Browser-Based Interface Quick Access Guide
Browser-Based Interface Quick Access Guide
Browser-Based Interface
Quick Access Guide
Copyright 2004 Nortel Networks, Inc.,4655 Great America Parkway, Santa Clara, California 95054, USA.
All rights reserved. Part Number: 217015-A, Revision Release 4.0.2.
This document is protected by copyright and distributed under licenses restricting its use, copying,
distribution, and decompilation. No part of this document may be reproduced in any form by any means
without prior written authorization of Nortel Networks, Inc. Documentation is provided “as is” without
warranty of any kind, either express or implied, including any kind of implied or express warranty of non-
infringement or the implied warranties of merchantability or fitness for a particular purpose.
U.S. Government End Users: This document is provided with a “commercial item” as defined by FAR
2.101 (Oct 1995) and contains “commercial technical data” and “commercial software documentation” as
those terms are used in FAR 12.211-12.212 (Oct 1995). Government End Users are authorized to use this
documentation only in accordance with those rights and restrictions set forth herein, consistent with FAR
12.211- 12.212 (Oct 1995), DFARS 227.7202 (JUN 1995) and DFARS 252.227-7015 (Nov 1995).
Nortel Networks, Inc. reserves the right to change any products described herein at any time, and without
notice. Nortel Networks, Inc. assumes no responsibility or liability arising from the use of products
described herein, except as expressly agreed to in writing by Nortel Networks, Inc. The use and purchase of
this product does not convey a license under any patent rights, trademark rights, or any other intellectual
property rights of Nortel Networks, Inc.
Alteon, Alteon Switched Firewall, Alteon 5008, 5010, 5014, 5300, 5400, 5600, 5700, 6400, 5308, 5408,
5610, 5710, 6414, Alteon Firewall Director, Firewall OS, Alteon Firewall Accelerator, and Alteon
Accelerator OS are trademarks of Nortel Networks, Inc. in the United States and certain other countries.
Check Point, SecureXL, SmartCenter, SmartDashboard, SmartView Tracker, OPSEC, and SmartView
Monitor are trademarks of Check Point Software Technologies Ltd. FireWall-1 and VPN-1 are registered
trademark of Check Point Software Technologies Ltd. Any other trademarks appearing in this manual are
owned by their respective companies.
Portions of this manual are Copyright © 2001 Dell Computer Corporation. All Rights Reserved.
2
217015-A, November 2004
Contents
Preface 5
Who Should Use This Book 5
Related Documentation 5
Typographic Conventions 6
How to Get Help 7
3
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
4 Contents
217015-A, November 2004
Preface
Browser-Based Interface (BBI) software is included in the Nortel Networks’ family of Alteon
Switched Firewalls (ASF). The BBI software lets you use your Web browser to access ASF
information and statistics, and to perform ASF configuration via the Internet.
This Browser-Based Interface Quick Access Guide provides an overview of how to access and
use the Browser-Based Interface.
Related Documentation
For detailed information about the functionality and configuration of the Alteon Switched
Firewall and physically installing the hardware components, see the following documentation:
Alteon Switched Firewall 4.0.2 User’s Guide and Command Reference (Part Number
217014-A) published in November 2004.
Alteon Switched Firewall 4.0.2 Hardware Installation Guide (Part Number 217016-A)
published in November 2004.
5
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
Typographic Conventions
The following table describes the typographic styles used in this book.
AaBbCc123 This type is used for names of commands, View the readme.txt file.
files, and directories used within the text.
<AaBbCc123> This italicized type appears in command To establish a Telnet session, enter:
examples as a parameter placeholder. Replace host# telnet <IP address>
the indicated text with the appropriate real
name or value when using the command. Do
not type the brackets.
This also shows book titles, special terms, or Read your User’s Guide thoroughly.
words to be emphasized.
6
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
If you purchased a Nortel Networks service program, contact one of the following Nortel Net-
works Technical Solutions Centers:
Additional information about the Nortel Networks Technical Solutions Centers is available at
the following URL:
http://www.nortelnetworks.com/help/contact/global
An Express Routing Code (ERC) is available for many Nortel Networks products and services.
