Home
        User Manual - GENESYS SOFTWARE
         Contents
1.          A Security Note   Make sure that the user has only read privileges     1  In the System tab  open the User Authentication menu     2  In the LDAP Server Settings window  enable the system by  clicking Enable next to Status     LDAP Type  Choose the type of LDAP server to use    The available choices are  Microsoft Active Directory  Novell  eDirectory and OpenLDAP    Unique User Attribute  This attribute defines how users should  be authenticated on the LDAP server  The attributes available  here depend on the type of LDAP server you are configuring  If  you wish to use a self defined attribute for authentication  select  Selfdefined here    With the Microsoft Active Directory server  you can also  choose to authenticate by User Principle Name  UPN  or  saMAccountName     87    Using the Security System    88       The Novell eDirectory and OpenLDAP servers allow  authentication by the Common Name  CN   Surname  SN    and Unique Identifier  UID  attributes     Attribute Name  This en   Status eo    i       LDAP Type Sigh Presse elect g try field is only shown if  Se Ban a you have selected to au         4 a _s_a  u thenticate by a Selfde     fined attribute from the  Unique User Attribute  drop down menu           Enter the attribute to use for authentication here    IP Address  Enter the IP address of the LDAP server    TCP Port  Enter the TCP port of the LDAP service  By default   this is set to 389  the standard port for LDAP     Bind DN  The value to enter here de
2.       0 5 219  URL whitelist                218  SYN Rate Limiter               204  System Requirements  administration PC           20  example configuration     20  Nardware    sccsceseeseeeeees 19    System Time  automatic synchronization    manual configuration       46  System Up2Date    installing scce 58  installing with HA solution  ii dhaadas Laaa a D Puea TESDA 58  loading and installation   Manual seeren 56  loading  automatic          56  loading  local nccc 57  Time Settings   45  Up2Date Service  introduction seee 54  Pattern Up2Date             59  System Up2Date             55  Use external indicators         44  User  filtering widen ceeaceteaedcness 116  User Authentication  configuring LDAP            87  configuring MS Active  Directory server            80  configuring Novell  eDirectory Server         85  introduction sescca 71  LDAP advanced               89  LDAP Server       eeseeeeeeee 78    Index    Microsoft IAS RADIUS    configuration            645 73  RADIUS emis ete clin 72  SAM aro oi aa aea 76  SAM   NT 2000 XP   configuration s   76    User Authentication  configuring OpenLDAP     Server verii iea sa anai 86  Users  TIGEES erne enna eeren 116  introduction        ccceeeeee 114  USERS ea i inaia 114  Validate Packet Length       206  WebAdmin    348    blocking protection for    Loggin attempts           93  drop down MenusS           38  HTTPS niat ile eas 91  INFO  BOX iryo eneen 35  kick anran e atten oes 43  StS raai dee eeri 39  MENUS 4
3.      certificate  signed by the CA    94    Using the Security System    certificate  which the system uses to authenticate itself to your  browser  These two certificates contain the company   s data and the  system   s hostname     Creating a Certificate for WebAdmin     1     Under the System tab  open the WebAdmin Site Certificate  menu     In the Certificate Information menu  enter the appropriate  information for your firm    Country  Choose your country from the drop down menu   State  Choose the state or region where you are    City  Enter the company   s name    Organization  Enter the company   s name    Section  Enter the department    E Mail Address  Enter your e mail address     In the field Firewall Hostname  enter the host name or IP  address of the firewall you use to access WebAdmin     Example  If you access WebAdmin through the URL  https   192 168 10 1  enter 192 168 10 1 here     Save your entries by clicking the Save button     Installing a Certificate for WebAdmin     1     To install the CA Certificate in your browser  click Import  Certificate into Browser in the CA Certificate Installation  window   The next few steps depend on your browser  For example  with  Microsoft Internet Explorer  the File download dialog opens   Save file to disk  This option allows you to save the certificate  to a local disk before installing it     95    Using the Security System    5     Open the file from current position  This allows you to install  the certificate dir
4.     Astaro User Authentication    OaE E ESAT 316  BIND name server        318  Boot messages    316  Configuration daemon    316  Content Filter              316  DHCP client            00008 316  DHCP server essees 316  Fallback archive            316  High Availability            317  HTTP daemon            5  317  HTTP Proxy   sssecceenseenee 318  Intrusion Protection       317  IPSec VPN       cecceeeeeees 317  K  rne l nirani ranis 317  Local Login               00 317  LOGGING isnin eve tees 317  MiddleWare        ccceeeees 317  Network accounting   deamon        cece cece eee 317  Packet Filter           00005 318  POP3 PrOXy   cseeseeeeeeeee 318  Portscan Detection        318  PPPoE DSL dial up         318  PPTP VPN Access           318  Selfmonitor             0055 319  SMTP PrOxy    eceeeeeeeeeee 319  SOCKS proxy    eeseeeee eee 319  SSH remote login          319    System log messages    319  Up2Date Service messages    schist a a age 320  Uplink Failover messages   saa Gin debe wgarne taken acne 320  Virus Protection            317  WebAdmin access         317  WebAdmin usage            320    Log FTP Data Connections  206  Log Unique DNS Requests   206  Masquerading    deleting rules               162  editing rules             065 162  Masquerading    ecce 161    Index    Masquerading   defining rules               162  Microsoft Outlook   creating rules    252    MS Explorer  disabling proxy use       211  NAT    defining rules               159   deleting rule
5.    10    collect them into a policy   AES_PFS_COMP PFS  deflate edit   delete  BLOWFISH  none  edit   delate      E TS cer    1      Policies are used to define    NULL  none  edit   delete                                                                      New IPSec Policy IPSec connections  and  T ue      contain the configuration  of the selected key ex    ISAKMP  IKE  Settings   T na     E change method  IKE  and  Encryption Algorithm  3DES 16bit E the IPSec connection   Authentication Algorithm  MDS 128bit x   IKE DH Group  DH Graup    ODPTE  J The chosen key exchange   EE  E method defines how the  aes keys for the connection are  IPSec Mode  Tinea E to be managed    IPSec Protocol  ESP z    Encryption Algorithm  3DES CBC 168bit x    Enforce Algorithms  Off zl   Authentication Algorithm  MDS 128bit z    SA Lifetime  secs    3600   PFS  PFS Group 5  MODP1536       Compression  Off p              The two exchange methods are     e Manual Key Exchange  e Internet Key Exchange  IKE     Because of the complexity of manual exchange  this system only  supports the IKE key exchange method  Manual exchange is not  allowed     277    Using the Security System    Configuring an IPSec Policy     1   2   3     278    Under the IPSec VPN tab  open the Policies menu   Click New to open the New IPSec Policy menu     In the Name field  enter a name for the new policy     Name  Enter a name describing the policy  It may be useful to  include the encryption algorithm in the name  The nam
6.    Astaro    Security Linux  WebAdmin    User Manual          Astaro  Security Linux VS     Version 5 007     User Manual    Release 3 0   Date  17 05 2004    The specifications and information in this document are subject to  change without notice  Companies  names  and data used in  examples herein are fictitious unless otherwise noted  This document  may not be copied or distributed by any means  in whole or in part   for any reason  without the express written permission of Astaro AG        Astaro AG  All rights reserved   Pfinztalstrasse 90  76227 Karlsruhe  Germany  http   www astaro com    Portions    Kaspersky Labs     Astaro Security Linux and WebAdmin are trademarks of Astaro AG   Linux is a trademark of Linus Torvalds  All further trademarks are the  property of their respective owners     Limited Warranty    No guarantee is given for the correctness of the information contained  in this document  Please send any comments or corrections to  documentation astaro com     Table of Contents    Contents Page  1  Welcome to Astaro        cceceeeeeeeeeeeeeeeeeeeeeeeeeeneneeeeeees 9  2  Introduction to the Technology        s cscseseeeeeeeeeees 10  3  Trnstallation       cccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseoenees 18  3 1  System Requirement        ccscseseeeeeeeeeeeeeeeeeeeneeeeaees 19  3 2  Installation Instructions          cccceeeseeeeeeseeeeeeeeeeeees 22  3 2 1  Software Installation          cscseseeeeeeeeeeeeeeeeeeeeeeeeeees 22  3 2 2  Configuring the Secur
7.    For the bandwidth management Quality of Service  QoS  you  must define the values for Uplink Bandwidth  kbits  and  Downlink Bandwidth  kbits   These values are used as basis  for the bandwidth management system  incorrect values can  lead to poor management of the data flow  The Quality of  Service  QoS  function is described in chapter 5 5 1     Uplink Bandwidth  kbits   These settings will only appear  if  the QoS function is enabled  In this entry menu  enter the avail   able bandwidth for the Uplink in full kilobits  This value can be  determined either from the values of the upstream interface or  from the router  On an interface to the Internet  this value  corresponds to the bandwidth of the Internet connection   on an  ADSL access the Uplink bandwidth amounts to 128 kBit s and on  a 2 Megabit fixed connection to 2048 kBit s    Downlink Bandwidth  kbits   These settings will only appear   if the QoS function is enabled  In this entry menu  enter the  available bandwidth for the Downlink in full kilobits  On an inter   face to the Internet  this value corresponds to the bandwidth of  the Internet connection   on an ADSL access the Uplink band   width amounts to 768 kBit s and on a 2 Megabit fixed connection  to 2048 kBit s    MTU Size  The MTU is the size  in bytes  of the largest  transmittable packet  MTU stands for Maximum Transfer Unit   For connections  using the TCP IP protocol  the data will be  subdivided into packets  A maximum size will be defined for  the
8.    These Up2Date packages have not been installed yet    In order to get further information  touch the blue info button with  the cursor  If the info button is highlighted red  there will be an  automatic restart of the Security system after the installation of the  System Up2Date package     Note     If you are using the High Availability  HA  system  please note the  special notes for the import and installation of the System Up2   Dates  The HA system is described in chapter 5 1 10 on page 97     Individual Up2Date packages can be downloaded from  http    download astaro com ASL up2date and saved on your  local computer     55    Using the Security System    Manually downloading System Up2Dates     1  Open the Up2Date Service menu in the System tab     2  In the System Up2Date window  click the Start button under  Prefetch Up2Dates now                    The Unapplied Up2Dates table lists  downloaded but not yet installed     ax  The system will now check if    there are any new updates  on the Update server  and  will download any updates  found  Details on the Up2   Date process can be found in  the Log Window  shown in  real time  left hand picture    When the DONE message  appears  the process has  completed successfully     any updates that have been    If you are using the HA system  unapplied updates will be listed in  the Unapplied Up2Dates Master window     Automatic download of System Up2Dates     1  Open the Up2Date Service menu in the System tab     2  Click t
9.   Current System NAT Rules  As with the current filter rules   Current NAT rules displays all user  and system defined NAT rules     Connection Tracking Table  This menu shows a list of all current  connections and the connection parameters     208    Using the Security System    5 6  Application Gateways  Proxies     While a Packet Filter filters packets at the network level  Proxies   also called Application Gateways  offer control and security at  the application level by preventing a direct connection between client  and server    Each Proxy can also provide further security services for its service   Since each proxy knows the context of its service  extensive security  and protocol options are being offered  This intensive protocol  analysis is made possible by well defined and well supported protocol  standards  The proxies concentrate on the most essential information     In the Proxies tab  select the Proxies with the same name and  configure the settings  By default  all proxies are disabled  This  security system contains proxies for HTTP  Web   DNS  Name  server   SOCKS  point to point connections   POP3  SMTP  e mail    and Ident     209    Using the Security System    5 6 1  HTTP Surf Protection                         EEE   The HTTP menu allows you  Status  eo  _Disable_  5    Operation Mode  Standard to config ure the secu rity  kiari Acera oy oniy z system as a HTTP Caching  ee me Proxy  This proxy can pro   Allowed Networks  Selected Available  a R vide cach
10.   Hostname                    118    Using the Security System    long as it online  at least  A mobile user  for example can access his  company network through Dynamic DNS  even if the company only  uses standard DSL connections with dynamic IP addresses  In  addition to VPN applications  Dynamic DNS can also be used for  remote maintenance and control     Defining Dynamic DNS Servers     1   2     In the Network tab  open the Hostname DynDNS menu     Enable the function by clickin on the Enable button in the    Status column   The entry window will open     Make the following settings     Hostname  In the entry field  enter the hostname     Username  In the entry field  enter the username     Password  In the entry field  enter the password     5 3 2  Interfaces    External Network  Router                      rp          Ie           E  Internet  Internal Network  t t  m   I _      ethi  ry            Firewall   n n Network card 1  eth0   Web FTP E mail Network card 2  eth1   Server Server Server Network card 3  eth2     Save your settings by clicking on the Save button     A firewall requires at least  two network cards in  order to securely connect an  internal network  LAN  to an  external one  the Internet    In our examples  the Net   work card ethO is always  the interface connected to  the internal network  Net   work card ethi is the  interface connected to the  external network  e g   to    119    Using the Security System    the Internet   These interfaces are a
11.   In general  times between 60 and 28800 seconds  1 min to 8  hours  are allowed     In the IPSec Settings window  configure the settings for the  IPSec connection     IPSec Mode  This system only supports tunnel mode    IPSec Protocol  This system only supports ESP    Encryption Algorithm  Choose the encryption algorithm to use  here  The IPSec VPN function of this security system supports  1DES 56bit  3DES 168bit  AES  Rijndael  128bit  AES  Rijndael 192bit  AES Rijndael 256bit  Blowfish  Serpent  128bit and Twofish  If you wish to create IPSec connections  without encryption  choose null here    Enforce Algorithm  If an IPSec Gateway makes a proposition  with respect to an encryption algorithm and to the strength  it  might happen  that the gateway of the receiver accepts this  proposition  even though the IPSec Policy does not correspond to  it  In order to avoid this  Enforce Algorithm must be enabled   Example    The IPSec Policy requires AES 256 as encryption  Whereas a  road warrior with SSH Sentinel wants to connect with AES 128   Without Enforce Algorithm the connection will be admitted   which constitutes a security risk    Authentication Algorithm  The MD5 128bit  SHA1 160bit   SHA2 256bit and SHA2 512bit algorithms are supported  The  algorithm used is determined by the remote endpoint of the  IPSec connection     279    Using the Security System    The SHA2 256bit and SHA2 512bit algorithms require a great      Important Note   deal of system resources     SA Li
12.   PPTP Address  In PPTP connections also a static IP address can  be assigned to a remote host instead of a dynamic address from  a PPTP IP pool  In order to define a static IP  click on the field in  the PPTP Address column and enter the address in the entry  field    Click the Save button to save your changes  In order to interrupt  this process  click on the Cancel button    For more information on PPTP VPN Access  please refer to  chapter 5 3 6 on page 169     Filters      Local User Definitions  lt   vad fe  The Filters function allows  you to filter Users with spe   cific attributes from the table   This function considerably en   hances the management of huge network configurations  as users of  a certain type can be presented in a concise way     PPTP Address c        HFP SMFP SOCKS WebAdmin L8tP4PSee PPFP  from pool   none     Filtering users   1  Click on the Filters button   The entry window will open     2  Enter the filter attributes in the fields listed  You don   t have to  define all attributes     Username  If you want to filter the users by username  enter  the expression in the entry field     Comment  If you want to filter users by specific comments   enter the expressions in this entry field     3  To start the filter  click on the Apply Filters button     116    Using the Security System    Only the filtered users will be displayed in the table  Next time when  you open the menu  the complete user table will be displayed     Further Functions    Editing 
13.   Threshold One   When Spam Level exceeds  03  aggressive    do this  Pass    Threshold Two   When Spam Level exceeds  05  reasonable    do this  Quarantine     The first threshold implicates that e mails from level 3 on are filtered   but allowed through  With the help of the attached Header the e mail  on the mail server or in the e mail program of the recipient can be  sorted or filtered    For the second threshold the e mail will be accepted but put into  quarantine     Basically  the Threshold with the higher level is treated more  severely  do this      249    Using the Security System    On busy systems  the Spam Detection may require a large percent       Important Note     g age of system resources     When Spam Level exceeds  This drop down menu can be used to  select the strategy to use in marking messages as spam  The differ   ence between the maximum values is defined through the probability  that legitimates messages  such as HTML Newsletters will be blocked   It is possible to set a value between 1 and 15 in the drop down menu   With level 1  the e mails are already treated with a low spam score   The following Levels serve as clue     Aggressive  03   This strategy will catch most spam messages   It may also identify some legitimate messages  for example HTML  newsletters  as spam    Reasonable  05   This strategy is a compromise between  Aggressive and Reasonable    Conservative  08   This strategy will only catch messages that  are highly likely to be spam  
14.   browser  to access the server on the host  The word Server is also    336    Glossary    often used to refer to the computer on which the server software  runs  diluting the distinction between server and host in practice     In telecommunications  the host is the computer from which  information  such as FTP files  news  or WWW pages  is retrieved  On  the Internet  hosts are often also called nodes    Using an Internet host  as opposed to a Localhost   for example with  Telnet  one can work from a distance  Remote Access      ICMP    Next to the IP Protocol  there is an option with specific functions   The Internet Control Message Protocol  ICMP  is a special kind of  IP protocol used to send and receive information about the  network   s status and other control information  Many users are  already familiar with ICMP echo requests  type 8  and echo replies   type 0   as these are used by the ping program  When a computer  receives an echo request  its IP stack sends back an echo reply  This  is done with the ping program in order to determine  whether another  network component is reachable     IP    The Internet Protocol is the basic protocol of the Internet  and has  been used without change since it was first developed in 1974  It  handles the basic transmission of data from one computer to another   and serves as the basis for higher level protocols like TCP and UDP  It  handles the connection and error management  Technologies like NAT  and Masquerading allow large 
15.   firewall will forward Traceroute packets    Click the Enable button to enable the function  status light shows  green      Note     These two functions  Firewall is Traceroute visible and Firewall  forwards Trace route  are probably only useful when both are  enabled     Traceroute from Firewall  The Traceroute command can be used  on the firewall    Click the Enable button to enable the function  status light shows  green      202    Using the Security System    Ping Settings    Ping settings This window contains con   Firewall is Ping visible   _ Disable a 2   ppe     __   figuration options specific       Firewall forwards Pings   _Disable_     Ping from Firewall  Disable to ICMP Ping   Further information about  Ping can be found in chapter 5 3 8 on page 177           Firewall is ping visible  When this function is enabled  the firewall  will respond to Ping packets  Click the Enable button to enable the  function  status light shows green      Firewall forwards Ping  When this function is enabled  the firewall  will forward Ping packets  Click the Enable button to enable the  function  status light shows green      Ping from Firewall  The Ping command can be used on the firewall   Click the Enable button to enable the function  status light shows  green      5 5 3  Advanced    Connection Tracking Helpers    SESS The Stateful Inspection  saa   Ee Packet Filter and the NAT  function are provided by the  iptables module in the Net   filter sub system  All connections  ope
16.   given order     Use NTP Server  In order to configure the system clock  manually  please ensure that No NTP Server is selected here  In  this case  the Please select drop down menu will be displayed   If a NTP Server is selected  select No NTP Server from the  drop down menu    Time Zone  Now select the time zone     Note     Changing the timezone will only change the current system time  A if you are using an NTP server to control time settings     Use slow adjustment  When this function is selected  the  security system will attempt to minimize the    time warp    effects  mentioned above     46    Using the Security System    Note      When resetting  the system time will be adjusted to the newly  set time in small steps  When the time differences are large  this  adjustment process can last days or even weeks     Set Time  Enter the current date and time here     Take note of the issue date of your License Key  If this date is  after the current date set on the security system  the license will  be deactivated       Important Note     The 30 day Evaluation License will not automatically activate     5  Click the Save button to save these settings     The time settings of the security system will now be updated     Synchronizing system time with NTP Server    Before the system clock of the Internet security system can be  synchronized with an external server  this server must be defined as  NTP Server  The NTP Server will be defined as a network consisting  of only one c
