Installation & Debugging

Chapter 11 — Pre-installation requirements, installation procedures, construction standards, and debugging methods


A successful boundary security deployment begins long before the first device is mounted in the rack. Pre-installation verification, systematic installation procedures, and structured debugging methods are the foundation of a reliable, maintainable, and secure boundary security system. This chapter provides the complete operational reference for installation and commissioning teams.

11.1 Pre-Installation Requirements

All pre-installation requirements must be verified and documented before any boundary security device is installed. Failure to complete pre-installation verification is the most common cause of installation delays, rework, and post-deployment reliability issues. The following checklist must be signed off by both the installation team and the site owner before work begins.

# Pre-Check Item Verification Method Owner Status
1Rack space and weight capacity verified for all devicesRack elevation diagram + floor load calculationFacilities☐ Required
2Dual power feeds available (A-feed and B-feed) at rackPDU feed verification at breaker panelFacilities☐ Required
3UPS runtime meets target for full boundary device loadUPS load calculation + runtime testFacilities☐ Required
4Cooling and airflow verified; blanking panels availableThermal mapping; blanking panel inventoryFacilities☐ Required
5Grounding and surge protection validatedGround resistance test; SPD inspectionFacilities☐ Required
6OOB management network ready and isolated from productionNetwork diagram review; VLAN verificationNetwork Team☐ Required
7IP plan and zone/VRF plan approved and documentedIP plan review and sign-offNetwork Architect☐ Required
8Routing design validated for symmetry (no asymmetric paths)Route design review; path trace verificationNetwork Architect☐ Required
9Certificates/PKI process ready; admin MFA enforcedPKI enrollment test; MFA verificationSecurity Team☐ Required
10SIEM endpoints reachable; EPS and storage capacity confirmedConnectivity test; SIEM capacity reviewSecurity Team☐ Required
11Change window approved; rollback plan written and reviewedChange management approval; rollback plan reviewChange Manager☐ Required
12Firmware baseline and signature updates staged offlineFirmware version verification; offline stagingInstallation Team☐ Required
13Spare optics, cables, and SFP modules available on-siteSpare parts inventory checkInstallation Team☐ Required
14Physical security controls active (locks, CCTV, access control)Access control test; CCTV coverage verificationFacilities☐ Required

11.2 Installation Requirements

The four installation phases below must be completed in sequence. Each phase has specific requirements and acceptance criteria that must be verified before proceeding to the next phase. The accompanying photographs illustrate the correct execution of each phase.

Phase 1: Device Racking and Power Connection

Firewall Appliance Rack-Mount Installation

Figure 11.1: Rack-Mount Installation — Technician using torque screwdriver to mount enterprise firewall appliance with ESD protection, dual PSU cables connected to A-feed (red) and B-feed (blue) PDUs, airflow direction label applied, asset tag attached

Phase 2: Cabling and Labeling

Network Cabling and Labeling Installation

Figure 11.2: Cabling and Labeling — Engineer dressing patch cords with Velcro straps, heat-shrink labels at both cable ends, color-coded zones (blue=production, red=management, green=DMZ, yellow=HA), port map documentation in hand

Phase 3: OOB Management Setup

Out-of-Band Management Network Setup

Figure 11.3: OOB Management Setup — Dedicated OOB management switch, console server with labeled console cables, jump host (bastion), production and management cables physically separated with different colors and routing paths

Phase 4: HA Link Verification

Firewall HA Link Verification

Figure 11.4: HA Link Verification — Two enterprise firewalls (FIREWALL-A and FIREWALL-B) with dedicated HA-LINK-1 and HA-LINK-2 cables on dedicated HA ports, solid green link LEDs, console showing HA STATUS: ACTIVE-STANDBY, STATE SYNC: COMPLETE

Common Installation Errors and Consequences

# Common Error Consequence Prevention
1Single power feed (both PSUs on same PDU or breaker)Complete device outage on single breaker tripVerify A/B feed separation with PDU labeling and breaker mapping
2HA link on production VLAN or shared with data interfaceData congestion causes HA instability; false failoversUse dedicated HA ports; verify with VLAN isolation test
3Inside interface connected to only one core switchSingle link failure causes complete zone outageRequire LACP/MLAG to two separate core switches
4Missing route filtering on BGP peeringRoute leak exposes internal prefixes to internetApply prefix-lists and max-prefix limits; verify with route audit
5WAF bypass path exists (direct origin access)Direct exploitation of origin servers bypassing WAFVerify no direct path to origin; test from external perspective
6Logs sent over plaintext (no TLS on syslog)Log tampering risk; compliance violationEnforce syslog over TLS; verify certificate validation
7No NTP configured or NTP not authenticatedClock drift causes log correlation failuresConfigure authenticated NTP; verify drift within threshold
8SPAN port oversubscription (too many sources)Packet loss in NDR detection feed; blind spotsCalculate SPAN capacity; use TAP for critical vantage points

11.3 Construction Standards

11.4 Debugging Methods

The structured debugging workflow below ensures systematic isolation of issues, minimizes the risk of making problems worse, and produces documented evidence for post-incident review. All debugging actions must be logged with timestamps and the name of the engineer performing them.

Debugging Workflow:
1. Define symptom precisely (what fails, when, from where, to where)
2. Isolate scope (which zone, interface, application, or time window)
3. Verify routing symmetry (confirm traffic takes the same path in both directions)
4. Check policy hits (confirm traffic matches expected rule; look for shadow rules)
5. Validate TLS/WAF behavior (check for certificate errors, WAF false positives)
6. Confirm log pipeline (verify events are reaching SIEM; check for gaps)
7. Apply fix (document the change; use change management process)
8. Regression test (verify fix resolves symptom without breaking other functions)
9. Document findings and update runbook
Problem Category Typical Symptoms Primary Debug Tools Common Root Causes
Routing / Asymmetry Random drops; intermittent failures; TCP resets Traceroute; flow analysis; route table inspection ECMP imbalance; PBR misconfiguration; missing return routes
Policy Mismatch Traffic blocked unexpectedly; wrong rule matching Policy trace; hit count analysis; packet capture Rule ordering; shadow rules; missing NAT; zone mismatch
TLS / Certificate Errors Browser SSL errors; application failures after TLS inspection Certificate chain inspection; TLS handshake capture Expired intermediate CA; missing root trust; cipher mismatch
WAF False Positives/Negatives Legitimate traffic blocked; attacks not detected WAF log analysis; rule tuning; signature review Overly aggressive rules; missing custom signatures; bypass paths
Log Ingestion Failures Missing log sources in SIEM; EPS drops Syslog connectivity test; SIEM source health dashboard TLS certificate expiry; collector storage full; EPS cap reached
HA Instability Frequent failovers; split-brain; inconsistent session state HA event log; heartbeat packet capture; firmware version check Shared HA/data links; heartbeat threshold too low; firmware mismatch

Rollback Procedure