Skip to main content
Versa Networks

Titan Portal 8.1.0

Versa-logo-release-icon.png For supported software information, click here.

Getting Started with Titan Portal

The Versa Titan Portal application allows cloud management of your Versa Secure SD-WAN, making it easier for IT to manage and secure branch services. Titan Portal provides a central dashboard for you to deploy and monitor networking devices. 

Features 

Versa Titan Portal provides the following features:

  • Activate Versa appliances using Versable, WiFi, or GZTP
  • Corporate and guest WiFi
  • Easy Quick Picks option automatically repopulates a configuration area with default values
  • Ability to configure appliances in high-availability (HA) pairs
  • Ability to configure branches in AWS
  • Enterprise-class advanced security for appliance and site, including UTM, NGFW, antivirus, anti-malware, intrusion detection, and DoS prevention 
  • Traffic conditioning and QoS for SaaS and business applications
  • Internet or site-to-site (VPN) connectivity speed test
  • Appliance health and status monitoring in real time 
  • Real-time and historical analysis of network, security policy including URL category and IP reputation, and application bandwidth use
  • Access to Versa support through phone, email, chat, online, and the customer support portal

Connect to Titan Portal 

To connect to Titan Portal:

  1. After registering with Versa, you will receive a welcome email with a link to the Titan Portal login screen where you create an initial password. Your username is the email address where you received the welcome message. 
  2. From a browser, navigate to https://titan.versa-networks.com/oxauth/login.htm to display the Titan Portal login screen.

    Portal_Getting_Started_login_screen.png
  3. Enter your valid email ID in the Username field and your password. These are the same login credentials you use with Titan Mobile.
  4. Click Login. Upon successful validation, you are directed to the Titan portal.

Titan Portal Home Screen

Once you successfully login, Titan Portal displays the home screen, with the Configure menu selected by default. The home screen includes a left menu bar, bottom menu bar, and the honeycomb area. Some screens and options may not display based on the privileges assigned to an account. 
Portal_Getting_Started_home_screen.png

Left Menu Bar

The left portion of the window displays the menu bar.

Field Description

Configure

Display the Configure dashboard for the current device. You can configure settings such as network, security, WiFi, and steering. 

Monitor

Display the Monitor dashboard. You can monitor network and security settings, view connected devices, and run an internet speed test.

Analytics

Access the following tools:

  • Bandwidth dashboard
  • Reporting dashboard
  • Administration dashboard
  • SD-WAN—Sites, Sites Map, Paths
  • Security—Applications, Websites, Firewall, Threats
  • System—Interfaces, Guest VNF, SNG
  • Logs—Alarms, DHCP, Authentication, Firewall, CGNAT, DOS, IDP, Anti Virus, URL Filtering, IP Filtering, Traffic Monitoring, Web Monitoring, SSL Decryption, ADC, Guest VNF events, Packets Captures

Live Monitor

Display the Live Monitor dashboard to monitor the live status of devices connected to the Titan portal.

Trouble Shoot

Display the Troubleshooting dashboard to troubleshoot topics such as connecting to the internet or WiFi and accessing websites.

Inventory

Display the Inventory dashboard to view a list of devices configured on the system. You can view subscriptions and licenses, check the software version, turn service on and off, and manage actions such as deactivating devices, requesting device location, and managing subscriptions.

Users

Display the Users dashboard to view a list of users added to the system. The enterprise administrator can add new users and administrators, set user roles and privileges, and lock or unlock user accounts.

Bottom Menu Bar

The bottom portion of the window displays the bottom menu bar.

Portal_Getting_Started_main_menu_bottom_panel.png

Field Description

Device License

Click vCSG, CSG700, or CSG300 to display available license packages. Each icon displays the remaining number of available licenses.

Map View

Toggle to switch between honeycomb and map view.

Group

Toggle to group sites by location. 

Filter

Click the Portal_Getting_Started_filter_icon.png Filter icon to display the Visualizations window. Use the toggles to limit the display in honeycomb view, then click Apply.
Portal_Getting_Started_filter_window.png

Wrench

Click the Portal_wrench_icon.png Wrench icon to edit the default configuration. See Default Configuration Values.
Default Configuration Values

Titan Portal comes with a default configuration. When you create a new site, Titan populates the site's device configurations with the values from the default configuration. You can edit the default configuration using the Portal_wrench_icon.png Wrench icon on the bottom menu bar in the Titan Portal home screen. All sites created after you save the changes use the new values. You can edit defaults for WiFi radios, networking, security, and steering. See Configure WiFi Radios, Configure Device Networking, Configure Security, and Configure Steering for information on these settings. Titan Portal uses only the settings that apply to a device. For example, if a device does not support WiFi, then Titan Portal ignores the WiFi settings when creating a site. You cannot edit LAN or LTE defaults.

Use the Easy Quick Picks feature to reset a device configuration to the default values. See Easy Quick Picks.

Honeycomb View

The Configure, Monitor, and Troubleshoot dashboards display sites in honeycomb format. Each honeycomb represents a site in the customer topology and displays a site name, location, and devices for that site.

Portal_honeycomb_details.png

Device icons appear as blue, gray, or gold squares that reflect the license type. HA sites display 2 device icons.

Device-Options Cards

Hover over a device in a honeycomb to display a device-options card. The card displays the administrative state in the Configure dashboard or the operation state in the Monitor and Troubleshoot dashboards.

Portal_Getting_Started_hover_menu.png

Map View 

Move the toggle at the bottom of the Configure or Monitor dashboards to the right to switch from honeycomb to map view.

Portal_Getting_Started_map_view.png

Easy Quick Picks 

The Easy Quick Picks icon displays on many configuration screens. This feature repopulates a device configuration area with default values. It repopulates values for that configuration area only. For example, clicking Easy Quick Picks in the WiFi area only affects WiFi radio values. You can edit default configuration values using the Wrench icon in the bottom menu bar. See Default Configuration Values.

You cannot edit LAN settings in the default configuration, so clicking Easy Quick Picks in the LAN, Ethernet Ports, WiFi Ports, Port Forwarding, or Device IP Address reservation areas always resets to factory defaults. In the Steering area, the Easy Quick Picks icon is labeled Easy Steering Picks. In the Security area, it is labeled Easy Security Picks.


Portal_Networking_config_quick_picks_icon.png

You can choose Easy Quick Picks in the following configuration areas:

  • Steering
  • Security
  • WiFi
  • LAN (Allows you to apply defaults to the following 4 areas with one click)
  • Ethernet Ports
  • WiFi Ports
  • Port Forwarding
  • Device IP Address Reservation

Device Configuration and Activation Overview

This section provides a step-by-step procedure to configure and activate a CSG300 and CSG700 series appliances in a non-HA configuration. To configure a CSG300 and CSG700 series appliances in an HA configuration, see Configure and Activate an HA Site. To configure virtual appliances using Amazon Web Services (AWS), see Configure a Branch in AWS.

To configure and activate a non-HA CSG300 or CSG700 series Versa appliance:

  1. Create a site using a software license. See Create a Site
  2. Create a device configuration for the site. See Configure Device Networking, Configure Security, and Configure Steering.

    The device configuration is stored in the Titan cloud portal when you save the configuration. You should configure WAN interfaces before deployment.
     
  3. Deploy the device configuration to the Versa Controller. See Deploy a Device Configuration.

    Deploying a device configuration informs the Versa Controller that the configuration exists.
     
  4. Activate the appliance. See Activate an Appliance.

    Activation validates the appliance, downloads its configuration, and allows traffic to begin flowing through it. 

Note: After you activate a device, the configuration screen displays a Publish option in place of the Save option. Publish saves the configuration in the Titan cloud portal and the appliance. Procedures in this article use Save and Publish interchangeably.

​​​​

After activation, you can display live status information, view device analytics, and monitor individual device status from the Live Monitoring, Analytics, and Monitor dashboards. See Use Live Monitoring, Manage Device Analytics, and Monitor Device Status.

Changes After Deployment or Activation

Some items cannot be changed after deployment or activation. In those cases, you must undeploy and redeploy the device configuration or deactivate (remove) and recreate the site. See Undeploy a Device Configuration and Remove a Site

Note: You must wait 5 minutes after undeploying a device configuration before redeploying. Titan must sync internal data structures when you undeploy; if this process is not complete you will receive an error message when you attempt to activate the appliance.

The following configuration changes require you to undeploy then redeploy a device configuration. This applies to deployed configurations for both activated and unactivated devices:

  • To add an additional WAN interface to the site—For example, if a system has only 1 WAN and you need to configure an additional WAN. 
  • To remove a WAN interface—For example, if a system is configured for 2 WAN ports and you need only 1 WAN port and do not choose to use the turn-off function of the port, then you must undeploy the configuration in order to remove the WAN port.
  • To add an LTE interface to a device configuration.
  • To change the site Topology type between any of the following:
    • Full-mesh to Spoke
    • Spoke to Full-mesh
    • Full-mesh to Hub
  • To change a site from being a single device to an HA pair.
  • To change a WAN interface from internet to MPLS routing technique.
  • To change a WAN interface from MPLS to internet routing technique.
  • To enable or disable the gateway feature on a WAN interface.
  • To enable PPPoE on an already-deployed WAN interface.

The following changes require you to deactivate (remove) then recreate a site:

  • To change the appliance model for a location.
  • To remove a site from the system.

Create a Site

This section provides a step-by-step procedure to create a site for CSG300 and CSG700 series appliances. To create an AWS site, see Configure a Branch in AWS. To create a site for an HA configuration, see Configure and Activate an HA Site.

Notes: You should choose the site topology type before saving the device configuration. To change the topology after saving, you must undeploy, change the topology, then redeploy the configuration. See Undeploy a Device Configuration.

 

You cannot change the license type after creating the site. You must remove and recreate the site using the correct license type.

To create a site for CSG300 and CSG700 series appliances:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Click one of the license package icons to display available license packages.
    • CSG700 Series
    • CSG300 Series

      Portal_Activate_Available_CSG_700_Packages.png

      Licenses use the following naming conventions.
       
      Acronym Description
      (blank) No WiFi and LTE
      WLA WiFi and LTE
      WLA-4GP WiFi and LTE and 4 copper GE PoE ports
      2LA No WiFi, 2 LTE
      2LA-4GP No WiFi, 2 LTE and 4x copper GE PoE ports
  3. Drag the license package onto the dashboard to add the site to the honeycomb.

    Portal_Activate_gztp_drag_drop.png

    The New Site: Configuration window displays.

    Portal_Activate_drag_license_new_site_config.png
     
  4. Enter information for the following fields.
     
    Field Description
    Site Name Enter name of site.

    Address

    Enter street address, zip code, city, state, and country.

    Latitude and Longitude

    Click the Auto Generate toggle to enable Latitude and Longitude coordinates automatically. Otherwise, enter coordinates manually (default).
    Topology

    Click Topology to configure the site role:

    • Configure as Primary Hub
    • Configure as Secondary Hub
    • Configure as Spoke—There must be a hub already configured in order to configure a spoke.


    Portal_Activate_topology.png

    HA Mode Click HA Mode to configure two appliances in an HA pair. See Configure and Activate an HA Site for details on configuring HA Mode.
    Service View device details.

     
  5. Click the down arrow next to Deploy to display the Save pop-up.

    Portal_Activate_new_site_save.png
     
  6. Click Save.

    Titan Portal saves the new site information in the Titan cloud and creates a honeycomb for the site.

Remove a Site

You can remove a site using the device-options card in the honeycomb or from the Inventory dashboard (see Inventory Actions). You can remove a site before deployment, after deployment, or after activation. For HA sites, you can use the device-options card for either of its 2 devices to remove the site.

To remove a site using its device-options card:

  1. From the Configure dashboard, hover on the device for the site to be removed. 

    Portal_Site_delete.png
     
  2. Click Remove on the options card for the device.

    A confirmation message displays and the site is removed from the honeycomb. Device licenses used by the site are placed back in inventory.

Configure Device Networking

After you create a site, you create a configuration for the site devices. Device configurations include settings for Networking, Security, and Steering. This section describes the Network configuration settings including WiFi, LAN, and WAN.

Use the Configure Dashboard  

To configure network settings from the Configure dashboard: 

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the site in the honeycomb to open the options card for the device.

    Portal_Networking_Configure_Dashboard.png
     
  3. Click Configure in the Actions column of the device-options card to open the site information window. 

    Portal_Networking_Configure_Site.png
     
  4. Click Next to open the Configuration > Network screen.

    Portal_Networking_Configure_Network.png
     

From the Configuration > Network screen, you can change configuration settings for the following configuration areas:

Configure WiFi Radios 

Versa appliances that support WiFi include WiFi radios, each radio connecting to a WiFi port. One radio connects to Corporate WiFi at port Wi-Fi-1, which accesses the corporate VPN (SD-WAN), and the other connects to Guest WiFi at port Wi-Fi-2, which accesses the internet. This section discusses configuring radio settings such as SSID and bandwidth. To configure IP addresses for devices connecting to these ports, see Configure WiFi Ports.

Configure Corporate WiFi

To configure Corporate WiFi settings:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Wi-Fi box to open the Network > Wireless Networks screen.

    Portal_Networking_04-Titan_Network_Wireless_Networks.png
    The Network > Wireless Networks screen displays 2 WiFi radios. These are Corporate Wi-Fi, which uses an SSID of Titan-Corporate in this example, and Guest Wi-Fi, which uses an SSID of Titan-Guest.
     
  5. Click the current SSID for Corporate Wi-Fi to open the Network > Wireless Networks > Edit Network screen.
  6. Click the SSID and Passphrase fields to clear the current credentials, then enter new credentials. The WiFi SSID can be no more than 32 characters, and passwords must be between 8-25 characters. 

    Portal_Networking_05-Titan_Configure_Network_Wireless_Networks_Corporate_Edit_Network.png
  7. Choose a radio frequency from Dual Band, 2.4 GHz or 5 GHz.
  8. The Channel selection for Dual Band is set to Auto and cannot be changed. For 2.4 GHz and 5 GHz, the channel selection can be Auto or a Channel number.
  9. Click Add. This saves the change locally but does not save to the Titan cloud.
  10. Click Save to save the changes to the Titan cloud.

To assign IP addresses to the corporate WiFi port, Wi-Fi-1, see Configure WiFi Ports.

Configure Guest WiFi 

To configure Guest WiFi settings:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Wi-Fi box to open the Network > Wireless Networks screen.
  5. Click Guest in the Network > Wireless Networks window to open the Edit Network screen.

    Portal_Networking_06-Titan_Configure_Network_Wireless_Networks_Guest.png
  6. Click in the SSID and Passphrase fields to clear the current credentials, then enter new credentials.
    Bandwidth Control is automatically set to Auto. Access Control specifies that guests accessing this Wi-Fi are restricted to use the Internet only; guests do not have access to the company VPN.
  7. Click the LTE toggle to enable or disable the use of LTE access by WiFi guests.
    The radio channel is automatically set to Dual Band with a Channel Selection of Auto.
  8. Choose the Dual Band, 2.4 GHz, or 5 GHz radio frequency.
    The Channel selection for Dual Band is set to Auto and cannot be changed. For 2.4 GHz and 5 GHz, the channel selection can be Auto or a Channel number.
  9. Click Add. This saves the change locally but does not save to the Titan cloud.
  10. Click Save to save the changes to the Titan cloud.

To configure IP addresses for the guest WiFi port, Wi-Fi-2, see Configure WiFi Ports.

Configure LAN Connections 

On the Network LAN screen, you configure DHCP address pools, static routes, a DNS name server, and port forwarding. You can also reserve an IP address that is assigned by DHCP to a device. You configure these parameters for both Ethernet and WiFi ports. 

To restore the default configuration, click Easy Quick Picks. Click the Refresh icon to update information on the screen.

To configure a LAN:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the LAN box to open the Network > LAN screen to configure the following:
  • Ethernet Ports
  • Wi-Fi Ports
  • Port Forwarding
  • Device IP Address Reservation

    Portal_Networking_07-Titan_Configure_Network_LAN.png

Configure Ethernet Ports 

You can assign an IP address to an Ethernet port and configure DHCP addressing from the Ethernet Ports screen. The mapping from port number to LAN number varies based on the number of WAN ports.

Note: You should configure WANs before entering LAN information to ensure that the LAN configuration screen displays correct port numbers for the configuration.

To configure Ethernet ports on a LAN:

  1. Hover over the device in the honeycomb and click Configure to open the site information window.
  2. Click Next to open the Configuration > Network screen.
  3. Click the LAN box to open the Network > LAN screen.
  4. Click the Ethernet Ports box to open the Network > LAN > Ethernet Ports screen.

    Portal_Networking_08-Titan_Configure_Network_LAN_Ethernet_Ports.png
     
  5. Click the drop-down menu to the right of Easy Quick Picks to view a list of available ports and their corresponding LAN numbers.
  6. Select a LAN/port from the drop-down menu.
  7. Configure the following settings on the page:
  • VLAN tagging
  • DHCP settings
  • Name servers

Configure VLAN Tagging 

VLANs are used to enhance performance by reducing the need to send broadcasts and multicasts to unnecessary destinations. VLANs also ease network configuration by logically connecting devices without physically relocating those devices.

To configure VLAN tagging:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the LAN box to open the Network > LAN screen.
  5. Click the Ethernet Ports box to open the Network > LAN > Ethernet Ports screen.
  6. Select a port from the menu to the right of Easy Quick Picks. 
  7. Click the VLAN Tagging toggle to turn on VLAN configuration options.