17.   performance and security  of relevant system parameters and remedies deviations  exceeding  given tolerances  Subsequently a report will be sent to the competent  administrator by e mail     This Self monitoring of the security system ensures that central  services such as the Syslog Daemon  HTTP Proxy  and Network  Accounting are functioning properly    Access rights to files are monitored  as is the resource usage of  individual processes  This is designed to prevent an overload of the  system  Moreover  the system administrator is informed in time on  previsible resource bottlenecks  if  for example the available disk  space is running short  This allows for an early implementation of  measures in favor of a system extension and or discharge     SMTP proxy  The activities of the SMTP proxy are recorded to these  log files  All ingoing e Mails will be listed there  In addition  all  irregularities  such as assigned Bounce conditions  interruptions or  blocked e mails will be logged     SOCKS proxy  The activities of the SOCKS proxy are recorded to  these log files     SSH remote login  Information on the log in processes to the  remote shell is recorded to these log files     System log messages  These Log Files record generic information  about the daemon processes running on the system  Among other  things  the access to the SNMP service and the activities of the  Dynamic DNS function  are recorded to these log files     319    Using the Security System    Up2Date Servi
18.   please check    logfile partition mounted at  var log is filling       up   please check    storage application partition mounted at     var storage is filling up   please check    Up2Date partition mounted at  var up2date is    filling up   please check  System Up2Date  System Up2Date started    Further information on the Up2Date Service can    be found in chapters 5 1 3 on page 54     System Up2Date  No new System Up2Date packages    available    System Up2Date succeeded  Prefetched new System             Up2Date package  s     For more Up2Date package information please see  attachted Up2Date description file   Further information on the System Up2Date can be    found in chapters 5 1 3 on page 54        System Up2Date failed  License is not valid    System Up2Date  Started System Up2Date install     lation in HA Master Mode          System Up2Date  New System Up2Dates installed    321    Using the Security System    323    350    351    352    353  354    360    361    700    710    322    Further information on the Up2Date package s     can be found in the notification e mail     System Up2Date  Started System Up2Date Instal     lation  Pattern Up2Date  Started Pattern Up2Date    Further information on the Up2Date Service can    be found in chapters 5 1 3 on page 54     Pattern Up2Date  No new pattern available for    Virus Protection    Pattern Up2Date  No new pattern available for    Intrusion Protection    Pattern Up2Date  Trying another pattern typ          Pattern 
19.   solution  the virus scanner  on system 2 will be automatically synchronized with system 1     61    Using the Security System    5 1 4  Backup                         Redicraalbatu The Backup function allows you   SE to save the settings of your Se   TR curity system to a file on a local  Kdvanced disk           Encryption       This backup file allows you to  se    install a known good configur                                         E      ation on a new or misconfigured  E Mail Addresses o l   security system  This is espe   co   cially useful in case of hardware    failure  as it means replacement  systems can be up and running  within minutes     Attention     Version 5 0 of the security system can only load backups from  version 4 021 or higher     Install the License Key in the Licensing menu before loading the  backup  Without the appropriate license  the system will only support  three network cards   under certain circumstances  this can lead to  WebAdmin not being reachable     62    Using the Security System    Note     After every system change  be sure to make a backup  This will  ensure that the most current security system settings are always  available  Make sure that backups are kept securely  as the backup  contains all of the configuration options  including certificates and  keys     After generating a backup file  you should always check it for  readability  It is also a good idea to use an external MD5 program to  generate checksums  this will allow y
20.   the proxy will use the Internet wide ROOT name servers  If  you or your ISP runs a name server that is closer  you should enter  its IP address here  This means  however  that they are usually slower  than closer name servers    The ROOT name servers are an integral part of the Internet  15 ROOT  name servers are distributed worldwide and are the basic instance for  all secondary name servers     Tip    Even if you do not plan to use the DNS proxy  you should enter the  address of your provider   s DNS server address as a forwarding  server  Those will be used by the firewall itself  even if the proxy is  disabled  This contributes to the discharge of the root name server    and the firewall produces only local queries  which generally receive  faster replies     Configuring the DNS Proxy    1  Inthe Proxies tab  open the DNS menu    2  Click the Enable button to start the proxy   Another entry window will open    3  Make the following settings     A description of how to use the selection field tool can be found  in chapter 4 3 2 on page 36     Interfaces to listen on  Select which network cards the DNS  proxy server should be reachable on  This should usually only be    228    Using the Security System    the internal network cards    Network cards are configured in the Network Interfaces  menu  Further information is available in chapter 5 3 2 on page  119     Allowed Networks  Select which networks should have access  to the proxy server     A Security Note   In the All
21.   them  The information can  also be updated manually    by clicking on the Reload button  Don   t use the Refresh button of    the browser  because this will  configuration tool     log you out of the WebAdmin    299    Using the Security System    CPU Load  Daily Graph   This diagram shows the current utilization    of the CPU     Memory Usage  Daily Graph   The current RAM utilization statistics  are shown here  When more functions and subsystems are enabled on  the firewall  more RAM will be required to support them     SWAP Usage  Daily Graph   This diagram shows the current  amount of swap space being used  Swap space is used to supplement  RAM  if your system is running out of available RAM  you will see a    sharp increase in swap usage     5 8 4  Network    Report  Network Usage Graphs       Traffic   lo  Daily Graph     Traffic   lo  Daily   bot     4 i    bits per second    o  10 00 12 00 14 00 16 00 18 00 20 00 22 00 00 00 02 00 04 00 06 00 08 00    O Inbound current  42 31 k Average  12 51 k Maximum  28 81 k  M Outbound Current  12 31 k Average  12 51 k Maximum  28 81 k    Show all graphs for lo    Traffic   ethO  Daily Graph        Traffic   eth0  Daily   Se    eo    bits per second    40 00 12 00 14 00 16 00 18 00 20 00 22 00 00 00 02 00 04 00 06 00 08 00  E Inbound current  26 60 Average  113 07 Maximum  1 94 k                300    This menu shows current  statistics relating to net   work traffic  These dia   grams will not be useful  unless the network card
22.  113  introduction sese 110  Service group  defining   112  Services  FILES oncion raea 113    SEIrVICES saai a aia 110  Settings  sa  nak oaar enasi 44  Shut OWN       cccceeeee eee eees 102  Shut down Restart            102  SMTP  block RCPT hacks          243  CONFIQUIE          cece ee ee eee 239  DoS protection             239  encryption authentication  PEA siete TES 241  Expression Filter           247  File Extension Filter       245  global whitelist             242  introduction    s s s  238    MIME Error Checking     244  postmaster address       239  Realtime Blackhole Lists 248  Sender Address Verification    swabvad nies aa aE aide 248  Sender Blacklist            243  Spam Protection   248  249  Virus Protection            246  Virus Protection Content   Filter ceperan 243   SMTP Relay   Virus Protection            246  SNMP Access   authorizing access           69  SOCKS Proxy   CONFIQUIING             ee eee 230  SOCKS Proxy   user authentication       230  Static Routing   defining routes             156   introduction    sss 155  Strict TCP Session Handling   ana ap a eaa 205  Surf Protection   assigning profiles          225   categories ssscsccrrerc 219   content removal           220   editing Surf Protection   categories esses 216    Index    enabling  profiles adding  E NTE 221  introduction sses 215  profile assignment table 223  profile functions    218  224    profiles editing              221  profiles table            045 217  URL blacklist      
23.  255 255    Comment  optional   Enter a comment     Confirm the entries by clicking Add Definition     Under Packet Filter  open the Rules menu and enter the  following rule     Source  Any  Service  Any  Destination  Broadcast32    Action  Drop  Comment  optional   Enter a comment     Confirm the entries by clicking Add Definition     Using the Security System    Segment wide Broadcast     For each network card configured in the Interfaces menu  the system  automatically defines a network named NAME  Broadcast     For more information  please see the Current Interface Status  section of chapter 5 3 2 on page 119     1  Under Packet Filter  open the Rules menu and enter the  following rule     Source  Any  Service  Any    Destination  Select the broadcast network for the relevant  interface here   Example  NAME  Broadcast     Action  Drop    Comment  optional   Enter a comment     2  Confirm the entries by clicking Add Definition     199    Using the Security System    5 5 2  ICMP    ICMP Settings       ICMP Settings        This menu is used to config   ee       ure the settings for Inter   Log ICMP Redirects   tute     net Control Message Pro    tocol  ICMP  packets    ICMP is used for testing network connectivity and troubleshooting    network problems           Note     More information on ICMP can also be found in the Ping and  i Traceroute sections     ICMP on firewall and ICMP forwarding apply to all IP addresses   Any   When ICMP on firewall is activated  green status 
24.  Address of interface    Internal       Te CSE CE ITE  I CENCE EST SSE The network table contains    Internal  Network  Interface up  192 168 5 0 24 Network on interface    Internal          static networks which have  been pre defined  By default  the table contains next to the definitions  for the internal network card ethO additional statically entered  networks  These statical networks cannot be edited or removed  The  hosts and networks can be grouped together  These groups will be  treated as individual hosts and networks and can belong to an  upstream group  The network types are represented by symbols     The following pages contain a description of the different network  types available and of how they are defined     103    Using the Security System    The network types are represented by symbols     The Symbols    Icon    JEL         m    Spalte   Network type  Network type  Network type  Network type  Network type  Network type    Anzeige  Einstellung  Interface   Host Server   Network   Network group   DNS server    IPSec user group    Adding Host     1     2  3   4    5     Under the Definitions tab  open the Networks menu   Click on the New Definition button   The entry window will open     Make the following settings   Name  In the entry field  enter a unique host name     This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters  are alphanumeric characters  minus      space      and  unde
25.  Attributes  every user  account in the directory must be edited to define access rights  This is  done by setting a particular attribute for each user which either grants  or denies access to a service           o onsale Roct  Active Direto d Computers  LDAP exampleco pleco E 0x  j j    ange a The following example illus     a  m Gots   e  gt  Be lui byes trates the configuration for a    Tree  Faves   Te Te aie                                  Console Root    Guin bultinDomain r  mmni Bons coe ee hypothetical small company    post edt  Zvevelcpenent Organizational   EG fet Users and Corte  E  Domain Contr    Organizational    Default container for new    raamat ctam Defaat carats example com   e    nt Organizational           The user John Smith is in the       Default container For upar                 pim Eme Trainees directory    a DN  cn john smith   ou trainees  dc example   dc com    l LogonName        smith example com    80    Using the Security System    This user can use his LogonName and password to log on to services  like the SOCKS Proxy  The security system checks the user   s DN and  password  If there is only one DN that corresponds to  smith example com  and if the supplied password is valid  the user  will be allowed to use the SOCKS proxy     If you wish to use Group Membership to control access rights   complete the following steps to configure the Microsoft Active  Directory     Step 1   Creating a Security Group     1  In the Microsoft Management Conso
26.  Comment      1    none  DOB Marketing   HTTP  f      Any   amp  Example rule       3  Make the following settings     Position  Define the line of the table  in which the packet filter  rule will be entered  It is possible  to change the sequence of the  packet filter rules later  By default  the rule is placed at the end   To Bottom  of the rules table    Group  For a smooth management of the set of rules  the  packet filter rules can be grouped together in one group  This  does not influence the way  in which a rule will be processed  within the set of rules     190    Using the Security System    For the first rule  no group can be selected from the drop down  menu yet  New groups are defined in the set of rules table     Source  In the drop down menu  select the source address of  the data packets  The Any setting applies to all IP addresses   regardless of whether these are publicly assigned IP addresses  or private IP addresses according to RFC1918     Service  Use the drop down menu to select a service     This list includes all the pre defined services included in the  Security system  as well as the ones that you defined yourself   This allows you to define precisely which traffic should be  allowed  The Any setting represents here all combinations of  protocols and source and or destination ports    Destination  In the drop down menu  select the source address  of the data packets     The Any setting applies to all IP addresses  regardless of  whether these are pub
27.  DNS servers in this selection field   SMTP Servers  Select the SMTP servers in this selection field   SQL Servers  Select the SQL servers in this selection field     Telnet Servers  Select the Telnet servers in this selection field     187    Using the Security System    5 5  Packet Filter    The Packet Filter is the central part of the firewall  In the Rules  menu you define the allowed data traffic between the networks and  hosts in the form of Packet filter rules  You can also define specific  packets  which will never be allowed to pass through the firewall  The  packet filter management is done in the Rules table    The tools in the ICMP menu allow you to check the network  connections and functions of the security system  The additional and  reporting functions are available in the Advanced menu     The Rules menu allows you    sere  aa       to define packet filter sets of     rules  These rules are de    ec  fined with the help of the   i o Sm A network and service defin   itions                    Destination   Any                In general  there are two basic kinds of packet filtering policy     e Default allow   the rules explicitly define which packets are  blocked  all others are allowed     e Default deny  the rules explicitly define which packets are allowed   all others are dropped     This security system uses a Block all packets policy  as this policy is  inherently much more secure  This policy requires you to define  explicitly  which IP packets will be 
28.  Filter Type  This drop down menu allows you to filter  e mails  that have been filtered by a specific function from the  Content Filter Modules    Sender  This drop down menu allows you to filter e mails with a  specific sender address    Recipient s   This drop down menu allows you to filter e mails  with a specific recipient address     3  Click the Apply Filters button to start the filter     In this case  only the filtered e mails will be displayed in the table   Once the menu has been left  all protocols will be displayed again     259    Using the Security System    5 7  Virtual Private Networks  cPSec VPN     A Virtual Private Network  VPN  is a secure connection between  two networks over an untrusted network  such as the Internet    VPNs are very useful when sensitive information must be transmitted  or received over the Internet  The VPN prevents third parties from  reading or modifying the information in transit  The connection is con   trolled and secured by the software installed at the connection end   points  This software implements authentication  key exchange  and  data encryption according to the open Internet Protocol Security   IPSec  standard     Only authenticated computers can communicate through a VPN   protected connection  No other computer can transmit information  over this connection    VPN connections can be established between two hosts  one host and  one network  or two networks  When one endpoint is a single com   puter  the VPN connection w
29.  IP  address  example  192 168 2 1  and the host network mask  255 255 255 255     7 Name   Value    value  Any 0 0 0 0 0       30    Installation    The internal network Internal  Network   consisting of the de   fined IP address  example  192 168 2 1  and the defined net   work mask  example  255 255 255 0     The broadcast network Internal  Broadcast   consisting of the  broadcast address  example  192 168 2 255  ad the host net   work mask 255 255 255 255    Defining new Networks is described in chapter 5 2 1 on page  103     Configure the External Network Card    In the Network tab  open the Interfaces menu and configure  the interface to be used to connect to the external network   Internet   The choice of interface and the required configuration  depend on what kind of connection to the Internet you will be  using    The configuration of network cards and virtual interfaces is  described in chapter 5 3 2 on page 119     Define Masquerading Rules    If you wish to use private IP addresses for your internal network  and wish to connect directly  without proxies  to the Internet   you can now establish the relevant rules in the Network   NAT Masquerading menu    More information about DNAT  SNAT and Masquerading can  be found in chapter 5 3 4 on page 157    IP routing entries for networks directly connected to the security  system s network cards  Interface Routes  will be added auto   matically    If required  you can also define routing entries manually using  the Routi
30.  Internet connection   on an ADSL access the Uplink band   width amounts to 768 kBit s and on a 2 Megabit fixed connection  to 2048 kBit s    MTU Size  The MTU is the size  in bytes  of the largest  transmittable packet  MTU stands for Maximum Transfer Unit   For connections  using the TCP IP protocol  the data will be  grouped into packets  A maximum size will be defined for these  packets  Packets larger than this value will be considered too  long for the connection and fragmented into smaller ones before  transmission  These data packets will be sent again  However   the performance can be limited  if the upper value is too low   The largest possible MTU for an Ethernet interface is 1500 Bytes     The following values are the defaults for the Standard Ethernet  Interface  1500 Byte     7  Confirm these settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red     8  Enable the interface by clicking the status light     The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system    127    Using the Security System    requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     5 3 2 2  Additional Address on Ethernet  Interface       MOM One netw
31.  MTU 1500 Metric   RX packets 57108 errors 0 dropped 0 overruns 0 frame 0     TX packets  110137 errors 0 dropped 0 overruns 0 carrier 0  collisions 0 txqueuelen  100   RX bytes 6549452  6 2 Mb  TX bytes  18646106  17 7 Mb   Interrupt 5 Base address 0x8800             Link encap Local Loopback  inet addr 127 0 0 1 Mask 255 0 0 0   UP LOOPBACK RUNNING MTU 16436 Metric    RX packets 6504559 errors 0 dropped 0 overruns 0 frame 0  TX packets 6504559 errors 0 dropped 0 overruns 0 carrier 0  collisions 0 txqueuelen 0    RX bytes 646581897  616 6 Mb  TX bytes 646581897  616 6 Mb     Interface Information  All  configured internal and  external network cards are  listed here           305    Using the Security System    ARP Table  This table displays the current ARP cache of the system   It lists all known associations between IP addresses and hardware   MAC  addresses              Local Network Connections    Microsoft Internet Explorer Local Network Connec    host domain com  Local Network  Connections    m       tions  This table lists all   Active Internet connections  servers and established  g  Sa To oons Baaar o HSN current network connections  En o 0 127  1 783 LISTEN e    8 po a to the firewall  Connections  2S 6 ke E through the firewall are not  AER r shown   tep o 0 192   2172 443    TIME_WAIT  tep o 0 127  1 16498    TIME_WAIT  tcp o 0 127   6498    TIME_WAIT  tep o 0 127  116498    TIME_WAIT  tep 0 2824 192   2173 443 ESTABLISHED  tep o 27 0 0  1 16498 WAIT  er A nit n 
