring AS
Well-known mandatory
5 Local Preference
Metric for internal neighbors to
reach external destinations (default
100)
Well-known discretionary
8 Community
Route tag
Well-known discretionary
4 Multiple Exit Discriminator (MED)
Metric for external neighbors to
reach the local AS (default 0)
Optional nontransitive
BGP Policies
The BGP functionality provides a flexible filtering mechanism to ensure that the router processes only
relevant BGP update packets. The filtering is done by means of defining BGP policy profiles of the
following types:
Prefix lists
Filter by prefix and prefix length, where prefix is specified by IP
address and mask, with prefix length between 24 and 26
SecFlow-1p
Route maps
6. Traffic Processing
431
Permit/deny if packet matches community in the form x:y. The
community is a BGP path attribute (see BGP Path Attributes) that is
usually set by each network.
BGP policy profiles are assigned per IPv4/IPv6 unicast address family per neighbor. One of each policy
profile type can be assigned in the inbound direction (to be applied to received packets) and outbound
direction (to be applied to advertised packets), per IPv4/IPv6 unicast address family per neighbor.
BGP policy profiles comprise sequentially numbered rules, each of which can be one of the following:
Permit action
Specifies criteria for permitting packet, and optionally sets action in
case of route map profile
Deny action
Specifies criteria for dropping a packet
Remark
Used for commenting and visually organizing rules
If there is a need to add a rule between already existing rules with consecutive sequence numbers, the
rules can be interspaced to accommodate additional rules between them.
•
The packet filtering is done as follows: Each BGP update packet is checked according to the
associated prefix list policy (if exists), and then the associated route map policy (if exists),
starting with the first rule.
•
If the packet doesn’t match a rule, the next rule according to the sequence number is checked.
•
If the packet matches a deny rule, it is dropped, and the filtering ends.
•
If the packet matches a permit rule, the packet is permitted. Any set operation in the rule is
performed, in the case of route map profile.
•
If the packet doesn’t match any rule, it is dropped.
Maintained Information
BGP maintains the following network information, all of which can be viewed (see Viewing BGP Status):
•
Neighbor connectivity details
•
Per-neighbor received routes
•
Per-neighbor advertised routes
•
Per-neighbor policy profiles
•
Per-neighbor communities
•
Per-neighbor RIB
SecFlow-1p
•
6. Traffic Processing
432
Per neighbor summary
Factory Defaults
By default, BGP is not configured on RAD routers. The following tables show the default values when it is
configured.
Router
The following parameters determine BGP behavior for the whole router, for all interfaces:
Parameter
Description
Default Value
bgp
Whether BGP is defined (but not
necessarily enabled) on this router,
and the local ASN
no bgp
router-id
ID for router in BGP
communications, in IP address
format
-(mandatory configuration)
shutdown
Enable (no shutdown) / disable
(shutdown) BGP on the router
shutdown
IPv4 and IPv6 Unicast Address Family
The following parameters characterize behavior for the IPv4/IPv6 unicast address families, for all BGP
neighbors. The parameters for IPv4 and IPv6 have the same names but are defined in separate levels.
Parameter
Description
Default Value
external-preference
Preference index for external BGP
routes. See Routing Preferences.
20
internal-preference
Preference index for internal BGP
routes. See Routing Preferences.
200
network
AS-internal networks that should
be advertised to BGP neighbors.
See AS-Internal Destination
Injection.
no network
SecFlow-1p
6. Traffic Processing
Parameter
Description
Default Value
redistribute
Sources other than BGP of routes
that should be advertised to BGP
neighbors. See AS-Internal
Destination Injection.
no redistribute
433
Neighbor
The following parameters determine BGP behavior per neighbor:
Parameter
Description
Default Value
active
Whether IPv6 is enabled (active) or disabled (no
active) for the neighbor
no active
local-address
The local IP address from which to advertise BGP
updates to the neighbor
-(Uses closest interface to neighbor)
max-prefixes
The maximum number of destination networks
to receive from the neighbor
0
(=no limit)
password
Secret key for authentication of and to the
neighbor
no password
remote-as
The neighbor’s ASN
-(mandatory configuration)
shutdown
Whether the neighbor is administratively enabled
(no shutdown) or disabled (shutdown) for
shutdown
keepalive
Interval, in seconds, between messages
confirming connection health to the neighbor
30
holdtime
Interval, in seconds, after which the connection
with the neighbor is considered down if no
keepalive messages have been received from the
neighbor
90
Configuring BGP
You can configure BGP on a RAD router that is at the boundary of an AS, after the router itself has been
properly configured. To configure BGP properly, you need to know your network BGP design, including
the router’s IP address and ASN, designated BGP neighbors’ IP addresses and ASNs, whether IPv6 is
required, and the desired method of passing AS-internal destinations to BGP.
SecFlow-1p
6. Traffic Processing
434
When multiple VPN routers are configured on a device, each router should be configured with its own
instance of BGP. All of these BGP instances must share the same ASN.
BGP parameters are configured at the following levels:
•
Configuring BGP at Router Level: Parameters that determine BGP behavior for the whole
router, for all IP families and neighbors
•
Configuring BGP Neighbors: Per-neighbor parameters
•
Configuring IPv4/IPv6 Unicast Address Families: Parameters that characterize BGP behavior for
IPv4/IPv6 unicast address families.
Follow these steps to configure BGP:
1. Define the BGP router IP address and ASN (see Configuring BGP at Router Level).
2. Administratively enable BGP.
3. Define any necessary BGP neighbors, along with the remote AS to which the neighbor belongs
(see Configuring BGP Neighbors).
4. Administratively enable the BGP neighbors.
5. If it is necessary for BGP to be aware of AS-internal destinations that need to be advertised,
configure redistribution (of OSPF routes, static routes, and/or connected networks) or explicit
networks, for IPv4 and IPV6 unicast address families (see Configuring IPv4/IPv6 Unicast Address
Families).
6. For each BGP neighbor, if network design requires any non-default values for IPv4 and IPV6
unicast address families, configure the parameters (see Configuring Neighbor Parameters).
Configuring BGP at Router Level
 To configure BGP:
1. At the config>router(<number>)# prompt, type:
bgp <ASN>
The config>router(<number>)>bgp(<ASN>)# prompt is displayed.
Note
•
•
<ASN> is the number of the local AS where the router is located
Type no bgp <ASN> to remove BGP from the router (if no neighbors are
defined).
2. Enter all necessary commands according to the tasks listed below.
SecFlow-1p
6. Traffic Processing
435
Task
Command
Comments
Enabling BGP on the router
[no] bgp <ASN>
<ASN> is the number of the local
AS where the router is located.
Restarting a BGP session with
neighbor and reloading BGP
policy profiles
clear-neighbor <IP-address>
[soft]
<IP-address> is the neighbor’s IP
address (IPv4 or IPv6).
Configuring BGP parameters for
IPv4 or IPv6 unicast address
family
ipv4-unicast-af
ipv6-unicast-af
Configuring BGP neighbor
neighbor <IP-address>
If you specify soft, the link with
the neighbor is not reset, but
the BGP policy profiles are
reloaded.
See Configuring IPv4/IPv6
Unicast Address Families.
<IP-address> is the neighbor’s IP
address (IPv4 or IPv6). See
Configuring BGP Neighbors.
no neighbor <IP-address>
removes the neighbor from BGP
configuration.
SecFlow-1p
Defining IP address for the
router in BGP communications
6. Traffic Processing
router-id <IP-address>
| | +---neighbor <ipaddress>
| | | |
| | | +---active
| | | | no active
| | | |
| | | |
| | | +---route-map-bind
<name> {in|out}
| | | | no route-mapbind <name> {in|out}
| | | |
| | | +---show advertisedroute
| | | |
| | | +---show receivedroute
| | | |
| | | +---show route-map
| | |
| | +---network <prefix>
| | | no network <prefix>
| | |
| | +---redistribute
{connected|static|ospf}
| | | no redistribute
{connected|static|ospf}
| |
| +---ipv6-unicast-af
| | |
| | +---external-preference
<priority>
| | |
| | +---internal-preference
<priority>
| | |
| | +---neighbor <ipaddress>
| | | |
| | | +---active
436
To simplify management, the IP
address can be the actual IP
address of one of the router’s
interfaces, or there may be
some other organizational
convention.
Defining or changing the router
IP address requires BGP to be
administratively disabled
(shutdown).
SecFlow-1p
6. Traffic Processing
| | | | no active
| | | |
| | | |
| | | +---route-map-bind
<name> {in|out}
| | | | no route-mapbind <name> {in|out}
| | | |
| | | +---show advertisedroute
| | | |
| | | +---show receivedroute
| | | |
| | | +---show route-map
| | |
| | +---network <prefix>
| | | no network <prefix>
| | |
| | +---redistribute
{connected|static}
| | | no redistribute
{connected|static}
| |
| +---neighbor <ip-address>
| | no neighbor <ipaddress>
| | |
| | +---local-address <ipaddress>
| | | no local-address
| | |
| | +---max-prefixes
<number>
| | |
| | +---password <string>
[hash]
| | | no password
| | |
| | +---remote-as <asnumber>
437
SecFlow-1p
Task
6. Traffic Processing
Command
438
Comments
| | |
| | +---shutdown
| | | no shutdown
| | |
| | +---timers [keepalive
<keepalive>] [holdtime
<holdtime>]
| | |
| | +---show neighborconnection
| |
| +---router-id <ip-address>
| |
Displaying the IPv4 or IPv6
community table
show community { ipv4 | ipv6 }
See Viewing BGP Communities.
Displaying the IPv4 or IPv6 RIB
(Routing Information Base) table
show rib { ipv4 | ipv6 }
See Viewing BGP RIB.
Displaying summary of neighbor
connections information
show summary
See Viewing BGP Summary.
Administratively enabling or
disabling BGP on the router
[no] shutdown
To disable: shutdown; to
enable: no shutdown
When BGP is disabled,
operational status of BGP
neighbors moves down.
Configuring BGP Neighbors
You can define BGP neighbors to represent neighboring routers from which the BGP router entity
receives route updates and to which it advertises route updates.
 To configure BGP neighbors:
1. At the config>router(<number>)>bgp(<ASN>)# prompt, type:
neighbor <IP-address>
The config>router(<number>)>bgp(<ASN>)> neighbor(<IP-address>)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
SecFlow-1p
6. Traffic Processing
439
Task
Command
Comments
Defining the local IP address from
which to advertise BGP updates to
the neighbor
[no] local-address [<IP-address>]
local-address <IP-address> sets a
parameter value; no local-address
clears the parameter. When no
local address is set (default), BGP
uses the closest interface to the
neighbor.
The change takes effect only after
clear-neighbor or shutdown.
Setting the maximum number of
routes to accept from the neighbor
max-prefixes <prefixes>
<prefixes> is a number in range:
0–2147483647. 0 means no limit.
See Limiting Received Routes.
Change takes effect only after
clear-neighbor or shutdown.
Setting password for neighbor
session
[no] password <password> [hash]
The <password> can be up to 80
characters.
hash specifies that the password
should be encrypted.
no password deletes the password.
Change takes effect only after
clear-neighbor or shutdown.
Defining neighbor’s ASN
remote-as <ASN>
Available only when
communication with the neighbor
is disabled (shutdown).
Setting keepalive and holdtime
timers
timers <keepalive> <holdtime>
See BGP Session Timers
Viewing connectivity details
show neighbor-connection
See Viewing Neighbor Connection
Status
Enabling or disabling BGP
communication with the neighbor
[no] shutdown
To enable: no shutdown (requires
remote-as to have been
configured)
To disable: shutdown .
Change takes effect only after
clear-neighbor or shutdown.
SecFlow-1p
6. Traffic Processing
440
Configuring IPv4/IPv6 Unicast Address Families
The parameters for IPv4/IPv6 unicast address families are configured in the levels configure router
<number> bgp <ASN> ipv4-unicast-af and configure router <number> bgp <ASN> ipv6-unicast-af,
respectively. You can configure general parameters for the unicast address families, or neighbor
parameters.
Configuring Unicast Address Family Parameters
 To configure IPv4/IPv6 unicast address families:
1. At the config>router(<number>)>bgp(<ASN>)# prompt, type one of the following, according to
whether you wish to configure BGP parameters for IPv4 or IPv6 unicast address families:
 ipv4-unicast-af
 ipv6-unicast-af
The prompt config>router(<number>)>bgp(<ASN>)>ipv4-unicast-af# or
config>router(<number>)>bgp (<ASN>)>ipv6-unicast-af# is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Defining the preference index
for external BGP routes
external-preference
<priority>
<priority> should be an integer in range 1–255.
Defining the preference index
for internal BGP routes
internal-preference
<priority>
Note: the value of 255 is considered as
unreachable and the appropriate route is not be
added to the routing table.
See Routing Preferences.
Note: Priority can be changed at any time; the
change takes effect only after
clear-neighborclear-neighborclear-neighborclea
r-neighbor or shutdown.
Specifying a neighbor router
neighbor <IP-address>
See Configuring Neighbor Parameters.
Defining an explicit network
that should be advertised to
BGP neighbors as a
destination in this AS
network
<IP-address>/<netmask>
<IP-address> is the network’s IP address, and
<netmask> is the length of the network part
(CIDR notation).
Each added network requires a separate
command.
To delete the network entity: no network
<IP-address>/<netmask See AS-Internal
Destination Injection.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Defining non-BGP sources of
routes that should be
advertised to BGP neighbors
[no] redistribute
{connected | static | ospf}
To disable distribution: no redistribute {
connected | static | ospf}.
441
Each source protocol (connected, static, ospf)
requires a separate command.
For IPv6, only the connected and static options
are supported.
See AS-Internal Destination Injection.
Configuring Neighbor Parameters
 To configure BGP neighbor parameters under IPv4/IPv6 unicast address families:
1. At the prompt config>router(<number>)>bgp(<ASN>)> ipv4-unicast-af# or
config>router(<number>)>bgp(<ASN>)> ipv6-unicast-af#, type:
neighbor <IP-address>
The prompt config>router(<number>)>bgp(<ASN>)>ipv4-unicast-af>
neighbor(<IP-address>)# or config>router(<number>)>bgp(<ASN>)>
ipv6-unicast-af neighbor>(<IP-address>)# is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Enabling or disabling IPv4 or IPv6
BGP for the neighbor
[no] active
Enable – active
Disable – no active
You cannot type no active for IPv4,
as the address family IPv4 unicast is
always enabled for all neighbors.
Associating prefix list BGP policy
with the neighbor unicast address
family for incoming or outgoing
direction
prefix-list-bind <name> {in | out}
Type no before the command to
remove the association with the
prefix list.
Associating route map BGP policy
to the neighbor unicast address
family for incoming or outgoing
direction
route-map-bind <name>{in | out}
Type no before the command to
remove the association with the
route map.
Viewing routes advertised to the
neighbor
show advertised-route
See Viewing Advertised Routes.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Displaying any associated prefix list
policy profiles and rules related to
a BGP neighbor per AF
show prefix-list
See Viewing BGP Policy Profiles.
Viewing routes received from the
neighbor
show received-route
See Viewing Received Routes.
Displaying any associated route
map policy profiles and rules
related to a BGP neighbor per AF
show route-map
See Viewing BGP Policy Profiles.
442
Configuring BGP Policy Profiles
BGP policy profiles are configured at the router level. They can be prefix list or route map policy profiles
(see BGP Policies for more information). After changing a policy profile, you should use the command
clear-neighbor with the soft parameter, to ensure that the change is applied to the neighbor BGP
policies.
 To configure BGP policy profiles:
1. Navigate to configure router <number>.
2. Enter the necessary commands according to the table below.
3. See Configuring Prefix List Rules or Configuring Route Map Rules respectively, for commands to
configure the rules in a prefix list policy profile or route map policy profile.
Task
Command
Comments
Configuring prefix list
policy profile, for
IPv4/IPv6
prefix-list <name> {ipv4 | ipv6}
Type no prefix-list <name> to
delete the prefix list.
Configuring route map
policy profile
route-map <name>
Type no before the command to
delete the route map.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Resequencing the rules in
a policy profile
resequence <name> [<number>]
This command can be used when
you need to insert rules in the
middle of a policy profile.
443
<name> – name of the policy
profile
<number> – steps to insert
between the rule sequence
numbers. For instance, if you
specify 10, the rule sequence
numbers are changed to 10, 20, 30,
etc.
Range for <number>: 1–100000.
Configuring Prefix List Rules
 To configure the rules in a prefix list policy profile:
1. Navigate to configure router prefix-list <name> {ipv4 | ipv6}.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Comments
Removing a rule
delete <sequence>
<sequence> – sequence number of
the rule to delete
SecFlow-1p
6. Traffic Processing
444
Task
Command
Comments
Adding a deny rule
deny <prefix>/<length>
[ge <ge-value>] [le <le-value>]
[sequence <sequence>]
• <prefix>/<length> – prefix and
length identifying the network
that this rule matches, in the
following form according to
IPv4 or IPv6:
(IPv4) <IPv4 address>/<1–32>
(IPv6) <IPv6 address>/<1–128>
• ge – Rule matches packets with
prefix length greater than or
equal to <ge-value>.
• le – Rule matches packets with
prefix length less than or equal
to <le-value>.
• sequence – assigns <sequence>
as the sequence number of the
rule. Sequence number range:
1–2147483648
The ge and le parameters are
validated as follows:
• (IPv4) Prefix length <ge < le <=
32
• (IPv6) Prefix length <ge < le <=
128
Adding a permit rule
permit <prefix>/<length>
[ge <ge-value>] [le <le-value>]
[sequence <sequence>]
For an explanation of the
parameters, see the comments
above for the deny rule.
Adding a remark
remark [<description>] [sequence
<sequence>]
The description can contain up to
252 characters.
Configuring Route Map Rules
 To configure the rules in a route map policy profile:
1. Navigate to configure router route-map <name>.
2. Enter the necessary commands according to the tasks listed below.
SecFlow-1p
6. Traffic Processing
445
Task
Command
Comments
Removing a
rule
delete <sequence>
<sequence> – sequence number of the rule to delete
Adding a deny
rule
deny [match [as-path
string] [community string]
[ prefix-list string]
][sequence sequence>]
as-path – BGP AS Path that this rule uses to match to a
route in ASCII format; in regular expression format
(permitted length 0–127 characters).
Note: AS numbers are matched as decimal numbers. For
example, the AS number '0x0123' should be represented
in the regular expression string as '291'. A NULL string
indicates that the field is not in use.
community – BGP community that this rule matches, in
the form aa:nn (permitted length 0–127 characters). If
community is not specified, this rule matches all packets.
Note: Community has the new-format decimal notation.
For example, the community '0x00120101' should be
represented in the string as '18:257'.
prefix-list - BGP policy prefix-list profile name that this
rule matches; permitted length 0–80 characters
sequence – Assigns <sequence> as the sequence number
of the rule.
Sequence number range: 1–2147483648
Adding a
permit rule,
and optionally
specifying set
actions
permit[match [as-path
string] [community string]
[ prefix-list string] ][set
[as2-path-prepend string]
[as4-path-prepend string]
[community string] [localpreference number] [med
number] ][sequence
sequence>]
as-path – BGP AS Path that this rule uses to match to a
route in ASCII format; in regular expression format
(permitted length 0–127 characters).
Note: AS numbers are matched as decimal numbers. For
example, the AS number '0x0123' should be represented
in the regular expression string as '291'. A NULL string
indicates that the field is not in use.
community – BGP community that this rule matches, in
the form aa:nn (permitted length 0–127 characters). If
community is not specified, this rule matches all packets.
Note: Community has the new-format decimal notation.
For example, the community '0x00120101' should be
represented in the string as '18:257'.
prefix-list - BGP policy prefix-list profile name that this
rule matches; permitted length 0–80 characters
set – Specify set actions for BGP path attributes (see BGP
Path Attributes).
SecFlow-1p
Task
6. Traffic Processing
Command
446
Comments
as2-path-prepend/as4-path-prepend – Set AS prepend
(for 2/4 octets AS size) to <string>; permitted length 0–
127 characters
Note: You can define only one as-path-prepend
statement - as2-path-prepend or as4-path-prepend.
community – Set community to a string in the form
aa:nn (permitted length 0–127 characters.
local-preference – Set local preference to <number>.
Possible values: 0–4294967295
med – Set Multiple Exit Discriminator (MED) to
<number>.
Possible values: 0–4294967295
sequence – Assigns <sequence> as the sequence number
of the rule.
Sequence number range:
1–2147483648
Adding a
remark
remark [<description>]
[sequence <sequence>]
The description can contain up to 255 characters.
Examples
This section illustrates configuring BGP policy profiles.
 To configure prefix list (IPv4):
•
BGP AS = 65530
•
Neighbor IP address = 120.120.120.120
•
Permit routes with prefix 100.102.0.0/11, and prefix length 24–26
exit all
#****** Configure the prefix list
configure router 1
prefix-list subnetsIN ipv4
permit 100.102.0.0/11 ge 24 le 26 sequence 10
remark "permit 100.102.0.0/11 with prefix length 24 to 26" sequence 10000
exit
#****** Bind the prefix list
bgp 65530 ipv4-unicast-af neighbor 120.120.120.120
prefix-list-bind subnetsIN in
exit all
SecFlow-1p
6. Traffic Processing
#****** Reload BGP policy profiles for the neighbor
configure router 1 bgp 65530
clear-neighbor 120.120.120.120 soft
save
 To configure prefix list (IPv6):
•
BGP AS = 65530
•
Neighbor IP address = 78:78:78::78
•
Permit routes with prefix 123a:bbb1::/28 and prefix length 50–66
exit all
#****** Configure the prefix list
configure router 1
prefix-list subnetsIN ipv6
permit 123a:bbb1::/28 ge 50 le 66 sequence 10
remark "permit 123a:bbb1::/28 with prefix length 50 to 66" sequence 10000
exit
#****** Bind the prefix list
bgp 65530 ipv6-unicast-af neighbor 78:78:78::78
prefix-list-bind subnetsIN in
exit all
#****** Reload BGP policy profiles for the neighbor
configure router 1 bgp 65530
clear-neighbor 78:78:78::78 soft
save
 To configure route map (IPv4):
•
BGP AS = 65530
•
Neighbor IP address = 120.120.120.120
•
Deny subnets with community 1:10
exit all
#****** Configure the route map
configure router 1
route-map commIN
deny match community 1:10 sequence 10
remark "deny subnets with community 1:10" sequence 10000
exit
#****** Bind the route map
bgp 65530 ipv4-unicast-af neighbor 120.120.120.120
route-map-bind commIN in
exit all
447
SecFlow-1p
6. Traffic Processing
448
#****** Reload BGP policy profiles for the neighbor
configure router 1 bgp 65530
clear-neighbor 120.120.120.120 soft
save
 To configure route map (IPv6):
•
BGP AS = 65530
•
Neighbor IP address = 78:78:78::78
•
Permit subnets with community 1:10
exit all
#****** Configure the route map
configure router 1
route-map commIN
permit match community 1:10 sequence 10
remark "permit subnets with community 1:10" sequence 10000
exit
#****** Bind the route map
bgp 65530 ipv6-unicast-af neighbor 78:78:78::78
route-map-bind commIN in
exit all
#****** Reload BGP policy profiles for the neighbor
configure router 1 bgp 65530
clear-neighbor 78:78:78::78 soft
save
Example
In this example, a customer-premises RAD device has been placed at the boundary of an organization’s
network, which is an independent AS. The RAD device needs to be configured for BGP.
The only BGP neighbor is the Provider Edge (PE) router. Since this is a stub AS, it has been decided that
AS-internal destinations should be aggregated and manually defined (with the network command)
rather than enabling automatic redistribution. IPv6 is required for this network.
Device
IP
ASN
CPE ASBR (the device being
configured for BGP)
10.10.1.1
64515
PE (BGP neighbor)
10.10.10.1
613
SecFlow-1p
6. Traffic Processing
449
The configuration process for this example is:
#***** Configure BGP on router
configure router 1
bgp 64515
router-id 10.10.1.1
no shutdown
#***** define AS-internal networks for advertisement
ipv4-unicast-af
network 10.10.1.0/24
exit
ipv6-unicast-af
network fc00:1234:a1b1:0000:0000:0000:0000:0000/48
exit
#***** configure neighbor
neighbor 10.10.10.1
remote-as 613
no shutdown
exit all
save
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Cannot delete; BGP neighbor exist
You tried to run no bgp, but there
are configured BGP neighbors.
Delete all neighbors and try again.
Cannot create; AS number must be
equal for all BGP entities
You tried to define BGP with an
ASN different from the BGP ASN
configured for another router on
this device.
Use the same ASN for BGP on all
the device’s routers.
Cannot clear; unknown neighbor
You tried to run clear-neighbor on
an IP address that is not configured
for any defined BGP neighbor.
Use the correct IP address
configured for the neighbor.
Cannot set; AS number change
requires deletion of all BGP entities
You tried changing the BGP ASN
before deleting all BGP entities.
Delete all BGP entities, and then
change the ASN.
Cannot set; change requires bgp
shutdown
You tried to set the router-id with
BGP running.
Run shutdown and then try again.
Cannot activate; router-id number
must be set
You tried to enable BGP (no
shutdown) without having set the
router-id.
Set the router-id and try again.
SecFlow-1p
6. Traffic Processing
450
Message
Cause
Corrective Action
Cannot set; No such neighbor
You tried to enter an IP / neighbor
context, but you specified an IP
address that is not configured for
any neighbor.
Use the correct IP address
configured for the neighbor.
Cannot set; ipv4 unicast address
family always enable
You tried using the active
command in the IPv4 neighbor CLI
context.
IPv4 cannot be disabled for any
neighbors. If you meant to enable
or disable IPv6, navigate to
config>router(<number>)>bgp(<AS
N>)>ipv6-unicast-af>neighbor(<IPaddress>)# and try again.
Cannot activate; remote IP address
and AS number must be set
You tried to run no shutdown for a
BGP neighbor, but this neighbor
does not yet have an ASN.
Set the neighbor’s ASN (with the
remote-as command) and then try
again.
Cannot set; Hold time should be
greater than the keepalive time
You tried to run the timers
command with hold time less than
or equal to keepalive time.
Run the command again with hold
time greater than keepalive time.
Cannot bind; policy profile type
does not match
You tried to bind a policy profile
that does not match the required
policy type (prefix-list-ipv4 or
prefix-list-ipv6).
Change policy type to prefix-listipv4 or prefix-list-ipv6).
Cannot bind; prefix-list profile
already in use in match statement
You tried to bind prefix-list profile
when route-map profile with
‘match prefix-list’ statement is
already bound to the same BGP
connection.
Unbind route-map profile with
‘match prefix-list’ statement from
the BGP connection.
Cannot bind; no such policy profile
You tried to bind a policy profile
that does not exist.
Create the policy profile that you
want to bind.
Cannot bind; policy profile type
does not match
You tried to bind a policy profile
that does not match the required
type (route-map)
Bind the policy profile to routemap.
Cannot bind; address-family
mismatch with match statement
You tried to bind a route-map
profile with ‘match prefix-list’
statement with a prefix-list
address-family that is not identical
to bound connection addressfamily.
Create a prefix-list address-family
that is identical to bound
connection address-family.
SecFlow-1p
6. Traffic Processing
451
Message
Cause
Corrective Action
Cannot bind; prefix-list profile
already bound
You tried to bind a route-map
profile with ‘match prefix-list’
statement when prefix-list profile is
bound to the same BGP
connection.
Unbind prefix-list profile from the
BGP connection.
Cannot delete; prefix list is
matched in a route-map
You tried to delete a prefix –list
that is matched in a route-map.
Unbind the policy profile from all
entities bound to it.
Cannot create; name already in use
You tried creating a prefix-list
policy profile with a name that
already exists in the system.
Choose a unique name for the
newly created prefix-list policy
profile.
Cannot add statement; wrong
prefix address type
You tried adding a rule with an
address type (ipv4 or ipv6) that is
not related to the profile type.
Use the appropriate address type.
Cannot add statement; wrong
length parameters
You tried adding a rule with
incorrect length parameters.
Correct the length parameters so
that length < ge-value <= le-value
<= address length of family (32 or
128).
Cannot add statement; regular
expression is incorrect
The regular expression that you
