Chapter 6: Preparing cOS Core

Before a NetWall firewall can be brought under InControl control, a Remote Management object that allows that control usually must be created in the firewall's cOS Core configuration. This chapter describes how that object is created and configured.

[Note] Note: Skip this chapter if using the zero touch feature

If adding a NetWall firewall automatically to InControl using the zero touch feature, no cOS Core preparation is necessary except for making sure that the cOS Core version is no earlier than 12.00.16 and has a default configuration. This chapter can therefore be skipped. Using zero touch is fully described in Chapter 8, Zero Touch.

Creating a Remote Management Object

To create the Remote Management object, use the following steps:

  1. Open the cOS Core management Web Interface in a browser and log in as an administrator.

  2. Go to System > Device > Remote Management and select Add.

  3. Choose the InControl Management (Netcon) option from the list of Remote Management object types, as shown below.

This will open up the properties display for the new InControl Management object. This is shown below with some example values already entered.

The configured properties are the following:

The Device Initiated Netcon Option

The firewall itself can initiate addition to InControl by setting the Type property of the remote management object to Device Initiated. This allows another set of related properties to be set for the object, as shown below.

The additional properties for device initiated Netcon are the following:

[Important] Important: HA cluster devices must have unique IDs

When setting up a high availability cluster, each device (the master and the slave) must have a unique value for the Remote Management ID property. If this is not true then device initiated NetCon will fail for the cluster.

When to Use Device Initiated Netcon

There are two methods for how a firewall can be added to InControl and brought under its control:

[Note] Note: The InControl server IP type does not matter

With the above method of adding a firewall through the InControl client, it does not matter if the InControl server has a public IP address or is behind a NATing device with a private IP. However, the IP address of the firewall should be static. Any changes to the firewall's IP address must also be made to the firewall's properties in InControl.

Steps for Setting Up Device Initiated Netcon

When setting up device initiated Netcon, the following ordering of steps must be followed:
  1. Create a Remote Management object in cOS Core

    Once the InControl Management object is configured and activated, if the Use Device Initiated Netcon option is enabled the cOS Core will immediately try to contact the specified InControl server. This will be done repeatedly at 5 second intervals until successful.

  2. Enable Netcon in the InControl Server Interface

    Device Initiated Netcon must be explicitly enabled for the InControl server. This is done with the following steps:

    1. From the Windows Start menu, select Clavister > Clavister InControl Server Settings to open the server interface. Administrator rights will be required for changes.

    2. Select the ReverseNetconServer options from the left-hand pane, as shown below.

    3. In the right-hand pane, set AcceptNewConnections and EnableReverseNetcon to a value of True. If a specific server interface is to be used for accepting incoming firewall connections then the IP address of that interface should be specified in the IP field. If any interface can be used, the IP field should be set to 0.0.0.0. The port for connections defaults to 998.

    4. Select File > Service > Restart to restart the server. The server interface will prompt to save the changes before restarting the service.

    Note that if the AcceptNewConnections option is disabled and EnableReverseNetcon is enabled, reverse Netcon will function but no new firewalls can be added to InControl.

  3. Create a Firewall object in InControl

    A corresponding Firewall object must now be created using the InControl client and this must be done after the Remote Management object is created. When specifying the InControl properties for the firewall, the following is entered:

    1. The Online option should be enabled for the status.

    2. The option Device Initiated option must be enabled.

    3. The Remote Management ID property must match the Remote Management ID property specified in the cOS Core Remote Management object.

    4. The Secret Key property must match the hexadecimal key of the PSK specified in the cOS Core Remote Management object.

    Creating firewalls for both methods of addition in InControl is further described in Chapter 7, Adding Firewalls.

  4. cOS Core finds and adds the polling firewall

    Once the InControl Firewall object is created, InControl will look for a matching firewall that is polling the InControl server. When it finds the match, it will add the device as a managed firewall. This InControl client interface will then display the firewall's ID instead of its IP address. The IP address will remain unknown and is not needed for communication between InControl and the managed firewall.

Once the firewall is added using device initiated Netcon, it can be managed just like a firewall that is added to InControl in the normal way.

Device Initiated Netcon of HA Clusters Using a Single Public IP

With HA clusters, only a single public IP address may be available when InControl management is device initiated. However, this is possible using a single public IP and setting this up is described in a Clavister Knowledge Base article at the following link:

https://kb.clavister.com/324736183