RadiSys SEG-100 Instruction Manual

Administration Guide
SECURITY GATEWAY
SEG-100
SOFTWARE RELEASE 1.1
February 2012 007-03416-0003

Revision history
Version Date Description
-0000 August 2011 First edition.
-0001 September 2011 Second edition. Updated to include new authentication profiles, RADIUS authentication, and I-WLAN solution.
Added information on local user databases, CLI scripting, statistics, and log receivers. Made significant
updates to the NAT and SAT sections, and made other corrections and clarifications.
-0002 January 2012 Third edition. Updated for the 1.1.1 software release. Added information to the SCP, licensing, and backup
and restore sections. Added IPv6 information. Made other corrections and clarifications.
-0003 February 2012 Fourth edition. Updated for the 1.1.2 software release. See What’s new in this manual on page 6 for a
description of changes in this edition.
©2011‐2012byRadiSysCorporation.Allrightsreserved.
RadisysisaregisteredtrademarkofRadiSysCorporation.AdvancedTCA,ATCA,andPIGMGareregisteredtrademarksofPCIIndustrial
ComputerManufacturersGroup.
Allothertrademarks,registeredtrademarks,servicemarks,andtradenamesarethepropertyoftheirrespectiveowners.

Table of Contents
3
Preface ................................................................................................................................................ 6
About this manual........................................................................................................................................6
What’s new in this manual...........................................................................................................................6
Where to get more product information.......................................................................................................6
Related documents......................................................................................................................................7
Notational conventions................................................................................................................................7
Chapter 1: Overview........................................................................................................................... 8
SEG overview..............................................................................................................................................8
SEG architecture.........................................................................................................................................8
Chapter 2: Management................................................................................................................... 12
Management access .................................................................................................................................12
Date and time............................................................................................................................................33
Licensing...................................................................................................................................................37
Backup and restore ...................................................................................................................................39
Crashdumps..............................................................................................................................................42
Statistics....................................................................................................................................................44
Events and logging....................................................................................................................................47
Chapter 3: Addressing..................................................................................................................... 54
Interfaces...................................................................................................................................................54
ARP...........................................................................................................................................................58
Address books...........................................................................................................................................63
IPv6 support..............................................................................................................................................66
DNS...........................................................................................................................................................70
Chapter 4: Address Translation...................................................................................................... 73
Overview....................................................................................................................................................73
NAT...........................................................................................................................................................73
SAT ...........................................................................................................................................................78
Chapter 5: Routing .......................................................................................................................... 86
Principles of routing ..................................................................................................................................86
Static routing..............................................................................................................................................91

4
Chapter 6: Firewall........................................................................................................................... 96
IP rules......................................................................................................................................................96
Services...................................................................................................................................................103
Access rules............................................................................................................................................107
Internet access........................................................................................................................................110
Chapter 7: IPsec VPN .................................................................................................................... 113
Overview..................................................................................................................................................113
IPsec components...................................................................................................................................117
Setting up IPsec tunnels .........................................................................................................................135
NAT traversal...........................................................................................................................................138
CA server access....................................................................................................................................140
IPsec troubleshooting .............................................................................................................................143
Chapter 8: Authentication.............................................................................................................. 153
Authentication profiles.............................................................................................................................153
RADIUS authentication ...........................................................................................................................154
The radiussnoop command ....................................................................................................................156
Chapter 9: High Availability........................................................................................................... 157
Overview .................................................................................................................................................157
HA mechanisms .....................................................................................................................................159
Setting up HA .........................................................................................................................................161
HA issues ...............................................................................................................................................166
Chapter 10: Advanced Settings .................................................................................................... 168
Flow timeout settings ..............................................................................................................................168
Length limit settings ................................................................................................................................169
Fragmentation settings ...........................................................................................................................171
Local fragment reassembly settings .......................................................................................................176
Chapter 11: I-WLAN........................................................................................................................ 177
I-WLAN overview ....................................................................................................................................177
GTP tunnels.............................................................................................................................................178
Interface stitching....................................................................................................................................181
Using IP rules .........................................................................................................................................182
Adding client routing................................................................................................................................182
Certificates with I-WLAN .........................................................................................................................183

5
Support for multiple GGSNs....................................................................................................................184
I-WLAN use case ....................................................................................................................................184
Appendix A: Glossary of Terms.................................................................................................... 185
Appendix B: OSI Model.................................................................................................................. 197
Overview .................................................................................................................................................197