entered does not translate into a
valid AS path.
Enter a new regular expression for
the AS path.
Cannot add statement; no such
policy profile
You tried adding a statement with
a prefix-list profile that does not
exist.
Create the prefix-list profile or use
an existing prefix-list profile.
Cannot add statement; prefix-list
address-family mismatch
You tried adding a statement with
a prefix-list profile address-family
that is different than similar
previous statements.
Use a prefix-list profile addressfamily that is similar to previous
statements.
Cannot add statement; the routemap is bound to bgp connection
with bound prefix-list
You tried adding a statement, but
the route-map profile (with the
new ‘match prefix-list’ statement)
is bound to a connection with a
bound prefix-list profile.
Unbind the route map from the
bgp connection.
Warning: prefix list profile contains
permit statement
You used a prefix-list profile that
contains at least one “permit”
statement.
Use another prefix-list profile or
remove all “permit” statements
from the current prefix-list profile.
SecFlow-1p
6. Traffic Processing
Message
Cause
Corrective Action
Set timer to ‘0’ requires holdtime =
keepalive = 0
You tried to run the timers
command with one 0 value. Either
both or neither must be 0.
Run the command again with
either both or neither parameter
being 0.
452
Viewing BGP Status
You can view the current configuration (see Viewing the Current Configuration), status of the
connection with each configured neighbor (see Viewing Neighbor Connection Status), and routes
received from and advertised to each neighbor (see Viewing Received Routes and Viewing Advertised
Routes). This information can be used for testing (see Testing BGP) and debugging.
Viewing the Current Configuration
To view the configuration, use the commands info (to include only non-default configuration) and info
detail (to include default configuration).
You can view this info at any of the following configuration levels:
Level
Context Prompt
Router
config>router(<number>)>bgp(<ASN>)#
IPv4/IPv6 unicast
address family
config>router(<number>)>bgp(<ASN>)>ipv4-unicast-af#
config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af#
Neighbor
config>router(<number>)>bgp(<ASN>)>neighbor(<IP-address>)#
IPv6 neighbor
config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af>neighbor(<IP-address>)#
For example:
config>router(1)>bgp(64515)# info detail
router-id 10.10.1.1
no shutdown
echo "BGP Neighbor Configuration"#
#
BGP Neighbor Configuration
neighbor 10.10.10.1
local-address 0.0.0.0
max-prefixes 0
password "" hash
remote-as 613
no shutdown
timers keepalive 30 holdtime 90
exit
SecFlow-1p
#
#
#
#
6. Traffic Processing
echo "IPv4 Unicast Address Family Configuration"
IPv4 Unicast Address Family Configuration
ipv4-unicast-af
external-preference 20
internal-preference 200
redistribute ospf
echo "IPv4 Unicast Address Family - Neighbor Configuration"
IPv4 Unicast Address Family - Neighbor Configuration
neighbor 10.10.10.1
active
exit
exit
echo "IPv6 Unicast Address Family Configuration"
IPv6 Unicast Address Family Configuration
ipv6-unicast-af
external-preference 20
internal-preference 200
echo "IPv6 Unicast Address Family - Neighbor Configuration"
IPv6 Unicast Address Family - Neighbor Configuration
neighbor 10.10.10.1
no active
exit
exit
Viewing Neighbor Connection Status
You can view connectivity details with any configured BGP neighbor by using the show
neighbor-connection command. This command is available in the BGP neighbor CLI context:
config>router(<number>)>bgp(<ASN>)>neighbor(<IP-address>)#. You can use this information for
troubleshooting and testing.
For example:
config>router(1)>bgp(64515)>neighbor(10.10.10.1)# show neighbor-connection
Remote Host: 10.10.10.1
Remote Port: 179
Local Host : 0.0.0.0
Local Port : 36586
Remote AS : 613
BGP State: Active
Hold Time (seconds) : 180
Up for 12d 06:23:53
Keepalive Interval (seconds): 60
Last Error : None
Neighbor Advertised Capabilities
--------------------------------------------------------------------------Address Family IPv4 Unicast : Advertised and received
Address Family IPv6 Unicast : Advertised and received
Route refresh
: Advertised and received
453
SecFlow-1p
6. Traffic Processing
Graceful Restart
Four Octet AS
454
: None
: Received
Viewing Received Routes
You can view the database of routes received from a particular neighbor by using the show receivedroute command. This command is available in the CLI contexts for IPv4 or IPv6 unicast address families,
at the neighbor level: config>router(<number>)>bgp(<ASN>)>ipv4-unicast-af>neighbor(<IP-address>)#
or config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af>
neighbor(<IP-address>)#.
To display the received routes for IPv4 unicast address families:
config>router(1)>bgp(1)>ipv4-unicast-af>neighbor(2.2.2.2)# show received-route
Network
> Next Hop
MED
LocPrf Path
================================================================================
0.0.0.0/0
> 172.17.171.1
1000
2000
3000 1000 100 2333
111.222.111.220/30 > 111.222.111.223 65200 65200 4000 800 65500
 To display the received routes for IPv6 unicast address families:
config>router(1)>bgp(1)>ipv6-unicast-af>neighbor(1:1:1:1::2)# show received-route
Network
> Next Hop
MED
LocPrf Path
================================================================================
::/0
> 11:11:11:11::1
1000
2000
3000 1000 100 2333
11:11:11:11::/64
> ::
1000
2000
3000 1000 100
abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200 65200 4000 80 65500
The above fields are:
Network
IPv4 or IPv6 network address (prefix and prefix length)
IPv4 prefix length can be 0–32; IPv6 prefix length can be 0–128.
Next Hop
Neighbor IPv4 or IPv6 address
MED
Number of Multi-exit Discriminators (in decimal value)
Possible values: 0–4294967295
LocPrf
Local preference
Possible values: 0–4294967295
Path
AS path details
SecFlow-1p
6. Traffic Processing
Viewing Advertised Routes
You can view the database of routes that are advertised to a particular neighbor by using the show
advertised-route command. This command is available in the CLI contexts for IPv4 or IPv6 unicast
address families, at the neighbor level: config>router(<number>)>bgp(<ASN>)>ipv4-unicastaf>neighbor(<IP-address>)# or config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af>
neighbor(<IP-address>)#.
 To display the advertised routes for IPv4 unicast address families:
config>router(1)>bgp(1)>ipv4-unicast-af>neighbor(1.1.1.1)# show advertised-route
A = advertised, S = suppressed, E = endingWithdrawal W = withdrawn
Network
> Next Hop
MED
LocPrf Path
================================================================================
A 0.0.0.0/0
> 172.17.171.1
1000
2000
3000 1000 100 2333
A 111.222.111.220/30 > 111.222.111.223 65200 65200 4000 800 65500
 To display the advertised routes for IPv6 unicast address families:
config>router(1)>bgp(1)>ipv6-unicast-af>neighbor(1:1:1:1::2)# show advertised-route
A = advertised, S = suppressed, E = endingWithdrawal W = withdrawn
Network
> Next Hop
MED
LocPrf Path
================================================================================
A ::/0
> 11:11:11:11::1
1000
2000
3000 1000 100 2333
S 11:11:11:11::/64
> ::
1000
2000
3000 1000 100
A abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200 65200 4000 80 65500
The above fields are:
Status
Status of route
Possible values are:
•
•
•
•
Neighbor
A – advertised
S – suppressed
E – endingWithdrawal
W – withdrawn
IPv4 or IPv6 network address (prefix and prefix length)
IPv4 prefix length can be 0–32; IPv6 prefix length can be 0–128.
Next hop
Neighbor IPv4 or IPv6 address
MED
Number of Multi-exit Discriminators (in decimal value)
Possible values: 0–4294967295
455
SecFlow-1p
LocPrf
6. Traffic Processing
456
Local preference
Possible values: 0–4294967295
Path
Network prefix and prefix length
Value: string with interpretation of two octets or four octets
Viewing BGP Policy Profiles
You can view the BGP policy profiles assigned to a particular neighbor by using the command show
prefix-list or show route-map. These commands are available in the CLI contexts for IPv4 or IPv6 unicast
address families, at the neighbor level: config>router(<number>)>bgp(<ASN>)>ipv4-unicastaf>neighbor(<IP-address>)# or config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af>
neighbor(<IP-address>)#.
 To display the prefix list policy profiles assigned to the neighbor 1.1.1.1 IPv4 unicast family:
config>router(1)>bgp(64515)>ipv4-unicast-af>neighbor(1.1.1.1)# show prefix-list
Name: aaaaaAAAAAbbbbbBBBBBcccccCCCCCdddddDDDDD (In)
10 deny 10.10.10.0/24 (hit count: 2)
20 permit 3.3.3.0/24 ge 25 le 27 (hit count: 35)
Name: XXXX (Out)
100000 permit 2.2.2.0/24 10 (hit count: 35)
 To display the prefix list policy profiles assigned to the neighbor 10:10:10::10 IPv6 unicast family:
config>router(1)>bgp(64515)>ipv6-unicast-af>neighbor(10:10:10::10)# show prefix-list
Name: aaaaaAAAAAbbbbbBBBBBcccccCCCCCdddddDDDDD (In)
100000 permit 1234:1234:1234:1234:1234:1234:1234:1234/100 ge 110 le 120
(hit count: 4294967295)
Name: XXXX (Out)
20 permit 2:2:2::0/64 (hit count: 15)
 To display the route map policy profiles assigned to the neighbor 1.1.1.1 IPv4 unicast family:
config>router(1)>bgp(64515)>ipv4-unicast-af>neighbor(1.1.1.1)# show route-map
Name: aaaaaAAAAAbbbbbBBBBBcccccCCCCCdddddDDDDD (In)
10 permit (hit count: 0)
match community 1:2
set community 2:3 med 456799 local-pref 123456
20 deny (hit count: 2)
match community 1000:2000
Name: XXXX (Out)
10 permit (hit count: 10)
match community 3000:4000
SecFlow-1p
6. Traffic Processing
457
set community 1000:2000 local-pref 110
20 permit (hit count: 1)
match community 100:200
40 permit (hit count: 2)
match as-path _150$ prefix-list AAAA community 10:20
set as2-path-prepend “100 100” community 30:40
 To display the route map policy profiles assigned to the neighbor 10:10:10::10 IPv6 unicast family:
config>router(1)>bgp(64515)>ipv6-unicast-af>neighbor(10:10:10::10)# show route-map
Name: aaaaaAAAAAbbbbbBBBBBcccccCCCCCdddddDDDDD (In)
10 permit (hit count: 0)
match community 1:2
set community 2:3 med 456799 local-pref 123456
20 deny (hit count: 2)
match community 1000:2000
Name: XXXX (Out)
10 permit (hit count: 10)
match community 3000:4000
set community 1000:2000 local-pref 110
20 permit (hit count: 1)
match community 100:200
40 permit (hit count: 2)
match as-path _150$ prefix-list AAAA community 10:20
set as2-path-prepend “100 100” community 30:40
The above fields are:
Name
Profile name
(In)/(Out)
Policy direction: inbound or outbound
Sequence number
Policy rule sequence number
Type
Policy rule type
Possible options are:
• Deny
• Permit
Route map rule
information
Route-map rule information
SecFlow-1p
6. Traffic Processing
458
Viewing BGP Communities
You can view the received communities of all neighbors by using the command show community. This
command is available in the CLI contexts for IPv4 or IPv6, at the BGP level:
config>router(<number>)>bgp(<ASN>)#.
 To display the IPv4 BGP communities received by all neighbors:
config>router(1)>bgp(1)# show community ipv4
Network
Community
===============================================================
Neighbor 2.2.2.2
0.0.0.0/0
65000:65000
111.222.111.220/30
20:20
Neighbor 33.33.33.33
0.0.0.0/0
1000:2000
111.222.111.220/30
100:100 200:200 300:300 400:400
 To display the IPv6 BGP communities received by all neighbors:
config>router(1)> bgp(1)# show community ipv6
Network
Community
=============================================================================
Neighbor 2:2:2:2::2
::/0
> 11:11:11:11::1
65000:65000 1000:2000 3000:1000
11:11:11:11::/64
> ::
1000:2000
abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200:65200
Neighbor 33:33:33:33::33
::/0
> 11:11:11:11::1
20:30
11:11:11:11::/64
> ::
400:400
abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200:65200 4000:65500
The above fields are:
Neighbor
Neighbor IPv4 or IPv6 address
Network
IPv4 or IPv6 network address (prefix and prefix length)
IPv4 prefix length can be 0–32; IPv6 prefix length can be 0–128.
Community
Decimal value, in format xxxx:yyyy
Possible values: 00000:00000–65535:65535
SecFlow-1p
6. Traffic Processing
459
Viewing BGP RIB
You can view the BGP RIB (Routing Information Base) for each neighbor by using the command show rib.
This command is available in the CLI contexts for IPv4 or IPv6, at the BGP level:
config>router(<number>)>bgp(<ASN>) #.
 To display the IPv4 BGP RIB:
config>router(1)>bgp(1)# show rib ipv4
* = Best Route
Network
> Next Hop
MED
LocPrf Path
=============================================================================
Neighbor 2.2.2.2
* 0.0.0.0/0
> 172.17.171.1
1000
2000
3000 1000 100 2333
* 111.222.111.220/30 > 111.222.111.223 65200 65200 4000 800 65500
Neighbor 33.33.33.33
0.0.0.0/0
> 172.17.171.1
1000
2000
3000 1000 100 2333
111.222.111.220/30 > 111.222.111.223 65200 65200 4000 800 65500
 To display the IPv6 BGP RIB:
config>router(1)> bgp(1)# show rib ipv6
* = Best Route
Network
> Next Hop
MED
LocPrf Path
=============================================================================
Neighbor 2:2:2:2::2
* ::/0
> 11:11:11:11::1
1000
2000
3000 1000 100 2333
11:11:11:11::/64
> ::
1000
2000
3000 1000 100
* abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200 65200 4000 80 65500
Neighbor 33:33:33:33::33
::/0
> 11:11:11:11::1
1000
2000
3000 1000 100 2333
* 11:11:11:11::/64
> ::
1000
2000
3000 1000 100
abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd/126
> abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd
65200 65200 4000 80 65500
The above fields are:
Neighbor
Neighbor IPv4 or IPv6 address
Status (Best Route)
Marks with a “*” the ‘Best Route’, i.e. the route entry
forwarded to the Router’s RIB (Routing Information Base)
Network
IPv4 or IPv6 network address (prefix and prefix length)
IPv4 prefix length can be 0–32; IPv6 prefix length can be 0–128.
Next hop
Network prefix and prefix length
SecFlow-1p
6. Traffic Processing
MED
460
Number of Multi-exit Discriminators (in decimal value)
Possible values: 0–4294967295
LocPrf
Local preference
Possible values: 0–4294967295
Path
Network prefix and prefix length
Value: string with interpretation of two octets or four octets
Viewing BGP Summary
You can view the summary of neighbor connections information by using the command show summary.
This command is available in the CLI contexts for IPv4 and IPv6, at the BGP level:
config>router(<number>)>bgp(<ASN>)#.
IPv4 AF connections appear on top, followed by IPv6 AF connections.
 To display the BGP summary:
config>router(1)>bgp(1)# show summary
Neighbor
AS
Up/Down
State
=============================================================================
11:11:11:11::205
209
never
Active
3.3.3.2
3000
never
Idle
172.17.171.205
209
12d 06:23:53 Established
172.17.171.218
209
12d 06:23:53 Active
abcd:abcd:abcd:abcd:abcd:abcd:abcd:abcd 65200 never
Active
The above fields are:
Neighbor
Neighbor IPv4 or IPv6 address
AS
Remote AS number
Possible values: 0..35655 or 0..4294967295
Up/Down
Amount of time that the underlying TCP connection has been in existence, i.e.
how long this peer has been in the Established state.
Note: Up/Down time is set to zero when a new peer is configured or the
router is booted.
Possible values: 0 - 4294967295 seconds
When up/down time = 0, displays “never”.
Otherwise displays in format number of days, hours, minutes, and seconds,
for example: “12d 06:23:53”
SecFlow-1p
State
6. Traffic Processing
461
BGP session state
Possible values are:
•
•
•
•
•
•
Idle
Connect
Active
Opensent
Openconfirm
Established
After configuring BGP on a router in an existing BGP environment, you should test that BGP is working
properly.
 To test BGP:
1. Wait a few seconds after configuration for BGP communications to take place.
2. For each configured BGP neighbor:
a. Navigate to the BGP neighbor CLI context
(config>router(<number>)>bgp(<ASN>)>neighbor(<IP-address>)#).
b. Enter show neighbor-connection and check that communication has been successfully
established.
c. Navigate to the IPv4 unicast address family neighbor context
(config>router(<number>)>bgp(<ASN>)>ipv4-unicast-af>
neighbor(<IP-address>)#).
d. Enter show advertised-route and check that the correct destination routes are being
advertised.
e. Enter show received-route and check that BGP routes are being received.
3. If IPv6 has been configured for this neighbor:
a. Navigate to the IPv6 unicast address family neighbor context
(config>router(<number>)>bgp(<ASN>)>ipv6-unicast-af>
neighbor(<IP-address>)#).
b. Enter show advertised-route and check that the correct destination routes are being
advertised.
c. Enter show received-route and check that BGP routes are being received.
4. Navigate out of the BGP context, to the router CLI context.
5. Enter show routing-table and check that there are new routes marked as originating in BGP.
SecFlow-1p
6. Traffic Processing
462
6.10 Routing Protocol OSPF
Open Shortest Path First (OSPF) is a link-state interior-gateway protocol for dynamic routing. The
current implementation is OSPFv2 (handles IPv4 only).
Applicability and Scaling
The following functionality is not supported in OSPF version 2:
Note
OSPF does not support the BFD protocol.
Standards Compliance
Standard
Name
Unsupported functionality
RFC 2328
OSPF Version 2
• IPv6 (supported only in OSPF v.3)
• Multiple OSPF instances on a router
• Area-to-backbone virtual links
RFC 3101
The OSPF Not-So-Stubby Area (NSSA) Option
RFC 3509
Alternative Implementations of OSPF Area
Border Routers
RFC 4750
OSPF Version 2 Management Information Base
RFC 4940
IANA Considerations for OSPF
Benefits
Dynamic routing protocols enable routing tables to automatically adapt to changing networks. Link-state
dynamic routing protocols such as OSPF quickly adapt to network changes, enable intelligent decisions
for best routing paths, and are highly scalable.
All the routers in an Autonomous System (AS) must use the same Interior Gateway Protocol (IGP).
SecFlow-1p
6. Traffic Processing
463
Functional Description
OSPF functionality is explained in the following sections.
Dynamic Routing Protocols
Routers direct packets through their various interfaces according to their routing tables, which specify
an exit interface for each destination IP network. While routing tables can include static, manually
configured routes, an optimized routing table requires knowledge of remote network topology and
complex path calculations. Dynamic routing protocols define how routers communicate network
topology with each other and how they accordingly calculate optimized network paths and create their
routing tables.
The internet is divided into Autonomous Systems (AS). An AS is usually the network of an Internet
Service Provider (ISP) or another large organization that administers the AS-internal routing policy.
Routing information inside each AS is communicated and determined by an Interior Gateway Protocol
(IGP) such as OSPF; Routing information between ASes is communicated by the Border Gateway
Protocol (BGP).
Link-State Routing
Link-state routing is one of the two main types of IGPs, along with distance-vector routing. OSPF is a linkstate routing protocol.
In link-state protocols, each router creates and maintains a relatively full map of network connectivity.
The connectivity map, called the Link-State Database (LSDB), includes information on which routers are
connected to which other routers, and each connection’s cost metric, which takes into account things
like round-trip time, throughput, and link availability. The map’s completeness enables the router to
intelligently calculate the optimal path from itself to any network destination, without having to rely on
partial path calculations made in other parts of the network. These optimal paths are used to
dynamically create a routing table.
To supply information for LSDBs, each router in the network notifies the network about its own
immediate neighboring routers and the costs of its connections with them. Routers collect this link-state
information and issue Link-State Advertisements (LSAs) to their neighbors. Upon receiving an LSA, each
router updates its LSDB.
To inform their neighbors of their existence, routers send periodical HELLO messages. When HELLO
messages stop coming from a router, the connection with that router is considered to have failed, and
an LSA is generated to inform the network of the lost connection.
SecFlow-1p
6. Traffic Processing
464
OSPF Network Architecture
To reduce routing traffic and LSDB size, an AS that uses OSPF is divided into OSPF areas. Each area is a
group of contiguous networks which appears to OSPF externally as a single unit with an invisible internal
topology.
The AS must have a single designated backbone area so that each other area is directly connected to the
backbone. A router that connects an area to the backbone (that is, it has an interface in the backbone
and an interface in another area) is called an Area Border Router (ABR). An ABR summarizes its area’s
topology for external distribution, and maintains an LSDB for all areas to which it is connected.
AS-External Information
To enable routing to destinations outside the AS, designated Autonomous System Boundary Routers
(ASBRs) receive topology information about other ASs, and distribute it to internal routers. ASBRs can be
configured whether to distribute topology from specified external sources (static routes or from BGP).
However, to reduce traffic, LSDB size, and routing table size, areas can be configured so that only the
area ABR is aware of the AS-external topology, and the internal routers route traffic with destinations
outside the AS through the ABR. Two types of such areas can be configured:
SecFlow-1p
6. Traffic Processing
465
Stub Area
Cannot originate nor import AS-external topology. Internal routers in this area
route through the ABR.
Not So Stubby Area (NSSA)
Cannot originate but can import AS-external topology
An area which is neither stub nor NSSA is called a transit area. The backbone area must always be a
transit area.
Link-State Summarization
For AS-internal topology information, there is by default no difference between the different types of
non-backbone areas: ABRs of stub, NSSA and transit (except for backbone) areas summarize AS-internal,
area-external link-state information for distribution to area-internal routers. However, a stub or NSSA
ABR can be optionally configured to suppress summary-LSAs, instead becoming the area’s single default
gateway.
Designated Routers
To reduce network traffic, each network selects a Designated Router (DR) to send LSAs outside of the
network. A Backup Designated Router (BDR) is also selected in case of DR failure. Routers are selected
according to configurable router priority indexes (lowest number indicates highest priority).
Authentication
OSPF can be configured to perform authentication, in which case OSPF information is accepted only
from password-authenticated routers.
Routing Preferences
When there are conflicts between routes received from different sources, such as static routes, OSPF
AS-internal routes, and OSPF AS-external routes, the Routing Table Manager (RTM) chooses among the
sources according to configurable source preference indices (lowest number indicates highest priority).
Explicit Range Aggregation
To reduce route lists, explicit ranges can be configured to replace included subnets. Specifically, internal
IP address ranges can be configured to be summarized by a transit area ABR, or external IP address
SecFlow-1p
6. Traffic Processing
466
ranges can be aggregated by an NSSA ABR. For a transit area ABR, an internal range can also be
configured to be hidden from other areas.
Maintained Information
OSPF maintains the following network information, all of which can be viewed (see Viewing OSPF
Status):
•
Neighbor list
•
Interface information
•
LSDB
•
LSA counters (see Viewing OSPF Statistics)
Factory Defaults
OSPF parameters are configured at these levels:
•
Configuring OSPF at the Router Level: Parameters that determine OSPF behavior for the whole
router, for all interfaces
•
Configuring OSPF at the Area Level: Parameters that characterize an area, for all interfaces that
are configured as belonging in this area
•
Configuring OSPF at the Interface Level: Per-interface parameters
Router OSPF Parameters
The following parameters determine OSPF behavior for the whole router, for all interfaces:
Parameter
Description
Default Value
external-preference
Preference index for OSPF AS-external routes. See
Routing Preferences.
110
internal-preference
Preference index for OSPF AS-internal routes. See Routing
Preferences.
10
ospf
Whether OSPF configuration is defined (but not
necessarily enabled) on this router
no ospf
redistribute
Whether to distribute routes from specified external
sources (connected, static or BGP) to the rest of the AS.
See AS-External Information.
no redistribute
SecFlow-1p
6. Traffic Processing
467
Parameter
Description
Default Value
router-id
ID for router in OSPF communications, in format like IP
address. Must be unique in AS
-(mandatory configuration)
shutdown
Enable (no shutdown) / disable (shutdown) OSPF on the
router.
shutdown
Area OSPF Parameters
The following parameters characterize an area (see OSPF Network Architecture), for all interfaces that
are configured as belonging in this area:
Parameter
Description
Default Value
area-id
ID for area in OSPF communications. Must be unique in AS.
Format is like IP address. Can be same as IP address of a
network in the area. Backbone area must have ID 0.0.0.0
--
default-cost
Cost metric of default route, for stub area ABR to advertise
into the area. See Link-State Routing.
1
nssa
Whether area is NSSA, and whether the area ABR will provide
area routers with summary LSAs (or just rely on its default
route). See AS-External Information and Link-State
Summarization.
no nssa, no-summary
range
Internal IP address range(s) to be summarized or hidden by a
transit area ABR, or external IP address range(s) to be
aggregated by an NSSA ABR. See Explicit Range Aggregation.
--
shutdown
Enable (no shutdown) / disable (shutdown) the area
shutdown
stub
Whether area is a stub area, and whether the area ABR will
provide area routers with summary LSAs (rather than just rely
on its default route). See AS-External Information and LinkState Summarization.
no stub, no-summary
Interface OSPF Parameters
The following parameters determine OSPF behavior per-interface:
Parameter
Description
Default Value
area
ID of area to which interface belongs. See OSPF Network
Architecture.
no area
SecFlow-1p
6. Traffic Processing
Parameter
Description
Default Value
authentication-key
Password for OSPF authentication. See Authentication.
--
authentication-type
Whether OSPF information should be passwordauthenticated. See Authentication.
no authentication
dead-interval
Time after which the connection with a silent neighbor is
considered failed. See Link-State Routing.
40
hello-interval
Time, in seconds, between sending HELLO packets. See LinkState Routing.
10
metric
Explicit network cost of the interface for OSPF path
calculation. See Link-State Routing.
1
ospf
Whether OSPF configuration is defined (but not necessarily
enabled) on this interface
no ospf
passive
Whether OSPF packets can (no passive) or cannot (passive)
be sent through this interface
no passive
priority
Priority index for becoming DR or BDR. See Designated
Routers.
1
retransmit-interval
Time, in seconds, between retransmissions of
unacknowledged adjacency LSAs and of other network
advertisements. See Link-State Routing.
5
shutdown
Enable (no shutdown) / disable (shutdown) OSPF on the
interface
shutdown
transit-delay
Time, in seconds, to be added to the LSA’s age before
transmission. Should be the estimated time of LSA
transmission over the interface including propagation delays
1
468
Configuring OSPF
OSPF is not configured by default on RAD routers. On a router that does not have OSPF defined, once
the router itself and its interfaces have been properly configured, you can configure OSPF. To configure
OSPF properly, you will need to know your network OSPF design.
 To configure OSPF on a fresh router:
1. Define OSPF on the router by entering the following commands in the device CLI:
configure
router <number>
SecFlow-1p
6. Traffic Processing
469
ospf
OSPF is defined on the router, and the CLI ospf context is provided.
2. In the router ospf context, define the router ID:
router-id <id>
where <id> is an ID for the router in OSPF communications, in IP address format (<0-255>.<0255>.<0-255>.<0-255>). The ID must be unique in the AS. To simplify management, the ID can
be the actual IP address of one of the router’s interfaces, or there may be some other
organizational convention.
3. Where network design requires that this router have non-default values (see Parameters and
Factory Defaults) for any router-level OSPF parameters, configure them (see Configuring OSPF
at the Router Level).
4. Still in the router ospf context, enable OSPF on the router by entering:
no shutdown
5. Configure each OSPF area (see OSPF Network Architecture) that the router should be in
according to network design:
d. In the router OSPF context (config>router(<router_number>)>ospf#), define the are ID:
area <area-id>
where <area-id> is an ID for the area in OSPF communications, in IP address format (<0255>.<0-255>.<0-255>.<0-255>). The ID must be unique in the AS. To simplify management,
the ID can be the actual IP address of a network in the area, or there may be some other
organizational convention. The backbone area ID must be 0.0.0.0 .
The area is defined, and the CLI area context is provided.
e. In the area context (config>router(<router_number>)>ospf>area(<area-id>)#):

