FireBrick FB2700 User manual

FireBrick FB2700
User Manual
FB2700 Versatile Network Appliance


FireBrick FB2700 User Manual
This User Manual documents Software version V1.44.000
Copyright © 2012-2015 FireBrick Ltd.

iv
Table of Contents
Preface .................................................................................................................................. xxi
1. Introduction .......................................................................................................................... 1
1.1. The FB2700 ............................................................................................................... 1
1.1.1. Where do I start? .............................................................................................. 1
1.1.2. What can it do? ................................................................................................ 1
1.1.3. Ethernet port capabilities .................................................................................... 2
1.1.4. Differences between the devices in the FB2x00 series .............................................. 2
1.1.5. Software features .............................................................................................. 2
1.1.6. Migration from previous FireBrick models ............................................................ 2
1.2. About this Manual ....................................................................................................... 3
1.2.1. Version ........................................................................................................... 3
1.2.2. Intended audience ............................................................................................. 3
1.2.3. Technical details ............................................................................................... 3
1.2.4. Document style ................................................................................................. 3
1.2.5. Document conventions ....................................................................................... 4
1.2.6. Comments and feedback .................................................................................... 4
1.3. Additional Resources ................................................................................................... 4
1.3.1. Technical Support ............................................................................................. 4
1.3.2. IRC Channel .................................................................................................... 5
1.3.3. Application Notes ............................................................................................. 5
1.3.4. White Papers .................................................................................................... 5
1.3.5. Training Courses ............................................................................................... 5
2. Getting Started ...................................................................................................................... 6
2.1. IP addressing .............................................................................................................. 6
2.2. Accessing the web-based user interface ........................................................................... 6
2.2.1. Add a new user ................................................................................................ 7
3. Configuration ........................................................................................................................ 9
3.1. The Object Hierarchy ................................................................................................... 9
3.2. The Object Model ....................................................................................................... 9
3.2.1. Formal definition of the object model ................................................................. 10
3.2.2. Common attributes .......................................................................................... 10
3.3. Configuration Methods ............................................................................................... 10
3.4. Web User Interface Overview ...................................................................................... 10
3.4.1. User Interface layout ........................................................................................ 11
3.4.1.1. Customising the layout .......................................................................... 11
3.4.2. Config pages and the object hierarchy ................................................................. 12
3.4.2.1. Configuration categories ......................................................................... 12
3.4.2.2. Object settings ...................................................................................... 13
3.4.3. Navigating around the User Interface .................................................................. 15
3.4.4. Backing up / restoring the configuration .............................................................. 16
3.5. Configuration using XML ........................................................................................... 16
3.5.1. Introduction to XML ........................................................................................ 16
3.5.2. The root element - <config> ............................................................................. 17
3.5.3. Viewing or editing XML .................................................................................. 17
3.5.4. Example XML configuration ............................................................................. 17
3.6. Downloading/Uploading the configuration ...................................................................... 19
3.6.1. Download ...................................................................................................... 19
3.6.2. Upload .......................................................................................................... 20
4. System Administration .......................................................................................................... 21
4.1. User Management ...................................................................................................... 21
4.1.1. Login level ..................................................................................................... 21
4.1.2. Configuration access level ................................................................................ 22
4.1.3. Login idle timeout ........................................................................................... 22
4.1.4. Restricting user logins ...................................................................................... 22

FireBrick FB2700 User Manual
v
4.1.4.1. Restrict by IP address ............................................................................ 22
4.1.4.2. Logged in IP address ............................................................................. 23
4.1.4.3. Restrict by profile ................................................................................. 23
4.1.5. Password change ............................................................................................. 23
4.1.6. One Time Password (OTP) ............................................................................... 23
4.2. General System settings .............................................................................................. 24
4.2.1. System name (hostname) .................................................................................. 24
4.2.2. Administrative details ...................................................................................... 24
4.2.3. System-level event logging control ..................................................................... 24
4.2.4. Home page web links ...................................................................................... 24
4.2.5. Password hashing ............................................................................................ 25
4.2.6. OTP seed hashing ........................................................................................... 25
4.3. Software Upgrades ..................................................................................................... 26
4.3.1. Software release types ...................................................................................... 26
4.3.1.1. Breakpoint releases ............................................................................... 26
4.3.2. Identifying current software version .................................................................... 27
4.3.3. Internet-based upgrade process .......................................................................... 27
4.3.3.1. Manually initiating upgrades ................................................................... 27
4.3.3.2. Controlling automatic software updates ..................................................... 28
4.3.4. Manual upgrade .............................................................................................. 28
4.4. Boot Process ............................................................................................................. 29
4.4.1. LED indications .............................................................................................. 29
4.4.1.1. Power LED status indications ................................................................. 29
4.4.1.2. Port LEDs ........................................................................................... 29
5. Event Logging ..................................................................................................................... 30
5.1. Overview .................................................................................................................. 30
5.1.1. Log targets ..................................................................................................... 30
5.1.1.1. Logging to Flash memory ...................................................................... 30
5.1.1.2. Logging to the Console .......................................................................... 31
5.2. Enabling logging ....................................................................................................... 31
5.3. Logging to external destinations ................................................................................... 31
5.3.1. Syslog ........................................................................................................... 31
5.3.2. Email ............................................................................................................ 32
5.3.2.1. E-mail process logging .......................................................................... 33
5.4. Factory reset configuration log targets ........................................................................... 33
5.5. Performance .............................................................................................................. 33
5.6. Viewing logs ............................................................................................................. 33
5.6.1. Viewing logs in the User Interface ..................................................................... 33
5.6.2. Viewing logs in the CLI environment ................................................................. 34
5.7. System-event logging ................................................................................................. 34
5.8. Using Profiles ........................................................................................................... 34
6. Interfaces and Subnets .......................................................................................................... 35
6.1. Relationship between Interfaces and Physical Ports .......................................................... 35
6.1.1. Port groups .................................................................................................... 35
6.1.2. Interfaces ....................................................................................................... 35
6.2. Defining port groups .................................................................................................. 36
6.3. Defining an interface .................................................................................................. 36
6.3.1. Defining subnets ............................................................................................. 37
6.3.1.1. Source filtering ..................................................................................... 38
6.3.1.2. Using DHCP to configure a subnet .......................................................... 38
6.3.2. Setting up DHCP server parameters .................................................................... 38
6.3.2.1. Fixed/Static DHCP allocations ................................................................ 39
6.3.2.2. Restricted allocations ............................................................................. 40
6.3.2.3. Special DHCP options ........................................................................... 41
6.3.3. DHCP Relay Agent ......................................................................................... 41
6.4. Physical port settings .................................................................................................. 41

