This section explains how to create a new VSX Gateway using the VSX Gateway Wizard. After you complete the VSX Gateway Wizard, you can change the VSX Gateway definition from SmartConsole. For example, you can add or delete interfaces, or configure existing interfaces to support VLANs.
To start the VSX Gateway wizard:
The General Properties page of the VSX Gateway Wizard opens.
Configure these parameters on the General Properties page:
Note: If you define an IPv6 IP address you must also define an IPv4 address.
The Creation Templates page lets you configure predefined, default topology and routing definitions for Virtual Systems. This makes sure that Virtual Systems are consistent and makes the definition process faster. You always have the option to override the default creation template when you create or change a Virtual System.
The Creation Templates are:
For this example, choose Custom configuration.
Initialize SIC trust between the VSX Gateway and the Management Server. They cannot communicate without Trust.
When you create a VSX Gateway, you must enter the Activation Key that you defined in the installation wizard setup program. Enter and confirm the activation key and then click Initialize. If you enter the correct activation key, the Trust State changes to Trust established
.
If SIC trust was not successfully established, click Check SIC Status to see the reason for the failure. The most common issues are an incorrect activation key and connectivity problems between the management server and the VSX Gateway.
Troubleshooting to resolve SIC initialization problems:
cpconfig
utility to re-initialize SIC. After this process completes, click Reset in the wizard and then re-enter the activation key.For more about resolving SIC initialization, see the R80.20 Security Management Administration Guide.
Resetting SIC takes 3-5 minutes.
If resetting of the SIC was interrupted (for example, by loss of network connectivity), run the g_all cp_conf sic state
command to get the SIC state and follow these steps:
SIC state |
Do this |
---|---|
|
Repeat the SIC reset procedure. |
|
|
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup in the Expert mode:
|
In the VSX Gateway Interfaces window, define physical interfaces as VLAN trunks. The window shows the interfaces currently defined on the VSX Gateway.
To define an interface as a VLAN trunk, select VLAN Trunk for the interface.
Note - If you chose Shared Interface or Separate Interface, proceed to Wizard Step 5.
If you chose the Custom Configuration option, the Virtual Network Device Configuration window opens. In this window, define a Virtual Device with an interface shared with the VSX Gateway. If you do not want to define a Virtual Device at this time, click Next to continue.
To define a Virtual Device with a shared interface:
Important - Virtual Routers and Virtual Switches are not supported (see Known Limitations 01413513 and MBS-5214).
Do not select the management interface if you want to define a Dedicated Management Interface (DMI) gateway. If you do not define a shared Virtual Device, a DMI gateway is created by default.
Important - This setting cannot be changed after you complete the VSX Gateway Wizard. If you define a non-DMI gateway, you cannot change it to a DMI gateway later.
These options are not available for a Virtual Switch.
In the VSX Gateway Management window, define security policy rules that protect the VSX Gateway. This policy is installed automatically on the new VSX Gateway.
Note - This policy applies only to traffic destined for the VSX Gateway. Traffic destined for Virtual Systems, other Virtual Devices, external networks, and internal networks is not affected by this policy.
The security policy consists of predefined rules for these services:
To modify the Gateway Security Policy:
For example, to be able to ping the gateway from the management server, allow ICMP echo-request traffic.
The default value is *Any. Click New Source Object to define a new source.
You can modify the security policy rules that protect the VSX Gateway later.
Click Next to continue and then click Finish to complete the VSX Gateway wizard.
This may take several minutes to complete. A message shows successful or unsuccessful completion of the process.
If the process ends unsuccessfully, click View Report to see the error messages. See Troubleshooting.
For example, to be able to ping the gateway from the Management Server, allow ICMP echo-request traffic.
The default value is *Any. Click New Source Object to define a new source.
You can configure a Security System to run fwk
as a 64 bit process. This lets VSX Virtual Systems use more than 4 GB of RAM, which significantly increases the concurrent connection capacity for each Virtual System.
Use the vs_bits
command to configure fwk
to run in the 64 or 32 bit mode. The system automatically reboots when you run the command.
Important: Run the vs_bits
command only from a VS0 context.
For Security Groups: Important - This configuration requires maintenance windows because a full reboot is required for both Chassis. |
Syntax:
vs_bits [-stat | 32 | 64 ]
Parameter |
Description |
|
Shows the current |
|
Run |
|
Run |
Examples:
This example changes the fwk
mode to 64 bits:
vs_bits 64
This example shows the fwk
modes:
# vs_bits -stat
All VSs are at 64 bits
Known limitations:
cpstop;cpstart
.