Installing the IPSecuritas IPSec Client



Similar documents
Installing the Shrew Soft VPN Client

Installing the SSL Client for Linux

Configuring GTA Firewalls for Remote Access

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

GB-OS. Certificate Management. Tel: Fax Web:

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

GTA SSL Client & Browser Configuration

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

Technical Document. Creating a VPN. GTA Firewall to Linksys Cable/DSL Router TDVPNLINKSYS

Technical Document. Creating a VPN. GTA Firewall to Cisco PIX 501 TDVPNPIX

Shrew Soft VPN Client Configuration for GTA Firewalls

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

ZIMPERIUM, INC. END USER LICENSE TERMS

GNAT Box VPN and VPN Client

GB-OS Version 5.3. GTA SSL Sentinel. Tel: Fax Web:

END USER LICENSE AGREEMENT

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Terms and Conditions- OnAER Remote Monitoring Service

Copy Tool For Dynamics CRM 2013

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

Contents Notice to Users

4.0. Offline Folder Wizard. User Guide

Service Agreement: January 2008

Web Remote Access. User Guide

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

Dell One Identity Cloud Access Manager How to Configure for High Availability

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

DME-N Network Driver Installation Guide for LS9

Dell One Identity Cloud Access Manager Installation Guide

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

MDM Zinc 3.0 End User License Agreement (EULA)

Dell Statistica Statistica Enterprise Installation Instructions

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

Temperature & Humidity SMS Alert Controller

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

END- USER LICENSE AGREEMENT FOR Helpdesk Pilot

Cyberoam IPSec VPN Client Configuration Guide Version 4

MyShortcut. Administrator's Guide

Defender 5.7. Remote Access User Guide

Spotlight Management Pack for SCOM

formerly Help Desk Authority Upgrade Guide

Defender Delegated Administration. User Guide

PointCentral Subscription Agreement v.9.2

Security Analytics Engine 1.0. Help Desk User Guide

Radius Integration Guide Version 9

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

NCD ThinPATH Load Balancing Startup Guide

HTTP Client Installation Guide Version 9

ADS Integration Guide

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

LS9 Editor Installation Guide

Welcome to InFixi Exchange Mailbox Recovery Software. Help Guide. Exchange Mailbox recovery software

BlackBerry Desktop Manager Version: User Guide

Configuring and Integrating JMX

ELECTRONIC RECORDS DISCLOSURE AND AGREEMENT READ AND SCROLL DOWN PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

NOTICE SOFTWARE END USER LICENSE AGREEMENT

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

BES10 Self-Service. Version: User Guide

Heroix Longitude Quick Start Guide V7.1

ALM Works End-User License Agreement for Structure Plugin

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM

Dell InTrust Preparing for Auditing Microsoft SQL Server

Mayfair EULA for Journal Office

Dell Statistica Document Management System (SDMS) Installation Instructions

BACKUPPRO TERMS OF USE AND END USER LICENSE AGREEMENT

SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

Quest Privilege Manager Console Installation and Configuration Guide

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

Introduction to Version Control in

Integration Guide. Enterprise Identity by BlackBerry

ALPHA TEST LICENSE AGREEMENT

PRODUCT GUIDE. N u c l e u s D a t a R e c o v e r y. C o m P riv a t e L i m i t e d

Microsoft SharePoint

1.1 Authorized User means an employee of Customer who has been issued a User ID in accordance with Section 3.2(a).

DocAve for Office 365 Sustainable Adoption

Installation Guide Supplement

RockWare Click-Wrap Software License Agreement ( License )

RSA Two Factor Authentication

END-USER LICENSE AGREEMENT FOR F-PROT ANTIVIRUS

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

SSL VPN Client Installation Guide Version 9

Database Client/Server

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.

RSA Two Factor Authentication. Feature Description

TIBCO Slingshot User Guide

Transcription:

Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

Installing the IPSecuritas IPSec Client: Mac This section will assist users in the download, installation, and configuration of the IPSecuritas IPSec Client. Requirements GB-OS 5.3.1 or higher IPSecuritas IPSec Client 3.4 or above User access permissions for Remote Access to a GTA Firewall User Configured to use Hybrid + Xauth The host name or an IP Address assigned to the firewall s External Interface Downloaded client and firewall CA files. All required files may be downloaded via the firewall Web interface. Important - Downloads for MAC clients only support Hybrid+Xauth mode and CA file downloads. Accessing the GTA Remote Access Portal for Download To access the GTA Remote Access Portal, open a Web browser and enter the IP address or host name of your firewall. If the firewall s remote access portal is configured for a port other than 443, append with a colon and port number. Example: https://remote-access.gta.com:1443 Figure 1: Location Bar with Non Standard Port The login screen for the GTA Remote Access Portal will display. Enter your user login credentials to access the browser. If the virtual keyboard is required, you will have to use the virtual keyboard to enter your password. Use the shift key to access special characters. Figure 2: Remote Access Login Note Administrators with Remote Access privileges logging in on the administration port will see the normal firewall administration interface and the Remote Access Portal. Downloading the IPSec Configuration Files and Installers 1. Navigate to Remote Access>IPSec>Client for all files needed for download. 2. Click on the Client Installer Download. This will download the client. 3. Click on the CA Certificate Download to download the ZIP file containing the required certificates and configuration file. 2 Figure 3: Mac Installer, CA Certificate and Installation Guide

