
FireBrick NULL User Manual
vi
7.2. Routing targets .......................................................................................................... 41
7.2.1. Subnet routes .................................................................................................. 41
7.2.2. Routing to an IP address (gateway route) ............................................................. 41
7.2.3. Special targets ................................................................................................ 42
7.3. Dynamic route creation / deletion ................................................................................. 42
7.4. Routing tables ........................................................................................................... 42
7.5. Bonding ................................................................................................................... 42
8. Profiles ............................................................................................................................... 44
8.1. Overview .................................................................................................................. 44
8.2. Creating/editing profiles .............................................................................................. 44
8.2.1. Timing control ................................................................................................ 44
8.2.2. Tests ............................................................................................................. 45
8.2.2.1. General tests ........................................................................................ 45
8.2.2.2. Time/date tests ..................................................................................... 45
8.2.2.3. Ping tests ............................................................................................. 45
8.2.3. Inverting overall test result ................................................................................ 45
8.2.4. Manual override .............................................................................................. 45
9. Traffic Shaping .................................................................................................................... 47
9.1. Graphs and Shapers ................................................................................................... 47
9.1.1. Graphs ........................................................................................................... 47
9.1.2. Shapers .......................................................................................................... 48
9.1.3. Ad hoc shapers ............................................................................................... 48
9.1.4. Long term shapers ........................................................................................... 48
9.2. Multiple shapers ........................................................................................................ 48
9.3. Basic principles ......................................................................................................... 49
10. System Services ................................................................................................................. 50
10.1. Protecting the FB2700 .............................................................................................. 50
10.2. Common settings ..................................................................................................... 50
10.3. HTTP Server configuration ........................................................................................ 51
10.3.1. Access control ............................................................................................... 51
10.3.1.1. Trusted addresses ................................................................................ 51
10.4. Telnet Server configuration ........................................................................................ 51
10.4.1. Access control ............................................................................................... 52
10.5. DNS configuration ................................................................................................... 52
10.5.1. Blocking DNS names ..................................................................................... 52
10.5.2. Local DNS responses ..................................................................................... 52
10.5.3. Auto DHCP DNS .......................................................................................... 52
10.6. NTP configuration .................................................................................................... 53
10.7. SNMP configuration ................................................................................................. 53
11. Network Diagnostic Tools .................................................................................................... 54
11.1. Access check ........................................................................................................... 54
11.2. Packet Dumping ...................................................................................................... 55
11.2.1. Dump parameters ........................................................................................... 55
11.2.2. Security settings required ................................................................................ 56
11.2.3. IP address matching ....................................................................................... 56
11.2.4. Packet types .................................................................................................. 56
11.2.5. Snaplen specification ...................................................................................... 56
11.2.6. Using the web interface .................................................................................. 57
11.2.7. Using an HTTP client .................................................................................... 57
11.2.7.1. Example using curl and tcpdump ........................................................... 57
12. VRRP ............................................................................................................................... 58
12.1. Virtual Routers ........................................................................................................ 58
12.2. Configuring VRRP ................................................................................................... 59
12.2.1. Advertisement Interval .................................................................................... 59
12.2.2. Priority ........................................................................................................ 59
12.3. Using a virtual router ................................................................................................ 59