    Portal_Networking_09-Titan_Configure_Network_LAN_Ethernet_Ports_VLAN.png

    Enter information for the following fields.
     
    Field Description
    Label Enter a name for the VLAN.

    VLAN ID

    Enter the VLAN ID. 

    IP Address/Mask

    Enter a valid IP prefix and length. The length must be in /25 CIDR subnet mask notation, for example, 172.16.4.0/25.
    ​​​​​
  8. Click Add VLAN to save the changes.
  9. Click Save to save the configuration.

Configure DHCP Settings 

Titan devices include the Dynamic Host Configuration Protocol (DHCP) server and the DHCP relay-agent software. The DHCP server implementation assigns and manages IP addresses from specified address pools within the device to DHCP clients. The DHCP server can be configured to assign additional parameters, such as the IP address of the Domain Name System (DNS) server and the default device. You can also set the IP address of a DHCP server to which the DHCP relay agent forwards client requests.

To configure DHCP settings:

  1. Hover over the device in the honeycomb and click Configure to open the site information window.
  2. Click Next to open the Configuration > Network screen.
  3. Click the LAN box to open the Network > LAN screen.
  4. Click the Ethernet Ports box to open the Network > LAN > Ethernet Ports screen.

    Portal_Networking_config_ethernet_ports_box.png
  5. Select a port from the menu to the right of Quick Picks.
  6. Click the DHCP Server checkbox to activate configuration fields on the screen.

    Portal_Networking_10-Titan_Configure_Network_LAN_Ethernet_Ports_DHCP_Server.png
  7. Enter information for the following fields.
     
    Field Description
    IP Subnet Enter a valid IP prefix and length. The length must be /25 CIDR subnet mask notation, for example, 172.16.4.0/25.

    IP Start Range

    Enter the IP address at the beginning of the DHCP address pool.

    IP End Range

    Enter the IP address at the end of the DHCP address pool.
    Name Servers By default, a primary and secondary DNS name server are configured automatically.
  8. Click Save to save the settings.

DHCP Relay

  1. Select the DHCP Relay option.
  2. Enter the IP address of the DHCP relay agent. You can enter multiple IP addresses separated by a comma.

    dhcp-relay.png

DHCP Client Options

You can configure DHCP Client Options on a per-LAN-interface and per-VLAN basis for Versa Titan sites. Available options are Option 43, Option 66, and Option 42, with corresponding support for Boolean, IPv4 address, String, and FQDN type fields.

To configure DHCP client options:

  1. From the Network > LAN > Ethernet Ports window, click DHCP Client Options to open the DHCP Client Options window.


    Portal_Networking_12-Titan_Configure_Network_LAN_Ethernet_Ports_DHCP_Client_Options.png
     
  2. Enter information for the following fields.
     
    Field Description
    Vendor ID (optional) 

    Enter vendor ID. 

    Code   Enter DHCP option code. Valid options are 42 (NTP server), 43 (vendor specific), or 66 (TFTP server).
    Type

    Enter data type of the value. These are the system-defined types:

    • boolean
    • fqdn
    • ipv4-address
    • string
    Value

    Enter value for the chosen option code. 

  3. Click + DHCP Option to save the option to the DHCP screen. The new option displays on the screen.

    Portal_LAN_DHCP_options_after.png
  4. Click the Trash icon to delete a DHCP option.
  5. Click Save to save the changes to the Titan cloud before leaving the Ethernet Ports screen. 

LAN Static IP Route

To set a static route to a destination using a next-hop Address, click + Add Route to configure multiple static routes.

Portal_Networking_13-Titan_Network_LAN_Static_IP_Route.png

Configure WiFi Ports 

You can assign a range of IP addresses to each WiFi port. To configure WiFi radio settings, such as SSID, for these ports see Configure WiFi Radios.

To configure WiFi port settings:

  1. Hover over the device in the honeycomb and click Configure to open the site information window.
  2. Click Next to open the Configuration > Network screen.
  3. Click the LAN box to open the Network > LAN screen.
  4. Click the Wi-Fi Ports box to open the Network > LAN > Wi-Fi Ports screen.

    Portal_Networking_14-Titan_Configure_Network_LAN_WiFi_Ports.png
  5. Select a WiFi port from the menu to the right of Quick Picks. Wi-Fi-1 is the corporate WiFi port and Wi-Fi-2 is the guest WiFi port.
  6. Click the DHCP checkbox.
  7. Enter information for the following fields.
     
    Field Description
    IP Subnet Enter a valid IP prefix and length. The length must be /25 CIDR subnet mask notation, for example, 172.16.4.0/25.

    IP Start Range

    Enter the IP address at the beginning of the DHCP address pool.

    IP End Range

    Enter the IP address at the end of the DHCP address pool.
    Name Servers By default, a primary and secondary DNS name server are configured automatically. To change values, click Manual then enter a valid primary and secondary value.
  8. Click Save to save the settings.

Configure Port Forwarding 

NAT port forwarding, also called port mapping, redirects packets from one address and port number pair to another while the packets are traversing the Titan device. You configure port forwarding rules to allow incoming traffic to reach its destination in the LAN. You should configure WAN ports before configuring port forwarding. Only configured WAN interfaces are available in the Port Forwarding screen. Port forwarding is not enabled by default; you must configure a rule. When a rule is created, it is automatically enabled.

To configure a port forwarding rule:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the LAN box to open the Network > LAN screen.

    Portal_Networking_config_lan_port_forward_box.png
  5. Click the Port Forwarding box to open the Network > LAN > Port Forwarding screen.

    Portal_LAN_port_forwarding_rule_before.png
     
  6. Click + Rule on the Network > LAN > Port Forwarding screen to display the Add Rule screen.

    Portal_Networking_16-Titan_Configure_Network_LAN_Port_Forwarding_Add_Rule.png
  7. Enter information for the following fields.
     
    Field Description
    Rule Name Enter a name for the rule.
    Type Choose the DNAT or SNAT technique for address translation.
    Interface

    Choose a WAN interface from the drop-down menu. Only configured WAN interfaces are listed in the menu.

    Internal Port Enter a port number. You can configure a single port number or a range of port numbers; for example, 100 or 100-150. The type of internal port you configure (single or range) must be the same as the type of external port.
    Internal IP Enter an internal IP address or IP address range. The IP addresses must fall within the start and end IP address range of any of the LAN ports. The internal IP type (single or range) must be the same as the external IP type. Internal and external IP ranges must match for SNAT rules.
    External Port Enter a port number. You can configure a single port number or a range of port numbers;  for example, 100 or 100-150. The type of external port you configure (single or range) must be the same as the type of internal port.
    External IP Enter an external IP address or IP address range. The IP addresses must fall within the start and end IP address range of any of the LAN ports. The external IP type (single or range) must be the same as the internal IP type. Internal and external IP ranges must match for SNAT rules.
    Protocol Select Any, TCP or UDP.
  8. Click Add. This adds the rule to the screen but does not save to the Titan cloud.

    Portal_Port_Forwarding_after_adding_rule.png
     
  9. Click Save to save the new rule to the Titan cloud.

To update a rule:

  1. Click the rule name to edit the rule, or click X to delete the rule. 
  2. Click Save to update the Titan cloud.

To delete all rules:

  1. Click Easy Quick Picks. This deletes all port forwarding rules since the default configuration contains none.
  2. Click OK in the pop-up window.
  3. Click Save to update the Titan cloud.

Reserve an IP Address for a Device 

To permanently assign an IP address to a device, you can reserve specific addresses in the DHCP pool. To reserve an IP address for a device, you can either add a new device by creating a rule or click the Add Devices icon to add devices that are already connected.

To reserve a device IP address for a device:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the LAN box to open the Network > LAN screen.

    Portal_Networking_config_device_ip.png
  5. Click the Device IP Address Reservation box to open the Device IP Address Reservation screen.

    Portal_LAN_IP_reservation_before.png
     
  6. Click + Rule to open the Device IP Address Reservation screen.

    Portal_Networking_18-Titan_Network_LAN_Device_IP_Address_Reservation_Add_Rule.png
  7. Configure settings for the following fields.
     
    Field Description
    Rule Name Enter a name for the rule.
    IP Address Enter the IP address to reserve.
    MAC Address Enter the MAC address of the device for which you are reserving the IP address.
  8. Click Add to add the rule. This adds the rule to the screen but does not save to the Titan cloud.

    Portal_LAN_IP_reservation_after.png 
     
  9. Click Save to save the new rule to the Titan cloud.

To update a rule:

  1. Click the rule name to edit the rule, or click X to delete the rule. 
  2. Click Save to update the Titan cloud.

To delete all rules:

  1. Click Easy Quick Picks. This deletes all IP address reservation rules since the default configuration contains none.
  2. Click OK in the pop-up window.
  3. Click Save to update the Titan cloud.

Configure WAN Connections 

This section describes how to change WAN settings. The WAN configuration affects LAN port numbering, so you should configure WANs first. You must configure WAN interfaces before a device is deployed.

Note: You should configure WAN interfaces before saving the device configuration, including the following settings:

  • Adding or deleting WAN interfaces
  • Choosing MPLS or internet routing technique
  • Enabling the gateway feature
  • Enabling PPPoE protocol
  • Enabling HA Mode

To change these settings saving, you must undeploy, change the settings, then redeploy the configuration. See Undeploy a Device Configuration

To configure a WAN:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the WAN icon to open the Network > WAN screen.

    wan-link-mode-link-speed.png
     
  5. Click WAN1-Port0 to display the drop-down menu.

    wan-link-mode-link-speed1.png
     
  6. If needed, click the + WAN icon in the drop-down menu to add a WAN. To delete the highest-numbered WAN, select it from the drop-down and then click the trash icon.
  7. Select the WAN to be configured from the drop-down menu. The WAN connection at appliance port 0 is WAN1, port 1 is WAN2, etc.
  8. Use the toggle switch to switch a WAN interface on or off.
  9. Click Primary or Hot Standby. When used as a hot-standby, you can create rules to steer traffic on the interface. Titan only sends direct internet access (DIA) traffic to the interface if the primary interface is down.
  10. Choose the link mode. Default link mode is set to Auto. Link mode can also be set to half-duplex or full-duplex.
  11. Choose the link speed. Link speed can be se to 10 Mbps, 100 Mbps, or 1 Gbps. For link speed above 1 Gbps, use the default value (Auto).
  12. Click On or Off to enable or disable the interface as a gateway.

    Note: A gateway is used in a Hub and Spoke topology to allow spokes to route traffic through the hub. To deploy and create a spoke site, a Hub must first be created with the Gateway flag turn on and then deployed. This feature enables the manipulation of traffic steering from spoke sites to define specific steering rules and policies to utilize local internet breakout at the spoke while sending all other traffic to the hub gateway. 
     
  13. Choose the transport domain to be Internet or MPLS, depending on the WAN connection.
  14. Choose the tunnel type using the Tunnel Selection drop-down list:
  • Globe icon—Internet only
  • Hub icon—VPN only
  • Combined Globe and Hub icon—Internet and VPN (Split Tunnel)

    Note: Spoke sites must have at least one WAN set to VPN only. This configures the spoke to accept and use the default route propagated by the Hub gateway for centralized internet access. Versa recommend that you set only one WAN interface as VPN-only for the spoke.
  1. Enter the VLAN ID for the interface.
  2. Click the Network Address toggle to select DHCP or Static. If you choose Static, enter a valid IP address and Gateway.
  3. Click Save to save the settings.

WAN Static IP Route

To configure a static IP route to a destination:

  1. From the Network > WAN screen, click the Static IP Route tab to display the Static IP Route screen.

    Portal_Config_WAN_static_ip_route.png
     
  2. Enter information for the following fields.
     
    Field Description
    Destination Enter an IP address and mask in the Destination (IPv4/Mask) field
    Next-Hop Address

    Click Address or IPsec next to Next-Hop Address, then enter one of the following:

    • Next Hop (IPv4): Enter the next-hop address
    • IPsec: Select an IPsec tunnel from the drop-down menu. To create an IPsec tunnel, see IPsec VPN.
    Redistribute Click Redistribute to advertise the route to the VPN (SD-WAN).
  3. Click + Add Route. This saves the entry to the Network WAN screen but not the Titan cloud. The new route displays on the screen.

    Portal_Config_WAN_static_ip_route_2.png
     
  4. Click Save to save the changes to the Titan cloud. 

IPsec VPN

You use the IPSEC VPN option to build an IPsec tunnel to other appliances or applications. Once saved, Titan Portal adds the tunnel name to the drop-down menus for WAN static IP routes, steering rules, and firewall rules. Tunnels use the preshared key (PSK) authentication type and are built using IKEv2. You can configure multiple tunnels by clicking + Add.

Note: You must add a static route to enable routing over this IPsec tunnel.

To configure an IPsec tunnel:

  1. From the Network > WAN screen, click the IPsec VPN tab to display the IPsec VPN screen.

    ipsec-vpn.png
    Portal_Networking_ipsec_pt_two.png
     
  2. Enter information for the following fields.
     
    Field Description
    Name Enter IPsec tunnel name. Titan Portal adds the tunnel name to the IPsec drop-down menu in the Static IP Route screen.
    Redistribute Click to redistribute the tunnel. 
    Peer Type Enter format for the peer value: hostname, fully qualified domain name (FQDN), or IP address.
    Peer Type Value Enter peer value using the format selected in peer type.
    Local Auth  
    Auth Type Displays the Auth type (PSK).
    Identity Type Enter format for the identity type value: hostname, FQDN, or IP address.
    Identity Type Value Enter value in the format selected in identity type.
    Shared Key Enter preshared key.
    Peer Auth  
    Auth Type Displays the Auth type (PSK).
    Identity Type Enter format for the identity type value: hostname, FQDN, or IP address.
    Identity Type Value Enter value in the format selected in identity type.
    Shared Key Enter preshared key.
    Local Tunnel Address Enter IP address of local tunnel interface in CIDR format.
    Gateway Tunnel Address Enter IP address of peer.
  3. Click +Add IPsec Profile. This saves the tunnel to the IPsec VPN screen but not the Titan cloud.

    Portal_Networking_ipsec_after_creation.png

    Use the trash icon to delete a tunnel or the pencil icon to edit a tunnel. Click the eye-icon.png Eye icon to display tunnel details.
     
  4. Click Save to save the changes to the Titan cloud. Once saved, Titan Portal adds the IPsec tunnel name to the drop-down menus for WAN static IP routes, steering rules, and firewall rules. See WAN Static IP Route, Manage Firewall PoliciesSD-WAN Steering, and Internet Steering.

Configure PPPoE Settings

Point-to-Point Protocol over Ethernet (PPPoE) is used with DSL services in which individual users connect to a DSL modem over Ethernet. The PPPoE username and password configured on the WAN interface must match settings on the WAN server to be active; otherwise, PPPoE is inactive. You cannot remove or add a new PPPoE instance once a device has been deployed but you can edit the PPPoE username and password at any time.

When PPPoE is active, you can monitor status within the WAN interface from the Monitoring > Network screen. You can also perform a speed test and view steering options from the Speed Test and Steering screens.

Versa Titan supports xDSL interface on CSG355 and CSG365 appliances. You must upgrade these appliances to Versa Operating SystemTM VOSTM (VOS) Release 21.2.1 or later to get the xDSL option displayed in your Versa Titan Portal. GZTP and WiFi are not available for xDSL activation with static IP and PPPoE. Use Versable activation with mobile app to activate the device when xDSL with static IP and PPPoE is configured. You can configure and enable PPPoE only on WAN1 and WAN2 ports before you deploy the device. You use Titan Portal to configure and deploy xDSL device. Titan Mobile can be used only for xDSL device activation and monitoring the status.

To configure PPPoE:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the WAN icon and select the WAN interface.
  5. Click the PPPOE tab and switch the PPPoE Status toggle to on.

    xdsl-pppoe.png
     
  6. Select an interface type.
    • Ethernet
    • xDSL
  7. Select a multiplexing type:
    • LLC
    • VC-MUX
  8. Choose an instance type from the drop-down list:
    • Internet Only—Traffic is directed to DIA only.
    • SD-WAN Only—Traffic is directed to the SD-WAN VPN only.
    • SD-WAN and Internet (DIA) Split Tunnel—VPN traffic is directed to the SD-WAN VPN. Internet traffic is directed to DIA.
  9. Enter the username and password in the fields provided.
  10. Enter the Service Name provided by DSL provider.
  11. Enter the name of the access concentrator. The access concentrator name on both the client and the server must be the same to establish the PPPoE session.
  12. Enter the virtual path identifier.
    Range: 0 through 256
  13. Enter the Virtual channel identifier.
    Range: 32 through 65535; 0 through 31 are reserved
  14. Enter the VLAN ID configured for the xDSL line.
  15. Click Save to save the settings.

Configure LTE and APN Settings 

You can configure Long-Term Evolution (LTE) wireless broadband services on appliances that support LTE. LTE wireless functionality is useful when a branch does not have a wired connection to the internet.

An access point name (APN) establishes a connection to the gateway between the carrier's network and the internet. Your service provider may require specific setting for the connection, and you can enter these APN details manually.