6
Preface
About this manual
ThismanualdescribestheRadisysSEG,ahighlyscalablesecuritygatewayoptimizedforLong
TermEvolution(LTE)deployments.ThismanualintroducesSEGsoftwareconceptsandserves
asareferenceforproceduralandusageinformation.
Thetargetaudienceforthismanualisadministratorswhoareresponsibleforconfiguringand
managingtheSEGanditsoperatingsystem.Itisassumedthattheadministratorshavebasic
knowledgeofnetworksandnetworksecurity.
What’s new in this manual
•AddedtroubleshootingwithICMPpingonpage25.
• Changedthetypesofauthenticationavailableonpage153.
• UpdatedverifyingHAsynchronizationonpage165.
Where to get more product information
VisittheRadisyswebsiteatwww.radisys.comforproductinformationandotherresources.
Downloads(manuals,releasenotes,software,etc.)areavailableat
www.radisys.com/downloads.
SeethefollowingresourcesforinformationontheSEGnotdescribedinthismanual:
•TheSEG‐100GettingStartedGuidedescribeshowtosetuptheSEG‐100modulesandthe
SEG‐11002system,andhowtoconfiguretheSEGsoftwareforinitialuse.
•TheSEG‐100CommandLineInterfaceReferencedescribestheSEGcommandline
interfaceandservesasareferenceforcommandsyntaxandoptions.
•TheSEG‐100LogReferencedescribesalllogmessagesgeneratedbytheSEG.
•TheSEG‐100StatisticsReferencedescribesallstatisticalvaluesandassociatedparameters
thataremaintainedbytheSEG.
•TheSEG‐100TTGInterfaceReferencedescribestheinterfacesfortheSEGTunnel
TerminatingGateway(TTG).

Preface
7
Related documents
RFC791,InternetProtocol,IETF,September1981.
RFC1191,PathMTUDiscovery,IETF,November1990.
RFC1305,NetworkTimeProtocol(Version3),IETF,March1992.
RFC1321,TheMD5Message‐DigestAlgorithm,IETF,April1992.
RFC1777,LightweightDirectoryAccessProtocol,IETF,March1995.
RFC1918,AddressAllocationforPrivateInternets,IETF,February1996.
RFC2030,SimpleNetworkTimeProtocol(SNTP)Version4forIPv4,IPv6andOSI,IETF,
October1996.
RFC2138,RemoteAuthenticationDialInUserService(RADIUS),IETF,April1997.
RFC2139,RADIUSAccounting,IETF,April1997.
RFC2251,LightweightDirectoryAccessProtocol(v3),IETF,December1997.
RFC2401,SecurityArchitecturefortheInternetProtocol,IETF,November1998.
RFC2406,IPEncapsulatingSecurityPayload(ESP),IETF,November1998.
RFC2460,InternetProtocol,Version6(IPv6)Specification,IETF,December1998.
RFC3947,NegotiationofNAT‐TraversalintheIKE,IETF,January2005.
RFC4306,InternetKeyExchange(IKEv2)Protocol,IETF,December2005.
RFC5905,NetworkTimeProtocolVersion4:ProtocolandAlgorithmsSpecification,IETF,June
2010.
Notational conventions
Thismanualusesthefollowingconventions
Allnumbersaredecimalunlessotherwisestated.
ItalicText File,function,andutilitynames.
MonoText Screentextandsyntaxstrings.
BoldMonoText Acommandtoenter.
ItalicMonoText Variableparameters.
Brackets[] Commandoptions.
Curlybraces{}Agroupedlistofparameters.
Verticalline|An“OR”inthesyntax.Indicatesachoiceofparameters.

