FireBrick FB2500 User Manual

This User Manual documents Software version V1.36.000


Table of Contents

Preface
1. Introduction
1.1. The FB2500
1.1.1. Where do I start?
1.1.2. What can it do?
1.1.3. Ethernet port capabilities
1.1.4. Differences between the devices in the FB2x00 series
1.1.5. Software features
1.1.6. Migration from previous FireBrick models
1.2. About this Manual
1.2.1. Version
1.2.2. Intended audience
1.2.3. Technical details
1.2.4. Document style
1.2.5. Document conventions
1.2.6. Comments and feedback
1.3. Additional Resources
1.3.1. Technical Support
1.3.2. IRC Channel
1.3.3. Application Notes
1.3.4. White Papers
1.3.5. Training Courses
2. Getting Started
2.1. IP addressing
2.2. Accessing the web-based user interface
2.2.1. Add a new user
3. Configuration
3.1. The Object Hierarchy
3.2. The Object Model
3.2.1. Formal definition of the object model
3.2.2. Common attributes
3.3. Configuration Methods
3.4. Web User Interface Overview
3.4.1. User Interface layout
3.4.1.1. Customising the layout
3.4.2. Config pages and the object hierarchy
3.4.2.1. Configuration categories
3.4.2.2. Object settings
3.4.3. Navigating around the User Interface
3.4.4. Backing up / restoring the configuration
3.5. Configuration using XML
3.5.1. Introduction to XML
3.5.2. The root element - <config>
3.5.3. Viewing or editing XML
3.5.4. Example XML configuration
3.6. Downloading/Uploading the configuration
3.6.1. Download
3.6.2. Upload
4. System Administration
4.1. User Management
4.1.1. Login level
4.1.2. Configuration access level
4.1.3. Login idle timeout
4.1.4. Restricting user logins
4.1.4.1. Restrict by IP address
4.1.4.2. Logged in IP address
4.1.4.3. Restrict by profile
4.1.5. One Time Password
4.2. General System settings
4.2.1. System name (hostname)
4.2.2. Administrative details
4.2.3. System-level event logging control
4.2.4. Home page web links
4.2.5. Password hashing
4.3. Software Upgrades
4.3.1. Software release types
4.3.1.1. Breakpoint releases
4.3.2. Identifying current software version
4.3.3. Internet-based upgrade process
4.3.3.1. Manually initiating upgrades
4.3.3.2. Controlling automatic software updates
4.3.4. Manual upgrade
4.4. Boot Process
4.4.1. LED indications
4.4.1.1. Power LED status indications
4.4.1.2. Port LEDs
5. Event Logging
5.1. Overview
5.1.1. Log targets
5.1.1.1. Logging to Flash memory
5.1.1.2. Logging to the Console
5.2. Enabling logging
5.3. Logging to external destinations
5.3.1. Syslog
5.3.2. Email
5.3.2.1. E-mail process logging
5.4. Factory reset configuration log targets
5.5. Performance
5.6. Viewing logs
5.6.1. Viewing logs in the User Interface
5.6.2. Viewing logs in the CLI environment
5.7. System-event logging
5.8. Using Profiles
6. Interfaces and Subnets
6.1. Relationship between Interfaces and Physical Ports
6.1.1. Port groups
6.1.2. Interfaces
6.2. Defining port groups
6.3. Defining an interface
6.3.1. Defining subnets
6.3.1.1. Source filtering
6.3.1.2. Using DHCP to configure a subnet
6.3.2. Setting up DHCP server parameters
6.3.2.1. Fixed/Static DHCP allocations
6.3.2.1.1. Special DHCP attributes
6.3.2.2. Partial-MAC-address based allocations
6.4. Physical port settings
6.4.1. Disabling auto-negotiation
6.4.2. Setting port speed
6.4.3. Setting duplex mode
6.4.4. Defining port LED functions
7. Session Handling
7.1. Routing vs. Firewalling
7.2. Session Tracking
7.2.1. Session termination
7.3. Session Rules
7.3.1. Overview
7.3.2. Processing flow
7.3.3. Defining Rule-Sets and Rules