If according to network design the area should be a stub area, enter:
stub

If according to network design the area should be an NSSA area, enter:
nssa
f.
Where network design requires that this router have non-default values (see Parameters
and Factory Defaults) for any area-level OSPF parameters, configure them (see Configuring
OSPF at the Area Level).
g. Still in the area context, enable the area by entering:
no shutdown
An enabled area means that OSPF interfaces connected to it can be enabled, and that the
area’s type (stub / NSSA / transit) cannot be changed.
h. Exit the area context.
SecFlow-1p
6. Traffic Processing
470
6. Exit the router OSPF context to return to the router CLI context.
7. Configure OSPF on each interface:
a. Go into the interface CLI context (config>router(<router_number>)>
interface(<interface_number>)#), and define OSPF on the interface:
ospf
OSPF is defined on the interface, and the CLI interface ospf context is provided.
b. In the interface OSPF context, set the area with which to associate the interface:
area <area-id>
where <area-id> is the area’s ID, according to network design.
c. Where network design requires that this interface have non-default values (see Parameters
and Factory Defaults) for any interface-level OSPF parameters, configure them (see
Configuring OSPF at the Interface Level).
d. Still in the interface OSPF context, activate OSPF on the interface by entering:
no shutdown
e. Exit the interface OSPF context, and exit the interface context.
Configuring OSPF at the Router Level
The following commands are available in the CLI router OSPF context:
config>router(<router_number>)>ospf# . The exception to this is the ospf command itself, which is
performed in the router context: config>router(<router_number>)# .
Task
Command
Comments
Define OSPF on the router (if not yet
defined), and provide the router CLI
ospf context
[no] ospf
After defining OSPF on the router, OSPF still
needs to be enabled (after setting router-id)
with no shutdown.
no ospf removes OSPF from the router (if no
areas are defined).
Define ID for the router in OSPF
communications
router-id <id>
<id> is in IP address format: <0-255>.<0255>.<0-255>.<0-255> . The ID must be unique
in the AS. To simplify management, the ID can
be the actual IP address of one of the router’s
interfaces, or there may be some other
organizational convention.
SecFlow-1p
6. Traffic Processing
471
Task
Command
Comments
Enable / disable OSPF on the router
[no] shutdown
To disable: shutdown . To enable: no
shutdown
Define / remove OSPF area, with an
ID for the area in OSPF
communications
[no] area <area-id>
<area-id> is in IP address format: <0-255>.<0255>.<0-255>.<0-255>. The ID must be unique
in the AS. To simplify management, the ID can
be the actual IP address of a network in the
area, or there may be some other
organizational convention. The backbone area
ID must be 0.0.0.0 .
no area <area-id> removes the area from
router OSPF configuration (if the area is not
associated with any interfaces).
To further configure the area, see Configuring
OSPF at the Area Level
Set ASBR to distribute routes from
specified external sources (static or
BGP) to the rest of the AS, or disable
distribution
[no] redistribute
{connected | static |
bgp}
To disable distribution: no redistribute .
Set preference index for OSPF ASexternal routes
external-preference
<priority>
<priority> should be an integer in range 1–255.
See AS-External Information
Note: The redistribute bgp command does not
work for local BGPs. To redistribute routes into
local (directly connected) OSPF and advertise
the BGP, use redistribute connected.
Note: the value of 255 is considered as
unreachable and the appropriate route is not
be added to the routing table.
See Routing Preferences
Set preference index for OSPF ASinternal routes
internal-preference
<priority>
<priority> should be an integer in range 1–255.
Note: the value of 255 is considered as
unreachable and the appropriate route is not
be added to the routing table.
See Routing Preferences
View Link-State Database (LSDB)
show database
View OSPF interface information
show interface-table
View OSPF neighbors
show neighbor-table
See Viewing OSPF Status
SecFlow-1p
6. Traffic Processing
472
Configuring OSPF at the Area Level
The following commands are available in the CLI OSPF area context:
config>router(<router_number>)>ospf>area(<area-id>)# . Note that the area command, which is
performed in the router OSPF context: config>router(<router_number>)>ospf#, appears under
Configuring OSPF at the Router Level.
Task
Command
Comments
Setting cost metric of
default route, for stub
area ABR to advertise
into the area
default-cost <metric>
Use only on stub area ABR.
Making area an NSSA
area, or changing an
NSSA area back to a
transit area
[no] nssa [summary |
no-summary]
Possible values: 1–16777215 (24-bit)
See Link-State Routing.
All routers in an NSSA area must be configured as
such. See AS-External Information.
This command is effective regardless of the area’s
current type (transit or stub).
For the area ABR to just rely on its default route
rather than provide area routers with summary
LSAs, use nssa no-summary. For it to go back to
providing summary LSAs, use nssa summary. See
Link-State Summarization.
To change an NSSA area back to a transit area, use
no nssa
Setting internal IP
address range(s) to be
summarized or hidden
by a transit area ABR
[no] range <ip-address>/
<mask-length> [advertise |
not-advertise]
To set internal transit area summarization, on the
transit ABR use: range <ip-address>/<mask-length>
advertise.
To set internal transit area hiding, on the transit ABR
use: range <ip-address>/<mask-length> notadvertise.
<ip-address> should represent an IP range, in IP
address format. <mask-length> should be an integer
in range 1–32, representing the number of first bits
in <ip-address> that are the network mask.
To delete a configured range, use: no range <ipaddress>/<mask-length>.
See Explicit Range Aggregation.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Making area a stub area,
or change a stub area
back to a transit area
[no] stub [summary |
no-summary]
All routers in a stub area must be configured as
such. See AS-External Information.
473
This command is effective regardless of the area’s
current type (transit or NSSA).
For the area ABR to just rely on its default route
rather than provide area routers with summary
LSAs, use stub no-summary . For it to go back to
providing summary LSAs, use stub summary. See
Link-State Summarization.
To change a stub area back to a transit area, use no
stub
Enable / disable the area
[no] shutdown
To disable: shutdown. To enable: no shutdown
Configuring OSPF at the Interface Level
The following commands are available in the CLI interface OSPF context:
config>router(<router_number>)>interface(<interface_number>)>ospf# . The exception to this is the
interface ospf command, which is performed in the interface OSPF context:
config>router(<router_number>)>interface(<
interface_number>)# .
Task
Command
Comments
Define OSPF on the
interface (if not yet
defined), and provide the
interface CLI ospf context
ospf
After defining OSPF on the interface, OSPF still
needs to be enabled (after associating the
interface with an area) with no shutdown.
Associate interface with an
area
[no] area <area-id>
Set password
authentication for OSPF
communications
[no] authentication-type
[simple-password]
no ospf removes OSPF from the interface (if no
areas are defined)
Specify the area with its <area-id>.
To disassociate the interface from any area, use
no area <area-id>.
To set authentication, use: authentication-type
password . To disable authentication, use: no
authentication.
See Authentication.
SecFlow-1p
6. Traffic Processing
474
Task
Command
Comments
Set password for OSPF
authentication, if enabled
authentication-key
<authentication-key> [hash]
<authentication-key> can be any combination
of up to 8 ASCII characters. Use the hash option
to specify that the provided key should be
encrypted, in which case the key can be up to
22 characters.
See Authentication.
Enable / disable OSPF on
the interface
[no] shutdown
To disable: shutdown . To enable: no shutdown
Set the time after which the
connection with a silent
neighbor is considered
failed
dead-interval <seconds>
Possible values: 1–2147483647.
Set the time between
sending HELLO packets
hello-interval <seconds>
Explicitly set the network
cost of the interface for
OSPF path calculation
metric <number>
Set the priority index for
becoming DR or BDR
priority <priority>
Prevent OSPF packets from
being sent through the
interface
[no] passive
See Link-State Routing.
<seconds> should be in range 1–65535.
See Link-State Routing.
Possible values: 1–65535
See Link-State Routing.
Possible values: 0–255.
See Designated Routers
A passive interface is still advertised as an OSPF
interface, but doesn’t itself run the OSPF
protocol.
To re-enable sending OSPF packets, use no
passive
Set the time between
retransmissions of
unacknowledged adjacency
LSAs and of other network
advertisements
retransmit-interval <seconds>
Set the time to be added to
the LSA’s age before
transmission
transit-delay <seconds>
Possible values: 0–3600.
See Link-State Routing.
The estimated time of LSA transmission over
the interface including propagation delays
Possible values: 0–3600
SecFlow-1p
6. Traffic Processing
475
Example
In this example, a router needs to be configured for OSPF. According to network design, this router is a
stub area ABR with two interfaces, one in the backbone and one in a stub area. Authentication is used in
both areas, but each area uses a different password.
The relevant part of the network design is:
Router ID
Interface
Area
Password
10.10.1.1
Interface 1
0.0.0.0
12345672
Interface 2
10.10.0.0
abcdefgh
The actual configuration process for this example is:
configure
router 1
remark Configure OSPF on router
ospf
router-id 10.10.1.1
no shutdown
remark Configure OSPF Areas
area 0.0.0.0
no shutdown
exit
area 10.10.0.0
stub no-summary
no shutdown
exit
exit
remark Configure OSPF with authentication on interfaces
interface 1
ospf
area 0.0.0.0
authentication-type simple-password
authentication-key 12345678
no shutdown
exit
exit
interface 2
ospf
area 10.10.0.0
authentication-type simple-password
authentication-key abcdefgh
no shutdown
exit
exit
SecFlow-1p
6. Traffic Processing
476
Configuration Errors
The table below lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Cannot be modified; OSPF interface
is administratively enabled
You tried to associate an interface with
an area, but the interface is OSPFenabled
Enter shutdown and try again.
Cannot create OSPF interface; IP
address wasn’t configured
You tried to run ospf in the interface
context, but the interface itself has no
fixed IP address (it is possibly DHCP)
Set a fixed IP address for the
interface.
Cannot create OSPF interface; more
than one IP address is configured
You tried to run ospf in the interface
context, but the interface itself has
multiple IPv4 addresses
Remove interface IP addresses
to leave only one, and try
again.
Cannot delete area; There is an
OSPF interface associated with the
Area
You tried to run no area (router OSPF
context) on an area associated with an
interface
Go to the relevant interface
OSPF context and enter no
area <area-id>.
Cannot delete ospf; ospf area or
OSPF interface exist
You tried to run no ospf (router context)
with existing areas or OSPF interfaces
Remove OSPF from all
interfaces, delete all areas, and
try again.
cannot enable OSPF interface; areaid is not defined
You tried to enable OSPF on an interface
without an associated area
Set an area for the interface
and try again.
Cannot enable OSPF; router-id is
not configured
You tried to run no shutdown (router
OSPF context) with no OSPF router ID
Set router-id and try again.
Cannot execute, license required
You tried to run ospf (router context)
without an OSPF license
Contact your RAD sales
representative to obtain a
license.
Cannot modify area parameter;
area is administratively enable
You tried to make an enabled area into
a stub or NSSA
Enter shutdown and try again.
Cannot modify; OSPF is enabled
You tried to change router-id with OSPF
enabled
Enter shutdown and try again.
Cannot set area as nssa; area-id
0.0.0.0 cannot be nssa
You tried to make the backbone a stub
or NSSA
If this is not the backbone,
change the area ID and try
again.
Cannot set metric; Area is a Transit
You tried to run the default-cost
command on a transit area
If this area should be a stub
area, enter stub and try again.
SecFlow-1p
6. Traffic Processing
477
Message
Cause
Corrective Action
OSPF entity shall be initiated before
interface’s configuration
You tried to run ospf in the interface
context, but OSPF hasn’t been defined
on the router
Exit to the router context and
enter ospf. Then try again.
Viewing OSPF Status
You can view the current configuration (see Viewing the Current Configuration), and you can also view
several types of dynamic and traffic-based OSPF information (see sections below). This information can
be used for testing (see Testing OSPF) and debugging.
Viewing the Current Configuration
To view the current configuration, use the standard RAD commands: info (to view only non-default
configuration) and info detail (to include default configuration).
You can view this info at any of the following configuration levels:
Level
Context Prompt
Router
config>router(<router_number>)>ospf#
Area
config>router(<router_number>)>ospf>area(<area-id>)#
Interface
config>router(<router_number>)>interface(<interface_number>)>ospf#
For example:
configure
config# router 1
config>router(1)# ospf
config>router(1)>ospf# info detail
router-id 1.2.3.4
external-preference 110
internal-preference 30
shutdown
echo "OSPF AREA Configuration"
#
OSPF AREA Configuration
area 0.0.0.0
no nssa
no stub
no shutdown
exit
config>router(1)>ospf#
SecFlow-1p
6. Traffic Processing
478
Viewing the Link-State Database
You can view the current Link-State Database by using the show database command. This command is
available in the CLI router OSPF context: (config>router(<router_number>)>ospf#), and can be used for
testing (see Testing OSPF) and debugging.
For example:
Area ID
Type
LS ID Router ID
Sequence
Age
Checksum
-------------------------------------------------------------------------------100.100.100.100
1
000.000.010.010
000.000.010.010
0x80000096
0x609b
100.100.100.100
1
050.050.050.020
050.050.050.020
0x80000006
0x49d4
000.000.000.000
2
020.020.020.020
020.020.020.030
0x80000008
0x3c3a
000.000.000.000
3
050.050.050.000
000.000.010.010
0x8000000d
0xcbd9
000.000.000.000
4
000.000.010.010
050.050.050.020
0x80000002
0x83f7
938
839
946
764
840
The above fields are:
Area ID
<area-id> of an OSPF area
Type
One of the following LSA types:
1 – Router-LSA: Describes collected states of router's interfaces
2 – Network-LSA: Describes routers attached to network
3 – Network summary-LSA: Describes inter-area routes to networks, summarized by
ABR
4 – ASBR summary-LSA: Describes inter-area routes to ASBRs, summarized by ABR
5 – AS-external-LSA: Originated by ASBR, describes routes to AS-external
destinations or a default route for the AS
7 – NSSA-external-LSA: Describes external route information within an NSSA
LS ID
Router ID or IP address (depending on Type) of domain described by the LSA
Router ID
ID of originating router
Sequence
Signed 32-bit integer, incremented each time the router originates a new instance of
the LSA. Used to detect old and duplicate LSAs
Age
LSA age in seconds
Checksum
Checksum of complete LSA contents except for Age field
SecFlow-1p
6. Traffic Processing
479
Viewing OSPF Interface States
You can view current interface states by using the show interface-table command. This command is
available in the CLI router OSPF context: (config>router(<router_number>)>ospf#), and can be used for
testing (see Testing OSPF) and debugging.
For example:
IP Address
Area ID
Type
Priority
DR
BDR
State
------------------------------------------------------------------------------------000.000.000.000
000.000.000.001
P-T-P 0001
000.000.000.000
000.000.000.000
Down
192.168.001.001
000.000.000.003
BRDCST 0001
192.168.001.007
192.168.001.002
Up
The above fields are:
IP Address
Interface IP address
Area ID
ID of area with which the interface is associated
Type
Broadcast or point-to-point
Priority
Priority index for becoming DR or BDR
DR
Designated Router in this network
BDR
Backup Designated Router in this network
State
UP if all of the following are true: OSPF is enabled (no shutdown), the IP
interface’s operational status is UP, and the OSPF interface is enabled (no
shutdown)
Viewing OSPF Neighbors
You can view the current OSPF neighbors by using the show neighbor-table command. This command is
available in the CLI router OSPF context: (config>router(<router_number>)>ospf#), and can be used for
testing (see Testing OSPF) and debugging.
For example:
Neighbor
Neighbor ID Priority
State Interface
Port
---------------------------------------------------------------------------192.168.001.003
192.168.001.009
0001
Full
192.168.001.002
Ethernet 1
192.168.001.007
000.000.000.004
0004
Full
192.168.001.002
Ethernet 1
10.10.001.001
000.000.000.005
0005
Full
10.10.001.002
Ethernet 2
SecFlow-1p
6. Traffic Processing
480
The above fields are:
Neighbor
IP address used by this neighbor as its source address
Neighbor ID
The neighbor’s OSPF router-id
Priority
The neighbor’s priority index for becoming DR or BDR
State
The state of the connection with this neighbor. One of:
• Down
• Attempt
• Init
• Twoway
• Exchangestart
• Exchange
• Loading
• Full*
*OSPF adjacency is not full if there is MTU mismatch between RAD and other vendors
equipment. If this is the case, change the default egress-mtu value from 1790 to the value
of the other vendor (e.g. 1500). (so that egress-mtu values should be equal in both OSPF
adjacencies.
Interface
IP address of the neighbor’s interface with which a connection is established
Port
Name of the neighbor’s interface with which a connection is established
Viewing OSPF Statistics
You can view LSA counters by using the show statistics command. This command is available in the CLI
router OSPF context: (config>router(<router_number>)>ospf#).
For example:
Count Checksum
-------------------------------------External LSA 50
0x3245
AS LSA
1059
0x7843
New LSAs Originated 45
New LSAs Received
1024
-
The above fields are:
Count
The number of LSAs of this type
SecFlow-1p
Checksum
6. Traffic Processing
481
32-bit sum of the checksums of the LSAs of this type. Can be used to check if an
LSDB has changed or to compare LSDBs.
Testing OSPF
After configuring OSPF on a router in an existing OSPF environment, you should test that OSPF is
working properly.
 To test OSPF:
1. Wait a few seconds after configuration for OSPF communications to take place.
2. Navigate to the CLI router OSPF context (config>router(<router_number>)>
ospf#).
3. Enter show interface-table and check that a DR and a BDR have been successfully elected.
4. Enter show neighbor-table and check that connections have been established with all neighbors.
5. Enter show routing-table and check that expected routes have been learned from OSPF
neighbors.
6. Exit the OSPF context, to the router CLI context.
7. Enter show routing-table and check that there are new routes marked as originating in OSPF.
6.11 Tunneling
SecFlow-1p supports route-based IPsec tunnels.
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
RFC 4087: IP Tunnel MIB
SecFlow-1p
6. Traffic Processing
482
Functional Description
SecFlow-1p supports configuration of tunnel interfaces under the router level.
Both delivery (encapsulating) and payload (encapsulated) protocols can be either IPv4 or IPv6,
independently of each other.
IPsec tunnels are employed in route-based IPsec mode. Crypto maps connected to router interfaces
work in policy-based IPsec mode. You cannot have both types in the same device, so if there is an IPsec
tunnel, and you cannot to bind a crypto map to a router interface.
IPsec tunnels cannot be configured within VRFs.
If the interface has multiple IP addresses, by default, the lowest one is used as tunnel source. You can
bind a map to an address (even if the interface has a single address). In this case:
•
The tunnel source will be the one configured.
•
If the interface does not own the configured address, SecFlow-1p ignores the configuration and
behaves as if the map is not bound to the interface.
Once an IPsec tunnel is enabled, it becomes and remains operationally up when you configure all of the
following:
•
Tunnel source address or interface
•
Tunnel destination
•
IP address
•
Crypto map
An IPsec tunnel becomes operationally down under any of the following conditions:
•
There is no route to the tunnel destination address.
•
The route to the tunnel destination address is through the tunnel itself.
•
You configure the tunnel address indirectly by anchoring the tunnel to a router interface, and
that router interface does not have an address of the same type (IPv4 or non-link-local IPv6) as
the tunnel, or has multiple such addresses.
•
The interface that anchors the tunnel source is down.
Notes
The tunnel remains operationally down as long as the anchoring router
interface is not active and does not have a valid IP address.
SecFlow-1p
6. Traffic Processing
483
Both ends of the tunnel should be on the same network.
You can configure a tunnel source IP address. This address binds the tunnel to a router interface.
•
The tunnel and the router interface anchoring it are on the same router.
•
You can configure the address directly, by providing an IPv4 or a non-link-local IPv6.
Alternatively, the address can be configured indirectly, by providing a router interface. For such
configuration, the tunnel is operationally up only if the anchoring router interface has a single address of
the same type (IPv4 or non-link-local IPv6) as the tunnel.
Notes
The tunnel remains operationally down as long as there is no active router
interface configured with this address.
You can configure a tunnel destination IP address that can be either IPv4 or non-link-local IPv6.
Note
The tunnel destination address should be configured at the other end of the
tunnel as the tunnel source address.
Configure proper routing to use a tunnel. The next hop should be either the address of the other end of
the tunnel or the tunnel interface. The tunnel address can be propagated by routing protocols such as
OSPF or BGP.
SecFlow-1p supports IP fragmentation and defragmentation in tunnels, for packets that are larger than
the tunnel IP MTU.
Route-Based IPsec Redundancy
You can configure backup tunnels for route-based IPsec redundancy.
1. Assign each backup a unique priority. The configurable range is 1-254 (higher values indicate
higher priorities). Multiple backups of a tunnel must have unique priorities.
2. If an IPsec tunnel has backup tunnels, only one backup may be active at any time. First, SecFlow1p tries to establish the primary tunnel.
3. If it fails, SecFlow-1p tries the backup with the highest priority. If that backup fails, it proceeds to
the one with the next highest priority, and so on, until a tunnel comes up.
4. If all the backups are exhausted, SecFlow-1p returns to the primary tunnel.
SecFlow-1p
6. Traffic Processing
484
If the active tunnel fails, SecFlow-1p follows the same procedure, starting with the primary (or the
highest prioritized backup, if the primary was the one that failed).
While searching for an operating backup, SecFlow-1p skips non-existent and disabled tunnels.
Dead peer detection timers are as follows:
•
Packet retransmission: 1 seconds.
•
Time after which a tunnel is considered failed if not responding: 9 seconds.
•
Time after which tunnel establishment is considered to fail: 30 seconds.
Factory Defaults
Parameter
Description
Default Value
ip-mtu
IP MTU of tunnel
0
shutdown
Enable (no shutdown) / disable (shutdown) IPsec tunnel.
no shutdown
transport-router
No transport-router is configured
no transport-router
Configuring Tunnels
Configuring Tunnel Interfaces
 To configure tunnel interface:
1. Navigate to configure router <number> to select the router on which to configure IPsec tunnels.
2. At the config>router(<number>)# prompt that is displayed, enter
tunnel-interface <number> ipsec.
The config>router(<number>)>tunnel-interface(<number>) is displayed.
The tunnel is identified by this number.
3. Enter all necessary commands according to the tasks listed below.
4. In order to activate the tunnel following configuration change, perform “shutdown” command
and then “no shutdown“.
SecFlow-1p
6. Traffic Processing
Task
Command
Comments
Configuring backup
tunnel
backup tunnel-interface
<interface-number> priority
<number>
number – backup priority
485
Possible values: 1–254
no backup tunnel-interface
<interface-number>
Clearing tunnel statistics
clear-statistics
Associating interface
with crypto map
crypto-map
See Configuring Crypto Map
Defining tunnel IP
address and prefix
length
ip-address {static <ipaddress/prefix-length |
negotiated }>
Entering no ip-address removes the tunnel
IP address.
ip-address – valid static unicast IPv4 or
non-link-local IPv6 address with compatible
prefix length
negotiated – IPsec tunnel IP address is to
be learned from a responder
Notes:
• A tunnel can have only one address. If
you repeat the command, the last
instance applies.
• The address cannot be an address of a
tunnel or a router interface.
• Both ends of the tunnel should be on
the same network.
Defining tunnel IP MTU
ip-mtu <number>
Entering no ip-mtu removes IP MTU from
the tunnel interface.
Possible values: 0 (no IP MTU), 128-–65535
Note: 0 means that the MTU is to be
calculated according to the delivery
protocol. For IPv4 it is 1476 and for IPv6
1456.
Defining tunnel name
name <tunnel-name>
tunnel-name – 0–64 character string
Entering no name returns the tunnel name
to its default value.
Displaying crypto map
status
show crypto-map-status
[<name>]
See Viewing Crypto Map Information
Showing tunnel status
show status
See Viewing Tunnel Status
SecFlow-1p
6. Traffic Processing
486
Task
Command
Comments
Disabling tunnel
interface
shutdown
Entering no shutdown enables the tunnel
interface.
Configuring an underlay
router
transport-router <routernumber>
no transport-router
Defining tunnel
destination IP address
tunnel-destination <ip-address>
router-number – is always 1
This means that the tunnel should be
configured on a router other than 1.
Entering no tunnel-destination removes
the address.
Possible values: Valid unicast IPv4 or nonlink-local IPv6 address
Notes:
• The source and destination addresses
must be both IPv4 or IPv6.
• The tunnel destination address should
be configured at the other end of the
tunnel as the tunnel source address.
Defining source IP
address or router
interface number used
to bind the tunnel to a
router interface
tunnel-source [<ip-address>]
[router-interface <number>]
Entering no tunnel-source removes the
address.
Possible values:
ip-address – valid unicast IPv4 or non-link
local IPv6 address
number - number of a router interface
Notes:
• Either IP address or router interface
number must be defined; not both.
• The tunnel and the router interface
anchoring it must be on the same
router.
• If you configure the tunnel source IP
address, the tunnel goes up only if
there is an active router interface
configured with this IP address.
• If you configure the router interface
number, the tunnel goes up only if the
router interface has a single address of
the same type (IPv4 or non-link-local
IPv6) as the tunnel.
• The source and destination addresses
must be both IPv4 or IPv6.
SecFlow-1p
6. Traffic Processing
Task
Command
487
Comments
• The tunnel source address should be
configured at the other end of the
tunnel as the tunnel destination
address.
Removing a Tunnel
 To remove a tunnel:
1. Navigate to configure router <number> to select the router from which to remove a tunnel.
2. At the config>router(<number>)# prompt that is displayed, enter no tunnel-interface
<number>.
Examples
This example demonstrates how a tunnel interface is created and bound to a previously defined crypto
map.
•
Creating an access-control list
configure
access-control
access-list "tunnel1"
permit ip any any sequence 10
exit
exit
•
Defining IPsec parameters
crypto
ipsec-transform-set "tunnel1"
algorithms esp-aes-cbc-128 esp-sha1
exit
isakmp-key "abcd1234" address 20.20.20.2
isakmp-key "abcd1234" address 30.30.30.2
isakmp-policy 1
encryption aes-cbc-128
group 14
exit
•
Creating a crypto map tunnel1 (IPsec profile)
crypto-map "tunnel1"
SecFlow-1p
6. Traffic Processing
match-address "tunnel1"
peer-address 20.20.20.2
pfs-group 14
sa-lifetime seconds 8000
transform-set "tunnel1"
sequence-number 11
exit
•
Creating a crypto map tunnel2 (IPsec profile)
crypto-map "tunnel2"
match-address "tunnel1"
peer-address 30.30.30.2
pfs-group 14
sa-lifetime seconds 8000
transform-set "tunnel1"
sequence-number 11
exit
exit
•
•
Creating Ethernet interfaces
router 1
name "Router#1"
interface 1
address 40.40.40.1/24
bind ethernet 1
dhcp-client
client-id mac
exit
no shutdown
exit
interface 2
address 20.20.20.1/24
bind ethernet 2
dhcp-client
client-id mac
exit
no shutdown
exit
Creating static route
static-route 0.0.0.0/0 address 172.17.233.1 metric 1
•
Creating a tunnel interface 1 and binding it to the crypto map
tunnel-interface 1 ipsec
no shutdown
tunnel-source 20.20.20.1
tunnel-destination 20.20.20.2
ip-address 60.60.60.1/24
crypto-map "tunnel1"
exit
488
SecFlow-1p
•
6. Traffic Processing
489
Creating a tunnel interface 2 and binding it to the crypto map
tunnel-interface 2 ipsec
no shutdown
tunnel-source 30.30.30.1
tunnel-destination 30.30.30.2
ip-address 70.70.70.1/24
crypto-map "tunnel2"
exit
exit
exit
Configuration Errors
Message
Cause
Corrective Action
Tunnel exists with a different type
You tried changing the type of an
existing tunnel.
Create a new tunnel of the new
type.
There is a crypto map connected
to a router interface
You tried to configure an IPsec
tunnel, while the crypto map was
connected to a router interface.
Cancel policy-based IPsec mode;
then you can connect a crypto
map to a tunnel interface and
configure an IPsec tunnel.
Maximum number of tunnels
exceeded
You tried to create more tunnels
than SecFlow-1p allows.
Delete unnecessary tunnels and
create a new one.
Invalid address; enter a unicast
address
You assigned a broadcast or
multicast address to the tunnel.
Assign a unicast address to the
tunnel.
The address is assigned to another
interface
You tried to configure the tunnel
with an address of an already
existing tunnel or router interface.
Assign a unique address to the
tunnel.
Configure either source address or
interface, not both
You tried to configure the router
interface anchoring the tunnel
with both an address and
interface.
Remove one of the configurations:
either the address or interface.
Source and destination must be
both IPv4 or both IPv6
You tried to configure tunnel
destination with an IPv4 address,
while the tunnel source is an IPv6
address.
Define destination and source with
same type of IP address – both
IPv4 or both IPv6.
You tried to configure tunnel
source with an IPv4 address while
the tunnel destination is an IPv6
address.
SecFlow-1p
6. Traffic Processing
Message
Cause
Corrective Action
This priority is in use by another
backup
You tried to configure multiple
backups with the same priority
Use unique value of priority with
each tunnel
This tunnel is a backup of another
tunnel
You tried to configure a tunnel as
primary, while it is already a
backup of another tunnel
Create a new tunnel to serve as a
primary tunnel
The backup tunnel is a backup of
another tunnel
You tried to configure a tunnel as
backup, while it is already a
backup of another tunnel
Create a new tunnel to serve as a
backup tunnel
The backup tunnel has a backup
tunnel
You tried to configure a tunnel as
backup, while it is already a
primary tunnel (i.e. it is configured
with a backup)
Create a new tunnel to serve as a
backup tunnel
A tunnel cannot be a backup of
itself
You tried to configure a tunnel as
a backup of itself
Create a new tunnel to serve as a
backup tunnel
This priority is in use by another
backup
You tried to configure multiple
backups with the same priority
Use a unique priority for each
backup
Viewing Tunnel Status
You can display the current tunnel status.
 To display tunnel status:
•
At the config>router(<number>)>tunnel-interface(<number>)# prompt, enter:
show status
The tunnel status is displayed.
config>router(1)>tunnel-interface(1)# show status
Tunnel
: 1
Type
: IPSEC
Status
: Up
Tunnel Address
: 60.60.60.2/24 (IKEv2 acquired)
Tunnel Source
Interface
: Router Interface 1/2 (Ethernet
Address
: 192.168.1.11
Tunnel destination : 192.168.1.10
Transport Router
: 1
IP MTU
: 1476 (Calculated)
3)
490
SecFlow-1p
6. Traffic Processing
Up For : 1 Day(s), 10:25:01
Packets
Tunnel Encapsulated
150
Tunnel Decapsulated
150
Bytes
10000
5000
Status Parameters
Parameter
Description
Tunnel
Tunnel number
Type
Tunnel type
Possible value: IPsec
Status
Tunnel administrative and operational status
Possible values: Up, Down
Tunnel Address
Tunnel IP address
Possible values:
• -- (Tunnel source IP address is not configured.)
• IPv4 or IPv6 unicast addres
• Acquired By IKEv2 (If IPsec tunnel address was acquired by IKEv2)
Tunnel Source
Interface
Router interface anchoring the tunnel
Possible values:
• -- (No interface is configured.)
• Router Interface <router number>/<interface number>
or
Physical interface bound to the router interface anchoring the tunnel
Possible values:
• -- (empty string)
• (<port-type> <port-number>)
Tunnel Source
Address
Tunnel source IP address
Possible values:
• -- (Tunnel source IP address is not configured.)
• IPv4 or IPv6 unicast address
Tunnel Destination
Tunnel destination IP address
Possible values:
• -- (Tunnel destination IP address is not configured.)
• IPv4 or IPv6 unicast address
491
SecFlow-1p
6. Traffic Processing
Parameter
Description
Transport Router
Number of tunnel transport router
492
Possible values:
• number
IP MTU
Tunnel IP MTU
Possible values: -- or number.
If Tunnel IP MTU configuration method is non-zero, it is printed
If Tunnel IP MTU configuration method is zero:
• If tunnel source address type is IPv4, 1476 is printed.
• If tunnel source address type is IPv6, 1456 is printed.
• If tunnel source address type is unknown, -- is printed.
Up For
Tunnel uptime in seconds
Display hint: ddd Days, hh:mm:ss
Input Bytes
Number of Rx bytes since tunnel uptime
Inout Packets
Number of Rx packets since tunnel uptime
Output Bytes
Number of Tx bytes since tunnel uptime
Output Packets
Number of Tx packets since tunnel uptime
Viewing Crypto Map Information
You can view information on a specific crypto map or all configured crypto maps using the show cryptomap-status command.
 To display the crypto map information:
1. Navigate to configure router <number>tunnel-interface<number>.
2. At the config>router(<number>tunnel-interface (<number>))# prompt that is displayed, enter
show crypto-map-status [<tunnel-name>].
config>router(1)tunnel-interface(1)# show crypto-map-status tunnel1
Crypto Map
: tunnel1
Tunnel Peers
: 20.20.20.1 --- 20.20.20.2
Security Association
: Up 0 minutes ago
IKE
----------------------------------------------------------------------------Version
: 2
SA Negotiation Mode : NA
Authentication
: Pre-shared secret
SecFlow-1p
Encryption
Hashing
Diffie Hellman Group
In SPI
Out SPI
Reauthentication in
6. Traffic Processing
:
:
:
:
:
:
AES-CBC-128
SHA1
14
e047c3660524fdd4
93d0e80fd8d1b0a6
999 days
Transform Set
----------------------------------------------------------------------------Algorithms : ESP-AES-CBC-128 ESP-SHA-1
In SPI
: 00000000ca0944c9
Out SPI
: 00000000c71e1971
Remaining Lifetime
----------------------------------------------------------------------------In Kilobytes : 4608000
Out Kilobytes : 4608000
Seconds
: 6960
The above fields are:
Tunnel Peers
Local peer --- remote peer
Possible values: ip-address
Security Association
SA status and SA age
Possible values:
SA status – Connecting, Down, Up
SA age – <number> minutes ago
IKE version
SA Negotiation Mode
IKE SA negotiation mode
Possible values: Aggressive, Main
Authentication
IKE authentication method
Possible value: Pre-shared secret
Encryption
IKE encryption algorithm
Possible value: AES-CBC-128, AES-CBC-256
Hashing
IKE hashing algorithm
Possible values: SHA1-96-HMAC, SHA2-256-128-HMAC,
SHA2-512-256-HMAC
493
SecFlow-1p
6. Traffic Processing
Diffie Hellman Group
IKE Diffie Hellman group
Possible values: 1, 2, 5, 14, 19, 20
In SPI
IKE in SPI
Possible values: string
Out SPI
IKE out SPI
Possible values: string
Re-authentication in
Time to IKE key re-authentication
Possible values: <number> minutes/hours/days
Transform Set
Algorithms
Transform set first algorithm
Possible values: ESP-AES-CBC-128, ESP-AES-CBC-256, ESPAES-GCM-128, ESP-AES-GCM-256, ESP-NULL, ESP-AESGMAC-128,
ESP-AES-GMAC-256
Transform set second algorithm
Possible values: ESP-SHA1-96-HMAC, ESP-SHA2-256-128HMAC, ESP-SHA2-512-256-HMAC
In SPI
Transform set in SPI
Out SPI
Transform set in SPI
Remaining Lifetime
In Kilobytes
Transform set remaining lifetime (in kilobytes)
Out Kilobytes
Transform set remaining lifetime (out kilobytes)
Seconds
Transform set remaining lifetime (seconds)
494
SecFlow-1p
6. Traffic Processing
495
6.12 Virtual Router Redundancy Protocol (VRRP)
Virtual Router Redundancy Protocol (VRRP) enables a group of routers to act as a virtual router with a
virtual IP address that can be configured as the default gateway for access devices in a LAN.
A static default gateway router is a potential single point of failure, which is eliminated by VRRP.
Standards Compliance and MIBs
The VRRP feature complies with the following standards.
Standard
Title
RFC 5798
Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6
RFC 6527
Definitions of Managed Objects for the Virtual Router Redundancy Protocol Version 3
(VRRPv3)
Functional Description
VRRP Group
A VRRP group is defined as a group of routers that share one or more virtual IP addresses. If a router’s
physical IP address matches a virtual IP address, it is referred to as the address owner. The routers in the
group are assigned priorities ranging from 1–255, with 255 being the highest priority, however only
priorities 1–254 are configurable. Priority 255 is automatically assigned to the address owner regardless
of the configured priority. Up to 4 VRRP groups are supported per device.
Master Router
At any time, one of the routers is the master (active) and the others are backups. The router with the
highest priority is selected as the master, therefore the address owner is the master unless it has failed.
If more than one router has the highest priority, the one with the highest primary IP address is selected
as master. The primary IP address is one of the router interface’s real (IPv4) or link-local (IPv6) IP
addresses. It is used as the source address in VRRP advertisements
The master router forwards upstream traffic packets destined for the virtual IP address(es), and sends
periodic advertisements to the backup routers at a user-configurable interval. If the backup routers do
SecFlow-1p
6. Traffic Processing
496
not receive an advertisement for a set period, the backup router with the next highest priority takes
over as master.
Preemption
If preemption is enabled, then when a new router is added to a VRRP group and its priority is higher
than any of the routers in the group, it preempts the master role. When a router with priority 255
(address owner) is added to a VRRP group or becomes active, it preempts all lower-priority routers, even
if preemption is disabled. If no router has priority 255 and preemption is disabled, then no preemption
occurs.
Factory Defaults
By default, no VRRP groups exist. When a VRRP group is created, its default configuration is the
following:
Parameter
Default
Remarks
description
virtual router <ip-ver> group <id>
• <ip-ver> is either IPv4 or IPv6.
• <id> is the group VRID.
The description does not affect the device
behavior; it is solely provided for better
readability
preempt
preempt
Preemption is enabled by default.
priority
100
shutdown
shutdown
timer-advertise
100 centiseconds
VRRP is disabled by default; at least one
virtual IP address must be associated with
the group before the group can be
enabled.
Configuring VRRP
You configure VRRP group parameters at the router interface level.
SecFlow-1p
Note
6. Traffic Processing
497
A VRRP group cannot be associated with a router interface for which any of
the following is true:
•
•
The router interface is bound to a port other than Ethernet or wifi access
point (e.g. PPP port).
The router interface is a loopback interface.
 To configure VRRP group parameters:
1. At the config>router(<number>)>interface(<interface-num>)# prompt, enter the following,
specifying the VRRP group ID (1–255) and IP version:
vrrp <vrid> [{ipv4 | ipv6}]
One of the following prompts is displayed, depending on the IP version entered:
config>router(<number>)>interface(<interface-num>)>vrrp(<vrid>,ipv4)#
config>router(<number>)>interface(<interface-num>)>vrrp(<vrid>,ipv6)#
2. Perform the required tasks according to the following table.
Task
Command
Comments
Configuring VRRP group
description
description <string>
Type no description to use an
empty (NULL) string.
Associating a virtual IP address
with the VRRP group
ip <ip-address>
• Type no ip <ip-address> to
delete the association with
the IP address.
• The IP address must be in the
correct form for the
configured IP version.
Enabling preemption
preempt
Type no preempt to disable
preemption.
Configuring VRRP priority
priority <number>
Possible values for number:
1–254
If the device is an address owner
it overrides the configured
priority with 255 (which is not a
configurable value)
Configuring interval between
sending advertisement
messages
timer-advertise
<centiseconds>
Viewing VRRP status
show status
Possible values:
1–4095
SecFlow-1p
6. Traffic Processing
498
Task
Command
Comments
Administratively enabling or
disabling VRRP for router
interface
no shutdown
• Type shutdown to
administratively disable VRRP.
• VRRP can be enabled only if at
least one virtual IP address
has been associated.
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Too many VRRP groups on this
interface
You tried to create more than
four groups.
Delete one of the VRRP groups from the
interface.
The address must be a valid
unicast IP
You tried to configure an invalid
IP address.
Configure a valid unicast IP address.
The port bound to the router
interface does not support VRRP
You tried to to configure VRRP
on an active router interface
bound to a port other than
Ethernet or wifi access point
(e.g. PPP), or activate a router
interface with VRRP
Configure VRRP on a router interface
bound to a port on which VRRP can run.
VRRP is not allowed on a
loopback router interface
You tried to configure VRRP on
a router interface that is a
loopback router interface.
Configure VRRP on a router interface
bound to a port on which VRRP can run.
Too many addresses are
configured for the VRRP group
You tried to configure more
than four addresses.
Delete one of the associated addresses
before associating a new IP address with
the group.
IP version of the address and the
VRRP group are incompatible
You tried to associate an IPv4
address with an IPv6 group or
an IPv6 address with an IPv4
group.
Associate an IPv4 address with an IPv4
group, or an IPv6 address with an IPv6
group.
SecFlow-1p
6. Traffic Processing
499
Viewing VRRP Status
You can view VRRP status by using the show status command. This command is available in one of the
following CLI contexts, depending on the IP version of the VRRP group:
config>router(<number>)>interface(<interface-num>)>vrrp(<vrid>,ipv4)#
config>router(<number>)>interface(<interface-num>)>vrrp(<vrid>,ipv6)#
For example:
# configure router(1)>interface(7)>vrrp(1,ipv4)# show status
Router/Interface
: 1/7
Physical Port
: Ethernet 2/2
VRRP Group
: 1 (IPv4)
Administrative Status
: Enabled
Operational Status
: Master
Uptime (seconds)
: 1111
Primary IP Address
: 10.20.0.01/24
Protected IP Address
: 10.20.0.01/24
: 10.20.0.10/24
Virtual MAC Address
: 00:00:5e:00:01:01
Advertisement Interval (seconds) : 1
Preemption
: Enabled
Priority
: 255
Field
Description
Router/Interface
Router and interface where the VRRP group is configured
Physical Port
Physical interface that is bound to the router interface
VRRP Group
VRRP group ID
Administrative Status
VRRP group administrative status – Disabled or Enabled
Operational Status
VRRP role:
•
•
•
•
Backup – Router interface is acting as backup.
Master – Router interface is acting as master.
Init – Router interface VRRP group parameters are being initialized.
Lower Layer Down – The interface with which the group is associated is
non-operational.
Uptime (seconds)
Time since VRRP role changed from Init to Backup or Master
Primary IP Address
Primary IP address and mask of the VRRP group
Protected IP Address
One or more virtual IP address(es) protected by the VRRP group; one output line is
displayed for each protected IP address.
SecFlow-1p
6. Traffic Processing
Field
Description
Virtual MAC Address
Virtual MAC address of the VRRP group
Advertisement Interval
(seconds)
Interval between VRRP advertisements (if the router is acting as master)
Preemption
Preemption state – Disabled or Enabled
Priority
Router VRRP priority (0–255)
500
Viewing VRRP Summary
You can view a VRRP group summary by using the show vrrp-summary command for router, or show
summary-vrrp command for router interface. This command is available in the following CLI contexts:
•
config>system>router – displays information for all VRRP groups in the device
•
config>router(<number>) – displays information for all VRRP groups configured for any router
interfaces belonging to the router
•
config>router(<number>)>interface – displays information for all VRRP groups configured for
the router interface
For example:
#configure router(1)>interface(1)#
Rtr If Phys If
Group
Pri
1/1
Ethernet 1/2 111(IPv4) 100
1/1
Ethernet 1/2 222(IPv6) 200
show summary-vrrp
Own Pre State Primary Address
Yes Ena Master 10.10.10.10
-- Dis Backup FE80::1234
Field
Description
Rtr
Router and interface where the VRRP group is configured
Phys If
Physical interface that is bound to the router interface
Group
VRRP group ID
Pri
Router VRRP priority (0–255)
Own
Indicates if VRRP group is address owner: Yes or --
Pre
Preemption state – Dis or Ena
SecFlow-1p
6. Traffic Processing
Field
Description
State
VRRP role:
•
•
•
•
Primary Address
Backup – Router interface is acting as backup.
Master – Router interface is acting as master.
Init – Router interface VRRP group parameters are being initialized.
LLD – The router interface where the VRRP group is configured, is not
operational.
Primary IP address of the VRRP group
501
SecFlow-1p
7
7. Containerization
502
Containerization
SecFlow-1p supports Linux Containers (LXC) as a virtualization method by running multiple isolated Linux
systems (containers) using a single Linux kernel. This functionality is implemented via the container
management extension called LXD.
Containerization allows limitation and prioritization of resources (CPU, memory, block I/O, network,
etc.) without the need for starting any virtual machines. Containers use very small storage space
because they share many components with the container host. A fresh Ubuntu image, for example,
consumes only a few megabytes of the disk space. All containers also share memory and CPU resources.
In this way, a much higher density can be achieved compared to virtual machines, which requires
considerably more resources.
This functionality supports dynamic resource restrictions, container migration and efficient live
migration.
7.1 Applicability and Scaling
Configuring LXD is available only via web interface. This interface can be enabled only using a CLI
command.
SecFlow-1p limits the size of LXD components (images, containers, snapshots) to up to 3 GB of its disk
space.
Note
It is recommended not exceed the 2.5Gb limit of the component size;
otherwise, creation of an additional image/snapshot/container consumes too
much disk space that can lead to unexpected behavior.
7.2 Functional Description
LXD main components are typically visible in the LXD directory structure, in its command line client and
in the API structure. They include:
SecFlow-1p
7. Containerization
•
Containers
•
Snapshots
•
Images
•
Profiles
•
Network
503
SecFlow-1p has an LXD web graphic user interface that allows to manage all LXD components.
Containers
Containers consist of:
•
filesystem (rootfs)
•
list of configuration options, including resource limits, environment, and security options
•
a number of devices, such as disks, character / block Unix devices, and network interfaces
•
set of profiles from which the container inherits a configuration
•
container properties (name, architecture, ephemeral/persistent)
•
container runtime state
SecFlow-1p supports up to two containers working in parallel.
Any network interface can be mapped to the container, up to four network interfaces per container. Any
serial interface can be mapped to the container, up to two serial interfaces.
SecFlow-1p allows resources configuration (memory, disk, CPU allocation) per container.
You can add a new container using one of the following methods:
1. Create from an LXD image located on a remote server, which is preconfigured in CLI as a
“remote-image-server“. Internet connection is required for this action.
2. Create from local images installed in SecFlow-1p.
You can perform the actions of delete, start/stop, restart, and freeze/unfreeze on an existing container.
Using the web interface, you can also:
•
Push and pull files from / to the container
•
Display container’s status
SecFlow-1p
7. Containerization
•
Make container’s snapshot
•
Restore container from a snapshot
•
Change the container’s name by the “move” action
•
Clone a container
•
Access the container’s Terminal shell (“bash”)
•
Export an image from the container. This image can be used later on by SecFlow-1p and
create a new container. Likewise, it can be copied to an image of a remote-server to be
published to other devices
504
Snapshots
Container snapshots are identical to containers in a sense that they can be renamed, destroyed, or
restored, but unlike containers, the snapshots cannot be modified.
The snapshots are stateful, i.e. depending on the container state, because the container runtime state
can be stored. This means that you can roll back the container state, including its CPU and memory
state, at the time of the snapshot. This functionality enables:
•
Restoring the container from a specific snapshot
•
Creating a new container based on a snapshot restored from another container
Images
LXD is image-based, so every LXD container comes from an image. Images are typically clean Linux
distribution images similar to what you would use for a virtual machine.
A container can be published by making from it an image that can be used later by the local or remote
LXD hosts.
In addition to the default local images, you can connect to an image remote server to download other
required images. Although the image may have come from a remote image server, eventually, every LXD
container is created from a local image.
SecFlow-1p
7. Containerization
505
Profiles
Profiles allow to define container configuration and container devices in one place and then to apply
them to any number of containers.
A container can have multiple profiles applied to it. When the final container configuration (known as
expanded configuration) is built, the profiles are applied in the same order as they were defined,
overriding each other when the same configuration key or device is found. Then the local container
configuration is applied on top of that, overriding anything that came from a profile.
Network
LXD supports creating and managing bridges. A single or multiple containers can be updated with it,
when a network is created and running.
Using LXD network, you can:
•
Create a new bridge with random IPv4 or user-configurable IPv4 & subnet
•
Select whether to allocate addresses using DHCP and assign start/stop DHCP address
•
Update IPv4 with or without NAT, according to your choice
•
Assign physical device interface to the bridge
7.3 Factory Defaults
LXD comes preconfigured with two local images:
•
Alpine 3.8 armhf - Alpine Version 3.8 for ARM
•
Ubuntu xenial armh - Ubuntu Base 16.04.5 LTS (Xenial Xerus) for ARM
SecFlow-1p has three preconfigured profiles:
•
default profile is automatically applied to all containers unless an alternative list of profiles is
provided by the user. This profile currently define only the “rootfs” location.
•
serial1 is a profile that defines serial device number 1 for the container
•
serial2 is a profile that defines serial device number 2 for the container
SecFlow-1p
7. Containerization
506
7.4 Configuring LXD Containers
CLI Configuration
Some part of LXD functionality is set from CLI, while Containers are configured via the web interface.
CLI allows you to perform the following:
•
Enable or disable LXD functionality
•
Update LXD remote image server
•
Delete LXD remote image server
•
Display LXD configuration
 To set LXD via CLI:
1. Go to lxd.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Enabling/disabling LXD
functionality
[no] shutdown
Updating/deleting remote
server IP address
[no] remote-image-server <ipaddress>
Comments
Web Configuration
Web configuration of LXD containers is possible only when the LXD administrative status is enabled via
CLI (refer to CLI Configuration).
Creating Containers
A new container instance is created from an image on Images or Containers page.
SecFlow-1p
7. Containerization
 To create a new container using the Images page:
1. In the web interface, navigate to Containers (LXD) > Images > Local and select the image the
container will be created from.
2. Click the <Launch Container(s)> button.
A new page opens.
507
SecFlow-1p
7. Containerization
508
3. Type in the container name in the corresponding field, otherwise, a random name will be
chosen for the container. The name is given according to the following rules:
 Contains 1 to 24 alphanumerical characters and hyphens
 Cannot start with a numerical character or hyphen
 Cannot end with a hyphen
4. In the Quantity, set the number of containers that you want to create from the selected image.
5. By default, all containers are persistent, in other words, all changes made within the container
persist over time, until the container is deleted. By clearing the check-box next to Persistent, you
can make LXD behave more like Docker, where all container configuration (network info,
profiles, snapshots, advanced configuration) is lost as soon as the container is stopped.
6. Clear the Autostart check-box if you want to restore the last state of the container upon the LXD
start. Otherwise, the container starts at the same time as LXD does.
7. Set how much CPU can be used by the container by adjusting the slider next to CPU allocation
(%) for a soft limit, or by typing in a chunk of time for a hard limit. Note that the container
cannot exceed the hard limit, while it can exceed its CPU soft limit, when extra host CPU is
available.
8. Set how much memory can be used by the container by adjusting the slider next to Memory
usage in MB for a soft limit, or by typing in a chunk of time for a hard limit. Note that the
SecFlow-1p
7. Containerization
container cannot exceed the hard limit, while it can exceed its memory soft limit, when extra
host memory is available.
9. Select profiles applied to the container from the list of defined profiles.
10. Define the advanced settings according to the Command Line Interface table below and click
<Create>.
 To create a new container instance using the Containers page:
1. In the web interface, navigate to Containers (LXD) > Containers and click the <New Instance>
button.
A new page opens.
509
SecFlow-1p
7. Containerization
510
2. Since all LXD containers are created from images, select one of the images from the Select
image list.
3. Select the check box next to Non-ubuntu image (Alpine), if your image is not based on Ubuntu
OS.
4. Go through the steps 3 to 9 of the description above for creating a container from an image.
5. Define the advanced settings according to the table below and click <Create>:
Command Line Interface
Key
Type
Default
Live
update
Description
boot.autostart
boolean
-
n/a
Always start the container when
LXD starts (if not set, restore last
state)
boot.autostart.delay
integer
0
n/a
Number of seconds to wait after
the container started before
starting the next one
boot.autostart.priority
integer
0
n/a
What order to start the containers
in (starting with highest)
SecFlow-1p
7. Containerization
Key
Type
Default
Live
update
Description
boot.host_shutdown_
timeout
integer
30
yes
Seconds to wait for container to
shutdown before it is force
stopped
boot.stop.priority
integer
0
n/a
What order to shutdown the
containers (starting with highest)
environment.*
string
-
yes
(exec)
key/value environment variables
to export to the container and set
on exec
limits.cpu
string
- (all)
Number or range of CPUs to
expose to the container
limits.cpu.allowance
string
100%
yes
How much of the CPU can be
used. Can be a percentage (e.g.
50%) for a soft limit or hard a
chunk of time (25ms/100ms)
limits.cpu.priority
integer
10
(maximum)
yes
CPU scheduling priority compared
to other containers sharing the
same CPUs (overcommit) (integer
between 0 and 10)
limits.disk.priority
integer
5 (medium)
yes
When under load, how much
priority to give to the container's
I/O requests (integer between 0
and 10)
limits.kernel.*
string
-
no
This limits kernel resources per
container (e.g. number of open
files)
limits.memory
string
- (all)
yes
Percentage of the host's memory
or fixed value in bytes (supports
kB, MB, GB, TB, PB and EB suffixes)
limits.memory.enforce
string
hard
yes
If hard, container can't exceed its
memory limit. If soft, the
container can exceed its memory
limit when extra host memory is
available.
limits.memory.swap
boolean
true
yes
Whether to allow some of the
container's memory to be
swapped out to disk
511
SecFlow-1p
7. Containerization
Key
Type
Default
Live
update
Description
limits.memory.swap.p
riority
integer
10
(maximum)
yes
The higher this is set, the least
likely the container is to be
swapped to disk (integer between
0 and 10)
limits.network.priority
integer
0 (minimum)
yes
When under load, how much
priority to give to the container's
network requests (integer
between 0 and 10)
limits.processes
integer
- (max)
yes
Maximum number of processes
that can run in the container
linux.kernel_modules
string
-
yes
Comma separated list of kernel
modules to load before starting
the container
migration.incremental
.memory
boolean
false
yes
Incremental memory transfer of
the container's memory to reduce
downtime.
migration.incremental
.memory.goal
integer
70
yes
Percentage of memory to have in
sync before stopping the
container.
migration.incremental
.memory.iterations
integer
10
yes
Maximum number of transfer
operations to go through before
stopping the container.
Performing Actions with Containers
The following actions can be performed using the container’s menu buttons:
•
Start: Starting the container
•
Stop: Stopping the container
•
Restart: Restarting the container
•
Delete: Deleting the container
•
Freeze: Halting all the processes running inside the container. The processes are blocked
until they are explicitly restored by the Unfreeze command. This command is useful for
batch managers to schedule a group of processes.
•
Unfreeze: Restoring all the container's processes.
512
SecFlow-1p
7. Containerization
513
The following actions can be performed using the Actions button in each container’s row:
•
Terminal: Opening the container shell (bash/sh…)
•
Snapshot: Making snapshots and restoring containers from them. Snapshots include the
entire container state, together with running state, if Stateful condition is used, which
means all the container configuration, container devices and container file system.
•
Clone: Copying a container and cloning it into a new one. The destination container will be
identical in every way to the source one, except that it won’t have any snapshot, and its
volatile keys (MAC address) will be reset.
Note
Do not start both the parent and cloned containers at the same time, to avoid
conflicts in the network setup or interfaces attachments.
•
Move: Renaming a container.
•
Export: Exporting an image from the container. The image can be used later on by your
device to create a new container, or can be copied to an image remote-server for being
published to other devices.
Some of the actions can be performed from the Container Details page that opens by clicking the
container’s name.
Container File Operations
LXD has direct access to the container’s file system, so it can directly read and write to any file inside the
container. This can be very useful for pulling log files or exchanging files in the container.
SecFlow-1p
7. Containerization
The following file operations are available:
•
New
•
Upload
•
Download
•
View
•
Edit
•
Delete
514
SecFlow-1p
7. Containerization
515
Downloading Remote Images
Before downloading an image from a remote server, make sure that the server is configured in CLI (see
CLI Configuration) and that it is operational with the Internet connection.
 To download a remote image:
1. In the web interface, navigate to Containers (LXD) > Images > Remote and select the image from
the list.
2. Click the <Download> button.
The image is downloaded to the local device.
Creating and Deleting Profiles
 To create a new profile:
1. In the web interface, navigate to Containers (LXD) > Profiles and select the <New Profile>
button.
SecFlow-1p
7. Containerization
A new page opens.
2. Set the profile name and click the <Create Profile> button.
 To delete a profile:
1. In the Profiles page, select the profile and click the <Delete> button.
516
SecFlow-1p
7. Containerization
Creating Bridge Networks
 To create a bridge network:
1. Navigate to Containers (LXD) > Network and select the <New Bridge Network> button.
A new page opens.
517
SecFlow-1p
7. Containerization
518
2. Under the Internal bridge tab, set a new Bridge name in the corresponding field.
3. Select “Yes” next to NAT, if the address should work with NAT, or “No” otherwise.
4. Set the IPv4 address manually, otherwise, it will be allocated automatically.
5. Set the network mask.
6. Select the starting IP for DHCP range.
7. Select the ending IP for DHCP range.
9. Optionally, you can define a direct interconnection from the container’s bridge to the physical
interface of SecFlow-1p. Under the Bridge to physical interface tab, select the host physical
interface for the bridge, choosing one of six (1-6) ports.
SecFlow-1p
7. Containerization
519
Displaying Storage Information
The LXD Info page contains 2 different storage information sections:
•
Containers Storage Information. This section displays the space used by the currently installed
containers. Containers that were created from the same image do not increase the storage
space, which allows you to install multiple containers without affecting the disk space (unless a
container was changed or updated). Containers from different images do increase the used disk
space.
•
Operational Storage Information. This sections displays the space used for all other operations
that require disk space, such as downloading images, exporting containers to images, creating
snapshots from containers and etc.
SecFlow-1p
7. Containerization
520
7.5 Example: Suricata TAP Mode Container
This example shows how to install a new container used as Suricata detection engine.
Suricata is an open-source Intrusion Detection and Prevention (OISF IDP) engine. It inspects the network
traffic using a powerful and extensive rules and signature language, and has powerful scripting support
for detection of complex threats.
SecFlow-1p has a container with SCADA firewall capability available via Suricata engine. When working
in TAP mode, it passively monitors the traffic without taking actions. If any malicious activity is found, it
can send an indication to a syslog server and report which threats are discovered, all according to the
rules defined by the user.
Suricata Container
TAP Mode
Public/Private Cloud
Fiber
Packet
Network
SIEM/
Analytics
Microsoft
LAN
Amazon
SecFlow-1p
LTE
Mobile
Goggle
Cloud
Applications
SecFlow-1p
7. Containerization
521
Configuring the container includes the following stages:
•
creating internal bridges
•
creating a container based on an image
•
checking communication
•
establishing SSH access to the container (optional)
•
updating Suricata rules
•
configuring Syslog
•
checking Syslog connectivity
Creating Internal Bridges
 To create internal bridges:
•