When you use an ERC, your call is routed to a technical support person who specializes in sup-
porting that product or service. To locate an ERC for your product or service, refer to the fol-
lowing URL:
http://www.nortelnetworks.com/help/contact/erc/index.html
7
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
8
217015-A, November 2004
CHAPTER 1
Getting Started
This chapter explains how to enable, setup, and launch the Browser-Based Interface (BBI) to
access and manage the features in the Alteon Switched Firewall system in the following sec-
tions:
“Features” on page 10
“Requirements” on page 10
“Enabling the Browser-Based Interface” on page 11
“Setting Up the Web-Browser” on page 12
“Starting the Browser-Based Interface” on page 13
“Basics of the Browser-Based Interface” on page 17
9
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
Features
The BBI provides the following features:
Requirements
An installed Alteon Switched Firewall
PC or workstation with network access to the cluster Management IP (MIP) address
Frame-capable Web-browser software, such as the following:
Netscape Navigator 4.6 or higher
Internet Explorer 5.0 or higher
JavaScript enabled in your Web-browser
NOTE – HTTP is not a secure protocol. All data (including passwords) between an HTTP cli-
ent and the Alteon Switched Firewall is unencrypted and is subject only to weak authentica-
tion. If secure remote access is required, consider using HTTPS instead of HTTP.
To explicitly allow remote BBI access, enter the following commands in the CLI.
>> # /cfg/sys/adm/web/http/ena
>> # /cfg/sys/adm/web/ssl/ena
2. Use the access list (cfg/sys/accesslist) to permit remote access to trusted clients.
If you have already configured the access list for Telnet or SSH, there is no need to repeat the
process. Otherwise, to permit access to only trusted clients, see the section on “Defining the
Remote Access List” in Chapter 10, “The Command Line Interface” in the ASF 4.0.2 User’s
Guide and Command Reference.
where Name is the common name that will appear on the certificate, Country code is a two-let-
ter code (US for the United States of America, CA for Canada, JP for Japan, etc.), and Key size
is 512, 1024, or 2048 bits. For example:
NOTE – When you log in to the BBI with the temporary certificate, you will be warned that the
certificate is not signed or authenticated. This should be permitted only during initial configu-
ration where the system is not attached to active networks that could be a source of attack.
Install a signed and authenticated certificate prior to connecting any untrusted network.
5. Use the Check Point™ SmartDashboard™ tool on your management client to add a secu-
rity policy that allows BBI traffic.
The firewall policy should be constructed as follows:
NOTE – JavaScript is not the same as Java. Please make sure that JavaScript is enabled in your
Web-browser.
2. Enter the Alteon Switched Firewall MIP address in the Web-browser’s URL field.
For example, consider a cluster MIP address of 192.168.1.1. Using Netscape Navigator, you
could enter the following:
If the MIP address has a name on your local domain name server, you could enter the name
instead. For example, with Internet Explorer, you could enter the following:
NOTE – When you use HTTPs to connect to the BBI with a temporary certificate, you will be
warned that the certificate is not signed or authenticated. This should be permitted only during
initial configuration where the system is not attached to active networks that could be a source of
attack. Install a signed and authenticated certificate prior to connecting any untrusted network.
3. Log in.
If your Alteon Switched Firewall and browser are properly configured, you will be asked to
enter a password:
Enter the account name and password for the system administrator or operator account. For
more login and password information, see the section on Users and Passwords in the ASF 4.0.2
User’s Guide and Command Reference.
When the proper account name and password combination is entered, the BBI default page is
displayed in your browser’s viewing window. The following page refreshes every 30 seconds.
NOTE – There may be a few seconds delay while the default page collects data from all of the
cluster components. You should not stop the browser while loading is in progress.
5. Select the Go To Lock Page to notify other BBI users that you are accessing the firewall
configuration via the BBI.
7. The following GUI lock message is displayed when the next BBI administrator logs in:
You may enter a message to notify other BBI users that you are accessing the BBI.
Interface Components
The BBI screen consists of the following areas:
Basic Operation
Using the BBI, Alteon Switched Firewall administration is performed in the following manner:
The administrator selects from a series of pages and sub-pages, and modifies fields to cre-
ate the desired configuration.