7.3.3.1. Recommended method of implementing firewalling
7.3.3.2. Changes to session traffic
7.3.3.3. Graphing and traffic shaping
7.3.3.4. Configuring session time-outs
7.3.3.5. Load balancing
7.4. Network Address Translation
7.4.1. When to use NAT
7.4.2. NAT ALGs
7.4.3. Setting NAT in rules
7.4.4. What NAT does
7.4.5. NAT with PPPoE
7.4.6. NAT with other types of external routing
7.4.7. Mixing NAT and non NAT
7.4.8. Carrier grade NAT
7.4.9. Using NAT setting on subnets
8. Routing
8.1. Routing logic
8.2. Routing targets
8.2.1. Subnet routes
8.2.2. Routing to an IP address (gateway route)
8.2.3. Special targets
8.3. Dynamic route creation / deletion
8.4. Routing tables
8.5. Bonding
8.6. Route overrides
9. Profiles
9.1. Overview
9.2. Creating/editing profiles
9.2.1. Timing control
9.2.2. Tests
9.2.2.1. General tests
9.2.2.2. Time/date tests
9.2.2.3. Ping tests
9.2.3. Inverting overall test result
9.2.4. Manual override
10. Traffic Shaping
10.1. Graphs and Shapers
10.1.1. Graphs
10.1.2. Shapers
10.1.3. Ad hoc shapers
10.1.4. Long term shapers
10.2. Multiple shapers
10.3. Basic principles
11. PPPoE
11.1. Types of DSL line and router in the United Kingdom
11.2. Definining PPPoE links
11.2.1. IPv6
11.2.2. Additional options
11.2.2.1. MTU and TCP fix
11.2.2.2. Service and ac-name
11.2.2.3. Logging
11.2.2.4. Speed and graphs
12. Tunnels
12.1. IPsec (IP Security)
12.1.1. Introduction
12.1.1.1. Integrity checking
12.1.1.2. Encryption
12.1.1.3. Authentication
12.1.1.4. IKE
12.1.1.5. Manual Keying
12.1.1.6. Identities and the Authentication Mechanism
12.1.2. Setting up IPsec connections
12.1.2.1. Global IPsec parameters
12.1.2.2. IKE proposals
12.1.2.3. IKE roaming IP pools
12.1.2.4. IKE connections
12.1.2.4.1. IKE connection mode and type
12.1.2.4.2. IKE and IPsec proposal lists
12.1.2.4.3. Authentication and IKE identities
12.1.2.4.4. IP addresses
12.1.2.4.5. Road Warrior connections
12.1.2.4.6. Routing
12.1.2.4.7. Other parameters
12.1.2.5. Setting up Manual Keying
12.1.2.5.1. IP endpoints
12.1.2.5.2. Algorithms and keys
12.1.2.5.3. Routing
12.1.2.5.4. Mode
12.1.2.5.5. Other parameters
12.1.3. Using EAP with IPsec/IKE
12.1.4. Using certificates with IPsec/IKE
12.1.4.1. Creating certificates
12.1.5. Choice of algorithms
12.1.6. NAT Traversal
12.1.7. Configuring a Road Warrior server
12.1.8. Connecting to non-FireBrick devices
12.1.8.1. Using StrongSwan on Linux
12.1.8.2. Setting up a Road Warrior VPN on an Android client
12.1.8.3. Setting up a Road Warrior VPN on an iOS (iPhone/iPad) client
12.1.8.4. Manual keying using Linux ipsec-tools
12.2. FB105 tunnels
12.2.1. Tunnel wrapper packets
12.2.2. Setting up a tunnel
12.2.3. Viewing tunnel status
12.2.4. Dynamic routes
12.2.5. Tunnel bonding
12.2.6. Tunnels and NAT
12.2.6.1. FB2500 doing NAT
12.2.6.2. Another device doing NAT
12.3. Ether tunnelling
13. System Services
13.1. Protecting the FB2500
13.2. Common settings
13.3. HTTP Server configuration
13.3.1. Access control
13.3.1.1. Trusted addresses
13.4. Telnet Server configuration
13.4.1. Access control
13.5. DNS configuration
13.5.1. Blocking DNS names
13.5.2. Local DNS responses
13.5.3. Auto DHCP DNS
13.6. NTP configuration
13.7. SNMP configuration
13.8. RADIUS configuration
13.8.1. RADIUS server (platform RADIUS)
13.8.2. RADIUS client
13.8.2.1. RADIUS client settings
13.8.2.2. Server blacklisting
14. Network Diagnostic Tools
14.1. Firewalling check
14.2. Access check
14.3. Packet Dumping
14.3.1. Dump parameters
14.3.2. Security settings required
