Chapter 10: Editing Configurations

This chapter will look at editing the configurations of firewalls under InControl control. The example of creating a new IP rule set entry will be used to illustrate the steps involved. The rule set entry will be an IP Policy that allows the firewall to respond to incoming ICMP Ping requests.

"Pinging" a firewall from any computer is a quick and simple way to check if the firewall is up and running. When cOS Core starts for the first time only a predefined IP rule set called main will exist and it will not contain an entry that allows ICMP Pings so they will be dropped.

IP Policy Setup Example Assumptions

The following names and IP addresses are assumed:

[Note] Note

You will have to substitute the information above with the actual interface name and IP addresses of a specific installation.

When InControl is started, the firewall My_FW will appear in the Firewalls tab.

All ICMP Traffic is Initially Dropped

Let us show that the initial cOS Core configuration drops all traffic and will therefore drop any ICMP traffic such as a Ping request.

To do this, open a standard Windows command console on the management computer and leave InControl running. At the command prompt, given the assumptions explained above, type:

> ping 192.168.101.240

The command should return output similar to that shown below.

The above output shows that cOS Core is ignoring the ICMP protocol packets, and the Ping command returns the Request timed out message.

Adding an IP Policy

The steps to add an IP Policy that allows cOS Core to respond to Ping requests are as follows:

  1. First, check out the My_FW firewall by pressing the Check out button.

  1. Providing no other InControl client has My_FW checked out, the check out will succeed and the current user, in this case admin, will appear as the locking user.

  1. The check out event will also be automatically logged in the Audit Trail.

  1. Display the Configuration tab for My_FW. This can be done in one of two ways:

    • Double click the My_FW line in the Firewalls tab.

    • Press the Configure button in the Firewalls toolbar.

  1. The firewall Configuration tab is now displayed. The name of the tab always comes from the name of the firewall. Selecting Policies > Firewalling > Rules > Main IP Rules in the navigation tree will display the main IP rule set. Note that an IP empty rule set is equivalent to dropping all traffic without any logging so at least one entry has to exist for traffic to be allowed to flow. Note that some Clavister hardware models will already have some predefined entries that allow protected clients to reach the Internet.

  1. By pressing the Add button, a new IP Policy can be defined to allow ICMP Ping messages to reach the firewall.

  1. Now, enter the properties of the IP policy. First, define the General properties. Any suitable name can be specified, such as MgmtPing.

    The Action is set to Allow so the traffic can flow.

  1. Next, specify the Address Filter of the rule which says where the affected traffic is coming from and where it is going to. These filtering properties are common to many of the rule sets in cOS Core.

    Note that the Destination Interface is set as Core which means that the ICMP ping request will be directed to the firewall itself and it is cOS Core that will respond.

  1. The Service is set to all_icmp which is one of the predefined cOS Core services. Optionally, the Schedule property can be used to specify times when the entry is to be active (the default is always active).

  1. If required, enable the sending of log messages when this IP policy is triggered.

  1. If required, an application type can also be selected as one of the filtering criteria (available in cOS Core versions from 14.00.07). This option also allows an alternate routing table to be selected for the triggering traffic (this feature is known as Application Based Routing in cOS Core documentation).

  1. Next, press the OK button to save the IP policy. The IP policy will now appear as an entry in this IP rule set although the entry does not become active until the changed configuration is deployed in the next step.

  1. Finally, check the new configuration in and deploy it. This can be done in a single step by pressing the Check In button.

  1. The check in dialog allows a comment and also the option to deploy in the same operation.

The audit log shows that the two operations of check in and deploy have taken place.

Alternatives for Deploying Configuration Changes

If a firewall configuration is changed but has not yet been deployed, InControl will provide several visual reminders and paths to deployment in the client interface:

Configuration Errors and Warnings

As a configuration is being modified, any configuration issues can be dynamically detected by InControl before deployment. A summary of these are displayed in a panel at the top of the configuration objects pane. An example of a single configuration error with two warnings is shown below.

The issues can be one of the following types:

Clicking either Errors or Warnings will expand the pane to provide a more detailed explanation of the issues. Shown below is an example of this after Errors has been clicked. Here, a value has not been specified for an address object.

Verifying that Ping Works

Now verify that cOS Core doesn't drop all traffic and the firewall replies to ICMP Ping requests. At the Windows command prompt in a console window, type:
> ping 192.168.101.240
The command should now result in output similar to that shown below.

If the Ping command returns a Request timed out message, the InControl connection to the firewall did not succeed. Refer to Chapter 27, Troubleshooting Connections for possible reasons.

Editing an Existing Object

In most cases, once a configuration object is created, there is a choice of two ways to change it using InControl:

The drawback to in-cell editing is that not all object properties are displayed and only the displayed ones can be changed with this method.

Using Objects Inherited From InControl Domains

It is possible for a firewall configuration to include objects that are common to a number of firewalls and which can be edited once for all inheriting configuration. This is achieved by using InControl domains. Using and viewing these inherited objects is discussed in Chapter 16, Domains.

Favorites Buttons

InControl provides a set of favorites buttons in the toolbar ribbon of the Configuration tab. The purpose of these is to provide shortcuts for quickly opening some of the most important aspects of a typical configuration without having to use the navigation tree.