A10 4.1.1-P11 DCFW
A10 4.1.1-P11 DCFW
A10 4.1.1-P11 DCFW
1-P11
Data Center and Gi/SGi Firewall Configuration
Guide
for A10 Thunder® Series and AX™ Series
29 May 2019
© 2019 A10 NETWORKS, INC. CONFIDENTIAL AND PROPRIETARY- ALL RIGHTS RESERVED
Information in this document is subject to change without notice.
PATENT PROTECTION
A10 Networks products are protected by patents in the U.S. and elsewhere. The following website is provided to satisfy the virtual pat-
ent marking provisions of various jurisdictions including the virtual patent marking provisions of the America Invents Act. A10 Net-
works' products, including all Thunder Series products, are protected by one or more of U.S. patents and patents pending listed at:
https://www.a10networks.com/company/legal-notices/a10-virtual-patent-marking
TRADEMARKS
A10 Networks trademarks are listed at:
https://www.a10networks.com/company/legal-notices/a10-trademarks
CONFIDENTIALITY
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information and ideas herein may
not be disclosed, copied, reproduced or distributed to anyone outside A10 Networks, Inc. without prior written consent of A10 Net-
works, Inc.
Anyone who uses the Software does so only in compliance with the terms of the End User License Agreement (EULA), provided later in
this document or available separately. Customer shall not:
1. Reverse engineer, reverse compile, reverse de-assemble, or otherwise translate the Software by any
means.
2. Sub-license, rent, or lease the Software.
DISCLAIMER
This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not
limited to fitness for a particular use and non-infringement. A10 Networks has made reasonable efforts to verify that the information
contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided "as-is." The product
specifications and features described in this publication are based on the latest information available; however, specifications are sub-
ject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for current
information regarding its products or services. A10 Networks’ products and services are subject to A10 Networks’ standard terms and
conditions.
ENVIRONMENTAL CONSIDERATIONS
Some electronic components may possibly contain dangerous substances. For information on specific component types, please con-
tact the manufacturer of that component. Always consult local authorities for regulations regarding proper disposal of electronic com-
ponents in your area.
FURTHER INFORMATION
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest A10 Networks loca-
tion, which can be found by visiting www.a10networks.com.
Table of Contents
page 3
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Contents
page 4
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Contents
page 5
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Contents
page 6
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• Firewall Functionality
• Configuration Elements
• Firewall Statistics
The firewall maintains information about the status of network TCP connections and stores this infor-
mation in memory. The information that is saved includes the source and destination IP address and
ports, as well as packet sequence. Incoming flow are compared with the information in this frequently-
updated table, and filtering decisions are made to allow (or exclude) packets based on whether their is
already a previous connection.
• Standalone Firewall – The firewall can be deployed by itself, acting as a standalone security
device.
• Data Center Firewall – The firewall can be deployed in the same partition as an Application Deliv-
ery Controller (ADC). When used with DCFW, the primary purpose of the firewall is to expose and
protect the services and internal servers.
• Gi/SGi Firewall – The firewall can be deployed in the same partition as Carrier Grade NAT (CGN),
which is the IP-based interface between the GGSN and a public data network. When used with
CGN, the primary purpose of the firewall is to shield mobile subscribers and service providers
from attacks and data tampering.
page 7
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview of the Stateful Firewall
• Firewall Benefits
• Firewall Features
Firewall Benefits
ACOS offers a firewall that can be deployed as a data center firewall (DCFW) or as a firewall that is
deployed in the same partition as CGN, or “general IP interface” firewall (Gi/SGi-FW). The benefits of
each type of firewall deployment are listed below.
• Benefits of Standalone FW
• Benefits of DCFW
• Benefits of Gi/SGi-FW
Benefits of Standalone FW
Firewalls offer enhanced security for network PCs by preventing hackers from infecting devices with
malicious software, such as viruses, worms, spyware and other threats. A firewall enables network
administrators to dictate which computers can connect to the public internet and can help prevent
users from accessing potentially malicious resources that could infect their device and other devices
on the network.
The ACOS firewall is a stateful firewall that operates at layers 1-4 of the OSI model. The firewall moni-
tors incoming and outgoing packets and collects information about the source and destination
address and port. The firewall also retains information about the state of the packet, meaning it tracks
whether or not the packet belongs to an active connection.
The firewall can be configured to deny or permit packets based on how the properties of these packets
align with the match criteria in the firewall’s active ruleset.
Firewalls can prevent malware from accessing the internet-connected devices on your network, pre-
venting damage to devices and theft of sensitive information.
Benefits of DCFW
Data centers firewalls offer a wide range of services for a variety of applications, such as HTTP, mobile,
Voice over IP (VoIP), streaming video, not to mention the needs of mobile users and social media. To
meet the growing demand for such a wide array of services and applications, data centers require tre-
mendous scalability and throughput.
To achieve this high scalability, and in order to make packet classification decisions faster and simpler,
the ACOS data center firewall device offers a Layer 4 stateful DCFW.
page 8
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview of the Stateful Firewall
The DCFW has a highly scalable classification algorithm which can reduce the burden placed on other
backend services. The firewall provides a layer of security prior to traffic reaching the load balancer
(SLB device), and it offers the benefits of consolidating functions in one device.
Benefits of Gi/SGi-FW
Gi/SGi-FW utilizes a stateful firewall to protect subscribers and LTE service providers from DDoS
attacks and data tampering. Gi/SGi-FW enables mobile carriers to achieve high firewall connection
rates and throughput.
By leveraging the capabilities of integrated Carrier-Grade Network Address Translation (CGNAT), the
lifespan of the equipment in legacy IPv4 networks is extended. In addition, this technology can offer
helps with IPv4 preservation, and the IPv6 transition technologies smooth the transition to IPv6.
• High throughput – Coupled with high density 1 GbE, 10 GbE, 40 GbE, and 100 GbE port options,
Thunder appliances meet the highest networking bandwidth demands.
• High connection performance (100+ Gbps) and high scalability – The A10 Thunder line
of appliances fits all size networks with entry-level models starting at 5 Gbps and moving up to a
153 Gbps high-performance appliance, for the most demanding data center performance
requirements.
• Large number of concurrent connections – The A10 Thunder appliances can handle a high
number of concurrent connections, with high-end Thunder 6635(S) SPE models capable of offer-
ing millions of connections per second (CPS) and requests per second (RPS). For the latest num-
bers, please see the latest data sheet, available on A10 Networks website: https://
www.a10networks.com/sites/default/files/A10-DS-15109-EN.pdf
• Low latency – In addition to scaling up to 153 Gbps, the A10 Thunder appliances are powered
by ACOS software, which brings a unique combination of shared memory accuracy and effi-
ciency, 64-bit scalability, and advanced flow processing, to provide low-latency, high throughput,
thus increasing the speed and performance of the network.
Firewall Features
The features of each type of firewall deployment are listed below.
• DCFW Features
• Gi/SGi-FW Features
page 9
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview of the Stateful Firewall
• The firewall is a Layer 4 stateful firewall that protects control-plane and data-plane communica-
tions.
• Stateful packet inspection is performed for connection-oriented protocols.
• Maintaining state information for packet flows improves performance, since the firewall does
not need to look up the state information for every packet in a flow.
• The firewall supports objects with both IPv4 and IPv6 addresses.
• The firewall supports application layer gateway (ALG) protocols, such as DNS, FTP, TFTP, SIP,
and ICMP.
Support for ALG protocols applies to firewalls in standalone deployments, as well as DCFW and
Gi/SGi-FW deployments.
DCFW Features
The list below highlights the features that are specific to data center firewalls:
• The data center firewall supports common event format (CEF) logging. When the firewall applies
an action (deny/reset/permit) to a new connection request, a log is generated.
• The data center firewall can be deployed within application delivery partitions (ADP/L3V).
• The data center firewall supports up to eight ACOS devices in a VRRP-A cluster for high availabil-
ity.
• The data center firewall supports rule matching based on priority.
• The data center firewall supports up to 128k rules in a rule-set, on high-end platforms.
• The data center firewall uses existing ACL configuration objects (for example, obj-group).
• The data center firewall support for Named Objects, such as SLB VIPs and real servers.
Gi/SGi-FW Features
The following Gi/SGi-FW features are available:
• Gi/SGi-FW leverages Carrier Grade NAT (CGNAT) that scales IPv4 networks with transparent
NAT available and allows external users to initiate connections to NAT clients.
page 10
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview of the Stateful Firewall
• Gi/SGi-FW supports migration to IPv6 and supports hybrid IPv4 and IPv6 networks by translating
between the two technologies.
• Gi/SGi-FW offers DDoS protection for NAT pools against destructive DDoS attacks.
• Gi/SGi-FW supports IP anomaly detection that checks for over 30 IP packet anomalies or com-
bines anomaly detections with IP Black Lists for granular attack mitigation.
• Gi/SGi-FW supports connection rate limiting by detecting and blocking attack traffic using IP-
based connection rate limiting and system-wide connection limits.
• Gi/SGi-FW offers IPsec VPN in mobile networks that prevents eavesdropping, authenticate eNo-
deBs, and secure communications over wireless and WiFi networks.
• Gi/SGi-FW supports common event format (CEF) logging, such that when the firewall applies an
action (deny/permit/reset) to a new connection request, a log is generated.
• FTP, TFTP, RTSP, PPTP, SIP, DNS (for NAT44 only), and ICMP ALG support
• Fixed NAT - NAT44 & NAT64
• FTP, TFTP, RTSP, PPTP, SIP, DNS (for NAT 44 only), and ICMP ALG support
• Integrated DDoS functionalities
• IP Anomaly Filtering
• CEF logging format support for CGN traffic logging (HTTP logging and include-radius-attribute
not supported)
• Separate logging template for Firewall logging
• A new CLI show fw resource-usage helper-sessions to display helper session statistics for fire-
wall
page 11
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview of the Stateful Firewall
• TBD
• DCFW will always takes precedence over other security configurations, such as ACL, NAT, and so
on. (Bug 301153)
• Only one firewall rule-set (or “policy”) can be attached globally, or to a zone or interface.
• VLAN or Virtual Ethernet configurations in one zone cannot be re-used in another zone.
• When a DCFW rule-set is activated, it takes about 10 seconds for the rule-set to become acti-
vated.
• Layer 2 DCFW setup requires a rule to allow Link-Local address.
• If you configure port- and protocol-based idle-timeout values that are not in multiples of 60 sec-
onds, then ACOS will round them up or down in multiples of 60 seconds. This modification is
apparent in the output in the “show session” command. For example, an idle-timeout value of 150
seconds will appear in the output as 120 seconds. (Bug 343612)
• Sending an ICMP ping packet to an Ethernet interface fails if the destination zone is “local-type”
and if the source is not in the permitted list. However, if an ICMP packet is sent to a loopback
address or to a VE, then it works. This is expected behavior. (Bug 343528)
page 12
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Firewall Functionality
• When an ICMP ping packets is sent to a VIP (and explicitly allowed by the FW rule) then the ses-
sion will not be created in the session table. This behavior is by design. (Bug 341680)
• If you create a zone with the name “any”, you will not be able to later delete this zone. This limita-
tion exists because ACOS auto-creates a zone called “any”, but the zone does not appear in the
output of the “show running” CLI command. Therefore, if you manually create a zone called “any”,
it will be visible in the output, but because it has the same name as the system-generated zone,
you will not be able to delete it. (Bug 338089)
• When using Gi/SGi-FW with NAT64, the client denies the packets. This problem can occur if the
client is sending packets to an IPv6 address and these v6 packets are converted to an IPv4
address. However, the route to the IPv4 destination address is not there after v6/v4 translation
has occurred. The firewall module is independent and does not know about the v6/v4 address
translation, and since the route to the IPv6 destination address is not there, ACOS drops the
packets. (Bug 335998)
• IPv6 packets with a destination address matching the NAT64 prefix will not be L3-forwarded by
the ACOS device. Such packets must be handled by NAT64 or they will get dropped. (Bug
333193)
• Adding an explicit deny rule at the end of the rule-set, without specifically allowing traffic destined
for the ACOS device, will cause the dynamic routing protocols, VRRP-A, and aVCS to no longer
work.