In the Network page, create two new bridge networks:
tapbr0 – This bridge is used to listen to traffic mirrored from the LAN ports of SecFlow-1p.
Set 10.0.1.1/24 as an internal IP address of this network bridge, since the container image
includes corresponding address connected to this network.
mgtbr0 – This bridge is used for the Suricata container management/ monitoring. Set
10.0.2.1/24 as an internal IP address of this network bridge, since the container image
includes corresponding address connected to this network.
This interface can be ran through NAT (ipvX.nat: true), if it Syslog events should be sent via the Internet
or a routed network over fiber or cellular.
If you want to send Syslog events via a VPN tunnel, configure the interface without NAT ipvX.nat: false)
and set it as a left subnet of VPN.
SecFlow-1p
7. Containerization
522
Creating a Container Based on Image
 To create a container:
1. In the Images page, select the Suricata Alpine 3.8 TAP mode image located on your image server
and click <Launch Container(s)>.
SecFlow-1p
The Create Container from Image page opens.
2. Set the name and other container parameters and click <Create>.
The new container appears in the Containers page.
7. Containerization
523
SecFlow-1p
3. Click the containers name and open the Networking tab.
4.
Assign to the container two interfaces with static IP addresses:
 eth0, connected to tapbr0, IP address 10.0.1.10
 eth1, connected to mgtbr0, IP address 10.0.2.10
5. Configure the eth ports in the container OS.
7. Containerization
524
SecFlow-1p
7. Containerization
525
6. The port configuration and file can be different in different OS, for example:
auto eth0
iface eth0 inet static
address 10.0.1.10
netmask 255.255.255.0
auto eth1
iface eth1 inet static
address 10.0.2.10
netmask 255.255.255.0
gateway 10.0.2.1
dns-nameservers 8.8.8.8 8.8.4.4
Checking Communication
Restart the container and connect to the container through terminal.
Check communication between the container and its bridges (10.0.1.1 and 10.0.2.1) and bridge ports
(10.0.1.10 and 10.0.2.10).
Establishing SSH Access
Optionally, you can provide SSH access to the container.
 To provide SSH access:
1. Using CLI, create static NAT to forward management traffic to the container management port:
router nat static create original-port 2222 modified-ip 10.0.2.10 modified-port 22
protocol tcp
2. Create or change the user in the container that should be used for SSH connection. For example,
in the current configuration supplied via the image, user: suricata; password: admin.
 add a new user:
adduser -s /bin/ash -G users suricata
password: admin
3. Change password:
chpasswd
suricata:suricata1
SecFlow-1p
7. Containerization
526
Updating Suricata Rules
To update Suricata rules, copy or update the suricata.yaml and suricata.rules files to /etc/suricata and
/etc/suricata/rules, respectively, inside the container.
Configuring Syslog
 To configure Syslog:
1. Change “/etc/rsyslog.conf” to send alerts to IP of your Syslog server:
“# remote host is: name/ip:port, e.g. 192.168.0.1:514, port optional
local5.* @50.50.50.5:514“
2. Configure SNAT to allow container communicate over the IPsec tunnel, for example:
a. Set : “sudo iptables -t nat -A POSTROUTING -o eth1 -j SNAT --to 4.4.4.5”
b. Write the rules to disk: “sudo /etc/init.d/iptables save”
c. Set iptables to start on reboot : “rc-update add iptables”
Checking Syslog Connectivity
Check connectivity to syslog devices such as RAD SIEM or syslog server. You can use any Syslog server
monitoring application, for example Syslog Watcher, that listens to the UDP port configured in the
container’s “rsyslog.conf” file (50.50.50.5:514) and verifies that Suricata engine is sending all reported
hit actions to this server.
SecFlow-1p
7. Containerization
527
7.6 Viewing Container Status
 To view the container status:
1. From the list of available containers on the Containers page, select the container by clicking its
name.
The Container Details: <container name> page opens.
2. Choose the Details tab to see all available information regarding the container parameters:
 CPU
 Memory:

current–current memory allocated by the container

peak–peak memory allocated by the container

available–memory available to use by the host
 Disk

root–disk usage for the running container
SecFlow-1p
7. Containerization
528
available–disk space available to use by the host
Network, etc.


