38. Firewall
ROX™ v2.2 User Guide
446
RuggedBackbone™ RX1500
Figure 38.6. Firewall Submenus
38.5.2. Working with Firewall Configurations
The ROX™ firewall configuration system allows a network security administrator to work on one or more
inactive firewall configurations while another is active and installed on the system.
Section 38.5.2.1,
“Typical Use Case”
illustrates how to use the ROX™ firewall configuration system.
Control of the firewall configuration is achieved by using the three variables in the Firewall Configuration
form, below:
Figure 38.7. Firewall Configuration form
Enable active configuration
Enables/disables the firewall configuration specified in active-config
Specify work configuration
Synopsis: string
The current work firewall is specified here.
Specify active configuration
Synopsis: string
The current active firewall is specified here
38.5.2.1. Typical Use Case
The following set of steps illustrates the configuration and maintenance of a set of firewall rules on an
active ROX™ firewall system:
1.
On an unconfigured system, begin configuring a set of firewall rules by giving the firewall a name:
‘fw1’, adding zones, interfaces, etc. At each commit at this stage, configuration data is saved but
no validation is performed.
2.
In order to validate the ‘fw1’ firewall configuration in progress, set the work-config variable to
the name: ‘fw1’ and commit the changes. The system validates the firewall configuration named
‘fw1’ and displays the results. Note that the configuration in progress is saved whether or not the