1
Chapter
8
Overview
SEG overview
TheRadisysSEGisarobusttelecomsecuritygatewaybasedonNetworkDomainSecurity
(NDS)standardsthatprovidesstatefulfirewallingandIPsectunnelinginasingleplatform.The
SEGcanbeusedtosecureanylargeIPbasednetwork.Initsfirstrelease,theSEGistargeted
foruseasasecuritygatewaybetweeninfrastructureelementsinLTEAccess/BackhaulandLTE
EvolvedPacketCorenetworks.Insubsequentreleases,theSEGwillsupportcurrent
generation(2G/3G)wirelessoffloadapplicationslikeI‐WLAN,UMA/GANandFemtocellthat
areevolvingtoLTE.Itisalsoideallysuitedforhighperformanceandnext‐genfirewalling
scenarios.
TheRadisysSEGisbuiltaroundthecarrier‐gradeAdvancedTelecommunicationsComputing
Architecture(ATCA),andoffersworld‐classsecurityfeatureswithmulti‐gigabitthroughput
andperformance.ThemaincomponentoftheRadisysSEGistheSEG‐100securitymodule,a
fullycontainedsecuritygatewayresidingonanATCAmodule.TheSEG‐100canbedeployedin
astandaloneSEG‐11002system,orintegratedintootherATCAbasednetworkelements.Both
standaloneandintegratedconfigurationssupportcarriergradehighavailabilitywith
redundanthardwareandsophisticatedfaulttolerantsoftware.
TheSEG‐11002isa2U,2‐slotATCAsystem,ideallysuitedforinitialtrialsandsmall‐to‐
mediumsizedeployments.ItcontainsoneortwoSEG‐100modules,andcanbeconfiguredas
ahighavailabilitysystem,withactiveandpassiveSEG‐100sprovidingfullstatefulredundancy
forIPsectunnelsandpacketflows.
TheSEGsecuritysoftwareisbasedonaproprietaryoperatingcorewithasmallattacksurface,
makingtheapplicationprocessinghighlysecureandefficient.Thesoftwareprocessesmillions
ofconcurrentIPpacketflowsinrealtime,whileapplyingarichsetoffirewallingrulesand
routingpolicies.ItalsosetsupVPN/IPsectunnels,usingsecurekeysandapplyingadvanced
dataintegrityandencryptiontechniques.
SEG architecture
TheSEGarchitectureiscenteredontheconceptofflows.TraditionalIProutersorswitches
commonlyinspectallpacketsandthenperformforwardingdecisionsbasedoninformation
foundinthepacketheaders.Withthisapproach,packetsareforwardedwithoutanysenseof
context,whicheliminatesanypossibilitytodetectandanalyzecomplexprotocolsandenforce
correspondingsecuritypolicies.

1
Overview
9
Stateful inspection
TheSEGemploysatechniquecalledstatefulinspectionwhichmeansthatitinspectsand
forwardstrafficonaper‐flowbasis.TheSEGdetectswhenanewflowbetweenasourceand
destinationisbeingestablished,andkeepsinformationabouttheflowoveritslifetime.By
doingthis,theSEGisabletounderstandthecontextofnetworktraffic,enablingittoperform
avarietyofimportantfunctions.
Thestatefulinspectionapproachadditionallyprovideshighthroughputperformancewiththe
addedadvantageofadesignthatishighlyscalable.TheSEGsubsystemthatimplements
statefulinspectionissometimesreferredtoastheSEGstate‐engine.
Allflowshaveaspecifiedidlelifetime,afterwhichtheyareremovedfromtheflowtable.
Basic building blocks
Fromtheadministrator’sviewpoint,thebasicSEGbuildingblocksare:
•InterfacessuchasphysicalEthernetinterfacesorlogicalVPNtunnels.
•LogicalobjectsthatareindividuallogicaldefinitionswithintheSEG.Forexample,Address
objectscanbedefinedintheAddressBooktogivelogicalnamestoIPandothertypesof
addresses.
•Rulesetsthatmakeupthesecuritypoliciesthatyouwanttoimplement.TheseincludeIP
rules.
Thesethreetypesofbuildingblocksarediscussednext.
Interfaces
Interfacesarethedoorwaysthroughwhichnetworktrafficentersorleavesthesecurity
gateway.Withoutinterfaces,anSEGsystemhasnomeansforreceivingorsendingtraffic.
ThefollowingtypesofinterfacearesupportedintheSEG:
•Physicalinterfaces
ThesecorrespondtotheactualphysicalEthernetinterfaceportsthroughwhichtraffic
arrivesandleavesthehardwareplatformrunningtheSEG.
• Tunnelinterfaces
UsedforreceivingandsendingtrafficthroughVPNtunnels.Thesearetreatedaslogically
equivalenttophysicalinterfaceswhenyouconfiguretheSEG.Forexample,arouteinan
SEGroutingtablecouldspecifyeitheraphysicalortunnelinterfaceasthedestinationfor
aparticularnetwork.
TheSEGinterfacedesignissymmetric,meaningthattheinterfacesofthedevicearenotfixed
asbeingonthe“insecureoutside”or“secureinside”ofanetworktopology.Thenotionof
whatisinsideandoutsideiscompletelyforyoutodefine.

