Forceware Networking and Firewall Administrator'S Guide: Software Version 1.0 Fifth Edition Nvidia Corporation June 2004
Forceware Networking and Firewall Administrator'S Guide: Software Version 1.0 Fifth Edition Nvidia Corporation June 2004
Administrators Guide
Published by NVIDIA Corporation 2701 San Tomas Expressway Santa Clara, CA 95050 Copyright 2004 NVIDIA Corporation. All rights reserved. This software may not, in whole or in part, be copied through any means, mechanical, electromechanical, or otherwise, without the express permission of NVIDIA Corporation. Information furnished is believed to be accurate and reliable. However, NVIDIA assumes no responsibility for the consequences of use of such information nor for any infringement of patents or other rights of third parties, which may result from its use. No License is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in the software are subject to change without notice. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation. NVIDIA, the NVIDIA logo, nForce, and ForceWare are registered trademarks or trademarks of NVIDIA Corporation in the United States and/or other countries. Microsoft, Windows, Windows logo and/or other Microsoft products referenced in this guide are either registered trademarks or trademarks of Microsoft Corporation in the U.S. and/or other countries. Other company and product names may be trademarks or registered trademarks of the respective owners with which they are associated.
NVIDIA Corporation
Administrators Guide
Table of Contents
1. Introduction
Audience . . . . . . . . . . . . . . . . . . . . . . . 9 About NVIDIA ForceWare Network Access Manager . . . . . . . . . . . . . . . . . . . . . . . 9 Command Line Interface (CLI) . . . . . . . . . 10 Web-Based Interface. . . . . . . . . . . . . . . 10 Sample Web Pages. . . . . . . . . . . . . . 11 Specifying Another Language for Web Page Content. . . . . . . . . . . . . . . . . . . . . 12 WMI Script. . . . . . . . . . . . . . . . . . . . . 13 About Security . . . . . . . . . . . . . . . . . . . . 13 NVIDIA Firewall . . . . . . . . . . . . . . . . . . . 14 Key Features NVIDIA Firewall . . . . . . . . 14 System Requirements . . . . . . . . . . . . . . . . 15 General Requirements . . . . . . . . . . . . . . 15 Hardware Requirements. . . . . . . . . . . . . 16 Operating Systems . . . . . . . . . . . . . . . . 16 Software, Memory, and Disk Space Requirements . . . . . . . . . . . . . . . . . . 17 NVIDIA Firewall and Ethernet Parameters Reference . . . . . . . . . . . . . . . . . . . . . . 17 About the TCP Protocol. . . . . . . . About the UDP and ICMP Protocols UDP . . . . . . . . . . . . . . . . . ICMP . . . . . . . . . . . . . . . . Stateful Filtering . . . . . . . . . . . . . . Stateless Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 30 30 31 31 33 35 36 36 38 39 40 40 40 41 42 43 44 44 48
2. Installation Guidelines
Before Using the ForceWare Network Access Manager Installer . . . . . . . . . . . . . . . . . . 18 Installing ForceWare Network Access Manager . 19 Installing Network Access Manager in Silent Mode Optional . . . . . . . . . . . . . . . . . . . . . 20 Creating the Response File . . . . . . . . . . . 20 Running Installation in Silent Mode. . . . . . . 21 Launching the ForceWare Network Access Manager Web Interface . . . . . . . . . . . . . . 21 Trusting the Security Certificate For Remote Users Only. . . . . . . . . . . . . . . . . . . . 22 Importing the Certificate First Method . . 22 Importing the Certificate Second Method 25 Localizing the Web Interface . . . . . . . . . . 26 Configuration Deployment . . . . . . . . . . . . . 26 Before You Begin . . . . . . . . . . . . . . . . . 27
5. Administrative Tasks
Accessing the Administration Menu. . . . . . . . 50 Application Access Control Page . . . . . . . . . 51 Default Administrative Access Control Settings . 52 Command Line Access . . . . . . . . . . . . . 52 WMI Script . . . . . . . . . . . . . . . . . . . . 52 Local Web Access. . . . . . . . . . . . . . . . 53 Remote Web Access . . . . . . . . . . . . . . 53 Additional Notes . . . . . . . . . . . . . . . 53 Password . . . . . . . . . . . . . . . . . . . . . 54 IP Address and IP Address Mask (optional) . 54 Restore Factory Defaults. . . . . . . . . . . . . . 54 Display Settings . . . . . . . . . . . . . . . . . . . 55 Backup/Restore . . . . . . . . . . . . . . . . . . . 55 Backup Configuration . . . . . . . . . . . . . . 55 Restore User Configuration . . . . . . . . . . 56 ForceWare Network Access Manager Software Version . . . . . . . . . . . . . . . . . . . . . . . 56
NVIDIA Corporation
iii
Administrators Guide
Example 2 . . . . . . . . . Current Working Directory . . Example. . . . . . . . . . . Context-Sensitive Operations Example. . . . . . . . . . . Text File Processing . . . . . . . Export . . . . . . . . . . . . . . Syntax . . . . . . . . . . . . Example. . . . . . . . . . . Import . . . . . . . . . . . . . . Syntax . . . . . . . . . . . . Selective Export . . . . . . . . Syntax . . . . . . . . . . . . Example. . . . . . . . . . . Context Export . . . . . . . . . Example. . . . . . . . . . . Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 74 74 74 74 75 75 76 76 76 76 77 77 77 78 78 78
iv
NVIDIA Corporation
Administrators Guide
Broadcast Frames Received . . . . . . . Group: Alert Standard Format . . . . . . . . ASF Support . . . . . . . . . . . . . . . . ASF Destination IP Address . . . . . . . ASF Send Count. . . . . . . . . . . . . . Group: ASF Information . . . . . . . . . . . ASF Destination MAC Address . . . . . Group: System Fails to Boot Alert . . . . . System Fails to Boot Alert . . . . . . . . Group: Fan Problem Alert . . . . . . . . . . Fan Problem Alert . . . . . . . . . . . . Group: ASF SMBus Error . . . . . . . . . . ASF SMBus Error . . . . . . . . . . . . . Group: ASF WOL Alert . . . . . . . . . . . . ASF Wake On Lan (WOL) Alert . . . . . Group: ASF Heartbeat Alert . . . . . . . . . ASF Heartbeat Alert Interval . . . . . . . Group: ASF Operating System Hung Alert. ASF Operating System Hung Alert . . . Group: ASF Power Button Alert . . . . . . . ASF Power Button Alert . . . . . . . . . Group: ASF System Hot Alert . . . . . . . . ASF System Hot Alert. . . . . . . . . . . Group: ASF CPU Overheated Alert . . . . . ASF CPU Overheat Alert . . . . . . . . . Group: ASF CPU Overheated Alert. . . . . ASF CPU Hot Alert . . . . . . . . . . . . Group: ASF Case Intrusion Alert . . . . . . ASF Case Intrusion Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109 .109 .109 . 110 . 110 . 111 . 111 . 111 . 111 . 112 . 112 . 112 . 112 . 113 . 113 . 113 . 113 . 114 . 114 . 114 . 114 . 115 . 115 . 115 . 115 . 116 . 116 . 116 . 116
NVIDIA Corporation
Administrators Guide
Table: Domain Names Rule . . . . . Domain Name . . . . . . . . . . . Domain Action . . . . . . . . . . . Table: IP Option Rules . . . . . . . . IP Option Number . . . . . . . . . IP Option Name . . . . . . . . . . IP Version . . . . . . . . . . . . . IP Inbound Action . . . . . . . . . IP Outbound Action . . . . . . . . Table: IP Protocol Rule . . . . . . . . IP Protocol . . . . . . . . . . . . . IP Protocol Name . . . . . . . . . IP Protocol Action . . . . . . . . . Table: TCP/UDP Port Rule . . . . . TCP/UDP Port Outbound Action Remote IP Address . . . . . . . . Remote IP Subnet Mask . . . . . Port Name . . . . . . . . . . . . . Beginning Port Number . . . . . Ending Port Number . . . . . . . Port Protocol . . . . . . . . . . . Table: TCP Options Rule . . . . . . TCP Option Number . . . . . . . TCP Option Name I . . . . . . . . TCP Option Action . . . . . . . . Table: ICMP Rules . . . . . . . . . . Remote IP Address . . . . . . . . Remote IP Subnet Mask . . . . . ICMP Type . . . . . . . . . . . . . ICMP Code . . . . . . . . . . . . ICMP Name . . . . . . . . . . . . ICMP Version . . . . . . . . . . . ICMP Inbound Action . . . . . . . ICMP Outbound Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 .141 .142 .142 .143 .143 .144 .144 .144 .145 .145 .146 .146 .147 .148 .148 .148 .149 .149 .149 .150 .150 .151 .151 .151 .152 .152 .153 .153 .153 .154 .154 .154 .155
C. Glossary
vi
NVIDIA Corporation
Administrators Guide
List of Tables
Table 1.1 Hardware and Software Features Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Table 1.2 Software, Memory, and Disk Space Requirements. . . . . . . . . . . . . . . . . . . . . . . . . 17 Table 5.1 NVIDIA Firewall Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
NVIDIA Corporation
vii
Administrators Guide
List of Figures
Figure 1.1 ForceWare Network Access Manager Home Page. . . . . . . . . . . . . . . . . . . . . . . . . . 11 Figure 1.2 Figure 1.3 Ethernet Basic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Firewall Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Figure 2.1 Security Alert For Remote Users Only. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Figure 2.2 Certification Page For Remote Users Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Figure 2.3 Certification Page For Remote Users Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Figure 2.4 Certification Import Wizard For Remote Users Only . . . . . . . . . . . . . . . . . . . . . . . . 24 Figure 2.5 Certificate Import Wizard Completion Page For Remote Users Only . . . . . . . . . . . . . . . . 24 Figure 2.6 Root Certificate Store For Remote Users Only . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Figure 4.1 NVIDIA Firewall Basic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Figure 4.2 NVIDIA Firewall Options Configuring Antihacking Features . . . . . . . . . . . . . . . . . . . 39 Figure 4.3 Firewall Wizards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Figure 4.4 Graphical Information for Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Figure 4.5 Bar Graph of Packet Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Figure 4.6 Table (Statistics) of Packet Activity 1st section . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Figure 4.7 Table (Statistics) of Packet Activity 2nd section. . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Figure 4.8 Firewall Logging Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Figure 4.9 User Log Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Figure 5.1 Application Access Control Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
NVIDIA Corporation
viii
Administrators Guide
H A P T E R
INTRODUCTION
This chapter contains the following major sections: Audience on page 9 About NVIDIA ForceWare Network Access Manager on page 9 About Security on page 13 NVIDIA Firewall on page 14
Audience
This guide is intended for the system or network Administrator of an organization as a guide to install and use the NVIDIA ForceWare Network Access Manager application. Note: This guide assumes the reader has Administrator access privileges. Exceptions are noted, where applicable.