(Bugs 332707 and 300685)
• An object can be deleted while it is still being modified in another admin session. (Bug 332161)
Firewall Functionality
This section contains the following topics:
page 13
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Firewall Functionality
• If traffic does not match the criteria established within the rules of the firewall rule-set, then it is
denied.
• If traffic matches the criteria established within the rules of the rule-set, then the pre-configured
rule will act upon the traffic according to the actions, (for example, deny, permit, reset, and/or
log).
NOTE: Only the “permitted” traffic can establish a session with the SLB/CGN
module. Traffic that does not match any rules in the rule-set is dropped
before a session can be established.
When the firewall rule-set is activated, and when the firewall receives client requests, it makes classifi-
cation decisions based on whether traffic matches criteria in the firewall rule-set. If the traffic matches,
then the firewall applies the action associated with that rule and either permits or denies the packet. If
the packet is permitted, then other ACOS features, such as SLB or CGN, are invoked to perform load
balancing or v4/v6 translation, or other tasks.
By filtering traffic before it gets to the SLB/CGN modules, the firewall can reduce security threats while
simultaneously improving the performance of your network.
NOTE: See Figure 7 on page 82 for a similar topology diagram for Gi/SGi-FW in
a CGN deployment.
page 14
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
ϮͿůŝĞŶƚƌĞƋƵĞƐƚŝƐĐŽŵƉĂƌĞĚǁŝƚŚƌƵůĞƐŝŶ
ĨŝƌĞǁĂůůƌƵůĞͲƐĞƚ͗
ΕdƌĂĨĨŝĐƚŚĂƚĚŽĞƐŶŽƚŵĂƚĐŚŝƐĚƌŽƉƉĞĚ͘
ϭͿůŝĞŶƚƐĞŶĚƐĂ ΕdƌĂĨĨŝĐƚŚĂƚŵĂƚĐŚĞƐŚĂƐĂŶ͞ĂĐƚŝŽŶ͟ĂƉƉůŝĞĚ
ƌĞƋƵĞƐƚƚŽs/WĂƚ ;ĚĞŶLJͬƉĞƌŵŝƚͬƌĞƐĞƚͬůŽŐͿ͘
ϯͿdƌĂĨĨŝĐǀĂůŝĚĂƚĞĚďLJ
ϭϬ͘ϭϬ͘ϭϬ͘ϭϬ ĨŝƌĞǁĂůůŵĂLJďĞƐĞŶƚƚŽƚŚĞ
&tн^>
ůŝĞŶƚ ^>ŵŽĚƵůĞ͕ǁŚŝĐŚůŽĂĚ
ďĂůĂŶĐĞƐƚŚĞƌĞƋƵĞƐƚƚŽƚŚĞ
ƐĞƌǀĞƌĂƚϮϬ͘ϮϬ͘ϮϬ͘ϮϬ
^>s/WĂƚ
ϭϬ͘ϭϬ͘ϭϬ͘ϭϬ
ĞƐƚŝŶĂƚŝŽŶ
ƐĞƌǀĞƌĂƚ
ϮϬ͘ϮϬ͘ϮϬ͘ϮϬ
The traffic flow activity (in green) represents the packet flow from a standard client to a backend
server:
• If the traffic matches1 the criteria in one of the rules, an action2 associated with that rule is
applied.
3. The action applied by the firewall rule could be to permit, deny, or reset the session, and/or log the
activity.
Assuming the associated action is to permit the traffic, the request is sent to the ACOS SLB mod-
ule, and is load balanced to the server at 20.20.20.20.
Configuration Elements
A typical firewall rule-set includes the following elements:
1.
See “Match Criteria” on page 20 for a discussion of how the match criteria within rules work.
2. See “Actions” on page 22 for a discussion of how the actions associated with the match criteria in rules work.
page 15
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
• Rule-set
• Rules
• Match Criteria
• Actions
Inbound traffic is processed by the first rule (“Rule 1”). If no match is found,
ZƵůĞͲƐĞƚ the traffic goes to the next rule, and so on, until a match is found. While the
rules have no sequence numbers, you can change the order in which the
rules process inbound traffic by re-arranging the order using the GUI or CLI.
ZƵůĞϭ
DĂƚĐŚĐƌŝƚĞƌŝĂ ĞŶLJ
ZƵůĞϯ
ĐƚŝŽŶƐ WĞƌŵŝƚ
ZƵůĞŶ ZĞƐĞƚ
Notes:
• The Rules in a rule-set contain Match Criteria, such as source and destination IPs, ports, object
groups, and protocols.
• The rules contain one or more Actions that can be applied to incoming packets.
page 16
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
Rule-set
The firewall rule-set is the top-level building block used to configure the firewall. The rule-set contains
one or more rules. Each rule acts like an “if/then” statement, containing match criteria and an action
that will be applied to traffic if there is a match.
NOTE: This section offers a general description of firewall rule-set behavior. For
information about rule-sets that is specific to Gi/SGi-FW deployments,
see “Firewall Rule-Sets for Gi/SGi-FW” on page 31.
Details:
• The firewall rule-set must be activated with the fw active-rule-set command before any rules
can be enforced on inbound traffic.
• It may take approximately 10 seconds for the rule-set to become active.
• When no rule-set is active, all traffic will be allowed to pass because no firewall rules are applied
to the incoming traffic.
• If a firewall rule-set is active and no rules are defined, the default action is implicit deny.
NOTE: In release 4.1.1-P2 and prior, DCFW can be configured from the GUI but
Gi/SGi-FW cannot be configured from the GUI.
page 17
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
NOTE: Although multiple rule-sets can be defined, only one rule-set can be
active at a time.
NOTE: It may take approximately 10 seconds for the rule-set to become active.
c. (Optional) Click the Session Aging drop-down menu and select a pre-configured session aging
template. The aging template allows you to define the TCP, UDP, and ICMP session timers.
5. Click Create to save your changes. The new firewall rule-set appears in the table.
A firewall rule-set can be created and then globally activated using the CLI as described below:
1. Create a rule-set using the following CLI command1. You can optionally add a rule with actions and
match criteria:
rule-set rule-set-name
rule rule-name
page 18
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
action permit
source ipv4-address address
2. (Optional) Create the session-aging template1. You can optionally add timeout periods for various
protocols:
fw session-aging session-aging-template-name
udp idle-timeout seconds
tcp half-open-idle-timeout seconds
Rules
Rules are the “if/then” statements inside a rule-set. For example, a possible rule could convey the fol-
lowing:
“if incoming traffic matches the source address 192.169.10.10, then permit the session to pass
through the firewall.”
Rules are applied to traffic from the traffic initiator (client) to the responder (most likely a server). This
is also known as the forward direction of traffic. Traffic in the reverse direction (i.e., from server to cli-
ent) is presumed to be safe, and therefore it is not necessary to define rules to process traffic coming
from the servers.
NOTE: Each rule has an administrative status (enable or disable). When the sta-
tus for a rule is set to “disable,” the rule exists within the rule-set, but that
rule is not acted upon.
• Source/Destination Zone – This can be a source zone, where a zone contains one or more
physical interfaces, or VLANs.
• Source/Destination Addresses – IPv4 or IPv6 addresses (either a list or a range of addresses)
page 19
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
Match Criteria
Below are the list of match criteria that can be used to filter incoming sessions:
1. Source/destination object-groups
Network object groups can be referenced in rules to match a group of IPv4/IPv6 addresses or
group of subnets, etc. For example, All subnets in Engineering or all hosts on the 2nd floor of a
building, etc.
2. Source/destination subnets (both IPv4 and IPv6)
3. Source/destination zones
4. Destination VIP name – Internally this will translate to the VIP IP address. If the associated firewall
action is to permit traffic that matches the VIP, then further actions will be taken by the SLB mod-
ule after the traffic has passed through the firewall.
5. Service object-group – Service object groups can also be used in a rule as the match criteria to fil-
ter incoming traffic. Service object groups contain a set of TCP or UDP services that can be
grouped together. Note that if match criteria are not specified in the service object-group, all traffic
will drop, since the default is “unmatched”.
6. Any of the following service protocols:
• TCP
• UDP
• ICMP
• Protocol ID (followed by specific IP protocol number)
For TCP and UDP, the ACOS device can specify the source or destination port range. Similarly, for
more granular ICMP and ICMPv6 services, ACOS can specify an ICMP type and ICMP codes, as
described in the tables below.
The ICMP Types that can be used as match filters in a rule are described in Table 1.
page 20
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
The ICMPv6 Types that can be used as match filters in a rule are described in Table 2.
The ICMP Codes that can be used as match filters in a rule are described in Table 3.
page 21
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuration Elements
The ICMPv6 Codes that can be used as match filters in a rule are described in Table 4.
Actions
If incoming traffic matches criteria in a rule, then the action in that rule may be applied to that traffic.
The actions that can be applied to traffic matching criteria in the rule-set are described in Table 5.
NOTE: For additional CGN-specific actions, see “Firewall Rule-Sets for Gi/SGi-
FW” on page 31.
NOTE: If an action is not specified in the configuration, then the default behavior
is to deny the traffic.
page 22
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
TCP Window Checks
If TCP Window Checks are not already enabled, you can do so using the GUI:
If TCP Window Checks are not already enabled, you can do so using the CLI:
2. (Optional) Use the following command to enable baselining and rate calculation for packets out-
side the TCP window:
fw tcp-window-check sampling-enable outside-window
page 23
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
TCP Window Checks
NOTE: See “fw tcp-window-check” on page 107 for more information about the
above commands.
page 24
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Security Zones
Security Zones
Security zones (or “zones”) are Layer 1 and 2 match criteria for the rules in a firewall rule-set.
Firewall rules can be configured to contain security zones. For example, you might have a source zone
or a destination zone in the same rule-set.
A source zone could be set up for an interface that is facing the internal network, and a separate zone
could be configured for the interface that is facing the external or public network. In this way, each
security zone has a security disposition, such as being trusted, untrusted, or somewhere in between.
A zone comprises one or more physical interfaces or virtual interfaces (or “VLANs”).
Zones can be used to create logical boundaries around each interface. In the same way that multiple
servers can be added to a service group for ease of configuration, a zone can be set up to include sev-
eral interfaces that could be used to handle similar types of traffic.
Details:
• A zone can include multiple interfaces, but an interface can only belong to one zone.
If the goal is to protect traffic from “internet to branch,” you could categorize the physical interfaces or
virtual interfaces into two zones, each consisting of several interfaces/VLANs.
zone branchside
interface ve 19
network ipv4 2.2.2.0/24
zone internet
interface ethernet 1 to 5
zone v6network
interface ve 20
network ipv6 2001::1/64
If a source or destination zone is not specified in the rule, then the zone applies as a wildcard match,
meaning it will have a positive match for all traffic received from a source or destination.
page 25
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuring Application Layer Gateway
In order for various Application Layer Gateway (ALG1) protocols, such as FTP and SIP to function cor-
rectly through a firewall, the application must be aware of the combination of an IP address and port
number that will allow incoming packets. The firewall monitors the control traffic for an FTP or SIP ses-
sion, which the application will use to open up port mappings, in what is known as a “firewall pinhole”.
These firewall pinholes are created dynamically, on an as-needed basis. In this way, legitimate traffic
from various applications that would have otherwise been blocked can easily pass through the fire-
wall’s security checks.
• They can allow client applications to use dynamic TCP or UDP ports to establish communica-
tions with the various well-known ports that are used by the server applications. The firewall con-
figuration might allow for a very limited number of well-known ports, but without the presence of
an ALG, the ports would be blocked or perhaps the network admin would need to explicitly open
up a large number of well-known ports in the firewall, which would make the network vulnerable
to attacks on those ports.