IPSec Client Installation Installing the IPSecuritas IPSec Client: Mac 1. Download the Mac OS X Client Installer. 2. The License Agreement will display. Click AGREE to continue with installation. Figure 4: IPSecuritas License Agreement 3. Once the installer has been mounted, drag the IPSecuritas application into your system s application folder. Figure 5: Install IPSecuritas IPSec Client Configuration Hybrid + XAuth (Hybrid RSA) 1. Open IPSecuritas (Certificate Manager) and import the previously downloaded firewall CA. Figure 6: Import the Firewall CA 3

2. Next, open the Connections Editor (Connections -> Edit Connections) and insert a new connection by clicking the + icon. Figure 7: Insert a New Connection 3. Name the new connection and then select ID Tab. Set the following: Local Identified: Address Remote Identifier: Address Authentication Method: Hybrid RSA Certificate: Select the firewall CA certificate Username: Enter Username Store Password: Optional Figure 8: ID Tab Settings 4. Select the Options Tab and set the options as shown below. Figure 9: Options Tab Settings 4

5. Select the General Tab and enter the following: Remote IPSec Device Firewall IP address or fully qualified host name. Endpoint Mode: Should be greyed out and set to Mode_CFG is enabled. Endpoint Mode: Network(s) and enter network IP address behind the remote GTA Firewall. Figure 10: General Tab Settings 6. Select the Phase 1 Tab and enter the following: Lifetime Equal to or less than configured lifetime on the firewall in minutes. DH Group Group configured for Phase 1 of the firewall. Encryption Match phase 1 encryption on the firewall. Authentication Match the the firewall Phase 1 encryption. Mode Aggressive Proposal Obey Figure 11: Phase 1 Tab Settings 5

7. Select the Phase 2 Tab and enter the following: Lifetime: Less than or equal to the firewall phase 2 lifetime. PFS Group: same as the firewalls phase 2 Key Group. Encryption Match phase 2 encryption on the firewall. Authentication Match the the firewall Phase 2 encryption. Figure 12: Phase 2 Tab Settings 8. Optionally, select the DNS Tab and configure DNS servers used while VPN is active. Figure 13: DNS Tab 6

Connecting to the Firewall Installing the IPSecuritas IPSec Client: Mac 1. Open IPSecuritas and select your connection profile and click START. Once connected to the remote GTA Firewall, a GREEN dot will appear beside the connection. 2. To close the connection click STOP. Figure 14: Start Connection Figure 15: Stop Connection 7