Note: You should configure LTE interfaces before saving the device configuration. To change add or remove an LTE interface after saving you must undeploy, change the settings, then redeploy the configuration. See Undeploy a Device Configuration

To view LTE settings and update APN settings:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the LTE box to open the Network : LTE Screen.

    Portal_Networking_LTE_main_screen.png
     
  5. Use the drop-down menu to select an existing LTE interface, or select +LTE to add an additional interface (up to 4 total).
  6. Switch the LTE interface on or off using the toggle.
  7. Click a circuit role:
    • Primary—SD-WAN and direct DIA traffic are sent through the interface.
    • Hot Standby—When used as a hot-standby, you can create rules to steer traffic on the interface. Titan only sends DIA traffic to the interface if the primary interface is down.
    • Cold Standby—The interface is operationally down. No traffic flows on the interface until the primary interface is detected as down.
       
  8. Switch the toggle to turn the LTE gateway configuration on or off. You must turn this feature on before the configuration is deployed.
  9. Choose the type of tunnel using the Tunnel Selection drop-down list:
    • Globe icon—Internet only
    • Hub icon—VPN only
    • Combined Globe and Hub icon—VPN and Internet (DIA) Split Tunnel

      The network address and name servers are set to Auto and cannot be changed.

      APN is set to Auto by default.

      Portal_Networking_LTE_APN.png
       
  10. Click Manual to display the APN screen.

    Portal_Networking_LTE_APN_manual.png
     
  11.  Enter information for the following fields.
     
    Field Description
    APN Enter access point name (APN) that you received from your service provider.
    PIN For a USB modem that is locked with a PIN, enter PIN number.
    Username Enter username provided by the service provider to use to access the wireless WAN. This username is used when a CDMA modem prompts for username.
    Password Enter password provided by the service provider to access the wireless WAN. This password is used when a CDMA modem prompts for password. Click Show/Hide to view the new password.
  12. Click Save to save the settings.
  13. Verify the settings from the Monitoring screen any time you change between Manual or Auto.

Configure Security

From the Security tab you can configure firewall policies, secure traffic flow based on URL, set antivirus strength, and tune the intrusion prevention system. You can customize security settings before or after you activate the device.

To configure security settings:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab to open the Security settings screen. 

    Portal_Security_config_security_screen_one.png
    Portal_Security_config_security_screen_two.png

Customize the following settings on the Configure > Security screen:

  • Firewall Policies—Set firewall rules
  • Security Profile Definition—Categorize URLs, configure reputation, antivirus, and intrusion prevention,  

Manage Firewall Policies

The Titan portal is preconfigured with default firewall rules. You cannot modify the default rule but you can add a new rule.

To configure firewall settings:

  1. In the Firewall Policies section, click Firewall Rules to open the Configuration > Security > Firewall Rules screen.

    Portal_Security_02_config_firewall.png

    Each rule displays a numbered circle indicating its position in the rule set. Circle color indicates whether a rule denies (red) or allows (green) traffic, or applies one of the profiles listed in the Security Profile Definition section (purple).
     
  2. If needed, click Reorder Rules to enter rule reorder mode.
    1. To change a rule order, click the colored circle and drag the rule to a different spot in the rule set. The rule numbers are updated automatically.
    2. Click Publish Reordered Rules to save the changes to the Titan cloud.
       
  3. If needed, click + Rule to add a new firewall rule.

    Portal_Security_03_Add_FirewallRules.png
  4. Configure settings on the screen:
Field Description
Rule Name Enter a name for the rule.
Match Criteria There are 4 types of match criteria. Click Protocol, Address, Hostname, or Application to add details for that criteria type. Match criteria details are listed in the Match Criteria for Rules section.
Scope  
Source Zone

Click the down arrow in the Please Select field. A pop-up window displays the configured interfaces and tunnels. 

Choose a source zone then click Continue. To create a tunnel, see IPsec VPN.
Portal_Security_04_select-source-zone-v2.png

Arrow

Choose a Portal_one_way_arrow.png one-way or Portal_two_way_arrow.png two-way connection.

Destination Zone

Click the down arrow in the Please Select field. A pop-up window displays the configured interfaces and tunnels. 

Choose a destination zone then click Continue. To create a tunnel, see IPsec VPN.
Portal_Security_04_select-source-zone-v2.png

Action

Choose Deny, Allow, or Apply Security Profile.

When you click Apply Security Profile, a pop-up window displays.
Portal_Security_05_apply-security-profile-resized.png

Choose a level of security for each of the following:

  • URLs
  • Antivirus
  • IPS

Security levels can be Low, Standard, or Advanced.

  1. Click Add to save the changes. The new rule appears on the Firewall Rules screen.
  2. Click Publish to save all firewall policies. 

Click X in the icon to remove a rule, then click Publish.

Click the following on the Security > Firewall Rules: New Rules screen to view default firewall rules:

  • Allow_From_SDWAN
  • Allow_To_SDWAN
  • Default_Security_Rule
  • Default_security_wifi (if the device supports WiFi)

Note that you cannot edit a default Rule.

Portal_Security_06_default_Firewallrules.png

Create a Firewall Rule for SASE Gateway

To create a firewall rule for Secure Access Service Edge (SASE) gateway:

  1. In the Firewall Policies section, click Firewall Rules to open the Configuration > Security > Firewall Rules screen.

    sase-firewall-rules.jpg

    Each rule displays a numbered circle indicating its position in the rule set. The color of the circle indicates whether a rule denies traffic (red), allows traffic (green), or applies one of the profiles listed in the Security Profile Definition section (purple).
  2. If needed, click Reorder Rules to enter rule reorder mode.
    1. To change a rule order, click the colored circle and drag the rule to a different spot in the rule set. The rule numbers are updated automatically.
    2. Click Publish Reordered Rules to save the changes to the Titan cloud.
  3. Click +Rule to add a new firewall rule.

    sase-firewall-rules-add.jpg
  4. Configure settings on the screen:
Field Description
Rule Name Enter a name for the rule.
Match Criteria There are 4 types of match criteria. Click Protocol, Address, Hostname, or Application to add details for a criteria type. See Match Criteria for Rules for match criteria details
 

Click the down arrow in the Please select drop-down list to select the protocol.

sase-firewall-rules-select-protocol.jpg

Scope  
Source Zone

Click the down arrow in the Please Select drop-down list. A pop-up window displays the zones that classify the traffic flows coming to the gateway from various sources. 

Select a source zone, and then click Continue.

sase-firewall-rules-source-zone.jpg

  • SD-WAN—Select for the traffic coming to the gateway over overlay tunnels from remote SD-WAN branches.
  • Untrust (Internet)—Select for internet facing WAN interfaces.
  • Secure Access—Select the ingress zone for traffic coming from VSA clients.
Arrow

Choose a Portal_one_way_arrow.png one-way or Portal_two_way_arrow.png two-way connection.

Destination Zone

Click the down arrow in the Please Select drop-down list. A pop-up window displays the zones that classify the traffic flows coming to the gateway from various sources. 

Select a destination zone, and then click Continue.

sase-firewall-rules-destination-zone.jpg

  • SD-WAN—Select for the traffic coming to the gateway over overlay tunnels from remote SD-WAN branches.
  • Untrust (Internet)—Select for internet facing WAN interfaces.
  • Secure Access—Select the ingress zone for traffic coming from VSA clients.
Action

Choose Deny, Allow, or Apply Security Profile.

When you click Apply Security Profile, a pop-up window displays.

sase-firewall-rules-apply-security-profile.jpg

Choose URLs and select a security level:

  • Low
  • Standard
  • Advanced
    Click Add to save the changes. The new rule appears in the Firewall Rules screen.
  1. Click Publish to save all firewall policies. 

Click X in the icon to remove a rule, then click Publish.

Manage Security Profile Definitions

Security profile definitions contain 3 components:

  • URL settings, including a URL blacklist and URL whitelist
  • Antivirus settings 
  • Intrusion Prevention System (IPS) settings

You can manage individual components from the Security screen. You can enable or disable all components with one click from the Inventory menu. See Manage Device License Inventory.

To manage the security profile components:

  1. From the Configuration > Network screen. click the Security tab to open the Security settings screen. 

    Portal_Security_config_security_screen_one.png
    Portal_Security_config_security_screen_two.png
     
  2. Slide the toggle to turn individual security components on or off.

Configure a URL Blacklist

Add websites to be blocked on the network so that users cannot access the sites. Add multiple websites by separating them with a comma.

To add URLs to a Blacklist:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. In the Security Profile Definition section, click Blacklisted URLs to open the Configuration > Security > Blacklisted URLs screen.

    Portal_Security_07_config_security_blacklist.png
  6. Enter a single URL or enter multiple URLs separated by a comma.
  7. Click + Add URL to add URLs to the Blacklist.
  8. Click Publish to save the settings.

To delete URLs from the list, click the X next to the URL.

Configure a URL Whitelist

Add websites allowed on the network, even if blocked by other settings. Add multiple websites by separating them with a comma.

To add URLs to the Whitelist:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. In the Security Profile Definition section, click Whitelisted URLs to open the Configuration > Security > Whitelisted URLs screen.

    Portal_Security_08_config_security_whitelist.png
  6. Enter a single URL or enter multiple URLs separated by a comma.
  7. Click + Add URL to add URLs to the Whitelist.
  8. Click Publish to save the settings.

To delete URLs from the list, click the X next to the URL.

Configure URL Categories

To set a category filter for types of URLs to allow or block:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. Click a Category level to open the configuration screen for that level:
  • Low
  • Standard
  • Advanced

    Portal_Security_09_config_security_category.png​​​​
  1. Click to select the categories to Block or Alert & Confirm.
  2. Click Publish to save the settings.

Configure IP Reputation Filtering

To set a reputation filter for types of URLs to allow or block:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. Click a Reputation level to open the configuration screen for that level:
  • Low
  • Standard
  • Advanced
    ​​​​​​
    Portal_Security_10_URLfiltering_Reputation.png
  1. Click to select the reputation level.
     
    Field Description

    Red

    Blocked
    Amber Ask
    Blue Allowed
    High Risk IP Addresses Range: 01-20
    There is a higher than average predictive risk that these IP addresses will deliver attacks to infrastructure or endpoints.

    Suspicious IP Addresses

    Range: 21 - 40 
    There is a higher than average predictive risk that these IP addresses will deliver attacks to infrastructure or endpoints.
    Moderate Risk Range: 41 - 60 
    These are generally benign IP addresses but have exhibited some potential risk characteristics. There is some predictive risk that these IP addresses will deliver attacks to infrastructure or endpoints.
    Low Risk
    Range: 61 - 80
    These are benign IP addresses are rarely exhibit some characteristics that expose infrastructure and endpoints to security risks. There is a low predictive risk of attack.
    Trustworthy Range: 81-100
    These are clean IP addresses that have not been tied to a security risk. There is a low predictive risk that infrastructure and endpoints will be exposed to attack.
  2. Click Publish to save the settings.

Configure Antivirus Protection

To choose where to apply antivirus protection:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. Click an Antivirus level to complete the configuration:
  • Low—Web Traffic
  • Standard—Email Attachment
  • Advanced—Web and Email Attachment
  1. Click Publish to save the settings.

Configure the Intrusion Prevention System

To configure IPS:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Security tab. 
  5. Click to choose an Intrusion Detection Protection level to open the configuration screen for that level:
  • Low
  • Standard
  • Advanced

Portal_Security_11_Intrusionprevention_config.png

Field Description
Choose Intrusion Detection Prevention Level

Click the toggle to set attack detection level. The following values are the default settings for the selected Intrusion Detection Protection level:

  • Low—Client Protection. Loads all client-side attack detection.
  • Standard—Standard Recommended Profile. Recommended profile for adequate security and performance.
  • Advanced—All attack rules. Loads all attack signatures.
All Anomaly Rules Load all the anomaly signatures.
All Attack Rules Load all attack signatures. This is the default protection in the Advanced setting.
Client Protection This profile loads all client-side attack detection.
Database Profile Load the Oracle database server vulnerability signatures.
ICS Profile Load the Industrial Control System (ICS) vulnerability signatures.
Linux OS Profile Detect all attacks related to Linux OS.
MAC OS Profile Detect all attacks related to MAC OS.
Malware Profile Detect all antivirus attacks.
Server Protection Detect server-side attacks.
Standard Recommended Profile This profile is the one recommended by Versa for adequate security and performance.
Windows OS Profile Detect attacks specific to Windows OS.
  1. Click Publish to save the settings.

Configure Steering

When you configure steering, all traffic is load-balanced across all available WAN links, and voice and video traffic are prioritized dynamically to deliver the best user performance. You can specify SD-WAN steering and internet steering based on protocol, IP address, hostname, or application.

Note: You can configure internet steering only on spoke sites. When you view the Steering menu on non-spoke sites, the internet steering option does not display.

SD-WAN Steering

You can configure SD-WAN steering on spoke and non-spoke devices.

To configure SD-WAN steering:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Steering tab to open the Configuration > Steering screen. Note that you can click Easy Steering Picks to populate steering with default values, see Default Configuration Values.

    sdwan-steering-tab.png
  5. Click SD-WAN Steering.
  6. Click one of the following boxes to open the configuration screen for the selection:

    • Real Time
    • Business Critical
    • Default
    • Low Priority 

Create a Steering Rule

The actions available on the Real Time screen are identical to the Internet Steering, Business Critical, Default, and Low Priority screens. The examples below use the Real Time screen. 

To create a new rule:

  1. From the Steering > SDWAN Steering screen, click Real Time to display the Real Time screen.

    sdwan-steering-real-time.png
     
  2. Click + Rule to display the STEERING > SDWAN Steering > Real Time > Rules > Add screen.

    sdwan-steering-real-time-match-criteria.png
     
  3. Enter information for the following fields.
    Field Description
    Rule Name Enter a name for the rule.
    Match Criteria Click Protocol, Address, Hostname, or Application to add details for that criteria type. Match criteria details are listed below in the Match Criteria for Rules section.
    Scope  
    Source Zone

    Click the down arrow in the Please Select field. A pop-up window displays the configured interfaces and tunnels. 

    Choose a type: Untrust, Wired LAN, Wireless LAN, VPN, or an IPsec tunnel. To create a tunnel, see IPsec VPN.
    sdwan-steering-real-time-scope-source-zone.png

    Arrow

    Choose a Portal_one_way_arrow.png one-way or Portal_two_way_arrow.png two-way connection.

    Destination Zone

    Click the down arrow in the Please Select field. A pop-up window displays the configured interfaces and tunnels. 

    Choose a type: Untrust, Wired LAN, Wireless LAN, VPN, or an IPsec tunnel. To create a tunnel, see IPsec VPN.
    sdwan-steering-real-time-scope-destination-zone.png

    Select Profile Use the drop-down menu to select a profile. To create a new profile, see Create a Steering Profile.
  4. Click Add. The rule is saved to the screen but not the Titan cloud.
  5. Click Save to save the rule to the Titan cloud.

Create a Steering Rule for SASE Gateway 

Ensure that you create a profile before creating a rule. To create a new profile, see Create a Steering Profile for SASE Gateway. 

To add a new steering rule for SASE gateway:

  1. Click Steering > SD-WAN Steering > Real Time to display the Real Time screen.

    sase-steering-realtime.jpg
     
  2. Click the sase-steering-rule-icon.jpg icon to add a new steering rule.

    sase-steering-rule-add-rules.jpg
     
  3. Configure settings on the screen:

    sase-steering-rule-add-rules-configure.jpg
Field Description
Rule Name Enter a name for the rule.
Match Criteria There are 4 types of match criteria. Click Protocol, Address, Hostname, or Application to add details for a criteria type. See Match Criteria for Rules for match criteria details.
 

Click the down arrow in the Please select drop-down list to select the protocol.

sase-firewall-rules-select-protocol.jpg

Scope  
Source Zone

Click the down arrow in the Please Select drop-down list. A pop-up window displays the zones that classify the traffic flows coming to the gateway from various sources. 

Select a source zone, and then click Continue.

sase-firewall-rules-source-zone.jpg

  • SD-WAN—Select for the traffic coming to the gateway over overlay tunnels from remote SD-WAN branches.
  • Untrust (Internet)—Select for internet facing WAN interfaces.
  • Secure Access—Select the ingress zone for the traffic coming from VSA clients.
Arrow

Choose a Portal_one_way_arrow.png one-way or Portal_two_way_arrow.png two-way connection.

Destination Zone

Click the down arrow in the Please Select drop-down list. A pop-up window displays the zones that classify the traffic flows coming to the gateway from various sources.  

Select a destination zone, and then click Continue.

sase-firewall-rules-destination-zone.jpg

  • SD-WAN—Select for the traffic coming to the gateway over overlay tunnels from remote SD-WAN branches.
  • Untrust (Internet)—Select for internet facing WAN interfaces.
  • Secure Access—Select the ingress zone for the traffic coming from VSA clients.
Select Profile

Use the drop-down list o select a profile. To create a new profile, see Create a Steering Profile.

    Click Add. The rule is saved to the screen but not the Titan cloud.
  1. Click Save to save the rule to the Titan cloud.

Match Criteria for Rules

You can use up to 4 types of match criteria in a rule: Protocol, Address, Hostname, or Application.

To specify match criteria:   

  1. Protocol
    1. Click the Protocol tab to display the Protocol window.

      Portal_Steering_Rules_protocol.png
    2. Click the FTP drop-down menu, then select a protocol. Titan Portal automatically populates the next field with common port numbers.
    3. If needed, click the port number field and edit the port number range.
       
