ZyWALL OTPv2 Support Notes



Similar documents
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Cloud Authentication. Getting Started Guide. Version

SafeNet Authentication Manager Express. Administration Guide All versions

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

SafeWord Domain Login Agent Step-by-Step Guide

Cloud Services ADM. Agent Deployment Guide

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Active Directory Management. Agent Deployment Guide

SafeNet Authentication Manager Express. Upgrade Instructions All versions

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

Configuring Global Protect SSL VPN with a user-defined port

Defender EAP Agent Installation and Configuration Guide

RSA SecurID Ready Implementation Guide

DIGIPASS Authentication for GajShield GS Series

Active Directory Management. Agent Deployment Guide

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

RSA Authentication Manager 7.1 Basic Exercises

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

SafeWord 2008 Customer Release Notes

Table of Contents. FleetSoft Installation Guide

Pearl Echo Installation Checklist

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

NSi Mobile Installation Guide. Version 6.2

DIGIPASS Authentication for SonicWALL SSL-VPN

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Juniper SSL VPN Authentication QUICKStart Guide

RSA SecurID Ready Implementation Guide

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

ITA Mail Archive Setup Guide

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

WhatsUp Gold v16.1 Installation and Configuration Guide

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. October

IMPORTANT: The person who installs and sets up the PCS Axis database on the central database server

Installation and Connection Guide to the simulation environment GLOBAL VISION

External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista

Vantage Report. Quick Start Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Cisco QuickVPN Installation Tips for Windows Operating Systems

PLEASE NOTE: The client data used in these manuals is purely fictional.

QUANTIFY INSTALLATION GUIDE

HOTPin Integration Guide: DirectAccess

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Install FileZilla Client. Connecting to an FTP server

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

How To Install Sedar On A Workstation

Magaya Software Installation Guide

Lab a Configure Remote Access Using Cisco Easy VPN

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

BlackShield ID Best Practice

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Synchronizer Installation

Uptime Infrastructure Monitor. Installation Guide

Accessing the Media General SSL VPN

Strong Authentication for Juniper Networks SSL VPN

WhatsUp Gold v16.2 Installation and Configuration Guide

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Installation Notes for Outpost Network Security (ONS) version 3.2

HP Client Automation Standard Fast Track guide

Cisco ASA Authentication QUICKStart Guide

Proval LS Database & Client Software (Trial or Full) Installation Guide

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

efolder BDR for Veeam Cloud Connection Guide

Connecting an Android to a FortiGate with SSL VPN

EMR Link Server Interface Installation

WhatsUp Gold v16.3 Installation and Configuration Guide

BorderGuard Client. Version 4.4. November 2013

DOE VPN Client Installation and Setup Guide March 2011

4cast Client Specification and Installation

0651 Installing PointCentral 8.0 For the First Time

How To Industrial Networking

Two-Factor Authentication

Allworx Installation Course

Integration Guide. Swivel Secure Authentication

Configuring a Softphone for Windows for Virtual Contact Center

About This Manual. 2 About This Manual

In order to upload a VM you need to have a VM image in one of the following formats:

How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950

Shellfire L2TP-IPSec Setup Windows XP

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

NETWRIX EVENT LOG MANAGER

Transcription:

ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO

Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3. OTP Authentication to an OTP-protected Network via SSL VPN over ZyWALL USG... 11 3.1 ZyWALL USG Configurations... 12 3.2 SafeWord Server Configurations... 15 3.3 Verify OTP via Login from the Remote PC... 19 4. OTP Authentication to an OTP-protected Network via IPSec VPN Client over the ZyWALL USG... 20 4.1 ZyWALL USG Configurations... 21 4.2 SafeWord Server Configurations... 24 4.3 ZyWALL IPSec VPN Client Configurations... 28 4.4 Verify OTP via Login from the VPN Client... 30 2

1. Introduction One-Time Password (OTP) Authentication One-Time Password (OTP) is another optimum security technology that enables a server to authenticate you based on a password that is unique every time you try to access a protected network. Two-Factor Authentication Two-factor authentication is an optimum security methodology, because it requires something you have (your ZyWALL OTP Token) and something you know (your secure password or PIN). A two-factor system is far more secure than using just a password, since many skilled hackers can quite easily access password-only protected computers and networks. The illustration shows the concept of Two-Factor authentication. User PIN and Token code User PIN is what you know and Token code is what you have. 3