Chapter 1
Introduction
Web-Based Interface
The ForceWare Network Access Manager Web-based interface (see Sample Web Pages on page 11) offers convenient access through several features: Wizards see Using the NVIDIA Firewall Wizards Page on page 42. Profiles Status summaries Help. Context-sensitive online Help is available on a wide range of features. From any ForceWare Network Access Manager Web page, click the Help tab, as shown in Figure 1.1, to access detailed Help on the parameters you are configuring. Tool tips. When your cursor rests on the name of a parameter, its description is displayed in a popup text window, called a tool tip.
10
NVIDIA Corporation
Administrators Guide
Figure 1.2
NVIDIA Corporation
11
Chapter 1
Introduction
Figure 1.3
Firewall Wizards
12
NVIDIA Corporation
Administrators Guide
For complete details, see Installing ForceWare Network Access Manager on page 19 and Localizing the Web Interface on page 26.
WMI Script
You can use the Microsoft Windows Management Instrumentation (WMI) script language to manage NVIDIA networking hardware and software. Using WMI script language is recommended only for Administrators who are already familiar with programming in WMI script and who have become familiar with the syntax and characteristics of configuration parameters. WMI script programming is being used by the IT staff of larger corporations to carry out day to day maintenance work. Overall benefits of using WMI scripts include: Industry standard WMI can be implemented using languages such as VBScript and JScript. Ease of use Common scripts allow access to ForceWare Network Access Manager data. Flexibility If you are a WMI script user, you can utilize the power of the script languages to meet almost any requirements. For example, as an Administrator, you can write a WMI script to scan for Yahoo Messenger on a computer and open the appropriate port if the computer user has sufficient rights. Remote use means you can run the WMI script language remotely and use it as a deployment tool in an organization. See Configuration Deployment on page 26. For further informations, see Using WMI Script on page 57.
About Security
Access control is based on the kind of application being run, whether you are an Administrator or non-Administrator user, and the kind of access needed i.e, local or remote. The ForceWare Network Access Manager Web-based Application Access Control page (Application Access Control Page on page 51) enables you to configure non-Administrator access to applications, including: nCLI (NVIDIA command line interface) WMI scripting interface
NVIDIA Corporation
13
Chapter 1
Introduction
Local and remote Web access Note: For applications that are accessed from the local computer, the application access rights depend on the current access rights for the Windows login session. Note: A non-Administrator user on a computer cannot access the NVIDIA Firewall parameters and modify the access control parameters. For further details on security and access control, see Application Access Control Page on page 51.
NVIDIA Firewall
NVIDIA Firewall the only native firewall in the market is optimized and integrated into the NVIDIA nForce systems that support ForceWare Network Access Manager. (See Table 1.1 for supported NVIDIA hardware and features.) The NVIDIA Firewall is a high performance, hardware-optimized firewall offering enhanced reliability and protection at the end-point i.e., the desktop. It incorporates firewall and antihacking technologies such as antispoofing, antisniffing, anti-ARP cache poisoning, and anti-DHCP server, which are important security controls for corporate network environments. For an explanation of firewall concepts and the NVIDIA Firewall, see Chapter 3 NVIDIA Firewall: Basic Concepts on page 28.
Also see Table 1.1, Hardware and Software Features Support on page 16 and Configuring Antihacking Features on page 39.
14
NVIDIA Corporation
Administrators Guide
Comprehensive packet filtering see NVIDIA Firewall: Basic Concepts on page 28. Stateful and stateless packet inspections see NVIDIA Firewall: Basic Concepts on page 28. Predefined security profiles see Configuring the NVIDIA Firewall on page 35 include these key features:
User-customizable profiles Internet Protocol version 6 (IPv6) support Settings Lockdown, High, Medium, Low, Off
Advanced management features see Configuring the NVIDIA Firewall on page 35.
Remote administration Monitoring Configuration
NVIDIA command line interface (nCLI) support only for nForce 250 Professional systems. WMI scripting support only for nForce 250 Professional systems
System Requirements
General Requirements
WMI (Windows Management Instrumentation) service Note: WMI service is not automatically started on Windows 2000. The ForceWare Network Installer needs to change this service to run automatically on Windows startup. WMI MOF compiler (MOFCOMP) must be available on your computer. NTFS file system. It is recommended that you install the ForceWare Network Access Manager application on an NTFS file system so that sensitive information such as Firewall or access configuration data are protected from being changed by a non-Administrator user. Note: For further information on NTFS, refer to Windows online Help. Note: You are strongly encouraged to apply the latest Service Packs and Security patches from Microsoft. You can refer to Windows online Help for details on using Windows Update; or, from your Windows
NVIDIA Corporation
15
Chapter 1
Introduction
desktop, you can click Start > Windows Update (or Start > Programs > Windows Update).
Hardware Requirements
Support of ForceWare Network Access Manager features on NVIDIA nForce series personal computer systems is outlined in Table 1.1. Note: Miscellaneous features that are not listed (e.g., checksum off-load, segmentation off loads, etc.) are supported by all four nForce platforms listed in Table 1.1.
Table 1.1
nForce3 Ultra
Yes Yes No
No No
No No
No No
Yes Yes
Operating Systems
The ForceWare Network Access Manager application supports the following Microsoft operating systems: Windows XP Professional Service Pack 1 or later version Windows 2000
16
NVIDIA Corporation
Administrators Guide
Software
nForce Ethernet driver for Windows XP/2000 Note: To run the ForceWare Network Access Manager software, nForce Ethernet must be configured as a bridge device in the BIOS, which is the factory default. NVIDIA Firewall ForceWare Network Access Manager
For further information on driver installation, see Installation Guidelines on page 18.
NVIDIA Corporation
17
Chapter 2
Installation Guidelines
H A P T E R
INSTALLATION GUIDELINES
This chapter contains the following main topics: Before Using the ForceWare Network Access Manager Installer on page 18 Installing ForceWare Network Access Manager on page 19 Installing Network Access Manager in Silent Mode Optional on page 20 Launching the ForceWare Network Access Manager Web Interface on page 21 Configuration Deployment on page 26
software, as needed.
18
NVIDIA Corporation
Administrators Guide
If you are using the ForceWare Network Access Manager Web-based interface, note the following: Note: Microsoft Internet Explorer version 5 or later must be running on your computer. Note: The ForceWare Network Access Manager Web-based interface uses the NVIDIA registered TCP port 3476. Make sure no other network application uses port 3476.
Note: There are two basic language editions of the nForce driver installation package: English only and International. If your preferred language is one of the following, make sure you download the International edition
French German Italian Spanish Japanese Korean Simplified Chinese Traditional Chinese 2 Open or save the package to a specified directory. The directory root is
usually C:\NVIDIA\nForce....
3 If you have saved the package, manually start the setup.exe file or if you
chose to open the nForce package in step 2., the setup.exe program automatically starts running.
4 When the prompt appears to install the Network Access Manager and
Firewall, proceed as requested, unless you want to run a silent installation, in which case, go to Installing Network Access Manager in Silent Mode Optional on page 20.
NVIDIA Corporation
19
Chapter 2
Installation Guidelines
Manager software, simply follow the prompts to complete the installation process.
The ForceWare Network Access Manager installation program (<uncompressed directory_name>\Ethernet\NAM\ NetworkAccessManagerSetup.exe) uncompresses and saves all the relevant software in a directory you specify. By default, this directory is: C:\ NVIDIA\NetworkAccessManager.
installation explained in the previous section. Note that in this installation process, you will select the options to be used in subsequent silent installations. All choices are recorded in the response file named nvidia_net.iss. Note: You can change the path and name of the response file by replacing c:\nvidia_net.iss with a drive letter and file name of your choice. The ForceWare Network Access Manager installation program runs and uncompresses all the relevant software in a directory you specify. By default, this directory is: C:\NVIDIA\NetworkAccessManager.
20
NVIDIA Corporation
Administrators Guide
or
From your Windows taskbar, click Start > Programs > NVIDIA
Note: If you are using the ForceWare Network Access Manager Web-based interface locally instead of remotely, you do not need to follow the instructions about working with security certificates as explained in the steps that follow.
2 Remote Users: If you are a remote user of the ForceWare Network Access
Manager Web-based interface, before you can enter your user name and password, a Security Alert (Figure 2.1) page appears alerting you about the managed computers security certificate.
The security certificate is generated by the Network Access Manager to enable Secure Sockets Layer (SSL) to secure the communications channel.
NVIDIA Corporation
21
Chapter 2
Installation Guidelines
Figure 2.1
Note: You have to enable your browser to trust this security certificate before you can proceed. To avoid being prompted by the Web browser about the security certificate, you can choose to import the certificate in one of two ways, as explained in Trusting the Security Certificate For Remote Users Only on page 22.
security certificate (Figure 2.1), click View Certificate to display the Certificate page (Figure 2.2). Import Wizard page (Figure 2.3).
2 On the Certificate page, click Install Certificate to launch the Certificate 3 Click Next to display the Certification Store page (Figure 2.4). 4 Select Automatically select the certificate store based on the type of
The completion page of the Certificate Import Wizard appears (Figure 2.5).
