Skip to main content
Versa Networks

Configure Miscellaneous Parameters

Versa-logo-release-icon.pngFor supported software information, click here.

In the Miscellaneous tab, you can configure the following miscellaneous parameters:

  • Application-level gateway (ALG) profile—ALG is a communication protocol that connects Versa Operating SystemTM (VOSTM) devices with various services. For example, if you want to send files through FTP and to establish calls with VOS devices using SIP, you configure ALG for a branch.
  • Captive portal port for SASE gateway—For the URLs whose access you want to control, you can redirect users to a captive portal webpage on which you can display standard or customized messages that provide information about the webpage. For these webpages, you can control access or block access completely. You can define clear-text (HTTP) and secure traffic ports (HTTPS) for captive portal. For Versa secure access (VSA), you must configure SASE gateway captive portal port as follows:
    • HTTP—80
    • HTTPS—443
  • Loopback interface—You can configure loopback interfaces in routing instances that route large amount of data traffic and that require continuous connectivity. Loopback interfaces are always up. Loopback interfaces are primarily used for OSPF and BGP, because connectivity is never down. A routing instance or domain can have only one loopback interface. For a service provider with two routers, each router has a loopback interface and the routers maintain data connectivity over the loopback interface.
  • Monitor—You can configure and manage all the IP SLA monitor objects for a device using the monitor option.
  • NTP server—You can configure the time settings on a VOS device in NTP mode.
  • Override DF bit—The DF bit override functionality allows you to configure the setting of the DF bit when encapsulating tunnel mode IPsec traffic on a global or per-interface level. If you set the DF bit to clear, routers can fragment packets regardless of the original DF bit setting.
  • Security pack (SPack) automatic update—A security pack (SPack) is a software bundle that contains predefined services and objects that you can use in firewall configurations to protect network devices from security threats. The predefined services include applications, URL categories, URL reputations, IP reputations, IDS and IPS signature definitions, firmware, and antivirus definitions. Versa Networks automatically updates the SPack on the device daily at 23:30 ;(11:30 p.m.) UTC or in the local timezone if the time is set by NTP. After this time, you can check the SPack Version column in the Inventory dashboard to see the latest version of the SPack installed. To check before the scheduled time, click the Refresh icon in the Monitoring dashboard screen and then check the SPack version in the Inventory dashboard.
  • SNAT pool—You can manage all SNAT pools as objects on a device using SNAT pool. SNAT is a method of remapping one IP address space into another by modifying the network address information in a packet's IP header. SNAT is a type of NAT that translates the source IP address in the packet's header to an address that you configure. For SNAT to work, you can configure a source pool IP address that SNAT uses when translating source IP addresses. The SNAT pool is a range of IP addresses, and SNAT selects one of the source IP addresses from this pool. By using the egress network in SNAT pool, one of the IP address, that is allocated to the interface will be used as source address.
  • SNMP—To configure SNMP, you must configure an SNMP profile. You can configure only one LAN or WAN with static IP address. To configure SNMP, you must first lock the device using the enable lock mode option in the honeycomb view in the Titan Portal home screen. The lock icon displays only if the device is deployed. A blue lock icon indicates that the device is unlocked, and a red lock icon indicates that the device is locked. After you publish the changes to Titan Portal, you must unlock the device. A private SASE gateway can modify this configuration only before the device is deployed and activated. To modify the configuration later, contact Versa Networks Customer Support. For more information, see Add an SNMP Profile.
  • Syslog server—Configure a reachable syslog IP server. A syslog server consolidates logs from multiple sources into a single location. Syslog messages contain information that identifies basic information about where, when, and why the log was sent, including the IP address, timestamp, and the actual log message. You configure a syslog server for each VOS device. You can add the port number at the end of the IP address in the format IP Address:PortNumber. The default port number is 514.
  • Traffic shaper—Configure peak ingress rate in kilobits per second (kbps) and the maximum burst size, in bytes per second at the device level to control ingress traffic flow. Before you configure traffic shaper, you must also first lock the device using the enable lock mode option in the honeycomb view in the Titan Portal home screen. A private SASE gateway can modify this configuration only before the device is deployed and activated. To modify the configuration later, contact Versa Networks Customer Support.
  • VNF Manager—The VNF Manager IP is the IP address assigned to the Versa VNF manager, which is used to manage and monitor Virtual Network Functions (VNFs) within the Versa SD-WAN environment.