14.3.3. IP address matching
14.3.4. Packet types
14.3.5. Snaplen specification
14.3.6. Using the web interface
14.3.7. Using an HTTP client
14.3.7.1. Example using curl and tcpdump
15. VRRP
15.1. Virtual Routers
15.2. Configuring VRRP
15.2.1. Advertisement Interval
15.2.2. Priority
15.3. Using a virtual router
15.4. VRRP versions
15.4.1. VRRP version 2
15.4.2. VRRP version 3
15.5. Compatibility
16. VoIP
16.1. What is VoIP?
16.2. Registration and Proxies
16.2.1. Registrar
16.2.2. Proxy
16.3. Home/office phone system
16.4. Network Address Translation
16.5. Number plan
16.6. Telephone handsets
16.7. VoIP call carriers
16.8. Hunt groups
16.8.1. Ring Type
16.8.2. Ring order
16.8.3. Overflow
16.8.4. Out of hours
16.9. Call pickup/steal
16.10. Busy lamp field
16.11. Using RADIUS
16.11.1. RADIUS accounting
16.11.2. RADIUS authentication
16.11.2.1. Call routing by RADIUS
16.12. Call recording
16.13. Voicemail and IVR services
16.14. Call Data Records
16.15. Technical details
16.16. Custom tones
17. BGP
17.1. What is BGP?
17.2. BGP Setup
17.2.1. Overview
17.2.2. Standards
17.2.3. Simple example setup
17.2.4. Peer type
17.2.5. Route filtering
17.2.5.1. Matching attributes
17.2.5.2. Action attributes
17.2.6. Well known community tags
17.2.7. Bad optional path attributes
17.2.8. <network> element
17.2.9. <route>, <subnet> and other elements
17.2.10. Route feasibility testing
17.2.11. Diagnostics
17.2.12. Router shutdown
17.2.13. TTL security
18. Internet Service Providers
18.1. Background
18.1.1. How it all began
18.1.2. Point to Point Protocol
18.1.3. L2TP
18.1.4. Broadband
18.1.5. RADIUS
18.1.6. BGP
18.2. Incoming L2TP connections
18.3. The importance of CQM graphs
18.4. Authentication
18.5. Accounting
18.6. RADIUS Control messages
18.7. PPPoE
18.8. Typical configuration
18.8.1. Interlink subnet
18.8.2. BGP with carrier
18.8.3. RADIUS session steering
18.8.4. L2TP endpoints
18.8.5. ISP RADIUS
19. Command Line Interface
A. Factory Reset Procedure
B. CIDR and CIDR Notation
C. MAC Addresses usage
D. VLANs : A primer
E. Supported L2TP Attribute/Value Pairs
E.1. Start-Control-Connection-Request
E.2. Start-Control-Connection-Reply
E.3. Start-Control-Connection-Connected
E.4. Stop-Control-Connection-Notification
E.5. Hello
E.6. Incoming-Call-Request
E.7. Incoming-Call-Reply
E.8. Incoming-Call-Connected
E.9. Outgoing-Call-Request
E.10. Outgoing-Call-Reply
E.11. Outgoing-Call-Connected
E.12. Call-Disconnect-Notify
E.13. WAN-Error-Notify
E.14. Set-Link-Info
E.15. Notes
E.15.1. BT specific notes
E.15.2. IP over LCP
F. Supported RADIUS Attribute/Value Pairs for L2TP operation
F.1. Authentication request
F.2. Authentication response
F.2.1. Accepted authentication
F.2.1.1. Prefix Delegation
F.2.2. Rejected authentication
F.3. Accounting Start
F.4. Accounting Interim
F.5. Accounting Stop
F.6. Disconnect
F.7. Change of Authorisation
F.8. Filter ID
F.9. Notes
F.9.1. L2TP relay
F.9.2. LCP echo and CQM graphs
F.9.3. IP over LCP
F.9.4. Closed User Group
F.9.5. Routing table
G. Supported RADIUS Attribute/Value Pairs for VoIP operation
G.1. Authentication request
G.2. Authentication response
G.2.1. Challenge authentication
G.2.2. Accepted authentication (registration)
G.2.3. Accepted authentication (invite)
G.2.4. Rejected authentication
G.3. Accounting Start
G.4. Accounting Interim
G.5. Accounting Stop
G.6. Disconnect
G.7. Change of Authorisation
H. FireBrick specific SNMP objects
H.1. BGP information
H.2. L2TP information
H.3. Monitoring information