1
Overview
10
Logical objects
Youcanconsiderlogicalobjectstobepredefinedbuildingblocksforuseinrulesets.For
example,theaddressbookcontainsnamedobjectsrepresentinghostandnetworkaddresses.
Anotherexampleoflogicalobjectsareservicesthatrepresentspecificprotocolandport
combinations.
SEG rule sets
Finally,ruleswhicharedefinedbytheadministratorinthevariousrulesetsareusedfor
actuallyimplementingSEGsecuritypolicies.ThemostfundamentalsetofrulesaretheIP
Rules,whichareusedtodefineLayer3IPfilteringpolicies.
Basic packet flow
ThissectionoutlinesthebasicflowforpacketsreceivedandforwardedbytheSEG.The
followingdescriptionissimplifiedandmightnotbefullyapplicableinallscenarios,however,
thebasicprincipleswillbevalidforallSEGdeployments.
1. AnEthernetframeisreceivedononeoftheEthernetinterfacesinthesystem.Basic
Ethernetframevalidationisperformedandthepacketisdroppediftheframeisinvalid.
2. TheIPdatagramwithinthepacketispassedontotheSEGconsistencychecker.The
checkerperformsanumberofconsistencychecksonthepacket,includingvalidationof
checksums,protocolflags,packetlengthandsoon.Iftheconsistencychecksfail,the
packetgetsdroppedandtheeventislogged.
3. TheSEGnowtriestolookupanexistingflowbymatchingparametersfromtheincoming
packet.Anumberofparametersareusedinthematchattempt,includingthesource
interface,sourceanddestinationIPaddresses,andIPprotocol.Ifamatchcannotbe
found,aflowestablishmentprocessstarts.
4. TheAccessRulesareevaluatedtofindoutifthesourceIPaddressofthenewflowis
allowedonthereceivedinterface.IfnoAccessRulematchesthenareverseroutelookup
willbedoneintheroutingtables.
Inotherwords,bydefault,aninterfacewillonlyacceptsourceIPaddressesthatbelongto
networksroutedoverthatinterface.Areverselookupmeansthatalookupisdoneinthe
routingtablestoconfirmthatarouteexiststhatwouldroutetrafficdestinedfortheIP
addressoverthatinterface.
IftheAccessRulelookupdeterminesthatthesourceIPisinvalid,thepacketisdropped
andtheeventislogged.
5. Aroutelookupismadeusingtheroutingtable.Thedestinationinterfacefortheflowhas
nowbeendetermined.

1
Overview
11
6. TheIPrulesarenowsearchedforarulethatmatchesthepacket.Thefollowing
parametersarepartofthematchingprocess:
•Sourceanddestinationinterfaces
•Sourceanddestinationnetwork
•IPprotocol(forexampleTCP,UDP,ICMP)
•TCP/UDPports
•ICMPtypes
•Pointintimeinreferencetoapredefinedschedule
Ifamatchcannotbefound,thepacketisdropped.
Ifaruleisfoundthatmatchesthenewflow,theActionpropertyoftheruleisusedto
decidewhattheSEGshoulddowiththeflow.IftheactionisDrop,thepacketisdropped
andtheeventisloggedaccordingtothelogsettingsfortherule.
7. IftheactionisAllow,thepacketisallowedthroughthesystem.Acorrespondingflowwill
benotedbytheSEGformatchingsubsequentpacketsbelongingtothesameflow.The
allowedtrafficisalsobidirectionalsothatthesameIPrulealsopermitspacketstoreturn
fromthedestinationnetwork.
Finally,theopeningofthenewflowwillbeloggedaccordingtothelogsettingsofthe
rule.Thedefaultisforloggingtobeenabled.
8. Eventually,thepacketwillbeforwardedoutonthedestinationinterfaceaccordingtothe
flow.Ifthedestinationinterfaceisatunnelinterface,additionalprocessingsuchas
encryptionorencapsulationmightoccur.