5 Click Finish. The Root Certificate Store dialog box appears (Figure 2.6).
22
NVIDIA Corporation
Chapter 2
Installation Guidelines
Figure 2.2
Figure 2.3
23
NVIDIA Corporation
Chapter 2
Installation Guidelines
Figure 2.4
Figure 2.5
24
NVIDIA Corporation
Chapter 2
Installation Guidelines
Figure 2.6
browser.
2 On the remote Web browser, launch Internet Explorer. 3 Go to Tools > Internet Options > Content > Certificates and click Import
4 Click Next to display the Certification Store page (Figure 2.4). 5 Select Automatically select the certificate store based on the type of
The completion page of the Certificate Import Wizard appears (Figure 2.5).
6 Click Finish to display the Root Certificate Store dialog box (Figure 2.6). 7 Click Yes to add the certificate to the Root Store.
25
NVIDIA Corporation
Chapter 2
Installation Guidelines
5 Click OK. The language you added appears in the Language: list. 6 If more than one language appears in the list and you want to activate the
7 Click OK and click OK again to exit the Internet Options dialog box. 8 Press F5 to refresh your screen.
Configuration Deployment
Configuration deployment means configuring multiple computers to use the same configuration through an automated procedure. You can use any one of the following configuration methods: Run the nCLI command to change parameters during the login script.
26
NVIDIA Corporation
Chapter 2
Installation Guidelines
Run nCLI to configure one parameter at a time or use the import command for bulk configuration. Note: Sample command line access scripts can be found in the sample directory, under the default path of c:\nvidia\NetworkAccess Manager, or the path you specified. See Using The Command Line Interface (CLI) on page 61 section for more information. Create and run WMI scripts to change parameter when executing the login script.
27
NVIDIA Corporation
Chapter 3
H A P T E R
Types of Firewalls
The NVIDIA Firewall is a type of firewall that is typically referred to as a PC firewall or a desktop firewall. Another classification of firewalls is the gateway firewall. The main difference between the PC firewall and the gateway firewall is that while the gateway firewall monitors network traffic and controls access between two different networks or administrative domains, the PC firewall controls traffic generated or received by a single computer. Therefore, a gateway firewall is usually a dedicated computer, or a part of a network switch or router, with multiple interfaces through which certain traffic is allowed and other traffic is blocked. A PC firewall is usually software that is installed on the personal computer, or a combination of software and hardware that is integrated to the computer. In both types of firewalls, certain traffic is allowed and certain traffic is blocked according to the specific rules configured for the firewall.
28
NVIDIA Corporation
Administrators Guide
Firewalls just discussed can be further classified as one of two types Application layer Packet-based firewalls are of two main sub-types:
Stateful Stateless
Note: The NVIDIA Firewall is a packet-based PC firewall with both stateful and stateless features.
NVIDIA Corporation
29
Chapter 3
By defining the direction as part of the specification of a rule, the end-user can separate traffic that he/she considers to be safe enough from traffic considered unsafe. Most protocols exchange traffic bi-directionally; therefore, the direction of such exchanges is defined by the connection-initiation packet. For example, in the case of TCP packet, the first packet matching a new set of IP addresses and TCP ports for which the TCP SYN flag is set establishes the direction of that subsequent bi-directional flow. Other protocols, such as User Datagram Protocol (UDP) or Internet Control Message Protocol (ICMP), may not have the equivalent of the TCP SYN flag. Therefore, for those protocols, the NVIDIA Firewall uses the direction of the first packet matching a given set of IP addresses and, for example, UDP ports, as the direction for the subsequent bi-directional flow.
UDP
UDP is frequently used in a connection-like manner, but without the connection establishment process. In other words, UDP-based applications may rely on long-term computer-to-computer sessions. However, the meaning of the direction of the connection in the UDP context is broader than in the TCP context. The direction of a packet is inbound if the initial packet matching this new set of IP and UDP header field values was a received packet.
30
NVIDIA Corporation
Administrators Guide
Similarly, a UDP connection is considered to be outbound if the initial packet matching this new set of IP and UDP header field values was a transmitted packet. Thus, firewall rules that apply to UDP typically also depend on the direction of the first packet of a new connection. UDP packets, like TCP packets, can be matched against a connection table by performing a hash function on certain fields in the packet to determine if there is a match in a table of hash values where there is at least one connection that corresponds to each hash value.
ICMP
ICMP is an example of a protocol with neither a connection establishment process nor any connection-like functionality. Firewall rules relevant to these types of protocols are applied to every packet, and inbound and outbound respectively refer to packets (of one of these protocols) that are received and transmitted across any of the network interfaces that the firewall is protecting.
Stateful Filtering
Stateful filtering (also known as stateful inspection or dynamic packet filtering) provides enhanced security by monitoring network packets over the period of the connection for that particular traffic. Because stateful filtering can dynamically track each connection, compare packets against the connection's expected state, and drop the packets that don't conform to the protocol, it has replaced static filtering as the industry standard firewall solution for networks. It is also the case that stateful filtering scales much better than stateless filtering because the firewall policy table is only consulted once per connection, instead of once per packet. This means that as the number of rules grows, the stateful firewall will use a lower percentage of CPU, because in a stateless design, each packet will have to be compared against half of the firewall rules, on average, until a matching rule is found that explicitly allows or denies the packet. However, an increase in the size of the firewall policy rule table does not impact the stateful firewall to such a large degree, since the majority of packets are not connection setup packets. A stateful firewall amortizes the CPU cycles that were used to do the firewall policy rule table lookup over the massive per-packet CPU savings due to having only a simple per-packet hash to compute, to determine if the current packet is associated with a previously allowed connection. In contrast, a stateless firewall must examine every packet against the complete firewall policy rule table, or until it finds a matching rule, so in essence, every
NVIDIA Corporation
31
Chapter 3
packet is treated as a connection setup packet, incurring the associated processing penalty. As a result of the differences in processing required for stateful vs. stateless firewall lookups, latency due to stateful firewall operations is very small and nearly constant on a per-packet basis, whereas latency in a stateless firewall depends on the size of the firewall policy rule table, and is of a much larger magnitude. Once a TCP or UDP connection is established, a stateful firewall ensures that data traffic for that connection can flow in either direction even if the rules governing the firewall limit such traffic to be only associated with remotely generated (i.e., inbound), or locally-originated (i.e., outbound) connections. When a stateful firewall has determined that a connection is being established by decoding each packet, it checks its policy table to find out whether the connection is allowed or denied. In TCP, the connection establishment packet is a specially marked TCP packet that the firewall can detect. A UDP connection is initiated by the first packet matching a set of identifying fields in the IP and UDP headers. If the firewall allows the new connection, the firewall saves a set of five values related to that connections establishment into its connection-tracking table during the lifetime of that connection. Every inbound and every outbound packet associated with a given connection contains the same five values. This allows the stateful firewall to quickly check whether or not the packet belongs to a connection that was previously granted permission and then deny or allow the packet accordingly. Note: Only TCP packets that match the connection-tracking table are allowed. UDP packets that do not match the table may represent a new connection and are compared with the firewall rules in order to determine whether or not to add an entry to the connection-tracking table for this new connection. The five connection identifying values saved into the connection-tracking table are:
IP Source Address IP Destination Address IP Protocol TCP or UDP Source Port TCP or UDP Destination Port
32
NVIDIA Corporation
Administrators Guide
For TCP, in addition to the five items in the list, the firewall tracks the state of the TCP connection (for example, the current stage of the connection establishment process) in order to enforce legal state transitions in the TCP protocol. The firewall also tracks the current TCP sequence and acknowledgement numbers and the most recent TCP window in order to determine whether to drop packets that fall outside the current valid TCP window. This kind of scrutiny prevents potential attackers from sending spurious TCP reset packets to the local computer in that the firewall prevents these reset packets to reach the host if the TCP sequence number of the reset packet falls outside the current valid TCP receiving window. Some TCP options can also be used by the stateful firewall in determining whether to allow or deny TCP packets because certain TCP options can only be used if their use was negotiated during the connection establishment process. If such TCP options were negotiated during the connection establishment phase, then the TCP state will reflect the successfully negotiated TCP options for that connection. The TCP policy table can still override the peers and prevent certain TCP options from being negotiated at all. Note: Other TCP options are not pre-negotiated. Therefore, decisions about whether to allow or deny TCP packets with such options must be based on the stateless (see Stateless Filtering) configuration of the firewall.
Stateless Filtering
The main difference between stateful filtering and stateless filtering is that contrary to the quick lookup-and-decide process enabled by the connection state tracking table that drives the decision making process in stateful filtering, all of the stateless filtering rules must be examined in sequence, for each packet, until a rule is found that either explicitly allows or denies that packet. Note: For protocols such as ICMP and other non-TCP and non-UDP protocols, and for any non-IP protocols, the firewall performs stateless filtering but no stateful tracking or filtering. In stateless filtering, the firewall can be configured to allow in or deny in certain kinds of traffic (from a specific protocol, with a particular option, etc.) on a given network interface. Similarly, the firewall can be configured to allow out, deny out, allow in and out, or deny in and out on the same traffic. Note that in implies the receive direction and out implies the transmit direction. On average, the firewall will need to search half of its rules list for any given packet in order to find an applicable rule. Therefore, in general, as the number of rules increases, the firewall consumes more time in determining the outcome
NVIDIA Corporation
33
Chapter 3
of a given packet. On the other hand, the NVIDIA Firewall has been optimized so that looking up certain commonly used parameters (for example, ICMP, TCP, and UDP in the IP protocol table) is much faster and independent of the table size. The firewall can be configured to perform stateless filtering based on: EtherType values Specific IPv4 or IPv6 addresses or address prefixes Specific domain names contained within DNS name resolution queries or responses Specific IP options Specific TCP options Specific ICMP (Type, Code) pairs Other relevant parameters In all cases, stateless filtering rules are specified in the appropriate firewall table in the ForceWare Network Access Manager Web-based interface. For example, when filtering ICMP traffic, the filtering rule is based on both the first three items (IP Source Address, IP Destination Address, and IP Protocol) as listed in the section on Stateful Filtering on page 31, as well as the particular ICMP (Type, Code) field values in each ICMP packet. In ICMP filtering, the IP Protocol is implicitly required to have a value of 0x01, which is the protocol value for ICMPv4. A similar requirement is placed on ICMPv6, with its own unique identifying number in the IPv6 headers (i.e., 0x3A). In most situations involving stateless filtering, it is necessary to allow a given protocol to go both in and out on a given interface in order for the associated application to operate normally. However, it may also be the case that certain applications require that one type of traffic be allowed in, while another type is allowed out. One example of the latter case is ping because in order for the application process to complete successfully, the firewall must be configured to allow both an outbound ICMP Echo packet (Type = 0x08, Code = 0x00) and an inbound ICMP Echo Reply packet (Type = 0x00, Code = 0x00). These settings will allow the local PC to ping remote computers but will not necessarily allow remote computers to ping the local computer because inbound ICMP Echo packets and outbound ICMP Echo Reply packets are not necessarily allowed. Note: Based on the above values, note that the ICMP (Type, Code) pair values for ICMP Echo and Echo Reply are, in fact, different.