FireBrick FB2700 User Manual
vi
6.4.1. Disabling auto-negotiation ................................................................................ 42
6.4.2. Setting port speed ............................................................................................ 42
6.4.3. Setting duplex mode ........................................................................................ 42
6.4.4. Defining port LED functions ............................................................................. 42
7. Session Handling ................................................................................................................. 44
7.1. Routing vs. Firewalling ............................................................................................... 44
7.2. Session Tracking ....................................................................................................... 44
7.2.1. Session termination .......................................................................................... 45
7.3. Session Rules ............................................................................................................ 45
7.3.1. Overview ....................................................................................................... 45
7.3.2. Processing flow ............................................................................................... 46
7.3.3. Defining Rule-Sets and Rules ............................................................................ 49
7.3.3.1. Recommended method of implementing firewalling .................................... 50
7.3.3.2. Changes to session traffic ....................................................................... 51
7.3.3.3. Graphing and traffic shaping ................................................................... 52
7.3.3.4. Configuring session time-outs ................................................................. 52
7.3.3.5. Load balancing ..................................................................................... 52
7.4. Network Address Translation ....................................................................................... 53
7.4.1. When to use NAT ........................................................................................... 53
7.4.2. NAT ALGs .................................................................................................... 53
7.4.3. Setting NAT in rules ........................................................................................ 54
7.4.4. What NAT does .............................................................................................. 54
7.4.5. NAT with PPPoE ............................................................................................ 54
7.4.6. NAT with Dongles .......................................................................................... 55
7.4.7. NAT with other types of external routing ............................................................ 55
7.4.8. Mixing NAT and non NAT ............................................................................... 55
7.4.9. Carrier grade NAT .......................................................................................... 55
7.4.10. Using NAT setting on subnets ......................................................................... 56
8. Routing .............................................................................................................................. 57
8.1. Routing logic ............................................................................................................ 57
8.2. Routing targets .......................................................................................................... 58
8.2.1. Subnet routes .................................................................................................. 58
8.2.2. Routing to an IP address (gateway route) ............................................................. 58
8.2.3. Special targets ................................................................................................ 59
8.3. Dynamic route creation / deletion ................................................................................. 59
8.4. Routing tables ........................................................................................................... 59
8.5. Bonding ................................................................................................................... 59
8.6. Route overrides ......................................................................................................... 60
9. Profiles ............................................................................................................................... 61
9.1. Overview .................................................................................................................. 61
9.2. Creating/editing profiles .............................................................................................. 61
9.2.1. Timing control ................................................................................................ 61
9.2.2. Tests ............................................................................................................. 62
9.2.2.1. General tests ........................................................................................ 62
9.2.2.2. Time/date tests ..................................................................................... 62
9.2.2.3. Ping tests ............................................................................................. 62
9.2.3. Inverting overall test result ................................................................................ 63
9.2.4. Manual override .............................................................................................. 63
10. Traffic Shaping .................................................................................................................. 64
10.1. Graphs and Shapers .................................................................................................. 64
10.1.1. Graphs ......................................................................................................... 64
10.1.2. Shapers ........................................................................................................ 65
10.1.3. Ad hoc shapers ............................................................................................. 65
10.1.4. Long term shapers ......................................................................................... 65
10.2. Multiple shapers ...................................................................................................... 66
10.3. Basic principles ....................................................................................................... 66

FireBrick FB2700 User Manual
vii
11. PPPoE .............................................................................................................................. 67
11.1. Types of DSL line and router in the United Kingdom ..................................................... 67
11.2. Definining PPPoE links ............................................................................................. 68
11.2.1. IPv6 ............................................................................................................ 68
11.2.2. Additional options ......................................................................................... 68
11.2.2.1. MTU and TCP fix ............................................................................... 68
11.2.2.2. Service and ac-name ............................................................................ 69
11.2.2.3. Logging ............................................................................................. 69
11.2.2.4. Speed and graphs ................................................................................ 69
12. Tunnels ............................................................................................................................. 70
12.1. IPsec (IP Security) ................................................................................................... 70
12.1.1. Introduction .................................................................................................. 70
12.1.1.1. Integrity checking ................................................................................ 70
12.1.1.2. Encryption ......................................................................................... 70
12.1.1.3. Authentication .................................................................................... 71
12.1.1.4. IKE ................................................................................................... 71
12.1.1.5. Manual Keying ................................................................................... 71
12.1.1.6. Identities and the Authentication Mechanism ............................................ 72
12.1.2. Setting up IPsec connections ........................................................................... 72
12.1.2.1. Global IPsec parameters ....................................................................... 72
12.1.2.2. IKE proposals ..................................................................................... 73
12.1.2.3. IKE roaming IP pools .......................................................................... 73
12.1.2.4. IKE connections .................................................................................. 73
12.1.2.4.1. IKE connection mode and type ................................................... 73
12.1.2.4.2. IKE and IPsec proposal lists ....................................................... 73
12.1.2.4.3. Authentication and IKE identities ................................................ 74
12.1.2.4.4. IP addresses ............................................................................. 74
12.1.2.4.5. Road Warrior connections .......................................................... 75
12.1.2.4.6. Routing ................................................................................... 75
12.1.2.4.7. Other parameters ...................................................................... 75
12.1.2.5. Setting up Manual Keying .................................................................... 75
12.1.2.5.1. IP endpoints ............................................................................. 76
12.1.2.5.2. Algorithms and keys ................................................................. 76
12.1.2.5.3. Routing ................................................................................... 76
12.1.2.5.4. Mode ...................................................................................... 76
12.1.2.5.5. Other parameters ...................................................................... 77
12.1.3. Using EAP with IPsec/IKE ............................................................................. 77
12.1.4. Using certificates with IPsec/IKE ..................................................................... 77
12.1.4.1. Creating certificates ............................................................................. 79
12.1.5. Choice of algorithms ...................................................................................... 79
12.1.6. NAT Traversal .............................................................................................. 80
12.1.7. Configuring a Road Warrior server ................................................................... 81
12.1.8. Connecting to non-FireBrick devices ................................................................. 82
12.1.8.1. Using StrongSwan on Linux ................................................................. 82
12.1.8.2. Setting up a Road Warrior VPN on an Android client ................................ 83
12.1.8.3. Setting up a Road Warrior VPN on an iOS (iPhone/iPad) client .................... 84
12.1.8.4. Manual keying using Linux ipsec-tools ................................................... 84
12.2. FB105 tunnels ......................................................................................................... 85
12.2.1. Tunnel wrapper packets .................................................................................. 86
12.2.2. Setting up a tunnel ......................................................................................... 86
12.2.3. Viewing tunnel status ..................................................................................... 87
12.2.4. Dynamic routes ............................................................................................. 87
12.2.5. Tunnel bonding ............................................................................................. 87
12.2.6. Tunnels and NAT .......................................................................................... 87
12.2.6.1. FB2700 doing NAT ............................................................................. 88
12.2.6.2. Another device doing NAT ................................................................... 88