To configure the miscellaneous parameters:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb, and click Configure to open the site information window.

    configure-menu.png
     
  3. Click the Miscellaneous tab, and enter information for the following fields.

    misc-parameters.png
     
    Field Description
    ALG Profile

    Select the ALG profile:

    • FTP
    • IKE-ESP
    • PPTP
    • SIP
    • TFTP
    Configure SNMP (Group of Fields)  
    • Local Engine ID

    Displays the administratively unique identifier for an SNMPv3 engine. The local engine ID is automatically generated and displayed if you do the following:

    1. In the SNMP profile, configure SNMP Version 3. See Add an SNMP Profile.
    2. Configure a LAN or WAN source interface for SNMP in the Source Interface field.
    3. In the Monitor dashboard, click Sync Configuration in the Device Options card for the device. See Verify Device Status.
    • Source Interface
    Select the LAN or WAN with static IP address to use to reach the SNMP server.
    • Source IP
    Enter the IP address of the SNMP agent.
    Override DF Bit Select the override DF bit with IPsec tunnels to set the DF bit when encapsulating tunnel-mode IPsec traffic on a global or per-interface level. If the DF bit is set to clear, routers can fragment packets regardless of the original DF bit setting.
    Configure NTP Server (Group of Fields)  
    • Set Timezone
    Select the timezone to set on the CPE device.
    • Set NTP Server (IP or Hostname)
    Enter the IP address or hostname of the NTP server.
    • Set Source Network
    Select the source network to use to reach the NTP server.
    Syslog Server IP

    Enter the IP address of the syslog server. Add the port number at the end of the IP address in the format IP Address:PortNumber. The default port number is 514.

    Captive Portal Port Number

    Click the Manage Captive Portal link. In the Captive Portal Port Number popup window, enter information for the following fields.
     

    miscellaneous-captive-portal-port-number1.png
     

    • Network Name (Required)—Click the Please Select drop-down list. In the Network Name popup window, click a WAN network.
    • HTTP—Enter the HTTP port number to use to redirect captive portal pages over HTTP. The default port is 44990. For VSA, configure the SASE gateway captive portal port to 80.
    • HTTPS—Enter the HTTPS port number to use to redirect captive portal pages over HTTPS. The default port is 44991. For VSA, configure the SASE gateway captive portal port to 443.
    Loopback Interface

    Click the Loopback Interface link. In the Loopback Interface popup window, enter information for the following fields. To use this loopback interface, create a new security rule to allow traffic for this source IP address.
     

    miscellaneous-loopback-interface.png

    • Name (Required)—Enter a name for the loopback interface.
    • IP Address (Required)—Enter an IPv4 address for the loopback interface.
    • Routing Instance (Required)—Select a routing instance to use to access the loopback interface.

    Click Add, and then click Continue.

    SNAT Pool

    Click the Manage SNAT Pool link. In the Add SNAT popup window, enter information for the following fields.
     

    steering-rule-web-proxy-bypass-add-snat.png

    • Name (Required)—Enter a name for the SNAT pool.
    • Egress Network (Required)— Select an egress network to use for cloud lookup requests.

    Click Add, and then click Continue.

    Monitor

    Click the Manage Monitor link to configure all IP SLA monitor objects. In the Monitor popup window, enter information for the following fields.

     

    steering-rule-web-proxy-bypass-add-monitor.png
     

    • Name (Required)—Enter a name for the IP SLA monitor object.
    • Monitor Type (Required)—Select the type of packets to monitor on the IP address:
      • DNS
      • ICMP
      • TCP
    • IP Address (Required)—Enter the IP address to monitor.
    • Next Hop—Select the device to use as the next hop.
    • Networks—Select the source network on which to send the probe packets.
    • Source Interface—Select the source interface on which to send the probe packets.

    Click Add, and then click Continue.

    VNF Manager

    Click VNF Manager link to enter the VNF manager IP address, and then click Add.

     

    vnf-manager.png

    Security Pack (SPack) Auto Update

    Click the toggle button to disable automatic updating of the SPack. Before you can disable the SPack update, you must lock the device by selecting the enable lock mode option in the honeycomb view in the Titan Portal > Configure.

    By default, automatic updating of the SPack is enabled.

    For a private SASE gateway, you modify this configuration option only before deploying and activating the device.

    Traffic Shaper (Group of Fields)  
    • Peak Rate

    Enter the peak ingress rate, in kilobits per second (kbps), for the device to control ingress traffic flow.

    Range: ;64 through 4294967295 kbps

    Default: None

    • Peak Burst Size

    Enter the maximum burst size in bytes per second.

    Range: 128 through 524288 bytes per second.

    Default: None

  4. Click Publish.

Supported Software Information

Releases 10.3.4 and later support all content described in this article.

  • Was this article helpful?