Skip to main content
Versa Networks

Configure Firewalls

Versa-logo-release-icon.png For supported software information, click here.

An interface facilitates the entry of traffic into a network and the exit of traffic from a network. A Versa Operating SystemTM (VOSTM) firewall provides a mechanism to implement security policies on traffic that enters and exits the firewall using the interface. This article describes how to configure a VOS device to be a standalone firewall instance.

VOS Firewall Deployment Overview

You can deploy a VOS firewall in the following ways:

  • Virtual-wire deployment
  • Layer 2 deployment
  • Layer 3 deployment
  • Physical NICs
  • Virtual NICs

Virtual-Wire Deployment

VOS devices support virtual wire, which is also referred to as bump in the wire. A virtual wire on a VOS device consists of two interfaces that are configured as an inline pair. If traffic flows through a physical wire and the wire is snipped, two ends are created on the wire where the cut is made. You plug these two ends of the physical wire into the two virtual interfaces configured on the VOS device, which allows the VOS device to emulate a virtual wire that connects both ends of the physical wire. The traffic received on either end of the physical wire is forwarded to the other interface of the virtual wire. You can apply firewall policies to virtual wire interfaces to enforce the security policies on all the traffic received at both the ends of the physical wire that terminates on the virtual wire interface. The traffic is forwarded on the physical wire only if the security policy allows the traffic to be forwarded.

Note that virtual-wire interfaces do not have IP addresses.

For interfaces that do not require VLAN support, create a single subinterface and set the VLAN tag value to 0.

Layer 2 Deployment

VOS devices support VLAN-based subinterfaces. An interface whose name start with vni is a VLAN-tagged traffic interface. Examples of interfaces names are vni-0 and vni-1.

For interfaces that require VLAN support, you create multiple subinterfaces, where each subinterface maps to an individual VLAN ID. For each tenant hosted on the VOS device, the traffic is identified using one or more subinterfaces. These subinterfaces map to the corresponding VLAN IDs.

Layer 3 Deployment

VOS devices support routed, or Layer 3, interfaces. The interface associated with each physical network interface (PNIC) or virtual network interface (VNIC) is configured with an IP address. Based on the routing configuration, the traffic from the tenant is forwarded to the interfaces on the VOS device. The VOS device supports several routing instances or virtual routing functions (VRFs). Each VRF is associated with one or more interfaces on the VOS device, and the VOS device supports static routing, BGP, and OSPF.

The traffic of a particular tenant enters a VOS device because the IP address of the routed interface is the next-hop address of the tenant traffic’s final destination. You can apply firewall policies on the traffic entering a VOS device, and the traffic is routed to the next hop (based on routing configuration) only if the security policy allows the traffic to be forwarded.

You can install a VOS firewall device as a bare metal or a virtual machine (VM). The security policies are applied to the traffic that enters the firewall through physical or virtual interfaces. The VOS firewall recognizes VLAN tags for incoming traffic and adds the appropriate VLAN tags to the outbound traffic.

Physical NIC Deployment

You can deploy the VOS firewall on a bare-metal device to implement security protection for traffic from a PNIC. When you configure traffic on a PNIC, you may encounter one of the following scenarios:

  • Non-VLAN Traffic—Traffic that is not tagged with VLAN and enters the firewall using PNIC is mapped to a single tenant.
  • VLAN Traffic—Traffic tagged with VLAN is mapped to one or more tenant. The VOS device creates a unique subinterface for each VLAN. Use one or more VLAN to configure the traffic identification for each tenant hosted on the VOS device.

Virtual NIC Deployment

You can deploy the VOS firewall on a VM to implement security protection for traffic from a VNIC. You use a hypervisor, such as VMware ESXi or KVM, to create a VNIC and map it to the PNIC on which the hypervisor is running or to a specific VLAN for traffic tagged with VLAN that enter the network using PNIC.