FireBrick FB2700 User Manual
viii
12.3. Ether tunnelling ....................................................................................................... 88
13. USB Port .......................................................................................................................... 90
13.1. USB configuration .................................................................................................... 90
13.1.1. 3G dongle configuration ................................................................................. 90
14. System Services ................................................................................................................. 91
14.1. Protecting the FB2700 .............................................................................................. 91
14.2. Common settings ..................................................................................................... 91
14.3. HTTP Server configuration ........................................................................................ 92
14.3.1. Access control ............................................................................................... 92
14.3.1.1. Trusted addresses ................................................................................ 92
14.4. Telnet Server configuration ........................................................................................ 93
14.4.1. Access control ............................................................................................... 93
14.5. DNS configuration ................................................................................................... 93
14.5.1. Blocking DNS names ..................................................................................... 93
14.5.2. Local DNS responses ..................................................................................... 93
14.5.3. Auto DHCP DNS .......................................................................................... 94
14.6. NTP configuration .................................................................................................... 94
14.7. SNMP configuration ................................................................................................. 94
14.8. RADIUS configuration .............................................................................................. 94
14.8.1. RADIUS server (platform RADIUS) ................................................................. 94
14.8.2. RADIUS client .............................................................................................. 94
14.8.2.1. RADIUS client settings ........................................................................ 95
14.8.2.2. Server blacklisting ............................................................................... 95
15. Network Diagnostic Tools .................................................................................................... 96
15.1. Firewalling check ..................................................................................................... 96
15.2. Access check ........................................................................................................... 97
15.3. Packet Dumping ...................................................................................................... 97
15.3.1. Dump parameters ........................................................................................... 98
15.3.2. Security settings required ................................................................................ 98
15.3.3. IP address matching ....................................................................................... 99
15.3.4. Packet types .................................................................................................. 99
15.3.5. Snaplen specification ...................................................................................... 99
15.3.6. Using the web interface .................................................................................. 99
15.3.7. Using an HTTP client ................................................................................... 100
15.3.7.1. Example using curl and tcpdump .......................................................... 100
16. VRRP ............................................................................................................................. 101
16.1. Virtual Routers ...................................................................................................... 101
16.2. Configuring VRRP ................................................................................................. 102
16.2.1. Advertisement Interval .................................................................................. 102
16.2.2. Priority ....................................................................................................... 102
16.3. Using a virtual router .............................................................................................. 102
16.4. VRRP versions ...................................................................................................... 102
16.4.1. VRRP version 2 .......................................................................................... 102
16.4.2. VRRP version 3 .......................................................................................... 103
16.5. Compatibility ......................................................................................................... 103
17. VoIP ............................................................................................................................... 104
17.1. What is VoIP? ....................................................................................................... 104
17.2. Registration and Proxies .......................................................................................... 104
17.2.1. Registrar ..................................................................................................... 104
17.2.2. Proxy ......................................................................................................... 104
17.3. Home/office phone system ....................................................................................... 105
17.4. Network Address Translation .................................................................................... 105
17.5. Number plan .......................................................................................................... 106
17.6. Telephone handsets ................................................................................................. 106
17.7. VoIP call carriers ................................................................................................... 107
17.8. Hunt groups ........................................................................................................... 108

FireBrick FB2700 User Manual
ix
17.8.1. Ring Type .................................................................................................. 108
17.8.2. Ring order .................................................................................................. 109
17.8.3. Overflow .................................................................................................... 109
17.8.4. Out of hours ............................................................................................... 109
17.9. Call pickup/steal ..................................................................................................... 109
17.10. Busy lamp field .................................................................................................... 110
17.11. Using RADIUS .................................................................................................... 110
17.11.1. RADIUS accounting ................................................................................... 110
17.11.2. RADIUS authentication ............................................................................... 110
17.11.2.1. Call routing by RADIUS ................................................................... 111
17.12. Call recording ...................................................................................................... 112
17.13. Voicemail and IVR services ................................................................................... 113
17.14. Call Data Records ................................................................................................. 113
17.15. Technical details ................................................................................................... 114
17.16. Custom tones ....................................................................................................... 114
18. BGP ............................................................................................................................... 116
18.1. What is BGP? ........................................................................................................ 116
18.2. BGP Setup ............................................................................................................ 116
18.2.1. Overview .................................................................................................... 116
18.2.2. Standards .................................................................................................... 116
18.2.3. Simple example setup ................................................................................... 117
18.2.4. Peer type .................................................................................................... 117
18.2.5. Route filtering ............................................................................................. 118
18.2.5.1. Matching attributes ............................................................................ 118
18.2.5.2. Action attributes ................................................................................ 118
18.2.6. Well known community tags .......................................................................... 119
18.2.7. Announcing black hole routes ........................................................................ 119
18.2.8. Announcing dead end routes .......................................................................... 120
18.2.9. Bad optional path attributes ........................................................................... 120
18.2.10. <network> element ..................................................................................... 120
18.2.11. <route>, <subnet> and other elements ............................................................ 120
18.2.12. Route feasibility testing ............................................................................... 120
18.2.13. Diagnostics ................................................................................................ 121
18.2.14. Router shutdown ........................................................................................ 121
18.2.15. TTL security ............................................................................................. 121
19. OSPF .............................................................................................................................. 122
19.1. What is OSPF? ...................................................................................................... 122
19.2. OSPF Setup ........................................................................................................... 122
19.2.1. Overview .................................................................................................... 122
19.2.2. Standards .................................................................................................... 122
19.2.3. Simple example setup ................................................................................... 123
19.2.4. <ospf> configelement ................................................................................... 123
20. Internet Service Providers ................................................................................................... 124
20.1. Background ........................................................................................................... 124
20.1.1. How it all began .......................................................................................... 124
20.1.2. Point to Point Protocol .................................................................................. 124
20.1.3. L2TP ......................................................................................................... 124
20.1.4. Broadband .................................................................................................. 125
20.1.5. RADIUS ..................................................................................................... 125
20.1.6. BGP .......................................................................................................... 125
20.2. Incoming L2TP connections ..................................................................................... 125
20.3. The importance of CQM graphs ................................................................................ 126
20.4. Authentication ........................................................................................................ 126
20.5. Accounting ............................................................................................................ 127
20.6. RADIUS Control messages ...................................................................................... 127
20.7. PPPoE .................................................................................................................. 127