I. Command line reference
I.1. General commands
I.1.1. Trace off
I.1.2. Trace on
I.1.3. Uptime
I.1.4. General status
I.1.5. Memory usage
I.1.6. Process/task usage
I.1.7. Login
I.1.8. Logout
I.1.9. See XML configuration
I.1.10. Load XML configuration
I.1.11. Show profile status
I.1.12. Enable profile control switch
I.1.13. Disable profile control switch
I.1.14. Show RADIUS servers
I.1.15. Show DNS resolvers
I.2. Networking commands
I.2.1. Subnets
I.2.2. Ping and trace
I.2.3. Show a route from the routing table
I.2.4. List routes
I.2.5. List routing next hops
I.2.6. See DHCP allocations
I.2.7. Clear DHCP allocations
I.2.8. Lock DHCP allocations
I.2.9. Unlock DHCP allocations
I.2.10. Name DHCP allocations
I.2.11. Show ARP/ND status
I.2.12. Show VRRP status
I.2.13. Send Wake-on-LAN packet
I.3. Firewalling commands
I.3.1. Check access to services
I.3.2. Check firewall logic
I.4. L2TP commands
I.5. BGP commands
I.6. PPPoE commands
I.7. VoIP commands
I.8. Advanced commands
I.8.1. Panic
I.8.2. Reboot
I.8.3. Screen width
I.8.4. Make outbound command session
I.8.5. Show command sessions
I.8.6. Kill command session
I.8.7. Flash memory list
I.8.8. Delete block from flash
I.8.9. Boot log
I.8.10. Flash log
J. Constant Quality Monitoring - technical details
J.1. Broadband back-haul providers
J.2. Access to graphs and csvs
J.2.1. Trusted access
J.2.2. Dated information
J.2.3. Authenticated access
J.3. Graph display options
J.3.1. Data points
J.3.2. Additional text
J.3.3. Other colours and spacing
J.4. Overnight archiving
J.4.1. Full URL format
J.4.2. load handling
J.5. Graph scores
J.6. Creating graphs, and graph names
K. Configuration Objects
K.1. Top level
K.1.1. config: Top level config
K.2. Objects
K.2.1. system: System settings
K.2.2. link: Web links
K.2.3. user: Admin users
K.2.4. eap: User access controlled by EAP
K.2.5. log: Log target controls
K.2.6. log-syslog: Syslog logger settings
K.2.7. log-email: Email logger settings
K.2.8. services: System services
K.2.9. snmp-service: SNMP service settings
K.2.10. ntp-service: NTP service settings
K.2.11. telnet-service: Telnet service settings
K.2.12. http-service: HTTP service settings
K.2.13. dns-service: DNS service settings
K.2.14. dns-host: Fixed local DNS host settings
K.2.15. dns-block: Fixed local DNS blocks
K.2.16. radius-service: RADIUS service definition
K.2.17. radius-service-match: Matching rules for RADIUS service
K.2.18. radius-server: RADIUS server settings
K.2.19. ethernet: Physical port controls
K.2.20. portdef: Port grouping and naming
K.2.21. interface: Port-group/VLAN interface settings
K.2.22. subnet: Subnet settings
K.2.23. vrrp: VRRP settings
K.2.24. dhcps: DHCP server settings
K.2.25. dhcp-attr-hex: DHCP server attributes (hex)
K.2.26. dhcp-attr-string: DHCP server attributes (string)
K.2.27. dhcp-attr-number: DHCP server attributes (numeric)
K.2.28. dhcp-attr-ip: DHCP server attributes (IP)
K.2.29. pppoe: PPPoE settings
K.2.30. ppp-route: PPP routes
K.2.31. route: Static routes
K.2.32. network: Locally originated networks
K.2.33. blackhole: Dead end networks
K.2.34. loopback: Locally originated networks
K.2.35. namedbgpmap: Mapping and filtering rules of BGP prefixes
K.2.36. bgprule: Individual mapping/filtering rule
K.2.37. bgp: Overall BGP settings
K.2.38. bgppeer: BGP peer definitions
K.2.39. bgpmap: Mapping and filtering rules of BGP prefixes
K.2.40. cqm: Constant Quality Monitoring settings
K.2.41. l2tp: L2TP settings
K.2.42. l2tp-outgoing: L2TP settings for outgoing L2TP connections
