Monday, May 14, 2018

Booting a Brocade Netiron XMR/MLX card into interactive mode



Yesterday I had to replace a 2X 10Gb module in one of my XMRs. The card itself was running a lower version of code than the box itself. At first I could see the LC loading of the software, but after that the card was not able to boot.
I tried loading the software onto the card again, but the box says the card needs to be either UP or in Interactive mode. You’re stuck in a bit of a catch-22 here where you can’t load anything unless the card is in interactive mode.
First you need to figure out which module it is you want to boot. This is easy as line card 1 = 1 and so on. For this example I’m using module 3.
XMR-4000#conf t
XMR-4000(config)#lp boot system interactive 3 
XMR-4000(config)#end
This tells the box to boot the card in interactive mode. You will now need to actually reboot the module:
XMR-4000#power-off  lp 3
XMR-4000#power-on  lp 3
Slot 3 is powering on.
 
 
SYSLOG: <13>Jan 11 10:02:11 XMR-4000 System: Module 3 powered on 
Slot 3: booted to Interactive Mode.
We’ve been told that the card has been booted into interactive mode, but let’s confirm anyway:
XMR-4000#sh module | include S3
S3: NI-XMR-1Gx20-GC 20-port 10/100/1000 Copper Module       CARD_STATE_INTERACTIVE
Now that the card is in interactive mode we can load the software on. In this particular example I’m loading 5.4b so change the filenames for your version
XMR-4000#copy tftp lp 192.168.1.80 xmlb05400.bin monitor 3
 
XMR-4000#copy tftp lp 192.168.1.80 xmlprm05400.bin boot 3
 
XMR-4000#copy tftp lp 192.168.1.80 lpfpga05400b.bin fpga-all  3
Once the software is loaded, we need to configure the box to not boot the card into interactive mode:
XMR-4000#conf t
XMR-4000(config)#no lp boot system interactive 3
XMR-4000(config)#end
Finally let’s reboot the card again:
XMR-4000#power-off lp 3
XMR-4000#power-on  lp 3
 
Slot 3 is powering on.
 
 
SYSLOG: <13>Jan 11 10:07:12 XMR-4000 System: Module 3 powered on
We should be good to go now:
XMR-4000#sh module | include S3

S3: NI-XMR-1Gx20-GC 20-port 10/100/1000 Copper Module       CARD_STATE_UP

Sonicwall One to One NAT

One to One NAT
This is another common NAT policy on a SonicWall, and allows you to translate an internal IP address into a unique IP address. This is useful when you want specific systems, such as servers, to use a specific IP address when they initiate traffic to other destinations. Most of the time, a NAT policy such as this is used to map a server’s private IP address to a public IP address, and it’s paired with a mirror policy that allows any system from the public Internet to access the server, along with a matching firewall access rule that permits this.
In this example we have chosen to demonstrate a webserver using HTTP service, however the following steps apply to any service you wish to use (like HTTPS, SMTP, FTP, Terminal Services, SSH, etc).
Creating the necessary Address Objects 
1.   Click Manage in the top navigation menu.
2.   Navigate to Objects | Address Objects.
3.   Click the Add button and create two address objects one for Private IP of the device in question and one for the public IP.
  • Click the OK button to complete creation of the new address objects.
https://sonicwall.rightanswers.com/portal/app/images/content_example.gif EXAMPLE: Example provided below for a webserver
Address Object for Server on LAN
Name: Webserver Private 
Zone AssignmentLAN  
TypeHost 
IP Address192.168.1.100


Address Object for Server's Public IP
Name: Webserver Public
Zone AssignmentWAN
TypeHost 
IP Address1.1.1.1

Creating an Inbound NAT Policy
This policy allows you to translate an external public IP address into an internal private IP address. This NAT policy, when paired with a Allow access rule, allows any source to connect to the internal server using the public IP address; the SonicWall will handle the translation between the private and public address. Below, we will be creating the NAT Policy as well as the rule to allow HTTP access to the server.
1.   From the SonicWall’s management GUI, Click Manage in the top navigation menu.
2.   Navigate to the Rules | NAT Policies page.
3.   Click the Add button and chose the following settings from the drop-down menu:

Inbound NAT Policy
Original SourceAny
Translated Source
Original
Original Destination
Webserver Public
Translated Destination
Webserver Private
Original Service: HTTP
Translated Service: Original
Inbound Interface: Any
Outbound Interface: Any
Enable NAT Policy: Checked
Create a reflexive policy:  When you check this box, a mirror (outbound or inbound) NAT policy is automatically created as per the settings configured in the Add NAT Policy window. In the example NAT Policy, when the box Create a reflexive policy is checked, it will create an outbound NAT Policy as per the screenshot below.