2
Chapter
12
Management
Management access
ThissectionprovidesdetailsofhowtoworkwiththeSEGmanagementinterfaces.The
followinginterfacesareavailable:
•Commandlineinterface(CLI)
TheCommandLineInterface(CLI)isaccessibleeitherlocallyviaacomputer’sserial
consoleportorremotelyusingtheSecureShell(SSH)protocol.Itprovidesfine‐grained
controloverallparametersintheSEG.
ThisfeatureisdescribedfurtherinCommandlineinterfaceonpage15.
•SNMP
ASecureNetworkManagementProtocol(SNMP)clientcanconnecttotheSEGand
provideread‐onlyaccesstothecurrentSEGconfiguration.Thisfeatureisdescribed
furtherinSNMPmonitoringonpage31.
File transfer with secure copy
SecureCopy(SCP)isawidelyusedcommunicationprotocolforfiletransfer.SCPisa
complementtotheCLIandprovidesasecuremeansoffiletransferbetweenthe
administrator'sexternalmanagementworkstationandtheSEG.Variousfilesusedbythe
SEG,suchasconfigurationbackups,canbebothuploadedanddownloadedusingSCP.
NospecificSCPclientisprovidedwithSEGdistributions.However,thereisawide
selectionofthird‐partySCPclientsfornearlyallworkstationplatforms.
ThisfeatureisdescribedfurtherinSecurecopyonpage30.
Local user databases
Bydefault,theSEGprovidesadefaultLocalUserDatabaseobjectthatisusedtoauthenticate
managementlogins.Thisdatabasecontains,atminimum,onepredefineduseraccount:
Username:admin
Password:admin
Thisaccounthasfulladministrativeread/writeprivilegestoallconfigurationdataandis
alwaystheaccountusedforinitialSSHlogin(consoleaccessdoesnotrequirelogininthe
defaultconfiguration).
Important:Forsecurityreasons,itisrecommendedtochangethepasswordforthedefault
accountassoonaspossiblefollowingtheinitialconfigurationoftheSEG.

2
Management
13
Displaying local user databases
WiththeSEGCLI,thenameofthepredefinedlocaluserdatabasecanbedisplayedwiththe
command:
Device:/>showLocalUserDatabase
Name
‐‐‐‐‐‐‐‐‐‐
AdminUsers
ThecontentsofthiscanbedisplayedbyfirstchangingtheCLIcontexttobethedatabase:
Device:/>ccLocalUserDatabaseAdminUsers
TheCLIpromptwillchangetoindicatethenewcontextandthedatabasecontentscanbe
displayed:
Device:/LocalUserDatabase/AdminUsers>show
User
NameGroupsComments
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
adminAdministrators<empty>
Here,theGroupmembershipissignificantsincethisdeterminestheprivilegesthatauserhas.
Finally,returntothedefaultcontext:
Device:/LocalUserDatabase/AdminUsers>cc
Device:/>
Creating Auditor accounts
Extrauseraccountsinthelocaluserdatabasecanbecreatedasrequiredwitharbitrary
usernamesandpasswords.IfthegroupisspecifiedasAdministrators,ithasfullaccess
privileges.
If,however,thegroupisspecifiedasthetextstringAuditors,theuserwillonlyhaveread‐only
privilegesandwillnotbeabletomakeconfigurationchanges.Thefollowingcommands
createanauditoraccountwithausernameofauditandapasswordofaudit:
Device:/>ccLocalUserDatabaseAdminUsers
Device:/LocalUserDatabase/AdminUsers>addUseraudit
Password=audit
Groups=Auditors

2
Management
14
Acompletelistingofthisdatabasewillshowthenewaccount:
Device:/LocalUserDatabase/AdminUsers>show
User
NameGroupsComments
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
adminAdministrators<empty>
+auditAuditors<empty>
Device:/LocalUserDatabase/AdminUsers>cc
Device:/>
Here,thegroupnameAuditorsisatextstringanditsmeaningispredefinedintheSEG.The
plussign“+”nexttothenewuserauditindicatesthatthisobjecthasnotyetbeencommitted
totheconfiguration.
Linking logins to the database
Thelocaluserdatabaseisreferredtoduringaloginbecausetherelevantaccessobjectpoints
toanAuthenticationProfile,whichthenpointstothedatabasethatstoresthecredentials.
Forexample,SSHloginsarecontrolledbyaRemoteMgmtSSHobject.Thisobjectreferstoan
AuthenticationProfileobjectthatthenreferstothedatabasetobeusedforauthentication.
AuthenticationProfileobjectsarediscussedfurtherinAuthenticationonpage153.The
diagrambelowillustratestherelationshipbetweenthevariouscomponents.
Figure 1. Local user database usage with SSH