34
NVIDIA Corporation
Administrators Guide
H A P T E R
NVIDIA Corporation
35
Chapter 4
need help, see Launching the ForceWare Network Access Manager Web Interface on page 21.
2 From the Firewall menu, click the Basic Configuration option to open the
3 Click the Security Profiles list to view the profiles, which are predefined sets
Note: You cannot edit these basic pre-defined profiles. To create custom profiles to define the sets of NVIDIA Firewall rules, see Advanced Configuration on page 38 and Using the NVIDIA Firewall Wizards Page on page 42.
4 To enable a specific profile, click the Security profiles list and select the
profile you want. See the next section, Security Profile Settings for an explanation of each setting.
5 Click Apply. 6 To view the actual rules associated with a profile, repeat step 4 above. 7 From the Firewall > Advanced Configuration menu, click the appropriate
Using the table, you can determine whether the settings are appropriate at the level of protection you want for your application(s).
Administrators Guide
Low is the least secure of the profile settings, but allows most applications to work properly. Anti-hacking only is a profile setting that enables only the anti-hacking features of the NVIDIA Firewall and is useful in a dual firewall configuration for example, if you want to use a third-party firewall product along with the anti-hacking features of the NVIDIA Firewall. Note: The Anti-hacking only setting disables the NVIDIA Firewall, allowing most incoming and outgoing network traffic**. The logging of NVIDIA Firewall messages will proceed as usual, as long as you have enabled one of logging message types in the NVIDIA Firewall Log Setting page. ** If you are using the Anti-hacking only setting with another third-party firewall, then the third-party firewall controls the incoming and outgoing network traffic and will probably deny most incoming and outgoing network traffic. However, the NVIDIA Firewall will still continue to log messages pertaining to the Anti-hacking only setting, as long as you
NVIDIA Corporation
37
Chapter 4
have enabled one of the log message types in the NVIDIA Firewall Log Settings page. For additional information, see NVIDIA Firewall Logging on page 48. Off turns off the NVIDIA Firewall, allowing all incoming and outgoing network traffic.
Advanced Configuration
If you want to create a custom profile, you can use any of the basic Lockdown, High, Medium, Low, Anti-hacking, or Off profiles discussed in Using the Basic Configuration Page on page 36 as a starting point. Note: You can define up to three independent custom profiles. To create or choose a custom profile, follow these steps:
1 Open the ForceWare Network Access Manager Web browser interface.
If you need help, see Launching the ForceWare Network Access Manager Web Interface on page 21
2 From the Firewall menu, click Basic Configuration to open the Firewall
3 Click the Security Profiles list to view the profiles. 4 Then select on of the three Custom profiles. 5 Specify a new name for each custom profile you select in step 4 in the
Note: You will probably choose to generate a custom profile based on one of the pre-defined profiles, e.g., Lockdown, High, Low, etc.
6 To edit the associated table rules, select the appropriate option under the To add a rule or purge all rules in a table, use the Add Rule or Purge
Advanced Configuration menu to perform any of the following actions: Table buttons in the corresponding tables page.
a) Click the drop-down menu in the corresponding table row under the action column and choose either Allow or Deny (for all tables) or Ignore (for the UDP/TCP Port table only). For further details, see About Working With Tables on page 40. b) Click Apply. Note: Multiple actions may be modified before you click Apply, which accepts all the changes at once.
38
NVIDIA Corporation
Administrators Guide
To edit any other parameter of an existing rule, or to delete a rule, click the
icon in the corresponding row under the Edit column to open the Rule editing page.
For brief descriptions of each table parameter, click the Help button on the upper-right corner of either the Table page or the Rule editing page. For more detailed descriptions of each table parameter, refer to NVIDIA Firewall Parameters Reference on page 117 in this guide. The NVIDIA Firewall > Advanced Configuration page also allows you to toggle the more advanced security features of the NVIDIA Firewall. For detailed information on these features, click the Help tab on the upper right corner of the page.
NVIDIA Corporation
39
Chapter 4
need help, see Launching the ForceWare Network Access Manager Web Interface on page 21. click Options to open the Firewall Options page (Figure 4.2).
2 From the NVIDA Firewall menu, click Advanced Configuration, and then 3 For detailed information about the options and how to configure them, see
Group: Configure Firewall Options on page 120 in Appendix B: NVIDIA Firewall Parameters Reference on page 117.
In all other types of tables, the direction is not important. Therefore, each rule lets you set one action for both inbound and outbound. Every rule can either Allow or Deny traffic, while each rule in the UDP/TCP Port table has an additional action called Ignore. The Ignore action is useful when you want a UDP/TCP Port rule to apply in only one direction. For example, setting a rule for HTTP (Web) port 80 to deny inbound and ignore outbound will always block Web connections in the inbound direction, but will let a more generic matching rule or the default action to determine the action for outbound Web connections.
40
NVIDIA Corporation
Administrators Guide
In the IP Address table, the Domain Name table, and the UDP/TCP Port table, the rules are normally sorted by the Rule Order column, which is both the order that the rules have been added and the order that they will be applied. Executing the rules in the order of their creation allows you to add overlapping rules that provide one action for a more generic range of IP addresses or domain names, while having a different action for a more specific IP or domain. For example, if you first create an IP Address table rule to allow address 10.1.1.2 and mask 255.255.255.255, and then create a rule to deny address 10.1.1.0 and mask 255.255.255.0, then the IP Address table will allow traffic to 10.1.1.2 but will block other IP address beginning with 10.1.1.x. Traffic to 10.1.1.2 will not be blocked by the second rule of this table because the first rule already matches it. You can similarly set up the Domain Name table to block a generic domain suffix (e.g., example.com) but allow specific domain names (e.g., foo.example.com). In all other tables, the rules are normally sorted by the most significant column. For example, EtherType rules are sorted by the EtherType value, the ICMP rules are sorted by the ICMP Type and then ICMP Code, etc An exception to this behavior is that right after adding a rule to any table, the new rule appears at the bottom of the table so that it can be easily verified as having been added. When the table is viewed again (after navigating away to another page within the Web browser), the rules are back to the default sorting method. Note: While every table has a Rule Order column, only in the IP Address table, the Domain Name table, and the TCP/UDP Port table mentioned above do you need to worry about the Rule Order when adding new rules, because they allow overlapping IP addresses or domain names.
NVIDIA Corporation
41
Chapter 4
In general, if the default action of a table is to Deny, then most rules should be set to Allow specific exceptions. Similarly, if the default action is to Allow, then most rules should be to Deny specific exceptions. Note: It is generally agreed that it is safer to discard traffic unless you specifically need to allow it, so a default action of Deny is likely to be more secure (or at least more convenient) than a default action of Allow. The NVIDIA Firewall will compare each packet to the firewall tables in the following order, from the lower-numbered, more fundamental parameters to the higher-numbered, more complex parameters.
a EtherType table b IP Address table c IP Option table d IP Protocol table e TCP Option table f UDP/TCP Port table g ICMP table h Domain Name table
Note: Packets of a specific protocol, such as TCP, will not be processed by the table of an unrelated protocol, such as ICMP.
Administrators Guide
Note: Refer to your application documentation for information on the TCP/ UDP ports that are used, if applicable.
Figure 4.3
Firewall Wizards
Configuration Dependencies
Under certain configurations, the NVIDIA Firewall might not function as expected even though its functionality is still consistent with the actual rules that were configured. In particular, it is possible to provide the firewall with conflicting configuration directives, yet it might not be obvious that this is the case. This situation may arise because of the many ways in which traffic can be allowed or denied and the overlapping scopes of the various firewall tables. For example, suppose that you had configured the NVIDIA Firewall to allow certain types of ICMPv4 traffic but had also configured it to block all IPv4 packets. If you had forgotten that the latter was the case, you might wonder why the allowed ICMPv4 traffic was not getting through. In this case, you would
NVIDIA Corporation
43
Chapter 4
have to realize that you cannot expect ICMPv4 traffic to flow unless you allow at least IP Protocol number 0x01 and EtherType 0x0800 for IPv4. Other less obvious cases are also possible. For example, if all inbound packets with IP options are blocked, then IGMP Reports will not be received by the stack, since all IGMP Reports have an IP Router Alert option included in the packet.
Recommendations
Note: There are many ways to configure different parameters, which could cause unintended and troublesome consequences. Therefore, it is best to work step-by-step through a configuration, building up one layer of rules at a time. Once a given configuration is known to be effective, then it is possible to amend the configuration slightly and re-verify the old configuration, while verifying the new configuration as well. Ultimately, the configuration will converge on a set of rules that meets the stated requirements. Note: Attempting to set up the final configuration in a single big step can sometimes enable interdependencies that prevents things from working as intended and result in difficult troubleshooting.
table choices.