FireBrick FB2700 User Manual
x
20.8. Typical configuration .............................................................................................. 127
20.8.1. Interlink subnet ............................................................................................ 127
20.8.2. BGP with carrier .......................................................................................... 128
20.8.3. RADIUS session steering .............................................................................. 128
20.8.4. L2TP endpoints ........................................................................................... 129
20.8.5. ISP RADIUS ............................................................................................... 129
21. Command Line Interface .................................................................................................... 130
A. Factory Reset Procedure ...................................................................................................... 131
B. CIDR and CIDR Notation ................................................................................................... 133
C. MAC Addresses usage ........................................................................................................ 135
C.1. Multiple MAC addresses? ......................................................................................... 135
C.2. How the FireBrick allocates MAC addresses ................................................................ 136
C.2.1. Interface ...................................................................................................... 136
C.2.2. Subnet ......................................................................................................... 136
C.2.3. PPPoE ......................................................................................................... 136
C.2.4. Base MAC ................................................................................................... 136
C.2.5. Running out of MACs ................................................................................... 137
C.3. MAC address on label .............................................................................................. 137
C.4. Using with a DHCP server ........................................................................................ 138
D. VLANs : A primer ............................................................................................................. 139
E. Supported L2TP Attribute/Value Pairs ................................................................................... 140
E.1. Start-Control-Connection-Request ............................................................................... 140
E.2. Start-Control-Connection-Reply .................................................................................. 140
E.3. Start-Control-Connection-Connected ........................................................................... 141
E.4. Stop-Control-Connection-Notification .......................................................................... 141
E.5. Hello ..................................................................................................................... 141
E.6. Incoming-Call-Request ............................................................................................. 141
E.7. Incoming-Call-Reply ................................................................................................ 142
E.8. Incoming-Call-Connected .......................................................................................... 142
E.9. Outgoing-Call-Request .............................................................................................. 142
E.10. Outgoing-Call-Reply ............................................................................................... 143
E.11. Outgoing-Call-Connected ........................................................................................ 143
E.12. Call-Disconnect-Notify ............................................................................................ 143
E.13. WAN-Error-Notify ................................................................................................. 143
E.14. Set-Link-Info ......................................................................................................... 143
E.15. Notes ................................................................................................................... 144
E.15.1. BT specific notes ......................................................................................... 144
E.15.2. IP over LCP ............................................................................................... 144
F. Supported RADIUS Attribute/Value Pairs for L2TP operation .................................................... 145
F.1. Authentication request .............................................................................................. 145
F.2. Authentication response ............................................................................................ 146
F.2.1. Accepted authentication .................................................................................. 146
F.2.1.1. Prefix Delegation ................................................................................ 147
F.2.2. Rejected authentication ................................................................................... 148
F.3. Accounting Start ...................................................................................................... 148
F.4. Accounting Interim .................................................................................................. 149
F.5. Accounting Stop ...................................................................................................... 150
F.6. Disconnect .............................................................................................................. 150
F.7. Change of Authorisation ........................................................................................... 150
F.8. Filter ID ................................................................................................................. 151
F.9. Notes ..................................................................................................................... 152
F.9.1. L2TP relay ................................................................................................... 152
F.9.2. LCP echo and CQM graphs ............................................................................ 153
F.9.3. IP over LCP ................................................................................................. 153
F.9.4. Closed User Group ........................................................................................ 153
F.9.5. Routing table ................................................................................................ 153

FireBrick FB2700 User Manual
xi
G. Supported RADIUS Attribute/Value Pairs for VoIP operation .................................................... 154
G.1. Authentication request .............................................................................................. 154
G.2. Authentication response ............................................................................................ 155
G.2.1. Challenge authentication ................................................................................ 155
G.2.2. Accepted authentication (registration) ............................................................... 155
G.2.3. Accepted authentication (invite) ....................................................................... 155
G.2.4. Rejected authentication .................................................................................. 156
G.3. Accounting Start ..................................................................................................... 156
G.4. Accounting Interim .................................................................................................. 156
G.5. Accounting Stop ...................................................................................................... 157
G.6. Disconnect ............................................................................................................. 157
G.7. Change of Authorisation ........................................................................................... 158
H. FireBrick specific SNMP objects .......................................................................................... 159
H.1. BGP information ..................................................................................................... 159
H.2. L2TP information .................................................................................................... 159
H.3. Monitoring information ............................................................................................ 160
I. Command line reference ....................................................................................................... 161
I.1. General commands .................................................................................................... 161
I.1.1. Trace off ...................................................................................................... 161
I.1.2. Trace on ....................................................................................................... 161
I.1.3. Uptime ......................................................................................................... 161
I.1.4. General status ................................................................................................ 161
I.1.5. Memory usage ............................................................................................... 161
I.1.6. Process/task usage .......................................................................................... 161
I.1.7. Login ........................................................................................................... 161
I.1.8. Logout ......................................................................................................... 162
I.1.9. See XML configuration ................................................................................... 162
I.1.10. Load XML configuration ............................................................................... 162
I.1.11. Show profile status ....................................................................................... 162
I.1.12. Enable profile control switch .......................................................................... 162
I.1.13. Disable profile control switch ......................................................................... 162
I.1.14. Show RADIUS servers .................................................................................. 162
I.1.15. Show DNS resolvers ..................................................................................... 162
I.2. Networking commands .............................................................................................. 163
I.2.1. Subnets ......................................................................................................... 163
I.2.2. Ping and trace ............................................................................................... 163
I.2.3. Show a route from the routing table .................................................................. 163
I.2.4. List routes ..................................................................................................... 163
I.2.5. List routing next hops ..................................................................................... 163
I.2.6. See DHCP allocations ..................................................................................... 164
I.2.7. Clear DHCP allocations .................................................................................. 164
I.2.8. Lock DHCP allocations ................................................................................... 164
I.2.9. Unlock DHCP allocations ................................................................................ 164
I.2.10. Name DHCP allocations ................................................................................ 164
I.2.11. Show ARP/ND status .................................................................................... 164
I.2.12. Show VRRP status ....................................................................................... 164
I.2.13. Send Wake-on-LAN packet ............................................................................ 164
I.3. Firewalling commands ............................................................................................... 165
I.3.1. Check access to services .................................................................................. 165
I.3.2. Check firewall logic ....................................................................................... 165
I.4. USB/dongle commands .............................................................................................. 165
I.4.1. Show dongle connectoons ................................................................................ 165
I.4.2. Reset USB interface and all attached devices ...................................................... 165
I.4.3. Reset PPP/Dongle data connection .................................................................... 165
I.5. L2TP commands ...................................................................................................... 165
I.6. BGP commands ........................................................................................................ 165