  2. Address
    1. Click the Address tab to display the Address window.

      Portal_Steering_match_address.png
    2. If needed, click Source and enter a source IP address in CIDR format.
    3. If needed, click Destination and enter a destination IP address.
       
  3. Hostname
    1. Click the Hostname tab to display the Hostname window.

      Portal_Steering_match_hostname.png​​​​
    2. If needed, click Source and enter a source hostname.
    3. If needed, click Destination and enter a destination hostname.
       
  4. Application
    1. Click the Application tab to display the Application window.

      Portal_Steering_match_application.png
    2. Click Add or Modify Applications. Check boxes to add applications to the match criteria.
    3. Click Add. This saves the changes to the window but not the Titan cloud. 

      Portal_Steering_match_application_after.png
       

Edit or Delete Rule

To edit or delete a rule:

  1. From the Steering > SDWAN Steering screen, click Real Time, Business Critical, Default, or Low Priority.
  2. Click a rule name to edit a rule. Click the X to delete a rule.
  3. Click Save to save the changes to the Titan cloud.

Create a Steering Profile

The actions available on the Real Time screen are identical to the Business Critical, Default, and Low Priority screens. The examples below show the Real Time screen.

To create a new profile:

  1. From the Steering > SDWAN Steering screen, click Real Time to display the Real Time screen.

    sdwan-steering-real-time.png
  2. Click +Profile to display the STEERING > SDWAN Steering > Real Time > Profiles > Add screen.

    sase-steering-realtime-nexthop.jpg
     
  3. Enter information for the following fields.
     
    Field Description
    Profile Name Enter name you are assigning to the profile.
    Select Circuit Select WAN interface.
    Next Hop

    Select the next hop:

    sase-steering-realtime-nexthop-select.jpg

    • Optimization—Enables all application traffic to select the best path.
      • Enable—Set to enable if the profile is mapped to SD-WAN policy with at least one application in the match criteria.
      • Disable—Set to disable if the SD-WAN policy does not have any applications in the match criteria.
    • Select Gateway—Select one or more next hops from Versa-hosted SASE gateways.
    • Select Devices List—Select one or more next hops from SD-WAN sites in the network.
    • Select Circuits—Select one or more WAN links on the device.
    Circuit Selection Criteria

    Click the circuit selection criteria, then specify:

    • Latency—Click Low, or click Ms to specify the amount of latency in milliseconds.
    • Packet Loss—Click Low, or click Percentage to specify the amount of packet loss by percentage.
    • Delay Variation—Click Low, or click Percentage to specify the amount of packet loss by percentage.
    Loss Recovery

    Choose the loss recovery method:

    • Forward Error Correction (FEC)
    • Packet Replication
    Load Balance

    Choose the load balancing mechanism:

    • Per Flow
    • Per Packet

     
  4. Click Add. The profile is saved to the screen but not the Titan cloud.
  5. Click Save to save the profile to the Titan cloud.

Create a Steering Profile for SASE Gateway

To create a new profile for SASE gateway:

  1. From the Steering > SDWAN Steering screen, click Real Time to display the Real Time screen.

    sdwan-steering-real-time.png
  2. Click +Profile to display the Steering > SDWAN Steering > Real Time > Profiles > Add screen.

    add-profile-sase-gateway.png
  3. Enter information for the following fields.
     
    Field Description
    Profile Name Enter a name for the profile.
    Select Circuit Select WAN interface is not supported for SASE gateway.
    Circuit Selection Criteria

    Click the circuit selection criteria, then specify:

    • Latency—Click Low, or click ms to specify the latency in milliseconds.
    • Packet Loss—Click Low, or click Percentage to specify the percentage of packet loss.
    • Delay Variation—Click Low, or click Percentage to specify the percentage of delay variation.
    Loss Recovery

    Choose the loss recovery method:

    • Forward Error Correction (FEC)
    • Packet Replication
    Load Balance

    Choose the load balancing mechanism:

    • Per Flow
    • Per Packet
  4. Click Add. The profile is saved to the screen but not to the Titan cloud.
  5. Click Save to save the profile to the Titan cloud.

Internet Steering

Internet Steering is used in a hub-and-spoke topology to provide DIA (local breakout) rather than remote break out from the hub.

When you save the configuration, the system automatically:

  • creates specific traffic steering rules
  • identifies the next hop as the local internet accessible WAN interface
  • creates a matching security rule to allow the traffic and route preference changes to ensure redundancy
  • creates the next-hop setting for local internet breakout defined rules

To configure internet steering:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Next to open the Configuration > Network screen.
  4. Click the Steering tab to open the Configuration > Steering screen. Note that you can click Easy Steering Picks to populate steering with default values, see Default Configuration Values.

    sdwan-steering-tab.png
  5. Click Internet Steering.

    internet-steering-tab.png
  6. Follow the instructions in the Create A Steering Rule section. The procedure to create a rule is the same.

Configure Secure Access Service

The Versa Secure Access (VSA) service allows you to install Versa secure access client on your machine. VSA provides SD-WAN or secure VPN tunnel connectivity to enterprise networks and access to internet through secure web gateway (SWG) services. The authentication database is selected based on the following setups: 

  • Microsoft Active Directory (AD)
  • VOS local database

During the initial configuration, a reseller or MSP provisions the license in the Versa MSP portal using Versa Cloud Gateway and provides details in VSA services. Depending on whether you selected active directory or local database authentication, the VSA configuration is done from the Versa Titan Portal. 

Configure Secure Access Client

To configure secure access client:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Secure Access tab to open the Secure Access settings screen.
  4. Click Secure Access Client and enter the following information.

    vsa-secure-access.png
     
    Field Description
    Secure Access App Profile

     

    • Secure Access Tunnel Selection

    Select the split tunnel from the drop-down list:

    • Split Tunnel—Select split tunnel for the secure access server, which allows a branch to use multiple internet links for VPN traffic flow.
    Secure Access Profile  
    • Private Prefix Access
    Enter an IP prefix accessible by clients and click the vsa-add-icon.png icon. If this value is not specified, IP subnet is automatically allocated.
    • Domain (FQDN) and DNS Resolver

    Select domain (FQDN) and DNS resolver IP address:

    • All Domains
    • Specific Domains
    • All Domains
    • Name Server—Enter the DNS name server and click the vsa-add-icon.png icon. Name server is for all other domains that are not explicitly defined.
    • Specific Domains

    Enter the following information for private domains and click the vsa-add-icon.png icon.
    vsa-secure-access-specific-domains.png

    • Domain Name—Enter the domain name in which the DNS resolver is located.
    • Name Server Address(s)—Enter the IP addresses of the DNS name servers. You can configure up to two DNS server IP addresses.
    • Name Server—Enter the DNS name server.

    Before you publish the secure access client configuration, you must create at least one static route. See Configure Routing for more information.
  5. Click Save and then Publish from the drop-down list.

Configure Enterprise AAA

Versa Titan supports enterprise AAA using Microsoft Active Directory (AD). Active Directory can be part of the SD-WAN network, or you can configure IPsec backhaul with static IP addresses to your organization.

To configure enterprise AAA:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Secure Access tab to open the Secure Access settings screen.
  4. Click Enterprise AAA and enter the following information.

    vsa-secure-access-enterprise-AAA.png
     
    Field Description
    MS Active Directory  
    IP Address Enter the IP address of the LDAP server.
    FQDN Enter the fully qualified domain name for the LDAP server.
    SSL Mode Enabled

    Select SSL mode enabled:

    • Click Yes to use SSL for the LDAP session.
    • Click No to not use SSL for the LDAP session.
    SSL Mode

    Select SSL mode for the LDAP session:

    • LDAP—Use LDAP
    • LDAPS—Use secure LDAP (LDAP over SSL)
    CA Chain

    Select the Certificate Authority (CA) to use for the secure LDAP connection:

    Default—Click default to use the default CA chain certificate.

    Custom—Click custom to upload the .crt file and then click Browse file to upload your CA chain certificate.

    Port Number Enter the port number.
    Bind-DN Name Enter the bind distinguished name (DN) authentication credentials for binding to the LDAP tree.
    Bind-DN Password Enter the bind password.
    Domain Name Enter the domain name in which the LDAP server resides.
    Base DN Enter the base DN of the LDAP directory location. NGFW initiates search for user and group information at the location.
    Bind Timeout

    Enter the bind timeout period, in seconds.

    Default: 30 seconds

    Search Timeout

    Enter the search timeout period, in seconds.

    Default: 30 seconds

  5. Click Save and then Publish from the drop-down list.

Configure IPsec Backhaul

IPsec backhaul is used to create a tunnel from the SASE Gateway to a non-Versa device. To enable routing over this IPsec tunnel, you must also add a static IP route. See Configure Routing for more information.

To create an IPsec backhaul:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click the IPsec Backhaul tab and enter the following information.

    vsa-ipsec-backhaul.png
     
    Field Description
    Name Enter the IPsec tunnel name. Titan Portal adds the tunnel name to the IPsec drop-down menu in the Static IP Route screen.
    Peer Type

    Enter the format for the peer type value: hostname, fully qualified domain name (FQDN), or IP address.

    Peer Type Value Enter the peer value using the format selected in peer type.
    Local Auth  
    Auth Type Displays the Auth type (PSK).
    Identity Type

    Enter the format for the identity type value: hostname, FQDN, or IP address.

    Identity Type Value Enter the value in the format selected in identity type.
    Shared Key Enter the preshared key.
    Peer Auth  
    Auth Type Displays the Auth type (PSK).
    Identity Type

    Enter the format for the identity type value: hostname, FQDN, or IP address.

    Identity Type Value Enter the value in the format selected in identity type.
    Shared Key Enter the preshared key.
    Tunnel IP Local Address Enter the IP address of the local tunnel interface in CIDR format.
    Tunnel IP Remote Address Enter the IP address of peer.
  4. Click the vsa-add-ipsec-profile-icon.png icon.
  5. Click Save and then Publish from the drop-down list.

Configure Routing

To configure routing:

  1. Click Configure in the left menu bar to open the Configure dashboard. 
  2. Hover over the device in the honeycomb and click Configure to open the site information window.
  3. Click Routing tab and then click Static. Enter the following information.

    vsa-routing.png
     
    Fields Description
    Interface Select a WAN or LAN interface.
    Redistribute Click Redistribute to advertise the static IP route to SD-WAN.
    Destination (IPv4/Mask) Enter the destination IP subnet. Create the static route if you are using an IPsec backhaul to a non-Versa device.
     
    • Address—Click if you are creating a secure access client.
    • IPsec—Click if you are using an IPsec backhaul to a non-Versa device.
    Next Hop Address (IPv4) Enter the next hop IP address. The IP address is automatically generated, if this is not specified.
  4. Click the vsa-add-route-icon.png icon.
  5. Click Save and then Publish from the drop-down list. Or click Load Previous from the drop-down list to load the previous configuration.

Deploy a Device Configuration

Once you have created a site, you can create and deploy its device configuration. Deploying copies the configuration information to the Versa Director. Before deployment, configuration information is saved to the Titan cloud portal only. Once the configuration is deployed, any changes you save are automatically copied to the Versa Director.

You can deploy a device configuration from any Configuration window by clicking Deploy at the bottom of the window. Once the configuration has been deployed, the Deploy option no longer displays.

To deploy a device configuration:

  1. From the bottom of any configuration window, click Deploy.

    Portal_Deploy_button.png
    An Activation pop-up displays. You can choose from the following options.
    • WiFi—For appliances that support WiFi, use WiFi to activate from a laptop using Titan Portal or from a mobile phone running the Titan Mobile app.
    • Versable—Activate the appliance using Versable from a mobile phone running the Titan Mobile app.
    • GZTP—Activate the appliance over the internet using Titan Portal or Titan Mobile.
       
  2. Click an activation method.

    Portal_Activate_choose_method.png
     
  3. For GZTP activation only, enter appliance serial number if it is not already listed. Click the pencil icon then enter serial number appearing on the appliance.

    Portal_Activate_serial_on_appliance.png

     
  4. Click CONTINUE.

    A confirmation message displays.

Undeploy a Device Configuration

Undeploying a device removes the configuration from the Versa Director. The saved device configuration is still present in the Titan cloud portal and you can still change settings and redeploy. You can undeploy a device configuration from the Inventory dashboard. See Inventory Actions.

Note the difference between undeploying and deactivating (removing) a device: Deactivating a device (removing a site) deletes its configuration information and returns the device license to inventory. Undeploying preserves the site and configuration information and the device license is still associated with the site.

Note: You must wait 5 minutes after undeploying a configuration before redeploying and activating an appliance. Titan must sync internal data structures when you undeploy; if this process is not complete you will receive an error message when you attempt to activate the appliance. 

Activate an Appliance

You can activate an appliance after you have deployed its configuration. During activation the appliance is authenticated, and its configuration is copied from the Versa Controller. This section covers GZTP and WiFi activation. For Versable activation, see the Titan Mobile documentation.

Titan uses the activation method you chose during deployment. After deployment, you can still switch between WiFi and Versable methods. See Change Activation Method. To switch between GZTP and one of the other 2 methods, you must undeploy and then redeploy the configuration. See Undeploy a Device Configuration.

Note: All CSG appliances must be running at least VOS Release 16.1R2S9.1 for Release 16.1R2S11-based regions and VOS Release 20.2.1 for Release 20.2.1-based regions. Upon activation, all CSG appliances are automatically upgraded to Release 16.1R2S11 or Release 20.2.1 if they are not at the minimum software revision level. Note that the upgrade process can take as long as 1 hour depending on connectivity, latency, and available WAN bandwidth. To avoid disruption or delay, it is recommended that you upgrade the software on CSG appliances before activating them. Contact your Versa Titan reseller or Versa Networks account team for details and assistance.
 

Change Activation Method

To change the activation method for a device:

  1. From the Configure dashboard, hover over the device to view its options card.
  2. Click the Activation method to display a drop-down menu, then select Wi-Fi or Versable.

    Portal_Activate_click_to_activate.png

    To switch between GZTP and one of the other 2 methods, you must undeploy and redeploy the device configuration. See Undeploy a Device Configuration.

Activate an Appliance Using WiFi

To activate an appliance using WiFi:

  1. On the appliance, make sure that WAN port 0 is connected to the internet and the power is turned on.
  2. On the appliance, make sure that the SIM card is inserted in the device if you are planning to use LTE for Internet connectivity backup.
  3. On a laptop, connect to WiFi on the appliance using the SSID and password below.
    • SSID—VERSA-ZTP-WiFi
    • Password—VR00M123
       
  4. Click Configure in the left menu bar to open the Configure dashboard.
  5. Hover over the device to view its options card, then click Click to Activate.

    Portal_Activate_click_to_activate.png

    The Activate Device window displays.
     
  6. Click Activate in the Activate Device window.

    Portal_Activate_initial_activation_1.png

    The Web-UI Device Management portal displays in a browser tab.
     
  7. Click Start Activation in the Web-IU Device Management screen.

    Portal_Activate_initial_activate_router.png
     
  8. Wait while the system configures the device. Watch progress in the Web-UI Device Management portal.

    Portal_Activate_initial_activate_2.png

    On the Activate Device window in Titan Portal, a status bar displays activation in progress. Do not close the Activate Device window until the activation message is displayed.

    Portal_Activate_activate_process.png

The device reboots when activation is complete. You are redirected back to the Titan device Configure dashboard where you can verify device activation status. See Verify Device Status.

Activate an Appliance Using GZTP

To activate an appliance using GZTP:

  1. On the appliance, make sure that WAN port 0 is connected to the internet and the power is turned on.
  2. On the appliance, make sure that the SIM card is inserted in the device if you are planning to use LTE for Internet connectivity backup.
  3. Click Configure in the left menu bar to open the Configure dashboard.
  4. From the Configure dashboard, hover over the device to view its options card. Click Click to Activate to begin activation.

    Portal_Activate_GZTP_activate.png
     
  5. Wait approximately 10 minutes for the activation to complete.

    Portal_Activate_GZTP_wait.png

    Once activated, the device displays a green circle indicating an activated administrative state.

    Portal_Activate_GZTP_activation_complete.png

Troubleshoot Appliance Activation

If the device does not successfully establish connection or if device activation is not successful, you are prompted to try again or contact Versa technical support.

To troubleshoot device activation in the pop-up window: 

  1. Click Get Started and follow the prompts.

    Portal_Activate_troubleshoot_no_device_foundv6.png
  2. Check that the optical network terminal (ONT) and device are connected to the Ethernet. Note that ff you are activating over internet backup (LTE), connectivity to the ONT is not required.
  3. Click Next.

    Portal_Activate_troubleshoot_step_1v6.png
  4. Check that the device is plugged in and powered on.

    Portal_Activate_troubleshoot_step_2v6.png
  5. Make sure that the router is able to receive a strong LTE signal.
  6. If activation is unsuccessful, click Try Again. After multiple attempts, click Contact Support.

Verify Device Status 

The state of the device is displayed on the customer dashboard. View the state of the device by hovering over the device in the honeycomb. You can deploy a maximum of 2 devices per site. Device status is categorized by color.

Portal_Activate_site_router_honeycomb2.png
 

Status Color Description

Grey

The device is not active.
Orange The device is not deployed.

Green

The device is active and reachable.

Red

The device is down.