3. Choose the Networking tab to see all available information regarding the network interfaces:
 Interface (Ethernet port) name and operational status (up/down)
 Name of the bridge connected to the interface
 Physical Ethernet port hosting this interface (HOST IFC)
 IP address of the bridge/physical ETH port
 MAC address of the interface
 Network mask
 Number of sent and received packets and bytes
 Port mapping
You can use the <Add +> button to add a new interface or port mapping.
4. Choose the Snapshots tab to see all snapshots created from this container.
You can either create a new container or restore the current container based on the selected
snapshot.
5. Choose the Advanced tab to see all advanced setting of the currently running container.
6. Choose the File Manager tab to display the container file system. For more information on file
operations, refer to Container File Operations.
SecFlow-1p
8. Timing and Synchronization
529
8 Timing and Synchronization
8.1 GNSS location reporting
GNSS (Global Navigation Satellite System) is a part of satellite navigation system which allow users to
determine their current position from the signals received from satellite systems called constellations.
Each constellation consists of a set of satellites which continuously transmits signals towards the Earth.
GNSS satellites continuously broadcast satellite position and timing data. The antenna in the device
receives the RF signals from at least 4 satellites and these signals are passed to the GNSS receiver for
computing the actual position. The receiver does not transmit any signal to the satellite.
Functional Description
The device supports GPS, GLONASS, BeiDou and Galileo satellite constellations depending upon the
hardware used.
GPS is always ON and works as the only primary GNSS system. Glonass, Galileo or BeiDou can be set as
secondary system. If BeiDou is set, at least one of the other systems must be set too.
When GNSS is enabled, the device starts receiving signals from the satellites and begins the tracking
process. It must be locked to the satellite as long as the satellite is visible.
Note
Depending on the satellite constellation and other factors, time to satellite
locking (time taken by the device to acquire satellite data and calculate
position) can take as much as approximately 1 minute, if sufficient number of
satellites are available.
Factory Defaults
The default configuration of GNSS is shown below.
Parameter
Default Value
name
gnss<port-number>
SecFlow-1p
8. Timing and Synchronization
Parameter
Default Value
shutdown
no shutdown
secondary-system
no secondary-system
530
Configuring GNSS
 To configure the GNSS receiver in the CLI:
1. Navigate to configure system clock gnss.
The config>system>clock>gnss# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Assigning the name to GNSS
port
name <port-name>
1-64 characters
no name
Administratively enabling
GNSS receiver
no shutdown
Using shutdown disables the GNSS
receiver
Defining secondary GNSS
system
secondary-system [glonass]
[galileo] [beidou]
At least one system must be specified
Viewing GNSS status
no secondary-system
If Beidou is set, at least one of the
other systems must be set as well
show status
See Viewing GNSS Status
Viewing GNSS Status
You can view the GNSS status to see if the GNSS receiver is fully locked to the GNSS signals, and view the
satellite statuses, if applicable.
The information depends upon the track-status (Not tracking, Tracking satellites or Locked – see below).
If GNSS functionality is lost after a position was received, the current position information is retained
until a new position is acquired.
 To view the GNSS status:
•
Navigate to configure system clock gnss.
SecFlow-1p
8. Timing and Synchronization
531
The config>system>clock>gnss# prompt is displayed.
•
Enter:
show status
The GNSS status is displayed followed by the Satellite Status table. The GNSS status displays the
following (depending on the tracking status):
•
Administrative Status
•
Operational Status. The operational status depends upon the administrative status and the
actual operation status of GNSS. Operational status is down if the device is not tracking satellites
and becomes up if the device starts tracking the satellites
•
Primary System (always GPS)
•
Secondary Systems (Glonass, Galileo, Beidou)
•
Tracking status:
 GNSS Disabled – GNSS is administratively disabled
 GNSS Locked – GNSS is fully operational (locked to satellites)
 Not Tracking Satellites – GNSS is not operational (not tracking satellites)
 Tracking Satellites – GNSS is tracking satellites, but not locked
The table of satellites displays the following:
•
Satellite number
•
GNSS system (GPS, Glonass, Galileo, Beidou)
•
Signal to noise ratio (dB)
•
Satellite health (Yes, No)
•
Azimuth (degrees)
•
Elevation (degrees)
Note
If track-status is Not Tracking, the table of satellites is not printed.
Examples
 To configure GLONASS as secondary system:
exit all
configure system clock gnss gnss1
secondary-system glonass
SecFlow-1p
8. Timing and Synchronization
exit all
save
 To view the GNSS status:
config>system>clock>gnss(gnss1)# show status
***state is Not Tracking and there are active alarms***
Port Name
: gnss 1
Administrative Status: Up
Operational Status
: Down
Primary System
: GPS
Secondary Systems
: Glonass, Galileo
Position Mode
: Auto
Tracking Status
: Not Tracking Satellites
***state is Not Tracking and there is no active alarm***
Port Name
: gnss 1
Administrative Status: Up
Operational Status
: Down
Primary System
: GPS
Secondary Systems
: Glonass, Galileo
Position Mode
: Auto
Tracking Status
: Not Tracking Satellites
***state is other than
Port Name
:
Administrative Status:
Operational Status
:
Primary System
:
Secondary Systems
:
Position Mode
:
Tracking Status
:
Latitude
Longitude
Height
Not Tracking)***
gnss 1
Up
Up
GPS
-Auto
Tracking Satellites
: N22:11:00.001
: E111:22:00.111
: 12345
Satellite Status
Num | System | SNR | Healthy | Azimuth | Elevation
-------------------------------------------------1
| GPS
| 42 | Yes
| 57
| 24
15 | GPS
| 40 | Yes
| 240
| 47
532
SecFlow-1p
8. Timing and Synchronization
533
8.2 Date and Time
You can configure the SecFlow-1p internal real-time clock as free running or with Network Time Protocol
(NTPv4).
Applicability and Scaling
This feature is relevant for all the device versions.
Standards Compliance
RFC 3231 – Definitions of Managed Objects for Scheduling Management Operations
RFC 2863 – The Interfaces Group MIB
RFC 3418 – Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
RFC 4330 –Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI
Benefits
NTP synchronizes the internal clocks of network devices to a single time reference source. It provides
comprehensive mechanisms to access national time dissemination services, organize the NTP subnet of
servers and clients, and adjust the system clock in each participant. It improves the timekeeping quality
of the network by using redundant reference sources and diverse paths for time distribution.
Functional Description
Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer
systems over packet-switched, variable-latency data networks. NTP, a large and very complex
application for the synchronization of computers and computer networks, incorporates complex
statistical algorithms that filters out small discrepancies in time and makes time adjustments. It
synchronizes all participating computers to within a few milliseconds of Coordinated Universal Time
(UTC).
SecFlow-1p
8. Timing and Synchronization
Factory Defaults
The default system date and time parameters are as follows:
Parameter
Default Value
date-format
yyyy-mm-dd
zone utc
+00:00
By default, no NTP servers are defined.
When an NTP server is defined, its default configuration is:
Parameter
Default Value
address
0.0.0.0
prefer
no prefer
shutdown
shutdown
Configuring Date and Time
 To set the system date and time:
1. Navigate to configure system date-and-time.
The config>system>date-time# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Specifying the desired date
format
date-format {yyyy-mm-dd |
dd-mm-yyyy | mm-dd-yyyy |
yyyy-dd-mm}
Defining the date
date <date>
Configuring NTP
ntp
Comments
Date is according to the
configured date format.
534
SecFlow-1p
8. Timing and Synchronization
535
Task
Command
Comments
Scheduling adjustment of
product time for daylight
saving time start and stop
[no] summer-time
Typing no summer-time
removes daylight saving time
scheduling.
See Configuring Daylight
Saving Time Scheduling
Displaying daylight saving time
scheduling information
show summer-time
Defining the time
time <hh:mm[:ss]>
Defining the time zone relative
to Universal Time Coordinated
(UTC)
zone utc [<[{+|-}]hh[:mm]>]
See Viewing Scheduled
Daylight Saving Time
Possible values:
-12:00 to +12:00, in
30-minute increments
You can configure the time on the SecFlow-1p internal clock with the time on an NTP server.
This section explains how to receive the clock signal from NTP servers in the network. One of the active
NTP servers can be designated the preferred server, so that NTP requests are sent to the preferred
server. If there is no preferred server or if the preferred server does not answer, NTP requests are sent
to any enabled servers.
 To configure NTP:
1. Navigate to configure system date-and-time ntp.
The config>system>date-time>ntp# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Defining and configuring NTP
servers
server <server-id>
Typing no server removes
NTP server.
ё1Displaying NTP status
show status
See Viewing NTP Status
 To configure an NTP server:
1. Navigate to config system date-and-time ntp.
The config>system>date-time>ntp# prompt is displayed.
2. Type server <server-id> to define an NTP server with ID <server-id>.
The following prompt is displayed: config>system>date-time>ntp>server(<server-id>)$.
SecFlow-1p
8. Timing and Synchronization
536
3. Enter all necessary commands according to the tasks listed below.
Task
Command
Setting the IP address of the NTP
server
address <IP-address>
Set NTP server as preferred server.
prefer
Comments
Type no prefer to remove
preference.
Note: Only one server can be
preferred.
Administratively enabling server
no shutdown
Sending an NTP polling request to
check server status
query-server
Examples
Setting Date and Time
 To set the date and time:
•
Format = mm-dd-yyyy
•
Date = May 17, 2017
•
Time = 5:40 pm
•
Zone = UTC –4 hours and 30 minutes
exit all
configure system date-and-time
date-format mm-dd-yyyy
date 05-17-2017
time 17:40
zone utc -04:30
Defining the NTP Server
 To define the NTP server:
•
Server ID = 1
Entering shutdown disables
the server.
SecFlow-1p
•
IP address = 172.17.171.141
•
Preferred
•
Administratively enabled
8. Timing and Synchronization
exit all
configure system
date-and-time
zone utc +03:00
ntp
server 1
address 172.17.171.141
prefer
no shutdown
exit
Viewing Status
Viewing Date and Time Status
 To display the date and time:
•
From the system context (config>system), enter:
show system-date
config>system# show system-date
2017-06-13
09:15:05 UTC +00:00
Viewing NTP Status
 To display the NTP status:
1. Navigate to config system date-and-time ntp.
The config>system>date-time>ntp# prompt is displayed.
2. Type show status.
The following screen is displayed.
config>system>date-time>ntp# show status
System Uptime
: 000 Days 18:45:45
System Time (Local) : 2017-10-31
Current Source : NTP
09:28:22
537
SecFlow-1p
8. Timing and Synchronization
538
Locking Status : In Limits
NTP Server
Prefer
Admin
Stratum
----------------------------------------------------------------------------172.17.171.141
Prefer
Enabled
1
8.3 Daylight Saving Time
You can schedule SecFlow-1p to change its system time to daylight saving time (also known as summer
time), at a specific date and time.
Applicability and Scaling
This feature is relevant for all the device versions.
Functional Description
You can specify when the device local system time should reflect the start of daylight saving time by
adding an offset, and when it should reflect the end of daylight saving time by subtracting the offset.
You can schedule daylight saving time in one of the following ways:
One shot
Daylight saving time starts and ends once, at a specified date and
time (e.g. November 6 2017).
Recurring
Daylight saving time starts and ends every year at a specified time,
and a date specified according to the weekday and month (e.g. first
Sunday in October).
The daylight saving time schedule is saved in nonvolatile (permanent) memory, in order to be available
after device reboot.
Note
SecFlow-1p logs the start and end of daylight saving time with the events
summer_time_started and summer_time_ended, respectively. Each event is
also sent as an SNMP notification to management stations.
SecFlow-1p
8. Timing and Synchronization
539
Factory Defaults
By default, no scheduling is configured.
The default value for daylight saving time offset is 60 minutes.
Configuring Daylight Saving Time Scheduling
When you configure daylight saving time scheduling, the first set of parameters in the commands
specifies when daylight saving time starts, and the second set of parameters specifies when daylight
saving time ends.
 To configure daylight saving time:
•
Navigate to the config>system>date-time level and enter the summer-time command
according to the type of schedule:
 One shot – Enter:
summer-time date {january | february | march | april | may | june | july | august |
september | october | november | december} <dd> <yyyy> <hh>:<mm> {january |
february | march | april | may | june | july | august | september | october | november |
december} <dd> <yyyy> <hh>:<mm> [<offset>]
 Recurring – Enter:
summer-time recurring { 1 | 2 | 3 | 4 | last} {sunday | monday | tuesday | wednesday |
thursday | friday | saturday} {january | february | march | april | may | june | july |
august | september | october | november | december} <hh>:<mm> { 1 | 2 | 3 | 4 | last}
{sunday | monday | tuesday | wednesday | thursday | friday | saturday} {january |
february | march | april | may | june | july | august | september | october | november |
december} <hh>:<mm>[<offset>]
The parameter {1 | 2 | 3 | 4 | last} specifies the week of the month.
For both schedule types, <offset> specifies (in minutes) the time to add at daylight saving time start, or
subtract at daylight saving time end. Its range is 1–1440.
 To delete daylight saving time scheduling:
•
Navigate to the config>system>date-time level and enter:
no summer-time
SecFlow-1p
8. Timing and Synchronization
540
Examples
 To schedule daylight saving time starting March 27 2017 at 1:00 and ending October 27 2017 at
2:00:
config>system>date-time#summer-time date march 27 2017 01:00 october 27 2017 12:59
 To schedule daylight saving time starting on the first Friday in March at 2:00 and ending on the
last Sunday in October at 3:00:
configure system date-and-time
summer-time recurring 1 friday march 02:00 last sunday october 03:00
Configuration Errors
The following table lists the messages generated by the device when a configuration error is detected.
Message
Cause
Corrective Action
Schedule with this
name already
configured
You tried to create a new schedule
with a name that is used by an existing
schedule.
Specify a name that is not being
used by an existing schedule.
Summer-time already
configured
You entered the summer-time
command to configure daylight saving
time, but the scheduling of
summer-time has already been
configured.
Delete the existing summer-time
configuration; and then re-enter
the summer-time command.
Recurring
summer-time start
and end must be on
different months
You tried to configure summer-time
start and end in the same month.
Enter the summer-time command
with summer-time start and end in
different months.
Summer-time cannot
end before it starts
You entered the summer-time
command (with one-shot schedule
type) with summer-time end time
earlier than summer-time start.
Enter the summer-time command
with summer-time start time
earlier than the end time.
SecFlow-1p
8. Timing and Synchronization
541
Viewing Scheduled Daylight Saving Time
 To view daylight saving time:
•
Navigate to the config>system>date-time level and enter:
show summer-time
config>system>date-time# show summer-time
Current date:
13 August 2019
10:30:51
+00:00
Start (Date) : 29 March 2019 02:00
End
(Date) : 27 October 2019 02:00
Offset
: 60
For details and an example on how to view in your device scheduled data, including daylight saving time,
refer to Viewing Scheduling Information.
9 Administration
9.1 Product Information
The SecFlow-1p management software allows you to assign a name and description to the product, and
assign a contact person.
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
RFC 3841 - Caller Preferences for the Session Initiation Protocol (SIP)
Setting Parameters
 To configure product information:
1. Navigate to configure system.
The config>system# prompt is displayed.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Comments
Specifying contact person
contact <contact-person>
Typing no contact removes contact person.
SecFlow-1p
9. Administration
543
Task
Command
Comments
Assigning product name
name <product-name>
The product name can be 0-255 characters;
however, the product prompt displays only up to
20 characters, therefore if you enter a name with
more than 20 characters, the prompt displays
the first 19 characters followed by *.
For example, a command that defines a product
with a name longer than 20 characters:
config sys name 12345678901234567SF-1p
results in this prompt:
12345678901234567vC*#
You can view the complete product name by
typing show device-information.
Typing no name removes the name entirely.
Specifying location
location <device-location>
Displaying copyright
information
show copyright
Displaying product
information, MAC address,
and amount of time product
has been running
show device-information
Displaying information
output of a predefined
series of commands
show tech-support
Example
 To configure SecFlow-1p product information:
•
Product name – SecFlow-1p
Unified output of the following commands:
•
•
•
•
•
•
•
•
show configure system system-date
show configure system device-information
show file sw-pack
show file copy
show configure port summary
show configure router 1 arp-table
show configure router 1 routing-table
show configure management users-details
SecFlow-1p
•
Location – floor-8
•
Contact – Engineer-1
9. Administration
exit all
configure system
name SecFlow-1p
location floor-8
contact Engineer-1
exit all
 To display configuration for your needs or for technical support:
config>system# show tech-support
# Execute tech-support-script
# 2019-08-14 08:41:28 UTC +00:00, system uptime: 67645 seconds
show configure system system-date
2019-08-14
08:41:28 UTC +00:00
# 2019-08-14 08:41:28 UTC +00:00, system uptime: 67645 seconds
show configure system device-information
Description
: SF-1p Hw: 0.4, Sw: 5.0.5.26
Name
: SF-1p
Model
: SF-1P superset
Firmware
: SF-1P/E1/ACEX/4U2S/2RS/L1/G/WF
Location
: The location of this device
Contact
: Name of contact person
MAC Address
: 18-06-F5-D1-96-69
Engine Time
: 18:39:56
# 2019-08-14 08:41:28 UTC +00:00, system uptime: 67645 seconds
show file sw-pack
Name
Version
Creation Time
Actual
----------------------------------------------------------------------------sw-pack-1
5.0.0.40
2019-07-16
06:02:00 active
# 2019-08-14 08:41:28 UTC +00:00, system uptime: 67646 seconds
show file copy
# 2019-08-14 08:41:28 UTC +00:00, system uptime: 67646 seconds
show configure port summary
config>port# show summary
544
SecFlow-1p
9. Administration
Panel
Name
Admin Oper
Speed
----------------------------------------------------------------------------Ethernet 1
Ethernet 1
Down
Down
0
Ethernet 2
Ethernet 2
Down
Down
0
Ethernet 3
Ethernet 3
Up
LLD
0
Ethernet 4
Ethernet 4
Up
Up
1G
Ethernet 5
Ethernet 5
Up
LLD
0
Ethernet 6
Ethernet 6
Up
LLD
0
Cellular lte
Cellular lte
Down
Down
0
WLAN 1
WLAN 1
Up
Up
0
WLAN 2
WLAN 2
Up
Up
0
Virtual 1
Virtual 1
Down
Down
0
Virtual 2
Virtual 2
Down
Down
0
Virtual 3
Virtual 3
Down
Down
0
Virtual 4
Virtual 4
Down
Down
0
Virtual 5
Virtual 5
Down
Down
0
Virtual 6
Virtual 6
Down
Down
0
Virtual 7
Virtual 7
Down
Down
0
Virtual 8
Virtual 8
Down
Down
0
Virtual 9
Virtual 9
Down
Down
0
Virtual 10
Virtual 10
Down
Down
0
# 2019-08-14 08:41:29 UTC +00:00, system uptime: 67646 seconds
show configure router 1 arp-table
IP Address
MAC Address
Status
----------------------------------------------------------------------------# 2019-08-14 08:41:29 UTC +00:00, system uptime: 67646 seconds
show configure router 1 routing-table
IP Address/Prefix Length Next Hop
Interface
Protocol
Metric
----------------------------------------------------------------------------169.254.0.0/16
0.0.0.0
32
Local
0
IPv6 Address/Prefix Length
via Next Hop
Interface Protocol
Metric
----------------------------------------------------------------------------fe80::/64
via
0.0.0.0
32
Local
0
# 2019-08-14 08:41:32 UTC +00:00, system uptime: 67649 seconds
show configure management users-details
User:su Level:su Popup:Enabled
From:Serial For(sec):438
545
SecFlow-1p
9. Administration
546
9.2 File Operations
You can perform the following operations:
•
Transfer files via SFTP/SCP/FTP/FTPs
•
Copy files within SecFlow-1p
•
Display files
•
Delete files
Applicability and Scaling
File operations are applicable to all the device versions.
Functional Description
For the list of files that SecFlow-1p supports, refer to Configuration and Software Files.
User Directory
The SecFlow-1p file system contains a directory for user files, called user. The size of the user directory
varies per device and is determined by the disk space that the device can allocate. You can copy files to
and from the user directory, and delete files that are not in use. User file names are strings between 1
and 32 characters long.
Commands for Copying Files
You can copy or transfer files via the copy command, or via the commands shown in the table below.
Some commands that reset SecFlow-1p also erase the saved user configuration by copying another file
to it before the reset.
Command
Level
Copies…
Additional
Actions
Manual Section
save
Global
running-config to startup-config
None
Saving Configuration
Changes
SecFlow-1p
9. Administration
Command
Level
Copies…
Additional
Actions
Manual Section
factory-default
Admin
factory-default to startup-config
Unit resets
after copying
Resetting to Factory
Defaults
user-default
Admin
user-default-config to
startup-config
Unit resets
after copying
Resetting to User
Defaults
547
Using SFTP or SCP
You can download or upload files to SecFlow-1p via SFTP/SCP. Normally the types of files copied are
configuration files and software files.
For details on upgrading the product software, refer to Software Upgrade.
SFTP Application
The SFTP protocol is used to provide secure file transfers via the product's Ethernet interface. SFTP is a
version of FTP that encrypts commands and data transfers, keeping your data secure and your session
private. For SFTP file transfers, an SFTP server application must be installed on the computer.
A variety of third-party applications offers SFTP server software. For more information, refer to the
documentation of these applications.
Note
SFTP file transfers are carried out through any TCP port (default is 22). You
should check that the firewalls you are using on the computer and Windows
allow communication through the port defined for SFTP connection. If not,
configure the firewall settings to open the desired TCP port.
SCP Application
The SCP protocol is typically used to provide secure file transfers between a local host and a remote
host. For SCP file transfers, an SCP server application must be installed on the computer.
A variety of third-party SCP applications are available that allow the instant creation of a SCP server on a
client computer. For more information, refer to the documentation of these applications.
SecFlow-1p
Note
9. Administration
SCP file transfers are carried out through TCP port 22. You should check that
the firewalls you are using on the computer and Windows allow
communication through this port. If not, configure the firewall settings to
open TCP port 22.
Copying Files
You can use the copy command to copy files within the device, as well as to download/upload files to
the device via SFTP/SCP. You can also download/upload software pack files via FTP and FTPs.
Note
The Firewall database cannot be uploaded/downloaded using the CLI
command.
Note
The Syslog local accounting-log file can be uploaded; it cannot be
downloaded.
 To copy files:
•
At any prompt, enter:
copy <source-file-url> <destination-file-url>
Where:
•
<file-url> = <url-prefix> <file>
•
<url-prefix> can be empty, or one of the following:
 tftp://<ipv4-address>/
 tftp://[<ipv6-address>]/
 sftp://<username>:<password>@<ipv4-address>[:<port>]/
 sftp://<username>:<password>@[<ipv6-address>][:<port>]/
 scp:// user:password@ipv4-address:port/
 scp://user:password@[ipv6-address]:port/
 ftp://<username>:<password>@<ipv4-address>:<port>/
 ftp://<username>:<password>@[<ipv6-address>]:<port>/
 ftps://<username>:<password>@<ipv4-address>:<port>/
 ftps://<username>:<password>@[<ipv6-address>]:<port>/
 flash-<flash-number>:
548
SecFlow-1p
Notes
9. Administration
•
•
•
•
The length of the SFTP server URL and of the filename is limited to 96
characters.
The total length of flash file URL (i.e. media name + path + filename) is
limited to 96 characters.
It is not necessary to specify <port> when using a well-known port.
<file> can be empty, one of the following files, or the file name on a remote computer if
applicable. If <file> is on a remote computer, it can contain a path and file name, or just a file
name.
 startup-config
 restore-point-config
 rollback-config
 running-config
 user-default-config
 factory-default-config
 sw-pack-1, sw-pack-2
 zero-touch-config-xml
 pm-0
 db-schema
 db-config
 schedule-log
 user/<filename>
 <file> =