FireBrick FB2700 User Manual
xii
I.7. OSPF commands ...................................................................................................... 166
I.8. PPPoE commands ..................................................................................................... 166
I.9. VoIP commands ....................................................................................................... 166
I.10. Dongle/USB commands ........................................................................................... 166
I.11. Advanced commands ............................................................................................... 166
I.11.1. Panic .......................................................................................................... 166
I.11.2. Reboot ........................................................................................................ 166
I.11.3. Screen width ................................................................................................ 166
I.11.4. Make outbound command session ................................................................... 167
I.11.5. Show command sessions ................................................................................ 167
I.11.6. Kill command session ................................................................................... 167
I.11.7. Flash memory list ......................................................................................... 167
I.11.8. Delete block from flash ................................................................................. 167
I.11.9. Boot log ...................................................................................................... 167
I.11.10. Flash log ................................................................................................... 167
J. Constant Quality Monitoring - technical details ........................................................................ 168
J.1. Broadband back-haul providers ................................................................................... 168
J.2. Access to graphs and csvs .......................................................................................... 168
J.2.1. Trusted access ............................................................................................... 168
J.2.2. Dated information .......................................................................................... 169
J.2.3. Authenticated access ....................................................................................... 169
J.3. Graph display options ............................................................................................... 169
J.3.1. Data points ................................................................................................... 169
J.3.2. Additional text ............................................................................................... 170
J.3.3. Other colours and spacing ............................................................................... 170
J.4. Overnight archiving .................................................................................................. 170
J.4.1. Full URL format ............................................................................................ 171
J.4.2. load handling ................................................................................................ 171
J.5. Graph scores ............................................................................................................ 171
J.6. Creating graphs, and graph names ............................................................................... 172
K. Configuration Objects ......................................................................................................... 173
K.1. Top level ............................................................................................................... 173
K.1.1. config: Top level config ................................................................................. 173
K.2. Objects .................................................................................................................. 174
K.2.1. system: System settings .................................................................................. 174
K.2.2. link: Web links ............................................................................................. 175
K.2.3. user: Admin users ......................................................................................... 175
K.2.4. eap: User access controlled by EAP ................................................................. 176
K.2.5. log: Log target controls .................................................................................. 176
K.2.6. log-syslog: Syslog logger settings .................................................................... 177
K.2.7. log-email: Email logger settings ...................................................................... 177
K.2.8. services: System services ............................................................................... 178
K.2.9. snmp-service: SNMP service settings ............................................................... 178
K.2.10. ntp-service: NTP service settings ................................................................... 178
K.2.11. telnet-service: Telnet service settings .............................................................. 179
K.2.12. http-service: HTTP service settings ................................................................. 180
K.2.13. dns-service: DNS service settings ................................................................... 180
K.2.14. dns-host: Fixed local DNS host settings .......................................................... 181
K.2.15. dns-block: Fixed local DNS blocks ................................................................. 181
K.2.16. radius-service: RADIUS service definition ....................................................... 182
K.2.17. radius-service-match: Matching rules for RADIUS service .................................. 183
K.2.18. radius-server: RADIUS server settings ............................................................ 184
K.2.19. ethernet: Physical port controls ...................................................................... 185
K.2.20. sampling: Packet sampling configuration ......................................................... 185
K.2.21. portdef: Port grouping and naming ................................................................. 186
K.2.22. interface: Port-group/VLAN interface settings .................................................. 186

FireBrick FB2700 User Manual
xiii
K.2.23. subnet: Subnet settings ................................................................................. 187
K.2.24. vrrp: VRRP settings ..................................................................................... 188
K.2.25. dhcps: DHCP server settings ......................................................................... 189
K.2.26. dhcp-attr-hex: DHCP server attributes (hex) ..................................................... 190
K.2.27. dhcp-attr-string: DHCP server attributes (string) ............................................... 190
K.2.28. dhcp-attr-number: DHCP server attributes (numeric) .......................................... 191
K.2.29. dhcp-attr-ip: DHCP server attributes (IP) ......................................................... 191
K.2.30. pppoe: PPPoE settings .................................................................................. 191
K.2.31. ppp-route: PPP routes .................................................................................. 192
K.2.32. usb: USB 3G/dongle settings ......................................................................... 193
K.2.33. dongle: 3G/dongle settings ............................................................................ 193
K.2.34. route: Static routes ...................................................................................... 194
K.2.35. network: Locally originated networks ............................................................. 195
K.2.36. blackhole: Dead end networks ....................................................................... 195
K.2.37. loopback: Locally originated networks ............................................................ 196
K.2.38. ospf: Overall OSPF settings .......................................................................... 196
K.2.39. namedbgpmap: Mapping and filtering rules of BGP prefixes ............................... 197
K.2.40. bgprule: Individual mapping/filtering rule ........................................................ 198
K.2.41. bgp: Overall BGP settings ............................................................................ 198
K.2.42. bgppeer: BGP peer definitions ....................................................................... 199
K.2.43. bgpmap: Mapping and filtering rules of BGP prefixes ........................................ 201
K.2.44. cqm: Constant Quality Monitoring settings ...................................................... 201
K.2.45. l2tp: L2TP settings ...................................................................................... 203
K.2.46. l2tp-outgoing: L2TP settings for outgoing L2TP connections ............................... 203
K.2.47. l2tp-incoming: L2TP settings for incoming L2TP connections ............................. 205
K.2.48. l2tp-relay: Relay and local authentication rules for L2TP .................................... 206
K.2.49. fb105: FB105 tunnel definition ...................................................................... 207
K.2.50. fb105-route: FB105 routes ............................................................................ 208
K.2.51. ipsec-ike: IPsec configuration (IKEv2) ............................................................ 209
K.2.52. ike-connection: connection configuration ......................................................... 209
K.2.53. ipsec-route: IPsec tunnel routes ...................................................................... 211
K.2.54. ike-roaming: IKE roaming IP pools ................................................................ 211
K.2.55. ike-proposal: IKE security proposal ................................................................ 212
K.2.56. ipsec-proposal: IPsec AH/ESP proposal ........................................................... 212
K.2.57. ipsec-manual: peer configuration .................................................................... 212
K.2.58. ping: Ping/graph definition ............................................................................ 213
K.2.59. profile: Control profile ................................................................................. 214
K.2.60. profile-date: Test passes if within any of the time ranges specified ........................ 215
K.2.61. profile-time: Test passes if within any of the date/time ranges specified ................. 215
K.2.62. profile-ping: Test passes if any addresses are pingable ....................................... 216
K.2.63. shaper: Traffic shaper .................................................................................. 216
K.2.64. shaper-override: Traffic shaper override based on profile .................................... 216
K.2.65. ip-group: IP Group ...................................................................................... 217
K.2.66. route-override: Routing override rules ............................................................. 217
K.2.67. session-route-rule: Routing override rule ......................................................... 218
K.2.68. session-route-share: Route override load sharing ............................................... 218
K.2.69. rule-set: Firewall/mapping rule set .................................................................. 219
K.2.70. session-rule: Firewall rules ............................................................................ 220
K.2.71. session-share: Firewall load sharing ................................................................ 221
K.2.72. voip: Voice over IP config ............................................................................ 221
K.2.73. carrier: VoIP carrier details ........................................................................... 223
K.2.74. telephone: VoIP telephone authentication user details ......................................... 224
K.2.75. tone: Tone definitions .................................................................................. 225
K.2.76. ringgroup: Ring groups ................................................................................ 225
K.2.77. etun: Ether tunnel ........................................................................................ 226
K.2.78. dhcp-relay: DHCP server settings for remote / relayed requests ............................ 227