K.2.43. l2tp-incoming: L2TP settings for incoming L2TP connections
K.2.44. l2tp-relay: Relay and local authentication rules for L2TP
K.2.45. fb105: FB105 tunnel definition
K.2.46. fb105-route: FB105 routes
K.2.47. ipsec-ike: IPsec configuration (IKEv2)
K.2.48. ike-connection: peer configuration
K.2.49. ipsec-route: IPsec tunnel routes
K.2.50. ike-roaming: IKE roaming IP pools
K.2.51. ike-proposal: IKE security proposal
K.2.52. ipsec-proposal: IPsec AH/ESP proposal
K.2.53. ipsec-manual: peer configuration
K.2.54. ping: Ping/graph definition
K.2.55. profile: Control profile
K.2.56. profile-date: Test passes if within any of the time ranges specified
K.2.57. profile-time: Test passes if within any of the date/time ranges specified
K.2.58. profile-ping: Test passes if any addresses are pingable
K.2.59. shaper: Traffic shaper
K.2.60. shaper-override: Traffic shaper override based on profile
K.2.61. ip-group: IP Group
K.2.62. route-override: Routing override rules
K.2.63. session-route-rule: Routing override rule
K.2.64. session-route-share: Route override load sharing
K.2.65. rule-set: Firewall/mapping rule set
K.2.66. session-rule: Firewall rules
K.2.67. session-share: Firewall load sharing
K.2.68. voip: Voice over IP config
K.2.69. carrier: VoIP carrier details
K.2.70. telephone: VoIP telephone authentication user details
K.2.71. tone: Tone definitions
K.2.72. ringgroup: Ring groups
K.2.73. etun: Ether tunnel
K.3. Data types
K.3.1. autoloadtype: Type of s/w auto load
K.3.2. config-access: Type of access user has to config
K.3.3. user-level: User login level
K.3.4. eap-subsystem: Subsystem with EAP access control
K.3.5. eap-method: EAP access method
K.3.6. syslog-severity: Syslog severity
K.3.7. syslog-facility: Syslog facility
K.3.8. month: Month name (3 letter)
K.3.9. day: Day name (3 letter)
K.3.10. radiuspriority: Options for controlling platform RADIUS response priority tagging
K.3.11. radiustype: Type of RADIUS server
K.3.12. port: Physical port
K.3.13. Crossover: Crossover configuration
K.3.14. LinkSpeed: Physical port speed
K.3.15. LinkDuplex: Physical port duplex setting
K.3.16. LinkFlow: Physical port flow control setting
K.3.17. LinkClock: Physical port Gigabit clock master/slave setting
K.3.18. LinkLED: LED settings
K.3.19. LinkPower: PHY power saving options
K.3.20. LinkFault: Link fault type to send
K.3.21. ramode: IPv6 route announce level
K.3.22. dhcpv6control: Control for RA and DHCPv6 bits
K.3.23. bgpmode: BGP announcement mode
K.3.24. sfoption: Source filter option
K.3.25. pppoe-mode: Type of PPPoE connection
K.3.26. peertype: BGP peer type
K.3.27. ipsec-type: IPsec encapsulation type
K.3.28. ike-authmethod: authentication method
K.3.29. ike-mode: connection setup mode
K.3.30. ipsec-auth-algorithm: IPsec authentication algorithm
K.3.31. ipsec-crypt-algorithm: IPsec encryption algorithm
K.3.32. ike-PRF: IKE Pseudo-Random Function
K.3.33. ike-DH: IKE Diffie-Hellman group
K.3.34. ike-ESN: IKE Sequence Number support
K.3.35. ipsec-encapsulation: Manually keyed IPsec encapsulation mode
K.3.36. switch: Profile manual setting
K.3.37. dynamic-graph: Type of dynamic graph
K.3.38. firewall-action: Firewall action
K.3.39. voip-format: Number presentation format
K.3.40. uknumberformat: Number formatting option
K.3.41. recordoption: Recording option
K.3.42. ring-group-order: Order of ring
K.3.43. ring-group-type: Type of ring when one call in queue
K.3.44. record-beep-option: Record beep option
K.4. Basic types