44
NVIDIA Corporation
Administrators Guide
graphical format, click Graphical to display a page similar to Figure 4.4. For detailed Help on options, click the Help tab.
a To view statistics based on the number of packets, click the Packets tab. b To view statistics based on the number of connections, click the
Connections tab.
c After noting the current TCP statistics, you can add a TCP Port Rule to
d Then you can send some test packets to verify that such packets were
Figure 4.4
Firewall
Red arrows represent packets or Arrows pointing to the computer icon represent connections that are stopped by received packets or incoming connections. . the NVIDIA Firewall. Arrows originating from the computer icon represent transmit packets or outgoing connections.
NVIDIA Corporation
45
Chapter 4
3 In order to send TCP traffic to a particular port, you can open a command
telnet foo.example.com 1003 foo.example.com is any valid domain name or IP address that will normally let a packet to be sent through the NVIDIA Firewall. 1003 is actually any number between 1002 and 1009 that should be blocked. The Telnet program will attempt to connect and the expected result (if the rule has been set up properly) is that the Telnet connection attempt should eventually time out because the packets associated with that connection have been blocked.
4 After performing the above test, you can click the Bar graph or Table option
from the Information menu to verify whether the Outbound TCP connections denied count or the Outbound TCP packets denied count has increased by an amount consistent with the tests that were performed. A sample bar graph is shown in Figure 4.5.
Bar Graph of Packet Activity
Figure 4.5
A sample table of Firewall statistics is shown in Figure 4.6 and Figure 4.7.
46
NVIDIA Corporation
Administrators Guide
Figure 4.7
NVIDIA Corporation
47
Chapter 4
5 If you see too many log entries being generated, you can do one of the Click Clear All Logs or Choose Log Settings from the menu to open the Log Settings page again.
Then consider changing the type of log messages to one of several options provided, as shown in Figure 4.9.
48
NVIDIA Corporation
Administrators Guide
Figure 4.9
NVIDIA Corporation
49
Chapter 5
Administrative Tasks
H A P T E R
ADMINISTRATIVE TASKS
This chapter contains the following topics: Accessing the Administration Menu on page 50 Application Access Control Page on page 51 Restore Factory Defaults on page 54 Display Settings on page 55 Backup/Restore on page 55 ForceWare Network Access Manager Software Version on page 56
3 Click the menu item to display its associated page on the right.
50
NVIDIA Corporation
Administrators Guide
You can use the Application Access Control page to configure the application access permissions. Note the following about these permissions: Permissions apply only to non-Administrator and remote users. You must have Administrator rights to configure permissions from the local computer. An Administrator on a local computer has access to all applications and configuration information i.e., WMI scripts, the command line, and the Web interfaces, provided they are installed on the computer. The access control settings do not affect the Administrator. These permissions cannot be viewed, accessed, or configured remotely, even by an Administrator. Note: Most of the access control in place will work only if the applications are installed on the NTFS file system, so it is recommended that you use
NVIDIA Corporation
51
Chapter 5
Administrative Tasks
NTFS, however the application will still function if installed on a FAT file system.
Feature
Ethernet
WMI Script
Any user
Web Local
Web Remote
Any user with the correct password and IP address/mask pair will be granted remote Web access with Administrator rights. Any user with the correct password and IP address/mask pair will be granted remote Web access with Administrator rights. NA
Firewall
Administrator only
Administrator only
WMI Script
Default: Allow access This field lets you specify whether to Allow or Deny WMI scripting access to the non-Administrator users.
52
NVIDIA Corporation
Administrators Guide
If disabled, no instances of WMI classes, which are part of the NVIDIA namespace, will be available through WMI script or other third party WMI application. Administrator users can always access WMI using scripts.
Additional Notes
Remote access to Network Access Manager is most suitable from a home environment. Remote access to Network Access Manager provides limited access to the IP address/mask and can also be restricted based on the IP address or subnet address.
NVIDIA Corporation
53
Chapter 5
Administrative Tasks
Password
Default: No password the password string is empty. When you enable remote Web access, you can set a password. Note: The user name for remote access is admin.
parameters.
parameters.
2 After you select either Ethernet or Firewall, click Start Restore to restore
An alert appears asking you to confirm whether you want to wipe out your current settings and replace them with the default values.
3 To proceed click OK. To cancel the operation, click Cancel.
54
NVIDIA Corporation
Administrators Guide
Display Settings
The Display Settings page allows you to configure the font size for the pages and the refresh rate for the statistics pages. Statistics refresh rate (Min 1, Max 65535) controls the refresh rate of all the statistics pages in the Web interface.
Range of values: 1 to 65535 seconds Default: 10 seconds
Font size controls the font size used in the Web interface. The options are:
Default font Small font
Backup/Restore
The Backup/Restore page allows you to backup your configuration to a file or restore your configuration from a file you specify. Click Backup to launch the Backup Configuration page described below, which will allow you to backup your configuration to a file. Click Restore to launch the Restore User Configuration page described below, which will allow you to restore the configuration you have backed up in a file.
Backup Configuration
The Backup Configuration page will allow you to export the current configuration into a file. You can select the filename and also provide a brief description to be added to the top of the file. Once the backup is completed, a link to the file will be provided. You can right click on the link and save the file to any folder you want. Note: Only Administrator users can backup the firewall configuration. Backup filename is the filename of the backup file created. Note: The default file name is export.txt Description. You can enter a short description of the configuration you are backing up. This description will be added to the top of the file along with the date and time of the backup.
NVIDIA Corporation
55
Chapter 5
Administrative Tasks
Configuration. You can choose either the Ethernet or the Firewall component to backup. Note: If you don't choose one of the components, you will get an empty backup file. Backup. Click Backup to start backing up the configuration settings for the selected components.
56
NVIDIA Corporation
Administrators Guide
H A P T E R
NVIDIA Corporation
57
Chapter 6
Overview
WMI technology is Microsoft Windowss implementation of Web-Based Enterprise Management (WBEM), an industry standard for management infrastructure that supports Common Information Model (CIM), Managed Object Format (MOF), and a common programming interface. WMI consists of a management infrastructure (CIM object manager) and WMI custom Providers that communicate with each other through a common programming interface using Component Object Model (COM). The WMI technology also provides support for third-party Custom Providers. Custom Providers can be used to service requests related to managed objects that are environment-specific. Providers typically do the following: Use the MOF language to define and create classes. Use the WMI API to
access the CIM Object Manager (CIMOM) object repository respond to CIMOM requests made initially by applications.
58
NVIDIA Corporation
Administrators Guide
CIM extension schemas Custom Providers. For further details. see the following Web site: http://msdn.microsoft.com/library/default.asp?url=/library/ en-us/dnwmi/html/wmiscript.asp
Advanced Topics
NVIDIA Namespace
NVIDIA ForceWare Network Access Manager classes are located under root/ NVIDIA namespace in the WMI repository. Note: It is strongly recommended that you do not modify anything in the NVIDIA namespace; for example, do not add or remove classes, or update their qualifiers. Modifying these items can prevent the proper functioning of the ForceWare Network Access Manager software.
WMI Provider
NVIDIA implements an extensible instance provider to manage the NVIDIAspecific objects. It is a COM in-proc server.
Synchronization
NVIDIA management framework ensures that only one Web, nCLI, or WMI script user interface is running at any given time. This feature is implemented to avoid data synchronization problems and improve the user experience. Note: Within the WMI script, you can execute more than one script at any given time. However, doing so can potentially introduce data inconsistency. NVIDIA recommends that you run only one script at a time.
NVIDIA Corporation
59
Chapter 6
Sample Scripts
WMI script usage samples are provided in the following subdirectories under the default path of c:\nvidia\NetworkAccessManager, or your userspecified path: samples\Eth samples\Firewall For example, Firewall WMI script examples are in: sample\Firewall\PerFireWMIScriptExamples.js You can cut and paste the appropriate command and use them in a batch file or the command line.
60
NVIDIA Corporation
Administrators Guide
H A P T E R
Conventions Used
Text in code font (this is code font) means it is text that is displayed on your screen. Text in bold code font (bold code font) indicates text you type on your computer.
NVIDIA Corporation
61
Chapter 7
Parameters
The nCLI command accepts the following classes of parameters: Single parameters contain a single value of some type. Table parameters contain data grouped in rows. Each row follows a fixed structure. You can only perform row operations on tables. Group parameters, such as Group get is useful in that you can view the value of all parameters inside a group with one command. Namespace parameters are a collection of tables and other parameters. Namespace is a way to group parameters. You can only browse into a namespace. No Set or Get commands are allowed on namespace parameters.
Modes of Operation
You can run nCLI in either Expert Mode or Interactive Mode. nCLI also supports import/export functions and expert commands grouped in batch files. The key difference between expert mode and interactive mode is whether the control is switched back to command prompt when a command has completed.
Expert Mode
In expert mode, the control is switched back to the command prompt after a command has completed executing. From the command prompt, if you type ncli followed by a parameter, you exit to the command prompt after the command has completed.
62
NVIDIA Corporation
Administrators Guide
Interactive Mode
In interactive mode, the control remains in nCLI until you type quit to exit nCLI. You remain in the nCLI shell during interactive operations. You can enter interactive mode in two ways:
First Method
1 From the command prompt, type ncli and press Enter.
The nCLI command prompt (nCLI>) appears to indicate nCLI is ready to accept a command.
2 You can now type commands in the nCLI mode without having to prefix the
keyword ncli.
Second Method
Enter an incomplete command from the command prompt. For example: ncli set ASFSupport nCLI automatically enters interactive mode. When this command completes, you will exit to the command prompt.
NVIDIA Corporation
63
Chapter 7
Some frequently set parameters, such as ASFSupport enable or ASFSupport disable, are usually set using expert mode. Note: These commands can also be included in script or batch files.