FireBrick FB2700 User Manual
xiv
K.3. Data types .............................................................................................................. 227
K.3.1. autoloadtype: Type of s/w auto load ................................................................. 227
K.3.2. config-access: Type of access user has to config ................................................. 227
K.3.3. user-level: User login level ............................................................................. 228
K.3.4. eap-subsystem: Subsystem with EAP access control ............................................ 228
K.3.5. eap-method: EAP access method ..................................................................... 228
K.3.6. syslog-severity: Syslog severity ....................................................................... 228
K.3.7. syslog-facility: Syslog facility ......................................................................... 229
K.3.8. month: Month name (3 letter) ......................................................................... 229
K.3.9. day: Day name (3 letter) ................................................................................ 230
K.3.10. radiuspriority: Options for controlling platform RADIUS response priority
tagging ................................................................................................................. 230
K.3.11. radiustype: Type of RADIUS server ............................................................... 230
K.3.12. port: Physical port ....................................................................................... 231
K.3.13. Crossover: Crossover configuration ................................................................ 231
K.3.14. LinkSpeed: Physical port speed ..................................................................... 231
K.3.15. LinkDuplex: Physical port duplex setting ......................................................... 231
K.3.16. LinkFlow: Physical port flow control setting .................................................... 231
K.3.17. LinkClock: Physical port Gigabit clock master/slave setting ................................ 232
K.3.18. LinkLED: LED settings ................................................................................ 232
K.3.19. LinkPower: PHY power saving options ........................................................... 233
K.3.20. LinkFault: Link fault type to send .................................................................. 233
K.3.21. sampling-protocol: Sampling protocol ............................................................. 233
K.3.22. trunk-mode: Trunk port more ........................................................................ 233
K.3.23. ramode: IPv6 route announce level ................................................................. 233
K.3.24. dhcpv6control: Control for RA and DHCPv6 bits .............................................. 234
K.3.25. bgpmode: BGP announcement mode ............................................................... 234
K.3.26. sampling-mode: Sampling mode .................................................................... 234
K.3.27. sfoption: Source filter option ......................................................................... 234
K.3.28. pppoe-mode: Type of PPPoE connection ......................................................... 235
K.3.29. pdp-context-type: Type of IP connection ......................................................... 235
K.3.30. ipsec-type: IPsec encapsulation type ............................................................... 235
K.3.31. ipsec-auth-algorithm: IPsec authentication algorithm .......................................... 235
K.3.32. ipsec-crypt-algorithm: IPsec encryption algorithm ............................................. 235
K.3.33. peertype: BGP peer type ............................................................................... 236
K.3.34. ike-authmethod: authentication method ............................................................ 236
K.3.35. ike-mode: connection setup mode ................................................................... 236
K.3.36. ike-PRF: IKE Pseudo-Random Function .......................................................... 236
K.3.37. ike-DH: IKE Diffie-Hellman group ................................................................ 237
K.3.38. ike-ESN: IKE Sequence Number support ......................................................... 237
K.3.39. ipsec-encapsulation: Manually keyed IPsec encapsulation mode ........................... 237
K.3.40. switch: Profile manual setting ........................................................................ 237
K.3.41. dynamic-graph: Type of dynamic graph .......................................................... 237
K.3.42. firewall-action: Firewall action ...................................................................... 238
K.3.43. voip-format: Number presentation format ........................................................ 238
K.3.44. uknumberformat: Number formatting option .................................................... 238
K.3.45. recordoption: Recording option ...................................................................... 238
K.3.46. ring-group-order: Order of ring ...................................................................... 238
K.3.47. ring-group-type: Type of ring when one call in queue ........................................ 239
K.3.48. record-beep-option: Record beep option .......................................................... 239
K.4. Basic types ............................................................................................................. 239
Index .................................................................................................................................... 242

xv
List of Figures
2.1. Initial web page in factory reset state ...................................................................................... 7
2.2. Initial "Users" page .............................................................................................................. 7
2.3. Setting up a new user .......................................................................................................... 8
2.4. Configuration being stored .................................................................................................... 8
3.1. Main menu ....................................................................................................................... 11
3.2. Icons for layout controls ..................................................................................................... 12
3.3. Icons for configuration categories ......................................................................................... 12
3.4. The "Setup" category .......................................................................................................... 13
3.5. Editing an "Interface" object ................................................................................................ 14
3.6. Show hidden attributes ....................................................................................................... 14
3.7. Attribute definitions ........................................................................................................... 14
3.8. Navigation controls ............................................................................................................ 15
4.1. Setting up a new user ......................................................................................................... 21
4.2. Software upgrade available notification ................................................................................. 28
4.3. Manual Software upload ..................................................................................................... 29
7.1. Example sessions created by drop and reject actions ................................................................ 46
7.2. Processing flow chart for rule-sets and session-rules ................................................................ 48
C.1. Product label showing MAC address range .......................................................................... 137