32.  Name  Give the new attribute a clear label  The  name of the service this attribute controls would be a good  choice    Example  Socks    Unique X500 Object ID  Enter the OID for this attribute in the  entry field    Syntax  Chose Boolean    Minimum  Leave this field blank     83    Using the Security System    4     Maximum  Leave this field blank     Save your settings by clicking OK     Step 3   Allocate a Class for the Attribute     1   2     Under Active Directory Schema  left click Classes   Right click Users    A window named User Properties will open    Click the Attributes tab and make the following settings     Optional  Use the drop down menu to select the attribute and  click Add     Save your settings by clicking OK     In the Microsoft Management Console  right click Active  Directory Schema     With the left mouse button  click Reload the Schema     Step 4   Setting the Attribute for Users     1     84    In the ADSI Edit window  right click the user to edit   Example  John Smith in the Trainees directory   Left click the Properties button    A window named Properties will open     In the Properties window  click the Attributes tab   Select which properties to view  Choose Both     Select a property to view  Choose the attribute to set   Example  Socks     Syntax  This value was set while creating the attribute and  cannot be changed   From step 2  this should be  Boolean     Using the Security System    Edit Attribute  You can use this field to set the value 
33.  Netscape  to communicate with the server     SOCKS    SOCKS is a proxy protocol that allows a point to point connection  between an internal and an external computer  SOCKS  often called  the Firewall Traversal Protocol  is currently at version 5 and must be  implemented in the client side program in order to function correctly     340    Glossary    Subnet Mask    The subnet mask  also called netmask  of a network  together with  the network address  defines which addresses are part of the local  network and which are not  Individual computers will be assigned to a  network on the basis of the definition     UNC Path    The Universal Naming Convention path is used primarily by  computers running a Microsoft operating system to uniquely  designate network resources  UNC paths are usually of the form    Server Resource     341    Index    Index  Accounting   adding deleting a network   CAN ie ETET 176   ACCOUNTING      eceeeeee ener ees 175  Acoustic signals   beep  5 times               102  Administrator e mail addresses   I Gad city die E EE E 44  Backup    editing e mail addresses   68  encryption of e mail backup    HE anaa eaa 66  generating e mail backup  file iaeaea saa 67  introduction         cccceeeees 62  Kor  a AE S 63  manual creation              64  Broadcast  Internet wide          0008 198  segment wide              199  Certificate for WebAdmin  installing soccer 95  Certificate for WebAdmin  GREALING iaoea iranan 95  Connection Tracking Helpers  introducti
34.  POP3 Proxy     _ Enable    for incoming e mails  The SMTP Proxy receives all e mails at the  gateway and then forwards them to their destination  Because there  is no direct contact between internal and external machines  only data  is transferred  and no protocol errors will propagate  The SMTP proxy  monitors the SMTP protocol on TCP port 25     Note     In order to use the SMTP Proxy correctly  a valid name server   DNS  must be activated  System notifications are sent to the  administrator even if the SMTP proxy is disabled     238    Using the Security System    Configuring the SMTP Proxy     1   2     In the Proxies tab  open the SMTP menu   Click the Enable button next to Status to start the proxy     In the Global Settings window  configure the basic settings     Hostname  MX   Enter the hostname here     Important Note    If you wish to use TLS encryption  this hostname must be  identical with the one listed in your DNS server   s MX record   Otherwise  other mail servers using TLS will refuse to send  incoming mails     Postmaster Address  Enter the e Mail address of the post   master here    Max message size  Enter the maximum message size for in   and out bound mail messages  Normal values are 20 or 40 MB   Please note that the encoding used to transmit e mails can make  the size of the message larger than the files sent     Save your settings by clicking Save     Enable the DoS Protection by clicking the Enable button    In order to protect the security system a
35.  RBL Warning  When the Realtime Blackhole Lists  RBL   function is enabled and the sending domain is listed in the Zones  list  this header will be added  Note that this header will only be  added if the RBL system is configured to Warn     Creating rules in Microsoft Outlook 2000     MS Outlook allows you to sort those e mails  which had been filtered  and subsequently been allowed to pass through the Firewall  provided  that the Pass function in the Action drop down menu of the  corresponding modules on the Firewall has been selected     1     2  3   4    Start MS Outlook   Click on Inbox   Open the menu Tools Rules Wizard     Click on the button New     The Rules Wizard opens  in order to set new rules  The Rules  wizard now leads you step by step through the configuration     Which type of rule do you want to create   step 1     Select the rule Check messages when they arrive     252    Using the Security System    Then click on the button Next   Which condition s  do you want to check   step 2     In this window  select the condition with specific words in the  message header    In the window Rule description click on the underlined portion  of text and type the header s name into the input field Search  text    Example  X Spam Score   Then click on the button Next     What do you want to do with message   step 3     Define in this window  what has to be done with the filtered e   mail  If for instance  you want to move the filtered e mails to a  specific folder  select 
36.  Reset    Password end kactory Revet    The Password Reset function   E      allows you to set new pass    words for the Security system    E Enea br an ete Sano If you log in to the WebAdmin   configuration tool for the first   time after this action  the Setting System Passwords window will   be displayed  This allows you to set optional passwords  such as the   Astaro Configuration Manager Password  Halt System will shut down   the Security system  After the restart  the Setting System Pass   words window will be displayed at first              49    Using the Security System    The Factory Reset function resets all configuration settings and op   tions to their original state  All data entered after the initial instal   lation will be deleted  including the HTTP Proxy Cache  the entire E   Mail Queue  Accounting and Reporting data  passwords  and  uninstalled Up2Dates    The software version will not change  That is  all System Up2Dates  and Pattern Up2Dates that have been installed will be retained     5 1 2  Licensing    Some of the functions of the  security system  including the  Up2Date Service  High  Availability  HA   Surf Pro   tection  Virus Protection  ent yau eae as ae sted an d th e Support service  from the Astaro partners  can  only be used with a valid  EEE T License Key  You can obtain  Eee detailed information about  licensing and the corres   ponding licence keys at any certified Astaro Partner  or from Astaro   salesus astaro com  America   s  and sales
37.  System    286    Attention     With a road warrior IPSec tunnel  the Virtual IP Key function  must be enabled if you wish to use the NAT Traversal function  and the L2TP Encapsulation function is disabled    The IP address entered here should not be used anywhere else   and cannot be a part of a directly connected network     Use the Key type drop down menu to select the IKE authenti   cation method  Further options are available depending on the  chosen Key type     PSK  The firewall only supports using IPv4 Addresses as VPN  Identifiers during the key exchange phase of IKE Main Mode   Enter the shared password in the Preshared Key field    If you wish to configure many road warrior connections  you only  need one PSK for all connections     A Security Note    Use a secure password  Your name spelled backwards is   for example  not a secure password   while something like  xfT35 4 would be  Make certain that this password does  not fall into the wrong hands  With this password  an  attacker can build a VPN connection to the internal  network  We recommend changing this password at regular  intervals     RSA  The key pair consists of a private key and a public key     In order for the endpoints to communicate  they must exchange  their public keys  Public keys can be exchanged via e mail    In the VPN Identifier drop down menu  choose the VPN ID type  of the endpoint  If you select E Mail Address  Full qualified  domain name or IP Address  you must enter the address or  name
38.  The HTTP Proxy Cache proxy stores a  copy of often visited pages locally  reducing load times     By clicking the Start button  the cache will be cleared  and any new  accesses will be loaded from the remote Internet site     5 6 2  DNS       The DNS Proxy service al                             Status eo  _Disable_   eae     lows you to provide internal  clients with a secure and  Select io append F  efficient name server ser   ae a E vice  If you select multiple  Cera eres z remote name servers  they  oaao em ose ey will be queried in the order                   they are entered        The DNS entries in network definitions are resolved every minute by  the DNS Resolver  If now a DNS entry refers to a Round Robin DNS   the definition can be actualized every minute  The Round Robin DNS  process offers an easy opportunity to distribute user requests to  individual servers  such as to a server farm  With the Round Robin   DNS  the IP addresses of all servers of the server farm are assigned  to a hostname in the Domain Name Service  DNS   If clients now    227    Using the Security System    request the IP address of this hostname there  the DNS sequentially  reports these IP addresses back  Thus  a distribution of the client  requests to the respective servers is achieved    The disadvantage of the Round Robin process is that neither a failure  nor the utilization of the individual servers is accounted for     If no name servers are entered in the Forwarding Name Servers  menu
39.  This header is set to Yes when the proxy classifies  a message as spam     235    Using the Security System    e X Spam Report  The proxy identified a message as spam  The  added Multiline Header contains a readable and accessible anti   spam report     Spam Sender Whitelist  This control list can only be defined for the  Spam Protection option  Enter the e mail addresses of those  senders into the list  whose messages you wish to allow through     File Extension Filter  The firewall filters attachments with the ex   tensions from the control list     Expressions Filter  This function allows to filter all e mail texts and  attached text files  that pass through the POP3 proxy by specific  expressions  The expressions are defined in the check list in the form  of Perl Compatible Regular Expressions     236    Using the Security System    5 6 5  Ident    TATRA The Ident protocol allows   Status  eo Disable     ETE oe me    external servers to asso   ciate a username with   given TCP connections    While this connection is not encrypted  it is nevertheless necessary for   many services              Default Response  Riaemon Save          If you enable the Ident function  the security system supports Ident  queries  The system will always reply with the string that you define  as Default Response  irrespective from which local service the  connection will be started     Forward Connections  Ident queries cannot be answered through  Connection Tracking  You can get around this di
40.  Trusted Domains  In the ordered list a Global Whitelist can be  defined with a reliable Domain name     A Security Note   This function should only be used carefully  since sender ad   dresses can easily be falsified     242    Using the Security System    5 6 6 1  Virus Protection Content Filter    Block RCPT Hacks    When this function is enabled  the proxy will reject e mails with a  sender address containing the characters          or    In addition   addresses with an extra   symbol  or which begin with a dot     will  also be blocked     Sender Blacklist    This function allows you to create a list of sender addresses  for  example those of known spam senders  The proxy will then reject all  messages with these addresses in either the From or Reply To  headers     Enter the e mail addresses according to the following description into  the Patterns control list     e To block e mails from a certain address   Entry  user domain com    e To block all e mails from a certain domain   Example    domain com    e To block all e mails from a certain user  no matter what domain is  used to send the message   Example  user      The function of the Control List is identical to the Ordered List and  described in chapter 4 3 4 on page 39     If the firewall receives an e mail from a blocked address  a 5xx error  code will be issued with the message Your address  envelope or  header  is blacklisted at this site     243    Using the Security System    MIME Error Checking    The MIME E
41.  activate a rule  click the status light once    the status light will turn green    Please note that  because the security system uses Stateful    14     15     Installation    Inspection  only the connection building packets need be  specified  All response packets will automatically be recognized  and accepted    Configuring the Packet Filter is described in chapter 5 5 on  page 188     Debug Packet Filter Rules    With the Packet Filter Live Log function In the Packet Filter   Advanced menu  you can see which packets the packet filter is  filtering  If you have problems after installing your security  system  this information can be helpful in debugging your  filtering rules     The Packet Filter Live Log function is described in chapter  5 5 3 on page 203     Install System and Virus Scanner Updates    You should download and install the latest System Up2Dates as  soon as possible     If you have a license for the Virus Protection module  you  should also run the Pattern Up2Date system     The Up2Date Service option is described in chapter 5 1 3 on  page 54     When you ve completed these steps  the initial configuration of your  security system is complete  Click the Exit tab to leave WebAdmin     Problems    If you have problems completing these steps  please contact the  support department of your security system supplier  or visit the  Astaro Bulletin Board at     http    www astaro org    33    WebAdmin    4  WebAdmin    The WebAdmin tool allows you to configure eve
42.  admin             Please remember that the goal in configuring a security system like  this should be to enable only the features necessary for correct  functionality  In general  you should restrict in  and outbound con   nections to those explicitly required     Tip   Draw up a plan of your network and determine which computer is to  have access to which services before configuring the security    system  This will simplify the configuration process and save you a  lot of time     Configure the system as follows   1  Define all the required networks and hosts   2  Define the necessary services     3  Define the system rules and proxies     42    Using the Security System    Starting WebAdmin     1           Start your browser and enter the address of the Security system   i e   the address of the ethO interface  as follows   https   IP Address     In our example from step 6 of the installation instructions in  chapter 3 2  this would be https   192 168 2 100     If you have not yet generated a Certificate for your WebAdmin  site  a Security notice will appear    More information on how to install a certificate is available in  chapter on page 94     Click the Yes button on the security notice to continue     Log in to WebAdmin     Login to WebAdmin       User  admin    Username       admin       ies Password  the password  of the WebAdmin user   Both entries are case sensitive    Click Login     Another administrator is already logged in        eS If another administrator 
43.  astaro com  Europe   Asia Pacific and Africa      a  AStTARO Onine Demo Downloads    Sign in to MyAstaro    What is your e mail address   My e mail address is                      First you need the Activation Key  With this Activation Key you  enable the License Key in MyAstaro  This allows you to select the  licensing period of the Internet security system yourself  You can thus  first install the software and then register your licence in the licence  portal   only from this moment of time on  starts the time period for  the acquired options     50    Using the Security System    Note     te Activation Keys cannot be used directly in the WebAdmin     configuration tool  Please register at MyAstaro first     Creating an User Account     1   2     Open your browser and go to the site https   my astaro com   Log in under MyAstaro     What is your e mail address   The e mail address is used for the authentication  As new cus   tomer enter the e mail address into this entry field     If you have already used the Registration Portal for Astaro  Security Linux V4  enter the e mail address that you have used  for this registration into the entry field  If you don   t remember  the e mail address that you used  you can request it under the  Returning Registration Portal users dialogue  You ll need  your Username and the Password    Do you have a MyAstaro password    If you log in for the first time under MyAstaro  click on the No  I  am a new user check box  If you are already a u
44.  can configure a standby connection through a second inter   face  If the primary connection fails  the uplink will automatically  be set up through the second interface     Note     You need two separate Internet accesses and one additional  network card for the Uplink Failover on Interface function   Please  note that the Security system only supports one DSL   connection  A standby connection for accessing the Internet can  therefore only consist  for example  of a fixed connection and a  DSL access     Uplink Failover on Interface is by default disabled  Off   If  you wish to use this virtual interface as primary connection   select Primary Interface from the drop down menu  If this  interface shall contain the standby connection  select the  Backup Interface configuration    Uplink Failover check IP  Once the Uplink Failover on  Interface function has been enabled  this entry field will be  displayed  Enter the IP address of a host that replies to ICMP   ping requests  e g   the DNS server of your ISP   The security  system will send ping requests to this host  if no answer is  received  the backup interface will be enabled by the failover  In  this entry field  there must always be an IP address for the  failover    QoS Status  In order to use Quality of Service  QoS   bandwidth management on an interface  enable this option  To  enable the Quality of Service  QoS  module  select On from  the drop down menu     147    Using the Security System    148    Important Note  
45.  connected to the security system must also be  configured as an untagged port  Most VLAN compatible switches can  be configured by using a terminal program over a serial interface     140    Using the Security System    Example configuration     The graphic at left  shows an office where  computers are distrib   uted across two  floors  Each floor has  a separate switch   and the each com   puter is connected to  the switch on its floor   In this configuration  PC1 and PC2 on the first floor and PC4 on the  second floor will be connected together on VLAN 10  PC3  PC5 and  PC6 will be connected together on VLAN 20           SS  gt   gt     gt     a  d      tagged          The two switches must be configured as follows   Switch a Switch b    Port VLAN Tag   tagged   untagged    1 10 20  T  2 PC4   10 U  3 PC5   20 U  4 PC6   20 U    In this configuration  it seems to PC3 as though it were connected  through a single switch to PC5 and PC6        In order to connect the computers to an external network  e g   the  Internet   the interface on the security system  in the example  this is  eth2  must be configured to support the VLANs     141    Using the Security System    In order to configure a Virtual LAN interface  you will need a    Attention     network card with a tag capable driver  The hardware supported by  the security system is listed in the Hardware Compatibility List for  Astaro Security Linux available at http   docs astaro org     Configuring a Virtual LAN     1   
46.  deci cadet ceedagerte 36  online help               eeee 40  refreSh     ccecceeeeeeeeeeeeeees 41  selection fields                36  Startihg sa  imeen iosas 43  status light cec 36  tab  liStsvc cca viee cess 35    WebAdmin Site Certificate     94          OW AN ji01   ale ANE    www  astaro com       
47.  deletes or sends them     On the right side  next to the status symbol for those e mails   which are kept in quarantine  it is displayed which function blocked  the message     SP  Spam Protection   VP  Virus Protection   Filter  File Extention Filter  EXP  Expression Filter  MIME  MIME Error Checking    e permanent error andauernder Fehler  B   The e mail con   tains a permanent error     Sender  The sender of an e mail is displayed in this column  For the  SMTP type  this is the sender address on the enveloppe     256    Using the Security System    For the POP3 type  this is the address of the   From   header of an e   mail  If no sender address is displayed  the e mail contains the  additional status Bounce     Recipient s   The recipient of an e mail is displayed in this column   For the SMTP type  this is the recipient   s address on the enveloppe   For e mails with the deferred status  the delivery status will be  displayed separately for each recipient  Deferred       or permanent    error          The drop down menu at the bottom of the table shows further  functions to manage single e mails  Click the selection box next to an  e mail to manage it    The following functions are available     Delete  All chosen e mails will be deleted     Force delivery  All chosen e mails will be forwarded to the recipient  addresses  even those having a quarantined status  For e mails with  a deferred or permanent error status  it is being tried again to  deliver the message  If th
48.  easy to configure if the  network already has a Primary Domain Controller  PDC  or if a  server with a user database is running    The drawback  however  is that this system does not distinguish  between different user groups  You can either allow all users in an  SAM database access to a proxy or none of them     Configuring SAM   NT 2000 XP     SAM  NT 2000 XP  Server Settings                   In order to use this authenti   cation method  you will need to  have a Microsoft Windows NT or  2000 server on your network  that contains the user infor   mation  This can be either a    Primary Domain Controller  PDC  or a standalone server     Note that Windows servers have a NetBIOS name  the NT 2000  server name  as well as an IP address     1  Inthe System tab  open the User Authentication menu     76    Using the Security System    In the SAM  NT 2000 XP  Server Settings window  click the  Enable button next to Status     PDC Name  Enter the name of the Domain Controller in this  entry field    Since  beginning with Windows 2000  these names are also  official DNS names  only names consisting of alphanumeric   minus      and period     characters are allowed    Other characters  for example    _   are not allowed    PDC Address  Enter the IP address of the Domain Controller   BDC Name  If you have a Backup Domain Controller  enter its  name in this entry field  If you do not use a BDC  enter the name  of the PDC here    BDC Address  If you have a Backup Domain Controllers  e