• An ALG can also synchronize data for a session between two hosts. As the hosts exchange data,
they could, for example, use an FTP application. This connection could use separate connections
to pass traffic containing the commands used to regulate the flow and exchange of data
between an end user and the distant server. If a large file is being transferred, then the control
connection could remain idle for a long time. However, an ALG could prevent the control connec-
tion from being timed out by network devices before the large file transfer has completed.
NOTE: ALGs protocols are enabled by default for traffic on well-known ports.
Thus, FTP or SIP traffic may traverse the firewall as long as the traffic is
using the well-known port (for example, port 21 for FTP and port 5060 for
SIP). The procedure below shows how to disable this default behavior so
that traffic will be denied, even if the ALG protocol is using its well-known
port.
page 26
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuring Application Layer Gateway
2. Select the checkbox for the desired ALG protocols and port numbers to disable them. By selecting
the checkbox for a protocol and its well-known port number, all ALG traffic of that type and port
number will be dropped.
You can choose to disable the following ALG protocols (on their associated well-known ports):
• Disable FTP ALG default port 21
• Disable TFTP ALG default port 69
• Disable SIP ALG default port 5060
• Disable DNS ALG default port 53
• Disable RTSP ALG default port 554 (Not supported in DCFW deployments for 4.1.1)
• Disable PPTP ALG default port 1723 (Not supported in DCFW deployments for 4.1.1)
• Disable ICMP ALG which allows ICMP errors to pass through the firewall
3. Click Update to save your changes.
NOTE: If an application is using SIP or FTP, and the ALG is disabled on the fire-
wall, then the application will most likely cease to function. You can later
clear the checkbox to
re-enable ALG processing by the firewall for this protocol/port combina-
tion.
page 27
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Hairpinning Support
If desired, you can optionally enable ALG traffic to pass through the firewall on a non-default port. To do
so:
2. At the object-group service level, specify the desired protocol (for example, UDP or TCP). Since this
next command allows us to specify the match criteria, you should indicate whether the match
should occur on a range of port numbers, or only if the port number of the incoming traffic is equal
to, greater than, or less than a designated port number.
ACOS(config-service:service-1)# udp eq port-num
3. Specify the non-default port number. (For example, you could specify the match to occur on port
1813, which is typically used for RADIUS traffic and is not the default for port DNS/UDP).
ACOS(config-service:service-1)# udp eq 1813
4. On the same line, enter the “alg” keyword, followed by the ALG protocol you want to allow to pass.
ACOS(config-service:service-1)# udp eq 1813 alg dns
CLI Example
The following example allows UDP/DNS traffic to pass through the firewall on its non-default port
1813. Typically, DNS traffic would be sent to the well-known port 53, but in our example, the traffic is
only allowed to pass through if it the traffic is sent to port 1813 (which would typically be used for
RADIUS):
Hairpinning Support
ACOS supports hairpin filtering for inside-to-inside communication (or outside-to-inside communica-
tion) of the firewall by creating a matching full-cone session.
page 28
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Firewall Statistics
ACOS creates a full-cone session if there is a firewall rule match that occurs with action “permit listen-
on-port”. When ACOS creates the full-cone session, the corresponding hairpin session does not have to
“re-match” the criteria in the firewall rule, and the session is allowed by ACOS device.
This is similar to how matching works ALG (i.e., ACOS allows free passage for the control- and data-
sessions). Whenever a full-cone or hairpin session is created and freed, the ACOS device increments
the counters for TCP and UDP. Full-cone sessions will increment the Outbound counter and hairpin
sessions will increment the Inbound counter, as seen in the output from the show fw full-cone-ses-
sions command.
NOTE: For firewall-only cases, when the listen-on-port option is enabled, full-
cone sessions are created for IPv4 and IPv6 packets only for UDP or TCP
traffic only. For each full-cone and hairpin session, counters should be
displayed.
Firewall Statistics
The ACOS firewall tracks the number of hits for each rule, as well as the number of requests that are
implicitly denied, due to not matching the criteria in any of the rules within a rule-set.
You can display this information using the show rule-set CLI command. For information about using
this command, see “Firewall show and clear Commands” on page 127.
The firewall supports VRRP-A for high availability with up to 8 devices in a VRRP-A configuration.
You can specify a VRID group in the per-partition firewall global parameters. Firewall sessions will be
synchronized to the standby units.
Notes:
• For DCFW to operate properly with VRRP-A, you must configure a “vrrp-a interface” for each
VRRP-A peer, and each VRRP-A peer must be reachable over only one subnet.
page 29
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Support for High Availability with VRRP-A
• For more information about the CLI command used to add the firewall to a VRRP-A cluster, see
“fw vrid” on page 115.
• For a comprehensive discussion of VRRP-A, see the document Configuring VRRP-A High Availabil-
ity.
page 30
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview
A rule-set contains firewall rules, and these rules control what type of traffic is allowed to enter the fire-
wall, and which traffic will be denied. This filtering process is accomplished by configuring rules in the
rule-set, and each rule can be configured with an action, such as permit or deny.
For example, you could configure a rule with the action to “permit” a certain type of traffic associated
with a specified application. If packets entering the firewall match the rule, they will be permitted to tra-
verse the firewall.
The rule can be configured to perform generic functions, such as “forward” or “cgnv6”, or it can be set
up to perform more advanced functions, such as “cgnv6 lsn-lid 2” or “cgnv6 fixed-nat”.
NOTE: By default, a “permit” rule that has no specified application will L3-for-
warded and will create a firewall session. In other words, it is treated the
same as a permit rule with an application specified as “forward”.
For a rule without an application associated with it, use the command fw permit-default-action
{next-service-mode | forward} to change the default behavior of the rule.This command changes the
way a packet will be processed by matching a rule that contains “action permit”.
• next-service-mode means that the packet will be processed according to the applications config-
ured in order.
• forward means that the packet will be L3 forwarded and will create a firewall session.
NOTE: These CLI commands are only supported in Gi/SGi-FW partitions and do
not apply to DCFW.
• cgnv6 – Handles packets matching this rule by checking against any configured CGNv6 applica-
tions. If no CGNv6 application found to match packet is denied.
• cgnv6 lsn-lid xxxx – Uses specified LSN LID to perform NAT on packets matching this rule. If
LSN LID not found packet gets dropped.
page 31
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
NOTE: Packets must come in on a NAT inside interface and go out through a NAT outside inter-
face.
• cgnv6 fixed-nat – Applies Fixed NAT on any packet matching this rule. If no matching Fixed
NAT configuration is found, packet gets dropped.
• forward – Handles packets matching this rule as Firewall sessions.
Processing Rules
• When a packet matches a rule which does not have an application associated with it, the default
behavior is to treat it as a transparent session. To change this default behavior, use the fw per-
mit-default-action next-service-mode command to configure the packets to be processed
according to the most appropriate of the various applications configured.
• When a packet matches a cgnv6 rule, the packet will be processed according to the “cgnv6”
applications configured if and only if it satisfies all the necessary conditions. A packet not match-
ing any CGNv6 configurations will get dropped.
• When a packet matches a cgnv6 lsn-lid xxx rule, the packet will be processed according to the
specified LSN LID. It is not necessary to configure an LSN class-list. However, the packet must
come in on a NAT inside interface. When an LSN LID is not found, the packet will get dropped.
• When a packet matches a cgnv6 fixed-nat rule, the packet will be processed by Fixed NAT. The
packet must come in on a NAT inside interface. When no matching Fixed NAT configuration is
found, the packet will get dropped.
• When a packet matches a forward rule, the packet will be handled as a firewall session.
Sample Configurations
Action Permit
The following is a sample configuration when there is no application specified after the action permit
command. The packet is processed in L3-forward mode and a firewall session is created.
!
rule-set firewall
rule 1
action permit
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address 9.9.9.173/32
page 32
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
Application CGNv6
The following is a sample configuration when a packet matching the rule that will be processed by a
CGNv6 application. If the traffic does not match the CGNv6 rule, the packet will get dropped.
!
class-list lsn
0.0.0.0/0 lsn-lid 1
!
cgnv6 lsn inside source class-list lsn
!
cgnv6 nat pool p3 9.9.9.50 9.9.9.50 netmask /24 vrid 31
!
cgnv6 lsn-lid 1
source-nat-pool p3
!
rule-set firewall
rule 1
action permit cgnv6
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address 9.9.9.173/32
dest zone any
service any
!
page 33
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
!
rule-set firewall
rule 1
action permit cgnv6 lsn-lid 2
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address 9.9.9.173/32
dest zone any
service any
!
page 34
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
NOTE: In this example, the NAT inside source static address is problematic.
Also, lsn-lid 2 under rule 1 and lsn-lid 1 under rule 4 are assigned to
the same user. The LSN LID to be used for the user is determined by
which rule is matched by the inside user first. Only one LSN LID can be
used for the same inside user.
!
cgnv6 fixed-nat inside 12.10.10.172 12.10.10.172 netmask /24 nat 9.9.9.67 9.9.9.67 netmask
/24 vrid 31
!
rule-set firewall
rule 1
action permit cgnv6 fixed-nat
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address 9.9.9.173/32
dest zone any
service any
!
!
class-list lsn
0.0.0.0/0 lsn-lid 1
!
cgnv6 lsn inside source class-list lsn
!
cgnv6 nat pool p3 9.9.9.50 9.9.9.50 netmask /24 vrid 31
!
cgnv6 nat pool p4 9.9.9.60 9.9.9.60 netmask /24 vrid 31
!
cgnv6 fixed-nat inside 12.10.10.172 12.10.10.172 netmask /24 nat 9.9.9.67 9.9.9.67 netmask
/24 vrid 31
!
cgnv6 lsn-lid 1
page 35
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
source-nat-pool p3
!
cgnv6 lsn-lid 2
source-nat-pool p4
!
rule-set firewall
rule 1
action permit cgnv6 fixed-nat
source ipv4-address 12.10.10.172/32
source zone any
dest ipv4-address 9.9.9.173/32
dest zone any
service any
rule 4
action permit cgnv6 lsn-lid 1
source ipv4-address 12.10.10.172.32
source zone any
dest ipv4-address any
dest zone any
service any
!
NOTE: In this example, cgnv6 fixed-nat under rule 1 and cgnv6 lsn-lid 1
under rule 4 are assigned to the same inside user to use both Fixed NAT
and LSN-LID for different services. This is a valid configuration and the
same user can make use of different NAT technologies for different ser-
vices.
Application Forward
The following is a sample configuration when the rule is configured to process the packet in L3-forward
mode and a firewall session will be created.
page 36
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
rule-set firewall
rule 1
action permit forward
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address 9.9.9.173/32
dest zone any
service any
rule 4
action permit cgnv6 lsn-lid 1
source ipv4-address 12.10.10.0/24
source zone any
dest ipv4-address any
dest zone any
service any
!
NOTE: In this example, forward under rule 1 and cgnv6 lsn-lid 1 under rule 4
are assigned to the same user. This is a valid configuration and the same
inside user will either be treated as a firewall session and Layer 3 for-
warded or use LSN LID 2 for NAT, based on the destination address.
page 37
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Processing Rules
page 38
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Firewall Logging
This chapter describes how to create firewall logging templates and covers the following topics:
• Overview
Overview
Firewall logging is an optional action that can be applied to any rule. When you enable logging on a rule,
log messages are generated whenever a session is created, destroyed, or denied.
The firewall cannot store log messages locally, due to the high volume of firewall logs. Therefore, only
external syslog servers are supported. External system logging configuration is required for any syslog
messages to be sent to an external server.
page 39
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview
NOTE: If you configure multiple logging hosts, requests will be sent using round-
robin.
The logging host must be configured to accept syslog messages, and it must be reachable from within
the partition's routing domain. The logging host must not be on the management network.
• Configuration events – These messages indicate that a configuration change has occurred. Typ-
ically, this type of firewall event is generated when you configure a firewall rule or other setting.
Firewall configuration logs are sent following successful configuration of system logging. Fire-
wall configuration logs are included as part of the system logs, and these configuration logs are
only sent out after using the logging host command. See the “logging host” command in the CLI
Reference for details on setting up basic system logging.