xvi
List of Tables
2.1. IP addresses for computer ..................................................................................................... 6
2.2. IP addresses to access the FireBrick ....................................................................................... 6
2.3. IP addresses to access the FireBrick ....................................................................................... 6
3.1. Special character sequences ................................................................................................. 17
4.1. User login levels ............................................................................................................... 22
4.2. Configuration access levels .................................................................................................. 22
4.3. General administrative details attributes ................................................................................. 24
4.4. Attributes controlling auto-upgrades ...................................................................................... 28
4.5. Power LED status indications .............................................................................................. 29
5.1. Logging attributes .............................................................................................................. 31
5.2. System-Event Logging attributes .......................................................................................... 34
6.1. Port LED functions ............................................................................................................ 42
6.2. Example modified Port LED functions .................................................................................. 43
7.1. Action attribute values ........................................................................................................ 46
8.1. Example route targets ......................................................................................................... 58
12.1. IPsec algorithm key lengths ............................................................................................... 76
12.2. IKE / IPsec algorithm proposals .......................................................................................... 80
14.1. List of system services ...................................................................................................... 91
14.2. List of system services ...................................................................................................... 92
15.1. Packet dump parameters .................................................................................................... 98
15.2. Packet types that can be captured ........................................................................................ 99
17.1. Ring Type ..................................................................................................................... 108
17.2. Ring Order .................................................................................................................... 109
17.3. Access-Accept ............................................................................................................... 112
17.4. Default tones ................................................................................................................. 114
18.1. Peer types ..................................................................................................................... 117
18.2. Communities ................................................................................................................. 119
18.3. Network attributes .......................................................................................................... 120
19.1. OSPF config attributes .................................................................................................... 123
C.1. DHCP client names used .................................................................................................. 138
E.1. SCCRQ .......................................................................................................................... 140
E.2. SCCRP .......................................................................................................................... 140
E.3. SCCCN .......................................................................................................................... 141
E.4. StopCCN ........................................................................................................................ 141
E.5. HELLO .......................................................................................................................... 141
E.6. ICRQ ............................................................................................................................. 141
E.7. ICRP ............................................................................................................................. 142
E.8. ICCN ............................................................................................................................. 142
E.9. OCRQ ........................................................................................................................... 142
E.10. OCRP .......................................................................................................................... 143
E.11. OCCN .......................................................................................................................... 143
E.12. CDN ............................................................................................................................ 143
E.13. WEN ........................................................................................................................... 143
E.14. SLI .............................................................................................................................. 143
F.1. Access-request ................................................................................................................. 145
F.2. Access-Accept ................................................................................................................. 146
F.3. Access-Reject .................................................................................................................. 148
F.4. Accounting-Start .............................................................................................................. 148
F.5. Accounting-Interim .......................................................................................................... 149
F.6. Accounting-Stop .............................................................................................................. 150
F.7. Disconnect ...................................................................................................................... 150
F.8. Change-of-Authorisation ................................................................................................... 150
F.9. Filter-ID ......................................................................................................................... 151
G.1. Access-request ................................................................................................................ 154

FireBrick FB2700 User Manual
xvii
G.2. Access-Challenge ............................................................................................................ 155
G.3. Access-Accept ................................................................................................................ 155
G.4. Access-Accept ................................................................................................................ 155
G.5. Access-Reject ................................................................................................................. 156
G.6. Accounting-Start ............................................................................................................. 156
G.7. Accounting-Interim .......................................................................................................... 156
G.8. Accounting-Stop .............................................................................................................. 157
G.9. Disconnect ..................................................................................................................... 157
G.10. Change-of-Authorisation ................................................................................................. 158
H.1. iso.3.6.1.4.1.24693.179 ..................................................................................................... 159
H.2. iso.3.6.1.4.1.24693.1701 ................................................................................................... 159
H.3. iso.3.6.1.4.1.24693.5060 ................................................................................................... 160
J.1. File types ........................................................................................................................ 168
J.2. Colours ........................................................................................................................... 169
J.3. Text ............................................................................................................................... 170
J.4. Text ............................................................................................................................... 170
J.5. URL formats ................................................................................................................... 171
K.1. config: Attributes ............................................................................................................ 173
K.2. config: Elements ............................................................................................................. 173
K.3. system: Attributes ............................................................................................................ 174
K.4. system: Elements ............................................................................................................. 175
K.5. link: Attributes ................................................................................................................ 175
K.6. user: Attributes ............................................................................................................... 175
K.7. eap: Attributes ................................................................................................................ 176
K.8. log: Attributes ................................................................................................................. 176
K.9. log: Elements .................................................................................................................. 176
K.10. log-syslog: Attributes ..................................................................................................... 177
K.11. log-email: Attributes ....................................................................................................... 177
K.12. services: Elements ......................................................................................................... 178
K.13. snmp-service: Attributes .................................................................................................. 178
K.14. ntp-service: Attributes ..................................................................................................... 178
K.15. telnet-service: Attributes ................................................................................................. 179
K.16. http-service: Attributes .................................................................................................... 180
K.17. dns-service: Attributes .................................................................................................... 180
K.18. dns-service: Elements ..................................................................................................... 181
K.19. dns-host: Attributes ........................................................................................................ 181
K.20. dns-block: Attributes ...................................................................................................... 182
K.21. radius-service: Attributes ................................................................................................. 182
K.22. radius-service: Elements .................................................................................................. 183
K.23. radius-service-match: Attributes ....................................................................................... 183
K.24. radius-server: Attributes .................................................................................................. 184
K.25. ethernet: Attributes ......................................................................................................... 185
K.26. sampling: Attributes ....................................................................................................... 185
K.27. portdef: Attributes .......................................................................................................... 186
K.28. interface: Attributes ........................................................................................................ 186
K.29. interface: Elements ......................................................................................................... 187
K.30. subnet: Attributes ........................................................................................................... 188
K.31. vrrp: Attributes .............................................................................................................. 188
K.32. dhcps: Attributes ............................................................................................................ 189
K.33. dhcps: Elements ............................................................................................................ 190
K.34. dhcp-attr-hex: Attributes ................................................................................................. 190
K.35. dhcp-attr-string: Attributes ............................................................................................... 190
K.36. dhcp-attr-number: Attributes ............................................................................................ 191
K.37. dhcp-attr-ip: Attributes .................................................................................................... 191
K.38. pppoe: Attributes ........................................................................................................... 191
K.39. pppoe: Elements ............................................................................................................ 192