ZyWALL OTP Products Components ZyWALL OTP, which includes the ZyWALL OTP Token and SafeWord 2008, provides secure verification of identity to remote Virtual Private Network (VPN) and Local Area Network (LAN) users. SafeWord product installation always includes: - SafeWord Core Server - Management console (AD or SafeWord Management Console) - Agents or SafeWord RADIUS Server SafeWord Core Server The SafeWord Core Server consists of 3 main components: - Database server (MySQL) installed by default. The SafeWord database serves as the repository for token records independent of the management mode. It stores the Token s serial numbers and Token (seed) used to generating OTP. The database server listens on port 5010 by default and only the Administration service and Authentication engines can query it directly. - Administration server runs administration services and performs tasks initiated by administrators or users. Updates the SafeWord database and synchronizes SafeWord database data in configurations with MMC console and User Center. Also performs replication of changes between peers. It is listening on port 5040 by default. - Authentication server (AAA) runs the authentication engine that verifies that the passcode supplied with an access request is correct for the token assigned to a specific user. It is listening on port 5031 by default. 4

Management Console (AD) The Management console integrated with Microsoft AD is the interface used to directly update the database via the SafeWord Administration Service. You can use this to import Tokens (add tokens serial numbers to SafeWord database) or backup and restore Token data. It also lets you view and manage all imported Tokens. 5

Agents or SafeWord RADIUS Server The OTP RADIUS authentication server is a standard Microsoft RADIUS component based on Internet Authentication Service (IAS). The agent contains a configuration file specifying where the SafeWord server holds the user repository and the Authentication service. An agent can be installed only if it s supporting (base) software components exist. Otherwise the agent will not appear for selection in the installation components window. For example, RADIUS server agent can be installed only when there is IAS installed. 6

2. Server Installation 2.1 Pre-requisites Before starting to install the SafeWord server, user needs to verify: - Hardware requirements of the system CPU Pentium IV or AMD @ 1.8 GHz (min), 2 GHz (recommended) RAM 1 GB (min), 4 GB (recommended) Disk space 3 to 5 GB (min) - Software requirements of the system Server OS 32 or 64 bit Windows Server 2003 or 2008 Desktop OS 32 or 64 bit Windows XP (SP2) or Vista Have a working Active Directory environment if you are installing SafeWord 2008 ESP for managing users. Have IAS Agent installed for RADIUS authentication 2.2 Installations walk through We will briefly walk through the system installation process. For the up to date user manuals, users can check SafeNet s website. The link is: http://www.aladdin.com/safeword/docs/2008.aspx Step1. Install SafeWord 2008 server Below is a flow chart-type snapshot of the installation process, with no Agents selected for installation. Users can check more detail information in chapter 2 Installing and Activating SafeWord 2008 of SafeWord 2008 Administration Guide on the SafeNet website. 7

8

Step2. Activate SafeWord 2008 server By default, SafeWord 2008 comes with a 30-day evaluation license. If you want to continue using it, activation is required. There are two methods of activating SafeWord 2008: using ADUC, or directly from Aladdin s Website if not using ADUC. In either case, you must sign in and register on the Aladdin portal at https://portal.aladdin.com, before you can complete and submit an activation form. After activating, your information will be verified, and the activation key and token records will be ownloaded automatically for ADUC, and manually if you are not using ADUC. After logging into the SafeNet portal, users can click the SafeWord Activation link to perform on-line activation. Please refer to the following manual: http://www.aladdin.com/pdf/safeword/safeword-products-activation.pdf 9

For off-line activation, two files are provided to the customer upon purchase of tokens: - Server license - a software activation file (key.html) that includes an activation key. This key should be entered in place of the software serial ID. - An import file containing the serial numbers of the tokens bought by the customer (Import*.dat). Step1. Software activation - The activation file (key.html) is copied to the specific activation folder (default is C:\Program Files\Secure Computing\SafeWord\SERVERS\AdminServer\activation) and then the administration server is restarted. Step2. Once activated, the activation file name is automatically changed to key.activated.html, and the support expiration date will display a value of the valid expiration date. Step3. From AD Users & Computers console, use the import option under the SafeWord tree item for importing the tokens data. Step3. Assign authenticators to domain users Before you can assign and use hardware tokens, the token data records downloaded during activation must be imported by AUDC. After the process is done, there are two ways to assign SafeWord tokens to Active Directory users. You may use the Token Assignment Wizard, or you can manually enter the token serial number in the serial number field. Users can check more detailed information on chapter 3 Active Directory Management of SafeWord 2008 Administration Guide on the SafeNet website. 10