Example Outbound/Reflexive Policy


https://sonicwall.rightanswers.com/portal/app/images/content_note.gif NOTE: If you need to create an access rule to allow the traffic through the firewall for an inbound NAT policy, refer to How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall

DNS Loopback NAT Policy
The purpose of a DNS Loopback NAT Policy is for a host on the LAN or DMZ to be able to access the Webserver on the LAN (192.168.1.100) using the server's public IP address (1.1.1.1) or by its Fully Qualified Domain Name (FQDN).
1.   Login to the SonicWall Management Interface
2.   Click Manage in the top navigation menu.
3.   Navigate to Rules | NAT Policies
4.   Click Add and create a NAT Policy following the below example from the drop-down menus
https://sonicwall.rightanswers.com/portal/app/images/content_example.gif EXAMPLE: In the example below Firewalled Subnets is used as the original source, but this may need adjusted to include all subnets behind the SonicWall if you are routing additional subnets through a layer 3 device behind the SonicWall.  Traffic is translated to the webserver's public IP (but this can be any public address) to be able to communicate and translate back through the SonicWall appliance.  This process can be bypassed by creating a local DNS entry to translate your webserver to it's private IP instead.

  • Original Source: Firewalled Subnets 
  • Translated Source: Mywebserver Public
  • Original Destination: Mywebserver Public
  • Translated Destination: Mywebserver Private
  • Original Service: HTTP
  • Translated Service: Original
  • Inbound Interface: Any
  • Outbound Interface: Any
  • Enable NAT Policy: Checked
  • Create a reflexive policy: unchecked

Creating a Firewall Access Rule
  • Go to Firewall | Access Rules page.
  • Select the type of view in the View Style section and go to From WAN To LAN.
  • Click Add and create the following rule:
Action: Allow 
From Zone: WAN
To Zone: LAN

Service: HTTP 
Source: Any 
Destination: My webserver Public 
Users Allowed: All
Schedule: Always on
Enable Logging: checked

Allow Fragmented Packets: checked

Caution: The ability to define network access rules is a very powerful tool. Using custom access rules can disable firewall protection or block all access to the Internet. Use caution when creating or deleting network access rules.

FortiGate PPOE password recovery

# diagnose debug enable
# diagnose debug application ppp 3

PPP send: LCP Configure_Request id(1) len(14) [Maximum_Received_Unit 1492] [Magic_Number 2D7552F8] 
........................
........................
PPP send: LCP Echo_Request id(0) len(8) [Magic_Number 2d76a8f7]
PPP send: PAP 66 66 74 75 6f 75 75 6f 75 66 66 74 75 74 2e 6e 65 74 08 78 64 66 66 75 --> 
Authentication_Request id(1) peerid(len=18, 1234567@1234567890) passwd(len=8, 12345678)
PPP recv: LCP Echo_Reply id(0) len(8) [Magic_Number 6a6532d93]
.........................
.........................

Monday, November 27, 2017

Dell Sonicwall- Tech Videos

Here is the list of  tech videos around our product Dell Sonicwall.

Title
Youtube Links
How to register the SonicWall Firewall 
How to back up the SonicWall Firewall 
How to upgrade the firmware
Throughput and Performance Best Practices Guide 
How to configure Port forwarding
How to Create a Site to Site VPN in Main Mode using Preshared Secret
How to Create Aggressive Mode Site to Site VPN using Preshared Secret
How to configure WAN Group VPN 
How to configure UTM SSL VPN
How to enable Security Services 
How to bridge the LAN and Wireless networks
How to configure a static route
How to block torrent based files using App Control 
How to Configure CFS Policies using App Rules
How to Configure Stateful Active-Standby High Availability in Gen5 UTM Appliances
How to Configure Stateful Active-Standby High Availability in Gen6 UTM Appliances
How to Configure NAT over VPN in a Site to Site VPN with Overlapping Networks
How to Configure DHCP over Site to Site VPN between two Sonicwall appliances 
How to Setup a Hub and Spoke Site to Site VPN
How to configure GVC with LDAP Authentication
How to Configure CFS Exclusion List
How to apply CFS Policy based on user group
How to Configure CFS Policies per IP Addresses
How to Configure CFS with Single Sign-on and LDAP Authentication
How to create CFS Custom Category
How to Configure YouTube for Schools in CFS with Client DPI-SSL
How to Configure Per-policy Forbidden Domains with Multiple CFS Policies
How to block a website using CFS 
How to integrate LDAP/Active Directory with SonicWall Appliance 
How to block social networking sites and Youtube using App Control Advanced 
How to block applications using application control advanced
How to block Google App Proxy using App Control Advanced 
How to setup WAN Failover and Load Balancing
How to configure sub-interfaces 
How to Configure Route Based Site to Site VPN using Pre-shared Secret
How to allow access to Facebook only during lunch hours 
How to block google play using App Control Advanced 
How to block yahoo mail using App Control Advanced 
How to limit bandwidth to a HTTP website 
How to Configure Tunnel All Internet Traffic over a Site to Site VPN
How to troubleshoot the error “Invalid IP Address”>
How to Block UltraSurf Proxy using App Control Advanced Signatures
How to Block Gmail using App Control Advanced
How to Block Gmail Chat using App Control Advanced
How to enforce Safe Search using Content Filter Services
How to Block Google Talk using App Control Advanced
How to allow one VAP profile access to the LAN while denying others in built-in wireless
How to Configure WPA-EAP Authentication for Wireless 
How to Configure Virtual Access Point Profiles for Multiple SSIDs for Built-in Wireless

Booting a Brocade Netiron XMR/MLX card into interactive mode

Yesterday I had to replace a 2X 10Gb module in one of my XMRs. The card itself was running a lower version of code than the box itself...