• When the firewall configuration log is sent to the remote log server, it will also appear in the
log buffer.
• By default, only configuration events are logged to the local logging buffer on ACOS.
• Data events – These event types indicate that a firewall session has been created or destroyed.
Session logs for data events can be sent using either of two logging commands (logging host or
fw logging).
• Data events are not logged by default. Due to the potentially high volume of data event mes-
sages, these are only accessible using external logging servers. You can configure the fire-
wall to use a single logging server or a group of logging servers.
• To set up firewall logging for data events, use the fw logging command. (See “fw logging” on
page 98 for details.)
NOTE: If an external logging server is not set up, then firewall configuration
events are logged locally, and data events will not be logged.
page 40
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview
However, because firewall logs are verbose and occur at high frequency, the ACOS device can separate
log messages associated with firewall activity from log messages related to general device configura-
tion.
NOTE: ACOS will use a logging host if one has been configured. This host must
also have a custom logging template configured and must be bound to
the firewall rule-set.
• Firewall partition
• SLB-Firewall partition
• CGN-Firewall partition
Limitations:
• Within any given partition, configuring an SLB template with the same name as a firewall tem-
plate is not permitted.
• The only option currently available under the firewall logging template is to configure the service
group.
• Only a firewall service group can be bound to a firewall logging template.
• UDP and TCP are the firewall service-group types that can be bound to a firewall logging tem-
plate.
page 41
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview
Firewall logs are sent out using the Common Event Format (CEF). For more information, see “Choosing
CEF or ASCII Format” on page 47.
HTTP Logging can be used to send logging information for CGN-based events, such as this partial list:
• include-http l4-session-info
For a full list of options supported by HTTP logging, see the include-http, log http-requests, and rule
http-requests options under the fw template logging command.
Configuration
HTTP logging is enabled on a destination port basis and is configured in the firewall logging template.
The following sample configuration shows how to enable HTTP logging on ports 80 and 880:
page 42
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Overview
NOTE: HTTP Logging requires that log messages be sent in ASCII format.
Therefore, you must change the log message format from CEF to ASCII
for HTTP Logging to work. For more information, see Choosing CEF or
ASCII Format.
page 43
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Configuring Firewall Logging
NOTE: With the introduction of “Support for TCP Logging for GiFW” in 4.1.1-P2,
the firewall logging configuration below could be modified to work with
UDP or TCP. For TCP, simply replace “udp” with “tcp”, as shown below.
page 44
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Sample Firewall Configuration
page 45
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Sample Firewall Log Messages
Deny Log
Sep 30 16:20:33 2016 vThunder CEF:0|A10 NETWORKS|Thunder Series Unified Application Service
Gateway|4.1|FW 102|Session denied|5|proto=TCP act=Deny rt=4300658279 src=192.168.101.50
spt=59302 dst=192.168.201.51 dpt=80 deviceInboundInterface=ethernet1 cs1=fw-policy cs2=any
cs6=p1 cs1Label=Rule Set Name cs2Label=Rule Name cs6Label=Partition Name
page 46
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
ASCII formatted log messages can include additional information that cannot be conveyed using stan-
dard CEF log messages. For example, the following CGN logging options are supported when using
ASCII formatted log messages:
1. Log messages are transported using syslog, but the format of the log messages can be CEF of ASCII.
page 47
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
Table 6 describes the fields that may appear in the firewall logs of CEF-formatted messages
• Session opened
• Session closed
page 48
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
(an extension is a collection • proto – TCP, UDP, ICMP, ICMPv6, IP, GRE, RTSP and OTHER
of key-value pairs) • act – Action taken by the firewall device:
• Permit
• Deny
• Reset
• rt – “rt” or “receiptTime” is a timestamp representing the time at which the
event related to the activity was received. The format is MMM dd yyyy
HH:mm:ss (e.g., Jan 21 1980), or “rt” can also be expressed as the number of
milliseconds since the epoch.
• src – Source IP of the request or response.
• spt – Source protocol port of the request or response.
• dst – Destination IP of the request or response.
• dpt – Destination protocol port of the request or response.
• deviceInboundInterface – Interface upon which the data or packet
entered the device.
• deviceOutboundInterface – Interface upon which the data or packet
exited the device.
• cs1 and cs1Label – The name of the rule-set.
• cs2 and cs2Label – The name of the rule within the rule-set.
• cs4 and cs4Label – The name of the source zone.
• cs5 and cs5Label – The name of the destination zone.
• cs6 and cs6Label – The name of the partition. (Note: This field is N/A if the
event is invoked in the shared partition)
• cn1 and cn1Label – Packets transferred from source to destination.
Appears in close event only.
• cn2 and cn2Label – Packets transferred from destination to source.
Appears in close event only.
• cn3 and cn3Label – Session duration (in seconds) since open event.
Appears in close event only.
• c6a2 and c6a2Label – IPv6 source address.
• c6a3 and c6a3Label – IPv6 destination address.
• flexNumber1 and flexNumber1Label – ICMP/ICMPv6 type.
• flexNumber2 and flexNumber2Label – ICMP/ICMPv6 code.
page 49
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
The following section shows a sample FW log message in CEF format for a UDP session that is being
opened.
Sep 30 15:21:39 2016 vThunder CEF:0|A10 NETWORKS|Thunder Series Unified Application Service
Gateway|4.1|FW 100|Session opened|1|proto=TCP act=Permit rt=4299774764 src=192.168.101.50
spt=59298 dst=192.168.201.51 dpt=80 deviceInboundInterface=ethernet1 deviceOutboundInter-
face=ethernet2 cs1=fw-policy cs2=any cs6=p1 cs1Label=Rule Set Name cs2Label=Rule Name cs6La-
bel=Partition Name
Table 7 labels each field that appears in the above log message.
page 50
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
src=192.168.101.50
spt=59298
dst=192.168.201.51
dpt=80
deviceInboundInterface =ethernet1
deviceOutboundInterface =ethernet2
cs1=fw-policy
cs2=any
cs6 =p1
page 51
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
Table 8 defines the fields that appear in the above ASCII-formatted log message.
• G – session OPEN
• H – session CLOSE
• I – session DENY
• J – session RESET
Src IP/port 3.3.3.89:58219
Dst IP/port 15.15.15.90:14000
ASCII-extension (i.e., ACT= PERMIT
key-value pairs)
RT= 4295164466
IN-INTF=ve301
OUT-INTF=ve401
POLICY=fw-only
RULE=2
FWD_BYTES=180
REV_BYTES=0
FWD_PKTS=3
REV_PKTS=0
DUR=10\r\n
page 52
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
page 53
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Choosing CEF or ASCII Format
page 54
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
ACOS is configured to act as a RADIUS server so that it can receive RADIUS accounting requests that
include the client RADIUS attributes.
When client’s AAA server sends out RADIUS accounting packet that has the Framed IP and (/or)
Framed IPv6 Prefix to ACOS, ACOS intercepts the packet, creates a RADIUS table entry based on the IP
and IPv6 Prefix. When the inside user creates a data connection either from the IP or from IPv6 address
(from the prefix), ACOS then includes the RADIUS attributes while sending the log messages.
The ACOS device acts as a RADIUS server. ACOS acts as a RADIUS server intercepting RADIUS
accounting request messages sent to the Interface / Floating IPs configured on ACOS. To create a
RADIUS server configuration for Firewall deployment, use the fw radius server command.
When configuring the Firewall RADIUS server or CGNV6 RADIUS server, use the framed-ipv6-prefix
command to specify the Framed IPv6 Prefix as a RADIUS attribute for RADIUS accounting requests.
The following combination are possible in a RADIUS packet:
• Framed IPv4 address and Framed IPv6 prefix — ACOS accepts the packet and creates the
RADIUS entries based on the IPv4 address and the IPv6 prefix.
• Framed IPv4 address and Framed IPv6 address — ACOS accepts the packet and create the
RADIUS entries based on the IPv4 address and the IPv6 address.
• Framed IPv6 address and Framed IPv6 prefix — ACOS accepts the packet and creates 1 record
with ipv6 address.
• Framed IPv6 address and Framed IPv6 prefix are present.
The Framed IPv6 prefix attribute in the RADIUS packet contains the prefix with the configured prefix
length. When the configured prefix length on the RADIUS server does not match with the incoming pre-
fix length, then the packet will be dropped.
When the prefix length is changed in the RADIUS server, the existing RADIUS table must be explicitly
cleared.
page 55
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Framed IPv6 Prefix Support in RADIUS Table
NOTE: The value of the Framed IPv6 Prefix is configurable. If the configured pre-
fix is changed, the RADIUS table must be explicitly cleared to remove the
previously learned RADIUS table entries.
NOTE: ACOS accepts the RADIUS accounting packets only when the packet is
destined to the ACOS Interface IP or Floating IP.
Supported Topologies
RADIUS support is available with the following topologies:
• FW only scenarios
• L3Vs
Firewall Only Partition
The following configuration configures Framed IPv6 Prefix support for RADIUS table in FW only parti-
tion.
1. These command creates an ip-list to be used by other FW commands. The IPs associated to the
ip-list are the ones of which RADIUS packets will be accepted.
ACOS(config)# ip-list client
ACOS(config-ip-list)# 5.5.5.100
ACOS(config-ip-list)# exit
2. These commands create a RADIUS server configuration and specify the RADIUS attributes for
ACOS to receive from external RADIUS servers in response to RADIUS Accounting requests:
ACOS(config)# fw radius server
ACOS(config-radius-server)# remote ip-list client
ACOS(config-radius-server)# secret a10
ACOS(config-radius-server)# attribute inside-ip number 8
ACOS(config-radius-server)# attribute msisdn number 31
ACOS(config-radius-server)# attribute imei vendor 10415 number 20
ACOS(config-radius-server)# attribute imsi vendor 10415 number 1
ACOS(config-radius-server)# attribute custom1 NAS-IP-Address value hexadecimal number 4
ACOS(config-radius-server)# attribute custom2 Connection_PVC vendor 22610 number 43
ACOS(config-radius-server)# attribute custom3 xDSL_number vendor 22610 number 44
ACOS(config-radius-server)# attribute inside-ipv6-prefix prefix-length 64 number 97
ACOS(config-radius-server)# attribute inside-ipv6 vendor 22610 number 29
ACOS(config-radius-server)# accounting start replace-entry
ACOS(config-radius-server)# accounting stop delete-entry-and-sessions
page 56
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Framed IPv6 Prefix Support in RADIUS Table
5. This command activates the firewall function using the specified rule-set:
ACOS(config)# fw active-rule-set 1
CGN and Firewall Partition
The following configuration configures Framed IPv6 Prefix support for RADIUS table in CGN and FW
partition.
1. Enter the following command to create an IP list for client RADIUS servers:
ACOS(config)# ip-list RADIUS_IP_LIST
ACOS(config-ip list)# 40.40.40.1 to 40.40.40.2
ACOS(config-ip list)# exit
page 57
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Framed IPv6 Prefix Support in RADIUS Table
3. These commands configure a logging template
ACOS(config)# cgnv6 template logging log
ACOS(config-logging:log)# log http-requests url
ACOS(config-logging:log)# log sessions
ACOS(config-logging:log)# include-radius-attribute msisdn sessions
ACOS(config-logging:log)# include-radius-attribute imei sessions
ACOS(config-logging:log)# include-radius-attribute imsi sessions
ACOS(config-logging:log)# include-radius-attribute custom2 sessions
ACOS(config-logging:log)# include-radius-attribute custom1 sessions
ACOS(config-logging:log)# include-radius-attribute framed-ipv6-prefix prefix-length 64
ACOS(config-logging:log)# include-http referer
ACOS(config-logging:log)# include-http user-agent
ACOS(config-logging:log)# include-http header1 GET
ACOS(config-logging:log)# include-http l4-session-info
ACOS(config-logging:log)# include-http method
ACOS(config-logging:log)# include-http request-number
ACOS(config-logging:log)# include-http file-extension
ACOS(config-logging:log)# rule http-requests dest-port 80
ACOS(config-logging:log)# rule http-requests log-every-http-request
ACOS(config-logging:log)# rule http-requests max-url-len 200
ACOS(config-logging:log)# rule http-requests include-all-headers
ACOS(config-logging:log)# rule http-requests disable-sequence-check
ACOS(config-logging:log)# batched-logging-disable
ACOS(config-logging:log)# service-group cgn-log-group
page 58
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
page 59
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Sample Topology for DCFW
FIGURE 6 Sample Data Center Firewall topology diagram for basic use case (FW + SLB)
Notes:
• The “untrusted zone” is the external network, near the top of the diagram, while the “trusted zone”
is the internal network, near the bottom of the diagram, and includes the syslog servers.