Lobotomo Software End User License Agreement This License Agreement is a legal agreement between you (an individual or an entity) and Lobotomo Software for the SOFTWARE PRODUCT accompanied by this license agreement, which includes computer software and electronic documentation. You should carefully read the following terms and conditions before using the SOFTWARE PRODUCT. The SOFTWARE PRODUCT is licensed, not sold. The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. By installing, copying, or otherwise using the SOFTWARE PRODUCT, you are agreeing to be bound by the terms of this Agreement. If you do not agree to the terms of this Agreement, you are not authorized to use the SOFTWARE PRODUCT. You agree to use the SOFTWARE PRODUCT solely for your own personal use and you will not translate, decompile, reverse engineer, disassemble, modify, copy, alter, merge into other software, reproduce, rent, lease, lend, remarket or otherwise dispose of the SOFTWARE PRODUCT or any part thereof. The SOFTWARE PRODUCT may be freely copied and distributed, provided that the SOFTWARE PRODUCT is not modified in any way, and it is accompanied by this License Agreement. It may not, however, be bundled or sold for profit without permission from Lobotomo Software. Lobotomo Software reserves the right and the sole discretion to (i) make improvements, corrections, adaptations, conversions and/or any other change in the SOFTWARE PRODUCT and/or the Lobotomo Software web site and to any part thereof and/ or to a revised or new Terms of Service; (ii) change, limit, terminate or cease to provide, at any time, temporarily permanently, without prior notice, for any reason or no reason, to all users or any number thereof (a) the SOFTWARE PRODUCT and its availability and functionality, part or all of the Lobotomo Software web site, (b) the access to the SOFTWARE PRODUCT, granted to you or to any other user; (iii) establish new operating and usage policies for the SOFTWARE PRODUCT or change them at any time temporarily or permanently without prior notice, for any reason or no reason. DISCLAIMER YOU EXPRESSLY AGREE THAT DOWNLOADING THE SOFTWARE PRODUCT AND ANY USE OF THE SOFTWARE PRODUCT IS AT YOUR OWN RISK. NO WARRANTY, REPRESENTATION, CONDITION, UNDERTAKING OR TERM - EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE - INCLUDING BUT NOT LIMITED TO THE CONDITION, QUALITY, DURABILITY, PERFORMANCE, ACCURACY, STABILITY, RELIABILITY, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE OR USE OF THE SOFTWARE PRODUCT IS GIVEN OR ASSUMED BY LOBOTOMO SOFTWARE. ALL SUCH WARRANTIES, REPRESENTATIONS, CONDITIONS, UNDERTAKINGS AND TERMS ARE HEREBY EXCLUDED. LOBOTOMO SOFTWARE MAKES NO WARRANTY THAT THE SOFTWARE PRODUCT WILL MEET YOUR REQUIREMENTS, OR THAT IT WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR FREE; IN NO EVENT SHALL LOBOTOMO SOFTWARE PRODUCT BE LIABLE TO ANY PARTY FOR ANY DAMAGES INCLUDING WITHOUT LIMITATION, ANY DIRECT, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, LOSS OF PROFITS AND SAVINGS AND THE LIKE), OR ANY OTHER DAMAGES ARISING - IN ANY WAY, SHAPE OR FORM - OUT OF THE AVAILABILITY, USE, RELIANCE ON, INABILITY TO UTILIZE OR IMPROPER USE OF THE SOFTWARE PRODUCT EVEN IF LOBOTOMO SOFTWARE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND REGARDLESS OF THE FORM OF ACTION, WHETHER IN CONTRACT, TORT, OR OTHERWISE. BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, THE ABOVE EXCLUSIONS OF INCIDENTAL AND CONSEQUENTIAL DAMAGES MAY NOT APPLY TO YOU. 8 Copyright

Copyright 1996-2010, Global Technology Associates, Incorporated (GTA). All rights reserved. Except as permitted under copyright law, no part of this manual may be reproduced or distributed in any form or by any means without the prior permission of Global Technology Associates, Incorporated. Technical Support GTA includes 30 days up and running installation support from the date of purchase. See GTA s Web site for more information. GTA s direct customers in the USA should call or email GTA using the telephone and email address below. International customers should contact a local Authorized GTA Channel Partner. Tel: +1.407.380.0220 Email: support@gta.com Disclaimer Neither GTA, nor its distributors and dealers, make any warranties or representations, either expressed or implied, as to the software and documentation, including without limitation, the condition of software and implied warranties of its merchantability or fitness for a particular purpose. GTA shall not be liable for any lost profits or for any direct, indirect, incidental, consequential or other damages suffered by licensee or others resulting from the use of the program or arising out of any breach of warranty. GTA further reserves the right to make changes to the specifications of the program and contents of the manual without obligation to notify any person or organization of such changes. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation for their use. GTA assumes no responsibility with regard to the performance or use of these products. Every effort has been made to ensure that the information in this manual is accurate. GTA is not responsible for printing or clerical errors. Trademarks & Copyrights GB-OS, Surf Sentinel, Mail Sentinel and GB-Ware are registered trademarks of Global Technology Associates, Incorporated. GB Commander is a trademark of Global Technology Associates, Incorporated. Global Technology Associates and GTA are service marks of Global Technology Associates, Incorporated. Microsoft, Internet Explorer, Microsoft SQL and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Adobe and Adobe Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. UNIX is a registered trademark of The Open Group. Linux is a registered trademark of Linus Torvalds. BIND is a trademark of the Internet Systems Consortium, Incorporated and University of California, Berkeley. WELF and WebTrends are trademarks of NetIQ. Sun, Sun Microsystems, Solaris and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Java software may include software licensed from RSA Security, Inc. Some products contain software licensed from IBM are available at http://oss.software.ibm.com/icu4j/. Some products include software developed by the OpenSSL Project (http://www.openssl.org/). Mailshell and Mailshell Anti-Spam is a trademark of Mailshell Incorporated. Some products contain technology licensed from Mailshell Incorporated. All other products are trademarks of their respective companies. Global Technology Associates, Inc. 3505 Lake Lynda Drive, Suite 109 Orlando, FL 32817 USA Tel: +1.407.380.0220 Fax: +1.407.380.6080 Web: http://www.gta.com Email: info@gta.com Copyright 9