To verify that the device is active and that the operation state is up:

  1. Click Configure in the left menu bar to open the Configure dashboard.
  2. Hover over a site in the honeycomb and verify that the Administrative State is Active.
  3. Verify that the Configure link is active in the Actions column. You can then click Configure to view configuration details in a new window. See Configure Device Networking.

    Portal_Activate_configure_admin_state.png
  4. Click Monitor in the left menu bar to open the Monitor dashboard.
  5. Hover over a site in the honeycomb and verify that the Operation State is Up.

    Portal_Activate_monitor_state_up.png
  6. Click Monitoring Dashboard to view Networking, Security, and Device status in the Monitor window. See Monitor Device Status.

Configure and Activate an HA Site

To configure an HA site in Titan Portal, set up the appliance wiring on 2 appliances and then configure the site. You must use identical license types on 2 identical appliances to create an HA pair. Each device must be deployed and activated separately.

Install HA Wiring

Install the wiring on the appliances:

  1. Wire the 2 appliances before you configure them for HA. When wiring the device for HA, the ports are divided into 3 sections. WAN ports are the lower numbered ports on the left. LAN ports are the higher numbered ports on the right. Assign a port in the middle, called a cross-connect port, this marks the boundary between the WAN and LAN ports.
     
    1. WAN ports must be connected starting with port 0, then port 1, and so on. WAN ports are always the lower port numbers. Attach port 0 on both devices to a WAN.
    2. Determine the cross-connect port number.
      1. If both devices use the same number of ports for WAN connections, assign the next port number after the highest WAN port number as the cross-connect port number. For example, if you use ports 0 and 1 as WAN ports on both devices, then use port 2 as the cross-connect port.
      2. If the devices use an unequal number of WAN connections, use the device with the larger number of WAN connections to determine the cross-connect port number. For example, if the first device uses ports 0 and 1 as WAN ports and the second device uses only port 0 as a WAN port, then use port 2 as the cross-connect port on both devices. Notice that port 1 on the second device is unused in this case.
    3. Connect the cross-connect port on the first device to the cross-connect port on the second device using a Cat6 Ethernet cable. Again, you must use the same port number on both devices for the cross-connect.
    4. The higher numbered ports are used as LAN ports. Connect the first LAN port (that is, the port immediately to the right of the cross-connect port) to the local LAN. This port is used for Virtual Router Redundancy Protocol (VRRP) communication. 

      The following diagram displays an example configuration assigning one WAN port, a cross-connect port, and one LAN/VRRP port on each device in an HA pair. In this case, both devices use the same number of ports for WAN connections and you should install a Cat6 Ethernet cable (not shown) to connect the 2 cross-connect ports.
      Portal_HA-connections-v2.png

Create an HA Site

To create, deploy, and activate an HA site:

Note: When deploying HA devices, you must click the HA box before deploying the site. If a device configuration is already deployed for a site and you drag-and-drop another license into the site within the honeycomb on the dashboard, this does not auto-configure HA. In that case you would need to undeploy and then redeploy using the instructions below to configure HA. See Undeploy a Device Configuration.

  1. Click Configure in the left menu bar to display the Configure dashboard.
     
  2. Click a license type in the bottom menu bar to display available licenses. You must have at least 2 licenses of the same type to configure HA.
    Portal_HA_license_icons.png
  3. Drag and drop a license onto the dashboard. The New Site Configuration window displays automatically.

    Portal_HA_drag_drop_license.png
  4. Enter site configuration information.

    Portal_HA_site_config.png
    1. Enter site name and location information. 
    2. Click the HA Mode box.
    3. Click Save to save the configuration. 
    4. The honeycomb displays the new site with 2 devices. Site A is on the left and Site B is on the right.

      Portal_HA_honeycomb.png
  5. Create and save configurations for each device separately. The first LAN, which is the next port after the cross-connect port, is a shared LAN and can be configured on the first device only. This configures the LAN on both devices. If one device fails, the other continues to operate the LAN. See Configure Device Networking, Configure Security, and Configure Steering for information on creating and saving a configuration.

  6. Deploy the device configurations:

    1. In the honeycomb for the new site, click the device on the left to display its options card, then click Configure to open a site configuration window. 

    2. Click Deploy, then choose an activation method.

    3. Repeat these steps to deploy the configuration for the device on the right, choosing an identical activation method.

  7. Activate each device using the method selected in the previous step. See Activate an Appliance for WiFi and GZTP activation. See the Titan Mobile documentation for Versable activation. You must activate each device separately.

  8. Once activated, the administrative state for the site in the honeycomb should display as active.
    Portal_HA_both_sides_activated.png

Deploy a Branch in AWS

This section describes how to configure a branch in AWS to automate instantiation, configuration, and monitoring of a VOS branch in the AWS Virtual Private Cloud (VPC).

AWS Prerequisites for vCSG for Versa Titan

This section describes the prerequisites for deploying a vCSG in your AWS VPC(s) through the Versa Titan dashboard.

Before you begin, perform the following tasks on AWS.

  1. Create an AWS VPC, then mount to the internal gateway to reach the internet.
  2. An Amazon Machine Image (AMI) should be present, with either VOS 16.1R2S11 or 20.2.X based on the Versa Director being used. Provide the AWS account ID to Versa support so they can image into your account.
  3. Collect the LAN subnet information for the VPC. Note that you must configure the vCSG LAN interfaces to match the AWS environment networks prior to deployment of the virtual device.

IAM Policy for CMS Connector

When you perform authentication using a CMS connection, you must use the following IAM policy so that the CMS connector functions on AWS:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "ec2:DescribeAddresses",
                "ec2:DescribeInstances",
                "ec2:MonitorInstances",
                "ec2:DescribeRegions",
                "ec2:DescribeVpcAttribute",
                "ec2:DescribeSecurityGroups",
                "ec2:DescribeImages",
                "ec2:DescribeNetworkInterfaces",
                "ec2:DescribeAvailabilityZones",
                "ec2:DescribeVpcs",
                "ec2:DescribeAccountAttributes",
                "ec2:AssociateAddress",
                "ec2:DisassociateAddress",
                "ec2:DescribeNetworkInterfacePermissions",
                "ec2:DescribeSubnets",
                "ec2:AllocateAddress",
                "ec2:ReleaseAddress",
                "ec2:DescribeKeyPairs"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": [
                "ec2:TerminateInstances",
                "ec2:CreateTags",
                "ec2:RunInstances",
                "ec2:DeleteNetworkInterface",
                "iam:ListInstanceProfiles",
                "ec2:ModifyNetworkInterfaceAttribute",
                "ec2:StopInstances",
                "ec2:ModifyInstanceAttribute",
                "ec2:ReplaceIamInstanceProfileAssociation",
                "ec2:CreateVolume",
                "ec2:CreateNetworkInterface",
                "ec2:DeleteVolume",
                "iam:PassRole",
                "ec2:StartInstances",
                "ec2:DisassociateIamInstanceProfile",
                "ec2:CreateSecurityGroup",
                "ec2:DeleteSecurityGroup",
                "ec2:AssociateIamInstanceProfile"
            ],
            "Resource": [
                "arn:aws:iam::*:instance-profile/*",
                "arn:aws:iam::*:role/*",
                "arn:aws:ec2:*:*:subnet/*",
                "arn:aws:ec2:*:*:instance/*",
                "arn:aws:ec2:*:*:volume/*",
                "arn:aws:ec2:*:*:security-group/*",
                "arn:aws:ec2:*:*:network-interface/*",
                "arn:aws:ec2:*:*:key-pair/*",
                "arn:aws:ec2:*::image/*"
            ]
        }
    ]}

Create an IAM Role

For information about IAM and how to create and allocate specific IAM privileges, refer to the following AWS guides:

To create an IAM role:

  1. Login to your AWS account.

    create-role.png
     
  2. Click AWS IAM Credentials tab, and then click the Create access key.

    aws-iam-credentials.png

    If you have created an access key earlier, you must keep the access key ID and secret access key values. This information is required  when you create the CMS connector in the Versa Titan dashboard.
  3. Create an AWS VPC. For more information, see https://docs.aws.amazon.com/vpc/latest/userguide/vpc-getting-started.html.

    create-vpc.png

    You can create a VPC or use an existing VPC that has the CIDR and any subnets associated to it. If you create a new VPC, assign a CIDR block or blocks to the VPC. For Versa Titan vCSG, it is not required to create specific subnets from your CIDR blocks to instantiate an EC2 instance. This process is automated from Versa Titan using CloudFormation templates. For more information on AWS VPCs, see the following:
  4.  Select Your VPCs in the left navigation pane to view information about your VPC.

    create-vpc-cidr.png


    The LAN and WAN interfaces of your vCSG must be allocated or assigned an IP address that is within your CIDR block.
  5. Select Route Tables in the left navigation pane. Then click Routes tab to display the route information.

    route-tables.png
     
  6. Select Internet Gateways in the left navigation pane. Then click Create Internet gateway and enter the following information.

    create-igw.png
     
    Field Description
    Name tag Creates a tag with a key of name and a value that you specify.
    Tags - optional

    Enter a tag value for the following:

    • Key
    • Value - optional

     
  7. To associate an internet gateway to VPC, select Attach to VPC from the Actions drop-down list.

    igw-associate-vpc.png
     
  8. In the Available VPCs field, enter the VPC name. The VPC will display only if it is not attached to an internet gateway.

    igw-attach-vpc.png
     
  9. Click Attach Internet gateway.
  10. To add a default route to internet gateway, select Route Tables in the left navigation pane. Then click Edit Routes.

    create-vpc-edit-routes.png
     
  11. In the Edit Routes page, click Add route and enter the route information.
  12. Click Save Routes.
  13. Send the AWS account information to Versa Support Team to get your VOS Amazon Machine Image (AMI).
  14. Copy the AMI to the relevant region.

    aws-modify-image permission.png

Configure a Branch in AWS

This section describes how to configure a branch in AWS to automate instantiation, configuration, and monitoring of a VOS branch in the AWS Virtual Private Cloud (VPC).

To configure a branch in AWS:

  1. In Titan Portal, click the Inventory icon in the left menu bar to display the Inventory dashboard. Then click +Cloud Account to display the Add Cloud Account window.  
    Portal_AWS_inventory_cloud_account_button.png
  2. Create a Cloud Management System (CMS) connector.
    1. Enter a name for the CMS.
    2. Enter the access key ID and secret key for the AWS account. 
    3. Click Add. 

      Portal_AWS_add_cloud_account.png

  3. Wait 3 minutes until the CMS account displays. A license is now available from the Configure dashboard.
    Portal_AWS_CMS_accounts.png
  4. Click Configure to display the Configure dashboard, then click the vCSG icon on the bottom of the dashboard to display available licenses. Select the license you just created and drag and drop onto the dashboard to create a new honeycomb. The New Site: Configuration window displays automatically.
    Portal_AWS_drag_drop.png
  5. In the New Site: Configuration window, enter the following information.

    new-site-configuration.jpg
     
    Field Description
    Site Name Enter a name for your site. 
    CMS Flavor Select AWS in the CMS Flavor drop-down list.
    CMS Name Select the CMS name in the drop-down list. This is the cloud account that is configured in the inventory section.
    Connector Select the CMS connector.
    Region Select the region, that is the VPC you deploy the vCSG. This must be the same VPC and region that is created earlier. 
    Instant type

    Select the instance type for vCSG. The qualified instance types are:

    • vCSG-Medium—4 vCPU
    • vCSG-Large—8 vCPE
    • vCSG-XL—16 vCPU
    Key pair Select the AWS key pair.
    Image Select the AMI that you received from Versa.
    VPC Network Select the VPC network where the vCSG EC2 instance is created.
    Role/Instant Profile Select the IAM role.
    Availability Zone Select the availability zone.
    Device Group Enter a device group name. By default, Versa Titan uses the syntax ORG-NAME-LICENSE-# as the device name.
    Topology Click to enable topology. The default topology is Full Mesh (Any-to-Any) site communication. Alternatively, the device can be configured in one of the following options:
    • Hub—Configure the device as a hub in a hub-spoke topology
    • Hub controller—Configure the device as a hub controller in a hub-spoke topology.This device takes up a dual role of a hub and a controller.This function is typically required when branches are connected to a private MPLS network that has no direct access to the Versa hosted controller on the public internet.
    • Spoke—Configure the device as a hub in a hub-spoke topology.
    In a hub-spoke topology, the spoke devices are configured by default in a full mesh. To change the spoke topology to spoke-to-spoke via hub or spoke-to-hub only, contact Versa Titan Support team. This change needs to be done before the first branch configuration is created.
  6. Click Next.

    Portal_AWS_config_two.png
  7. Click the LAN icon. You must configure the vCSG LAN interfaces to match the AWS environment networks.

    Portal_AWS_LAN_config_one.png
  8. Click the Ethernet Ports icon.

    Portal_AWS_LAN_config_two.png
     
  9. Enter the DHCP subnet and range information and then click Save. This returns you to the New Site: Configuration screen.

    Portal_AWS_LAN_config_three.png
  10. Click the down arrow, then click Deploy. Wait 5 minutes then refresh the screen.

    Portal_AWS_deploy_screen.png

    Deploying an AWS configuration automatically activates the site. 
     
  11. The Administrative state color circle turns green indicating that the site is now active. Hover over the device icon to display device information, name, and actions. 

    Portal_AWS_site_honeycomb.png

Verify AWS Branch Deployment

To verify and confirm the deployment and activation of AWS branch:

  1. Browse to AWS console.
  2. Click CloudFormation > Stacks.

    verify-CF-stacks.png
     
  3. Click CloudFormation stack name.
  4. Click Events tab and then click refresh button to check the status.

    verify-CF-stacks-events.png

    If you see an error, failure, or rollback, check the CloudFormation logs and contact Versa Titan Support.
  5. Click Resources tab to view various subnets that CloudFormation stack creates.

    verify-CF-stacks-resources.png
     
  6. Click the Template tab to view the template parameters.

    verify-CF-stacks-templates.png
     
  7. Navigate to AWS Console > Instances to verify that the EC2 instance is created.

    verify-ec2-instance.png
     
  8. Click the EC2 instance named after the device name of your vCSG site for EC2 instance information.

    verify-ec2-instance-details.png

Deploy SASE Gateway Services

SASE Gateways are multi-tenant gateways hosted and maintained by Versa at various datacenters in US, Japan, and Europe. SASE gateways provide security firewall and QOS-enabled traffic steering for the branch networks and secure access clients. Customer branch devices are automatically connected to all the gateways in SD-WAN as a full mesh. You can create steering and firewall rules for SD-WAN, internet, and secure web gateway zones.

When you are enrolled for the SASE gateway service, the corresponding tenant is instantiated on the SASE gateway and an instance of the SASE gateway becomes available in the Versa Titan customer dashboard. To configure security and SD-WAN steering policies options in a Titan branch, see Configure Security and Configure Steering.

Monitor Device Status

You use the Monitor dashboard to monitor the status of devices connected to the Titan portal. The Monitoring Dashboard screen for a device displays general device status and information about the network, network security, and deployed devices.

If the network, network security, and devices are operational and active, the status message Everything is working great displays. If there are any issues with network, security, or devices, an alert displays.

The following sections describe how to monitor the network, security, and device settings from the Monitor dashboard.

Use the Monitor Dashboard

To monitor router status and activity from the Monitor dashboard: 

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb to display the device-options card for the device.

    Portal_Monitor_01_monitor_dashboard.png
  3. Click Monitoring Dashboard in the Actions column to display the Monitoring Dashboard screen. A message displays describing system status. You are prompted to investigate if there are alerts on the system. Click the Refresh icon at any time to update system status.

    Portal_Monitor_02_monitor_screen.png
  4. Choose an option from the Monitoring Dashboard screen:
  • Network—Check the status of the WAN1, WAN2, and LTE interfaces.
  • Security—View a summary of URL category and reputation statistics.
  • Device—Check device information, SD-WAN connectivity, and bandwidth usage.

Monitor LAN and WAN Status

You use the Network screen to check the device WAN and LTE status. LAN and WAN status can be on or off, up or down. The IP address is only visible when the interface is on.

To monitor LAN and WAN settings:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb to display the device-options card for the device.
  3. Click Monitoring Dashboard in the Actions column of the device-options card to display the Monitoring Dashboard screen.
  4. Click Network to open the Monitor screen to check the device network status. 

    Portal_Monitor_03_monitor_network.png
  5. Click Routes to check the status of the routing table. Use the Search feature to find a route.

    Portal_Monitor_04_monitor_network_routes.png
  6. Click Ping on the Network Monitor screen to check that the router is available and connected. 
  7. Enter a valid host name and IP address in the fields provided.
  8. Click Start.

    Portal_Monitor_05_monitor_network_ping.png
  9. Click Traceroute on the Network Monitor screen to measure packet transit delays across the network.
  10. Enter a valid host name and IP address in the field provided.
  11. Click Start.

    Portal_Monitor_07_monitor_network_traceroute.png

Monitor LTE Status

You can also view LTE status from the Network screen. LTE status can be on or off, up or down. Monitoring status is only available when the device is active.