The following are typical scenarios for configuring traffic on a VNIC:

  • VLAN-mapped VNIC— If the VNIC is mapped by the hypervisor to a specific VLAN for the traffic that enters through the PNIC, then when the traffic enters the firewall through the VNIC, the VLAN is already stripped by the hypervisor. Therefore, all the traffic that enters through the VNIC is mapped to a single tenant. In this scenario, a single VNIC cannot support traffic from multiple tenants.
  • PNIC-mapped VNIC with non-VLAN traffic—When the hypervisor directly maps the VNIC to the PNIC without any VLAN stripping and if the traffic that enters the firewall through the VNIC is not VLAN tagged, all traffic that enters through the VNIC is mapped to a single tenant.
  • PNIC-mapped VNIC with VLAN traffic—When the hypervisor directly maps the VNIC to the PNIC without any VLAN stripping and if the traffic that enters the firewall through the VNIC is VLAN tagged, traffic that belongs to different VLANs is mapped to one or more tenants.
  • You create a unique subinterface for each VLAN. You can configure the traffic identification using one or more VLANs for each tenant hosted on the VOS device.

Configure Physical and Virtual NICs

For VOS firewalls, you configure a single Layer 3 interface or multiple Layer 3 interfaces for untagged routed traffic, and then you connect the firewall to an adjacent device using a trunk to define a Layer 3 subinterface for traffic with a specific VLAN tag. For each Ethernet port that you configure as a Layer 3 interface, you can define an additional logical Layer 3 interface (as a subinterface) for each VLAN tag. The subinterface handles the traffic received by the port. In multitenant environments, you use untagged Layer 3 subinterfaces so that each tenant’s traffic leaves the firewall without VLAN tags.

To configure a PNIC or VNIC and a subinterface:

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Interfaces > Ethernet in the left menu bar.
  4. Click the add-icon.png Add icon. In the Add Ethernet Interface popup window, enter information for the following fields.

    ethernetinterface1_networkguide.png
     
    Field Description
    Interface Enter the vni interface port and slot numbers.
    Disable Click to not activate the interface after you configure it.
    Description Enter a description for this interface. It can be a text string up to 255 characters.
    Tags Enter tags for the Ethernet interface.
    Promiscuous Click to have the interface accept all data packet sent towards it.
    Virtual Wire Click if the interface is part of a virtual wire.
    Mirror Interface Click to create a copy of the interface.
    PPPoE Data Interface Click to have the interface act as a Point-to-Point Protocol over Ethernet (PPPoE) interface. In a PPPoE session, the device encapsulates each PPP frame in an Ethernet frame and transports the frames over an Ethernet loop.
    MTU

    Enter the maximum transmission unit size, in bytes, of the largest protocol data unit that the port can receive or transmit.

    Range: 68 through 9000 bytes

    Bandwidth Tab

     
    • Uplink
    Enter the link bandwidth for uploading data, in Kbps.
    • Downlink
    Enter the link bandwidth for downloading data, in Kbps.
    • Autoconfiguration
    Click to perform an automated test of the device’s downlink and uplink transmission bandwidth.
    • URI
    Enter the URL of the website to use for autoconfiguration testing.
    Others Tab  
    • Link Speed
    Enter the speed of the link.
    • Link Mode
    Select the mode to use on the link. For example, autoduplex.
  5. Select the Aggregate Ethernet tab, and create an aggregate Ethernet interface. For more infomation, see Configure Aggregate Interfaces, below.
  6. Click OK to add the interface to the PNIC/VNIC.

Configure VLAN-Based Subinterfaces

VLAN interfaces route Layer 3 VLAN traffic to non-VLAN destinations. You can define a VLAN interface for each Ethernet port that is configured as Layer 2 interface to allow VLAN traffic to be routed to Layer 3 destinations outside the VLAN.

To create a VLAN-based subinterface:

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Interfaces > Ethernet in the left menu bar.
  4. Click the add-icon.png Add icon to add an Ethernet interface. The Add Ethernet Interface popup window displays.

    ethernetinterface1_networkguide.png
  5. Select the Ethernet tab, click the Subinterfaces option, and click the add-icon-blue.png Add icon. The Add Subinterface popup window displays. Enter information for the following fields.