3. OTP Authentication to an OTP-protected Network via SSL VPN over ZyWALL USG In the following example, we will employ Two Factor Authentication (ZyXEL OTP pack) to enhance password security by using SSL VPN application provided by ZyWALL USG. In order to use this application, you are required to configure your ZyWALL USG and SafeWord according to the following steps: 1. Install the SafeWord server software on a computer. (Note: Please refer to the SafeWord installation guide in Chapter 2. For more details, please check the SafeNet website for the installation documentation) 2. Create the user accounts on the ZyWALL USG and in the SafeWord server. 3. Import each token s database file into the server. 4. Assign the users to the OTP tokens (on the SafeWord server). 5. Configure the SafeWord as a RADIUS server in the ZyWALL USG Object > AAA Server screens. 6. Give the OTP tokens to (local or remote) the users who will remote login into the ZyWALL USG. Note: ZyWALL OTP is a stand-alone product, which is not included in the ZyWALL USG package. Network Topology In this example, we will have one token and we will create user OTP who will log into ZyWALL USG with OTP. 11

3.1 ZyWALL USG Configurations Step1. Create a user account on ZyWALL USG 1) Go to CONFIGURATION > Object > User/Group and click the Add button to create a new user account. 2) Enter the user s name, description and select the user type ext-user on the User configuration page. 3) Click the OK button to finish the configuration on this page. Step2. Configure the AAA Server 1) Go to CONFIGURATION > Object > AAA Server and then navigate to the RADIUS page. 2) Configure the SafeWord server as: Enter the IP address of the SafeWord server in the server address. Enter the authentication port to RADIUS server, like Microsoft IAS; the default value is 1812. Enter the Shared secret to RADIUS server in Key field. Select the Group Membership Attribute; the default value is 11. 12

Step3. Configure the Authentication Method 1) Go to CONFIGURATION > Object > Auth. Method and click the Edit button to modify the default authentication method. 2) In the edit page, click Add to add the group radius into method list. Step4. Create the SSL Application(s) according to your needs 1) Go to CONFIGURATION > Object > SSL Application and click the Add button to create an SSL VPN application object. 2) For example, you create a web application to let you can remote access the FTP server via SSL VPN. 13

Step5. Create the SSL VPN access policy 1) Go to CONFIGURATION > VPN > SSL VPN and click the Add button to create an SSL VPN access policy. 2) Configure the access policy as: Enter the policy name and description. Select the User/Group object to apply this policy. Select the application object to apply this policy. Select the address object to apply if needed. Click the OK button to finish the configuration. 14

3.2 SafeWord Server Configurations Step1. Create a RADIUS client 1) Take Microsoft IAS as the example. 2) Right click the RADIUS Client folder and click New > RADIUS Client to add a new setting. Step2. Create a RADIUS client 1) Enter the name for the rule. 2) The Client address is the ZyWALL USG s WAN IP address. 3) Click the Next button for the next step. 15

4) Enter the Shared secret; the Key on ZyWALL USG AAA Server setting. 5) Click the Finish button to finish the configuration. ZyXEL ZyWALL OTPv2 Support Notes 6) The new OTP client has been created. 16

Step3. Assign the token to User 1) Enable the ADUC (Active Directory Users and Computers). 2) Click the Users folder to list all users and groups in RADIUS server. 3) Right click the OTP user, and then click Properties. Go to the SafeWord tab. 4) Enter the serial number of the assigned token. If needed, enter the PIN code for it. (this one is used as the Password when login the ZyWALL USG) 5) After the configuration, you can click the Tokens link and check the token status. 17

Step4. Enable the Remote Access 1) To allow the user to log in via SSL VPN, you have to enable the Remote Access Permission for this user. 2) Right click the OTP user, and then click the Properties. Go to the Dial-in tab and choose Allow access. 18

3.3 Verify OTP via Login from the Remote PC Step1. Login device 1) Enter the user name, password (PIN code which configured on chapter 3.2 step 3), and One-Time Password which generated from the token. 2) Click the SSL VPN button to submit login information. 3) Once the OTP works correctly, you will see the SSL application that configured to the user to use. 19

4. OTP Authentication to an OTP-protected Network via IPSec VPN Client over the ZyWALL USG In the following example, we will employ 2 Factor Authentication (ZyXEL OTP pack) to enhance password security by using SSL VPN application provided by ZyWALL USG. In order to use this application, you are required to configure your ZyWALL USG and SafeWord according to the following steps: 2. Install the SafeWord server software on a computer. (Note: Please refer to the SafeWord installation guide in Chapter 2. For more details, please check the SafeNet website for the installation documentation) 2. Create the user accounts on the ZyWALL USG and in the SafeWord server. 3. Import each token s database file into the server. 4. Assign the users to the OTP tokens (on the SafeWord server). 5. Configure the SafeWord as a RADIUS server in the ZyWALL USG Object > AAA Server screens. 6. Give the OTP tokens to (local or remote) the users who will remote login into the ZyWALL USG. Note: ZyWALL OTP is a stand-alone product, which is not included in ZyWALL USG package. Network Topology In this example, we will have one token and we will create user OTP who will be the authenticator to establish the IPSec VPN tunnel to ZyWALL USG. 20