Example
C:\nvidia\NetworkAccessManager\bin>ncli set ASFSupport enable
Example
C:\nvidia\NetworkAccessManager\bin>ncli set ASFSupport NVIDIA ForceWare Network Access Manager Framework Version 01.00 ASFSupport: 1 Disable 2 Enable choose one (Enable: 1
Get
Example
C:\nvidia\NetworkAccessManager\bin>ncli get ASFSupport NVIDIA ForceWare Network Access Manager Framework Version 01.00 ASFSupport enable
64
NVIDIA Corporation
Administrators Guide
Help
Example
C:\nvidia\NetworkAccessManager\bin>ncli help ASFSupport NVIDIA ForceWare Network Access Manager Framework Version 01.00 Enable or disable ASF (Alert Standard Format). ASF is an industry specification that defines alerting capability in both OS-present and OS-absent environments.
Add Row
The following example shows how to add three rows to an empty table (NV_FwlEtherType), edit the table (see Edit Row on page 66), and then delete (see Delete Row on page 67) one row.
Example
C:\nvidia\NetworkAccessManager\bin>ncli addrow NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 EtherType:2048 EtherTypeName:IP
NVIDIA Corporation
65
Chapter 7
EtherTypeRule 1 Deny 2 Allow choose one: 2 C:\nvidia\NetworkAccessManager\bin>ncli addrow NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 EtherType:2054 EtherTypeName:ARP EtherTypeRule 1 Deny 2 Allow choose one: 2 C:\nvidia\NetworkAccessManager\bin>ncli addrow NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 EtherType:32923 EtherTypeName:AppleTalk EtherTypeRule 1 Deny 2 Allow choose one: 1
Edit Row
Example
C:\nvidia\NetworkAccessManager\bin>ncli editrow
NV_FwlEtherType
66
NVIDIA Corporation
Administrators Guide
# 1 2 3
Select a row to edit: 3 EtherType(32923)=2056 EtherTypeName(AppleTalk)=Frame Relay ARP / Inverse ARP EtherTypeRule: 1 Deny 2 Allow choose one(Deny): 2
Delete Row
Example
C:\nvidia\NetworkAccessManager\bin>ncli delrow NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00
# 1 2 3 EtherType 2048 2054 2056 EtherTypeName IP ARP Frame Relay A.. EtherTypeRule Allow Allow Allow
Help
Example
C:\nvidia\NetworkAccessManager\bin>ncli help NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 Firewall rules for different Data Link Layer protocols
NVIDIA Corporation
67
Chapter 7
Firewall rules for different Data Link Layer protocols (identified by Ethernet type) including IP, IPX, NetBEUI, AppleTalk and other protocols.
Set Table
Invoking the nCLI set command on table parameters guides you through different operations that can be performed on a table. In the following example, a row is added to the table, then edited, and finally deleted. Note: The Set table command does not require that you to know the addRow, delRow, and editRow command names.
Examples
C:\nvidia\NetworkAccessManager\bin>ncli set NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 Select an option: AddRow(A), EditRow(E), Purge(P), DeleteRow(D), Quit(Q):A EtherType:32923 EtherTypeName:AppleTalk EtherTypeRule 1 Deny 2 Allow choose one: 1 C:\nvidia\NetworkAccessManager\bin>ncli set NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00 Select an option: AddRow(A), EditRow(E), Purge(P), DeleteRow(D), Quit(Q):E EtherType(32923)=33079 EtherTypeName(AppleTalk)=IPX EtherTypeRule: 1 Deny 2 Allow choose one(Deny): 2 C:\nvidia\NetworkAccessManager\bin>ncli set NV_FwlEtherType
68
NVIDIA Corporation
Administrators Guide
NVIDIA ForceWare Network Access Manager Framework Version 01.00 Select an option: AddRow(A), EditRow(E), Purge(P), DeleteRow(D), Quit(Q):D
# 1 2 3 EtherType 2048 2054 33079 EtherTypeName IP ARP IPX EtherTypeRule Allow Allow Allow
Get Table
Example
C:\nvidia\NetworkAccessManager\bin>ncli get NV_FwlEtherType NVIDIA ForceWare Network Access Manager Framework Version 01.00
# 1 2 Et h er T yp e 20 4 8 20 5 4 E t he r Ty pe N am e IP ARP Et h er T yp eR u le Al l ow Al l ow
Syntax
_______________________________________________________________ ncli addrow <tablename> <column1>=<column1value>,<column2>=<column2value>,.. ncli editrow <tablename>.<key1>=<key1value>,<key2>=<key2value>,.. <column1>=<column1value>,<column2>=<column2value>,.. ncli delrow <tablename>.<key1>=<key1value>,<key2>=<key2value>,.. _______________________________________________________________
NVIDIA Corporation
69
Chapter 7
Examples
In the examples in this section: A new row for IPv6 EtherType is added and initially set to Allow. The table is then edited with the IPv6 EtherType rule set to Deny. Finally, the entire row is deleted. _______________________________________________________________
C:\nvidia\NetworkAccessManager\bin>ncli addrow NV_FwlEtherType EtherType=34525,EtherTypeName=IPv6,EtherTypeRule=Allow C:\nvidia\NetworkAccessManager\bin>ncli editrow NV_FwlEtherType.EtherType=34525 EtherType=34525,EtherTypeName=IPv6,EtherTypeRule=Deny C:\nvidia\NetworkAccessManager\bin>ncli delrow NV_FwlEtherType.EtherType=34525
_______________________________________________________________
Syntax
_______________________________________________________________ purge <tablename>
______________________________________________________________
Note: If the table has read-only access, the purge action will fail.
70
NVIDIA Corporation
Administrators Guide
List
The ls or dir command lists the children of the current parameter, as shown in the next example.
Example
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>ls NS_Eth NS_NvConfig NS_Firewall NS_UserLog NS_Security ncli>ls ns_eth NS_EthStat NS_EthConfig NS_ASF NV_DriverRestartCmd NV_DriverRestartFlag ncli>
NVIDIA Corporation
71
Chapter 7
Changing Directory
The cd command lets you browse through the parameter tree structure.
Example 1
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>ls NS_Eth NS_NvConfig NS_Firewall NS_UserLog NS_Security ncli>cd NS_Eth ncli>ls NS_EthStat NS_EthConfig NS_ASF NV_DriverRestartCmd NV_DriverRestartFlag ncli>cd ns_ethstat ncli>ls NV_NetworkGenStat NV_EthStat ncli> _______________________________________________________________
72
NVIDIA Corporation
Administrators Guide
Example 2
Note: Invoking the cd command by itself will bring you to the root level, as shown in the following example. _______________________________________________________________ C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>cd ns_eth ncli>cd ns_ethstat ncli>cd ncli> _______________________________________________________________ Each ForceWare Network Access Manager parameter has a unique name, which can be used within ncli> to access each individual parameter. Therefore, you do not need the complete path to get to a single parameter. The example below shows how this can help you quickly access a parameter. _______________________________________________________________ C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>cd ASFSupport ncli>pwd <root>/NS_Eth/NS_ASF/NV_ASF/ASFSupport ncli>
NVIDIA Corporation
73
Chapter 7
Example
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>cd ns_ethstat ncli>pwd <root>/NS_Eth/NS_EthStat ncli>cd ncli>pwd <root> ncli> _______________________________________________________________
Context-Sensitive Operations
ls, cd, and pwd commands allow you to browse through the parameters. When you have entered a current parameter, all the operations you invoke will be in the context of that parameter.
Example
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>cd NV_FwlEtherType ncli>get
EtherType 2048 2054 EtherTypeName IP ARP EtherTypeRule Allow Allow
ncli>help
74
NVIDIA Corporation
Administrators Guide
Firewall rules for different Data Link Layer protocols Firewall rules for different Data Link Layer protocols (identified by Ethernet type) including IP, IPX, NetBEUI, AppleTalk and other protocols. ncli>addrow EtherType:2056 EtherTypeName:FrameRelay ARP/Inverse IP EtherTypeRule 1 Deny 2 Allow choose one: 2 ncli>get
# 1 2 3 EtherType 2048 2054 2056 EtherTypeName IP ARP FrameRelay AR.. EtherTypeRule Allow Allow Allow
ncli> _______________________________________________________________
Export
Export files follow a standard format that will make it compatible with Webbased management. That is, export files from nCLI can be imported using the Web-based management and export files from Web-based management can be imported using nCLI.
NVIDIA Corporation
75
Chapter 7
Syntax
_______________________________________________________________ export /f <filename> <parameter_name> _______________________________________________________________ Note: Either one or both of /f <filename> and <parameter_name> may be omitted. If /f <filename> is omitted, the output of the export will be stored in frontend\backup\cliexport.txt under the directory where ForceWare Network Access Manager software is installed. If <parameter_name> is omitted, only the current parameter and its children will be exported. An example is shown below.
Example
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>export ......................................................... .....................Finished ncli>
Import
Before importing new parameter settings, old parameter settings are backed up to prevent any problems during import that could throw the system into an unknown state. If necessary, the backup file can be used to restore the system to the previous state. Note: If nCLI encounters problems in importing parameters, it will stop processing and instruct you to restore to the previous state. Use the restore to restore to the previous state.
Syntax
_______________________________________________________________ import /f <filename> _______________________________________________________________
76
NVIDIA Corporation
Administrators Guide
If /f <filename> is omitted, the default file frontend\backup\ cliexport.txt under the directory where ForceWare Network Access Manager software will be read and imported. Example C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>import Reading text and importing ......................................................... ...............Backing up to clibackup.txt in case of failure ......................................................... ........ Finished Import. ncli>
Selective Export
Selective export allows you to export only the parameter branch specified.
Syntax
_______________________________________________________________ export /f <file name> <parameter_name> _______________________________________________________________
Example
To export only the ns_xxxx namespace, the following command can be used: _______________________________________________________________ ncli export /f c:\xxxx_export.txt ns_xxxx NVIDIA ForceWare Network Access Manager Framework Version 01.00 ..Finished _______________________________________________________________
NVIDIA Corporation
77
Chapter 7
Context Export
nCLI lets you browse into a parameter branch and export it. As a result of the below commands, only the NS_Eth branch is exported.