49.  for HTTPS connections     Content Removal  In the access control list enter those expres   sions that should be deleted from the Web pages     Make the settings for the Content Filter functional group     Embedded Object Filter  Clicking on the symbol enables ce   and disables  GaP  the filter     A Security Note   Enable the Embedded Object Filter function only  if high  security demands apply to your network                S    cript Content Filter  Clicking on the symbol enables     and  disables     the function     A Security Note   Enable the Embedded Object Filter function only  if high  security demands apply to your network     Virus Protection  Clicking on the symbol enables      and    disables     the function     Surf Protection Profile is now edited  Now assign the profile in    the Profile Assignment table to a Network or to a Local User     222    Using the Security System    The Profile Assignment Table    The Surf Protection Profiles from the Profiles table are assigned to  Local Users or Networks in the Profile Assignment table     To assign a Surf Protection Profile to a local user  the HTTP proxy  must be used in the User Authentication Mode  The assignment of  Profiles to a network is possible in every operation mode     If you are simultaneously assigning a Profile to a local user and to  a network  this Profile will only take effect  if the user accesses the  HTTP proxy from the  configured    network  Only one Surf Protec   tion Profile can be config
50.  from the drop down menu     Month  This drop down menu allows you to filter log files by a  given month    Type  This drop down menu allows you to filter log files by a  specific type    To start the filter click on the Apply Filters button     Only the filtered log files will be displayed in the table  Next time  when you open the menu  the complete log file table will be  displayed     315    Using the Security System    5 9 3 1  Log Files    This chapter contains all available logs  These log files will only be  displayed in the Browse menu  if the correspondent processes have  been recorded by the System  The following Accounting data log  file  for example  will only be displayed  once the Accounting func   tion has been enabled in the Network Accounting menu     Accounting data  These log files contain all Accounting logs   archived by the system  The Reporting Accounting menu allows  you to view the current logs     Astaro Configuration Manager  If the Internet security system is  configured remotely via the Astaro Configuration Manager  the  correspondent processes will be logged to these log files     Astaro User Authentication  The activities of the AUA Daemon are  logged to these log files  AUA is used as the central authentication  daemon for various services     Boot messages  The boot messages are recorded to these log files     Configuration daemon  The activities of the AUA Daemon are  logged to these log files  The log files belong to the support logs and  w
51.  host and  user certificate of incoming IPSec connections  this type of CA is  called a Verification CA    If a CA saves its private key  it can be used to sign certificate  queries  in order to produce a valid certificate  This CA is called a  Signing CA    The system can contain a number of Verification CAs  but only one  Signing CA     Host CSR  Certificate Signing Request   This is a request to have  a certain certificate signed  When it is given to a Signing CA   and  the CA verifies the identity of the owner   the CA sends back a fully   formed and signed Host Certificate     290    Using the Security System    Host Certificate  This certificate contains the public key of the host  as well as identifying information about the host  such as IP address  or owner   The certificate is also signed by a CA  verifying that the  key does indeed belong to the entity named in the identification  information  These valid certificates are used to authenticate remote  IPSec hosts user endpoints     Certificate Auth        The drop down menu at    the bottom of the table  allows you to download  certificates in various for   mats  or to delete certifi   cates from the system        PEM  A format encoding the certificate in ASCII code  The certificate   request  and private key are stored in separate files     DER  A binary format for encoding certificates  The certificate  re   quest  and private key are stored in separate files     PKCS 12  A    container file     One file can conta
52.  in the entry field below    X509  Use the VPN Identifier drop down menu to select the  kind of VPN ID to use  If you select E Mail Address  Full    Using the Security System    qualified domain name or IP Address  you must enter the  address or name in the entry field below    In order to use a Distinguished Name as an ID  you will need  the following information from the X 509 index  Country  C    State  ST   Local  L   Organization  O   Unit  UO   Common  Name  CN  und E Mail Address  E Mai      4  To save the new IPSec remote key object  click Add     The new remote key object will appear in the Remote Keys table     CA Management Remote Keys are shown in a separate table     287    Using the Security System    5 7 5  L2TP over IPSec    L2TP over IPSec is a combination of the Layer 2 Tunneling Protocol  and of the IPSec standard protocol  L2TP over IPSec allows you   while providing the same functions as PPTP  to give individual hosts  access to your network through an encrypted IPSec tunnel  On  Microsoft Windows systems  L2TP over IPSec is easy to set up  and  requires no special client software     For the MS Windows systems 98  ME and NT Workstation 4 0   Microsoft L2TP IPSec VPN Client must first be installed  This  client is available from Microsoft at     http   www  microsoft com windows2000 server evaluation news bull  etins I2tpclient asp    L2TP over IPSec Settings       LAP creme Saito Authentication  Use this  rare drop down menu to con   figure the authentic
53.  is configured in the Proxies DNS menu  Please see  chapter 5 6 2 on page 227 for a description of how to use the DNS  proxy    NetBIOS networks can also use a WINS server for name resolution   WINS stands for Windows Internet Name Service  WINS servers are  MS Windows NT servers with both the Microsoft TCP IP stack and the  WINS server software installed  These servers act as a database  matching computer names with IP addresses  thus allowing com   puters using NetBIOS networking to take advantage of the TCP IP  network     1  Inthe Network tab  open the DHCP Server menu     2  In the entry fields DNS Server 1 IP and DNS Server 2 IP   enter the IP address of your name servers     3  In the Gateway IP entry field  enter the IP address of the  default gateway     4  If you wish to assign a WINS server  configure the following two  settings     WINS Server IP  Enter the IP address of the WINS server here     166    Using the Security System    WINS Node Type  Use the drop down menu to choose which  kind of name resolution clients should use  If you choose Do not  set node type  the client will choose by itself which to use     5  Save your configuration by clicking Save     Configuring Static Mappings    This function allows you to ensure that specific computers are always  assigned the same IP address  To configure this function  you will  need to know the MAC  hardware  address of the client   s network  card    Determining the MAC addresses of network cards is described on 
54.  list will show you a maximum of  events  A complete event history has been stored    in the Intrusion Protection log files     Using the Security System    5 10  Online Help    The Help menu contains further functions for use with the Online  Help system     Search    This function allows you to search WebAdmin   s Online Help system  for a particular term  Results will appear in a separate window     Starting a search    1  Under the Online Help tab  open the Search menu   2  Enter your search term in the Search term field    3  Begin the search by clicking seek     If the term is found in either WebAdmin or the Online Help system   the following results will be returned     e path to the relevant function in WebAdmin  e link to the relevant Online Help page    e Information on the function or texts of the Online help with the  expression  searched for    Glossary    The glossary explains the concepts and terms used in WebAdmin   Click a term to see a short explanation     333    Using the Security System    5 11 Exiting the Security Solution    If you close a browser running a WebAdmin session without using  the Exit function  the session will remain active until the timeout is  reached    In such a case you can again log in to WebAdmin  A screen will be  displayed  informing you that already another user is logged in  To log  in again  first end the other session by clicking the Kick button  If you  wish to end another administrator   s active session  you can type a  mes
55.  menu to select Load Balancing     163    Using the Security System    5  In the Pre Balancing Target window  select the original  destination address and service     Address or Hostname  Select the original destination address  here  This should usually be the external address of the security  system    Service  Select the destination port  service  to be balanced     6  In the Post Balancing Target Group drop down menu  select  the new address  This will usually be a network group composed  of single hosts     When the load balancing rule has been defined and saved  it will  appear in the NAT rules table  The further functions in the NAT table  can now be used for further customization     Editing Load Balancing rules  Click edit to load the rule into the  Edit NAT Rule window  The rule can now be changed as desired     Deleting Load Balancing rules  Click delete to remove a rule from  the list     164    Using the Security System    5 3 5  DHCP Server                      CREEKS 3 The Dynamic Host Con   oo  lt             figuration Protocol  DHCP   Range sters fast oo   automatically distributes ad   RS A dresses from a defined IP ad   e dress pool to client com   oo puters  It is designed to sim   WINS Server 12     plify network configuration on  Sec  aaa large networks  and to pre        Static Mappings MAC Address IP Address Comment       vent address conflicts  DHCP  distributes IP addresses  de   fault gateway information   and DNS configuration infor   mation to it
56.  needed    This allows for the use of Path MTU Discovery     IKE debug Flags  This selection field allows you to configure the  scope of IKE debugging logs  The IKE Debugging function must be  enabled in the IPSec VPN Connections menu     The following flags can be logged    e State Control  control messages on the IKE status  e Encryption  Encryption and decryption operations  e Outgoing IKE  Content of outgoing IKE messages  e Incoming IKE  Content of incoming IKE messages  e Raw Packets  message in unprocessed bytes    MTU  Enter a the MTU value in this entry field   By default the MTU value is already defined  1420 Byte     297    Using the Security System    5 8  System Management  Reporting     The Reporting function provides current information about the sys   tem  the state of various subsystems  and real time information about  various reporting functions  The displayed values are updated every  five minutes     The diagrams shown on the first page of the Reporting menus show  an overview of the current day   s activity  By clicking the Show all      button you can open a page containing graphics built from weekly   monthly  and yearly statistics     5 8 1  Administration    Report  Administrative Statistics Th e Ad m i n istration menu  CSS IT  SUES  TSU      contains an overview of the  Lae logins ss oe administrative events of the    Up2Date  Virus Protection  success failed    a st 3 0 d ays A       Config changes  total     System restarts  total     Uplink fail
57.  network  through the Internet     Then click on the Next button     4  If you have a permanent connection to the Internet  select the  following option Do not dial the initial connection   Then click on the Next button     Otherwise  select the Dial other connections first option and  select your provider from the selection menu  These settings can  be changed later in the Properties dialog box     5  In the Destination address entry field  enter the IP address of  the server     Then click on the Next button     6  In the Connection Availability window  select whether the  connection should be available to all local users  or just this  account     Then click on the Next button     173    Using the Security System    In the next text entry field  enter a descriptive name for this  PPTP connection     Then click on the Next button    In the Start Settings Network and Dialup Connections  a  right click on the new icon will allow you to open the Properties  window and configure further options    General  This allows you to change the hostname or destination  address of the connection  In the Connect First window  select  any network connections that need to be established before  setting up the PPTP session    Options  The dial and redial options can be defined here   Security  Choose the Advanced  Custom Settings  option   Next click the Settings button  Leave these settings as they are   Network  In the Type of VPN Server I am calling menu   select the Point to Point Tunnel
58.  network to  each security system within the HA device group  The IPs must  be within an address range and may only be used once within a  given device group  Example  The Device IP 10 0 0 1 is assigned  to the Internet security system 1 and the Device IP 10 0 0 2 to  security system 2     Encryption Key  Enter a password here     A Security Note   Use a secure password  Your name spelled backwards is     for example  not a secure password   while something like  xfT35 4 would be     Network Interface Card  Select a network card to be used for    the data transfer connection  When an interface is selected for  HA mode  it cannot be used in any of the other configuration  menus     Important Note     The network cards used for the connection must have the same  Sys ID  e g   eth3  on both systems    If you wish to use heartbeat monitoring  use this menu to  choose network cards on both the normal and standby systems  which support link beat     Transfer Network  Enter the Network Address for the data  transfer connection here     Note     Note  The data transfer connection must use a Class C network     A that is  a network with mask 255 255 255 0  The bitmask    form cannot be used   The data transfer network cannot be used for anything other  than data transfer     99    Using the Security System    The entry fields contain suggestions generated by the system   You do not need to accept the default values    Serial Interface  optional   In addition to watching the data  conn
59.  offers the platform indepen       _   _   _Tr_   cen_           dent flexibility to define  enable    and disable all necessary services    The Proxies incorporated into this security system transform it into   an Application Gateway capable of securing vital services such as   HTTP  Mail and DNS  Further  the SOCKS proxy enables generic  circuit level proxying for all proxy aware applications     VPN  SNAT  DNAT  Masquerading and static routing capabilities  make the firewall a powerful connection and control point on your  network     17    Installation    3  Installation    The installation of this Internet security solution proceeds in two main  steps  loading the software  and configuring the system parameters   The initial configuration required for loading the software is performed  through the console based Installation Menu  while the final con   figuration and customization can be performed from your manage   ment workstation through the web based WebAdmin interface                                                              ga While configuring your sys   4 tem  please note that the    WebAdmin system pro   vides additional information  and help through its Online  Help system  To access this  system  simply click the  button marked       The following pages contain    a configuration worksheets    where you can enter the    data  such as default gateways and IP addresses  you use to set up  your system  We recommend you fill these out as you configure the  syste
60.  only for high risk levels     e None  No warning will be sent     181    Using the Security System    5 4 2  Rules    The Rules menu contains the Intrusion Protection System set of  rules  IPS   The already existing base set of rules with the IPS attack  signatures can be updated through the Pattern Up2Date function  if  desired  New IPS attack signatures will automatically be imported as  IPS rule to the IPS rules table     The Pattern Up2Date function is described in further detail in  chapter 5 1 3 on page 54     IPS Rules Overview    The overview contains all IPS sets of rules            z   DO  z gt   f attack responses O Recognition of successful attacks   BO  p gt  P backdoor 0  Rules for backdoor software   BU Ge P bad traffic 0 Recognizes traffic that should never occur   BO  pe  B chat 0  Recognition of messaging and chat traffic   DO  p DB ddos O Rules for Distributed Denial of Service   BO  p BB dns 0 Rules for DNS protocol   BU  pe BD dos 0 Denial of Service attacks   BO  p      exploit 0  Well known exploits of specific software   BU  z gt  P finger 0 Rules for finger protocol    O  Ge   B ftp O  Rules for FTP protocol   BO  pe M icmp QO Rules for ICMP protocol   BO ke P icmp info 0 Recognition of assumingly harmless ICMP traffic                The functions in the overview from the left to the right   BOA  Clicking on the status light enables the IPS set of rules     tr   9  The IPS rule can be configured as alarm rule  Intrusion  Detection  or as blocking rul
61.  page 39 to learn more about the    functions of the ordered list     Important Note     Notification E Mails can only be sent to the administrator when the    DNS Proxy is enabled and configured     chapter 5 6 2 on page 227   or    when the SMTP menu  chapter 5 6 6 on page 238  has been  configured with a route for incoming e mails     Use external Indicators  This option is only available on appliance  systems with an attached LCD indicator  This option allows you to    turn the LCD display on or off   44    Using the Security System    Time Settings          uakai   This menu can be used to set  ae TEE   the time and date of the secur   set Tine mora  oes  1 ity system  The date and time  Meee cae  Can be set manually with the   help of the drop down menu or   can be automatically synchronized using the NTP server  Network  Time Protocol   Please note that important changes in the time setting    will appear as gaps in the Reporting and Logging                                      We do not recommend changing the system time for daylight savings  time  Instead  we recommend setting the system clock to Central  European Time  CET   In summer  this corresponds to a deviation of  less than one hour     Important Note     When system time settings are changed  the following    time warp     effects may be noticeable     Moving forward  e g   standard time to daylight saving time     e The timeout for WebAdmin will expire and your session will no  longer be valid     Time base
62.  some data  in particular streaming video and audio  over a port other  than 80  These requests will not be noticed when the proxy is in  Transparent mode  to support such requests  you must either use a  different mode  or enter an explicit rule in the Packet Filter Rules  allowing them     Example   Source  a local network    Service  service with target address  the service must first be  defined in the Definitions Services menu     Destination  IP address of the web server  or Any    Action  Allow  HTTPS  TCP IP Port 443  data is passed directly through the security  system without processing   Note     In order to use the Proxy in Standard mode  the client Browser  must be configured with the TCP IP Address of the security  system and the proxy port configured in the Proxies HTTP menu   In addition  the HTTP proxy service requires a valid Name server   DNS   Without configuring the client browser  the Proxy can only  be used in Transparent mode     211    Using the Security System    Global Settings  Operation Modes     Standard  In this mode  you must select all networks which should  be allowed to use the HTTP proxy service  If a browser on a non   configured network is configured to use the proxy  it will have no  access to HTTP services    If a browser on a non proxied network is not configured to use the  proxy  an appropriate packet filter rule can allow  un proxied  access  to HTTP services     Example   Source  IP address of a local client  Service  HTTP  Destina
63.  system and an external computer    Proxies exclusively operation the application level  Proxies based  firewalls use a Dual Homed Gateway that does not forward IP  packets  Proxies  operated as specialized programs on the gateway   can now receive connections for a specific protocol  treat the  transmitted traffic on the application level and forward it afterwards     339    Glossary    RADIUS    RADIUS stands for Remote Authentication Dial In User Service  It is a  protocol designed to allow network devices such as routers to  authenticate users against a central database     Router  Gateway     A router is a network device that is designed to forward packets to  their destination along the most efficient path  Strictly speaking  a  gateway is not always a router  it could be an application gateway  or  proxy    though a router is a kind of circuit level gateway  When a  computer wants to communicate with a server not on the local  network  it must pass the data to a router in order for the packets to  be forwarded to their destination  By convention  the highest or  lowest address in the network range is used for the router  for  example  in the network 192 168 179 0 24  the router will normally  be at either 192 168 179 254 or 192 168 179 1     Server    A server is a network connected computer that offers services to  client computers  Standard services include WWW  FTP  news  and so  on  In order to make use of these services  the user will need a client  program  e g  