    176-1.png
     
    Field Description
    Unit Enter the unit number of the subinterface. An interface can have up to 4095 subinterfaces.
    VLAN ID Enter the virtual LAN ID.
    Range: 0 through 4094
    Disable Click to not activate the subinterface after you configure it.
    Description Enter a description for the subinterface. It can be a maximum of 255 characters.
    MTU

    Enter the maximum transmission unit size, in bytes, of largest protocol data unit (PDU) that the port can receive or transmit.

    Range: 68 through 9000 bytes

    IPv4 (Tab)  
    • Static Address
    Click to configure a static IPv4 address for the subinterface.
    • DHCPv4
    Click to use DHCPv4 to obtain an address for the subinterface.
    • Route Preference
    Enter the preference for the traffic route. A lower value indicates a higher preference.
    • Disable Broadcast Flag
    Click to disable broadcast on the subinterface's network.
    • Reachability Monitor
    Configure ICMP to monitor subinterface reachability.
    • Enable ICMP
    Click to enable ICMP on the subinterface.
    • Interval
    Enter the time interval after which ICMP reports error messages.
    • Threshold
    Enter the maximum number of ICMP error messages to report.
    • FQDN
    Enter the fully qualified domain name for the subnet.
    • Directed Broadcast
    Click to enable directed broadcast, which sends broadcast packets targeted at hosts in a specified subnet.
    IPv6 (Tab)  
    • Static Address
    Click to configure a static IPv6 address for the subinterface.
    • IPv6 Interface Mode

    Select the IPv6 interface mode:

    • Host
    • Router
    • FQDN
    Enter the fully qualified domain name for the subnet.
    • Delegated Prefix Pool
    Enter the name and IP address of the delegated prefix pool.
    • DHCPv6

    Click to use DHCPv6 to obtain an address for the subinterface.

  6. Select the Static ARP tab to configure a static MAC address for an IP address. Enter information for the following fields, and then click the add-icon-green.png Add icon.

    3.png
     
    Field Description
    Subnet Address/Mask Select the address of the subnet
    Host IP Address Enter an IP address that is within the subnet.
    MAC Address Enter the MAC address of the device.
  7. Select the VRRP tab, and then click the add-icon-blue.png Add icon. The Add VRRP Group popup window displays. In this window you configure a VRRP primary and a VRRP secondary device in redundancy mode, which is a high availability (HA) mode in which the VRRP secondary device takes over as the primary device when the primary device is down.

    ethernetinterface3_networkguide.png
  8. Select the General tab, and enter information for the following fields.
     
    Field Description
    Group ID Enter the ID of the VRRP group.
    Address Enter the IP address of the VRRP group.
    Priority Assign a priority to the group. A higher priority indicates that the VRRP device is a primary device.
    Inherit Configuration

    Select to inherit the properties of another subinterface's configuration.

    • Interface Name
    Select the interface whose properties to inherit.
    • VRRP Group ID
    Select the VRRP group ID for the interface.
    Preempt Mode

    Select the preemption mode:

    • Preempt—Secondary device takes over when the primary device is down. The original primary device takes over again when it recovers from the failure.
    • No Preempt—Secondary device takes over when the primary device is down. The original primary device continues to function as the secondary device even after it recovers from the failure.
    Advertisements Threshold Enter the number of keep alive messages that are exchanged between the VRRP primary and secondary devices.
    Warmup Interval Enter how long the subinterface waits, in seconds to determine which VRRP device is the primary device and which is the secondary.
    Virtual Address Select the virtual address or addresses to assign to the VRRP device.
    Fast Interval (For VRRPv3.) Enter how long keepalive messages are exchanged between the primary and secondary devices, in milliseconds.
    Accept Data Click to have the subinterface accept data when it is received. Otherwise, the data is routed to another interface.
  9. Select the Track tab, and enter information for the following fields, and then click the add-icon-green.png Add icon where applicable.
     