• The middle contains a “global segment” (DMZ) with an SSH-based server (e.g., VPN or RDP) for
remote access.
• See “DC Firewall Configuration with SLB Deployment” on page 61 for the CLI commands used to
configure the Data Center Firewall in this environment.
page 60
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
The high-level steps to setting up a basic data center firewall deployment (FW with SLB). More granular
instructions can be found in the CLI sample configuration below.
The steps above offer a high-level list of tasks that need to be performed to set up the DC Firewall.
However, the steps below provide a more granular view of the CLI commands that must be used to
configure DC Firewall within an SLB deployment.
1. Configure the ACLs to allow traffic to pass from the internal DNS servers at “172.16.162.11” and
“172.16.162.12” to reach the external “10.16.x.x” network. The ACL is set up to deny any other traf-
fic from this network.
ACOS(config)# access-list 101 permit ip host 172.16.162.11 any
ACOS(config)# access-list 101 permit ip host 172.16.162.12 any
ACOS(config)# access-list 101 deny ip any any
2. Use the “multi-config” command to support several simultaneous administrative sessions. The
“terminal” command sets the terminal parameters for the CLI session. In the example below, the
timeout is set to “0”, meaning the session will not timeout.
ACOS(config)# multi-config enable
page 61
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
3. Create a virtual LAN and specify the VLAN ID number using the “vlan” command. The VLAN config-
uration includes the tagged and untagged ports assigned to the VLAN, as well as the virtual ether-
net router, which is configured under the interface parameters.
ACOS(config)# vlan 21
ACOS(config-vlan:21)# tagged ethernet 16
ACOS(config-vlan:21)# router-interface ve 21
ACOS(config-vlan:21)# exit
ACOS(config)# vlan 53
ACOS(config-vlan:53)# tagged ethernet 16
ACOS(config-vlan:53)# router-interface ve 53
ACOS(config-vlan:53)# exit
ACOS(config)# vlan 99
ACOS(config-vlan:99)# untagged ethernet 1
ACOS(config-vlan:99)# router-interface ve 99
ACOS(config-vlan:99)# exit
ACOS(config)# vlan 161
ACOS(config-vlan:161)# tagged ethernet 15
ACOS(config-vlan:161)# router-interface ve 161
ACOS(config-vlan:161)# exit
ACOS(config)# vlan 162
ACOS(config-vlan:162)# tagged ethernet 16
ACOS(config-vlan:162)# router-interface ve 162
ACOS(config-vlan:162)# exit
ACOS(config)# vlan 163
ACOS(config-vlan:163)# tagged ethernet 16
ACOS(config-vlan:163)# router-interface ve 163
ACOS(config-vlan:163)# exit
6. Use the “interface ethernet” command to configure the physical interfaces on the device. In the
example below, ethernet ports 1, 15, and 16 are enabled, while the remaining interfaces are not.
ACOS(config)# interface ethernet 1
ACOS(config-if:ethernet:1)# enable
ACOS(config-if:ethernet:1)# exit
ACOS(config)# interface ethernet 15
page 62
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
ACOS(config-if:ethernet:15)# enable
ACOS(config-if:ethernet:15)# exit
ACOS(config)# interface ethernet 16
ACOS(config-if:ethernet:16)# enable
ACOS(config-if:ethernet:16)# exit
7. Assign IP addresses to the VLANs using the “Virtual Ethernet (VE)” command.
ACOS(config)# interface ve 21
ACOS(config-if:ve:21)# ip address 21.0.255.243 255.255.0.0
ACOS(config-if:ve:21)# exit
ACOS(config)# interface ve 53
ACOS(config-if:ve:53)# ip address 172.16.53.243 255.255.255.0
ACOS(config-if:ve:53)# exit
ACOS(config)# interface ve 99
ACOS(config-if:ve:99)# ip address 172.16.99.243 255.255.255.0
ACOS(config-if:ve:99)# exit
ACOS(config)# interface ve 161
ACOS(config-if:ve:161)# ip address 10.16.161.243 255.255.255.0
ACOS(config-if:ve:161)# exit
ACOS(config)# interface ve 162
ACOS(config-if:ve:162)# ip address 172.16.162.243 255.255.255.0
ACOS(config-if:ve:162)# exit
ACOS(config)# interface ve 163
ACOS(config-if:ve:163)# ip address 10.16.163.243 255.255.255.0
ACOS(config-if:ve:163)# exit
8. Enable VRRP-A for the first ACOS DC firewall device. Set the device-id to 1, and the set-id for the
pair to 5.
Then, enable VRRP-A on the device using the “enable” command.
ACOS(config)# vrrp-a common
ACOS(config-common)# device-id 1
ACOS(config-common)# set-id 5
ACOS(config-common)# enable
9. The commands below configure VRRP-A for high availability, which can support up to 8 redundant
devices.
In the sample configuration below, we have configured several floating IPs to allow connectivity to
the ACOS devices from the external clients, the server in the global segment, the syslog for FW log-
ging server, and the HTTP/FTP and DNS servers on the internal network. The floating IPs can help
provide network stability by moving to the active device in the pair. Tracking options are used at
the blade level to dynamically reduce the priority value during failover.
ACOS(config)# vrrp-a vrid 1
ACOS(config-vrid:1)# floating-ip 172.16.162.244 <-- for internal HTTP/FTP/DNS servers
ACOS(config-vrid:1)# floating-ip 10.16.161.244 <-- for external (untrusted) clients
ACOS(config-vrid:1)# floating-ip 172.16.53.244 <-- for syslog external server
page 63
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
10.The first command below configures the NAT pool “p1” with one IP address (“10.16.161.201”),
which is the IP that the internal HTTP/FTP or DNS servers will use to reach the external network.
The second command binds the pool “p1” to ACL “101”.
ACOS(config)# ip nat pool p1 10.16.161.201 10.16.161.201 netmask /24 gateway
10.16.161.254 vrid 1
ACOS(config)# ip nat inside source list 101 pool p1
11.The following command configures ethernet interface 1 as the VRRP-A interface, through which
the device can be reached for high availability synchronization.
ACOS(config)# vrrp-a interface ethernet 1
ACOS(config-ethernet:1)# exit
12.The command below configures a route from the internal HTTP/FTP/DNS servers to the external
network.
ACOS(config)# ip route 0.0.0.0 /0 10.16.161.254
13.The following commands are used to add the VLANs created above to zones. The zones can con-
tain an interface or a VLAN. Rather than adding all four VLANs to the same zones, an individual
zone is created for each VLAN. These zones will later be added to firewall rules as match criteria.
ACOS(config)# zone HA
ACOS(config-zone:zone-HA)# interface ethernet 1
ACOS(config-zone:zone-HA)# interface ve 99
ACOS(config-zone:zone-HA)# exit
ACOS(config)# zone Trust_Vlan_162
ACOS(config-zone:zone-Trust_Vlan_162)# vlan 162
ACOS(config-zone:zone-Trust_Vlan_162)# exit
ACOS(config)# zone Trust_Vlan_53
ACOS(config-zone:zone-Trust_Vlan_53)# vlan 53
ACOS(config-zone:zone-Trust_Vlan_53)# exit
ACOS(config)# zone Untrust
ACOS(config-zone:zone-Untrust)# vlan 161
ACOS(config-zone:zone-Untrust)# exit
ACOS(config)# zone dmz
ACOS(config-zone:zone-dmz)# vlan 163
ACOS(config-zone:zone-dmz)# exit
page 64
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
14.The following commands configure the real server “s001” and “s002”, with TCP on ports 80 and 21
(for HTTP and FTP). The next two servers, “s011” and “s012” are configured with port 53 (for DNS).
ACOS(config)# slb server s001 172.16.162.1
ACOS(config-real server)# port 21 tcp
ACOS(config-real server-node port)# exit
ACOS(config-real server)# port 80 tcp
ACOS(config-real server-node port)# exit
ACOS(config-real server)# exit
15.The following commands configure service group “sg-1” (with real server “s001” and “s002” at port
80 for TCP/HTTP),
“sg-2” (with real server “s001” and “s002” at port 21 for TCP/FTP), and “sg-3” (with real servers
“s011” and “s012” at port 53 for UDP/DNS traffic).
ACOS(config)# slb service-group sg-1 tcp
ACOS(config-slb svc group)# member s001 80
ACOS(config-slb svc group-member:80)# exit
ACOS(config-slb svc group)# member s002 80
ACOS(config-slb svc group-member:80)# exit
ACOS(config-slb svc group)# exit
page 65
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
page 66
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
16.The following commands are used to create virtual servers “vip-161.111” and “vip-162.112” on the
ACOS device. The VIPs are intended to handle DNS requests. Next, we assign “VRID 1” to both VIPs
to create a logical binding for the shared VRRP-A elements. Similarly, we conifigure “vip-161.101”
at (.111) and “vip-161.102” to handle HTTP and FTP
traffic.
ACOS(config)# slb virtual-server vip-161.111_dns 10.16.161.111
ACOS(config-slb vserver)# vrid 1
ACOS(config-slb vserver)# port 53 dns-udp
ACOS(config-slb vserver-vport)# service-group sg-3
ACOS(config-slb vserver-vport)# exit
ACOS(config-slb vserver)# exit
17.Next, we configure the syslog server at (53.1), and set the severity level for sent logs to “informa-
tion” and above.
ACOS(config)# logging syslog information
page 67
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
18.Configure the network objects, which will be used as the match criteria in the rules. As shown by
the prefix in the object name (“obj_sv”), we are configuring network objects to represent the servers
on the internal “172.16.x.x” network. We also configure network objects to represent the server in
the DMZ and the VIPs on the ACOS devices.
ACOS(config)# object network obj_sv_162.11_dns
ACOS(config-network:obj_sv_162.11_dn)# 172.16.162.11/32
ACOS(config-network:obj_sv_162.11_dn)# exit
19.Next, we create the network object groups for the server objects and VIP objects. Note the “fire-
wall” keyword, designates that this object belongs to a firewall and not an ACL. Additionally, the
“v4” keyword identifies this as an IPv4 object, as opposed to IPv6.
ACOS(config)# object-group network objg_sv_dns fw v4
ACOS(config-network:objg_sv_dns)# object obj_sv_162.11_dns
ACOS(config-network:objg_sv_dns)# object obj_sv_162.12_dns
ACOS(config-network:objg_sv_dns)# exit
page 68
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
ACOS(config-network:objg_http_ftp)# exit
20.The following commands create an object group for services. While the “network” keyword allows
you to specify match criteria based on IP addresses, zones, VIPs and ports, the “services” keyword
enables you to specify match criteria for protocols. In the sample below, a match will occur for
incoming traffic on TCP/HTTP port 80 or 8080.
ACOS(config)# object-group service obj_srv_http
ACOS(config-service:obj_srv_http)# tcp eq 80
ACOS(config-service:obj_srv_http)# tcp eq 8080
ACOS(config-service:obj_srv_http)# exit
21.The command below creates the rule-set “r1” and adds a collections rules named “10”, “15”, “110”,
and so on.
Sequence numbers in rules are hidden and non-configurable, but you can change the order in
which rules appear in the rule-set using the “insert-rule” option in the CLI or “move rule” option in
the GUI. At a more granular level, each rule contains match criteria and an action to be applied to
traffic that matches that criterion. For example, within rule “10”, the action is to permit any traffic
that matches the match criteria, which screens for traffic from source IP “172.16.99.242/32”,
source zone “HA”, and destination IP “224.0.0.210/32”). Traffic will be processed according to the
first rule for which there is a positive match.
