FAQ(ECL2.0)
ECL2.0 - FAQ
- All(935)
- Billing(24)
-
Let me know the order in which the filter rules are executed on Firewall (Brocade 5600 vRouter).ECL2.0, Firewall (Brocade 5600 vRouter)
When you set multiple filter rules on Firewall (Brocade 5600 vRouter), the rules are executed in numeric sequence, according to the rule number, from lowest to highest.
Reference: Brocade 5600 vRouter Userguide
Brocade 5600 vRouter Firewall Configuration Guide - Firewall rules(Excerpt)
Rules are executed in numeric sequence, according to the rule number, from lowest to highest. If the traffic matches the characteristics specified by a rule, the action of the rule is executed; if not, the system “falls through” to the next rule. -
What should I do when I found the operation that cannot be performed by user-admin account in Brocade 5600 vRouter?ECL2.0, Firewall (Brocade 5600 vRouter)
Please ask us via Ticket System.
-
How to build a configuration of Firewall (Brocade 5600 vRouter) that uses only one global IP?ECL2.0, Firewall (Brocade 5600 vRouter)
Since the Internet gateway is redundant with VRRP, you need to assign three IP addresses.
If you use only one global IP, the following settings are required.
1. Build the logical network with private IP address
2. Connect the Internet gateway to the logical network created in 1
3. Connect the firewall or VM to the logical network created in 1, and configure NAT so that the connection to /32 global IP can be translated.
4. Set up the Internet gateway; a static route with /32 global IP as the destination, the firewall or VM created in 3 and VM as the next hopService Descriptions - Internet Connectivity - Description of Functions
* More specific setting methods are outside our support range.
-
What is the difference among Super User, Normal User and Contract Owner.Account, Common, ECL2.0
Super User
This user can execute each operation, such as create/delete tenant, access control, manage user.Normal User
Within the portal, this user can refer to information about themselves or operate only tenants with access rights. Newly created users are created as Normal users first. By using the user type change function, you can change Normal User to Super User.Contract Owner (one of the Super Users)
This user is a special user who always exists in the contract created at contract creation. It will always be a Super User. Contract management (reference and cancellation of contract information) is available only to the Contract user.Service Descriptions - Management Function - User Management
Tutorial - Use NTT Com Business Portal (Business Portal) - How to manage user - About User Type
-
An error occurs when I try to order Amazon Web Services Inter-Connectivity. Service Unavailable: Not in Ins TimeAmazon Web Services Inter-Connectivity, ECL2.0
You might try to order out of the reception hours of this menu. Please try it again within the reception hours.
Service Descriptions - Amazon Web Services Inter-Connectivity - Important Things to Note when Ordering
The reception hours for this Service Menu is 9: 30 - 17: 30 Japan Time on Weekdays. -
I cannot upgrade Arcserve License from V6 to V6.5 or over on Arcserve menu.Arcserve, ECL2.0
When any underscore "_" is included in domain name or server name of the server using V6, you cannot upgrade it to V6.5 or over. As a solution, you can select either of below options.
1. Change domain name or server name.
2. Use Arcserve UDP V6.5.Please refer to below page for the details.
https://arcserve.zendesk.com/hc/ja/articles/115003189646 (Japanese only) -
Is the redundant method available that uses the same IP address with different MAC addresses including the Windows Server Failover Cluster?ECL2.0, OS, Virtual Server
We have confirmed that Windows Server Failover Cluster works under our verification environment.
As of July 2019, we have confirmed the operation with the next version.
- Windows Server 2012 R2
- Windows Server 2016* Since the DAD function is disabled in the official image template of the virtual server, please follow the procedure below when using a failover cluster with a virtual server.
1. Input "regedt32" in search box on Start menu and enter.
2. Click "HKEYLOCAL MACHINE" in Registry Editor.
3. Click "System" -> "CurrentControlSet" -> "Services" -> "TcpIp" -> "Parameters".
4. Right-click "Parameters" and click "New" -> "DWORD(32-bit)Value".
5. Delete "New Value #1", right-click "ArpRetryCount" and click "Delete".
6. Reboot the virtual server. -
When I register a Service on Load Balancer(NetScaler VPX), an error occurs. "Not authorized to execute this command"ECL2.0, Load Balancer
Please make sure that you have entered the appropriate values for each parameter that you are required to enter in registration. In particular, please make sure that "10" is specified for "Traffic Domain" after pressing "More".
Reference: Tutorials - Load Balancer - Function to Register/Edit/Delete a Service
-
An error "Create-port-failed" occurred when creating a block storage volume.Block storage (IO performance ensure), ECL2.0
Volume creation may have failed due to the narrow range of the IP address pool set for virtual storage. Please extend the IP address pool range, create virtual storage again, and try creating a volume.
Reference: Tutorials - Block Storage - How to Create a Block Storage (Provisioned I/O Performance)
-
Please tell me the difference between Antivirus function by Managed UTM Firewall Policy and Antivirus scan function by Managed WAF File Upload Restriction Policy.ECL2.0, Network-based Security
Managed UTM Antivirus function inspects communication on a signature basis and detects/protects communication judged to be a virus, and Managed WAF File Upload Restriction Policy restricts the file upload to the customer's Web Server. It becomes a function to set up. Antivirus function is an additional function and it is the virus scan function for attachments.
Main differences are as follows.
The corresponding protocol is different.
- Managed UTM: HTTP, FTP, SMTP, POP3, IMAP, MAPI, NNTP
- Managed WAF: HTTP, HTTPSThe action against the file size over a threshold is different.
- Managed UTM doesn't detect it and allows it to pass.
- Managed WAF can detect/block it.Please refer to the following URL for other differences.
Service Decriptions - Managed UTM - Available Functions - Security
Service Decriptions - Managed WAF - Available Functions - Security