4.1 ZyWALL USG Configurations Step1. Create a user account on ZyWALL USG 1) Go to CONFIGURATION > Object > User/Group and click the Add button to create a new user account. 2) Enter the user s name, description and select the user type ext-user on the User configuration page. 3) Click the OK button to finish the configuration on this page. Step2. Configure the AAA Server 1) Go to CONFIGURATION > Object > AAA Server and then navigate to the RADIUS page. 2) Configure the SafeWord server as: Enter the IP address of the SafeWord server in the server address. Enter the authentication port of the RADIUS server, like Microsoft IAS; the default value is 1812. Enter the Shared secret to RADIUS server in Key field. Select the Group Membership Attribute; the default value is 11. 21

Step3. Configure the Authentication Method 1) Go to CONFIGURATION > Object > Auth. Method and click the Edit button to modify the default authentication method. 2) In the edit page, click Add to add the group radius into method list. Step4. Configure the IPSec VPN Gateway policy 1) Go to CONFIGURATION > VPN > IPSec VPN and then navigate to the VPN Gateway page. 2) Enter the values for VPN phase-1 configuration. 22

3) Enable the Extended Authentication and choose Server Mode for it. ZyXEL ZyWALL OTPv2 Support Notes Step5. Configure the IPSec VPN Connection policy 1) Go to CONFIGURATION > VPN > IPSec VPN and then navigate to the VPN Connection page. 2) Enter the values for VPN phase-2 configuration. 23

4.2 SafeWord Server Configurations Step1. Create a RADIUS client 1) Take Microsoft IAS as the example. 2) Right click the RADIUS Client folder and click New > RADIUS Client to add a new setting. Step2. Create a RADIUS client 1) Enter the name for the rule. 2) The Client address is the ZyWALL USG s WAN IP address. 3) Click the Next button for the next step. 24

4) Enter the Shared secret; the Key on ZyWALL USG AAA Server setting. 5) Click the Finish button to finish the configuration. ZyXEL ZyWALL OTPv2 Support Notes 6) The new OTP client has been created. 25

Step3. Assign the token to User 1) Enable the ADUC console (Active Directory Users and Computers). 2) Click the Users folder to list all users and groups in the RADIUS server. 3) Right click the OTP user, and then click Properties. Go to SafeWord tab. 4) Enter the serial number of the assigned token. If needed, enter the PIN code for it (this one is used as the Password when login the ZyWALL USG). 5) After the configuration, you can click the Tokens link and check the token status. 26

Step4. Enable the Remote Access 1) To allow the user to log in via SSL VPN, you have to enable the Remote Access Permission for this user. 2) Right click the OTP user, and then click Properties. Go to the Dial-in tab and choose Allow access. 27

4.3 ZyWALL IPSec VPN Client Configurations Step1. Configure the IPSec VPN Phase1 policy 1) Enter the values for VPN phase-1 configuration. 2) Click the Advanced Setting button and click the X-Auth Popup feature. 28

Step2. Configure the IPSec VPN Phase2 policy 1) Enter the values for VPN phase-2 configuration. 2) Click the Save & Apply button to finish the configuration and save it. 3) You can trigger the IPSec VPN tunnel by clicking the Open Tunnel button. 29

4.4 Verify OTP via Login from the VPN Client Step1. Trigger the IPSec VPN tunnel 1) Click the Open Tunnel button on IPSec VPN client (The VPN tunnel must be triggered from Client side because it is a dynamic tunnel). 2) When doing the Phase-1 authentication, the authentication window will pop-up for the X-Auth login. 3) Enter the user name in the Login field and PIN code + password in the Password field. Step2. Trigger the IPSec VPN tunnel 1) There are only 10 seconds to enter the authentication information into X-Auth window. If you use more time to finish it, the tunnel will fail to establish. You can see the message on VPN Console as in the picture below. 30

2) If the VPN tunnel is established successfully, you can see the message on VPN Console as below picture. Step3. Check the VPN tunnel status You can see the VPN connection status is Connected on CONFIGURATION > VPN > IPSec VPN > VPN Connection page. Also can check the IPSec VPN SA on MONITOR > VPN Monitor > IPSec page. 31