64.  that network will be  used one after another    Change Source to  SNAT   Choose a new source address for  the translated packets  This can be either a single host or an  entire network    Service source  This drop down menu will only be shown when  you have chosen an address in the Change source to menu   Only services with one source port can be used here    Change Destination to  DNAT   Choose a new destination  address here  This can be either a single host or an entire  network    Service destination  This drop down menu will only be shown  when you have chosen an address in the Change destination  to menu     Save the settings by clicking Add     Using the Security System    After successfully defining a rule  it will appear in the NAT Rules  table list  The further functions in the NAT table can now be used for  further customization     Further Functions    Edit rule  Click edit to load the rule into the Edit NAT Rule window   The rule can now be changed as desired     Delete rule  Click Delete to remove a rule from the list     5 3 4 2  Masquerading    AdEREN AGEL   Masquerading is a special    Name   masa       aren eee z case of SNAT  which allows  enoi  To natch E you to associate many intern   pees Pres eent al  private  addresses with  De aa ene eee   one external  public  ad   i dress  This allows you to hide  internal IP addresses and network information from the outside  network                       The differences between Masquerading and SNAT are     e Mas
65.  the  conditional GET type the request of data depends on certain  conditions  The detail of these conditions is stored in the header field  Conditional  Often used conditions are for example If Modified Since   If Unmodified Since or If Match  This condition helps to considerably  reduce network utilization  since only the necessary data are  forwarded  In practice  proxy servers  for example  use this function  to prevent that data that are already stored in cache are forwarded  several times  Also the partial GET method has the same purpose  It  uses the range header field that only forwards parts of the data   which  however  cannot be processed by the client yet  This technique  is used for the resumption of an interrupted data transfer     The PUT method allows for a modification of existing sources and or  for the creation of new data on the server  In contrast to the POST   226    Using the Security System    method  the URL in the PUT request identifies the data sent with the  request and not the source     Clicking on the Enable button enables the function  status light is  green      Allowed Target Services  Use the Allowed target services  selection menu to choose services that the HTTP proxy should be  allowed to access  By default  the services with the ports are already  available  to which a connection is considered as being safe     TCP Port  Enter the TCP IP Port in the entry field  By default  this  is set to the TCP IP Port 8080     Clear HTTP Proxy Cache 
66.  the gateway is at 192 168 2 1   Gateway  192 168 2 1   If the administration computer is on the same subnet as the  internal network card  in our example  if its address is  192 168 2 x  it does not need a gateway  In this case  enter the  following value here    Gateway  none   Confirm your entries with the Enter key     Installation    Final Notes  Step 7      Attention     Please read the notes and warnings presented during the  installation carefully  After confirming them  all existing data on  the PC will be destroyed     If you wish to change your entries  press F12 to return to Step  1  Otherwise  start the installation process by pressing the Enter  key     Installing the Software  Step 8      The software installation process can take up to a couple of  minutes  You can follow the progress of the installation using the  four monitoring consoles    There are four consoles available    Main Installation  Alt   F1     Interactive bash Shell 1 Alt   F2     Installation Log  Alt   F3     Kernel Log  Alt   F4     When the installation process completes  remove the CD ROM  from the drive and connect the ethO network card to the internal  network    Except for the internal Network card  ethO   the sequence of  network cards normally will be determined by PCI ID and by the  Kernel drivers    The sequence of network card names may also change if the  hardware configuration is changed  especially if network cards  are removed or added     25    Installation    9  Reboot the S
67.  the internal client is available    Allow  Authorization  Cache Control  Content Encoding  Content   Length  Content Type  Date  Expires  Host  If Modified Since   Last Modified  Location  Pragma  Accept  Accept Language   Content Language  Mime Version  Retry After  Title  Connection   Proxy Connection and User Agent     Note     In Standard and Paranoid modes  the proxy blocks all cookies   If you wish to use cookies  you should use the none mode     7  Use the Allowed networks selection menu to select which  networks should be allowed to use the proxy     A description of how to use the selection field tool can be found  in chapter 4 3 2 on page 36     All settings take effect immediately and will be saved if you leave this  menu  Only the HTTP proxy can be accessed from the allowed  networks     See also the functions in the Advanced window     214    Using the Security System    Surf Protection  Content Filter        Sui Pencalonan  3 The Surf Protection Pro    eet       files function allows you to   Gobion fame   produce profiles  which pre    g   vent access to certain web    sites  These profiles can   a ae is Sees   then be associated with   arenes z certain users or networks    thus allowing control over which sites users may access  The   categories are based on the URL data base from Cobion Security   Technologies and can be edited in the Surf Protection Categories   table    Each Surf Protection Profile additionally contains a Content Filter   with protection m
68.  the settings  When the message Up appears  the  interface is fully operational                    Target  Please select    Kernel Routing Table       View raw Kernel Routing Table        5 3 3  Routing    Every network connected computer uses a routing table to determine  where outbound packets should be sent  The routing table contains  the information necessary to determine  for instance  if the destin   ation address is on the local network  or if traffic must be sent via a  router   and  if a router is to be used  the table details which router is  to be used for which network     Static Routes    The security system will install static routing entries for directly   connected networks by itself  Further routes  however  must be  manually entered  This is the case  for instance  when the local  network includes a router to be used for access to a specific network   These routes  called static routes  contain information about how to  contact a non directly connected network     This menu allows you to define which network card or router should  be used to contact various external networks     155    Using the Security System    Defining Static Routes     1  Under the Network tab  open the Routing menu     2  Click on the New button   The Add Static Route window will open     3  In the Network drop down menu  choose the network you wish  to define a route for   The Network drop down menu contains all static networks  as  well as those you have defined in the Networks and 
69.  the table     Step 4  Download the Certificate     1   2     3     You    In the Host CSRs and Certificates  select the new certificate     Use the drop down menu at the bottom of the table to select a  download format    DER  In the Passphrase field  you must enter the password of  the Private Key    PEM  No password is necessary    PKCS 12  Enter the password of the Private Key in the  Passphrase field  In the Export Pass field  enter a different  password  This password will be required to install the certificate  on the client computer     Click Start     must now install the certificate on the remote computer  The    installation process depends on the IPSec software on that computer     294    Using the Security System    5 7 7  Advanced    Advanced IPSec Settings       NAT Traversal   _ Disable       Copy TOS Flag     Enable       Send ICMP  Messages      _ Disable       Automatic CRL  Fetching     Enable          Strict CRL Policy  oe       IKE Debug Flags  Selected  State Control  Outgoing IKE  Incoming IKE    Available  a Ererspton  Ls raw Packets    Lel                   This menu allows you  to  make additional settings  for the IPSec VPN option   This should  however  only  be done by experienced  users     When  enabled  NAT Traversal  allows hosts to establish an    NAT Traversal     IPSec tunnel through NAT devices  This module attempts to detect if  NAT firewalls are being used between the server and client  if so  the  system will use UDP packets to communi
70.  the table  for instance  to sort the rules by sender address  click    194    Using the Security System    Source  To return to the precedence based sorting Matching  click  the column with the position numbers     Filters    The Filters function allows you to filter Packet Filter Rules by specific  attributes  This function enhances the management of huge networks  with extensive sets of rules  since rules of a specific type can be  presented in a concise way     Filtering rules     1   2     Click on the Filters button   The entry window will open     Enter the filter attributes in the fields  Not all attributes must be  defined    Group  If you want to filter the rules of a specific group  select  them from the drop down menu    State  This drop down menu allows you to filter rules by a  specific status    Source  This drop down menu allows you to filter rules by a  specific source address    Service  If you want to filter rules by a specific service  select it  from the drop down menu    Action  This drop down menu allows you to filter rules by a  specific action    Destination Port  This drop down menu allows you to filter  rules by a specific destination address    Log  This drop down menu allows you to filter logged rules   Comment  If you want to filter services by specific comments   enter the expressions in the entry menu     To start the filter click on the Apply Filters button     195    Using the Security System    Only the filtered packet filter rules will be d
71.  these services  Network services using the TCP and  UDP Internet protocols  can be accessed via special ports and this  port assignment is generally known  for example the SMTP service is  generally assigned to the TCP Port 25  The ports  used by the services  are referred to as open  since it is possible  to establish a connection  to them  Whereas unused ports are referred to as closed  every  attempt to connect with them fails  The attacker tries to find the open  ports with the help of a particular software tool  i e  the Port Scanner   This program tries to connect with several ports on the destination  computer  If it is successful  the tool displays the relevant ports as  open and the attacker has the necessary information  showing him  which network services are available on the destination computer     The following is an example of the information returned by a port  scanner     Interesting ports on  10 250 0 114     The 1538 ports scanned but not shown below are    in state  closed     Port State Service  25 tcp opensmtp  135 tcp open loc serve    139 tcp filtered netbios ssn  445 tcp openMicrosoft ds  1032 tcp openiad3    Since 65535 ports are available for the TCP and UDP Internet  protocols  the ports are scanned at very short intervals  When the  firewall detects an unusually large number of attempts to connect to  services  especially when these attempts come from the same source  address  this is almost certainly due to a portscan    PSD watches for such sca
72.  will be collected and sent to you when the  collection period has expired  If more events  occur  this period will be increased  Further  information on the Intrusion Prevention event    can be found in the notification e mail     Portscan detected  A portscan was detected  The originating host    was   lt IP gt     A portscan from the given IP address was de   tected  The Portscan Detection Module is de     scribed in chapter 5 4 1  on page 179     For more information     see WebAdmin   gt  Local Logs Browse Portscan    323    Using the Security System    856    999    324      search with whois to know who the source  IP belongs to      gt  RIPE NCC http   www ripe net perl whois   query SHOST     gt  ARIN   http   www arin net cgi bin whois pl        queryinput   HOST         gt  APNIC   http   cgi apnic net apnic bin   whois pl search SHOST     use traceroute from     gt  UC Berkeley     http   www net berkeley edu cgi bin   traceroute   HOST    Attention  source IP addresses can easily be    forged by attackers        Portscan detected   Event buffering activated    A portscan was detected  The originating host    was   lt IP gt     A portscan from the given IP address was de   tected  The Portscan Detection Module is de     scribed in chapter 5 4 1  on page 179        Event buffering has been activated  Further  Intrusion Protection events will be collected  and sent to you when the collection period has  expired  If more events occur  this period will  be increased  
73. 00 00 300  _  usr bin perl  usr local bi  vo 3064  gt    00 00 0 00  2  use bin perl  ust local bin i    zoot 7550  0 0 2 1 7156 5416     00 00 0700 AEEA ENEA  rene Toso 0 0 Get massae   omo goo aeee aeea  Internet security system   root 7552 0 0 11 A752 3068   5 00 00 E E RTEA E  root 7553 0 0 1 1 4744 3048   s 00 00 00 usr bin perl  usr local bin    foot 7584 0 0 13 S196 3512     00 00 0701  C  use bin perl  use locel  bin t  zoot 7585 0 0 13 4904 3416     00 00 0700   usr bin perl  use locel  bin t  zoot 7586 0 0 2 2 7380 S052     00 00 0 00 e AEN E  root 404 0 0 O12 1996 596 2         apeoll 0 00  use abin  ston  root 503 0 0 0 3 4040 952  s Aprol 300  usr sbin sshd  4  f  etc ssh sshc  foot 640   0 0 0 9  5300 2392  gt  S fpcOl 0 01 fusr sbin hatpd      evo ncrpa n  Zee OED Gl Gn Se 5 Ae ten qo EO einen oy mes  cowrun 15600 0 0 0 9 5300 2996   5 es Gun CRTE Eae A e  werrun 25374 012 6 723056 174002 3 09 46 D01 l       var efe indet  fpi  wwerun 24473 0 0 1 1 5700 2944   s 09 17 300  _  usr sbin httpd  f  etc httpd   wwwrun 25893 0 0 3 2 12724 8240   R 10 00 0 00    _  var wfe syscall pl  wwwrun 25894 0 0 0 2 2556 720   R 10 00 oo    _  bin ps auwxt  ees Hes ap 2504   EA asco A examen   a ios 2 E T E E  Gee ao 0 2050  gt  A Tin EE E RE  root 790 0 0 2168   5 Aprol              0  var aua aua bin  etc wfe cont aue              etho    Link encap Ethernet HWaddr 00 0C 6E B6 23 F3  inet addr 192 168 5 217 Bcast 192 168 5 255 Mask 255 255 255 0  UP BROADCAST RUNNING MULTICAST
74. 110  UDP  iapa sean 110  Proxy  DNS anesan iain 227  HTTP sesdoctsaleuvsative  coe 210  Ident marne 237  introduction    sss  209  POPS iieiaei 232  Proxy Content Manager 255  SMTP aatri 238  SOCKS iiia heukics 229  Proxy Content Manager  AGG  E AT 256  deferred        cccceeeeeeee es 256  FITCFING eiiiai 258  fiter Sona ey seks Sees 258  global actions               258  Mail ID srira oies 255  permanent error           256  quarantined                256  Recipient s  ccce 257    346    Sender sidiria evita res 256  SMtP_QUEUE        e cesses 256  Proxy disable  Netscape     ceeeeeeeeeeee es 210  Quality of Service  QoS      196  Reporting  ACCOUNTING       eeseeeee eee 303  administration              298  Content Filter               301  current report           06 303  daily executive report by e   Malls ivesdectstieiadcceale 302  DN Seeria siete 302  executive report 302  hardware   299  HTTP proxy usage         302  Intrusion Protection       302  NCCWOFK ove cceeetecceer ence 300  Packet Filter                 301  PPTP IPSec VPN            302  system information       305  VIFUS eisena sirai saias 299  Reporting  Accounting  Configuring soccer 304  Restaft  apisarto revii avat 102  Routing  introduction seee 155  kernel routing table       156  Search  starting a search           333  S ArCh sisisi dinates 333  Secure Shell    48  49  Service  adding        eeeeeeeee eee 111  deleting  isesi isinisisi 114  editing i caesveriavsvseias neds 114  FIICETING sais diiran
75. 13 113 5 1164   gt  192 168 5 217 443  13 25 54 ACCEPT 10 113 113 5 1165   gt  192 168 5 217 443  13 25 54 ACCEPT 10 113 113 5 1166   gt  192 168 5 217 443  13 25 54 ACCEPT 10 113 113 5 1167   gt  192 168 5 217 443  13 25 54 ACCEPT 10 113 113 5 1168   gt  192 168 5 217 443  13 25 54 ACCEPT 10 113 113 5 1169   gt  192 168 5 217 443  43 25 55 ACCEPT 10  113 113 5 1170   gt  192 166 5 217 1443  13 25 56 ACCEPT 10 113 413 5 1171   gt  192 168 5 217 443  19 26 00 ACCEPT 10 113 113 5 1172   gt    192 168 5 217 443  19 26 04 ACCEPT 10 113 113 5 1173   gt  192 168 5 217 443  19 26 07 ACCEPT 10 113 113 5 1174   gt  192 168 5 217 443  19 26 11 ACCEPT 10 113 113 5 1175   gt  192 168 5 217 443  13 26 13 ACCEPT 10 113 113 5 1176   gt  192 168 5 217 443    start Livelog      display of packets that have  been dropped by the security  system        By clicking Show button  a  new window will appear  This  window shows a real time                Click the stop Live Log start Live Log button to pause or unpause  the real time display     Note     Please note that only those processed rules will be filed in a protocol   for which the Log function has been enabled under Packet Filter   Rules        207    Using the Security System    Current System Packet Filter Rules  The Current Packet Filter  rules window provides detailed information for expert administrators   The table shows all rules in real time  including system generated  ones  and is taken directly from the operating system kernel   
76. 2     142    In the Network tab  open the Interfaces menu     Click on the New button   The Add Interface window will open     In the Name entry field  enter a descriptive name for the  interface     Use the Hardware drop down menu to select a network card     Use the drop down menu Type to select VLAN Ethernet  interface     Fill in the required settings for the VLAN Ethernet Interface  type of interface     Address  Assign an IP address for the virtual interface  If you  wish to use a static IP address for this interface  select Static  from the drop down menu and enter the address to use in the  entry field  If you wish to have a gateway dynamically assigned  via DHCP  select Assign by DHCP from the drop down menu     Netmask  If you wish to use a statically defined network mask  for this interface  use the drop down menu to select Static and  enter the netmask to use in the entry field  If you wish to have a  netmask dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu     Using the Security System    Default Gateway  If you wish to use a statically defined default  gateway  use the drop down menu to select Static and enter the  address of the gateway in the entry field  If you wish to have a  gateway dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu  Otherwise  select None    VLAN Tag  Enter the VLAN tag to use for this interface    Uplink Failover on Interface this function will only be dis   played if the Assign by D
77. 3 8 on page 177     Log ICMP Redirects  ICMP Redirects are sent from one router to  the other  in order to find a better route for a destination  Router then  change their routing tables and forward the following packets to the  same destination on the supposed better route    This function logs the ICMP Redirects  Clicking on the Enable button  enables the function  status light is green      Traceroute Settings       Traceroute is a tool used to  E mh Nicaea check and troubleshoot net   Traceroute from firewall Lente    work routing  This tool can   resolve the path to an IP  address  Traceroute lists the IP addresses of the routers that had  been used to transport the sent packet  Should the packet path not  be reported within a certain time interval  traceroute will report a star       instead of the IP address  After a certain number of failures  the    201    Firewall is Traceroute visible           Using the Security System    test will end   An interruption of the test can have any number of causes  notably a  packet filter along the network path that blocks traceroute packets     This window shows advanced options related to ICMP Traceroute   The settings here can also open the UDP ports UNIX Traceroute  uses     Firewall is Traceroute visible  When this function is enabled  the  firewall will respond to Traceroute packets    Click the Enable button to enable the function  status light shows  green      Firewall forwards Traceroute  When this function is enabled  the
78. 326       link beat monitoring system  please check that  the network cards support link beat  and that  they are supported by the security system  Also  check to make sure that the link beat capable  cards have been chosen for the data transfer  connection      The installation and management of the HA system    is described in chapter 5 1 10  on page 97     Log file s  have been deleted          The log file partition usag reached th  specified value in percent  Log Files have been  deleted  To make sure you don t lose more log  file s   please check the WebAdmin settings  and or remove old log files manually  The    deleted files and or directories are listed in       the attachment     Remote log file storage failed         a    he daily log file archive could not be stored       on the configured remot server  Pleas check  the WebAdmin settings for     Local Logs Settings Remote log file archive    n           The archive file will be automatically re     transfered with the next daily log file archive        Intrusion Protection Event    A packet was identified that may be part of an  intrusion  The matching rule classified this as  medium priority level  Further information on  the Intrusion Prevention event can be found in    the notification e mail           Intrusion Protection Event   Event buffering    activated    CRIT     301    302    305    306    Using the Security System    A packet was identified that may be part of an    intrusion  The matching rule classi
79. 35  e TTT T ATAT 342    Welcome to Astaro    1  Welcome to Astaro  Congratulations on your purchase of the Internet Security Solution  Astaro Security Linux V5  and welcome to the Astaro family     This manual will take you step by step through the installation pro   cess  will explain the web based WebAdmin    configuration tool  and  can be used to document your configuration     The most recent version of this document is always available at the  following address     http    docs astaro org    In order to provide you with the most up to date information pos   sible  this document makes occaisonal reference to other documents  available at the web sites of Astaro and other organizations  Please  note that these addresses may change over time  and that documents  hosted by other organizations may even be removed entirely     If you have further questions  or notice any mistakes in this manual   please do not hesitate to contact us at    documentation astaro com  For further support  please visit our user support forum at  http    www astaro org    or make use of the Astaro Support Program     Introduction to the Technology    2  Introduction to the Technology    Before exploring the Astaro Security Linux Security Solution in detail   it may be helpful to take an overview of network and security tech   nology in general  In particular  it is important to understand the  serious risks that unprotected systems face as well as where and how  to deploy this security system to mi