startup-config

restore-point-config

rollback-config

running-config

user-default-config

factory-default-config

log

sw-pack-1

sw-pack-2

zero-touch-config-xml

banner-text
549
SecFlow-1p












•
9. Administration
pm-0
db-schema
db-config
ltm_1
ltm_9
schedule-log
accounting-log
sniffer-file
user-script
script-result
sw-update-1
sw-update-2
The maximum length/range is:
 <username> – 1–60 characters
 <password> – 1–60 characters
 <file> – 1–96 characters
 <port> – 1–65535
Viewing Copy Status
You can display the status of current and past copy operations, sorted by session start time.
 To display copy status:
•
At the file# prompt, enter:
show copy [summary]
Viewing Information on Files
You can display the following information:
•
SecFlow-1p files
•
SecFlow-1p user files
550
SecFlow-1p
9. Administration
•
Information on the configuration files
•
Contents of configuration text files
•
Information on the software files (software packs and updates).
551
Viewing SecFlow-1p Files
You can display a list of all non-hidden files on the SecFlow-1p host. The list is sorted by type, and then
by name.
Note
•
•
If time of creation is unknown, SecFlow-1p displays the time when it
became aware of the file’s existence.
If the file size is unknown, SecFlow-1p displays the size as ‘--’.
 To display SecFlow-1p files:
•
At the file# prompt, enter:
dir
A list of the file names and types is displayed.
Viewing User Directory Files
SecFlow-1p supports the user-file-dir command to list the user files in its user directory, sorted by name.
 To display user files:
•
At the file# prompt, enter user-file-dir.
Note
It is optional to enter folder-name, as user is currently the only available
folder.
Viewing Configuration Files
You can display a list of configuration files in the system, and when each was last modified, and if valid.
 To display information on the configuration files:
•
At the file# prompt, enter:
show configuration-files
SecFlow-1p
9. Administration
552
Information on the configuration files is displayed.
Viewing Configuration Text File Contents
You can display the contents of each configuration text file stored in the file system.
 To display the contents of non-user configuration text files:
•
At the file# prompt, enter one of the following:
 show factory-default-config
 show rollback-config
 show startup-config
 show user-default-config
The contents of the specified configuration file are displayed.
 To display the contents of user text files (i.e. files stored in the /user directory):
•
At the file# prompt, enter show user-dir <filename>.
Note
You can display the contents of a user file that is not binary and contains only
printable characters.
 To display the contents of the running-config file:
•
From any level (global command), enter show running-config.
Viewing Software File Details
SecFlow-1p supports a command to display details of installed software packs.
 To display information on the software files:
•
At the file# prompt, enter:
show sw-pack [refresh [<sec>]]
where sec represents the refresh timeout, with range 3–100.
Information on the software files is displayed. The State of a SW file can be one of the following:
active, ready, corrupted, downloading, previous active.
SecFlow-1p
9. Administration
Deleting Files
You can delete the following files:
•
restore-point-config
•
sw-pack-<n>
•
sw-update-<n>
•
rollback-config
•
startup-config
•
user-default-config
•
zero-touch-config-xml
Note
•
•
Use caution in deleting files.
You cannot delete the active software pack
When software packs are downloaded, SecFlow-1p extracts software packs into corresponding
partitions. If a software pack is deleted, SecFlow-1p erases its corresponding partition.
Deleting software updates does not affect the active software, even if the update has been already
installed.
 To delete a file:
1. At the file# prompt, enter:
delete <file-name>
You are prompted to confirm the deletion.
2. Confirm the deletion.
Examples
Copying Files within the Device
•
Source file name – running-config
•
Destination file name – startup-config
copy running-config startup-config
553
SecFlow-1p
9. Administration
Downloading via SFTP
•
SFTP server address – 192.20.20.20
•
SFTP user name – admin
•
SFTP password – 1234
•
Source file name – bin/SF-1p.img
•
Destination file name – sw-pack-2
copy sftp://admin:1234@192.20.20.20/bin/SF-1p.img sw-pack-2
Uploading via SFTP
•
SFTP server address – 192.20.20.20
•
SFTP user name – admin
•
SFTP password – 1234
•
Source file name – startup-config
•
Destination file name – config/db1conf.cfg
copy startup-config sftp://admin:1234@192.20.20.20/config/db1conf.cfg
Copying Files from the Device to SD Card
•
Source file name – startup-config
•
Destination file name – startup-backup
copy startup-config flash-1:startup-backup
Copying Files from SD Card to the Device
•
Source file name – startup-backup
•
Destination file name – startup-config
copy flash-1:startup-backup startup-config
Viewing SecFlow-1p Files
file
file# dir
Codes: C-Configuration
S-Software
L-License
LO-Log
O-Other
B-Banner
554
SecFlow-1p
Name
9. Administration
Type Size(Bytes) Creation Date Status
db-config
LO
--
db-schema
LO
--
pm-0
LO
9858
schedule-log
LO
1202
sw-pack-1
S
22355036
sw-pack-2
S
22398987
startup-config
C
964
rollback-config
C
94753
user-default-config
C
784
factory-default-config C
144
running-config
C
--
restore-point-config
C
784
log
LO
126
zero-touch-config-xml
X
31124
Total Bytes : 2781732864Free Bytes
2017-06-07
13:00:46
2017-06-07
13:00:46
2078-12-01
12:48:02
2017-06-07
13:00:46
2017-04-12
15:10:50
2017-05-29
10:42:45
2017-06-07
12:58:58
2017-05-29
16:19:40
2017-05-29
15:01:10
2017-06-07
13:00:48
2017-06-12
12:40:39
2017-06-04
17:37:48
2017-10-21
18:11:14
2017-10-21
18:29:28
File In Use
Read Only
File In Use
Read Only
File In Use
File In Use
Read Only
File In Use
Prev In Use
Read Only
: 1150779392
Bytes Available for PM : 4990142
Viewing User Directory Files
file
file# user-file-dir
Name
Type Size (bytes) Creation Date
Status
-------------------------------------------------------------------my-default-config U
2500
01.10.2017
read only
00:00:10
Total Bytes : 4004028416 Free Bytes : 1958920192
Viewing Configuration Files
file
file# show configuration-files
Configuration
Last Modified
Valid
555
SecFlow-1p
9. Administration
-----------------------------------------------------------------------------startup-config
2017-06-07 12:58:58 Yes
rollback-config
2017-05-29 16:19:40 Yes
user-default-config
2017-05-29 15:01:10 Yes
factory-default-config2017-06-07 13:00:48 Yes
running-config
2017-06-12 12:40:39 Yes
Device loaded from : startup-config
startup-config equals running-config
Viewing Configuration File Contents
file# show startup-config
# configuration file
exit all
#
#
configure
Management configuration
management
SNMP Configuration
snmp
snmp-engine-id mac 00-00-00-00-00-00
exit
exit
router 1
name "Router#1"
interface 1
address 172.17.161.37/24
name "eth0"
bind ethernet lan4
dhcp-client
client-id mac
exit
no shutdown
exit
static-route 0.0.0.0/0 address 172.17.161.1 metric 1
exit
exit
Viewing Software Pack Information
show file sw-pack
Name
Version
Creation Time
Actual
----------------------------------------------------------------------------sw-pack-1
5.0.0.40
2020-09-06
11:04:57 active
sw-pack-2
5.0.0.39
2020-09-02
18:52:56 ready
556
SecFlow-1p
9. Administration
557
Deleting a File
file# delete startup-config
! The file will be erased. Are you sure? [yes/no] _yes
9.3 Resetting to Default
SecFlow-1p supports the following types of reset:
•
Reset to factory defaults
•
Reset to user defaults
•
Overall reset (restart) of the product
Note
You can request that the active software pack be confirmed after the next
reboot of SecFlow-1p. Refer to the description of installing software in the
Installation and Setup chapter for details.
Resetting to Factory Defaults
SecFlow-1p can be reset to its factory defaults using either of the following commands:
•
factory-default – for customer use
•
factory-default-all – not recommended for customer use
The factory-default and factory-default-all commands have the following differences:
•
factory-default always reloads SecFlow-1p with factory-default-config. factory-default-all
reloads SecFlow-1p with user-default-config, if it exists; otherwise, with factory-default-config.
•
factory-default copies factory-default-config into startup-config.
factory-default-all clears the log files and deletes most files, with the exception of
factory-default-config, user-default-config, software, pm, db-schema, and db-config. It also
resets file creation times in the file system.
•
factory-default-all resets the snmpEngineBoots parameter to 1. This parameter counts the
number of times the SNMP engine was restarted, and is maintained throughout reboots to
prevent replay attacks.
Note
The Firewall database cannot be reset using the CLI command.
SecFlow-1p
Note
Caution
9. Administration
558
It is not recommended for customers to use the factory-default-all command,
as it resets the SNMP object (snmpEngineBoots). This can result in the
management station incorrectly assuming that the original device was
replaced by another impersonating device, and therefore the management
station will refuse to communicate with the device. In such cases, the
manager must manually delete the device from the map and then redraw it.
To avoid such issues resulting from the resetting of snmpEngineBoots, it is
recommended to use instead user-default or factory-default and then
manually delete unneeded files and clear logs, as required
Setting SecFlow-1p to factory defaults deletes all existing virtualization
entities and instances, regardless of the configured management mode.
 To reset SecFlow-1p to factory defaults:
1. At the admin# prompt enter:
factory-default
A confirmation message is displayed:
Current configuration will be erased and device will reboot with
factory default configuration. Are you sure? [yes/no]
2. Enter yes to confirm the reset to factory defaults.
The factory-default-config file is copied to the startup-config file. The unit resets, and after it
completes its startup the factory defaults are loaded. If a startup-config confirm request was
active, it is canceled.
 To reset SecFlow-1p to factory defaults and delete its entire database:
1. At the admin# prompt enter: factory-default-all
A confirmation message is displayed:
The device will delete its entire database and reboot. Are you sure?
[yes/no]
2. Enter yes to confirm the reset to factory defaults with configuration and counter reset.
The configuration and counter reset explained above is performed, the unit resets, and after it
completes its startup the factory defaults are loaded. If a startup-config confirm request was
active, it is canceled.
SecFlow-1p
9. Administration
559
Resetting to User Defaults
You can use the user-default command to reset SecFlow-1p to the configuration stored in user-defaultconfig, a file which contains user default parameters that are usually different from RAD’s factory
default parameters.
 To reset SecFlow-1p to user defaults:
1. At the admin# prompt enter: user-default
A confirmation message is displayed:
Current configuration will be erased and device will reboot with user
default configuration. Are you sure? [yes/no]
2. Enter yes to confirm the reset to user defaults.
The user-default-config file is copied to the startup-config file. The unit resets, and after it
completes its startup the user defaults are loaded. If a startup-config confirm request was
active, it is canceled.
Restarting SecFlow-1p
If necessary, you can restart SecFlow-1p without interrupting the power supply.
 To restart SecFlow-1p:
1. At the admin# prompt enter: reboot
A confirmation message is displayed:
Device will reboot. Are you sure? [yes/no]
2. Enter yes to confirm the reset.
The unit restarts.
9.4 Inventory
SecFlow-1p supports the display of an inventory table of all the third-party device components,
hardware and software revisions, and power supply types. You can display an inventory table that shows
all installed components, and you can display more detailed information for each component. The
inventory display differs for each product according to the different chassis components and port
configurations.
SecFlow-1p
9. Administration
560
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
RFC 4133 – Entity MIB
Benefits
You can monitor the installed components and hardware/software revisions.
Viewing Inventory Information
 To display the inventory table:
•
At the config>system# prompt, enter:
show summary-inventory
The inventory table is displayed (see Example for a typical inventory table output).
You can display more information for each installed inventory component. To do so, you need to enter
the inventory level with the corresponding inventory component index, which is displayed in the Index
column in the output of show summary-inventory.
 To display the inventory component information:
1. Navigate to configure system inventory <index>.
2. Enter:
show status
Information for the corresponding inventory component is displayed according to the following
parameters:
SecFlow-1p
9. Administration
561
Parameter
Description
Description
Description of component type, in the form:
RAD.<device-name>.< Physical Class>, e.g. RAD.ETX­2i.Port
Contained In
Index of the component that contains the component for which information is
being displayed. This is 0 for the chassis, as it is not contained in any component,
and 1001 for all other components, as they are all contained in the chassis.
Physical Class
Class of component
Possible values: Chassis, CPU, Power Supply, Fan, Sensor, Port, Container,
Module
Relative Position
Contains the relative position of this component among other components in
the same index range (e.g. index 4001–4002, etc.)
Name
Name of component
Possible values (according to component type):
<device-name> – Chassis
CPU
PS-AC/DC <n>
PS-AC <n>
PS-DC <n>
Fan <n>
Temperature Sensor <n>
External Clock
ETH Port [<slot>/]<n>
MNG Port
RS-232 Control Port
Time of Day Port
Mini BNC
External Clock Port
HW Rev
Hardware version (relevant only for chassis)
SW Rev
Software version (relevant only for chassis)
FW Rev
Firmware version (relevant only for chassis)
Serial No.
Serial number (blank if unknown for component)
MFG Name
Manufacturer name (blank if unknown for component)
Model Name
Model name (blank if unknown for component)
Alias
Alias name for component
SecFlow-1p
9. Administration
Parameter
Description
Asset ID
Identification information for component
FRU
Indicates whether this component is a field replaceable unit that can be
replaced on site.
For ETX­2i this is normally true only for the chassis, and for the dual power
supplies.
Processor
Processor name
Possible processors:
Intel Atom Rangeley C2558
Intel Atom Rangeley C2758
Cores
Core size
Possible values:
4 – Quad
8 – Octal
Core Frequency
2.4 GHz
RAM
RAM volume
8 GByte
HD Type
Hard Drive type
SSD M2.0 format
HD Volume
128 GByte
Examples
 To display inventory information for power supply (index 4002):
config system
config>system# inventory 4002
config>system>inventory(4002)# show status
Description
: Power Supply
Contained In
: 1001
Physical Class
: Power Supply
Relative Position : 2
Name
: PS 1
HW Ver
:
SW Ver
:
562
SecFlow-1p
FW Ver
Serial Number
MFG Name
Model Name
Alias
Asset ID
FRU
9. Administration
563
:
:
: RAD
:
:
:
: False
config>system>inventory(4002)#
 To display inventory information for chassis (index 1001):
config>port# show summary
Panel
Name
Admin Oper
Speed
----------------------------------------------------------------------------config>system>inventory(1001)# show status
Description
: Chassis
Contained In
: 0
Physical Class
: Chassis
Relative Position : 1
Name
: SF-1p
HW Ver
: 1.0/a
SW Ver
: 5.0.1.137
FW Ver
:
Serial Number
: 00-55-44-33-2B-41
MFG Name
: RAD
Model Name
: SF-1P/E1/ACEX/4U2S/2RS/L1/G/WF
Alias
:
Asset ID
:
FRU
: True
9.5 Login Banner
You can define a banner to be displayed before the login prompt for user name (using the CLI command
login-message), as well as a banner to be displayed following successful login (using the CLI command
announcement).
Note
If you are accessing SecFlow-1p via SSH, the banner is printed between the
user name prompt and the password prompt.
SecFlow-1p
9. Administration
564
Applicability and Scaling
This feature is applicable to all the device versions.
Functional Description
Pre-login and post-login banner messages must satisfy the following:
•
Message must be enclosed in single quotation marks.
•
Pressing <Enter> before entering a closing quotation mark, results in the warning message:
Enter message. End with the single quotation character (‘).
•
A message that spans multiple lines is interpreted as if it were written in one line; <cr> and <lf>
between lines in the configuration file or command are ignored.
•
A message can contain printable characters, as well as the following special characters (only
relevant for CLI; from SNMP, these characters should be entered normally):
 \n – new line
 \t – horizontal tab
 \’ – single quotation mark
 \\ – backslash
•
Usage of special characters reduces the maximum number of printable characters that the
banner can contain. For example, if the banner contains \n, up to 1998 additional printable
characters can be used.
•
The banner can be up to 2000 characters (including the escape / characters). An attempt to
configure a longer banner results in the CLI error: Banner may not exceed 2000 characters.
Configuring Login Banners
 To configure a pre-login banner:
1. Navigate to configure system.
The config>system# prompt is displayed.
2. Type login-message <message>, enclosing the message in quotes.
At the next login, this pre-login banner is displayed.
SecFlow-1p
Note
9. Administration
565
Type no login-message to remove a previously configured pre-login banner.
 To configure a post-login banner:
1. Navigate to configure system.
The config>system# prompt is displayed.
2. Type announcement <message>, enclosing the message in quotes.
After the next login, this post-login banner is displayed.
Note
Type no announcement to remove a previously configured post-login banner.
You can display the banners configured for SecFlow-1p by navigating to the product level and entering
info.
Example
info
configure
echo "System Configuration"
#
System Configuration
system
login-message 'Authorized Users Only'
announcement 'Successful Login!'
exit
The configured banners are displayed before and after login, as shown below.
Authorized Users Only
user>su
password>****
Successful Login!
SecFlow-1p
10. Monitoring and Diagnostics
566
10 Monitoring and Diagnostics
10.1 Dry Contacts
SecFlow-1p can display system and feature alarms as relay output. Alarm relay allows to control an
external circuit. When a certain event occurs, the alarm input can produce a warning signal to report the
event.
For setting the alarms, four optocoupler contacts marked “I/O ALARM” (or “DRY CONTACT”) are used.
Applicability and Scaling
Input signals should be in voltage range 10–57 V and provide minimum current 10mA at higher voltage.
Functional Description
See Connecting to a Dry Contacts Terminal section in the Installation and Setup chapter.
Factory Defaults
By default, the alarms are disabled.
Configuring Alarms
This section describes how to configure dry contact alarm properties.
Factory Defaults
Configuration defaults are listed in the table below.
Parameter
Description
Default Value
active
Alarm-input: active state of the port input line
off
SecFlow-1p
10. Monitoring and Diagnostics
567
 To configure dry contact alarm properties:
1. Navigate to configure reporting.
The config>reporting# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Task
Command
Comments
Setting the active state of
the port input line and
alarm description
alarm-input <input-port> [active
{high | low | off}] [description
<description-string>]
<input-port> values are 1..2 or 1..3
(according to the ordering option)
high – Active alarm input is
indicated by high voltage
low – Active alarm input is indicated
by low voltage
off – Alarm input is disabled
Description-string – a free-text
alarm name
Displaying the state of
input alarms and
configured voltage for
each input line
show alarm-input
Status:
• Active – an active external alarm
is present on the port
• Inactive – external alarm is not
active or port in shutdown state
Voltage: as defined by alarm-input
<slot>/<port> [active {high | low |
off}] command
• Description: as configured in
alarm-input command
SecFlow-1p
10. Monitoring and Diagnostics
Task
Command
Comments
Defining the output relay
(dry contact) and its state
when an alarm is present
alarm-output port <alarmoutput-number>
energized {yes | no}
Energizing:
568
• energized yes – The
corresponding relay is normally
unenergized and switches to the
energized state when the alarm
is active.
• energized no – The
corresponding relay is normally
energized and switches to the
unenergized state when the
alarm is active.
The relay contacts are normally
open.
The maximum number of possible
alarm outputs is 2 or 3, depending
on the device ordering option.
Temporarily silence active
alarm output
alarm-cut-off port <alarmoutput-number>
Binding an alarm of
specific source type to an
alarm output port
[no] bind-alarm-to-relay <sourcetype> {<alarm-name> | all}
alarm-output <alarm-outputnumber>
For the list of source types and
corresponding alarm names, refer to
the alarm list under Alarms and
Events in this chapter.
For example: bind-alarm-to-relay
ethernet alarm los alarm-output 1
bind-alarm-to-relay ethernet alarm
all alarm-output 1
Using no before the command
cancels the alarm binding
If the specified alarm output is
already bound, by this command or
by bind-alarm-source-to-relay, the
new command replaces the
previous binding
SecFlow-1p
Task
Binding an alarm of
specific source type on a
specific user port to an
alarm output port
10. Monitoring and Diagnostics
Command
bind-alarm-source-to-relay
<source-type> {<alarm-name> |
all} <source-id> alarm-output
<alarm-output-number>
569
Comments
For the list of source types and
corresponding alarm names, refer to
Alarm list in this chapter.
For example:
bind-alarm-source-to-relay
ethernet all wan1 alarm-output 1
bind-alarm-source-to-relay
ethernet los wan1 alarm-output 1
no bind-alarm-to-relay cancels the
alarm binding.
If the specified alarm output is
already bound, by this command or
by bind-alarm-to-relay, the new
command replaces the previous
binding
Displaying all the alarm
outputs
show alarm-outputs
10.2 Syslog
SecFlow-1p uses the Syslog protocol to generate and transport event notification messages over IP
networks to Syslog servers.
Syslog protocol collects heterogeneous data into a single data repository. It provides system
administrators with a single point of management for collecting, distributing, and processing audit data.
Syslog standardizes log file formats, making it easier to examine log data with various standard tools.
Data logging can be used for:
•
Long-term auditing
•
Intrusion detection
•
Tracking user and administrator activity
•
Product operation management
SecFlow-1p
10. Monitoring and Diagnostics
570
Applicability and Scaling
This feature is applicable to all the device versions.
Standards Compliance
RFC 3164 - The BSD syslog Protocol
RFC 5674 - Alarms in Syslog
Functional Description
The Syslog protocol provides an instrument for generating and transporting event notification messages
from SecFlow-1p to servers across IP networks.
Elements
Typical Syslog topology includes message senders (clients) and message receivers (servers). SecFlow-1p
supports Syslog client functionality. It can send messages to up to five Syslog servers. The receiver
displays, stores, or forwards logged information.
Transport Protocol
Usually, Syslog uses UDP port 514 for its transport, but devices and servers can be defined to use any
port for communication.
Message Format
The length of a Syslog message is 1024 bytes or less. It contains the following information:
•
Facility and severity (see below)
•
Host name or IP address of the device
•
Timestamp
•
Message content
A typical Syslog message looks like this:
<145>Jan 15 13:24:07 172.17.160.69 Eth 1: Loss of signal (LOS)
SecFlow-1p
10. Monitoring and Diagnostics
571
Facilities and Severities
Facility designates a device or application that sends a message. The standard includes some predefined
facilities in the 0–15 range. For originator identification, SecFlow-1p can be configured to use facilities
local1– local7; local1 is the default facility.
Severity is assigned to a message to specify its importance. SecFlow-1p uses the following severity
designations:
Code
Syslog Type
Description
0
Emergency
Emergency message, not in use
1
Alert
Critical alarm
2
Critical
Major alarm
3
Error
Minor alarm
4
Warning
Event
5
Notice
Cleared alarm and accounting message
6
Informational
Informational message, not in use
7
Debug
Debug-level messages, not in use
Factory Defaults
By default, Syslog operation is disabled. When enabled, the default parameters are as follows:
Parameter
Default Value
facility
local1
port
514
severity-level
informational
shutdown
shutdown
SecFlow-1p
10. Monitoring and Diagnostics
572
Configuring Syslog Parameters
When configuring Syslog parameters, it is necessary to enable Syslog device (client) and define Syslog
servers. The remaining configuration is optional.
 To configure Syslog device:
1. Navigate to configure system syslog device.
The config>system>syslog(device)# prompt is displayed.
2. Enter the necessary commands according to the tasks listed below.
Task
Command
Defining a facility from
which Syslog messages
are sent
facility {local1 | local2 | local3 |
local4 | local5 | local6 | local7}
Defining Syslog device
UDP port for
communication
port <udp-port-number>
Defining severity level
severity-level { emergency | alert |
critical | error | warning | notice |
informational | debug}
Comments
Possible values: 1–65535
Port configuration is allowed only if
a Syslog device is administratively
disabled.
The log messages that contain
severity level above or equal to the
specified level are transmitted.
• emergency – emergency
messages
• alert – critical alarms
• critical – major alarms
• error – minor alarms
• warning – events
• notice – cleared alarms,
accounting messages
• informational – informational
messages; not in use
• debug – debug messages; not in
use
Administratively enabling
Syslog device
no shutdown
shutdown administratively disables
the Syslog device.
Displaying Syslog
statistics
show statistics
See Viewing Syslog Statistics
SecFlow-1p
10. Monitoring and Diagnostics
Task
Command
Clearing Syslog statistics
clear-statistics
573
Comments
 To configure a Syslog server:
1. Navigate to configure system.
The config>system# prompt is displayed.
2. At the config>system# prompt, enter syslog server <server-ID> to specify the server to receive
Syslog messages, where <server-ID> is 1 to 5.
The config>system>syslog(server/<server-ID>)# prompt is displayed.
3. Enter the necessary commands according to the tasks listed below.
Task
Command
Comments
Enabling Syslog commands
accounting (logging of
command entries)
[no] accounting
commands
To disable command logging, enter no
accounting
Defining Syslog server IP
address
address <ip-address>
ip-addrees – Syslog server IP address
Possible values:
0.0.0.0–255.255.255.255
Defining Syslog server UDP
port for communication
port
<udp-port-number>
udp-port-number – UDP port
Possible values: 1–65535
Administratively enabling
Syslog server
no shutdown
shutdown administratively disables Syslog
server.
Note: This command is available only after
you define the Syslog server IP address.
Example
•
Server IP address: 178.16.173.152
•
UDP port: 155
exit all
configure system
syslog device
no shutdown
exit
syslog server 1
SecFlow-1p
10. Monitoring and Diagnostics
address 178.16.173.152
port 155
no shutdown
save
exit all
Configuration Errors
The following table lists messages generated by SecFlow-1p when a configuration error is detected.
Message
Description
Syslog Port is out of range
Selected UDP port value is out of allowed range (1–65535).
Port is illegal or Device Port is already
in use
Selected UDP port is already in use.
Parameter cannot be changed if
Logging Status/Server Access is
enabled
Device/server UDP port or server IP address cannot be changed
while Syslog server is enabled.
Illegal Severity
Invalid severity value
Illegal Facility
Invalid facility value
Illegal Server IP Address
Invalid server IP address
Viewing Syslog Statistics
 To display Syslog statistics:
1. Navigate to configure system syslog device.
The config>system>syslog(device)# prompt is displayed.
2. At the config>system>syslog(device)#, enter show statistics.
Syslog statistics appear as shown below. The counters are described in the following table.
config>system>syslog(device)# show statistics
Total Tx Messages
: 356
Non-queued Dropped Messages
: 265
574
SecFlow-1p