    Field Description
    HA Slave Priority Cost Enter the backup priority of the VRRP instance. The backup priority must be less than the cost configured for the primary device.
    Priority Hold Time Enter the hold time. When this time expires, the secondary device takes over as the primary device.
    Interface (Tab)
    • Name
    Select the interface on which to configure VRRP.
    • Priority Cost
    Enter the priority cost of the interface.
    Range: 1 through 254
    Routes (Tab)
    • Prefix
    Enter the route prefix.
    • Routing Instance
    Select a routing instance
    • Priority Cost
    Enter the priority cost from 1 through 254.
    Monitors (Tab)
    • Name
    Select a monitor name.
    • Priority Cost
    Enter the priority cost.
    Range: 1 through 254
  10. Click OK.

Configure Aggregate Interfaces

You can combine multiple interfaces to create a single logical aggregate Ethernet interface. The aggregate Ethernet interface handles all the traffic of the mapped interfaces. You can apply firewall policies to the aggregate interfaces to enforce security policies on traffic that belongs to any interface that is mapped to the aggregate interface.

To create an aggregate Ethernet interface:

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Interfaces > Ethernet in the left menu bar.
  4. Click the png;base6479eb956f74a968cf.png Add icon to add an Ethernet interface. The Add Ethernet Interface popup window displays.
  5. In the Ethernet tab, click Aggregate Member and enter information for the following fields.

    ethernetinterface1_networkguide.png
     
    Field Description
    Interface Select the name of the aggregate Ethernet interface.
    LACP Priority

    Enter the interface's LACP priority value. LACP combines the priority number with the router's MAC address to form the system ID, which is used during negotiation with other systems.

  6. Select the Aggregate Ethernet tab, and enter information for the following fields.

    ethernetinterface4_networkguide.png
     
    Field Description
    Interface Enter the interface port number. Note that the name of the aggregate interface starts with ae.
    System ID/MAC Enter the MAC address of the interface.
    Disable Click to not activate the interface after you configure it.
    Description Enter a brief description of the interface.
    Tags Enter a keyword or phrase that allows you to filter the captive portal action. This is useful when you have many interfaces and want to view those that are tagged with a particular keyword.
    MTU

    Enter the maximum transmission unit size, in bytes, of largest protocol data unit the post can receive or transmit in bytes.

    Range: 68 through 9000 bytes

    Virtual Wire Click to have the interface become part of a virtual wire.
    Promiscuous

    Click to have the interface accept all the data packets that it receives.

    Subinterface (Tab) Select to create subinterfaces.
    LACP (Tab) Select to configure an LACP system priority, which you can configure on each router running LACP. LACP combines the system priority and the router MAC address of the router to create the LACP system ID, and it uses the system priority when negotiating with other systems.
  7. Click the Subinterfaces tab, and then click the add-icon-blue.png Add icon. In the Add Subinterfaces popup window, enter information for the fields. For more information, see Configure VLAN-Based Subinterfaces, above.

    176-1.png
  8. Select the LACP tab, and enter information for the following fields.

    1-1.png
     
    Field Description
    System Priority Enter the LACP system priority value. LACP combines the priority number with the router's MAC address to form the system ID, which is used during negotiation with other systems.
    Max Links

    Enter the maximum number of LACP links.

    Periodicity Select the frequency for LACP
    Mode

    Select the LACP mode:

    • Active
    • Passive
  9. Click OK.

Configure Tunnel Interfaces

Two VOS devices establish an IPsec tunnel and HA between them, and they use the tunnel for VPN traffic termination. The VOS devices support site-to-site VPN or SD-WAN traffic. An SD-WAN setup has multiple tunnel interfaces that connect a VOS branch device with a Controller node. You can apply firewall policies to the tunnel interfaces to enforce security policies on traffic that is extracted or decrypted from the tunnel after VPN termination.

Tunnel interface names start with tvi. Examples of tunnel interface names are tvi-0 and tvi-1.

To configure a tunnel interface:

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Interfaces > Tunnel in the left menu bar. The Add Tunnel Interface popup window displays.

    177-1.png
  4. Select the Tunnel tab, and enter information for the following fields.

    Field Description
    Interface

    Enter the slot and port number for the tunnel interface. Note that a tunnel interface always has a tvi prefix.