80. 40 bit key  enter a string with 5 hexadecimal digits  separated by colons  In order to use a 104 bit key  enter a string    135    Using the Security System    136    of 13 hexadecimal digits separated by colons  The string must  consist of hexadecimal digits  Please note that a hexadecimal  number is two characters  each either a number  0 9  or a letter   A F     Example of a 40 bit key  17 A5 6B 45 23   Default WEP Key  Use the drop down menu to choose one of  the defined WEP Keys 0 3 which should be used as the default  key  This key will be used as the current key  which all the other  nodes must use to access the wireless network    Access Mode  Choose the filter mode for the wireless LAN  If all  nodes should be allowed access  subject  of course  to WEP  restrictions   select All stations can get access    If you wish to configure a positive filter select Stations in  Allowed MAC addrs can get access  To use a negative filter   choose Stations in Denied MAC addrs can not get access   Allowed MAC addrs  If you have chosen to use a positive  filter  enter the MAC addresses of nodes allowed to access the  wireless network in the access control list    The access control list function is identical to the ordered list  and is described in chapter 4 3 4 on page 39    Denied MAC addrs  If you have chosen to use a negative  filter  enter the MAC addresses of nodes explicitly not allowed to  access the network in the access control list    The access control list function is i
81. 509 IPSec  key exchanges     282    Using the Security System    RSA Authentication    RSA authentication requires a Local IPSec Identifier and a Local  RSA Key     Note   Depending on the selected key length and the processor of the  i security solution  the generation of RSA keys can take several  minutes     1     In the Local IPSec RSA Key window  define a unique VPN  Identifier    IPv4 Address  For static IP addresses    Hostname  For VPN security gateways with dynamic addresses   E Mail Address  For mobile  road warrior  connections    Save the settings by clicking Save   Generate a new RSA Key in the Local RSA Key window  by    selecting the key length from the RSA Key length drop down  menu     When you click Save  the system will begin generating a new  RSA key pair     After generation  the active Local RSA Key and its name will be  displayed  When a new key is generated  the old key will be replaced     283    Using the Security System    PSK Authentication    For authentication through Preshared Keys  PSK   no additional  configuration of local keys is required     During the key exchange using IKE Main Mode  only IPv4 Ad   dresses are supported as IPSec identifiers  The IPSec identifier in the  IKE Main Mode is automatically encrypted with the PSK  and so PSK  cannot be used for authentication  The IP addresses of IKE  connections are automatically used as IPSec identifiers     The PSK Key is entered in the IPSec Policies Remote Keys menu   It will automatically 
82. BD info Informational messages   o Ga local Locally generated rules  GU  pr misc Miscellaneous rules    DO  p gt     multimedia Recognition of multimedia streaming software         Group  Hits  Info   U  pr local 0 Locally generated rules  80  pr local 0 B   example   ID 10000       185    Using the Security System    5 4 3  Advanced    Policy and Exclusions This menu allows you  to  Policy  Drop silently a   Oar    EEA configure additional settings  Fels See Slee Sells   Total 0 entries  E New Excusion         for the Intrusion Protec   HTTP Service  Please select tion System  IPS  a Th IS  HTTP Servers  Selected Available should  however  only be    Empty list             Performance Tuning                Internal  Address     Internal roadcee  done by experienced users     Internal  Network   PPTP Pool    DNS Servers  Selected Available  Empty list        Any   Internal  Address   Internal  Broadcast    gt    Internal  Network   PPTP Pool    SMTP Servers  Selected Available  Empty list       Internal  Address   Internal  Broadcast   Internal  Network   PPTP Pool                         Policy and Exclusions    Policy  From this drop down menu select the security policy that the  Intrusion Protection System should use  if a blocking rule detects an  IPS attack signature     e Drop silently  The data packet will only be blocked     e Terminate connection  A TCP Reset and or ICMP Unreachable   for UDP  packet will be sent to both communication partners and  the connection wil
83. DNS names    335    Glossary    and IP numbers  Every top level domain also has name servers which  contain information about their subordinate servers     The DNS system is thus a distributed  hierarchical database  DNS  resolution is normally handled by network applications rather than by  the user him or herself     Dual Homed Gateway    A dual homed gateway is a computer that is directly connected to two  networks  i e   it has two network cards  each connected to a different  network  and which forwards information from one network to the  other  Due to the fact that there is no IP forwarding  all connections  must be forwarded through this Dual Homed Gateway     Firewall    A firewall protects one network or subnet  e g   an internal LAN  from  another network  e g   the public Internet   All traffic between the two  passes through the firewall  where it is controlled and monitored     Header    In general  the header is the information contained at the top of a file  or message  and consists of low level data regarding the status and  handling of the file or message  In particular  the header of an e mail  or Usenet message contains information such as the sender  recipient   and date     Host    In a client server architecture  the host is the computer which runs  the server software  One host can have multiple server programs  running on it  that is  an FTP server  mail server  and web server can  all run on the same host  A user uses a client program  for instance a
84. Further information on the Intru   sion Prevention event can be found in the noti     fication e mail   File transfer request    This is the file you requested        WARN     001    005    080    081    Using the Security System       A feature will expire  The featur a gt  cs  tame    limited and will expire in    Please contact your local Astaro partner or an       Astaro sales representative to obtain a license  update   E Mail addresses     America s  mailto salesus astaro com        Europe  Asia Pacific and Africa     mailto sales astaro com        For technical questions  pleas feel fr to  visit our user bulletin board at  http   www astaro org  or our documentation    ressources at http   docs astaro org     Failed login attempt from     IP  at      time   with      username   HA check  no link beat on interface   retrying    The link beat monitoring system on the firewall       failed  Th system will now try again  If the       system continues to fail  the administrator will    receive message WAR 081        If you do not wish to use this monitoring  function  no further action is required  After  the system sends the WAR 081 message  it will  not try to start the link beat monitoring system    again     HA check  interface does not support link beat    check    The link beat monitoring system failed after  multiple attempts  If you have recently in   stalled the HA system  and you intend to use the    325    Using the Security System    TLL    715    850    851    
85. HCP or Static is selected in the  Default Gateway drop down menu    You can configure a standby connection through a second inter   face  If the primary connection fails  the uplink will automatically  be set up through the second interface    Uplink Failover on Interface is by default disabled  Off   If  you wish to use this virtual interface as primary connection  se   lect Primary Interface from the drop down menu  If this inter   face shall contain the standby connection  select the Backup  Interface configuration    Uplink Failover check IP  Once the Uplink Failover on  Interface function has been enabled  this entry field will be  displayed  Enter the IP address of a host that replies to ICMP   ping requests  The security system will send ping requests to  this host  if no answer is received  the backup interface will be  enabled by the failover  In this entry field  there must always be  an IP address for the failover    QoS Status  In order to use Quality of Service  QoS  band   width management on an interface  enable this option  To enable  the Quality of Service  QoS  module  select On from the drop   down menu     143    Using the Security System    144    Important Note     For the bandwidth management Quality of Service  QoS  you  must define the values for Uplink Bandwidth  kbits  and  Downlink Bandwidth  kbits   These values are used as basis  for the bandwidth management system  incorrect values can  lead to poor management of the data flow  The Quality of  S
86. HTTP Proxy Usage    The access to the HTTP Proxy is recorded in this menu     5 8 11 Executive Report    In the Executive Report menu  a complete report is created from  the individual reports in the Reporting tab     Daily Executive Report by E Mail       Daily Executive Report by E Mail Once a day an u pdated    E Mail Addresses        complete report is sent to  the e mail addresses en   tered into the ordered list  The function is automatically enabled   once an address has been entered into the field                       New e mail addresses are taken over to the ordered list by the entry  field  by clicking on the Add button     Ordered Lists are described in chapter 4 3 4 on page 39     302    Using the Security System    Current Report                                        Current Report Clicking on the Show  Aas   button opens a window  in  Prt ts Report   which the current complete   Wc I    report is displayed  This  A i i j i   report can be printed out by    CPU load  Daily Graph     CPU Toad  Daily     clicking on the Print this  Report button                          Memory usage  Daily Graph     Henory usage  Daily  il          5 8 12  Accounting       Generate Accounting Reports The Accounti ng function  Status  eo  _ Disable _ 3    monitors all IP packets     Accounting Report Type  Full    Queried Networks  Selected Available transmitted over the various    Internal  Network   Any             Bookkeeping    Development network cards and  once a          I
87. HTTP request starts to the Internet  its IP address will be  replaced by the IP address of the external network card    The data traffic for the external network  Internet  thus does not  contain internal information  The answer to the request will be  recognized by the firewall and forwarded to the requesting computer     338    Glossary    nslookup    Nslookup is originally a UNIX program designed to query name  servers  The main application is the display of IP names in the case of  a given IP number and vice versa  Moreover also additional functions   such as aliases can be displayed     Port    While at the IP level  only sender and destination addresses are  important  the TCP and UDP protocols both include the concept of  ports  A port is an additional identifier   in the cases of TCP and UDP   a number between 0 and 65535   that allows a computer to  distinguish between multiple concurrent connections between the  same two computers  TCP and UDP packets have both a sending port  and a destination port     Protocol    A protocol is a well defined and standardized set of rules that govern  how a client and server interact  Some well known protocols and their  associated services include HTTP  WWW   FTP  FTP   and NNTP   news      Proxy  Application Gateway     Proxies  often called application gateways  separate two networks at  the network  IP or TCP UDP  level  while still allowing certain kinds of  communication  There can be no direct connection between an  internal
88. Interfaces  menus     4  In the Target drop down menu  select the destination to which  packets should be forwarded   Names in brackets are interfaces  while names without are  hosts or routers  Names without brackets are either hosts or  routers     5  Save your changes by clicking Save     When a new route has been defined and saved  it will appear in the  Static Routes table  To remove an entry  click delete     Kernel Routing Table    Tf The Kernel Routing Table             D Seen  Will be displayed in a se   cy ke  j es    lt Jaweraw Kemal Rung Tele  son parate window  This window  F  host domain com  View raw Kernel Routing Table   Microsoft Internet ENNI shows all on the system   host domain com  View raw Kernel Routing TA  Table      currently active routes  The   RE caine system will check each rule  ee an a eeu sates Seon in th d f the  i  E eee pene eee seep ant AI a7 in the order of the list  using  mA Gone e a Bm ean the first applicable route  By       default  the default routes    156    Using the Security System    associated with network cards are already entered  and are not  editable     Clicking on the Show button opens the Kernel Routing Table window     5 3 4  NAT Masquerading  5 3 4 1  NAT    Ade RENE The Network Address  S   Translation  NAT  func   tion translates one set of IP  ects pestnalon anes eared addresses  usually private  armas arora Sadi ones  to addresses in an   ater   Neches a other set  usually public    E  te change M NAT makes it pos
89. Legitimate messages are unlikely to  be caught     do this  This drop down menu allows you to select the action the  proxy should take upon finding a message with a filtered string  The  following actions are possible     Reject  The message will be bounced back to the sender with a  5xx error message  The bounce message sent to the sender will  also contain an explanation of why the message was blocked     Blackhole  The e mail will be accepted and silently dropped  Do  not use this action unless you are absolutely certain no legitimate  e mails will be lost     Quarantine  The e mail will be accepted  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status    250    Using the Security System    Quarantine  This menu presents further options  including options  to read or to send the message     e Pass  The e mail will be treated by the filter  but allowed to pass   A Header will be added to the e mail  by which it can be sorted or  filtered on the mail server or in the e Mail programs of the  recipient  In addition  the word  SPAM  will be added to the  message subject line     For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     Spam Sender Whitelist  This control list is defined for the Spam  Protection function  Enter the e mail addresses of those senders into  the list  whose messages you wish to allow through     The function of the Control List is identical to the Ordered List and  described i
90. Local Users  Click on the settings in the Name  Password   PPTP Address and Comment columns in order to open an editing  window  You can then edit the entries     Deleting Local Users  Clicking on the symbol of the trash can will  delete the definition from the table     117    Using the Security System    5 3  Network Settings  Network     The Network tab contains menus which allow you to configure net   work cards and virtual interfaces  as well as to perform network   specific configuration and management tasks     5 3 1  Hostname DynDNS    Firewall Hostname    Firewall Hostname          Hostname  Enter the host   Hostname   fost domain com L save   7  name for the security sys   tem in this entry field  Example  FIREWALL mydomain com    A Hostname or domain name may contain alphanumeric  period and  minus characters  At the end there must be an alphabetic designator   such as    com        de  or  org     The Hostname will appear in the  subject line of all Notification E Mails     Save your entries by clicking the Save button     Note   The Hostname will appear in the subject line of all Notification E   Mails to the Administrator     Dynamic DNS    Dynamic DNS   Dynamic DNS addresses    Status  U Disable       a device or a VPN receiver  eme through a DNS decryptable  Password    name  The respective   applicable IP address is  stored for each name to a public DNS server in the Internet at each  connection  The device can always be reached through this name   as        
91. MAC address of a computer is described in  the next section     132    Using the Security System    Determining the MAC address     If you have not yet installed your network card  you can simply  examine it to determine its MAC address  the unique MAC address is  usually printed on the card itself     If the wireless LAN is already being used and you wish to install a new  MAC filter  you can use the following commands on the mobile nodes  to determine the MAC address  If you are configuring a small wireless  LAN  the mobile computers are MS Windows computers  and you have  physical access to them  follow these steps     1  Open the Command Prompt     2  The Command Prompt can be found in the Start menu  under  Programs Accessories Command Prompt     3  Enter the following command at the prompt   ipconfig  all  4  Press the Enter key     The Physical Address row contains the MAC address  for  example 00 04 76 26 65 4C     5  Close the command prompt     If you have a larger network  you can use the ping program under MS  Windows to determine the MAC addresses of remote nodes     1  Make sure that the remote computer whose MAC address you  wish to check is turned on and connected to the network     2  Open the Command Prompt     The Command Prompt can be found in the Start menu  under  Programs Accessories Command Prompt     3  Ping the destination computer by using the following command   ping IP Address  e g  ping 192 168 2 15   4  Press the Enter key     133    Using the S
92. S authenti   cation here as well    The configuration of the Microsoft IAS RADIUS server and the  configuration of RADIUS within WebAdmin is described in chapter  5 1 7 on page 71     The PPTP Live Log provides a list of important events  including  error messages  related to the PPTP service  The Logging menu can  be used to select which events are logged     PPTP IP Pool    BPU        This menu is used to define  cae a        which IP addresses PPTP  Encryption  Svona  28 BD z hosts should be assigned   C cana 5 The default settings assign   addresses from the private  IP space 10 x x x  This network is called the PPTP Pool  and can be  used in all of the other security system configuration options  If you  wish to use a different network  simply change the definition of the  PPTP Pool  or assign another defined network as PPTP Pool here           Logging Normal                   PPTP users are defined in the Definitions Users menu  It is also  possible to assign specific users to specific IP addresses  These  addresses do not need to be part of the defined PPTP pool  To use    170    Using the Security System    these addresses in other parts of the system configuration  such as  the packet filter  they must be defined as single hosts  i e   networks  with netmask 255 255 255 255  or as a part of a larger network     Note     If you use private IP addresses for the PPTP pool and you wish    PPTP connected computers to be allowed to access the Internet     appropriate Masqu
93. SSH Client  Access through SSH is encrypted   and cannot be read by eavesdroppers        SSH  Shell Access  Settings                            The Shell Access function is enabled by default  once you have  entered a password for the configuration through the Astaro Con   figuration Manager in the Setting System Passwords window     If you wish to access the security system through SSH  the SSH  Status light must be enabled  status light shows green      48    Using the Security System    The SSH protocol uses name resolution  valid name server  if no  valid name servers are found  SSH access attempts will time out  The  time out takes about a minute  During which time the connection  seems to be frozen or failed  Once the time out has expired  the con   nection process continues without further delay     You must also add the networks allowed to access the SSH service in  the Allowed Networks selection field  In order to ensure a seamless  installation process  the Allowed networks field contains the Any  option by default  this means that any computer can access the SSH  service  Networks can be defined in the Definitions Networks  menu     A Security Note   By default  anyone has access to the SSH service  The Allowed  Networks field contains the Any option  For increased security   we recommend that access to the SSH service be limited  All  other networks should be removed     We recommend that the SSH service be disabled when not in active  use     Password and Factory
94. System    This system supports three kinds of authentication for IKE   e IKE with Preshared Keys  PSK    e IKE with RSA Keys  RSA    e IKE with X 509v3 Certificates  X 509     Authentication with Preshared Keys  PSK  uses secret passwords as  keys   these passwords must be distributed to the endpoints before  the connection is built  When a new VPN tunnel is built  each side  checks that the other knows the secret password  The security of such  PSKs depends on how    good    the passwords used are  common  words and phrases are subject to dictionary attacks  Permanent or  long term IPSec connections should use certificates or RSA keys  instead     Authentication via RSA Keys is much more sophisticated  In this  scheme  each side of the connection generates a key pair consisting  of a Public Key and a Private Key  The private key is necessary for  the encryption and authentication during the Key Exchange  Both  keys are mathematically independent from each other and are in a  unique relation to each other  Data encrypted with one key can only  be decrypted with the other  The Private Key cannot be deducted  with maintainable work from the Public Key    Both receivers of an IPSec VPN connection require in this authenti   cation method their own Public Key and Private Key     Similarly  the X 509 Certificate authentication scheme uses public  keys and private keys  An X 509 certificate contains the public key  together with information identifying the owner of the key  Such  ce
95. TP  Remote Access      A Security Note   Normally  only the admin user has access to WebAdmin  The  password to WebAdmin should be changed at regular intervals     114    Using the Security System    Add Local Users     1   2     Under the Definitions tab  open the Users menu     Click on the New Definition button    The entry window will open    Make the following settings    Username  In the entry field  enter a unique username for the   local user   This username will be used later  for example to configure  packet filter rules  Allowed characters are  The only allowed  characters are alphanumeric characters  minus      space       and underscore  _   Names may be up to 39 characters long    Password  Enter a password here     A Security Note   Use a secure password  Your name spelled backwards is   for example  not a secure password   while something like  xfT35 4 would be     Comment  You can enter a local user description in this entry    field    Save the Local User by clicking on the Add Definition button   The new User will then be displayed in the table    In the table  enable the services for the Local User    Ar the beginning  no services are enabled for the user  Enable  the services  by clicking on the corresponding term    Example    HAP    the HTTP Proxy is not enabled   HTTP   the HTTP Proxy is enabled    The available services are  HTTP Proxy  SMTP Proxy  SOCKS  Proxy  WebAdmin  L2TP over IPSec and PPTP  Remote  Access      115    Using the Security System  