10. Monitoring and Diagnostics
575
Parameter
Description
Total Tx Messages
The total number of Syslog messages transmitted
Non-queued Dropped
Messages
The total number of Syslog messages that were dropped before being
queued
 To clear Syslog statistics:
1. Navigate to configure system syslog device.
The config>system>syslog(device)# prompt is displayed.
2. At the config>system>syslog(device)# prompt, enter clear-statistics.
The Syslog statistic counters are set to 0.
10.3 Performance Management
VCPE-OS supports collection of performance management (PM) statistics for analyzing the device’s
service quality. The device periodically collects PM statistics into a pm-0 binary file for retrieval and
analysis by RADview and for display in the RADview PM portal (refer to the RADview System User
Manual for further details on the PM portal).
The PM collection process can be globally enabled (the default) or disabled for the entire device. In
addition, the statistics collection can be enabled for all entities of a specific type, or for specific entities,
enabling collection of necessary data only.
Functional Description
PM Statistics Collection
PM statistics collection is configured for the device, entity type, and specific entities. PM statistics are
collected for the following types of entities:
•
Ethernet ports
•
System parameters: memory usage and CPU utilization
If PM statistics collection is disabled for a particular entity type, then no PM statistics collection is done
for any entity of that type, except those for which PM statistics collection is enabled.
SecFlow-1p
10. Monitoring and Diagnostics
576
When PM statistics collection is enabled for all entities of the same type, then when a new entity of that
type is added the device automatically starts collecting PM statistics for it, as soon as PM statistics
maintenance (if applicable) is enabled for the entity.
Note
If you are using the RADview PM Portal, it is recommended to enable PM
statistics collection for all relevant entities. See Examples for a script that you
can use for this purpose.
PM statistics collection is performed at user-configurable intervals of one second to 15 minutes. A
different interval can be configured for each entity type, and for specific entities.
If different intervals are scheduled for collection at the same time, VCPE-OS collects the PM statistics
starting with the interval that has the highest frequency, and ending with the interval that has the
lowest frequency. If VCPE-OS has not finished collecting the statistics for an interval when the scheduled
time for another interval arrives, the following action is taken according to whether the new interval is
the next interval, or an interval with higher frequency:
•
If it is the next interval, then the next interval is canceled, and a PM record indicating the
cancellation is inserted in the PM data.
•
If it is an interval with higher frequency, then VCPE-OS collects the higher frequency interval
statistics and then resumes collecting the lower frequency interval statistics. The PM data is
retrieved from VCPE-OS by RADview via TFTP or SFTP. After PM data is retrieved, VCPE-OS
deletes the file and opens a new one for further data.
The PM file includes the following information: buffer (kernel) memory utilization and TCA, CPU
utilization, memory utilization, flash memory utilization, and device uptime.
Factory Defaults
Command
Level under config
Default
Remarks
pm
reporting
pm
PM statistics collection in device is
globally enabled by default.
pm-collection
Specific entity level
Disabled
PM statistics collection for specific
entities is not explicitly configured
by default; therefore, it is disabled
until statistics collection is enabled
for the entity type or entity.
SecFlow-1p
10. Monitoring and Diagnostics
577
Command
Level under config
Default
Remarks
pm-collection
ethernet
reporting
Disabled
PM statistics collection for
Ethernet ports is not explicitly
configured by default; therefore, it
is disabled.
pm-collection system
reporting
Disabled
PM statistics collection for
memory usage and CPU utilization
is not explicitly configured by
default; therefore, it is disabled.
Configuring Performance Management
You can configure PM statistics collection for the entire device via the pm command, and for entity
types via the pm-collection command, in the reporting level. For specific entities, you can configure PM
statistics collection via pm-collection, in the specific entity level.
You can configure the device to record statistics at fixed intervals using the pm-collection interval
<seconds> command. For parameters that are not zeroed regularly, it is recommended to record
statistics at fixed intervals. The interval parameter for the pm-collection command can range from 1 to
900 seconds (15 minutes); however, the value must divide evenly into 3600. It is also recommended to
set the interval value at 60 seconds or higher. Different intervals can be specified for an entity type and
for specific entities of that type, up to a supported maximum number of intervals. For example, if the
PM statistics collection interval for all Ethernet ports is configured to 15 minutes, and the PM statistics
collection interval for Ethernet 1 port is configured to 1 minute, the data displayed in the RADview PM
portal shows Ethernet data for every 15 minutes, and Ethernet 1 data for every minute.
The following shows the PM statistics collection configuration tasks, and their corresponding
commands, as well as the level of each command.
Task
Level under config
Command
Comments
Enabling PM
statistics collection
for a specific
Ethernet port
port >
ethernet(<port-name>)
pm-collection
interval <seconds>
PM collection can be enabled
at a defined interval.
It is recommended to set the
interval value at 60 seconds or
higher.
Enter no pm-collection to
disable PM statistics collection
for the Ethernet port.
SecFlow-1p
10. Monitoring and Diagnostics
Task
Level under config
Command
Comments
Globally enabling PM
statistics collection
for device
reporting
pm
Enter no pm to disable all PM
statistics collection in VCPE-OS.
Enabling PM
statistics collection
for Ethernet ports
reporting
578
Note: no pm stops all PM
collection regardless of other
PM configuration; however, it
does not change other
configurations.
It deletes any collected PM
data and PM files, as well.
pm-collection
ethernet
{interval <seconds>}
PM collection can be enabled
at a defined interval.
It is recommended to set the
interval value at 60 seconds or
higher.
Enter no pm-collection eth to
disable PM statistics collection
for Ethernet ports.
Enabling PM
statistics collection
for system
parameters
reporting
pm-collection
system {interval
<seconds> }
PM collection can be enabled
at a defined interval.
It is recommended to set the
interval value at 60 seconds or
higher.
Enter no pm-collection system
to disable PM statistics
collection for system
parameters.
Note
PM statistics are collected for entities for which PM statistics collection is
specifically enabled in the entity level via pm-collection, even if PM statistics
collection for the entity type is disabled.
Viewing Performance Management Configuration
You can use the info detail command to view the performance management configuration.
SecFlow-1p
10. Monitoring and Diagnostics
 To view the performance management configuration for the device and for entity types:
1. Navigate to configure reporting.
2. Enter info detail | include pm to view PM-related commands in the configuration.
 To view the performance management configuration for specific entities:
1. Navigate to the specific entity level.
2. Enter info detail | include pm to view PM-related commands in the configuration.
Examples
 To enable PM for all relevant entities in the device:
•
PM statistics collection enabled for device
•
PM statistics collection enabled for all relevant entities, every five minutes.
exit all
configure reporting
#**** Enable PM in device
pm
#**** Enable PM for Eth ports, collection interval=5 min
pm-collection ethernet interval 300
exit all
save
 To configure the following PM:
•
PM statistics collection enabled for device.
•
PM statistics collection enabled for Ethernet ports, every two minutes.
•
PM statistics collection for Ethernet port 3 configured to every minute.
exit all
configure reporting
#**** Enable PM in device
pm
#**** Enable PM for Eth ports, collection interval=2 min
pm-collection eth interval 120
exit all
#**** Configure PM statistics collection interval for Ethernet port
configure port ethernet 3
pm-collection interval 60
3, to 1 min
579
SecFlow-1p
10. Monitoring and Diagnostics
580
exit all
save
 To display PM configuration from above example:
# configure reporting
config>reporting# info detail | include pm
pm
pm-collection ethernet interval 120
config>reporting# exit all
# configure port ethernet 3 config>port>eth(3)# info detail | include pm
pm-collection interval 60
Configuration Errors
The following table lists the messages displayed by SecFlow-1p when a configuration error is detected.
Message
Description
Invalid interval; must divide evenly into
3600
The pm-collection command was entered with an interval value
that does not divide evenly into 3600.
Cannot execute; too many different
intervals
Attempt was made to configure more than 5 different intervals.
10.4 Detecting Problems
An alarm is an indication of a fault in SecFlow-1p. An event is an occurrence in SecFlow-1p that may be a
fault, user login, change in port status, etc. An SNMP trap can be sent to management stations as the
result of an alarm or event. Besides traps, Syslog messages can also sent as a result of alarms or events
(see Syslog above). In addition, NETCONF notifications are sent to each NETCONF client that has created
a notification subscription (see NETCONF-Based Network Management in the Management and
Security chapter).
You can configure alarms and events to pop up on the serial CLI terminal.
Alarms and events have the following properties:
SecFlow-1p
Source Type
10. Monitoring and Diagnostics
581
An entity for which alarms and events can be generated. The
source consists of a source type (e.g. Ethernet port) and source ID
(e.g. port number, in case of Ethernet port)
Available source types: system, bgp-peer, gre-tunnel
Name
Unique alphanumeric identification of the alarm/event, up to
32 characters
Description
Alphanumeric description that provides details on the
alarm/event
Trap Name
Name of trap
ID
Unique numeric identification of the alarm/event
Default Severity
Alarms only; Critical, Major, or Minor
Controlling Popup Behavior
Alarms and events are displayed (pop up) on active CLI terminals as soon as they occur. You can disable
the popups per management session. It is relevant only for a management session (serial or SSH) for
which it is configured, and does not affect any other active session.
The current alarm/event popup status is available in the show users-details screen (see below).
 To disable or enable alarm/event popups:
•
At any level, enter popup-suspend to disable alarm/event popups.
•
Enter no popup-suspend to enable alarm/event popups.
 To display the user information:
•
In the configure>management# prompt, enter show users-details.
configure management show users-details
User:1234 Level:su Popup:Disabled
From:Serial For(sec):281744
User:123456 Level:su Popup: Enabled
From:100.100.100.100/SSH For(sec):4510
Alarms and Events
You can view the full lists of alarms and events supported by SecFlow-1p.
SecFlow-1p
Note
10. Monitoring and Diagnostics
582
When viewing this file online, embedded attachments may not open due to
your browser settings. Downloading this file from www.rad.com and viewing
it offline guarantees that embedded files always open.
 To view the alarms table:
•
Double-click the paper clip image
on the following line.
 To view the events table:
•
Double-click the paper clip image
Note
on the following line.
Virtualization alarms and events are not relevant to this version of SecFlow1p.
10.5 Running a Ping Test
You can ping a remote IPv4 or IPv6 host to check the SecFlow-1p IP connectivity with that host.
Applicability and Scaling
This feature is applicable to all the device versions.
Functional Description
You can define the number of pings (packets) to generate or configure a continuous ping (infinite). The
ping generator continues to generate ping requests according to the number of configured pings, or
until you manually disrupt it (by pressing Ctrl+C).
SecFlow-1p
10. Monitoring and Diagnostics
583
Configuring a Ping Test
 To ping an IP host:
•
In any level, start pinging the host specifying its IP address (IPv4 or IPv6) and optionally the
number of packets to send, payload size (in bytes), router entity number and source address:
ping <ip-address> [number-of-packets <packets>] [payload-size <bytes>]
[router-entity <number>] [source-address <address>]
Ping Test Parameters
Parameter
Description
Value
<ip-address>
Destination IP address
Valid IPv4 or IPv6 address (any
unicast address)
Note: Multicast address is not
allowed.
number-of-packets
Number of pings
Possible values:
0 (forever), 1-10000
Default: 5
payload-size
Packet size
Possible values:
32-1450 bytes
router-entity
Related router-entity
Possible values: 1-max-vrf-number
source-address
Source IP address
Valid IPv4 or IPv6 address (any
unicast address)
If the remote host answers, SecFlow-1p displays the ping results including the round trip delay, rounded
as in the following table.
Ping Round Trip Results
Round Trip Delay
Displayed in Ping Results
<= 10 msec
time < 10 ms
>= 11 msec and <= 20 msec
time < 20 ms
>= 21 msec and <= 30 msec
time < 30 ms
>= 31 msec and <= 40 msec
time < 40 ms
SecFlow-1p
10. Monitoring and Diagnostics
584
Examples
#ping 10.10.10.10
Reply from 10.10.10.10: bytes = 32, packet number = 0, time < 10 ms
Reply from 10.10.10.10: bytes = 32, packet number = 1, time < 10 ms
Reply from 10.10.10.10.44: bytes = 32, packet number = 2, time < 10 ms
config>router(1)# ping 35.35.35.2 source-address 12.12.12.12
Reply from 35.35.35.2: bytes = 32, packet number = 0, time
Reply from 35.35.35.2: bytes = 32, packet number = 1, time
Reply from 35.35.35.2: bytes = 32, packet number = 2, time
Reply from 35.35.35.2: bytes = 32, packet number = 3, time
Reply from 35.35.35.2: bytes = 32, packet number = 4, time
5 packets transmitted. 5 packets received, 0% packet loss
round-trip (ms) min/avg/max = 1/1/1
<=
<=
<=
<=
<=
1
1
1
1
1
ms
ms
ms
ms
ms
10.6 Tracing the Route
This diagnostic utility traces the route through the network from SecFlow-1p to the destination host.
The trace route utility supports up to 30 hops.
Applicability and Scaling
This feature is applicable to all the device versions.
Running Trace Route
 To trace a route:
•
In any level, start the trace route and specify the IP address (IPv4 or IPv6) of the host to which
you intend to trace route:
trace-route <1.1.1.1–255.255.255.255>
SecFlow-1p
10. Monitoring and Diagnostics
585
10.7 Technical Support
For technical support of registered products, contact your local authorized RAD partner or go to
RADCare Online (if you have a valid RADCare service package).
RAD would like your help in improving its product documentation. Please send us an e-mail with your
comments.
Thank you for your assistance!
11 Software Upgrade
This chapter explains how to upgrade SecFlow-1p for software version 5.x.x.
Software upgrade is required to fix product limitations, enable new features, or make the unit
compatible with other devices that are already running the new software version.
The device can store up to two software images, referred to as software packs. It is recommended to
name these software packs sw-pack-1 and sw-pack-2. You can designate any of the software packs as
active.
vCPE-OS also supports partial software updates. Partial software updates include “update” in the
software image name. They should be downloaded to the device as sw-update-1 and sw-update-2 and
installed. Each update includes patches and contains all the previous updates of the same baseline
software. During installation, the device installs all the updates that are not already installed. Software
update files and are usually delivered as small size files for saving installation time and bandwidth.
Each software pack is protected by a digital signature, signed by a dedicated RAD CA (Certification
Authorization). The signature verifies the following:
•
This is vCPE-OS software
•
This software was created by RAD
• The software was not changed
Any unsigned software pack will be rejected. This security mechanism prohibits the unauthorized
software to be installed.
The information in this chapter includes the following:
•
Software packs that can be loaded into each device
•
Detailed conditions required for the upgrade
•
Any impact the upgrade may have on the system
•
Description of downloading options
SecFlow-1p
11. Software Upgrade
587
Application software can be downloaded to SecFlow-1p using the copy command via FTP, FTPS, SFTP, or
SCP.
You can install the downloaded device software pack as the active software via the admin software
install sw-pack-n command, admin software install sw-update-n command.
Note
Software upgrade relates to upgrading from the product’s previous version to
current version. To upgrade from an older version, you may not be able to
upgrade directly to the latest version, but may be required to upgrade one
version at a time. Refer to the relevant User Manual for upgrade instructions.
11.1 Compatibility Requirements
The following software releases can be upgraded to Ver. 5.x.x: Ver. 5.x.x.
11.2 Impact
During the software upgrade process, service is disrupted.
11.3 Prerequisites
SFTP/FTP/TFTP Prerequisites
Prior to upgrading via SFTP/FTP/TFTP, verify that you have the following:
•
Operational SecFlow-1p unit with valid IP parameters configured
•
Connection to a PC with an SFTP/FTP/TFTP server application and a valid IP address
•
Software image file stored on the PC. The image file (and exact name) can be obtained from the
local RAD business partner from whom the device was purchased.
SecFlow-1p
11. Software Upgrade
588
Software Packs
SecFlow-1p software download options include two sw-packs and two sw-updates from the available
options listed in the following table.
Device
File Name
Description
SecFlow-1p
sw-pack-x.x.x.xx.tar.gz
sw-pack filename
sw-update-x.x.x.xx.tar.gz
sw-update filename
11.4 Upgrading Software via CLI
The recommended software downloading method is to use the copy command.
Network administrators can use this procedure to distribute new software releases to all the managed
SecFlow-1p units in the network from a central location.
Use the following procedure to download software release 5.x.x to SecFlow-1p via CLI.
1. Verify that the image file is stored on the PC with the SFTP/TFTP server application.
2. Verify that the SecFlow-1p router has been configured with valid IP parameters.
3. Ping the PC to verify the connection.
4. Activate the SFTP/TFTP server application.
5. Download the image file from the PC to SecFlow-1p.
6. Install the image as the active software.
Note
Configuration values shown in this chapter are examples only.
Verifying the Host Parameters
In order to be able to establish communication with the SFTP/TFTP server, the SecFlow-1p router must
have IP parameters configured according to your network requirements. Refer to the following manual
sections for additional information:
•
Connecting to a Terminal in the Installation and Setup chapter
SecFlow-1p
11. Software Upgrade
•
Working with Terminal in the Operation and Maintenance chapter
•
Router in the Traffic Processing chapter
589
Pinging the PC
Check the integrity of the communication link between SecFlow-1p and the PC by pinging the PC from
SecFlow-1p.
 To ping the PC:
1. In any level, start pinging the PC specifying its IP address and optionally the number of packets
to send:
ping <ip-address> [number-of-packets <num-packets>][payload-size <bytes>]
Where
num-packets can be 1-10,000 or 0 (forever) for a continuous ping. Default is 5.
bytes can be 32-1450.
A reply from the PC indicates a proper communication link.
2. If the ping request times out, check the link between SecFlow-1p and the PC (physical path,
configuration parameters, etc.).
Activating the SFTP Server
Once the SFTP server is activated on the PC, it waits for any SFTP file transfer request originating from
the product, and carries out the received request automatically.
SFTP file transfers are carried out through TCP port 22. Make sure that the firewall you are using on the
server allows communication through this port (refer to the Administration chapter for details).
Activating the TFTP Server
Once the TFTP server is activated on the PC, it waits for any TFTP file transfer request originating from
the product, and carries out the received request automatically.
TFTP file transfers are carried out through port 69. Make sure that the firewall you are using on the
server allows communication through this port (refer to the Administration chapter for details).
SecFlow-1p
Note
11. Software Upgrade
590
Configure the connection timeout of the TFTP server to be more than
30 seconds to prevent an automatic disconnection during the backup partition
deletion (about 25 seconds).
Downloading the New Device Software Release File
This procedure is used to download a new SecFlow-1p software version.
 To copy the image file to the SecFlow-1p unit:
•
In any level, enter:
copy sftp://<username>:<password>@<ip-address>/<image-file-name> {<sw-pack-n> |
<sw-update-n>}
Where <ip-address> is the IP address of the PC where the SFTP server is installed and <n> is the
index of the software pack/update.
Or
copy tftp://<tftp-ip-address>/<image-file-name> <sw-pack-n>
Where tftp-ip-address is the IP address of the PC where the TFTP server is installed and <n> is
the index of the software pack.
Note
Choose an index that is not being used by the active software, or by a
software pack that you do not want to overwrite.
The software download is performed. See Activating the Device Software for instructions on
installing the downloaded software as the active software.
Activating the Device Software
After software is downloaded to SecFlow-1p, it has to be installed via the install command as the active
software. When you install software, by default SecFlow-1p creates a restore point, so that if there is a
problem with the new software pack, you can perform a rollback to the previous software pack and
startup-config file. This ensures that if you changed the startup-config file before noticing that
something was wrong with the newly installed software, you can restore the startup-config that was
running before the last installation.
Note
The file startup-config must exist before you can install software with creation
of a restore point.
SecFlow-1p
11. Software Upgrade
591
Prior to installing the software, you can request (via command software-confirm-required) that the user
confirm the next installed software (via command software-confirm) following the next SecFlow-1p
reboot. This software confirmation command verifies that the user has regained connection to the
device following installation. If confirmation is requested, but the user does not confirm the software
(via command software-confirm) within the configured timeout period, SecFlow-1p automatically falls
back to its previous software. This precaution prevents a permanent loss of connection to the remote
device following installation.
 To request software confirmation:
•
At the admin>software# prompt, enter:
software-confirm-required [time-to-confirm <minutes>]
The confirmation timeout can be from five minutes to 24 hours. If you do not specify it, the
default is five minutes.
Note
You can cancel the software confirmation request by entering
no software-confirm-required.
Next time SecFlow-1p reboots and loads new software, it starts a confirmation timer. See the
following procedure for more details on the confirmation.
 To install a device software pack as active:
Note
•
•
If startup-config does not exist, you must install the software pack
without creating a restore point.
As a defective startup-config can cause a loss of connection, it is not
recommended to install software and change startup-config at the same
time. However, if you must do both at the same time, first install the
software and only after verifying it, make the needed configuration
changes (or vice versa).
1. At the admin>software# prompt, enter:
install {sw-pack-1|sw-pack-2|sw-update-1|sw-update-2} [no-restore-point]
Where n is 1 or 2, provided sw-pack-n is a non-active software pack. If you specify
no-restore-point, then after the software is installed, it is not possible to roll back to the
previous software.
You are prompted to confirm the operation.
!Device will install file and reboot. Are you sure? [yes/no] _
2. Type yes to confirm.
SecFlow-1p
11. Software Upgrade
592
If a restore point is being created, then startup-config is copied to restore-point-config.
SecFlow-1p designates the specified software pack as active, then reboots. If a software
confirmation request is active, SecFlow-1p starts a timer with the specified timeout period.
Note
While the confirmation timer is running, SecFlow-1p does not allow any
commands that change its configuration.
3. If the software-confirm command is entered before the timer expires, the software is
considered to be confirmed.
If the software-confirm command is not entered before the timer expires, then restore-point-config is
deleted, SecFlow-1p designates the previously active software pack as active, then reboots.
Note
If the software pack is activated on SecFlow-1p, the device reboots.
Activating the Software
To activate a software pack, you need to designate it as active and load it.
 To activate a software pack:
1. To set the software as active, enter:
set-active <index>.
A confirmation similar to the following is displayed:
SW set active 2 completed successfully.
2. To load the active software, type: run.
A sequence of messages similar to the following is displayed:
Loading/un-compressing sw-pack-2...
Starting the APPLICATION off address 0x10000...
After a few more seconds, the login prompt is displayed.
11.5 Verifying Upgrade Results
You can verify that the upgrade was successful by logging on to SecFlow-1p via a terminal emulation
program, and in the Inventory table (show summary-inventory at prompt config>system#), checking
the active software version in the SW Rev column.
SecFlow-1p
11. Software Upgrade
593
11.6 Restoring the Previous Version
If the installed software malfunctions and was installed with a restore point (restore-point-config must
exist on device), you can perform rollback to the previous active software.
 To roll back to the previous active software pack:
1. At the admin>software# prompt, enter:
undo-install
You are prompted to confirm the operation.
! Falling back to restore point ! Are you sure? [yes/no] _
2. Type yes to confirm.
The file restore-point-config is renamed to startup-config. SecFlow-1p designates the previously
active software pack as active, then reboots.
A
Connection Data
A.1 Ethernet Connector
The Ethernet electrical interfaces terminate in 8-pin RJ-45 connectors, of type 10/100BaseT or
10/100/1000BaseT, wired in accordance with the table below. The connector supports both MDI and
MDIX modes.
10/100/1000BaseT Connector Pinout
Pin
MDI
MDIX
1
A+
B+
2
A-
B-
3
B+
A+
4
C+
D+
5
C-
D-
6
B-
A-
7
D+
C+
8
D-
C-
A.2 Serial Port
The SecFlow-1p UART serial ports are terminated with RJ-45 connectors. SecFlow-1p acts as a DCE
communication device.
Serial hardware protocols RS-232 and RS-485 are defined according to the ordering options.
Refer to the table below for the RJ-45 connector pinout.
SecFlow-1p
A. Connection Data
Serial Port Pin Assignment
RJ45 Connector Pin
RS232 DCE Signal as per EIA-561
1
-
2
-
3
RTS
4
GND
5
RxD
6
TxD
7
CTS
8
-
RAD recommends using the RS-232 adapter cable CBL-RJ45/D9/F/6FT to connect to user serial
equipment terminated with a DB9 male connector.
CBL-RJ45/D9/F/6FT Cable
The cable pinout is shown in the table below.
595
SecFlow-1p
A. Connection Data
CBL-RJ45/D9/F/6FT Cable Pinout for Serial Port
RJ45 DCE Side
Signal
Pin
-
1
-
Direction
DB-9 DTE Side
Pin
Signal
-
6
-
2
-
1
-
RTS
3

4
RTS
GND
4
-
5
GND
RxD
5

2
RxD
TxD
6

3
TxD
CTS
7

8
CTS
-
8
-
7
-
RS-485 user equipment can be connected using RAD’s CBL-SF-RJ45-RS485 shielded cable.
DRAIN WIRE
CBL-SF-RJ45-RS485
CBL-SF-RJ45-RS485
CBL-SF-RJ45-RS485 Cable Pinout
RJ45
Color
Open 2W
3
white/orange
+ Tx/Rx
4
blue
GND
orange
- Tx/Rx
1
2
5
6
7
596
SecFlow-1p
A. Connection Data
597
International Headquarters
North American Headquarters
24 Raoul Wallenberg St., Tel Aviv 6971923, Israel
Tel 972-3-6458181 | Fax 972-3-7604732
Email market@rad.com
900 Corporate Drive, Mahwah, NJ 07430, USA
Tel 201-529-1100 | Toll Free: 800-444-7234 | Fax: 201-529-5777
Email market@radusa.com
www.rad.com | radcare-online.rad.com
Publication No. 743-200-05/22
Download