Configuring a VSX Gateway Object in SmartConsole
A Chassis can work as a Security Gateway, or as a VSX Gateway.
This procedure describes the configuration of a VSX Gateway in SmartConsole.
|
Important - While running VSX Gateway Wizard, only one SGM (SMO) should be defined in the Security Group. |
Before creating the VSX Gateway
It is important to know how VSX works, and understand the VSX architecture and concepts. It is also important to understand how to deploy and configure your security environment using VSX Virtual Devices:
-
Virtual System
-
Virtual System in Bridge Mode
-
Virtual Switch
To learn about how VSX works, architecture, concepts and Virtual Devices, see the R81 Scalable Platforms VSX Administration Guide.
The VSX Gateway Wizard
The VSX Gateway in this example has one Virtual System (VS0) and one dedicated management interface.
After you complete the VSX Gateway Wizard, you can change the VSX Gateway definition from SmartConsole.
For example, you can add Virtual Systems, add or delete interfaces, or configure existing interfaces to support VLANs.
|
Notes:
|
To start the VSX Gateway wizard:
Step |
Instructions |
---|---|
1 |
Connect with SmartConsole to your Management Server. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Create a new VSX Gateway object in one of these ways:
The VSX Gateway Wizard opens. |
Wizard Step 1: Defining VSX Gateway General Properties
On the VSX Gateway General Properties (Specify the object's basic settings) page:
-
In the Enter the VSX Gateway Name field, enter the applicable name for this VSX Gateway object.
-
In the Enter the VSX Gateway IPv4 field, enter the same IPv4 address that you configured on the Management Connection page of the Security Group's First Time Configuration Wizard.
-
In the Enter the VSX Gateway IPv6 field, enter the same IPv6 address that you configured on the Management Connection page of the Security Group's First Time Configuration Wizard.
-
In the Select the VSX Gateway Version field, select R81.
-
Click Next.
Wizard Step 2: Selecting Virtual Systems Creation Templates
On the Virtual Systems Creation Templates (Select the Creation Template most suitable for your VSX deployment) page:
-
Select the applicable template.
-
Click Next.
The Creation Templates page determines predefined, default topology, and routing definitions for Virtual Systems.
This makes sure that Virtual Systems are consistent and makes the definition process faster.
You always have the option to override the default creation template when you create or change a Virtual System.
The creation templates are:
-
Shared Interface- Not supported for the Chassis.
-
Separate Interfaces - Virtual Systems use their own separate internal and external interfaces. This template creates a Dedicated Management Interface (DMI) by default.
-
Custom Configuration - Defines Virtual System, Virtual Switch, and Interface configurations.
This procedure describes the Custom Configuration template.
Wizard Step 3: Establishing SIC Trust
On the VSX Gateway General Properties (Secure Internal Communication) page:
-
In the Activation Key field, enter the same Activation Key you entered during the Security Group's First Time Configuration Wizard.
-
In the Confirm Activation Key field, enter the same Activation Key again.
-
Click Initialize.
-
Click Next.
If you entered the correct activation key, the Trust State changes to "Trust established
".
Wizard Step 4: Defining Physical Interfaces
On the VSX Gateway Interfaces (Physical Interfaces Usage) page:
-
Examine the list of the interfaces - it must show all the physical interfaces on the VSX Gateway.
-
If you plan to connect more than one Virtual System directly to the same physical interface, you must select VLAN Trunk for that physical interface.
-
Click Next.
Virtual Network Device Configuration
|
Notes:
|
To define a Virtual Device with a shared interface:
Step |
Instructions |
||
---|---|---|---|
1 |
Select Create a Virtual Device. |
||
2 |
Select the Virtual Network Device type > Virtual Switch. |
||
3 |
Select the shared physical interface to define a non-DMI gateway. Do not select the management interface, if it is necessary to define a Dedicated Management Interface (DMI) gateway. If you do not define a shared Virtual Device, a DMI gateway is created by default.
|
||
4 |
The IP address and Net Mask options are not available for a Virtual Switch. |
||
5 |
Optional: Define a Default Gateway for a Virtual Router (DMI only). |
Wizard Step 5: VSX Gateway Management
On the VSX Gateway Management (Specify the management access rules) page:
Step |
Instructions |
---|---|
1 |
Examine the default access rules. |
2 |
Select the applicable default access rules. Select Allow to pass traffic on the selected services. Clear the Allow option to block traffic on this service. By default, all services are blocked. For example, to be able to ping the VSX Gateway from the Management Server, allow ICMP Echo-Request traffic. |
3 |
Configure the applicable source objects, if needed. Click the arrow and select a Source Object from the list. The default value is *Any. Click New Source Object to define a new source. You can modify the Security Policy rules that protect the VSX Gateway later. |
4 |
Click Next |
|
Important:
|
This Security Policy consists of predefined rules for these services:
-
TCP - SSH traffic and HTTPS traffic
-
UDP - SNMP requests
-
ICMP - Echo-Request (ping)
Wizard Step 7: Completing the VSX Wizard
On the VSX Gateway Creation Finalization page:
Step |
Instructions |
---|---|
1 |
Click Finish and wait for the operation to finish. This may take several minutes to complete. |
2 |
Click View Report for more information. |
3 |
Click Close. |
Confirming the VSX Gateway Software Configuration
To make sure that the policy was successfully installed:
Step |
Instructions |
|
---|---|---|
1 |
Connect to the Security Group over SSH or serial console. |
|
2 |
Log in to the Expert mode. |
|
3 |
Run:
![]() This example shows the output for a Dual Chassis VSX Gateway. Chassis 1 (Active) has 1 SGM in its Security Group. |
|
4 |
You can now add more SGMs to the Security Group. Run this command in Gaia gClish:
|
|
5 |
After all SGMs are in the UP state and enforce the Security Policy again, you can add Virtual Systems to the VSX Gateway in SmartConsole. |