96. Up2Date succeeded  Updated new Intrusion          Protection patterns    For more information please see the notification  e mail  Further information on the System Up2     Date can be found in chapters 5 1 3 on page 54     Virus Pattern Up2Date  No pattern installation    for Virus pattern needed    Virus Pattern Up2Date succeeded  Installed new    Virus Pattern    For more information please see the notification    e mail   Daily log file archive    This is an archive file containing the log  files  The date of these log files is specified    in the notification     Log file partition is filling up    850    851    855    Using the Security System       The log file partition usag reached th  specified value in percent  Depending on your  configuration the system will automatically take  measures if the usage continues to grow  To make  sure you don t lose any important log files     please check the WebAdmin settings and or remove       old log files manually        Intrusion Protection Event    A packet was identified that may be part of an  intrusion  The matching rule classified this as  low priority level  Further information on the  Intrusion Prevention event can be found in the    notification e mail           Intrusion Protection Event   Event buffering    activated    A packet was identified that may be part of an  intrusion  The matching rule classified this as    low priority level  Event buffering has been          activated  Further Intrusion Protection events 
97. Using the Security System    The following actions are preset     Quarantine  The e mail will be accepted  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status  Quarantine  This menu presents further options  including options  to read or to send the message     Pass  The proxy will add a Header to the message noting that it  has found a potentially dangerous string  but will then allow the  message to pass  A Header will be added to the e mail  by which  it can be sorted or filtered on the mail server or in the e mail  program of the recipient  In addition  the word  SPAM  will be  added to the message subject line     For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     The Header     Many of the SMTP proxy functions will add headers to the messages  scanned  The Header will inform the user on specific characteristics of  a message  If you select the Pass action  recipients can configure  their e mail programs to filter messages with high spam scores    The following list contains all possible Headers     X Spam Score  This header is added by the Spam Detection  module  It contains a score  consisting of a numerical value and of  a number of minus and plus characters  The higher the value  the  more likely it is that the message is spam    If you select the Pass action under Spam Protection  recipients  can configure their e mail programs to filter messages with high  spam scores     X Spam Flag 
98. ail should be proxied     A Security Note   Messages sent from those networks will never be scanned  by Spam Detection     Use Smarthost  If you wish to use an Upstream Smarthost to    deliver messages  enable this function and enter the IP address  of the smarthost here  In this case  the proxy will not attempt to  deliver messages itself  but will instead forward them to the  smarthost  The proxy will  however  deliver messages locally to  domains defined in the Incoming Mail window    For the Smarthost the Username and Password can optionally  be defined     Using the Security System    Encryption Authentication    Eac     The TLS Transaction En   sence Dia cryption function allows you  to automatically encrypt in  and out going e mails at the transport  layer  You must first confirm that the remote host supports this  function  TLS is used for encryption  not just authentication  SMTP is  generally not encrypted and can easily be read by third persons  The  function should therefore be enabled               Important Note     Some mail servers  such as Lotus Domino  use non standard  implementations of TLS  While these servers claim to support TLS  during connection negotiation  they cannot establish a TLS full  session  If TLS is enabled  it will not be possible to send messages to  these servers  In such situations  please contact the administrator of  the mail server     If the TLS Transaction Encryption function is activated  you can  also use SMTP Authentication  Thi
99. allowed to pass the filter  All other  packets will be blocked and   depending on the action chosen    displayed in the Packet Filter Live Log  The Packet Filter Live Log  is contained in the menu Packet Filter  Advanced     188    Using the Security System    Example     Network A is a subset of network B  Rule 1 allows SMTP traffic  destined for Network A  Rule 2 blocks SMTP for network B  Result   Only SMTP traffic for network A will be allowed  SMTP packets from  the rest of network B IP addresses will be blocked     A packet filter rule is defined by the source address  Source   a  service  Service   the destination address  Destination  and a  Response  Action      The following values can be chosen as source and target addresses   Please see the corresponding chapters of this for a more detailed  explanation of how to configure and manage these targets     e A Network   networks are defined in the Definitions Networks  menu     e A Network Group   network groups are defined in the Defin   itions Network menu     e An Interface network   logical networks are defined automatically  by the system when configuring a new network card or interface   Interfaces can be configured in the Network Interfaces menu     e An IPSec Remote Key Object  IPSec User Group    the IPSec  User groups are defined in the Definitions Networks menu  This  address or port range is required when configuring packet filter  rules for IPSec Road Warrior Endpoints     A new defined packet filter rule 
100. arios where VPNs can be used     261    Using the Security System    1  Net to Net Connection    Office New York Office Berlin        Internet LAN       Firewall    See enchypted  unencrypted          In this scenario  one network communicates with another   Two remote offices can use a VPN tunnel to communicate with each  other as though they were on a single network     This kind of connection can also be used to allow trusted third com   panies  e g   consultants and partner firms  access to internal  resources     262    Using the Security System    2  Host to Net Connection    Host Office Berlin    Internet                rr R     io   zz  Laptop        field representative  a  Firewall    See enchy pted  unencrypted       In this scenario a single computer communicates with a network   Telecommuters can use VPN to communicate with the main office  securely     3  Host to Host Connection    Host Host  Internet         Lra tale    ee LS a      gt            encrypted    In this scenario one computer communicates with another computer   Two computers can use a VPN tunnel to communicate securely over    263    Using the Security System    an untrusted network    A VPN server is a cost effective and secure solution for transferring  sensitive data  and can replace existing expensive direct connections  and private lines     The IPSec Concept    IP Security  IPSec  is a suite of protocols designed for crypto   graphically secure communication at the IP layer  layer 3    see a
101. associated object ID  or OID  Object ID numbers are designed to  be unique across the entire Internet  in order to manage this  the  Internet Assigned Numbers Authority  IANA  has been charged  with assigning OID prefixes to organizations  For example  the OID  prefix for Astaro AG is  1 3 6 1 4 1 9789     If your organization does not yet have an official OID space  you can  request an OID prefix from the IANA at www iana org   Once you have an OID space  you should consider how best to use it  to describe your network structure  Remember that each user  attribute will require a unique OID     82    Using the Security System    In order to configure user attributes  the Microsoft Management  Console must be used to modify the Active Directory Schema  In  order to do this  you must first mark the schema as editable     Step 1   Enable Editing of the Active Directory Schema     1     In the Microsoft Management Console  right click Active  Directory Schema     Use the left mouse button to click Operations Master   The Change Schema Master window will open     Check the option The Schema may be modified on this  Domain Controller     Save your changes by clicking OK     The Active Directory Schema can now be edited     Step 2   Add New Attributes     1   2     Under Active Directory Schema  right click Attribute   Use the left mouse button to click New     In the Create New Attribute window  define the new  attribute    Common Name  Enter a CN for this attribute    LDAP Display
102. ated into multiple  Bre ss   smaller network segments at  feta     the Ethernet level  layer 2    This can be useful  for in   ie stance  when security con   Qos Status   siderations require that cer   He tain clients only be allowed  to communicate with certain  other ones  In large networks  this can also be useful to connect  physically separate clients on the same logical network segment              Hardware etht  Realtek RT8139                       Default Gateway                      A VLAN capable switch can assign ports to distinct groups  For  example  a 20 port switch could assign ports 1 through 10 to VLAN 1   and ports 11 through 20 to VLAN 2  With such a configuration  a  computer on port 1 would not be able to communicate with a  computer on port 11  The technology essentially allows one physical  switch to be divided into two logical ones     In order to connect the security system to the virtual LANs  the  system requires a network card with a tag capable driver  A tag is a  4 byte header attached to packets as part of the Ethernet header  The  tag contains the number of the VLAN that the packet should be sent  to  the VLAN number is a 12 bit number  allowing up to 4095 virtual  LANs  The WebAdmin tool refers to this number as the VLAN Tag    The tagged packets are only used to communicate between the VLAN   compatible switch and the security system  the other computers on  the network do not need to have tag compatible network cards  The  port on the switch
103. ates will appear in the Unapplied  Up2Dates window with the version number and the file name   Further information is available by clicking the Info button    Note that the Unapplied Up2Dates in the table have not yet been  installed yet     57    Using the Security System    If you are using the HA system  unapplied updates will be listed  in the Unapplied Up2Dates Master window     5  Repeat steps 2 through 4 until all Up2Date packages have been  imported     Installing System Up2Dates without the HA Solution   1  Open the Up2Date Service menu in the System tab     2  In the Unapplied Up2Dates table  choose the Up2Date updates  to install     Note     If more than one System Up2Date file is listed in the table   start the highest version  The smaller versions will be installed  automatically   3  Inthe Actions column  click Install     The progress of the Up2Date installation on system 1 will be  displayed in real time in the Log Window  When the DONE  message appears  the process has completed successfully     Installing System Up2Date with the HA solution   1  Open the Up2Date Service menu in the System tab     2  Inthe Unapplied Up2Dates Master table  choose the Up2Date  updates to install     Note      If more than one System Up2Date file is listed  start with the  smallest version  Only one package can be installed with the  HA system     4  Inthe Actions column  click Install     58    Using the Security System    The progress of the Up2Date installation on system 1 w
104. ation        cccccceeeeeeseeeeeeeeeeeeeeeeeeenenans 71  5 1 7 1  RADIUS  20   cccceeeeeeeeeeeeee sees eeeeeeeeeaeeeaseeasaeeseeeeeeeeeneens 72    Table of Contents    Contents  5 1 7 2   5 1 7 3   5 1 8   5 1 9   5 1 10   5 1 11     5 2    5 2 1   5 2 2   5 2 3     5 3   5 3 1   5 3 2   5 3 2 1   5 3 2 2   5 3 2 3   5 3 2 4   5 3 2 5   5 3 2 6   5 3 3   5 3 4   5 3 4 1   5 3 4 2   5 3 4 3   5 3 5   5 3 6   5 3 7   5 3 8     Page  SAM     NT 2000 XP     ccecsceeeeneeeneeeeeneeeeeeeesneeeasenees 76  LDAP Serve     ccccceceeeeeneeneeeeeeeeeeeeeeeeeeeeeaeeaneaneeaeenes 78  WebAdmin Settings       c ccsceseeseeeeeeeeeeeeeeeeeeeeenenenae 91  WebAdmin Site Certificate          csccscsseeeeeeeeeeeeeeeees 94  High Availability        ssssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn 97  Shut down Restart          sssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn 102  Networks and Services  Definitions             s0000 103  NetWOrKS aerieni aaea aoni aa 103  Services iciieadicieiactseaiaiecsieteaateaaeveadsacaeetcesiaeecsaeten 110  USETrS  sssssssnsnnnssnnsssssssnsnsnnnnnnnnnannnnnnnnnnnnnnnnnnnnnnnnnnn 114  Network Settings  Network        cscssseseeeseeeeeeeeaes 118  Hostname  DynDNs        cceceeeeeeeeeeeeeeeeeeeeeeeenenenaes 118  Interfaces eaaa rea dacaceaetacecescaceavocessccdeacuaass 119  Standard Ethernet Interface         scscsseeeseeeeeeeneees 124  Additional Address on Ethernet Interface           128  Wireless LAN     ccccsccesccesenesseeeeseneeeeeenseeesseeeeseneene 130  Virtual LAN      ccc
105. ation  method  If you have defined a RADIUS server in the System User  Authentication menu  you can use it here as well    The configuration of the Microsoft IAS RADIUS server and the  configuration of RADIUS within WebAdmin is described in chapter  5 1 7 on page 71        Debugging   Enable       Debugging  This function allows you to check the L2TP over IPSec  connection  Detailed information is logged to the IPSec logs  These  protocols can be displayed in real time in the Local Log Browse  menu or downloaded to your local computer  Further information  about the Local Logs menu can be found in chapter 5 9 on page 307     288    Using the Security System    L2TP over IPSec IP Pool    L2TP over IPSec IP Pool This menu is used to de     Network   IPSEC Pool          TETOR Rear fine which IP addresses  Subnet Mask  255 255 255 0 PPTP hosts should be as   esl daar ee signed to  By default  a   network from the private  IP range 10 x x x will be selected when the L2TP over IPSec function  is enabled for the first time  This network is referred to as IPSec  Pool and can also be used for all other functions of the Security  system  using network definitions  If you wish to use a different  network  simply change the definition of the IPSec Pool  or assign  another defined network as IPSec Poo  here        Note     If you use private IP addresses for your IPSec Pool  such as the  pre defined network and you wish IPSec hosts to be allowed to  access the Internet  appropriate Masque
106. ation PC    e Correct configuration of the Default Gateway  IP Address  and  Subnet Mask    e An HTTPS compliant browser  Microsoft Explorer 5 0 or newer   Netscape Communicator 6 1 or newer  or Mozilla 1 6      JavaScript and Cascading Style Sheets must be activated     In the browser configuration  no proxies should be configured for  the IP address of the ethO interface on the firewall     Example Configuration       External Network As in the diagram on the  CE   mi   left  the security system    gt  22 should be the only link   a between the internal and  Internal Network external networks   SSS  gt                             Firewall    Network card 1  eth0O   Web FTP E Mail Network card 2  eth1   Server Server Server Network card 3  eth2     20    Installation    Address Table    ae IP Address Network Mask Default Gateway    Internal  network  interface    External  network  interface    network  interface        Network  interface for  the HA  system 2        1  The third and further network cards are optional     2  Network interface for the High Availability system     21    Installation    3 2  Installation Instructions    What follows is a step by step guide to the installation process     Attention     The installation process will destroy all existing data on the hard disc     Preparation   Before installation  please make sure you have the following items  ready    e The security system CD ROM    e The Address Table  with all IP Addresses  Netmasks and  Defaul
107. be  changed    WebAdmin user  access to WebAdmin   This user is called admin    Shell Login user  access to SSH   This user is called loginuser    Shell Administrator user  administrator privileges in the entire  security system    This user is called root     A Security Note   Use different passwords for the Shell Login and Shell  Administrator users     Astaro Configuration Manager User  optional   You need    this password  if you wish to configure the Security system with  the Astaro Configuration Manager     Boot Manager  optional   If set  the password will prevent un   authorized users from changing boot time parameters     Confirm the entered passwords by clicking Save     Installation    Log in to WebAdmin   User  admin   Password  Password of the WebAdmin user  Please note that passwords are case sensitive   Click Login     Note     Please follow steps 5 through 15 in the order listed below     Configure Basic Settings   In the System tab  open the Settings menu and enter the fol   lowing setting     Administrator E Mail Addresses  Enter the e mail address of  the administrator here    You can find further information about these functions in chapter  5 1 1 on page 44    In the Network tab  open the Hostname DynDNS menu and  enter the following settings in the General System Settings  window    Hostname  Enter the Hostname for this security system    A domain name may contain alphanumeric characters  periods   and hyphens  The end of the name must be a valid top lev
108. be used as the Local PSK Key as well     284    Using the Security System    5 7 4  Remote Keys                Senin alc  IPSec remote key objects  Name        can be defined in the  Virtual IP  optional    A  r Remote Keys menu  An          IPSec Remote Key Object  represents an IPSec re   ceiver  This receiver can  either be a security gate   way  a host or also a road warrior with dynamic IP address     Remote Keys    CA Management Remote Key          i No host certificates defined in CA Management       An IPSec remote key object is defined by three parameters   e The IKE authentication method  PSK RSA X 509     e The IPSec ID of the remote endpoint  IP Hostname E Mail Ad    dress Certificate    e The authentication data  Shared secret for PSK  public key for   RSA  X 509 certificate    Every IPSec remote endpoint must have an associated IPSec remote   key object defined    Defining IPSec Remote Keys    1  Under the IPSec VPN tab  open the Remote Keys menu    The New Remote IPSec Key will immediately be displayed    2  Inthe Name field  enter a name for the new Remote Key   Virtual IP Key If you wish to use the IPSec Remote Key for a  standard connection  continue with step 3    Virtual IP Key  optional   This function allows you to assign a  virtual IP address to the road warrior  This is the only way to  manually set IP addresses for such connections  If you enter an    IP address here  it must also be configured on the road warrior  system     285    Using the Security
109. ber into the Protocol  Number entry field     Comment  You can enter a service description in this entry field     Save the Services by clicking on the Add Definition button     After successful definition  the new service will appear in the service  table     Defining Service Group     1   2     112    Under the Definitions tab  open the Service menu     Click on the New Definition button   The entry window will open   Make the following settings     Name  In the entry field  enter a unique Service Group name   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters  are alphanumeric characters  minus      space      and  underscore  _   Names may be up to 39 characters long    Type  Select Service Group from the drop down menu     Using the Security System    Initial Members  From the selection field  select the services by  pressing the Ctrl key on the keyboard and selecting the name  with the mouse     Save the Service Group by clicking on the Add Definition  button     After successful definition  the new service group will appear in the  service table     Filters    The Filters function allows you to filter Services with specific  attributes from the table  This function considerably enhances the  management of networks with many services  as services of a certain  type can be presented in a concise way     Filtering services     1     Click on the Filters button   The entry window will open     En
110. cate with the remote host   Please note that both IPSec nodes must support NAT traversal  and  that road warrior nodes must be configured with a virtual IP address    In addition  IPSec passthrough must be turned off on the NAT    device s   as this can break NAT traversal     You cannot use local IP addresses for the Virtual IP address   because the security system does not answer ARP requests for these     I Important Note     Copy TOS Flag  Type of Service Bits  TOS  are several four Bit   flags in the IP header  The Bits are referred to as Type of Service   Bits  as they allow the transferring application  to tell the network  which type of service quality is necessary  The available service  quality classes are  minimum delay  maximum throughput  maximum    reliability and minimum cost     This function copies the content of the Type of Service field in the  encrypted data packet  so that the IPSec data traffic can be routed    according to its priority     Enable the Copy TOS Flag function by clicking on the Enable button     295    Using the Security System    Send ICMP Messages  If a data packet overwrites the configured  MTU value  the system will send an ICMP message to the source  address  Destination unreachable fragmentation needed    This allows for using Path MTU Discovery     Automatic CRL Fetching  There might be situations  in which the  provider of a certificate attempts to revoke the confirmation awarded  with still valid certificates  for example if it ha
