35. Firewall
ROX™ v2.2 User Guide
379
RuggedBackbone™ RX5000
Figure 35.6. Firewall Submenus
35.5.2. Working with Firewall Configurations
The ROX™ firewall configuration system allows a network security administrator to work on one or more
inactive firewall configurations while another is active and installed on the system.
Section 35.5.2.1,
“Typical Use Case”
illustrates how to use the ROX™ firewall configuration system.
Control of the firewall configuration is achieved by using the three variables in the Firewall Configuration
form, below:
Figure 35.7. Firewall Configuration form
Enable active configuration
Enables/disables the firewall configuration specified in active-config
Specify work configuration
Synopsis: string
The current work firewall is specified here.
Specify active configuration
Synopsis: string
The current active firewall is specified here
35.5.2.1. Typical Use Case
The following set of steps illustrates the configuration and maintenance of a set of firewall rules on an
active ROX™ firewall system:
1.
On an unconfigured system, begin configuring a set of firewall rules by giving the firewall a name:
‘fw1’, adding zones, interfaces, etc. At each commit at this stage, configuration data is saved but
no validation is performed.
2.
In order to validate the ‘fw1’ firewall configuration in progress, set the work-config variable to
the name: ‘fw1’ and commit the changes. The system validates the firewall configuration named
‘fw1’ and displays the results. Note that the configuration in progress is saved whether or not the