Example
C:\nvidia\NetworkAccessManager\bin>ncli NVIDIA ForceWare Network Access Manager Framework Version 01.00 ncli>cd ns_eth ncli>export ncli>
Glossary
See Glossary on page 156.
78
NVIDIA Corporation
Administrators Guide
P P E N D I X
Hierarchy
NVIDIA Corporation
79
Appendix A
Comment Hierarchy
Comment Hierarchy
80
NVIDIA Corporation
Administrators Guide
Comment Hierarchy
Comment Hierarchy
NVIDIA Corporation
81
Appendix A
Comment Hierarchy
Comment Hierarchy
82
NVIDIA Corporation
Administrators Guide
Comment Hierarchy
Comment Hierarch y
NVIDIA Corporation
83
Appendix A
Comment Hierarchy
Comment Hierarchy
84
NVIDIA Corporation
Administrators Guide
Comment Hierarchy
Hierarchy
NVIDIA Corporation
85
Appendix A
Comment
Hierarchy
86
NVIDIA Corporation
Administrators Guide
C o m m en t
H iera rch y
VLAN ID
Parameter Description EthVLANID The VLA N ID is an identifier used by a computer to determine its associated VLAN. A value of 0 (zero) means VLAN is disab led. VLAN allows a set of networked computers to function as if they were not connected to the same wire even though they may be physically connected to same segments of a LAN. The M icrosoft VLAN ID overrides the NVIDIA EthVLAN and EthVLANID values. When the Microsoft VLAN ID is 0 (zero), the NVID IA EthVLAN and EthVLANID are used. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_Eth_MSVLAN_Setting Single: EthVLANID nCLI Set "EthVLANID" "0" ReadWrite Number ( 32 bit ) 4095 Minimum value: 0
Comment
Hierarchy
NVIDIA Corporation
87
Appendix A
Comment Hierarchy
88
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
89
Appendix A
90
NVIDIA Corporation
Administrators Guide
Hierarchy
NVIDIA Corporation
91
Appendix A
92
NVIDIA Corporation
Administrators Guide
Interrupt Interval
Parameter Description Hierarchy EthPollingInterval Specifies the time (in milliseconds) between hardware interrupts in the hardware polling mode. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_Eth_Performance Single: EthPollingInterval nCLI Set "EthPollingInterval" "425" ReadWrite Restarting the network is required.. Selection 0, 425
NVIDIA Corporation
93
Appendix A
Hierarchy
94
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
95
Appendix A
Duplex Setting
Parameter Description EthDuplex Specifies the current Ethernet interface duplex setting. Full duplex means that the Ethernet interface on both ends of a link can receive and transmit data simultaneously over the cable. Half duplex means that either the transmit or the receive operation can occur at a given time. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_EthInfo Single: EthDuplex nCLI Get "EthDuplex" Read Selection Half Duplex Full Duplex
Hierarchy
Link Status
Parameter Description Hierarchy EthConnectStatus Displays the current Ethernet link status. When the Ethernet link is disconnected, the remote configuration tool will not function. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_EthInfo Single: EthConnectStatus nCLI Get "EthConnectStatus" Read Selection Connected Disconnected
96
NVIDIA Corporation
Administrators Guide
Promiscuous Mode
Parameter Description Hierarchy EthPromiscuous When this parameter is enabled, all packets (including frames addressed for other stations) that arrive at this Ethernet interface are received. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_EthInfo Single: EthPromiscuous nCLI Get "EthPromiscuous" Read Selection Disable Enable
NVIDIA Corporation
97
Appendix A
Hierarchy
98
NVIDIA Corporation
Administrators Guide
IP Address
Parameter Description Comment Hierarchy IPAddress Specifies the IP address of the current Ethernet interface. If an interface has multiple IP addresses and masks, only the first set returned by the operating system is shown. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_InterfaceInfo Single: IPAddress nCLI Get "IPAddress" Read String 64
IP Address Mask
Parameter Description Comment Hierarchy IPAddressMask Specifies the IP address mask of the current Ethernet interface. If an interface has multiple IP addresses and masks, only the first set returned by the operating system is shown. Namespace: NS_Eth Namespace: NS_EthConfig Group: NV_InterfaceInfo Single: IPAddressMask nCLI Get "IPAddressMask" Read String 64
NVIDIA Corporation
99
Appendix A
Hierarchy
Table: NV_Eth_MulticastAddress
Usage example: nCLI Get "NV_Eth_MulticastAddress" Access Single parameter Read EthMulticast (See the next tabe for details on the EthMulticast parameter.)
100
NVIDIA Corporation
Administrators Guide
Table: NV_Eth_MulticastAddress Single: EthMulticast Access Table key Data type Read This parameter is a key to the table MAC Address
Group: NV_EthStat Single: EthReceiveErrorAlign Usage example: nCLI Get "EthReceiveErrorAlign" Access Data type
NVIDIA Corporation
101
Appendix A
102
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
103
Appendix A
Hierarchy
Hierarchy
104
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
105
Appendix A
Late Collisions
Parameter Description Hierarchy EthTransmitLateCollisions The number of collisions detected after the normal detection period. Namespace: NS_Eth Namespace: NS_EthStat\ Group: NV_EthStat Single: EthTransmitLateCollisions nCLI Get "EthTransmitLateCollisions" Read Number ( 64 bit )
106
NVIDIA Corporation
Administrators Guide
Transmit Failures
Parameter Description Hierarchy TransmitError Specifies the number of frames that failed to transmit. Namespace: NS_Eth Namespace: NS_EthStat Group: NV_NetworkGenStat Single: TransmitError nCLI Get "TransmitError" Read Number ( 64 bit )
Receive Failures
Parameter Description Hierarchy ReceiveError Specifies the number of frames that are received but not passed to the operating system because of errors. Namespace: NS_Eth Namespace: NS_EthStat Group: NV_NetworkGenStat Single: ReceiveError nCLI Get "ReceiveError" Read Number ( 64 bit )
NVIDIA Corporation
107
Appendix A
No Receive Buffers
Parameter Description Hierarchy ReceiveNoBuffer The number of frames that are dropped because of lack of space for receive buffers. Namespace: NS_Eth Namespace: NS_EthStat Group: NV_NetworkGenStat Single: ReceiveNoBuffer nCLI Get "ReceiveNoBuffer" Read Number ( 64 bit )
108
NVIDIA Corporation
Administrators Guide
Hierarchy
NVIDIA Corporation
109
Appendix A
Comment Hierarchy
110
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
111
Appendix A
112
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
113
Appendix A
114
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
115
Appendix A
116
NVIDIA Corporation
Administrators Guide
P P E N D I X
H ierarchy
NVIDIA Corporation
117
Appendix B
not allowed. Inbound traffic is allowed only if it is in response to an outbound packet that was seen previously on a valid connection.
station cannot be pinged and is not allowed to generate any ICMP error messages, except where necessary for normal operation.
Allows VPNs, including those based on IPsec (requiring AH, ESP, L2TP,
IKE, UDP port 500), as well as those that rely on point-to-point punneling protocol (PPTP), which uses generic routing encapsulation (GRE). which might otherwise be misused, as well as by preventing the spoofing of IP source addresses for both IPv4 and IPv6.
Medium (the default profile setting after installation) is intended to provide a good balance between usability and security, with an emphasis on security. This setting has the following features and functionality:
It is the factory default profile setting when the NVIDIA Firewall is
enabled.
It does not have the stealth features associated with the High profile
setting and therefore allows most (but not all) ICMP error messages to be sent and received. order to allow file transfers through MSN Messenger and Yahoo! Messenger, incoming connections to port 80 must be allowed.
Note: MSN Messenger and Yahoo! Messenger will not work with the High setting.
118
NVIDIA Corporation
Administrators Guide
which might otherwise be misused, as well as by preventing the spoofing of IP source addresses for both IPv4 and IPv6.
Low is the least secure of the profile settings, but allows most applications to work properly. This setting allows safe incoming connections, denies those that are known to be dangerous, and defaults to allow TCP or UDP connections for which a rule has not been specified. Additional features and functionality of this setting include the following:
Allows mostly all ICMP traffic, except for sending router-oriented (e.g.,
Default in: Allow Default out: Allow For example, the Low setting supports the NetMeeting application in either direction.
Allows VPNs based on both IPsec and PPTP. Restricts network traffic by preventing the use of IP and/or TCP options,
which might otherwise be misused, as well as by preventing the spoofing of IP source addresses for both IPv4 and IPv6.
The Anti-hacking only profile setting enables only the anti-hacking features of the NVIDIA Firewall and is useful in a dual firewall configuration for example, if you want to use a third-party firewall product along with the antihacking features of the NVIDIA Firewall.
Note: The Anti-hacking only setting disables the NVIDIA Firewall, allowing most incoming and outgoing network traffic.
Off turns off the NVIDIA Firewall, allowing all incoming and outgoing network traffic.