2
Management
15
Command line interface
TheCLIprovidesacomprehensivesetofcommandsthatallowthedisplayandmodificationof
aSEGconfiguration.ThissectionprovidesonlyasummaryforusingtheCLI.Foracomplete
referenceforallCLIcommands,seetheSEG‐100CommandLineInterfaceReference.
CLI access methods
TheCLIisaccessibleinoneoftwoways:
•RemotelythroughanetworkconnectiontoanEthernetinterfaceonthehardware
platform,usingtheSecureShell(SSH)protocolfromanSSHclient.
SSHaccessiscontrolledbyapredefinedRemoteMgmtSSHconfigurationobject.
•LocallythroughtheRS232serialconsoleconnectionportofaSEG,usingaconsoleor
consoleemulator.
AccessiscontrolledbyapredefinedComPortAccessconfigurationobjectcalledCOM1.
Controlling SSH access
TheSecureShell(SSH)protocolcanbeusedtoaccesstheCLIoveranetworkfromaremote
hostviaoneoftheEthernetinterfaces.SSHisenabledbydefaultonthedefaultmanagement
Ethernetinterface.
SSHisaprotocolprimarilyusedforsecurecommunicationoverinsecurenetworks,providing
strongauthenticationanddataintegrity.SSHclientsarefreelyavailableforalmostall
hardwareplatforms.TheSEGsupportsversion2oftheSSHprotocol.
ApredefinedRemoteMgmtSSHobjectcontrolsinitialSSHaccessonthedefaultmanagement
interface.AsingleRemoteMgmtSSHobjectexistsbydefaultinaSEGconfigurationandcanbe
displayedwiththeCLIcommand:
Device:/>showRemoteManagementRemoteMgmtSSH
ThefollowingoutputconfirmsthatSSHaccesshasbeenabledonthesfp1interfacefromthe
sfp1_netnetwork.
NameInterfaceNetwork
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
ssh_mgmtsfp1sfp1_net
AuthenticationforSSHaccessiscontrolledbytheAuthProfilepropertyofthe
RemoteMgmtSSHobject.BydefaultthisissettoapredefinedAuthenticationProfileobject
calledMgmtAuthProfile.Thisprofilepointstothepredefinedlocaluserdatabasethat
containsadefaultadministratoraccountwiththecredentials:
•Username:admin
•Password:admin
Toremoveusername/passwordauthenticationforSSH,theauthenticationprofilemustbeset
tonothingandthecommandwouldbe:
Device:/>setRemoteManagementRemoteMgmtSSHssh_mgmtAuthProfile=

2
Management
16
Toaddbacktheoriginalauthentication:
Device:/>setRemoteManagementRemoteMgmtSSHssh_mgmt
AuthProfile=MgmtAuthProfile
TheSourcepropertyoftheMgmtAuthProfilewillbeassignedthenameofthelocaluser
databasetouseforauthentication.
Troubleshooting SSH access problems
IftheSSHconsoleistimingoutwhenattemptingSSHaccess,thereareanumberofpossible
reasons:
•UsethelocalconsoleCLItocheckthattheSEGSSHserverisrunning:
Device:/>sshserver
SSHServerPortConnectedclientsStatus
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
ssh_allnets221Running
Intheoutputshown,theserverisclearlyrunning.IfthestatuswasnotRunningorifthe
commandreturnedanewCLIpromptwithnooutput,therewasmostlikelyaproblem
withtheinitialconfigurationoftheSSHserver.
•ChecktheconfigurationoftheRemoteMgmtSSHobject.Ifthisobjectisincorrectly
specifiedoninitialstartup,theSSHservermaynotrun.CheckthattheRemoteMgmtSSH
isenabledandthatavalidauthenticationprofilehasbeenspecifiedandthattheprofile
pointstoavaliddatabasecontainingauserwiththelogincredentialsexpected.
ARemoteMgmtSSHobjectwithanexamplenameofssh_allnetscanbedisplayedwiththe
command:
Device:/>showRemoteManagementRemoteMgmtSSHssh_allnets
Controlling console access to the CLI
TheCLIcanalsobeaccessedusingaconsoleterminalconnecteddirectlytoanRS232porton
thesecuritygatewayhardware.Accessthroughaconsoleportiscontrolledbyapredefined
COMPortAccessconfigurationobjectnamedCOM1.Thiscanbedisplayedwiththecommand:
showCOMPortAccess
PortBpsDatabitsParityStopbitsFlowcontrolRowsCols
‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
COM11152008None1None4080
AnAuthenticationProfileisassociatedwiththeComPortAccessobjecttospecify
authentication.Inthedefaultconfiguration,noprofileisspecifiedsothereisno
username/passwordpairrequiredforconsolelogin.ThesameprofileusedbydefaultforSSH
couldbeassociatedwithconsoleaccessbyusingthecommand:
Device:/>setCOMPortAccessCOM1AuthProfile=MgmtAuthProfile