ACOS(config)# rule-set r1
ACOS(config-rule set:r1)# rule 10
ACOS(config-rule set:r1-rule:10)# action permit
ACOS(config-rule set:r1-rule:10)# source ipv4-address 172.16.99.242/32
ACOS(config-rule set:r1-rule:10)# source zone HA
ACOS(config-rule set:r1-rule:10)# dest ipv4-address 224.0.0.210/32
page 69
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
page 70
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
DC Firewall Configuration with SLB Deployment
22.The command below associates the firewall with the VRID for high availability failover, but it is
unrelated to SLB.
ACOS(config)# fw vrid 1
23.The command below is used to configure a session aging template called “a1”, within which the
idle-timeout values are set for TCP, UDP, and ICMP sessions.
ACOS(config)# fw session-aging a1
ACOS(config-session-aging:a1)# tcp idle-timeout 12345
ACOS(config-session-aging:a1)# udp idle-timeout 89
ACOS(config-session-aging:a1)# icmp idle-timeout 9
24.The command below is used to activate the rule-set “r1”, and simultaneously binds the session-
aging template “a1” to this rule-set.
ACOS(config)# fw active-rule-set r1 session-aging a1
page 71
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
page 72
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
!
hostname ACOS
!
interface management
ip address 192.168.229.16 255.255.255.0
ip default-gateway 192.168.229.1
!
interface ethernet 1
enable
!
interface ethernet 2
!
interface ethernet 3
!
interface ethernet 4
!
interface ethernet 5
!
interface ethernet 6
!
interface ethernet 7
!
interface ethernet 8
!
interface ethernet 9
!
interface ethernet 10
!
interface ethernet 11
!
interface ethernet 12
!
interface ethernet 13
!
interface ethernet 14
!
interface ethernet 15
enable
!
interface ethernet 16
enable
!
interface ethernet 17
!
page 73
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
interface ethernet 18
!
interface ethernet 19
!
interface ethernet 20
!
interface ve 21
ip address 21.0.255.243 255.255.0.0
!
interface ve 53
ip address 172.16.53.243 255.255.255.0
!
interface ve 99
ip address 172.16.99.243 255.255.255.0
!
interface ve 161
ip address 10.16.161.243 255.255.255.0
!
interface ve 162
ip address 172.16.162.243 255.255.255.0
!
interface ve 163
ip address 10.16.163.243 255.255.255.0
!
vrrp-a common
device-id 1
set-id 5
enable
!
vrrp-a vrid 1
floating-ip 172.16.162.244
floating-ip 10.16.161.244
floating-ip 172.16.53.244
floating-ip 10.16.163.244
blade-parameters
tracking-options
interface ethernet 15 priority-cost 100
interface ethernet 16 priority-cost 100
!
ip nat pool p1 10.16.161.201 10.16.161.201 netmask /24 gateway 10.16.161.254 vrid 1
!
ip nat inside source list 101 pool p1
!
vrrp-a interface ethernet 1
page 74
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
!
ip route 0.0.0.0 /0 10.16.161.254
!
zone HA
interface ethernet 1
interface ve 99
!
zone Trust_Vlan_162
vlan 162
!
zone Trust_Vlan_53
vlan 53
!
zone Untrust
vlan 161
!
zone dmz
vlan 163
!
slb server s001 172.16.162.1
port 21 tcp
port 80 tcp
!
slb server s002 172.16.162.2
port 21 tcp
port 80 tcp
!
slb server s011 172.16.162.11
port 53 udp
!
slb server s012 172.16.162.12
port 53 udp
!
slb service-group sg-1 tcp
member s001 80
member s002 80
!
slb service-group sg-2 tcp
member s001 21
member s002 21
!
slb service-group sg-3 udp
member s011 53
member s012 53
page 75
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
!
slb virtual-server vip-161.111_dns 10.16.161.111
vrid 1
port 53 dns-udp
service-group sg-3
!
slb virtual-server vip-161.112_dns 10.16.161.112
vrid 1
port 53 dns-udp
service-group sg-3
!
slb virtual-server vip_161.101_http_ftp 10.16.161.101
vrid 1
port 21 ftp
ha-conn-mirror
service-group sg-2
port 80 tcp
ha-conn-mirror
service-group sg-1
!
slb virtual-server vip_161.102_http_ftp 10.16.161.102
vrid 1
port 21 ftp
ha-conn-mirror
service-group sg-2
port 80 tcp
ha-conn-mirror
service-group sg-1
!
logging syslog information
!
logging host 172.16.53.1
!
object network obj_sv_162.11_dns
172.16.162.11/32
!
object network obj_sv_162.12_dns
172.16.162.12/32
!
object network obj_sv_162.1_http_ftp
172.16.162.1/32
!
object network obj_sv_162.2_http_ftp
172.16.162.2/32
page 76
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
!
object network obj_sv_163.5_ssh
10.16.163.5/32
!
object network obj_vip_161.101_http_ftp
10.16.161.101/32
!
object network obj_vip_161.102_http_ftp
10.16.161.102/32
!
object-group network objg_sv_dns fw v4
object obj_sv_162.11_dns
object obj_sv_162.12_dns
!
object-group network objg_sv_http_ftp_tmp fw v4
virtual-server vip_161.101_http_ftp
virtual-server vip_161.102_http_ftp
!
object-group network objg_sv_http_ftp fw v4
object obj_vip_161.101_http_ftp
object obj_vip_161.102_http_ftp
!
object-group service obj_srv_http
tcp eq 80
tcp eq 8080
!
object-group service obj_srv_ftp
tcp eq 21 alg FTP
tcp eq 20021 alg FTP
!
object-group service obj_srv_dns
udp eq 53 alg DNS
tcp eq 53 alg DNS
!
object-group service obj_srv_ssh
tcp eq 22
!
rule-set r1
rule 10
action permit
source ipv4-address 172.16.99.242/32
source zone HA
dest ipv4-address 224.0.0.210/32
rule 15
page 77
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
action permit
source ipv4-address 172.16.99.242/32
source zone HA
dest ipv4-address 172.16.99.243/32
rule 110
action permit log
source zone Untrust
dest object-group objg_sv_http_ftp
service object-group obj_srv_http
rule 111
action permit log
source zone Untrust
dest object-group objg_sv_http_ftp
service object-group obj_srv_ftp
rule 115
action permit log
source zone Untrust
dest virtual-server vip-161.112_dns
service object-group obj_srv_dns
rule 130
action permit log
source object-group objg_sv_dns
source zone Trust_Vlan_162
dest zone Untrust
service object-group obj_srv_dns
rule 140
action permit
source zone Trust_Vlan_162
dest zone Trust_Vlan_53
rule 141
action permit
source zone Trust_Vlan_53
dest zone Trust_Vlan_162
rule 150
action permit log
dest object obj_sv_163.5_ssh
service object-group obj_srv_ssh
!
fw vrid 1
!
fw session-aging a1
tcp idle-timeout 12345
udp idle-timeout 89
icmp idle-timeout 9
page 78
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
!
fw active-rule-set r1 session-aging a1
!
end
!Current config commit point for partition 0 is 0 & config mode is classical-mode
AX16(config)#
page 79
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for DCFW
page 80
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Deploying Gi/SGi-Firewall
page 81
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Sample Topology for Gi/SGi-FW
FIGURE 7 Sample Gi/SGi-FW topology diagram for basic use case (FW + CGN)
Notes:
• See “Gi/SGi-FW Configuration with CGN Deployment” on page 83 for the CLI commands used to
configure the firewall in an environment similar to that shown above.
page 82
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Gi/SGi-FW Configuration with CGN Deployment
High-level Configuration
This section provides high-level configuration steps to set up a basic Gi/SGi-FW. More granular CLI
commands are described in the next section.
CLI Configuration
The following commands configure the server to which the logs are to be sent:
page 83
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Gi/SGi-FW Configuration with CGN Deployment
The following commands define a CGNv6 logging template. In the template, the commands also define
which NAT events to log and the format for the log messages:
The following command sets a configured LSN traffic logging template as the default template for all
LSN pools:
The following commands configure a named set of IP addresses for use by CGN or LSN:
The following commands configure a LID for NAT64 and add the pool to it:
ACOS(config)# cgnv6 fixed-nat inside 3201::172 3201::172 netmask 96 nat 9.9.9.45 9.9.9.45
netmask /24 vrid
page 84
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Gi/SGi-FW Configuration with CGN Deployment
The following commands create a network object-group for specifying match criteria using Layer 3
parameters. The following example specifically creates a network object group that will be used for
IPv4 firewall configurations.
The following commands create a service object group for specifying matching match criteria using
Layer 4 to layer 7 parameters.
The following commands configure a firewall rule-set that contains a set of rules. In this example, rule 1
specifies that any packets matching this rule must be handled by LSN configurations, whereas packets
matching rule 2 must be handled by Fixed NAT configurations. Packets matching rule 3 are permitted,
and no CGN configurations are applied to them.
page 85
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Gi/SGi-FW Configuration with CGN Deployment
Notes:
• The firewall rule-set must be activated with the fw active-rule-set command before any rules
can be enforced on inbound traffic.
• When no rule-set is active, all traffic will pass, because no firewall rules are applied to the incom-
ing traffic.
• If a firewall rule-set is active and no rules are defined, then the default action is implicit deny.
• Each rule contains one or more match criteria and associated actions that can be applied to traf-
fic if there is a match.
page 86
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for Gi/SGi-FW
page 87
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Show Running Config for Gi/SGi-FW
12.10.10.0/24
!
object-group service alg
tcp eq 21 alg FTP
icmp
tcp range 1 65535
udp eq 69 alg TFTP
protocol-id 132
udp eq 554 alg RTSP
udp eq 53 alg DNS
udp range 1 65535
!
rule-set firewall
rule 1
action permit cgnv6 lsn-lid 1
source object-group allowed
source zone inside
dest ipv4-address any
dest zone outside
service object-group alg
rule 2
action permit cgnv6 fixed-nat
ip-version v6
source ipv6-address 3201::172/128
source zone inside
dest ipv6-address any
dest zone any
service any
!
fw active-rule-set firewall
page 88
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
page 89
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• fw active-rule-set
• fw alg
• fw alg-processing
• fw apply-changes
• fw disable-ip-fw-sessions
• fw helper-sessions
• fw listen-on-port-timeout
• fw logging
• fw permit-default-action
• fw radius server
• fw server
• fw service-group
• fw session-aging
• fw tcp-window-check
• fw template logging
• fw urpf
• fw vrid
• rule-set
• zone
page 90
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw active-rule-set
Description Activate the firewall function using the specified rule-set in an application
delivery partition. Only one rule-set may be active in a partition.
Parameter Description
active-rule-set Enable the firewall function using the rule-set specified for
name this partition. The rule-set must exist prior to activating.
(See “rule-set” on page 117.)
session-aging Bind the session-aging template (for TCP, UDP, and ICMP
template-name sessions) to the active rule-set. (See “fw session-aging” on
page 104.)
Usage While ACOS supports creation of many rule-sets, only one rule-set can be
active at a time.
Example This example shows how to activate firewall rule set “rule-set-1”:
page 91
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw alg
Description Configure application protocol inspection for common applications proto-
cols, such as FTP, TFTP, SIP, DNS and others, on their well-known ports.
Parameter Description
dns default-port-disable Change DNS ALG settings for default port 53.
ftp default-port-disable Change FTP ALG settings for default port 21.
icmp disable Disable ICMP ALG, which allows ICMP errors
to pass through the firewall.
pptp default-port-disable Change PPTP ALG settings for default port
1723.
rtsp default-port-disable Change RTSP ALG settings for default port
554.
sip default-port-disable Change SIP ALG settings for default port
5060.
tftp default-port-disable Change TFTP ALG settings for default port 69.