NVIDIA Corporation
119
Appendix B
Hierarchy
Hierarchy
120
NVIDIA Corporation
Administrators Guide
Hierarchy
Hierarchy
NVIDIA Corporation
121
Appendix B
Hierarchy
122
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
123
Appendix B
124
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
125
Appendix B
126
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
127
Appendix B
128
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
129
Appendix B
130
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
131
Appendix B
132
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
133
Appendix B
134
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
135
Appendix B
136
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
137
Appendix B
Ether Type
Param eter D escription E therT ype The EtherType identifies the type of Ethernet payload. Some exam ples and their hexadecimal values include IP v4 (0x0800), AppleTalk (0x809B ), IPX (0x8137) and N etB EU I (0x8191). N amespace: N S_Firewall T able: N V _FwlEtherType Single: EtherType R eadW rite This parameter is a key to the table N umber ( 32 bit ) 65535 1501
H ierarchy
EtherType Name
Parameter Description Hierarchy EtherTypeN ame Name associated with the EtherType. Namespace: NS_Firewall Table: NV _FwlEtherType Single: EtherTypeName ReadW rite String 60
EtherType Action
Parameter D escription H ierarchy EtherTypeAction Specifies action for the EtherType. N am espace: N S_Firew all Table: N V _FwlEtherType Single: EtherTypeAction ReadW rite Selection D eny Allow
138
NVIDIA Corporation
Administrators Guide
Remote IP Address
Parameter Description Tree IPRemoteIP IP address of the remote machine or subnet. Namespace: NS_Firewall Table: NV_FwlIP Single: IPRemoteIP ReadWrite This parameter is a key to the table IP Address
NVIDIA Corporation
139
Appendix B
IP Action
Parameter Description Hierarchy IPAction Specifies the action for network traffic. Namespace: NS_Firewall Table: NV_FwlIP Single: IPAction ReadWrite Selection Deny Allow
140
NVIDIA Corporation
Administrators Guide
Comment
Domain Name
Parameter Description Hierarchy DomainName Domain name of the computer or Web site Namespace: NS_Firewall Table: NV_FwlDomain Single: DomainName ReadWrite This parameter is a key to the table String 127
NVIDIA Corporation
141
Appendix B
Domain Action
Parameter Description Hierarchy DomainAction Specifies action for network traffic. Namespace: NS_Firewall Table: NV_FwlDomain Single: DomainAction ReadWrite Selection Deny Allow
142
NVIDIA Corporation
Administrators Guide
IP Option Number
Parameter Description IPOptionNumber IP option number. IPv4 options are added to the basic IPv4 header to provide additional features beyond those that are supported by the standard IPv4 packet's header. The standard 20-byte IPv4 header can be expanded to have up to 40 bytes of options. IPv6 options have no fixed size, but are otherwise similar to IPv4 options and provide for many of the same features. Namespace: NS_Firewall Table: NV_FwlIPOption Single: IPOptionNumber ReadWrite This parameter is a key to the table Number ( 32 bit ) 255 Minimum Value: 0
Hierarchy
IP Option Name
Parameter Description Hierarchy IPOptionName Specifies name associated with the IP option number. Namespace: NS_Firewall Table: NV_FwlIPOption Single: IPOptionName ReadWrite String 60
NVIDIA Corporation
143
Appendix B
IP Version
Param eter Description Hierarch y IPOptionVersion Specifies whether ru le is for IPv4 or IP v6. Nam espace: NS_F irewall Table: NV_FwlIPOption Single: IPOptionVersion ReadW rite Th is param eter is a key to the table Selection IPv4 IPv6
IP Inbound Action
Parameter Description Hierarchy IPOptionActionIn Specifies action for inbound network traffic. Namespace: NS_Firewall Table: NV_FwlIPOption Single: IPOptionActionIn ReadW rite Selection Allow Deny
IP Outbound Action
Parameter Description Hierarchy IPOptionActionOut Specifies action for outbound network traffic. Namespace: NS_Firewall Table: NV_FwlIPOption Single: IPOptionActionOut ReadWrite Selection Allow Deny
144
NVIDIA Corporation
Administrators Guide
IP Protocol
Parameter Description Hierarchy IPProtocol Specifies the IP protocol number. IP protocol identifies the type of IP payload. Common protocols and their decimal values include ICMP (1), TCP (6), and UDP (17). Namespace: NS_Firewall Table: NV_FwlIPProtocol Single: IPProtocol ReadWrite This parameter is a key to the table Number ( 32 bit ) 255 0
NVIDIA Corporation
145
Appendix B
IP Protocol Name
Parameter Description Hierarchy IPProtocolName Specifies a name for an IP protocol. Namespace: NS_Firewall Table: NV_FwlIPProtocol Single: IPProtocolName ReadWrite String 60
IP Protocol Action
Parameter Description Hierarchy IPProtocolAction Specifies the action for network traffic. Namespace: NS_Firewall Table: NV_FwlIPProtocol Single: IPProtocolAction ReadWrite Selection Deny Allow
146
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
147
Appendix B
Remote IP Address
Parameter Description Hierarchy PortRemoteIP IP address of the remote machine or subnet. Namespace: NS_Firewall Table: NV_FwlPort Single: PortRemoteIP ReadWrite This parameter is a key to the table IP Address
148
NVIDIA Corporation
Administrators Guide
Port Name
Parameter Description Hierarchy PortName Specifies thename associated with the TCP or UDP port range. Namespace: NS_Firewall Table: NV_FwlPort Single: PortName ReadWrite String 100
NVIDIA Corporation
149
Appendix B
Port Protocol
Parameter Description Hierarchy PortProtocol Specifies whether the port protocol is UDP, TCP, or both. Namespace: NS_Firewall Table: NV_FwlPort Single: PortProtocol ReadWrite This parameter is a key to the table Selection UDP TCP
150
NVIDIA Corporation
Administrators Guide
Hierarchy
A cc e s s D a ta ty p e M a x im u m L e ng th
NVIDIA Corporation
151
Appendix B
Remote IP Address
Parameter Description Hierarchy ICMPRemoteIP Specifies the IP address of the remote machine or subnet. Namespace: NS_Firewall Table: NV_FwlICMP Single: ICMPRemoteIP ReadWrite This parameter is a key to the table IP Address
152
NVIDIA Corporation
Administrators Guide
ICMP Type
P aram eter Des cription Hie rarch y ICM P Type Specifies the ICM P type Nam es pace: NS_Firewa ll Table: NV_FwlICM P Single: IC M P Type R eadW rite Th is param eter is a key to the table Number (32 bit) 255 M inim um Value: 0
ICMP Code
P aram eter Des cription Hierarch y ICM P Code Specifies the IC M P code. Nam es pace: NS_Firewall Table: NV_FwlIC M P Single: IC M PC ode R eadW rite Th is param eter is a key to the table Number ( 32 bit ) 255 M inim um Value: 0
NVIDIA Corporation
153
Appendix B
ICMP Name
Parameter Des cription Hierarch y ICM PName Specifies a nam e for the ICMP type/code pair. Namespace: NS_Firewall Table: NV_FwlICMP Single: ICMPNam e ReadW rite String 120
ICMP Version
Parameter Description Hierarchy ICMPVersion Specifies whether the rule is for ICMPv4 or ICMPv6. Namespace: NS_Firewall Table: NV_FwlICMP Single: ICMPVersion ReadWrite Th is parameter is a key to the table Selection ICMPv4 ICMPv6
154
NVIDIA Corporation
Administrators Guide
NVIDIA Corporation
155
Appendix C
Glossary
P P E N D I X
GLOSSARY
distinguished name. In reference to the ForceWare Network Access Manager application, a distinguished name is the name that uniquely identifies a parameter. Each parameter has a distinguished name. group parameter. In reference to the ForceWare Network Access Manager application, a group parameter is a collection of single parameters that belong to a functionality set. ICMP (Internet Control Message Protocol) is a message control and
error-reporting protocol between a host server and a gateway to the Internet. ICMP uses IP datagrams, but the messages are processed by the IP software and are not necessarily directly apparent to the application user.
IP (Internet Protocol) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains the sender's Internet address and the receiver's Internet address.
When the sender needs to send a packet to a receiver on a different subnetwork, the packet is sent first to a to the sender's default gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified.
156
NVIDIA Corporation
Administrators Guide
Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order in which they were sent. The Internet Protocol just delivers them. For applications requiring in-order delivery, it's up to a higher-layer protocol to ensure proper sequencing across a packet stream. IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data.In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer. The most widely used version of IP today is IPv4. However, IPv6 is also beginning to be supported. IPv6 provides for much longer addresses and therefore for the possibility of many more Internet users. IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets often can also support IPv4 packets. namespace parameter. In reference to the ForceWare Network Access Manager application, a namespace parameter is the largest container of parameters. A namespace parameter contains multiple group parameters and/ or table parameters. nCLI (NVIDIA command line interface). In ForceWare Network Access Manager, nCLI is a command line interface that can be used to configure and monitor NVIDIA networking components. nCLI can run in either export or interactive mode. SSL (Secure Sockets Layer) is the industry-standard method for protecting Web communications. Built upon public key encryption technology, SSL provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection. When you come across a Web page that is secured, the browser will usually display a closed lock or other symbol to inform you that SSL has been enabled. At this point, the Web site address will also start with <https:// > instead of the normal <http://>.
Note: NVIDIA ForceWare Network Access Manager uses SSL when the Web-based interface is remotely accessed.
single parameter. In ForceWare Network Access Manager, a single parameter is the smallest parameter unit. It contains a name and value pair. table parameter. In ForceWare Network Access Manager, a table parameter is a collection of group parameters (rows) that share the same fields (columns). Table parameters are frequently used as place holders for NVIDIA Firewall rules, filters, and statistics. Each row inside the table is
NVIDIA Corporation
157
Appendix C
Glossary
uniquely identified by a key. A key is composed of one or more of fields of a row. TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the IP to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called segments) that a message is divided into for efficient routing through the Internet. TCP is known as a connection-oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP is responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets back into the complete message at the other end. In the OSI communication model, TCP is in layer 4, the Transport Layer. UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the IP. UDP is an alternative to the TCP and, together with the IP, is sometimes referred to as UDP/IP. Like the TCP, the UDP uses the IP to actually get a data unit (called a datagram) from one computer to another. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagrams) and reassembling it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the data arrives in. This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. To save processing time, network applications that have very small data units to exchange (and therefore very little message reassembling to do) may choose UDP instead of TCP. The Trivial File Transfer Protocol (TFTP) uses UDP instead of TCP. UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests, and, optionally, a checksum capability to verify that the data arrived intact In the Open Systems Interconnection (OSI) communication model, UDP, like TCP, is in layer 4, the Transport Layer.
158
NVIDIA Corporation