2
Management
17
Frequently used commands
ThefollowingcommandswillprobablybethemostoftenusedwiththeCLItomanipulate
differentSEGobjects:
•add:Addsanobject,suchasanIPaddressorarule,toaSEGconfigurationalongwitha
setofrequiredpropertiesfortheobject.
•set:Setsoneormoreconfigurationobjectpropertiestogivenvalues.Forexample,setting
thesourceinterfaceforagivenIPrule.
•show:Displaysthecurrentvaluesofaparticularobjectorsetofconfigurationobjects.
•delete:Deletesaspecificconfigurationobject.
CLI command structure
CLIcommandscommonlyhavethestructure:
<command><object_category><object_type><object_name>
Forexample,todisplayanIPaddressobjectcalledmy_address,enter:
Device:/>showAddressIPAddressmy_address
TheobjectcategoryinthiscaseisAddressandthetypewithinthiscategoryisIPAddress.
Iftheobjecttypeisunique,itscategorycanbeomitted.Thesameexampleasabovecouldbe
shortenedto:
Device:>showIPAddressmy_address
Inthiscase,theobjectcategoryAddressisomittedsinceIPAddressisauniqueobjecttype.
Note:Tabcompletionwillnotworkuntiltheentireobjecttypeisenteredwhenomittingthe
objectcategory.
Thesameobjectnamecouldbeusedwithintwodifferentcategoriesortypes,althoughthisis
bestavoidedinordertoavoidambiguitywhenreadingconfigurations.
Note:Thetermcategoryisalsosometimesreferredtoasthecontextofanobject.
Acommandsuchasaddcanalsoincludeobjectproperties.ToaddanewIPAddressobject
withanIPv4addressof10.49.02.01,thecommandwouldbe:
Device:/>addAddressIPAddressmy_addressAddress=10.49.02.01

2
Management
18
Tab completion displays allowed properties only
Therearesomeimportantprinciplestounderstandwhenusingtabcompletionforobject
properties:
•Thepropertiesofanobjectareeitherrequiredoroptional.Whenusingtabcompletion,
optionalpropertiesarenotdisplayeduntilallrequiredpropertieshavebeenassigneda
value.
•Anoptionalproperty’susecandependonthevaluespecifiedforanotherproperty.For
example,inanIPsecTunnelobject,theoptionalProxyARPpropertycanbeusedonlywhen
theAddRouteToRemoteNetworkpropertyhasbeensettoYes.
Thetabcompletionfeatureisawareofthesedependenciesandwillnotdisplayaproperty
ifitisdependentonanotherpropertythathasnotyetbeenassignedavalue.Lookingat
theIPsecTunnelexampleagain,tabcompletionwilldisplaytheProxyARPpropertyonlyif
theAddRouteToRemoteNetworkpropertyhasbeenalreadybeenassignedavalueofYes.
CLI help
TheCLIhelpcommandwillshowallavailablecommandoptions.Typinghelpfollowedbya
commandnamewillshowhelpinformationforthatcommand,providingdetailsaboutthe
command'sfunctionanditsoptions.
Forexample:
Device:/>helptime
COMMAND
time(t).Displayandsetcurrentsystemtime.
"
"
TypingthisCLIcommandprovidesinformationaboutthehelpcommanditself:
Device:/>helphelp
Configuration object help
Asecondhelpcommand,helpconfig,providesinformationaboutaparticularobjecttypeor
categoryofobjects.
CLI command history
JustlikeacommandconsoleinmanyversionsofMicrosoftWindows™,theupanddown
arrowkeysenableyoutomovethroughthelistofcommandsintheCLIcommandhistory.For
example,pressingtheuparrowkeyoncewillmakethelastcommandexecutedappearatthe
currentCLIprompt.Afteracommandappears,itcanbere‐executedinitsoriginalformor
changedfirstbeforeexecution.