FireBrick FB2700 User Manual
xviii
K.40. ppp-route: Attributes ...................................................................................................... 193
K.41. usb: Attributes ............................................................................................................... 193
K.42. usb: Elements ................................................................................................................ 193
K.43. dongle: Attributes .......................................................................................................... 193
K.44. dongle: Elements ........................................................................................................... 194
K.45. route: Attributes ............................................................................................................ 195
K.46. network: Attributes ........................................................................................................ 195
K.47. blackhole: Attributes ...................................................................................................... 195
K.48. loopback: Attributes ....................................................................................................... 196
K.49. ospf: Attributes .............................................................................................................. 196
K.50. namedbgpmap: Attributes ................................................................................................ 197
K.51. namedbgpmap: Elements ................................................................................................. 198
K.52. bgprule: Attributes ......................................................................................................... 198
K.53. bgp: Attributes .............................................................................................................. 198
K.54. bgp: Elements ............................................................................................................... 199
K.55. bgppeer: Attributes ......................................................................................................... 199
K.56. bgppeer: Elements ......................................................................................................... 200
K.57. bgpmap: Attributes ......................................................................................................... 201
K.58. bgpmap: Elements ......................................................................................................... 201
K.59. cqm: Attributes .............................................................................................................. 201
K.60. l2tp: Attributes .............................................................................................................. 203
K.61. l2tp: Elements ............................................................................................................... 203
K.62. l2tp-outgoing: Attributes ................................................................................................. 203
K.63. l2tp-outgoing: Elements .................................................................................................. 205
K.64. l2tp-incoming: Attributes ................................................................................................ 205
K.65. l2tp-incoming: Elements ................................................................................................. 206
K.66. l2tp-relay: Attributes ...................................................................................................... 206
K.67. fb105: Attributes ............................................................................................................ 207
K.68. fb105: Elements ............................................................................................................ 208
K.69. fb105-route: Attributes .................................................................................................... 208
K.70. ipsec-ike: Attributes ....................................................................................................... 209
K.71. ipsec-ike: Elements ........................................................................................................ 209
K.72. ike-connection: Attributes ................................................................................................ 209
K.73. ike-connection: Elements ................................................................................................ 211
K.74. ipsec-route: Attributes ..................................................................................................... 211
K.75. ike-roaming: Attributes ................................................................................................... 211
K.76. ike-proposal: Attributes ................................................................................................... 212
K.77. ipsec-proposal: Attributes ................................................................................................ 212
K.78. ipsec-manual: Attributes .................................................................................................. 212
K.79. ipsec-manual: Elements .................................................................................................. 213
K.80. ping: Attributes ............................................................................................................. 214
K.81. profile: Attributes .......................................................................................................... 214
K.82. profile: Elements ........................................................................................................... 215
K.83. profile-date: Attributes .................................................................................................... 215
K.84. profile-time: Attributes ................................................................................................... 215
K.85. profile-ping: Attributes ................................................................................................... 216
K.86. shaper: Attributes ........................................................................................................... 216
K.87. shaper: Elements ............................................................................................................ 216
K.88. shaper-override: Attributes .............................................................................................. 217
K.89. ip-group: Attributes ........................................................................................................ 217
K.90. route-override: Attributes ................................................................................................ 217
K.91. route-override: Elements ................................................................................................. 218
K.92. session-route-rule: Attributes ........................................................................................... 218
K.93. session-route-rule: Elements ............................................................................................ 218
K.94. session-route-share: Attributes .......................................................................................... 218
K.95. rule-set: Attributes ......................................................................................................... 219

FireBrick FB2700 User Manual
xix
K.96. rule-set: Elements .......................................................................................................... 219
K.97. session-rule: Attributes ................................................................................................... 220
K.98. session-rule: Elements .................................................................................................... 221
K.99. session-share: Attributes .................................................................................................. 221
K.100. voip: Attributes ............................................................................................................ 221
K.101. voip: Elements ............................................................................................................. 223
K.102. carrier: Attributes ......................................................................................................... 223
K.103. telephone: Attributes ..................................................................................................... 224
K.104. tone: Attributes ............................................................................................................ 225
K.105. ringgroup: Attributes ..................................................................................................... 225
K.106. etun: Attributes ............................................................................................................ 226
K.107. dhcp-relay: Attributes ................................................................................................... 227
K.108. dhcp-relay: Elements .................................................................................................... 227
K.109. autoloadtype: Type of s/w auto load ................................................................................ 227
K.110. config-access: Type of access user has to config ................................................................ 227
K.111. user-level: User login level ............................................................................................ 228
K.112. eap-subsystem: Subsystem with EAP access control ........................................................... 228
K.113. eap-method: EAP access method .................................................................................... 228
K.114. syslog-severity: Syslog severity ...................................................................................... 228
K.115. syslog-facility: Syslog facility ........................................................................................ 229
K.116. month: Month name (3 letter) ........................................................................................ 229
K.117. day: Day name (3 letter) ............................................................................................... 230
K.118. radiuspriority: Options for controlling platform RADIUS response priority tagging ................... 230
K.119. radiustype: Type of RADIUS server ................................................................................ 230
K.120. port: Physical port ........................................................................................................ 231
K.121. Crossover: Crossover configuration ................................................................................. 231
K.122. LinkSpeed: Physical port speed ...................................................................................... 231
K.123. LinkDuplex: Physical port duplex setting ......................................................................... 231
K.124. LinkFlow: Physical port flow control setting ..................................................................... 231
K.125. LinkClock: Physical port Gigabit clock master/slave setting ................................................. 232
K.126. LinkLED: LED settings ................................................................................................ 232
K.127. LinkPower: PHY power saving options ............................................................................ 233
K.128. LinkFault: Link fault type to send ................................................................................... 233
K.129. sampling-protocol: Sampling protocol .............................................................................. 233
K.130. trunk-mode: Trunk port more ......................................................................................... 233
K.131. ramode: IPv6 route announce level ................................................................................. 233
K.132. dhcpv6control: Control for RA and DHCPv6 bits .............................................................. 234
K.133. bgpmode: BGP announcement mode ............................................................................... 234
K.134. sampling-mode: Sampling mode ..................................................................................... 234
K.135. sfoption: Source filter option .......................................................................................... 234
K.136. pppoe-mode: Type of PPPoE connection .......................................................................... 235
K.137. pdp-context-type: Type of IP connection .......................................................................... 235
K.138. ipsec-type: IPsec encapsulation type ................................................................................ 235
K.139. ipsec-auth-algorithm: IPsec authentication algorithm .......................................................... 235
K.140. ipsec-crypt-algorithm: IPsec encryption algorithm .............................................................. 235
K.141. peertype: BGP peer type ............................................................................................... 236
K.142. ike-authmethod: authentication method ............................................................................ 236
K.143. ike-mode: connection setup mode ................................................................................... 236
K.144. ike-PRF: IKE Pseudo-Random Function .......................................................................... 236
K.145. ike-DH: IKE Diffie-Hellman group ................................................................................. 237
K.146. ike-ESN: IKE Sequence Number support ......................................................................... 237
K.147. ipsec-encapsulation: Manually keyed IPsec encapsulation mode ............................................ 237
K.148. switch: Profile manual setting ........................................................................................ 237
K.149. dynamic-graph: Type of dynamic graph ........................................................................... 237
K.150. firewall-action: Firewall action ....................................................................................... 238
K.151. voip-format: Number presentation format ......................................................................... 238

FireBrick FB2700 User Manual
xx
K.152. uknumberformat: Number formatting option ..................................................................... 238
K.153. recordoption: Recording option ....................................................................................... 238
K.154. ring-group-order: Order of ring ....................................................................................... 238
K.155. ring-group-type: Type of ring when one call in queue ......................................................... 239
K.156. record-beep-option: Record beep option ........................................................................... 239
K.157. Basic data types ........................................................................................................... 239
Other manuals for FB2700
3
Table of contents
Other FireBrick Network Router manuals
Popular Network Router manuals by other brands

EtherWAN
EtherWAN 72128A installation guide

SIRETTA
SIRETTA QUARTZ-ONYX quick start guide

Cisco
Cisco 3825 - Voice Bundle Router Troubleshooting

DirectOut Technologies
DirectOut Technologies D.O.TEC M .1k 2 Hardware installation guide

Rane
Rane Via 10 Operator's manual

Sarian Systems
Sarian Systems TA2020B installation guide