Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    LxCIPtable VNF Configuration Settings

    You can configure the LxCIPtable virtualized network function (VNF) from Configuration > Network Services > Service Name > Overview > Service Configuration.

    Your service provider usually configures base settings for the virtual machine (VM) in which the virtualized network function (VNF) resides and you configure settings for the service, such as policies.

    Use the information in the following tables to provide values for the available settings:

    • Table 1 shows the base settings you can configure for the Linux container.

      Note: Your service provider usually configures the base settings and you should not need to change them.

    • Table 2 shows the firewall settings you can configure.
    • Table 3 shows the Network Address Translation (NAT) settings you can configure.

    Table 1: Fields for the LxCIP Base Settings

    Field

    Description

    Loopback Address

    Specify a loopback IP address.

    Example: 192.0.2.10

    Operation

    Select add to apply the policies to a specific route or del to prevent use of the policies on specific routes.

    Example: add

    Route

    Specify the IP prefix of the route to which the policies should apply.

    Example: 192.0.2.20/24

    NextHop

    Specify the IP address of a Contrail gateway network to which the VM connects.

    Example: 192.0.2.20

    Table 2: Fields for the LxCIP Firewall Policy Settings

    Field

    Description

    Firewall Policies

    Prevent SSH Brute

    Select True to prevent SSH brute attacks or False to allow SSH brute attacks.

    Example: False

    Prevent Ping Flood

    Select True to prevent ping flood attacks or False to allow ping flood attacks.

    Example: False

    Forwarding Rule Settings

    Destination Address

    Specify the destination IP address prefix that the network service uses as a match criterion for outgoing traffic.

    Example: 192.0.2.25/24

    Operation

    Select the operation, which applies to a chain of rules of the same type, from the drop-down list. The following options are available:

    • append—Append the rule to a rule chain.
    • insert-before—Insert the rule before a rule with the same name.
    • delete—Replace an existing rule with this name.

    Example: append

    Source Address

    Specify the source IP address prefix that the network service uses as a match criterion for outgoing traffic.

    Example: 192.0.2.20/24

    Name

    Specify the name for the rule. The field has no limit on the number of characters and accepts letters, numbers, and symbols.

    Example: vsrx-fw-policy

    Action

    Select the action for the rule, which applies to all traffic that matches the specified criteria.

    • accept—Transmit packets that match the policy parameters.
    • drop—Drop packets that match the policy parameters.
    • reject—Reject packets that match the policy parameters.

    Example: accept

    Service

    Specify the service that you want the rule to match.

    Example:

    • http
    • smtp

    Type

    Select the type of packet that the rule matches.

    • input—Packets that the network service receives that are addressed to this VM
    • forward—Packets that the network service receives that are addressed to other VMs
    • output—Packets that the network service transmits

    The application creates a chain of all rules with a particular type.

    Example: input

    Table 3: Fields for the LxCIP NAT Policy Settings

    Field

    Description

    Left Interface

    Specify the name of the interface on which the network service enforces NAT for incoming traffic.

    Example: Eth1

    Right Interface

    Specify the name of the interface on which the network service enforces NAT for outgoing traffic.

    Example: Eth2

    Modified: 2017-08-17