    Disable Click to not activate the interface after you configure it.
    Description Enter a brief description of the tunnel interface.
    MTU

    Maximum transmission unit size, in bytes, of largest protocol data unit that the port can receive or transmit.

    Range: 68 through 9000 bytes

    Mode

    Select the tunnel interface mode:

    • IPsec—For IPsec configurations.
    • Redundancy—For HA configurations.
    Tunnel Type

    Select the tunnel type:

    • Ethernet-over-GRE—Use to allow customers to leverage existing low-end residential gateways to provide mobility services to mobile nodes.
    • Paired
    • Point-to-multipoint clear-text SD-WAN tunnel.
    • Point-to-multipoint GRE tunnel—Use GRE to send packets from one network to another over the internet or an insecure network.
    • Point-to-multipoint IPsec tunnel—Use to protect site-to-site traffic between networks.
    • Point-to-multipoint secure SD-WAN tunnel.
    • Point-to-multipoint VXLAN tunnel—Virtual Extensible LAN (VXLAN) is a network virtualization technology. It addresses endpoints, which terminate VXLAN tunnels and may be either virtual or physical switch ports. These are known as VXLAN tunnel endpoints (VTEPs).
    • Point-to-point GRE tunnel—Use to enable the IPsec configuration between a local Controller and a Controller in the cloud.
    • Point-to-point IPsec tunnel
    • Point-to-point IPv6 GRE tunnel
    • PPPoE—Use with DSL services in which individual users connect to a DSL modem over Ethernet.
    Subinterface

    Select a subinterface and enter values for the following parameters:

    • Unit—Unit number of the subinterface. Enter a value of 0 to disable VLAN ID.
    • IP Address/Mask—IP address and subnet mask of the subinterface.
  1. Click OK.

Configure a Pseudo-Tunnel Interface

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Interfaces > Tunnel in the left menu bar. The Add Tunnel Interface popup window displays.
  4. Select the Tunnel tab, and enter information for the following fields.

    178-1.png
     
    Field Description
    Name

    Enter a name for the pseudo-tunnel interface. A pseudo-tunnel interface has the prefix ptvi.

    Parent Interface Select the parent interface for the pseudo-tunnel.
    Remote IP Address Enter the IP address of the remote Controller node.
    Enable/Disable

    Select enable to activate the pseudo-tunnel after you configure it.

    Select disable to not activate the pseudo-tunnel after you configure it.

  5. Click OK.

Configure a Virtual Wire

A virtual wire binds two Ethernet ports together, allowing transparent installation of a VOS firewall in the network with minimum configuration. A virtual wire accepts all traffic or traffic with selected VLAN tags. It does not provide switching or routing services.

The two virtual network interfaces (vni interfaces) that form a virtual wire must have identical subinterfaces.

When you configure a virtual wire, you do not need to change the configuration of neighboring network devices.

To create a virtual wire:

  1. In the Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Devices > Devices in the horizontal menu bar.
    3. Select an organization in the left menu bar.
    4. Select a Controller node in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Networking networking-icon.png > Virtual Wires in the left menu bar.
  4. Click the add-icon.png Add icon. The Add Virtual Wire popup window displays. Enter information for the following fields.

    Add Virtual Wire Page.png
     
    Field Description
    Name Enter a name for the virtual wire.
    Interface1 Select the first interface.
    Interface2 Select the second interface.
    Link-State Passthrough Select to inform the second interface about the state of the first interface. For example, if you select this and the first interface is down, traffic must be sent through an alternate route to the second interface.
    Multicast firewalling Currently not supported.
  5. Click OK.

Troubleshoot Firewalls

To troubleshoot firewall-related issues, issue the following commands:

  • show orgs org tenant-name statistics traffic
  • show orgs org tenant-name statistics security-implicit
  • show orgs org tenant-name sessions summary
  • show orgs org tenant-name sessions brief
  • show orgs org tenant-name sessions detail
  • show orgs org-services tenant-name security dos-policies
  • show orgs org-services tenant-name security access-policies

Supported Software Information

Releases 20.2 and later support all content described in this article.

Additional Information

Configure Interfaces