To monitor LTE settings:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb to open the option card for the device.
  3. Click Monitoring Dashboard in the Actions column of the device-options card to display the Monitoring Dashboard screen.
  4. Click Network to open the Monitor screen to check the device network status. 
  5. Click LTE and then click Access Circuit to view bandwidth usage for VPN (SD-WAN) and Dedicated Internet Access (DIA). The graph displays the bps time interval in minutes, hours, and days:
  • Last 15 minutes
  • Last 30 minutes
  • Last 1 hour
  • Last 12 hours
  • Last day
  • Last 7 days
  1. Click menu bar at the bottom of the LTE screen to select a specific time frame to check access circuit bandwidth.
  2. Click OK to save the selection.

    Portal_Monitor_08_monitor_network_LTE.png
  3. Click LTE and then click Applications to view application bandwidth used. The graph displays the bps time interval in minutes, hours, and days. You can sort the following details in the pie chart:
  • Application
  • Session
  • Bandwidth RX (bps)
  • Bandwidth TX (bps)
  1. Click menu bar at the bottom of the LTE screen to select specific time frame to check access circuit bandwidth.
  2. Click OK to save the selection.

    Portal_Monitor_09_monitor_LTE_application.png

Monitor Security Status

You use the Security screen to check the device URL category and reputation. To view the most current status, click the Refresh icon.

To monitor URL security status:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb to open the option card for the device.
  3. Click Monitor Dashboard in the Actions column of the device-options card to open the Monitor screen.
  4. Click Security > URL Category to open the Security screen to view all sites that have been blocked (blacklisted). The type and number of blocked sites are listed in graph form in 7-day summary:
  • Click the day of the week to view records specific to that day.
  • Click Category and Count to view lists of browsed websites that have been blocked.
  • Click the graph to check status in pie chart format. 
  1. Click an item on the list to open the website details window. Details include To and From information and when the site was blocked.

    Portal_Monitor_10_monitor_security.png
  2. Click Security > URL Reputation to view URL risk levels in a pie chart. URL Reputation can be one of the following:
  • High Risk IP Address
  • Suspicious IP Address
  • Moderate Risk
  • Low Risk
  • Trustworthy

Risk Hits and Percentage show statistics relating to information shown in the pie chart. Click the pie chart or the entries in the URL Reputation list to view individual website links. 

  1. Click an item on the list to open the website details window. Details include To and From information and when the site was blocked.

    Portal_Monitor_11_monitor_security_reputation.png

Monitor Device Information

You use the Device screen to check the device CPU, disk, and memory status, SD-WAN connectivity, and bandwidth usage. To view the most current status, click Refresh.

To monitor device status:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb to open the option card for the device.
  3. Click Monitor Dashboard in the Actions column of the device-options card to open the Monitor screen.
  4. Click Device to open the Device Information screen. Statistics automatically load showing overall device availability and CPU, disk, and memory use by percentage.

    Portal_Monitor_12_monitor_device_screen.png
  1. Click CPU to view CPU usage in graph form in a new window.
  • Click the menu bar at the bottom of the screen to select a specific time frame to capture CPU usage. Click OK to save the settings.
  • Click the Refresh icon to update the screen.

Portal_Monitor_13_device_CPU.png

  1. Click the Disk to view disk load usage in percentage form in a new window.
  • Click the menu bar at the bottom of the screen to select a specific time frame to capture disk load. Click OK to save the settings.
  • Click the Refresh icon to update the screen.

  1. Click Memory to view memory load in percentage form in a new window:
  • Click the menu bar at the bottom of the screen to select a specific time frame to capture memory load. Click OK to save the settings.
  • Click the Refresh icon to update the screen.

Portal_Monitor_15_device_memory.png

Monitor SD-WAN Connectivity

To monitor SD-WAN connectivity:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb that you would like to monitor to open the option card for the device.
  3. Click Monitor Dashboard in the Actions column of the device-options card to open the Monitor screen.
  4. Click Device > SD-WAN Connectivity to view device connectivity status in a new window:
  • Search for a device by name.
  • Click the Refresh icon to update the screen.

Portal_Monitor_16_monitor_device_sdwan.png

Monitor Bandwidth Usage

To monitor device bandwidth:

  1. Click the Monitor icon in the left menu bar to open the Monitor dashboard.
  2. Hover over the site in the honeycomb that you would like to monitor to open the option card for the device.
  3. Click Monitor Dashboard in the Actions column of the device-options card to open the Monitor screen.
  4. Click Device > Bandwidth Usage to view device bandwidth status in a new window:
  • Search for a device by name.
  • Click the menu bar at the bottom of the screen to select a specific time frame to capture SD-WAN connectivity. Click OK to save the settings.
  • Click the Refresh icon to update the screen.​

Portal_Monitor_17_monitor_device_bandwidth_screen.png

Manage Device Analytics

Use the Titan analytics screen to monitor the status of sites and devices connected to the Titan portal. View statistics about sites in the network and monitor network security from the Analytics dashboard, and view system logs for all connected devices. You can also build and manage reporting metrics from the Reporting screen, and view software version and system details from the Administration screen.

The following sections describe how to manage network and security analytics, build and manage reporting, and view device settings from the Analytics dashboard on the Titan portal.

Use the Analytics Dashboard

The Analytics dashboard displays analytics data in graphical representation. Sites and circuits connected to the Titan portal are sorted by bandwidth used and receive and transmit volume. Sites are also shown in map view. Click the menu icons in the site windows to set filter parameters, choose the type of display to use to view statistics, and to download and print statistic information.

To manage system status and activity from the Analytics dashboard: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.

    Portal_Analytics_01_dashboard_SD-WAN.png
     
  2. View, sort, and filter analytics information in the statistics windows using the tools provided in the upper right corner of the windows.
  3. In the left menu bar, under Dashboards > SD-WAN, click one of the following to view statistics information in a new screen:
  • Sites
  • Sites Map
  • Paths

View SD-WAN Analytics

To view analytics for SD-WAN connections from the Analytics dashboard: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > SD-WAN, click Sites to view statistics information in a new screen:
  • Usage
  • Availability
  • Connections
  • HeatMap 

View Sites by Usage

View top site usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. View sites in list form in the Sites section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_02_dashboard_SD-WAN_sites_usage.png

View Sites by Availability

View top site availability over time. The Availability screen shows Down and Up status. Sort information using the drop-down menus provided at the top of the screen. Print analytics information using the tools provided in the upper right corner of the screen.

Portal_Analytics_03_dashboard_SD-WAN_sites_availability.png

View Sites by Connection

View the top 50 site-to-site connections. The Connections screen shows analytics in a pie chart. Sort information using the drop-down menus provided at the top of the screen.

Portal_Analytics_04_dashboard_SD-WAN_sites_connections.png

View Sites by Heat Map

View how much attention a site is getting by color code. Hover over the sections in the heat map to view site name, availability, and number of sessions. Print analytics information using the tools provided in the upper right corner of the screen.

Portal_Analytics_05_dashboard_SD-WAN_sites_heatmap.png

View Sites and Circuits on the Site Map

To view the SD-WAN site map: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > SD-WAN, click Sites Map to view statistics information in the map. Click the Filter icon in the upper right corner to choose what the map displays:
  • Clustered View
  • Show Access Circuits
     

Portal_Analytics_06_dashboard_SD-WAN_sitesmap.png

View Site Paths

To view site path analytics: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > SD-WAN, click Paths to view statistics information in a new screen.
  • Usage
  • SLA Metrics
  • Rules
  • MOS
View Paths by Usage

View top path usage by bandwidth over time (DualLTE). Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_07_dashboard_SD-WAN_paths_usage.png

View Paths by SLA Metrics

Take readings to monitor that the service being provided matches what is defined in the service contract. View top service-level agreement (SLA) metrics (DualLTE) by delay and by usage. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_08_dashboard_SD-WAN_paths_SLA_metrics.png

View Path Rules

View path rules (DualLTE) by bandwidth. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_09_dashboard_SD-WAN_paths_rules.png

View Path MOS

View MOS score (DualLTE) statistics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_10_dashboard_SD-WAN_paths_MOS.png

View Security Analytics

To view security analytics:

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > Security, click Security to view the security analytics dashboard.

The following analytics information is displayed on the dashboard:

  • Top Applications
  • Top URL Categories
  • Top Bandwidth Consuming Applications
  • Top Rules
  • Top Destination Addresses
  • Top Source Addresses
  • Top Zones
  • Top Firewall Actions
  • Top Threat Types

Hover over the windows on the Security dashboard to view statistic information. 

Portal_Analytics_11_dashboard_security.png

  1. In the left menu bar, under Dashboards > Security, click a topic to view statistics information in a new screen.
  • Applications
  • Web
  • Firewall
  • Threats

View Security Applications

Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked.

To view security applications: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > Security, click Applications to view statistics information. 

    Portal_Analytics_12_dashboard_security_applications_applications.png
     

Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

View the following statistics on the Applications screen:

  • Applications
  • Risk
  • Productivity
  • Families
  • Subfamilies
View Security Application Risk

Application risk assessment is the manual or automated analysis of an application's source code or architecture to determine the potential for any vulnerability. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_13_dashboard_security_applications_risk.png

View Security Application Productivity

Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_14_dashboard_security_applications_productivity.png

View Security Application Families

View security application types, or families, including networking, general internet, media, collaboration, and business systems. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_15_dashboard_security_applications_families.png

View Security Application Subfamilies

View additional categories of security application types, or subfamilies, including networking, network service, file server, audio-video, games, and more. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_16_dashboard_security_applications_subfamilies.png

View Web Security

Web security analytics show how the URL categories and URL reputation settings are performing.

To view security analytics for current Internet settings: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > Security, click Web to view statistics information. 

The following analytics information is displayed on the dashboard:

  • URL Categories
  • URL Reputation
View URL Category Analytics

Hover over the graph on the dashboard to view URL category usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_17_dashboard_security_web_URL_categories.png

View URL Reputation Analytics

Hover over the graph on the dashboard to view URL reputation usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_18_dashboard_security_web_URL_reputation.png

View Firewall Analytics

Firewall analytics show how current security rules and IP settings are performing.

To view security analytics for current rules and IP settings: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > Security, click Firewall to view statistics information. 

The following tabs are available on the dashboard:

  • Rules
  • Source
  • Destination
  • Zones
  • Forwarding Class
View Rule Analytics

Hover over the graph on the dashboard to view rule usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_19_dashboard_security_firewall_rules.png

View Source Analytics

Hover over the graph on the dashboard to view source IP usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_20_dashboard_security_firewall_source.png

View Destination Analytics

Hover over the graph on the dashboard to view destination IP usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_21_dashboard_security_firewall_destination.png

View Zone Analytics

Hover over the graph on the dashboard to view zone usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_22_dashboard_security_firewall_zones.png

View Forwarding Class Analytics

Forwarding classes (FCs) allow you to group packets for transmission and to assign packets to output queues. The forwarding class and the loss priority define the per-hop behavior (PHB in DiffServ) of a packet.

Hover over the graph on the dashboard to view forwarding class usage over time. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_23_dashboard_security_firewall_forwarding_class.png

View Threat Analytics

Threat analytics show how current URL, IP, and malware settings are performing and summarize system vulnerabilities.

To view threat analytics: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards > Security, click Threats to view statistics information. 

The following tabs are available on the dashboard:

  • Web
  • IP
  • Malware
  • Vulnerabilities
  • DDOS
  • Summary
View Web Filtering Analytics

Hover over the windows on the dashboard to view URL filtering analytics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_24_dashboard_threats_web.png

View IP Filtering Analytics

Hover over the windows on the dashboard to view IP filtering. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_25_dashboard_threats_IP.png

View Malware Analytics

Hover over the windows on the dashboard to view antivirus and malware analytics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_26_dashboard_threats_malware.png

View Vulnerability Analytics

Hover over the windows on the dashboard to view threat and vulnerability analytics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_27_dashboard_threats_vulnerabilities.png

View DDoS Analytics

Hover over the dashboard to view distributed denial-of-service (DDoS) attack analytics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_28_dashboard_threats_DDOS.png

View a Summary of Threat Analytics

Hover over the windows in the dashboard to view top threat analytics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_29_dashboard_threats_summary.png

View System Analytics

Use the Analytics > System dashboard to monitor device health.

To view device health monitoring: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards, click System to view the System dashboard. 

The following tabs are available on the dashboard:

  • Interfaces
  • Guest VNF
  • SNG

Hover over the windows in the dashboard to view device health. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_30_dashboard_system.png

View System Interfaces

Use the Analytics > System > Interfaces dashboard to monitor WAN interfaces.

To view device interfaces: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards, click System to view the System dashboard. 
  3. Click Interfaces to view the following interfaces:
  • WAN Interfaces
  • LTE Interfaces
View WAN Interfaces

Hover over the windows in the dashboard to view WAN interface utilization. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_31_dashboard_system_interfaces_WAN_interfaces.png

View LTE Interfaces

Hover over the windows in the dashboard to view LTE interface statistics. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

Portal_Analytics_32_dashboard_system_interfaces_LTE_interfaces.png

View Guest VNF Information

Use the Analytics > System > Guest VNF dashboard to monitor Guest VNF.

To view Guest VNF information: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards, click System to view the System dashboard. 
  3. Click Guest VNF to view the following:
  • Guest VNF Health Monitoring
  • Guest VNF Interface Statistics
  • Guest VNF Events Logs

Portal_Analytics_33_dashboard_system_guest_VNF.png

Hover over the windows in the dashboard to view Guest VNF information. Sort information using the drop-down menus provided at the top of the screen. View, sort, and filter analytics information using the tools provided in the upper right corner of the section. Copy, download, or print the list using the tools provided in the upper right corner of the section.

View Service Node Group Information

Use the Analytics > System > SNG dashboard to monitor service node groups (SNGs).

To view SNG information: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen. The SD-WAN Dashboard screen opens by default.
  2. In the left menu bar, under Dashboards, click System to view the System dashboard. 
  3. Click SNG to view SNG statistics.

    Portal_Analytics_34_dashboard_system_SNG.png

View Logs

Use the Analytics > Logs dashboard to log information.

To view log information: 

  1. Click the Analytics icon in the left menu bar to open the Analytics screen.
  2. In the left menu bar, click Logs. The Logs > Alarms screen displays.

    Portal_Analytics_35_dashboard_logs.png
     
  3. Click additional log names to view information for those logs. The following logs are available:
  • Alarms
  • DHCP
  • Authentication
  • Firewall
  • CGNAT
  • DOS
  • IDP
  • Anti Virus
  • URL Filtering
  • IP Filtering
  • Traffic Monitoring
  • Web Monitoring
  • SD-WAN
  • Traffic Steering
  • SSL Decryption
  • ADC
  • Guest VNF events
  • Packet captures

Use Live Monitoring

Use the Titan Live Monitoring dashboard to monitor the live status of devices connected to the Titan portal.

Live Monitoring Summary 

The Live Monitoring Summary screen allows you to view tenant and system summary status, tenant health, and monitor recent events, application activity, and other services.

To monitor summary router status and activity: 

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab to view the following system status:
  • Tenant Summary
  • Map View
  • Tenant Health
  • Recent Events
  • System Summary
  • Application Activity
  • Services


Portal_Live_Monitor_01-dashboard.png​​​​​
 

  1. Click Details under Tenant Summary to view system details in grid form. Click Back to return to Live Monitoring card view.

    Portal_Live_Monitor_02-tenant_summary_details.png
     
  2. Use the hover and select options to navigate to tenant locations in the Map View window. Click the location balloon to open the monitoring details window.

Monitor Tenant Health

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab.
  3. In the Tenant Health window, click a category to open status details in a new window. Click Back to return to the Category window.

You can choose from the following tenant health categories:

  • Configuration Sync Status
  • Reachability Status
  • Service Status
  • Interfaces
  • BGP Adjacencies
  • IKE Status
  • Paths

The following example shows the Tenant Health > Config Sync Status window.

Portal_Live_Monitor_03-tenant_health_config_sync_details.png

The following example shows the Tenant Heath > Reachability Status window.

Portal_Live_Monitor_04-tenant_health_reachability_status.png

The following example shows the Tenant Health > Service Status window.

Portal_Live_Monitor_05-tenant_health_service_status.png

The following example shows the Tenant Health > Interfaces window.

Portal_Live_Monitor_06-tenant_health_interfaces.png

The following example shows the Tenant Health > BGP Adjacencies window.

Click an entry in the BGP Adjacencies window to open the Details window for the entry. The Details window lists the tenant connection state and length of time the device has been connected, and local IP address information.

Portal_Live_Monitor_07-tenant_health_BGP_adjacencies.png

The following example shows the Tenant Health > IKE Status window.

Portal_Live_Monitor_08-tenant_health_IKE_status.png

The following example shows the Tenant Health > Paths window.

Click an entry in the Paths window to open the Details window for the entry. The Details window lists tenant class, local and remote WAN link information, connection state, and the last time the interface went down and came back up again.

Portal_Live_Monitor_09-tenant_health_paths.png

Monitor Recent Events

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab.
  3. In the Recent Events window, click the toggle to check alarm events every 5 minutes. Then click Details to view alarms on the system in a new window. 

    Portal_Live_Monitor_10-recent_events.png

View System Summary Information

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab.
  3. In the System Summary window, click an option to open system status details in a new window.

You can choose from the following system options:

  • Hardware Information
  • Software Version
  • Hardware Model

The following example shows the System Summary > Hardware Information window.

Portal_Live_Monitor_11-system_summary_hardware.png

The following example shows the System Summary > Software Version window.

