Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved



Similar documents
Borderware MXtreme. Secure Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

BorderWare Firewall Server 7.1. Release Notes

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Fireware How To Authentication

Cisco VPN Concentrator Implementation Guide

Chapter 5 Virtual Private Networking Using IPsec

Check Point FW-1/VPN-1 NG/FP3

7.1. Remote Access Connection

Configuring Sponsor Authentication

Your Question. Net Report Answer

Microsoft IAS Configuration for RADIUS Authorization

Remote Access Technical Guide To Setting up RADIUS

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Juniper Networks SSL VPN Implementation Guide

BroadSoft BroadWorks ver. 17 SIP Configuration Guide

How to Logon with Domain Credentials to a Server in a Workgroup

Managing User Accounts

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

MIGRATION GUIDE. Authentication Server

Using RADIUS Agent for Transparent User Identification

NetMotion + YubiRADIUS Quick Start Guide

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

PineApp Surf-SeCure Quick

1.6 HOW-TO GUIDELINES

Dynamic DNS How-To Guide

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

How To Configure Apple ipad for Cyberoam L2TP

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

DIGIPASS Authentication for GajShield GS Series

Security Provider Integration RADIUS Server

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

ESET SECURE AUTHENTICATION. Cisco ASA Internet Protocol Security (IPSec) VPN Integration Guide

F-SECURE MESSAGING SECURITY GATEWAY

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Managing User Accounts

NETASQ SSO Agent Installation and deployment

How To - Implement Clientless Single Sign On Authentication with Active Directory

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

Using Microsoft Active Directory Server and IAS Authentication

HP Device Manager 4.7

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

How to Configure Web Authentication on a ProCurve Switch

Configuring Global Protect SSL VPN with a user-defined port

Two-Factor Authentication

Purple Sturgeon Standard VPN Installation Manual for Windows XP

Network Load Balancing

Cisco RV 120W Wireless-N VPN Firewall

Chapter 3 Authenticating Users

Using LifeSize systems with Microsoft Office Communications Server Server Setup

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

ESET SECURE AUTHENTICATION. Check Point Software SSL VPN Integration Guide

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Watchguard Firebox X Edge e-series

Sophos UTM. Remote Access via IPsec. Configuring UTM and Client

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Lab Configuring Access Policies and DMZ Settings

Single Sign-On in SonicOS Enhanced 4.0

If you have questions or find errors in the guide, please, contact us under the following address:

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Windows Vista: Connecting to the wireless network at Hood College

DIGIPASS Authentication for Cisco ASA 5500 Series

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Chapter 8 Router and Network Management

Chapter 6 Virtual Private Networking Using SSL Connections

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

TALKSWITCH VOIP NETWORK TROUBLESHOOTING GUIDE

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

MICROSOFT ISA SERVER 2006

Configuring the Watchguard Edge for RADIUS authentication

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Using WhatsUp IP Address Manager 1.0

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Integrating LANGuardian with Active Directory

BlackShield ID Agent for Remote Web Workplace

Chapter 8 Monitoring and Logging

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

Single Sign-On. Document Scope. Single Sign-On

Chapter 7 Managing Users, Authentication, and Certificates

SONICWALL SONICOS ENHANCED 5.6 SINGLE SIGN-ON

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents

Group Management Server User Guide

Deploying RSA ClearTrust with the FirePass controller

Cisco SA 500 Series Security Appliance

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Quick Installation Guide For Sensors with Cacti

Siteminder Integration Guide

govroam Web Interface User Guide

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Transcription:

Borderware Firewall Server Version 7.1 VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com

Overview The BorderWare Firewall Server is a comprehensive integrated solution for securing an internet connection. Built on a hardened operating system, it eliminates vulnerabilities and costs associated with a separate firewall and operating system. Configuring Authentication methods The Proxy Server can use multiple authentication methods for authenticating users: Local Users, RADIUS or LDAP. One or more of these methods can be used at a time, so multiple authentication methods can be combined. If only one method is enabled for use, then a failure to authenticate using that method will result in a user being denied access. Enabling authentication types can be done through the Authentication Types menu in BWClient or the firewall console. When the Proxy Server is configured to use more than one authentication type, the server will attempt each method in sequence until a successful authentication has occurred. If no method is successful, access will be denied. The sequence of the various methods is determined by the Priority parameter set for each method. Methods with lower priority will be attempted first. To enable and set the priority for an authentication type, follow these steps: Open BWClient and log into the firewall. Under the Proxy Server menu, select Authentication Types. 3 rd Party Integration: Borderware Firewall Server 1

Modify the correct type by double-clicking on the entry. Enable the type, and set the Priority value as desired. Click on the Apply button to apply your changes. Configuring RADIUS servers Once this is complete, a list of RADIUS servers must be specified with the following parameters: Host (FQDN or IP address). The domain name or IP address of the RADIUS server. Priority. If multiple RADIUS servers are specified, this field will govern the order they are queried in. Lower priority servers will be contacted first. This field only applies to 3 rd Party Integration: Borderware Firewall Server 2