Index

List of Figures

2.1. Initial web page in factory reset state
2.2. Initial "Users" page
2.3. Setting up a new user
2.4. Configuration being stored
3.1. Main menu
3.2. Icons for layout controls
3.3. Icons for configuration categories
3.4. The "Setup" category
3.5. Editing an "Interface" object
3.6. Show hidden attributes
3.7. Attribute definitions
3.8. Navigation controls
4.1. Setting up a new user
4.2. Software upgrade available notification
4.3. Manual Software upload
7.1. Example sessions created by drop and reject actions
7.2. Processing flow chart for rule-sets and session-rules
C.1. Product label showing MAC address range

List of Tables

2.1. IP addresses for computer
2.2. IP addresses to access the FireBrick
2.3. IP addresses to access the FireBrick
3.1. Special character sequences
4.1. User login levels
4.2. Configuration access levels
4.3. General administrative details attributes
4.4. Attributes controlling auto-upgrades
4.5. Power LED status indications
5.1. Logging attributes
5.2. System-Event Logging attributes
6.1. Port LED functions
6.2. Example modified Port LED functions
7.1. Action attribute values
8.1. Example route targets
12.1. IPsec algorithm key lengths
12.2. IKE / IPsec algorithm proposals
13.1. List of system services
13.2. List of system services
14.1. Packet dump parameters
14.2. Packet types that can be captured
16.1. Ring Type
16.2. Ring Order
16.3. Access-Accept
16.4. Default tones
17.1. Peer types
17.2. Communities
17.3. Network attributes
C.1. DHCP client names used
E.1. SCCRQ
E.2. SCCRP
E.3. SCCCN
E.4. StopCCN
E.5. HELLO
E.6. ICRQ
E.7. ICRP
E.8. ICCN
E.9. OCRQ
E.10. OCRP
E.11. OCCN
E.12. CDN
E.13. WEN
E.14. SLI
F.1. Access-request
F.2. Access-Accept
F.3. Access-Reject
F.4. Accounting-Start
F.5. Accounting-Interim
F.6. Accounting-Stop
F.7. Disconnect
F.8. Change-of-Authorisation
F.9. Filter-ID
G.1. Access-request
G.2. Access-Challenge
G.3. Access-Accept
G.4. Access-Accept
G.5. Access-Reject
G.6. Accounting-Start
G.7. Accounting-Interim
G.8. Accounting-Stop
G.9. Disconnect
G.10. Change-of-Authorisation
H.1. iso.3.6.1.4.1.24693.179
H.2. iso.3.6.1.4.1.24693.1701
H.3. iso.3.6.1.4.1.24693.5060
J.1. File types
J.2. Colours
J.3. Text
J.4. Text
J.5. URL formats
K.1. config: Attributes
K.2. config: Elements
K.3. system: Attributes
K.4. system: Elements
K.5. link: Attributes
K.6. user: Attributes
K.7. eap: Attributes
K.8. log: Attributes
K.9. log: Elements
K.10. log-syslog: Attributes
K.11. log-email: Attributes
K.12. services: Elements
K.13. snmp-service: Attributes
K.14. ntp-service: Attributes
K.15. telnet-service: Attributes
K.16. http-service: Attributes
K.17. dns-service: Attributes
K.18. dns-service: Elements
K.19. dns-host: Attributes
K.20. dns-block: Attributes
K.21. radius-service: Attributes
K.22. radius-service: Elements
K.23. radius-service-match: Attributes
K.24. radius-server: Attributes
K.25. ethernet: Attributes
K.26. portdef: Attributes
K.27. interface: Attributes
K.28. interface: Elements
K.29. subnet: Attributes
K.30. vrrp: Attributes
K.31. dhcps: Attributes
K.32. dhcps: Elements
K.33. dhcp-attr-hex: Attributes
K.34. dhcp-attr-string: Attributes
K.35. dhcp-attr-number: Attributes
K.36. dhcp-attr-ip: Attributes
K.37. pppoe: Attributes
K.38. pppoe: Elements
K.39. ppp-route: Attributes
K.40. route: Attributes
K.41. network: Attributes
K.42. blackhole: Attributes
K.43. loopback: Attributes
K.44. namedbgpmap: Attributes
K.45. namedbgpmap: Elements
K.46. bgprule: Attributes
K.47. bgp: Attributes