When finished making changes on any given page, the administrator submits the form
using the appropriate Update buttons. If the user selects a new form or ends the session
without submitting the information, the changes are lost.
Most submitted changes are considered pending and are not immediately put into effect or
permanently saved. Only a few types of changes take effect as soon as the form is submit-
ted: changes to users and passwords, and setting the time or time zone.
In order to save changes and make them take effect, the administrator must use the global
Apply form. This allows the administrator to make an entire series of updates on multiple
forms and then put them into effect all at once.
From the Apply form, the administrator can validate the configuration to check for any
configuration problems prior to applying them. If the configuration is in an invalid state,
the Apply command will not be allowed.
The global Diff form can be used to view pending changes before they are applied.
To clear all pending changes, the administrator can use the global Revert form and then
continue the configuration session, or the global Logout form to exit from the system.
Closing your browser will also discard pending changes, though logging out manually is
preferred.
NOTE – When multiple CLI or BBI administrator sessions are open at the same time, only
pending changes made during your current session will be affected by the Diff, Revert, or
Logout commands. However, if multiple CLI or BBI administrators apply changes to the same
set of parameters concurrently, the latest applied changes take precedence. Refer to the GUI
lock in Step 5 on page 15.
These buttons summon pages which are used for saving, examining, or aborting configuration
changes, logging out, and for displaying help information. Each global command page pro-
vides options to verify or cancel the command as appropriate.
19
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
Apply
The global Apply form is used for checking the validity of the current session’s pending con-
figuration changes, and for saving the configurations change and putting them into effect.
Apply Changes pull-down menu. To use this menu, select one of the following options
and click on the Submit button:
Apply Changes
When submitted, this action updates the cluster with any pending configuration
changes. Pending changes are first validated for correctness (see below). If problems
are found, applicable warning and error messages are displayed. If errors are found,
the changes are not applied. If there are no errors (warnings are allowed), the changes
are saved and put into effect.
This command has no effect on pending changes in other open CLI or BBI sessions.
NOTE – The global Revert command clears pending changes. It cannot be used to restore the
old configuration after the Apply Changes command has been issued.
Validate Configuration
When submitted, this button validates the current session’s pending changes, but does
not apply them. The pending configuration changes are examined to ensure that they
are complete and consistent. If problems are found, the following types of messages
are displayed:
Warnings. These appear in yellow. Warnings identify conditions that the administra-
tor should pay special attention to, but which will not cause errors or prevent the con-
figuration from being applied.
Errors. These appear in red. Errors identify serious configuration problems that must
be corrected before changes can be applied. Uncorrected errors will cause the Apply
Changes command to fail.
If the configuration is valid, the administrator must still separately submit the Apply
Changes command.
Run Security Audit
When submitted, this option lists security information, such as the status (enabled or
disabled) for remote management features such as Telnet, SSH, and the BBI for the
cluster and the IP addresses which can access them. It also lists which users (if any)
are still configured with default passwords which should be changed.
Submit button. This button performs the action selected in the Apply Changes pull-down
menu.
Back button. This button returns the previously viewed form without applying changes.
Diff
The global Diff form provides a list of the current session’s pending configuration changes.
Change list. The list displays a change record for each submitted update. Each record may
consist of many modifications, depending upon the complexity of the form and changes
submitted. Modifications are color coded:
Green: New items that will be added to the configuration when the global Apply com-
mand is given and verified.
This change list does not show pending changes made in other open CLI or BBI sessions.
Revert
The global Revert form is used for canceling pending configuration changes.
Revert button. This button cancels the current session’s pending configuration changes.
Applied changes are not affected. Pending changes made in other open CLI or BBI ses-
sions are not affected.
Back button. This button returns the previous form without cancelling pending changes.
Logout
The global Logout form is used to terminate the current user session.
Logout button. This button terminates the current user session. Any configuration changes
made during this session that have not yet been applied will be lost. This command has no
effect on pending changes in other open CLI or BBI sessions.
Back button. This button returns the previously viewed form without logging out.
NOTE – For thorough security, close all BBI windows (including help) after logging out.