Portal_Live_Monitor_12-system_summary_software.png

The following example shows the System Summary > Hardware Model window.

Portal_Live_Monitor_13-system_summary_hardware_model.png

Monitor Application Activity

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab.
  3. In the Application Activity window, view top application details in graph form. Click the parameterize-icon.png Gear icon to display details for the following options:
  • Sessions
  • Transactions
  • Total Bytes Forward
  • Total Bytes Reverse

Click the print-download-icon.png Menu icon to choose print options. 

Portal_Live_Monitor_14-application_activity.png

Monitor Services

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Summary tab.
  3. In the Services window, view the number of active network and firewall connections.

    Portal_Live_Monitor_15-services.png

Monitor Devices

The Devices tab in the Live Monitoring dashboard lists active devices for specific organizations. Click a device name to display the device's dashboard. The dashboard displays device information under the following tabs:

  • Summary–Displays active CPE interfaces, administration status, SD-WAN application traffic, recent events, health monitoring, policy violations, and appliance activity
  • Services–Displays Services and Networking information
  • System–Displays hardware and software information
  • Tools–Displays ping, traceroute, tcpdump, and speed test options

To view device details: 

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab to view device details for all appliances.
  3. Click a device in the Name column to open device monitoring options.

    Portal_Live_Monitor_16-devices_details.png

Monitor Device Summary

To view device details for all appliances:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options. The Summary tab displays by default.

    Portal_Live_Monitor_17-devices_services_tab_summary.png
     
  4. Choose an interface from the Interface column and click the Eye eye-icon.png icon to view configuration information for that interface in a new window.

    Portal_Live_Monitor_18-devices_services_tab_interfaces.png
     
    Field Description
    Interface Name of the interface.
    Network Name Name of the network.
    Service Provider

    Name of the service provider.

    Status

    Status can be Up or Down for:

    • Operational
    • Admin
    Live Data

    Select the check box to enable the radio buttons below the table, then select either:

    • All Traffic
    • SD-WAN Traffic
    Bandwidth (Mbps)

    Describes the configured and measured bandwidth for the interface, as well as availability of the LAN or WAN interface.

  5. Click Measure to select specific measurement details. Select settings from the following drop down menus:
  • Remote Destination (required to activate the remaining options)
  • Remote Circuit Name
  • Remote Circuit Media
  • Remote Circuit Type
    ​​​​

Portal_Live_Monitor_19-devices_services_tab_bandwith_measure.png

  1. Click Request to send the measurement request. 

Monitor Device Services

The Device tab displays device services and networking information.

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab to manage services and networking settings. Manage system settings from the following columns:
  • Services
  • Networking
    ​​​​​​

Portal_Live_Monitor_20-devices_services_tab_services_dashboard.png

SD-WAN Settings

To monitor SD-WAN settings:

  1. Click the Services tab.
  2. In the Services column, click SD-WAN. The tabs in the SD-WAN window are described below:

    Portal_Live_Monitor_21-devices_services_tab_services_SD-WAN.png
     
    Tab Description
    Sites

    Click to view all sites in a new window. The Sites tab displays the following information:

    • Site Name—Click the Eye eye-icon.png icon for a site in to view site details in a new window.
    • Management IP
    • Type—Remote or local
    • Up Time—Shown in days:hours:minutes:seconds format
    • Connectivity Status—Connected or null field
    • Controller—Yes or no
    Aggregate Traffic Select a site from the drop-down list to display aggregate traffic information.
    Transport Paths Select a transport path from the drop-down list to display the transport path information.
    SLA Paths Select a site from the drop-down list to view SLA path information.
    SLA Metrics Select a site from the drop-down list to view SLA metrics.
    Policies

    The following policy information displays:

    • Rule Name
    • Hit Count
    • Tx (Transmit) Packet Tunnel
    • Tx (Transmit) Bytes Tunnel
    • Rx (Return) Packets Tunnel
    • Rx (Return) Bytes Tunnel
       

    Select a policy from the drop-down list to display the rules that are configured for that policy.

    Click the Eye eye-icon.png icon for a rule to view rule details in a new window. Select from one of the following items from the drop-down list:

    • Statistics–Select from the following choices in a new drop-down list:
      • Remote Branch—Select a controller from a new drop-down list
      • Local Circuit—Select a circuit from a new drop-down list
      • Extensive—Displays extensive statistics for the rule
    • Path State–
      • Select a controller from a new drop-down list
      • Select Brief, Detail, or Extensive from a new drop-down list
    • Application Metrics–Select a controller from a new drop-down list
    Forwarding Profiles

    The Forwarding Profiles tab displays the following information:

    • Name of the forwarding profile
    • Hit Count
    • No Valid Link Drop Count
    • SLA Fall Drop Count
    • SLA Fall Forward Count
    • Turn Redirect Count

    Click a forwarding profile name to display the active configuration for the forwarding profile:

    • Business Critical
    • Default
    • Low Priority
    • Realtime
    Sessions

    The Sessions tab displays the following session filtering information:

    • SD-WAN Session Count
    • SD-WAN Session Created
    • SD-WAN Session Closed

    Click the Eye eye-icon.png icon for an entry in the table to open the Session Filter window. Enter information into the fields:

    • Source IP Address/Prefix
    • Source Port
    • Destination IP Address/Prefix
    • Destination Port
    • Protocol
    • Predefined Application
    • Predefined URL Category

    Click Filter to enable the session filter. To clear settings, click Reset.

    MOS

    Select a controller from the drop-down list. The following call quality metrics information is displayed:

    • Local Circuit
    • Remote Circuit
    • Codec
    • MOS Score
CGNAT Settings

To view CGNAT and DNAT policy forwarding settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Services column, click CGNAT to display the following information.

    Portal_Live_Monitor_22-devices_services_tab_services_CGNAT.png
     
    Tab Description
    Rules

    Displays the configured CGNAT rules. Click a rule name to display the active configuration for the rule.

    Pools

    Displays the configured CGNAT pools. Click a rule name to display the active configuration for the pool.

    Sessions

    Display the NAT session count. Click the Eye eye-icon.png icon for an entry in the table to open the Session Filter window.

    • Source IP Address/Prefix
    • Source Port
    • Destination IP Address/Prefix
    • Destination Port
    • Protocol
    • Predefined application
    • Predefined URL Category

    Click Filter to enable the session filter. To clear settings, click Reset.

NGFW Settings

To monitor NGFW settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Services column, click NGFW.

    Portal_Live_Monitor_23-devices_services_tab_services_NGFW.png
     
    Field Description
    Zone Protection

    Displays configured zone protection profiles. Click a profile name to display the statistics for zone protection profile.

    DOS Policies Select the type of DoS policy from the drop-down list. The screen displays the DoS policy details. Click a policy name to view its active configuration.
    Decryption

    Select a decryption type:

    • Global
    • Profile
    • Policy
    • VFP
    Policies

    Select a policy from the drop-down list to display the configured rules for the policy and to view statistics for each rule. Click a rule name to display the active configuration for the rule.

    IP Filtering Select from the following IP filtering types to display the configured IP filters for each type:
    • User Defined
    • Predefined
    URL Filtering

    Select a URL filtering type to display statistics for the filter:

    • Profiles—Click a profile name to display the active configuration for the profile.
    • Global
    • URL Category Predefined
    • URL Category Userdefined
    • URL Reputation Predefined
    • URL Reputation Userdefined
    Anti Virus Select an antivirus type:
    • Predefined Profile
      • Select a profile from a new drop-down list:
        • Scan Web Traffic
        • Scan Email Traffic
        • Scan Web and Email Traffic
      • Select a profile type from a new drop-down list:
        • predefined-protocol
        • predefined-file-type
        • predefined-statistics
    • User Defined Profile
    Vulnerability

    Select a vulnerability type:

    • User Defined
    • Pre Defined—Displays predefined vulnerability rules. Click the Eye eye-icon.png icon for an entry in the table to display additional information.
    • Sessions
    • IPS Compile Status
    Vulnerability Signature

    Select a vulnerability type:

    • User Defined
    • Pre Defined
    • Pre Defined Overwrite
    Security Packages View and search for installed security packages.
    Sessions

    View and search for active sessions.

    Click in the number in the Session Count column to show session details in a new window.

    User Identification

    Select a user ID type:

    • Authentication Profile
    • Local Database
    • LDAP Profile
    • Kerberos Profile
    • SALM Profile
    • Live Users—Select Brief or Detail in a new drop-down list
IPsec Settings

To monitor IPsec settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Services column, click IPSEC.

    Portal_Live_Monitor_24-devices_services_tab_services_IPsec.png
     
    Field Description
    Overview

    View and search for IPsec information.

    Branch To Branch

    Select a profile from the drop-down list to open details in a new window.

    Click the Eye eye-icon.png icon for an entry in the table to view branch to branch details in a new window.

    IKE History

    Select a profile from the drop-down list to open details in a new window.

    Click the Eye eye-icon.png icon for an entry in the table to view IKE history status details in a new window.

    IKE Security Association

    Select a profile from the drop-down list to open details in a new window.

    Click the Eye eye-icon.png icon for an entry in the table to view IKE security association details in a new window.

    IPsec History

    Select a profile from the drop-down list to open details in a new window.

    Click the Eye eye-icon.png icon for an entry in the table to view IPsec status history in a new window.

    IPsec Security Association

    Select a profile from the drop-down list to open details in a new window.

    Click the Eye eye-icon.png icon for an entry in the table to view IPsec security association details in a new window.

    Profile Statistics

    Select a profile from the drop-down list to view inbound statistics in a new window.

Sessions Settings

To monitor active sessions:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Services column, click Sessions.
  6. Click in a number in the Session Count column to show session details for all sessions in a new window.

    Portal_Live_Monitor_25-devices_services_tab_services_sessions.png

Monitor Networking Services

The Device > Services > Networking screen allows you to monitor the following:

  • Interfaces
  • Routes
  • BGP
  • OSPF
  • OSPFv3
  • BFD
  • DHCP
  • COS
  • VRRP
  • LEF
  • ARP
  • IP-SLA
Interface Settings

To monitor network interface settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click Interfaces.
  6. Click the Eye eye-icon.png icon for an entry in the table to display statistics for the interface in a new window.

    Portal_Live_Monitor_26-devices_services_tab_networking_tab_interfaces.png
Routes Settings

To monitor network route settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard. Click the Devices tab.
  2. Click a device in the Name column to open device monitoring options.
  3. Click the Services tab.
  4. In the Networking column, click Routes.
  5. Select a routing instance from the drop-down list, and then choose IPv4 or IPv6 from a new drop-down list to view statistics for that routing instance.

    Portal_Live_Monitor_27-devices_services_tab_networking_tab_routes.png
BGP Settings

To monitor network BGP settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click BGP.
  6. Select a routing instance from the drop-down list to view BGP statistics for that routing instance.

    Portal_Live_Monitor_28-devices_services_tab_networking_tab_BGP.png
OSPF Settings

To monitor OSPF settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click OSPF.
  6. Select a routing instance from the drop-down list to view OSPF statistics for that routing instance.

    Portal_Live_Monitor_29-devices_services_tab_networking_tab_OSPF.png
OSPFv3 Settings

To monitor OSPFv3 settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click OSPFv3.
  6. Select a routing instance from the drop-down list to view OSPFv3 statistics for that routing instance.

    Portal_Live_Monitor_30-devices_services_tab_networking_tab_OSPFv3.png
BFD Settings

To monitor BFD settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click BFD.
  6. Select a routing instance from the drop-down list to view BFD statistics for that routing instance.

    Portal_Live_Monitor_31-devices_services_tab_networking_tab_BFD.png
DHCP Settings

To monitor DHCP settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click DHCP.

    Portal_Live_Monitor_32-devices_services_tab_networking_tab_DHCP.png
     
    Field Description
    Active Leases Click to view active leases.
    Lease History Click to view lease history.
    Statistics

    Select from the following statistic types:

    • Interface
    • Relay Profile
    • Service Profile

    Then select from the following:

    • DHCP
    • DHCPv6

    A list of interfaces and related statistics are displayed.

COS Settings

To monitor COS settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click COS.

    Portal_Live_Monitor_33-devices_services_tab_networking_tab_COS.png
     
    Field Description
    QoS Policies Select a policy from the drop-down list.
    App QoS Policies

    Select a policy from the drop-down list to view the rules for that policy.

    Click a rule name to display the active configuration for the rule.

    Interfaces

    Display and search for COS interfaces.

    Click the Eye eye-icon.png icon for an interface to view details in a new window. 

    Choose Detail or Extensive from the drop-down list to define statistics. 

VRRP Settings

To monitor VRRP settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click VRRP.
  6. Select an option from the drop-down list to view the information:
  • Summary
  • Statistics
     

Portal_Live_Monitor_34-devices_services_tab_networking_tab_VRRP.png

Log Export Functionality Settings

To monitor Log Export Functionality (LEF) settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click LEF.
  6. Select a log collector from the drop-down list, then choose one of the following to options to view the LEF information:
  • Status
  • Statistics
    ​​​​​​

Portal_Live_Monitor_35-devices_services_tab_networking_tab_LEF.png

ARP Settings

To monitor ARP settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Services tab.
  3. In the Networking column, click ARP.
  4. Select a routing instance from the drop-down list to view information about the routing instance.

    Portal_Live_Monitor_36-devices_services_tab_networking_tab_ARP.png
IP-SLA Settings

To monitor IP-SLA settings:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Services tab.
  5. In the Networking column, click IP-SLA.

    Portal_Live_Monitor_37-devices_services_tab_networking_tab_IP-SLA.png

    The screen displays the following statistics for the configured IP-SLAs.

    Portal_Live_Monitor_38-devices_services_tab_networking_tab_IP-SLA-2.png

Monitor Device System Settings

To monitor device's system setting: 

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the System tab to view the information below.

    Portal_Live_Monitor_39-devices_system_tab.png
     

The Device > System screen displays the following information:

  • CPE Resources (Move the toggle to the right to refresh the data every 10 seconds.)
  • System Summary
  • Device Summary
  • System Overall Status
  • Associate Templates
  • NTP Client Statistics
  • License

Use Device Tools

The following procedures are not available if you are logged in as the default user. Contact Versa Support for assistance.

The Device > Tools screen contains the following testing tools:

  • Ping the router
  • Perform a traceroute test
  • Perform tcpdump 
  • Perform a speed test
Ping the Router

Note that you can also ping the router from the Monitor tab. 

To ping the router:

  1. Click the Live Monitoring icon in the menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Tools tab.
  5. Click Ping.
  6. Enter information into the fields and click Start.

    Portal_Live_Monitor_40-devices_tools_tab_ping.png
     
    Field Description
    Host Name/Address Enter hostname or IP address.
    Routing Instance Select routing instance.
    Source Address Enter source IP address.
    Packet Size Enter packet size. 
    Count Enter 1 to 10 packets.
Use Traceroute

The following procedure is not available if you are logged in as the default user. Contact Versa Support for assistance.

To run a traceroute:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Tools tab.
  5. Click Traceroute.
  6. Enter information into the fields and click Start.

    Portal_Live_Monitor_41-devices_tools_tab_traceroute.png
     
    Field Description
    Target Host Name/Address Enter target host name or IP address.
    Routing Instance Select the routing instance.
    Source IP Select the source IP address.
Use Tcpdump

The following procedure is not available if you are logged in as the default user. Contact Versa Support for assistance.

To run a Tcpdump:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Tools tab.
  5. Click Tcpdump.
  6. Enter information into the fields and click Start.

    Portal_Live_Monitor_43-devices_tools_tab_TCPdump.png
     
    Field Description
    Interface Select an interface.
    Filter Enter type of filter to be applied.
    Timeout (in seconds) Enter a timeout value. If no value is entered, the operation runs for 60 seconds.
Run a Speed Test

The following procedure is not available if you are logged in as the default user. Contact Versa Support for assistance.

It is recommended that you run a speed test from the Troubleshoot dashboard. See Troubleshoot the Titan Portal.

To run a speed test from the Live Monitoring tab:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click the Tools tab.
  5. Click Speed Test.
  6. Enter information into the fields and click Test Speed.

    Portal_Live_Monitor_42-devices_tools_tab_speed_test.png
     
    Field Description
    Remote IP Address/FQDN Enter an IP address or fully qualified domain name.
    Routing Instance Select a routing instance.
    Interface Select an interface.

Live Monitoring Options

A series of options at the top right side of the Live Monitoring > Devices screen allow additional monitoring options.

Monitor Devices From a Shell

The following procedure is not available if you are logged in as the default user. Contact Versa Support for assistance.

To use shell options:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click Shell. Note that you must disable pop-up blocking to enable multiple CLI screens.

Monitor Configuration Status From a Shell

To monitor configuration status:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click Config Status to open a CLI session for the following: 
  • Sync To
  • Sync From
  • Compare

Upgrade Software

The following procedure is not available if you are logged in as the default user. Contact Versa Support for assistance.

To upgrade software:

  1. Click the Live Monitoring icon in the left menu bar to open the Live Monitoring dashboard.
  2. Click the Devices tab.
  3. Click a device in the Name column to open device monitoring options.
  4. Click Upgrade to open the Upgrade Appliance pop-up window.

    Portal_Live_Monitor_44-devices_upgrade.png
  5. Select a software package.
  6. (Optional) Click the Upload Only box.
  7. Click OK.