K.48. bgp: Elements
K.49. bgppeer: Attributes
K.50. bgppeer: Elements
K.51. bgpmap: Attributes
K.52. bgpmap: Elements
K.53. cqm: Attributes
K.54. l2tp: Attributes
K.55. l2tp: Elements
K.56. l2tp-outgoing: Attributes
K.57. l2tp-outgoing: Elements
K.58. l2tp-incoming: Attributes
K.59. l2tp-incoming: Elements
K.60. l2tp-relay: Attributes
K.61. fb105: Attributes
K.62. fb105: Elements
K.63. fb105-route: Attributes
K.64. ipsec-ike: Attributes
K.65. ipsec-ike: Elements
K.66. ike-connection: Attributes
K.67. ike-connection: Elements
K.68. ipsec-route: Attributes
K.69. ike-roaming: Attributes
K.70. ike-proposal: Attributes
K.71. ipsec-proposal: Attributes
K.72. ipsec-manual: Attributes
K.73. ipsec-manual: Elements
K.74. ping: Attributes
K.75. profile: Attributes
K.76. profile: Elements
K.77. profile-date: Attributes
K.78. profile-time: Attributes
K.79. profile-ping: Attributes
K.80. shaper: Attributes
K.81. shaper: Elements
K.82. shaper-override: Attributes
K.83. ip-group: Attributes
K.84. route-override: Attributes
K.85. route-override: Elements
K.86. session-route-rule: Attributes
K.87. session-route-rule: Elements
K.88. session-route-share: Attributes
K.89. rule-set: Attributes
K.90. rule-set: Elements
K.91. session-rule: Attributes
K.92. session-rule: Elements
K.93. session-share: Attributes
K.94. voip: Attributes
K.95. voip: Elements
K.96. carrier: Attributes
K.97. telephone: Attributes
K.98. tone: Attributes
K.99. ringgroup: Attributes
K.100. etun: Attributes
K.101. autoloadtype: Type of s/w auto load
K.102. config-access: Type of access user has to config
K.103. user-level: User login level
K.104. eap-subsystem: Subsystem with EAP access control
K.105. eap-method: EAP access method
K.106. syslog-severity: Syslog severity
K.107. syslog-facility: Syslog facility
K.108. month: Month name (3 letter)
K.109. day: Day name (3 letter)
K.110. radiuspriority: Options for controlling platform RADIUS response priority tagging
K.111. radiustype: Type of RADIUS server
K.112. port: Physical port
K.113. Crossover: Crossover configuration
K.114. LinkSpeed: Physical port speed
K.115. LinkDuplex: Physical port duplex setting
K.116. LinkFlow: Physical port flow control setting
K.117. LinkClock: Physical port Gigabit clock master/slave setting
K.118. LinkLED: LED settings
K.119. LinkPower: PHY power saving options
K.120. LinkFault: Link fault type to send
K.121. ramode: IPv6 route announce level
K.122. dhcpv6control: Control for RA and DHCPv6 bits
K.123. bgpmode: BGP announcement mode
K.124. sfoption: Source filter option
K.125. pppoe-mode: Type of PPPoE connection
K.126. peertype: BGP peer type
K.127. ipsec-type: IPsec encapsulation type
K.128. ike-authmethod: authentication method
K.129. ike-mode: connection setup mode
K.130. ipsec-auth-algorithm: IPsec authentication algorithm
K.131. ipsec-crypt-algorithm: IPsec encryption algorithm
K.132. ike-PRF: IKE Pseudo-Random Function
K.133. ike-DH: IKE Diffie-Hellman group
K.134. ike-ESN: IKE Sequence Number support
K.135. ipsec-encapsulation: Manually keyed IPsec encapsulation mode
K.136. switch: Profile manual setting
K.137. dynamic-graph: Type of dynamic graph
K.138. firewall-action: Firewall action
K.139. voip-format: Number presentation format
K.140. uknumberformat: Number formatting option
K.141. recordoption: Recording option
K.142. ring-group-order: Order of ring
K.143. ring-group-type: Type of ring when one call in queue
K.144. record-beep-option: Record beep option
K.145. Basic data types