RADIUS servers and is not related to the global priority setting for the Authentication Type. Secret. This is the secret shared between the firewall and the RADIUS server. It must match exactly the same value entered on the RADIUS server. Timeout. This is the amount of time in seconds that the firewall will wait for a response from the RADIUS server before retrying Retries. This is the number of attempts the firewall will make to contact the RADIUS server before aborting. Once this number has been exceeded, the firewall will attempt the next RADIUS server in the list, or the next authentication type listed. To add a RADIUS Server, double click on the RADIUS Authentication type and select the Server List tab. Click on New and fill in the parameters. The Sentinel Client and the IPSec server include the option to require additional authentication from a connecting VPN client. The current release supports a user name and 3 rd Party Integration: Borderware Firewall Server 3

password, which are maintained on the Firewall Server, and RADIUS. This additional authentication guards against the risk that an unauthorized user may attempt to use the client workstation to gain access to the protected network via the VPN. Open the VPN connection and under the XAUTH/Remote Auth IDs tab, you can configure extended authentication, such as RADIUS, for additional security, as the basic password method uses clear-text passwords. The Sentinel client must be configured to recognize that the VPN connection requires additional authentication. This is done by checking the Extended Authentication box on the properties screen. The Sentinel client can use XAUTH from a static address. Configure the CRYPTO-Server If you wish to use the CRYPTO-Server as your RADIUS server, you must verify that the Protocol Server is configured to accept RADIUS communications. Connect to the CRYPTO-Server using the Console, and choose Server -> System Configuration & Status from the menu. 3 rd Party Integration: Borderware Firewall Server 4

In the Entity column choose RadiusProtocol. Next look at the Value corresponding to the key NAS.2. The data in this value field defines which RADIUS clients are allowed to connect to the CRYPTO-Server, and the shared secret they must use. RadiusProtocol NAS.# keys By default, the CRYPTO-Server is configured to listen for RADIUS requests over UDP port 1812, from any host on the same subnet, using a shared secret of testing123. You can manually define as many RADIUS clients as desired by adding NAS.# entries to the CRYPTO-Server configuration. The syntax of the data for a NAS entry is as follows: <First IP>, <Last IP>, <Hostname>, <Shared Secret>, <Perform Reverse Lookup?>, <Authentication Protocols> Where: <First IP>: The first IP address of the RADIUS client(s) configured in this NAS.# key. <Last IP>: The last IP address of the RADIUS client(s) configured in this NAS.# key. If only one IP address is defined by a NAS.# key, the <First IP> and <Last IP> will be the same. 3 rd Party Integration: Borderware Firewall Server 5

<Hostname>: Only applies in cases where the NAS.# key is for one host. Required for performing reverse lookup. <Shared Secret>: A string used to encrypt the password being sent between the CRYPTO-Server and the RADIUS client (i.e. the Check Point VPN/Firewall). You will need to enter the exact same string into the Check Point configuration in Section 3. The <Shared Secret> string can be any combination of numbers and uppercase and lowercase letters. <Perform Reverse Lookup?>: An added security feature of the CRYPTO-Server is its ability to verify the authenticity of a RADIUS client by cross-checking its IP address with the Domain Name Server. If this value is set to true, when the CRYPTO-Server receives a RADIUS request from the RADIUS client defined by this NAS.# entry, it sends a request to the DNS using the hostname set in the NAS.# entry. The DNS should respond with the same IP address as configured in the NAS.# entry, otherwise the CRYPTO-Server assumes that the RADIUS packet is coming from some other host posing as the RADIUS client, and ignores the request completely (also known as a man in the middle attack). <Authentication Protocols>: Many different authentication protocols can be used during RADIUS authentication. Common examples are PAP, CHAP,MS-CHAP and EAP. This setting determines which authentication protocols the CRYPTO-Server will allow from a given RADIUS client. Currently PAP and CHAP are the only available authentication protocols for RADIUS clients. NOTE: After changing or adding a NAS.# entry, click the Apply button. Verifying the CRYPTO-Server RADIUS Protocol Settings The RADIUSProtocol.dbg log on the CRYPTO-Server will include information about its RADIUS configuration. Each time the Protocol Server starts, the following information is logged: Adding IP range 127.0.0.1 to 127.0.0.1 to ACL with reverse lookup set to false Adding IP range 192.168.21.1 to 192.168.21.254 to ACL with reverse lookup set to false RADIUS protocol has established link with EJB server at jnp://192.168.21.5:1099 RADIUS Receiver Started: listening on port 1812 UDP. RADIUS Receiver Started: listening on port 1813 UDP. This example indicates that the CRYPTO-Server is listening for RADIUS requests on UDP port 1812 (for authentication) and 1813 (for accounting), and RADIUS clients within the IP range of 192.168.21.1 to 192.168.21.254. As well, no reverse lookup is being performed. 3 rd Party Integration: Borderware Firewall Server 6