Default Application protocol inspection is enabled by default for the protocols listed
in the table above. If desired, you can use this command to disable this
behavior.
Usage ALG is enabled by default for these protocols, so traffic using common ALG
protocols, (for example, FTP or SIP), may traverse the firewall without being
inspected, as long as the traffic is using its associated well-known port.
However, this command can be used to block traffic on the well-known ports
for these protocols. To enable application protocol inspection on non-default
ports, you can specify them while creating a service-rule or service object-
group element.
Example The following example shows how to disable the ALG for DNS on its well-
known port 53:
page 92
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw alg-processing
Description Override the rules in a rule-set, to allow ALG traffic connections to be created,
regardless of configured firewall rules that would otherwise deny the con-
nection request.
Parameter Description
honor-rule-set Honor the firewall rule-set (Default)
override-rule-set Override the firewall rule-set
Usage ALG protocols, such as FTP and SIP, require the firewall to open ports to
accept new connections.
By default, the firewall honors the existing rule-set, meaning the firewall will
permit new ALG connection requests only if the request satisfies the
explicitly configured firewall rules.
However, you can override this behavior, so that the firewall will ignore the
configured firewall rules in the active rule-set. In this case, the firewall will
allow the ALG connection to open the port, even if the configured rules in the
rule-set would otherwise prevent the connection from opening.
Example The following example shows how to override the rules in the rule-set to
allow ALG traffic to pass, regardless of whether those rules would deny the
request:
page 93
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw apply-changes
Description Recompile the firewall rule-set immediately.
Default N/A
Usage If you made any changes to the active rule-set, this command will push the
updated rule-set to the running-config to make it take effect immediately.
This is an operational command and thus will not be stored in the running -
config.
ACOS(config)# fw apply-changes
ACOS(config)#
page 94
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw disable-ip-fw-sessions
Description Disable auto-creation of data sessions for non-TCP/UDP/ICMP protocols
that match a firewall permit rule.
Default N/A
Usage The DC Firewall will create an associated data session for all non-TCP/UDP/
ICMP protocols that match a firewall permit rule. Use this command to disa-
ble auto-creation of a separate data session.
Example The following example shows how to disable auto-creation of data sessions
for non-TCP/UDP/ICMP protocols.
ACOS(config)# fw disable-ip-fw-sessions
ACOS(config)#
page 95
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw helper-sessions
NOTE: This is an internal command and should only be used by A10 Networks
Technical Support for debugging purposes.
Parameter Description
idle-timeout Set the firewall helper-sessions idle-timeout to a value ranging
from 1-255 minutes. Default is 1 minute.
limit Limit the number of helper sessions that can be created
(1-134217728).
mode disable Helper sessions mode is enabled by default. You can use mode
disable to disable the creation of any helper-sessions.
Usage Data Center Firewall can employ short-lived helper sessions to provide faster
rule lookups. This can be helpful in cases where traffic is repeatedly sent to
the same destination IP address and port from the same source IP address.
Use the idle-timeout and limit options to change the behavior of these
helper-sessions.
Example The following example sets the idle-timeout for firewall helper-sessions to 10
minutes:
page 96
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw listen-on-port-timeout
Description Configure session’s Session Traversal Utilities for NAT (STUN) timeout.
Example The following example sets the idle-timeout for firewall helper-sessions to 10
minutes:
ACOS(config)# fw listen-on-port-timeout 60
page 97
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw logging
Description Bind an SLB logging template to the firewall.
Usage The data center firewall creates a high volume of log messages for data
events, such as when a firewall session is created or destroyed. These log
messages are directed to an external logging server.
Configuration events also generate log messages, but these are typically
sent to a different log server than the firewall data log messages. You can
set up where to send the config-change logs using the standard logging
host command. (See the “logging host” command in the CLI Reference for
details.)
Example The following example binds the logging template “temp-log1” to the firewall:
page 98
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw permit-default-action
Description This command applies to Gi/SGi-FW only. For a rule that does not have an
application associated with it, this command changes the way ACOS pro-
cesses incoming traffic when a match occurs on a policy rule containing
“action permit”.
Parameter Description
forward The packet will be L3 forwarded and a firewall
session will be created.
next-service-mode The packet will be processed according to the
applications configured in order.
Example The following example shows how to configure ACOS such that the packet
will be forwarded at Layer 3 and will open a firewall session:
page 99
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw radius server
Description Configure the interaction with external RADIUS servers for firewall com-
mands.
This command changes the CLI to the configuration level for the specified
RADIUS server, where the following commands are available.
Command Description
[no] accounting Configures actions for RADIUS accounting messages. The following
actions can be specified:
page 100
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Command Description
[no] attribute attr-name Specifies the RADIUS attributes for the ACOS device to receive from exter-
[[vendor vendor-id] nal RADIUS servers in response to RADIUS Accounting requests. The fol-
number attr-id] lowing attributes can be specified:
The vendor-id specifies the RADIUS vendor ID and can be 1-65535. The attr-
id specifies the RADIUS attribute ID and can be 1-255. These options, in
combination, allow you to specify any attribute to be used as the client’s
inside IP address, or MSIDSN, or IMEI, and so on. For example, if your
RADIUS server normally sends the MSIDSN attribute as attribute 31, you
could use the following command to configure the ACOS device to use the
same attribute value for MSIDSN: attribute msisdn number 31
[no] listen-port portnum Specifies the port number on which the external RADIUS server listen for
Accounting requests.
[no] remote Specifies the name of the IP list that contains the IP addresses of the exter-
nal RADIUS servers from which to obtain mobile numbers for traffic log-
ging. The following options are available:
Default By default, no RADIUS servers are configured. When you use this command
to configure one, the server has the defaults listed in the table above.
Usage You can configure ACOS to use the same mechanism for inserting the
MSISDN values into HTTP request headers, that is used to insert the values
into FW log messages.
page 101
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw server
Description Configure a firewall logging server.
Replace server-name with the name of the logging server, 1-127 characters.
Specify the IPv4 or IPv6 address, or hostname for the logging server.
This command changes the CLI to the configuration level for the specified
server, where the following commands are available:
Parameter Description
[no] health-check Enables health monitoring of the server. The
[monitor-name] monitor-name specifies the name of a config-
ured health monitor.
Usage This command creates a new real server. The CLI changes to the configura-
tion level for the server. The “no” form of this command removes an existing
page 102
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
real server. The IP address of the server can be in either IPv4 or IPv6 format,
or hostname.
Example The following example shows how to configure a logging server called “log-
serv1” at 1.2.3.4:
fw service-group
Description Configure a service group for the firewall logging server.
This command changes the CLI to the configuration level for the specified
service group, where the following commands are available:
Parameter Description
[no] health-check Enables health monitoring of the service
[monitor-name] group. The monitor-name specifies the name
of a configured health monitor.
[no] member Adds the external log server and port to the
server-name portnum service group.
[sampling-enable type]
The sampling-enable option enables base-
lining on the service group member.
[no] sampling-enable Enables baselining on the service group.
type
Usage This command creates a new service group. The CLI changes to the configu-
ration level for the service group.
page 103
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw session-aging
Description Configure the session-aging template for ICMP, TCP, and UDP protocols.
This command changes the CLI to the configuration level for the designated
session-aging template, where the following commands are available.
Command Description
[no] icmp idle-timeout Configure idle-timeout for ICMP sessions. You can set the time-out to a value
seconds ranging from 2-15000 seconds. The default is 2 seconds.
[no] ip-others ip- Configure idle-timeout for sessions that are not TCP, UDP, or ICMP traffic. You
idle-timeout seconds can set the time-out to a value ranging from 1-2097151 seconds. The default is
30 seconds.
page 104
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Command Description
[no] tcp Configure the following options for TCP sessions:
• port num – Enables configuration of port-based timeouts for TCP ports. You
can set the port num to a value from 1-65535. At this configuration point, the
following sub-options are available:
• port num – Enables configuration of port-based timeouts for UDP ports. You
can set the port num to a value from 1-65535. At this configuration point, the
following sub-options are available:
page 105
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Usage Configure the session-aging template for TCP, UDP, and ICMP protocols.
2) ACOS will use the port-based idle-timeout (configured within the session-
aging template) if there is no rule level idle-timeout value configured.
3) ACOS will use the protocol-based idle-timeout value from the firewall
session-aging template if there is no rule-level timeout and no port-based
idle-timeout.
4) ACOS will use the system default idle-timeout value there is no timeout
configured at the rule level, nor at the port or protocol level within the firewall
session-aging template.
Note: All ALG data sessions will inherit the idle-timeout values from the
control session, even if the port being used has an idle-timeout value
configured in the firewall session-aging template.
page 106
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw tcp-window-check
Description Enable or disable firewall TCP window check.
Parameter Description
enable This option enables the TCP window check function, mean-
ing packets outside the advertised window will be dropped.
(default)
disable This option disables the TCP window check function.
sampling-enable This option enables baselining and rate calculation for
{all | outside- counters. Specify one of these options:
window}
• all – applies to all packets
Usage TCP window checks enforce that TCP packets are within the advertised win-
dow (for traffic in both directions) by tracking the sequence and acknowledg-
ment numbers. Packets outside the advertised window are dropped.
Example The following example shows how to enable the tcp-window-check option
with baselining and rate calculation enabled for packets that were outside of
the advertised TCP window:
page 107
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw template logging
Description Configure a firewall logging template.
Replace temp-name with the name of the logging template, 1-63 characters.
page 108
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
This command changes the CLI to the configuration level for the specified
page 109
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
page 110
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
[no] facility options For the FW logging facility, specify one of the following options:
• security-authorization
(4: Sec/authorization)
• security-authorization-private
(10: Private security/authorization)
page 111
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
[no] format {ascii | cef} Specify the firewall logging format:
page 112
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
[no] resolution {seconds | Specifies the precision of the timestamps in log messages.
10-milliseconds}
• Seconds – Log message timestamps are precise to within one whole
second. (default)
• dest-port – Log only HTTP requests sent to specified dest port (Default:
none)
• 0 (emergency)
• 1 (alert)
• 2 (critical)
• 3 (error)
• 4 (warning)
• 5 (notification)
• 6 (information)
• 7 (debugging) (default)
[no] source-address {ipv Specify the source address of logging packet.
ipv4-add | ipv6 ipv6-add}
page 113
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Usage See “Firewall Logging” on page 39 for more information on configuring a log-
ging template.
Example The following example shows how to configure a firewall logging template
called “n1” with service-group “sg1”:
fw urpf
Description This command is used to enable Unicast Reverse Path Forwarding (URPF).
Parameter Description
disabled This option disables URPF (Default)
strict ACOS will create a session only if the reverse
route to the IPv4 or IPv6 source address fol-
lows the same interface upon which the
packet was received.
loose ACOS will create a session if there is a reverse
route to the IPv4 or IPv6 source address.
Example The following example shows how to configure strict URPF checks:
page 114
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
fw vrid
Description Configure a VRID group number for VRRP-A redundancy.
Parameter Description
[no] vrid vrid- Allow this ACOS device to join a VRRP-A group id.
group
vrid-group
The vrid-group can be a number ranging from 1-31.
Default No default
Usage For more information about adding the firewall to a group of ACOS devices
set up for VRRP-A redundancy, see Configuring VRRP-A High Availability.
Example The following example shows how to add this firewall to vrid-group 3:
ACOS(config)# fw vrid 3
ACOS(config)#
page 115
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
[no] {iua | m2ua Specify one of the following payload protocols:
| m3ua | sua |
m2pa | h.323 | • iua – IUA
protocol-ID}
• m2ua – M2UA
• m3ua – M3UA
• sua – SUA
• m2pa – M2PA
• h.323 – H.323
Default No default
Parameter Description
destination Configure SCTP destination rate-limiting.
source Configure SCTP source rate-limiting.
ip-addr Enter the IPv4 address.
num Enter the rate limit in packets per second. The value can
range from 1-2147483647.
Default No default
page 116
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
rule-set
Description Configure a data center firewall rule-set.