Manage Device License Inventory

Use the Inventory dashboard to view device licenses and associated devices. You can turn service and security on or off. You can also undeploy or deactivate a device or send a device location request.

The Inventory dashboard is available to the Enterprise Administrator; the Enterprise User does not have access to the Inventory dashboard.

Inventory data can be downloaded and exported in PDF, CSV, and XLS format.

View Device Licenses

You can view a list of licenses used by activated devices or a list of all licenses. For Cloud Account/vCSG license information, see Configure a Branch in AWS.

To manage licenses and devices in the Titan Inventory:

  1. Click the Inventory icon in the left menu bar to open the Inventory dashboard.
  2. Select a device type from the menu at the top of the screen to view device licenses:
    1. Click Active Licenses to view active device licenses.
    2. Click Total Licenses to view all device licenses. 
    3. Click SASE Gateway to view all SASE device licenses.

      inventory-device-type.jpg
       
  3. Click the Portal_Device_Inventory_sdf_icon.png Select Display Fields icon to choose which columns are displayed in the Inventory section.

    Portal_Device_Inventory_02_select_display_fields.png
    Field Description
    Service Type

    Describes the series classification (CSG300, CSG00, or vCSG) and license type (e.g. CSG350-2LA).

    Site Displays the site location. Hover over the Site name to view site address.
    Device Name Displays the device name.
    Serial Number Displays the serial number.
    S/W Version Displays the Versa OS™ software version running on the device. Hover over S/W Version to view software information.
    Security Click the Security toggle to turn all device security components on or off. To enable or disable individual components, see Manage Security Components.
    License Expiration Date Displays the date when the device license expires.
    Service State Click the Service State toggle to turn the service on or off.
    Action Click to select an inventory action.

    The inventory dashboard uses the following naming conventions:
     
    Acronym Description
    (blank) No WiFi and LTE
    WLA WiFi and LTE
    WLA-4GP WiFi and LTE and 4 copper GE PoE ports
    2LA No WiFi, 2 LTE
    2LA-4GP No WiFi, 2 LTE and 4x copper GE PoE ports

View SASE Gateway Licenses

To manage SASE gateway licenses and devices in the Titan Inventory:

  1. Click the Inventory icon in the left menu bar to open the Inventory dashboard.
  2. Select SASE Gateway from the device type drop-down list at the top of the screen.

    inventory-device-type-sase-gateway.jpg

Inventory Actions

To deactivate (remove), undeploy, or request the location of a device from the Inventory dashboard:

  1. Locate the device in the grid, then click the 3-dot icon in the actions column to display available actions.

    Portal_Device_Inventory_actions.png
     
  2. Click an action.
    • Undeploy—Undeploys the device. The device and its configuration remain in the honeycomb.
    • Request device location—Sends a notification on the mobile app to the user requesting for the device location. 
    • Deactivate—Removes the device, its site, and its configuration.​​​​​​

Note: You must wait 5 minutes after undeploying a configuration before redeploying and activating an appliance. Titan must sync internal data structures when you undeploy; if this process is not complete you will receive an error message when you attempt to activate the appliance. 

Manage Users

An enterprise administrator can view, create, and delete users from the Users dashboard. Titan accounts allow access to both the Versa Titan portal and the Versa Titan mobile app. For individual accounts, Titan Portal only displays permissible menu items. For example, the left menu bar may only display the Configure, Monitor, and Troubleshoot icons for an Enterprise User account. Enterprise users do not have access to Users module.

Manage User Accounts

To view a list of user accounts:

Click the Users icon in the left menu bar. This displays the Users dashboard.
 

users-titan-user.png

Field Description
Users

Select a user from the Users drop-down list:

  • Titan User
  • Titan Secure VPN Service User
Status Displays whether the user is locked or unlocked.
Name User's first and last name.
Email User email address. Initially matches username but can be edited.
User Name Username used to login to the account. This is the same as the initial email address for the account.
Phone User phone number.
Role & Privileges Displays the user role:
  • Enterprise Admin
  • Enterprise User
Lock/Unlock Click the toggle to lock or unlock the account. Locking the account disables the login without requiring you to delete the account.
2FA Slide the toggle to the left to disable or to the right to enable two-factor authentication.
Mobile Notification Slide the toggle to the left to disable or to the right to enable mobile phone notifications.
Action Click the 3-dot icon to choose an action:
  • Edit a user
  • Delete a user

Add a User

An enterprise administrator can add a new account and assign user roles and privileges. You cannot assign more privileges than the account you are using. Users can use their account to login to both Titan Portal and Titan Mobile.

To add a new user:

  1. Click the Users icon in the left menu bar to display the Users dashboard.
  2. Click Users drop-down list and select Titan User.
  3. Click the + Add User icon at the top right to display the Add User window.

    users-add-user.png
     
  4. Enter information for the following fields.
     
    Field Description
    First Name Enter first name.
    Last Name Enter last name.
    Email Address Enter user email address. This automatically becomes the login name for the account. You can change the email address after creating the account but not the login name.
    Phone Number Enter phone number. Used for push notifications in Titan Mobile.
    Two Factor Authentication

    Slide the toggle to enable or disable two factor authentication. 

    Role & Privileges

    Click Enterprise Admin or Enterprise User to assign a role to the account.

    • Enterprise Admin

    Enterprise Admin roles have the following privileges:
    users-enterprise-admin.png

    • Read and write access to WAN, LTE, LAN, Security, and Steering settings.
    • Read access to Director, Analytics & Live Monitoring, and Titan shop.

    By default, enterprise administrators have the following privileges:

    • Read access to monitor, troubleshoot, inventory, and users menu items. 
    • Write access to WiFi radio settings and read-only access to all other configuration settings.
    • Can create a new site.
    • Can create new user accounts but cannot assign more privileges to an account than they have themselves.
    • Enterprise User

    Enterprise User roles have the following privileges:

    users-enterprise-user.png

    • Read and write access to WAN, LTE, LAN, Security, Steering, Secure Access, IPsec Backhaul, and Routing settings.
    • Read access to Director and Analytics & Live Monitoring.

    By default, enterprise users have the following privileges:

    • Read access to monitor and troubleshoot menu items.
    • Write access to WiFi radio settings and read-only access to all other configuration settings.

     
  5. Click Create to add the new user. Titan Portal automatically sends an email to the user with instructions on creating an account password and downloading Titan Mobile. Users can login to both Titan Portal and Titan Mobile using the account.

Add a Titan Secure VPN Service User

An enterprise administrator can add a new account for Titan secure VPN service user.

To add a new Titan secure VPN service user:

  1. Click the Users icon in the left menu bar to display the Users dashboard.
  2. Click Users drop-down list in the main pane and select Titan Secure VPN Service User.

    users-vsa-user.png
     
    Field Description
    Users

    Select a user from the Users drop-down list:

    • Titan User
    • Titan Secure VPN Service User
    Licenses

    Displays the license information:

    • Total
    • Used
    Import Users

    Click users-vsa-import-user-icon.png icon to import users from an Excel template.
     

    users-vsa-import-user.png

    • Click Browse file icon and select the Excel template.
    • Click Upload.
    Name User's first and last name.
    Email User email address. Initially matches username but can be edited.
    Phone User phone number.
    Action

    Click the 3-dot icon to choose an action:

    • Edit a user
    • Delete a user

     
  3. Click the users-vsa-add-user-icon.png icon at the top right to display the Add User window.

    users-vsa-add-user.png
     
  4. Enter information for the following fields.
     
    Field Description
    First Name Enter first name.
    Last Name Enter last name.
    Email Address Enter user email address. This automatically becomes the login name for the account. You can change the email address after creating the account but not the login name.
    Phone Enter phone number. Used for push notifications in Titan Mobile.
  5. Click Create.

Edit a User 

The enterprise admin can edit user information and change roles and privileges assigned to a user.

To edit a user:

  1. Click the Users icon in the left menu bar to display the Users dashboard.
  2. Hover over the 3-dot menu in the user Actions column and click Edit to display the Edit User window. 

    Portal_Manage_Users_03_edit_user.png
  3. Edit the information as needed in the fields provided. 
  4. Click Enterprise User or Enterprise Admin to change roles.
  5. Check or uncheck boxes to change Privileges.
  6. Click Update to save the settings.

Delete a User

The enterprise admin can delete users from the Titan Users dashboard. Deleting an account with an active login automatically logs out the user. 

To delete a user:

  1. Click the Users icon in the left navigation menu bar to display the Users dashboard.
  2. Hover over the 3-dot menu in the user Actions column and click Delete.
  3. Click Yes in the pop-up window to delete the user, or click No to return to the Users dashboard without deleting the user.

Export Account Information

To export account details to a file in PDF, CSV, or XLS format:

  1. Click the Users icon in the left navigation menu bar to display the Users dashboard.
  2. Click the Portal_Export_icon.png Export icon to display a drop-down menu.
  3. Select PDF, CSV, or XLS, then use the pop-up window specific to your operating system to save the file.

Troubleshoot the Titan Portal

You can troubleshoot the following issues from the Titan portal:

  • Cannot connect to the internet
  • Cannot connect to WiFi
  • Slow internet connection
  • Cannot access certain websites

Use Troubleshooting Tools

To use troubleshooting tools on the Titan portal:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.

    Portal_TRB_01_troubleshoot_dashboard.png
     
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Choose a troubleshooting option from the Troubleshoot screen:
  • Cannot connect to the Internet
  • Cannot connect to Wi-Fi
  • Slow Internet connection
  • Cannot access some websites

Portal_TRB_02_troubleshoot_screen.png

Cannot Connect to the Internet

If you cannot connect to the Internet:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Click Cannot connect to the Internet to open the Troubleshoot screen to begin checking the connection:
  • Make sure the device is powered up and that the Ethernet cable is connected to WAN1 or WAN2.
  • Make sure the SIM card is inserted if you are using LTE for internet connectivity.

Portal_TRB_03_no_connection.png

  1. Click Check Connection to check network connectivity to the router. 

    If the router is reachable, the system shows that connectivity is successful. If the device is reachable, you have the option to click Go to Configure or Back to Troubleshoot.

    Portal_TRB_04_connection_successful.png
    If the device is not reachable, you have the option to click Try Again or Manually Reset Device. Note that you can click Try Again several times to attempt to reach the device. If attempts are not successful, physically reset the device.

    Portal_TRB_05_not_reachable.png

Physically Reset a Device

When you physically reset device, you switch the router power to off for approximately 30 seconds, and then turn router power on. Note that by resetting the device, all connected devices are temporarily disconnected.

Click Manually Reset Device to access the Manual Reset screen and follow directions on the screen to physically reset the router.

Portal_TRB_06_manual_reset.png

Cannot Connect to WiFi

If you cannot connect to WiFi:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Cannot connect to Wi-Fi  to open the Troubleshoot screen to check WiFi connection.

    Portal_TRB_07_no_connection_wifi.png
  5. Click Check Wi-Fi Settings to verify WiFi status on the Wireless Networks troubleshooting screen:
  • Corporate Wi-Fi—Click the toggle to enable Corporate WiFi, or click to open the Edit Wireless Networks window to update settings. 
  • Guest Wi-Fi—Click the toggle to enable Guest WiFi, or click to open the Edit Wireless Networks window to update settings.

Portal_TRB_08_wifi_status.png

  1. Click Publish to update the changes on the router.

You can also choose to reset the device.

Restore Default Device Settings

If you cannot connect to WiFi from the Wireless Networks screen, you can reset the device to default settings. When you reset a device, all clients connected to the WiFi and intranet lose connectivity while the router reboots. It can take up to 3 minutes for the connection to resume. When reboot is complete, wait another 3 to 5 minutes for the router to become active.

To reset the device:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Cannot connect to Wi-Fi  to open the Troubleshoot screen to reset the device.

    Portal_TRB_09_wifi_actions_reset_1.png
  5. Click Reset to open the Reset screen.

    Portal_TRB_10_wifi_actions_reset_2.png
  6. Click Continue to initiate device reset. Wait for the device to reboot and reconnect to WiFi.

Slow Internet Connection

You can view internet and internet backup (LTE) settings and run a test to check internet connectivity speed on reachable online devices from the Speed Test screen. If PPPoE is available for WAN interfaces, you can run a speed test for those devices from this screen.

Run speed tests approximately one minute apart. The system issues an alert if speed tests are performed too closely together or if a speed test has been issued from another device simultaneously. The system allows you to run a maximum of 20 speed tests in a single 24-hour period.

To initiate an internet connectivity speed test on the Titan portal:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Slow Internet connection to open the Troubleshoot screen to check slow Internet connection.

    Portal_TRB_11_slow_internet_connection.png
  5. Click Run Speed Test to open the Speed Test screen to check the speed of the WAN port.  

    Portal_TRB_12_slow_internet_connection_speed_test.png
  6. Select a WAN interface from the Select Interface drop-down menu.
  7. Click Continue.

    Portal_TRB_13_slow_internet_connection_speed_test_WAN.png
  8. To run a speed test on the internet connection for the WAN interface, click the Internet icon and then click Test.

    Portal_TRB_14_slow_internet_connection_speed_test_internet_run.png
  9. Click the VPN icon to run a speed test on the VPN connection:
  • Search for a device by site name or zip code in the field provided.
  • Click to select the device.
  • Click Test.

Portal_TRB_15_slow_internet_connection_speed_test_VPN_run.png
Click the Reload icon to refresh any device connected to the internet to troubleshoot connectivity. Wait one minute, then tap Start Speed Test again to check for updated status.

The following is an example of speed test results when checking devices for slow internet connection.

Portal_TRB_16_slow_internet_connection_speed_test_results.png

Click Speed Test History to view the complete speed test history for the device. Tap Clear History to clear speed test history.

Portal_TRB_17_speed_test_history.png

View Internet Backup Signal Strength

If LTE backup is available, signal strength is displayed on the Speed Test screen. Signal strength above >65 is considered strong; a signal below this value is considered weak.

Note that you cannot run a speed test on LTE backup.

To check LTE Internet backup signal strength on the Titan portal:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Slow Internet connection to open the Troubleshoot screen to check slow Internet connection.

Tap Reload to refresh any device connected with LTE internet backup to troubleshoot connectivity. Wait one minute, then tap Start Speed Test again to check for updated status. 

Slow Internet Connection

If you are experiencing slow internet connection, you can check that the network is up and that LTE Internet backup is not slowing the connection.

To check the connection:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site in the honeycomb that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Slow Internet connection to open the Troubleshoot screen to check slow Internet connection.

    Portal_TRB_18_slow_internet_connection_network.png
  5. Click Network to check settings on the Network screen.

    Portal_TRB_19_slow_internet_connection_network_check_settings.png
  6. Click Routes to check the status of the router routing table. Use the Search feature to find a route.

    Portal_TRB_20_slow_internet_connection_network_check_settings_routes.png
  7. Click Ping to check that the router is available and connected. 
  8. Enter a valid host name and IP address in the fields provided.
  9. Click Start.

    Portal_TRB_21_slow_internet_connection_network_check_settings_ping.png
  10. Click Traceroute to measure packet transit delays across the network.
  11. Enter a valid host name and IP address in the field provided.
  12. Click Start.

    Portal_TRB_22_slow_internet_connection_network_check_settings_traceroute.png

Cannot Access Certain Websites

If you cannot access certain websites:

  1. Click the Troubleshoot icon in the left menu bar to open the troubleshooting dashboard.
  2. Hover over the site that you would like to troubleshoot to open the option card for the device.
  3. Click Troubleshoot in the Actions column of the device-options card to open the Troubleshoot screen.
  4. Select Cannot access some websites to open the Troubleshoot screen to check website accessibility.
  5. Choose an option from the Troubleshoot screen:
  • Check Blacklisted sites
  • Add sites to Whitelist
  • IP Reputation
  • URL Category

Portal_TRB_23_website_access.png

Checking Blacklisted Sites

  1. Click Check Blacklisted Sites to add websites that you would like to block on the network. To block multiple websites, separate each URL with a comma.

    Portal_TRB_24_website_access_blacklist.png
  2. Click Publish to save the settings to the router.

Add Sites to the Whitelist

  1. Click Add Sites to Whitelist to add websites to always allow on the network, even if they are blocked by other settings. To add multiple websites, separate each URL with a comma. 

    Portal_TRB_25_website_access_whitelist.png
  2. Click Publish to save the settings to the router.

Configure IP Address Reputation

  1. Click IP Reputation to open the Reputation Level screen.
  2. Select device IP reputation level settings. Click the down arrow in the left column to display a description of each category.:
  • High Risk IP Addresses
  • Suspicious IP Addresses
  • Moderate Risk
  • Low Risk
  • Trustworthy

Portal_TRB_26_reputation.png

  1. Click one of the 3 icons in the right column for each category to select a reputation level for that category:
  • Blocked (red)
  • Ask (amber)
  • Allowed (blue)
  1. Click Publish to save the settings to the router.

Configuring the URL Category

  1. Click URL Category to open the URL category screen.
  2. Click one of the boxes next to each name to adjust the URL filtering category. Click Information for a description of each category:
  • Blocked
  • Alert & Confirm

Portal_TRB_27_URL_category.png

  1. Click Publish to save the settings to the router.

Contact Support

Contact Versa support for assistance from any screen by clicking the Help icon. 

Supported Software Information 

Releases 8.1.0 and later support all content described in this article.  

 

  • Was this article helpful?