2
Management
19
Tab completion
Rememberingaswellastypingcommandsandtheiroptionscanbedemanding.TheSEG
providesafeaturecalledtabcompletion,whichmeansthatpressingtheTabkeywillcause
automaticcompletionofthecurrentpartofthecommand.Ifcompletionisnotpossible,
pressingtheTabkeywilldisplaytheavailablecommandoptions.
Tabcompletiondisplaystherequiredobjectpropertiesfirst,andthenshowsanyoptional
propertieswhenallthemandatoryoneshavebeencompleted.
Specifying the default value
Theperiod(.)characterbeforeatabcanbeusedtoautomaticallyfillinthedefaultvaluefor
anobjectproperty.Forexample:
addLogReceiverLogReceiverSysloglog_example
Address=example_ipLogSeverity=.(tab)
WillfillinthedefaultvalueforLogSeverity:
addLogReceiverLogReceiverSysloglog_exampleAddress=example_ip
LogSeverity=Emergency,Alert,Critical,Error,Warning,Notice,Info
Thisseveritylistcanthenbeeditedwiththebackarrowandbackspacekeys.Adefaultvalueis
notalwaysavailable.Forexample,theActionofanIPrulehasnodefault.
Anotheruseoftheperiodcharacterbeforeatabistoautomaticallyfillinthecurrentvalueof
anobjectpropertyinacommandline.Forexample,youmighttypetheunfinishedcommand:
setAddressIPAddressInterfaceAddresses/sfp1_ip=
Ifyounowtype“.”followedbyatab,theSEGwilldisplaythecurrentvaluefortheAddress
property.Forexample,ifthevalueis10.6.58.10,theunfinishedcommandlinewill
automaticallybecome:
setAddressIPAddressInterfaceAddresses/sfp1_ip=10.6.58.10
TheSEGautomaticallyinsertsthecurrentvalueof10.6.58.10,whichcanthenbechanged
withthebackspaceorbackarrowkeysbeforecompletingthecommand.
Object categories and tab completion
Asmentionedabove,objectsaregroupedbytype,forexample,IPAddress.Typesthemselves
aregroupedbycategory.ThetypeIPAddressbelongstothecategoryAddress.Categoriesare
usedbytabcompletionwhensearchingfortherightobjecttypetouse.
IfyouenteracommandsuchasaddandpresstheTabkey,theSEGdisplaysalltheavailable
categories.BychoosingacategoryandthenpressingtheTabkeyagain,alltheobjecttypesfor
thatcategoryaredisplayed.Usingcategoriesmeansthatthereisasimplewaytospecifywhat
kindofobjectisbeingspecified,andthatamanageablenumberofoptionsaredisplayedafter
pressingtheTabkey.

2
Management
20
Selecting object categories
Withsomecategories,itisnecessarytofirstchooseamemberofthatcategorywiththecc
(changecategoryorcontext)commandbeforeindividualobjectscanbemanipulated.Thisis
thecase,forexample,withroutes.Therecanbemorethanoneroutingtable,sowhenadding
ormanipulatingaroute,youmustfirstusethecccommandtoidentifywhichroutingtable
youareinterestedin.
Supposearouteistobeaddedtotheroutingtablemain.Thefirstcommandwouldbe:
Device:/>ccRoutingTablemain
Device:/RoutingTable/main>
Noticethatthecommandpromptchangestoindicatethecurrentcategory.Youcannowadd
theroute:
Device:/RoutingTable/main>addRouteInterface=sfp1
Network=sfp1_netName=new_route1
Todeselectthecategory,thecommandiscconitsown:
Device:/RoutingTable/main>cc
Device:/>
Thecategoriesthatrequireaninitialcccommandbeforeobjectmanipulationhavea“/”
characterfollowingtheirnameswhendisplayedbyashowcommand.Forexample:
RoutingTable/.
Inserting into rule lists
RulelistssuchastheIPrulesethaveanorderingthatisimportant.Withtheaddcommand,
thedefaultistoaddanewruletotheendofalist.Whenplacementataparticularpositionis
crucial,theaddcommandcanincludetheIndex=propertyasanoption.Insertingatthefirst
positioninalistisspecifiedwithIndex=1inanaddcommand,thesecondpositionwith
Index=2andsoon.
Referencing by name
YoucanoptionallynamesomeobjectsusingtheName=propertywiththeaddcommand.An
object,suchasanIPrule,willalwayshaveanIndexvaluethatindicatesitspositionintherule
listbutcanoptionallybeallocatedanameaswell.Subsequentmanipulationofsucharule
canbedoneeitherbyreferringtoitbyitsindex(listposition)orbyusingitsassignedname.
TheSEG‐100CommandLineInterfaceReferenceliststheoptionsavailableforeachSEG
object,includingName=andIndex=.
Tomakereadingconfigurationseasier,itisstronglyadvisedtoalwaysaddauniquenameto
importantobjectsinanSEGconfiguration.Forexample,IPrulesshouldalwayshavean
appropriatenamespecifiedsothattheirpurposecanbeimmediatelyunderstood.
UsingduplicatenamesfortheNameoptionisallowedbutnotrecommended.
Table of contents
Other RadiSys Gateway manuals