Parameter Description
rule-set Create a new DC firewall rule-set.
name
To make a firewall rule-set active, see “fw active-rule-set” on
page 91.
Usage Only one rule-set can be active at a time, although ACOS supports the config-
uration of multiple passive rule-sets.
Example The following example shows creation of the rule-set called “new-DCfirewall-
ruleset1”:
page 117
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
zone
Description Configure a security zone.
After using this command to create a new zone, the following commands
are available:
Parameter Description
[no] zone Create a new zone.
name
[no] inter- The the following interface options are available:
face option
• ethernet port-num – The configured interface is a virtual
or physical Ethernet port with port-num ID. The port ID
takes a range of values that depends of the platform ACOS
is running on.
page 118
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
[no] local- Prior to ACOS 4.1.1, configuring a rule with a destination IP
type address which is that of the ACOS device (such as a VIP),
required the destination zone to be zone type any.
If the destination is the ACOS device itself, then the packet was
not forwarded out the device and the resulting route lookup was
empty.
However, in ACOS 4.1.1 and later, you can send traffic to the
ACOS device itself by configuring the local-type command as
the destination zone criteria.
Details:
• When configuring a local zone as the destination zone crite-
ria, the destination IP address must be the IP address of the
ACOS device.
Usage A firewall zone acts can contain multiple interfaces, IP addresses, and sub-
nets. It offers a more convenient way to bind and manage many interfaces
under a firewall rule simultaneously.
NOTE: Do not create a zone with the name “any” or you will not be able to
later delete it. This limitation exists because ACOS auto-creates an invisible
zone called “any” (for internal purposes). This system-created zone will not
appear in the output of the “show running” CLI command. However, if you
manually create a zone called “any”, then the zone will be visible in the
output, but because it has the same name as the system-generated zone,
you will be unable to delete it.
page 119
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• remark
• rule
• sampling-enable
• session-statistic
page 120
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
remark
Description Configure notes for this rule-set.
Parameter Description
notes Enter notes or remarks for this rule set. Notes can range from 1-
255 characters.
page 121
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
rule
Description Configure a rule within a rule-set and change the position of that rule within
the rule-set.
Parameter Description
name Enter the name of the rule. This can range from 1-63 characters.
insert-rule Add a rule to a rule-set in a designated position:
You can insert a rule into one of the following specific positions:
• top – inserts the rule at the top position within the rule-set.
Usage The normal form of this command creates a new rule or edits an existing
rule within a rule-set. The no form of this command removes an existing rule.
This command changes the CLI to the configuration level for the rule, where
page 122
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Note: In release 4.1.1 and later, ACOS supports the ability to configure multiple
SRC/DST hosts, subnets, objects, object-groups, and services within a single
rule. However, only one source/destination zone can be configured per rule.
[no] idle-timeout num Enter num for the TCP/UDP idle-timeout. This value can range from 1-2097151
seconds.
In release 4.1.1 and later, ACOS offers the ability to configure idle-timeouts at the
rule level, and also at the per-port level (for TCP/UDP protocols under the fire-
wall session-aging template).
This enhancement may be helpful for long-lived protocols used for backups or
data replication, and it may help meet the needs of customers who require the
ability to configure different TCP/UDP ports with different timeout values, or
who need to be able to configure idle-timeout values under individual rules
within a rule-set.
Port-based timeouts and rule-based idle-timeouts are only available for TCP and
UDP, and can only be configured for destination ports.
page 123
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• before target-rule – moves the rule before a designated rule in the rule-set.
• after target-rule – moves the rule after a designated rule in the rule-set.
• bottom – moves the rule to the bottom position in the rule-set.
[no] remark comment Enter a comment or remark about this rule. Can be 1-255 characters.
[no] sampling-enable Enable baselining. Options are:
{all | hit-count}
• all – All
page 124
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• tcp – TCP. Specify dst or src and then specify the following sub-options:
• udp – UDP. Specify dst or src and then specify the following sub-options:
Example The following example shows how to configure a rule-set “rs1” and with the
rule called “new-rule” at the top of the list:
page 125
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
sampling-enable
Description Enable sampling for the specified rule-set.
NOTE: See “Enabling Baselining and Rate Calculation” in the Command Line Ref-
erence for more information.
session-statistic
Description Enable or disable session-based statistics for the specified rule-set.
Parameter Description
enable Enable session-based statistics for this rule-set.
disable Disable session-based statistics for this rule-set.
Example The following example shows how to enable session-based statistics for the
rule-set, “r1”:
ACOS(config)# rule-set r1
ACOS(config-rule set:r1)# session-statistic enable
page 126
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• show fw full-cone-sessions
• show fw resource-usage
• show fw server
• show fw status
• show fw system-status
• show rule-set
• clear fw full-cone-sessions
page 127
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
show fw full-cone-sessions
Description View Firewall Full Cone session information.
Mode All
Usage Use this command to display full-cone sessions created for hairpinning in
the firewall.
Example The following example shows sample output for the show fw full-cone-
sessions command:
Mode All
Example The following example shows sample output for the show fw radius server
config command:
page 128
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Example The following example shows sample output for the show fw radius server
statistics command:
page 129
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
brief Shows the statistics only.
imei string Shows information associated with the IMEI.
imsi string Shows information associated with the IMSI.
inside-ip {inside-ip-addr | Shows information associated with the inside IP address.
inside-ipv6-addr}
msisdn Shows information associated with the MSISDN.
attr-name Show information associated with the customized attribute.
Mode All
Example The following command shows sample output for the show fw radius table
command:
page 130
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
show fw resource-usage
Description Displays current resource usage and maximum resource limits.
Mode All
Example The following example shows sample output for the show fw resource-
usage command:
NOTE: The helper-sessions parameter shows how many helper SMP sessions
are created and the maximum limit of the SMP sessions that could be
possible.
show fw server
Description View Firewall real server information.
Syntax show fw server server-name
Mode All
Example The following example shows sample output for the show fw server com-
mand:
page 131
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
show fw status
Description View Firewall rule compilation status.
Parameter Description
internal For use by A10 Networks Technical Support.
Mode All
Example The following example shows sample output for the show fw status com-
mand:
Field Description
Current Active Name of the currently active rule-set.
Rule-set
Previous Suc- Timestamp for the last successful compilation of this rule-set,
cessful Com- for example, the previous time the rules in the rule-set were
pilation rearranged.
Attempt
Previous Suc- Time required for the rule-set compilation to complete.
cessful Com-
pilation
Duration
Most Recent Timestamp (date and time) when this rule-set compilation was
Compilation attempted.
Attempt
Most Recent Status of most recent rule-set compilation:
Compilation
Status • In Progress
• Success
• Failed
page 132
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
show fw system-status
Description View the Firewall system status information for CPU usage, memory usage,
sessions used, and RADIUS table metrics.
Mode All
Example The following example shows sample output for the show fw system-status
command:
AX5100#show fw system-status
CPU Usage:
----------
Control CPU 1 : 15%
Data CPU 1 : 0%
Data CPU 2 : 0%
Data CPU 3 : 0%
Data CPU 4 : 0%
Data CPU 5 : 0%
Data CPU 6 : 0%
Data CPU 7 : 0%
Data CPU 8 : 0%
Data CPU 9 : 0%
Data CPU 10 : 0%
Data CPU 11 : 0%
Data CPU 12 : 0%
Data CPU 13 : 0%
Data CPU 14 : 0%
Data CPU 15 : 0%
Data CPU avg : 0%
Memory Status:
--------------
Total Memory(KB): 24674588
Used Memory(KB) : 16727080
Free Memory(KB) : 7947508
Memory Usage : 67.7%
Sessions Status:
----------------
Data Sessions Used: 0
Data Sessions Free: 67010545
SMP Sessions Used : 0
SMP Sessions Free : 66519040
page 133
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
show rule-set
Description View DC Firewall information for a rule-set.
Parameter Description
rules-by- View statistics for a rule-set based on zone. all traffic-maps, or
zone view a traffic-map for a specific service name.
from zone- Name of the zone from which traffic is coming.
name
to zone-name Name of the zone to which traffic is going.
Mode All
Example The following example shows sample output for the show rule-set com-
mand:
page 134
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Field Description
Rule-Set- Name of the rule-set for which statistics are shown.
Name
Rule-Set-Sta- Status (active or inactive) for the rule-set.
tus
Unmatched- Unmatched-drops is the number of times a request did not
Drops match any of the criteria and was implicitly denied.
Action-Permit Number of requests that the firewall rule permitted.
Action-Deny Number of requests that the firewall rule denied.
Action-Reset Number of TCP requests that were reset by the firewall rule.
Rule-Name Name of the rule within the rule-set.
Hit-Count Number of requests that hit this rule.
Action Action associated with this rule.
Rule-Status Status of the rule (enabled or disabled).
clear fw full-cone-sessions
Description Clears Firewall full-cone session information.
Mode All
Mode All
page 135
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
Parameter Description
imei string Clears information associated with the IMEI.
imsi string Clears information associated with the IMSI.
inside-ip {inside-ip-addr | Clears information associated with the inside IP address.
inside-ipv6-addr}
msisdn Clears information associated with the MSISDN.
attr-name Clears information associated with the customized attribute.
Mode All
Parameter Description
ipv4 This is an optional parameter that allows you to clear only the
IPv4 SMP helper sessions.
ipv6 This is an optional parameter that allows you to clear only the
IPv6 SMP helper sessions.
Mode All
Usage If neither the ipv4 or ipv6 options are specified, then both IPv4 and IPv6 will
be cleared.
Example The following example clears the IPv4 SMP helper sessions:
page 136
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• Enable “debug fw” and search the output for DENY or UNMATCHED DENY, as shown in the sam-
ples below:
@134537 [DCFW] TCP 2.2.2.1:56275->3.3.3.1:80 fw_policy_action_fast_path policy match my-
rule-set rule-port80-drop rule ID=1 action=DENY
• For traffic on non-default ALG ports, check to see if the ALG flag has been configured for that
rule. For example:
service tcp src eq 2121 dst eq 2121 alg FTP
• For TCP, check if the session still exists, using the “show sessions” command.
TCP sessions may get deleted because of “force-delete-timeout” configuration in the firewall ses-
sion aging-template.
page 137
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• Enable “debug fw” and check for any logs indicating that the drops were due to firewall TCP win-
dow checks. For example:
“DROP REV nseq=453D86F, wsize=7D78, plen=1B, seq=434A97D”
action permit
ip-version v6
page 138
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• Use the fw apply-changes command to make rule-set changes take effect immediately.
• Use the clear sessions command to clear out any existing sessions.
• Use the show fw status command to check for rule-set compilation status.
• Check the rule-set configuration to see if the rule is disabled, and make sure that rule-set is
active.
• Use the show fw status internal command to check for internal rule-set compilation status.
• Check if internal rules are installed using the “devcall dump_fw_rules(0, 1)”. For example:
Total rules 2
Rule vrrpa_ipv4_hello_mcast idx 0 id 1 permit udp (proto-id 17) dst 224.0.0.210 /32
src_port 65244 - 65244 dst_port 65244 - 65244 hits 0
page 139
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
• If clients and servers are in same subnet and the firewall is switching packets (as opposed to
routing), ALG data sessions will not be created.
• Ensure that the action under a rule has the “log” keyword.
• Ensure that the syslog server is reachable through the data ports.
• Firewall CLI commands are rejected with an error: “Periodic compilation in progress, please try
after some time.”
• When rule-set compilation is in progress in a given partition, any further firewall CLI commands
that change rules are blocked.
• Wait for the rule-set compilation to finish. Then, check the output of show log for the following
message:
[Firewall]:Rule-set “my-rule-set" in partition "shared" successfully compiled at
2016-05-17 20:59:17.
page 140
ACOS 4.1.1-P11 Data Center and Gi/SGi Firewall Configuration Guide
page 141
CONTACT US
1 a10networks.com/contact
ACOS 4.1.1-P11 DATA CENTER AND GI/SGI FIREWALL CONFIGURATION GUIDE 29 MAY 2019