Help
The global Help form provides assistance with forms and tasks in the BBI. There are two kinds
of help: context-sensitive help and task-based help.
Context-Sensitive Help
Context-sensitive help displays detailed information about whatever form is currently dis-
played in the BBI forms area. When you click on the global Help button, a new window
appears with information appropriate to your current options:
Task-Based Help
Task-based help directs the administrator through the steps of various common procedures. To
access task-based help, first click on the global Help button and then click on the Tasks Page
title at the bottom of the help topic menu in the help window. The task help menu will be dis-
played in a new window with information appropriate to the current BBI form:
Task topic menu. You can select from a list of tasks using the menu on the left-hand side of
the help window. Each main task item is listed, along with the various steps under the cur-
rent selection. Select a different task item to reveal its steps. Select any step to display rel-
evant help information.
Forms area. This area displays detailed information about the selected task.
Previous link (if appropriate): Displays the information for the previous step in the task.
Next link (if appropriate): Displays the information for the next step in the task.
Load Page link. Click on the title of this bar in the forms area to return to the main BBI
window and jump directly to the form currently referenced by the help window.
Close button. This button at the top, right-hand corner closes the task-based help window.
Site Map
The Site Map table below provides the list of sub-page menus and status/command labels for
each form to aid navigation through the BBI. Items in parenthesis are for clarification or to
indicate the operations that can be performed.
Syslog Syslog Messages: Director IP, Search String, Messages Per Page
Logs Syslog Debug messages, Source IP Mode, Current Remote Syslog Serv-
ers (add/delete/modify)
Ports General Ports (add/delete/modify), Port #, Trunk, NAAP, VLAN tag, Fil-
ters, Filters list
Proxy ARP Proxy Director addresses and cluster MIP address, Proxy ARP IP
address (add/delete/modify)
License Manage- Auto-detect Firewall Directors, List of Check Point licenses (add/
ment delete/modify)
Server Cert Certificate Request (generate, add new server certificate, export)
Diagnostics Security Zones Lists the VNICs with IP address, VLAN, and port
31
217015-A, November 2004
Alteon Switched Firewall BBI Quick Access Guide
Configuring Interfaces
Adding an Interface to the Firewall is one of the first tasks that need to be performed. This
example illustrates how to configure interfaces. To configure an interface, the following steps
need to be completed:
Specify an ID, enable the status, and provide the IP address and mask. VLAN is optional. If
you are using high availability, specify the VRRP commands.
3. Click on Update.
5. Click on Apply.
You have now configured an interface and assigned ports. Continue to add more interfaces to
the Firewall.
6. Click Network > Interfaces on the Main Page Menu to display all the configured inter-
faces.
Expanding a Cluster
This section describes how to expand the Alteon Switched Firewall cluster beyond the basic
configuration. The cluster can be expanded in a variety of ways. The following procedure
explains how to add the Firewall Directors to the cluster, increasing firewall processing capac-
ity without taking the system offline. For more information on other ways to expand the Alteon
Switched Firewall cluster, see the ASF 4.0.2 User’s Guide and Command Reference.
The installation of additional Firewall Directors is handled as an expansion to the existing clus-
ter and requires the following:
A basic cluster (one Firewall Director and one Firewall Accelerator) must already be
physically installed as described in the Alteon Switched Firewall Hardware Installation
Guide.”
The basic cluster must already be configured with basic parameters as described in Chap-
ter 2, “Initial Setup” in the ASF 4.0.2 User’s Guide and Command Reference.
The redundant Firewall Director being added must be identical to the existing Firewall
Director. You cannot mix different models of Firewall Director in the same cluster.
Firewall traffic is load balanced among all Firewall Directors within the cluster, regardless of
whether attached to the master or backup Firewall Accelerator.
4. Click on Update.
5. Click on Apply.
3. Click on Update.
4. Click on Apply.
1. Click Administration > SNMP > MIBs on the Main Page Menu.
Table 3-1 lists the ASF MIBs with a brief description of each file:
altroot.mib Provides the baseline OID for the other two MIBs. This
MIB is a requirement for the other two MIB files.