111. ccceseeeeseeeeseeeeeeneeseneeeeeeeseneeeeeeeoees 140  PPPOE DSL Connection       cscseseeseeneeeeeeeeeneeeeeeenes 145  PPTPOE PPPOA DSL Connections      sssseeseeeeeeeees 150  ROUTING TT 155  NAT   Masquerading       cceseeeeeeeeeeeeeeeeeeeeeeeeeenenenaes 157  NA Dis ccsetsicceressiceccaietecaceacsccacsasscvedessadecasacdsasseasacaee 157  Masquerading     csccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeenenenaes 161  Load Balancing       cccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeenenenaes 163  DHCP Server     cccceneeeeeneeseeeeeeneeeeeeeeeeeaeeaeeeeeaneeaeen 165  PPTP VPNiviccccisscesccccsdasevacecivectsadeersdanvasensacdeivaeeds 169  ACCOUNTING   wa ce ceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeueeaueeeeeeaeaees 175  PING CHECK     ccscscscececeeeeeeeeeeeeeeeeeeeaeeeeeeeeeeeeeeeeeuas 177    Contents    5 4    5 4 1   5 4 2   5 4 3     5 5    5 5 1   5 5 2   5 5 3     5 6   5 6 1   5 6 2   5 6 3   5 6 4   5 6 5   5 6 6   5 6 6 1   5 6 6 2   5 6 7     5 7    5 7 1   5 7 2   5 7 3   5 7 4   5 7 5   5 7 6   5 7 7     Table of Contents    Page  Intrusion Protection      csccecsceeeeeeeeeeeeeeeesenseeeeeeees 179  Settings     ccceceeeeeeeeeeeeeeeeeeeeeeeaeeeeeeeeeeeeeeeueeeseeeeaees 179  RUIS ssiitcee si accisetescectccievarecssceesacdarsdaetasectsascresaads 182  Advanced 2    ceceneeeeceeeeeeeeeseeeeseeeeseeeeseeaseeeeseeeaseaees 186  Packet  Filter siicicecisccccveacisiavatsacdeccssdeuanstentievesccatan 188   00   eee E esaat orota aaee aoaaa aeaa reece re rer 188  ICMP woe ecccecee cece esse eeeeeeee
112. ce messages  The activities of the Up2Date Service  are recorded to these log files  This comprises also the System  Up2Date and Pattern Up2Date processes     Uplink Failover messages  The activities of the configured failovers  are recorded to these log files     WebAdmin usage  The use of the WebAdmin configuration tool is  recorded to these log files  The logs contain the configuration  changes  implemented by the configuration tool and also the log in  and log out processes     5 9 3 2  Error Codes    The following is a list of all error  warning  and information codes with  their meanings     INFO    000 System was restarted  System was restarted   010 Backup file  A system backup file was generated automatically  and sent via e mail to the Administrator    105 Astaro User Authenticator  AUA  not running    restarted   106 Cron Task Scheduler not running   restarted   107 WebAdmin webserver not running   restarted   108 ssh server not running   restarted   109 license server not running   restarted   110 configuration database server not running    restarted   111 syslog server not running   restarted       320    112    150    151    152    153    154       155    300    302    303    320    321    322    Using the Security System    middleware not running   restarted    Root partition mounted at   is filling up      please check    tmpfs partition mounted at  opt tmpfs is filling    up   please check    secure application partition mounted at  var sec    is filling up 
113. ch of these approaches has advantages and disadvantages which  must be balanced according to cost and security requirements     15    Introduction to the Technology    Internet       VPN client for  remote access       Firewall EES   F    Server Server e555   gt     Virtual Private Networks  VPN  provide a cost effective solution to  this problem  they can connect LANs over the Internet using en   crypted connections  thus enabling secure  transparent  end to end  communication without the need for leased lines  This is especially  useful when an organization has many branch offices connected to the  Internet  IPSec technology provides a standard model for these  secure connections     These secure connections can be used automatically  independent of  the data being transferred   this protects the data without requiring  extra configuration or passwords on the client systems     16    Introduction to the Technology    At the other end of the connec   ISO OSI TCP IP tion  the data is transparently de   Aygeiiectiton Level coded and forwarded to the recipi     7 Application Layer 3  Ble STRE mall ent in its original form     6 Presentation Layer    The Firewall component of this    5 Session Layer security system is a hybrid of the  EET Transmission Level preceding protection mechanisms   TCP  UDP _  combining the advantages of  3 Netwerk Layer Internet Level  IP  ICMP each   i Network Level 5  Z Deta Lak Lener Ethernet The Stateful Inspection Packet    1 Physical Layer Filter
114. connection time  The DSL Network guidebook is available at  http    docs astaro org     145    Using the Security System    Configuring PPP over Ethernet  PPPoE DSL      1   2     146    In the Network tab  open the Interfaces menu     Click on the New button   The Add Interface window will open     In the Name entry field  enter a descriptive name for the  interface     Use the Hardware drop down menu to select a network card   Tip     For an external connection  e g   to the Internet  choose the  card with Sys ID eth1     You cannot choose a network card that has already been  configured with a primary network address     Use the Type drop down menu to select the PPP over Ethernet   PPPoE DSL  connection interface type     You will need the connection settings provided by your ISP to  configure the following settings    Address  If you have not been assigned a static IP address by  your provider  keep the default Assigned by remote setting  here  If you have a static IP address  choose Static from the  drop down menu and enter the address in the entry field   Default Gateway  You should probably keep the default setting  Assigned by remote  Other possible values are Static and  None    Username  Enter the username  provided by your ISP   Password  Enter the password  provided by your ISP    Uplink Failover on Interface this function will only be  displayed if the Assign by DHCP or Static is selected in the  Default Gateway drop down menu     Using the Security System    You
115. correctly report that the connection has been  established     Authentication  Use the drop down menu to select a service     Now define which IP addresses should be assigned to the hosts  when connecting  In the PPTP IP Pool window  use the Net   work drop down menu to select a network  The chosen network  will be used immediately    The PPTP Pool network is selected by default     The IP address  network mask  and number of free addresses    will appear below the drop down box   Users will be assigned an address from this range automatically     In the PPTP Client Parameters window  DNS and WINS  servers for PPTP clients can be defined  Two servers may be  defined for each     Client DNS servers  Enter the IP addresses of the DNS servers  to use    Client WINS Servers  Enter the IP addresses of the Windows  name servers to use     Using the Security System    Client domain  Enter the DNS domain that the client should  append to DNS requests     6  Save your configuration by clicking Save     The rest of the configuration takes place on the user   s machine  This  will require the IP address of the server  as well as a valid username  and password  These should be supplied by the security system  administrator     1  In Microsoft Windows 2000  open the Start Settings Network  and Dialup Connections menu     N    Click the Make New Connection icon   The Network Connection Wizard will open   Then click on the Next button     3  Select the following option  Connect to a private
116. cture    at right   This can help to navigate quickly between pages           The second row contains tools to control the display of the list  Note  that these do not change the configuration information  but rather the  way in which these entries are displayed within WebAdmin  In cases  where order is important  only the order indicated by the numbers  next to entries has an effect on the configuration of the function  The  buttons   and     in the left hand column display the list in ascending  and descending numerical order respectively  while the   and    buttons in the middle column display the list in ascending or  descending alphabetical order     39    WebAdmin    The functional order  as indicated by the numbers to the left of each  entry  can be adjusted using the buttons in the right hand column  A  click on the   or    button in this column will move the entry one row  up  i e   towards 1  or down  towards the end of the list  respectively   Similarly  you can move an entry to the very beginning or end of the  list by clicking the    or    buttons in this column  respectively     Add entry  Type a value in the text entry field and click Add   The new value will appear in the last row of the table     Delete entry  By double clicking an entry  you can remove it from  the list     Edit entry  If you click an entry once  it will appear in the entry field   Edit the entry as desired and click the Replace button to put it back  into the list     4 4  Online Help    Ev
117. d  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status  Quarantine  This menu presents further options  including options  to read or to send the message     Pass  The e mail will be treated by the filter  but allowed to pass   A Header will be added to the e mail  by which it can be sorted or    245    Using the Security System    filtered on the mail server or in the e Mail programs of the  recipient     For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     Extensions  Enter the file extensions  e g  exe   that the firewall  should filter     The function of the Control List is identical to the Ordered List and  described in chapter 4 3 4 on page 39     Virus Protection    The Virus Protection function allows you to check e mails and  attachments for dangerous contents such as viruses  Trojan horses   and so on  The results of the scan are inserted into a header of the  message     If the Virus Protection discovers an infected e Mail  the message  will be filtered by the firewall  The further handling will be according  to the setting configured in the Action drop down menu     Action  This drop down menu allows you to select the action the  proxy should take upon finding a message with a filtered string  The  following actions are possible    e Reject  The message will be bounced back to the sender with a    5xx error message  The bounce message sent to the sender will  also contain an explanati
118. d reports will have no data for the skipped hour  In most  graphs  this time period will appear as a straight line in the  amount of the old value     e Accounting reports will contain values of 0 for all variables during  this time     Moving backward  e g   daylight saving time to standard time     e There are already log data for the corresponding span of time in  the time based reports that for system purposes come from the  future  These data will not be overwritten     e Log data will be written as normal when the time point before the  reset is reached again     45    Using the Security System    e Most diagrams will display the values recorded during this period  as compressed     e Accounting reports will retain the values recorded from the     future     Once the time point of the reset is re reached  the ac   counting files will be written again as normal     Because of these difficulties  we recommend that the time be set only  during the first configuration  and that only minor adjustments be  made later  We recommend setting the system clock to Central  European Time  CET   This is the original time  The system then runs  always in CET  not in in CEST  Central European Summer Time   We  recommend  not to change the time for summer  especially not when  the collected reporting and accounting data are treated     Manual configuration of system time     1  Open the Settings menu in the System tab     2  In the Time Settings window make the following settings in the
119. ddress  host on the IP level  Please  note that these tools require  that the ICMP on firewall option under the Packet Filter ICMP  menu be enabled  Ping sends an ICMP Echo Packet to the remote  machine  When this packet is received by the remote machine  its  TCP IP stack will generate an ICMP Reply Packet and send it back   This allows you to test that IP level connectivity with the remote  machine                 Ping Check also allows you to check the connection with a host by  entering the DNS hostname  In order to do that  DNS Proxy must be  enabled in the Proxies  DNS menu     Note     e Ping will not work unless ICMP on firewall  in the Packet  Filter ICMP menu  is activated     e Name Resolution will not work unless DNS Proxy  in the  Proxies DNS menu  is activated     177    Using the Security System    Using Ping    1  Under the Network tab  open the Ping Check menu    2  Use the Ping Host drop down menu to select a network card   If this is an interface with a host  configured in one of the menus  Interfaces or Networks  you can select it directly from the  drop down menu    Example  Internal  Address  for the internal network card on  the security system    For another host in the network  select the setting Custom  Hostname IP Address from the drop down menu    3  Inthe Hostname  IP Address entry field  enter the IP address  or hostname    4  Click Start to begin the test connection     178    Using the Security System    5 4  Intrusion Protection    The Intrusi
120. de to  use     Note again that some modes require client side configuration   The modes are described in chapter  Operation Modes       Having set the Standard or Transparent mode  continue with  step 5     If you have selected the User Authentication mode in the  Operation mode drop down menu  define the method of user  authentication to use here     Authentication Methods  Only those authentication methods  that you have configured in the Settings User Authentication  menu are available here     If you have configured the Local Users method  use the  Allowed users selection menu to choose users allowed to use  the proxy  Local users are defined in the Definitions  Users  menu    In the Log level drop down menu  choose the appropriate level  of logging     Full  All relevant information is recorded     213    Using the Security System    Access Log only  The log only records access information  for  example URL accessed and username IP address of the client     None  No information about the proxy use is recorded     6  The Anonymity drop down menu allows you to choose how  much information about the client is passed on to the remote  server in HTTP Request Headers     Standard  The following headers are blocked  Accept Encoding   From  Referrer  Server  WWW Authenticate and Link    None  Client headers are not changed at all    Paranoid  All headers except those listed below are blocked   Additionally  the    User Agent    field will be changed so that no  information about
121. dentical to the ordered list  and is described in chapter 4 3 4 on page 39     Confirm these settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red     Enable the interface by clicking the status light     Using the Security System    The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system  requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     Configuring a Wireless LAN Station     1   2     In the Network tab  open the Interfaces menu     Click on the New button   The Add Interface window will open     In the Name entry field  enter a descriptive name for the  interface     Use the Hardware drop down menu to select the Wireless LAN  network card     Use the Type drop down menu to select the Wireless LAN  Station interface type     Fill in the required settings for the Wireless LAN Station     Address  Assign an IP address for the station  If you wish to use  a static IP address for this interface  select Static from the drop   down menu and enter the address to use in the entry field  If  you wish to have a gateway dynamically assigned via DHCP   select Assign by DHCP from the drop down menu    Netmask  If you wish to use a staticall
122. ders ii 251  High Availability    97  High Availability System  installing soccer 98  Host  addiNG siiis itiwana 104  Celeting           cceeeeeeees 109  EditiNg sieves ethos 109  HOSKNAME 2    ees eeee seen eee e ees 118  HTTP  Surf Protection categories  seit Sdwoke See ee reas Deena es 216  HTTP Proxy  enabling the HTTP proxy  aa tb ad snaicd expects banana ele 213  operation modes           212  user authentication mode  AE EEEE ddan 212  HTTP Proxy  advanced       cece eee eee 226  global settings              212  standard mode             212  transparent mode         212  ICMP    firewall forwards ping    203  firewall forwards traceroute    firewall is ping visible     203  firewall is traceroute visible    E EET 202  ICMP Forwarding           200  ICMP on firewall            201  introduction scce 200  Log ICMP Redirects       201  ping on firewall             203  ping Settings    203    traceroute from firewall 202    traceroute settings        201  Ident   forward connections      237   introduction           c0000e 237  Installation   configuration   esee 27   INSCFUCTIONS       00cceeee eee 22   preparation    ssec 22   SOFCWALE     cc cece eeeeeeeeaeees 22  Interfaces   adding additional addresses   Maing A aE a Mie AANT 128    additional address on  Ethernet interface       128  configuring a Virtual LAN    configuring PPPoA DSL  151  configuring PPPoE DSL   146  current status            5 121  downlink bandwidth  kbits   riduan 127  144  148  154  Ethernet 
123. e  Active or in the Passive mode   are recorded to the Packet Filter log  file with the annotation FTP_DATA     The log files are administered in the Local Logs Browse menu     206    Using the Security System    System Information    Sree Packet Filter Live Log  The    Packet Filter Live Log        Bie oO eis Packet Filter Live Log  Cenc STATI monitors the packet filter  iar eee and NAT rules in place on the  Security system  The window  provides a real time display of packets intercepted by the packet  filter  This is especially useful in troubleshooting and debugging  packet filter rules  If  after the security system starts  a networked  application  such as online banking  is not accessible  the Packet Filter  Live Log can help you reconstruct which packets are being blocked by  the packet filter        Connection Tracking Table           The Current Packet Filter  rules and Current NAT  rules editing fields show all  current rules in place in the  firewall kernel           De  jon      sowe      Action  IP Address  Port   ip address  Port  13 25 52 ACCEPT 10 113 113 5 1157   gt  192 168 5 217 443  19 25 53 ACCEPT 40 113 113 5 1158   gt    192 168 5 217 443  13 25 53 ACCEPT 10  113 113 5 1159   gt  192 168 5 217 443  13 25 53 ACCEPT 10 113 119 5 1160   gt    192 168 5 217 443  13 25 53 ACCEPT 10 119 113 5 1161   gt  192 168 5 217 443  19 25 53 ACCEPT 10 113 113 5 1162   gt  192 168 5 217 443  13 25 53 ACCEPT 10 113 113 5 1163   gt  192 168 5 217 443  13 25 54 ACCEPT 10 1
124. e  Intrusion Prevention   Clicking on the  icon switches the application of the IPS rules in this group        Clicking on the folder icon opens the sub tab with all protocols of  this group    By clicking again on the icon  you will get back to the overview  The    182    Using the Security System    additional functions in the sub tab are described in the  IPS Rules  Sub tab    section     Group  The name of the IPS group of rules is displayed in this  column  The groups are put in alphabetical order according to this  name  Clicking in the header automatically displays the groups in de   or increasing alphabetical order     Hits  This column displays  how often a rule from the group became  active     Info  This column provides short information on this IPS rule group     The IPS Rule Sub tab    All IPS rules of a group are listed in this sub tab  The sub group can  be opened in the overview by clicking on the folder icon  B          U  pr ddos 0 Rules for Distributed Denial of Service  Bo  pr dns 0 Rules for DNS protocol  QU  pre dos 0 Denial of Service attacks   0    BO  p    exploit    Well known exploits of specific software       Intrusion Protection ot  2 entries  1992    p   Hits   Info                BU  z   P dns 0 Rules for DNS protocol    0  pr dns 0      DNS EXPLOIT named overflow  ADMROCKS    ID 260   GU 39 dns o pB DNS EXPLOIT x86 Linux overflow attempt   ID 262   80  pr dns 0 D   DNS Zone transfer TCP   ID 255   BU 3G dns o p DNS EXPLOIT x86 Linux overflow a
125. e  internal or DMZ servers avail   able to the outside network for  specific services     LAN 1 1 1 1 88  R     Request       DMZ    Example  An external user   see graphic on left  with the IP    address 5 4 3 2 sends a re     Web TS quest from port 1111 to the    Server Firewall web server in the DMZ  The  1O10  OSE user knows only the external IP  and port  1 1 1 1  port 88    Using DNAT  the firewall changes the destination address of the                                                                                  o             O         O             n                                         14    Introduction to the Technology    request to the internal address of the web server  10 10 10 99  port  80   and sends it to the web server  The web server then responds   using its own internal IP address  10 10 10 99   and sends the reply  back to the user  The firewall recognizes the packet from the user   s  address and changes the source address of the reply from the web  server s address to its own external address  1 1 1 1  port 88      Another advanced protection mechanism supported by this system is  VPN technology  To meet the demands of modern business  IT  infrastructures must offer real time communication and allow close  cooperation between business partners  consultants  and branch  offices  Increasingly  these demands are being met through the use of  extranets  which usually operate either    e via dedicated lines  or  e unencrypted over the Internet     Ea
126. e ID  This  ID is contained in the header of the message  and is used by the  system to identify messages in the log files  The ID will be displayed   when you touch the entry in the Type field with the mouse     Type  Proxy Content Manager distinguishes between the POP3 and  SMTP types of filtered e mail  If you touch the entry with the mouse   the Mail ID will be displayed  Clicking on the entry opens a window  with the content of the message  Thus you can safely read important    255    Using the Security System    messages  Messages of a length of up to 500 lines will be displayed  completely     Age  This column displays the age of an e mail  i e   the period of  time since when the e mail has arrived to the Internet security  system     Status  The states of the e mails are displayed in the Proxy Content  Manager through symbols     e deferred       The e mail will be sent to the intended recipient   Normally  messages of this type are forwarded soon after the  proxy receives them  If  however  temporary problems delivering  the message are encountered  it may remain in the queue with  this status for a short while  Such messages will be delivered as  soon as the destination host can be contacted     e Quarantined      The e mail will be quarantined due to the  Quarantine configuration to one of the Content Filter Modules   Unwanted or dangerous content such as a virus have been dis   covered in the message  Such messages will remain in the table  until an administrator
127. e Internet addresses  one beneath the other into  the entry field  e g  www    astaro  org   Comments  must be identified with a         sign at the beginning of each  H   line  Save your changes by    Cancel Save       clicking on the Save button   To keep an entry  click  cancel        URL Blacklist  This is an additional function of the Surf Protection  Categories  With this access control list you can  forbid  the access  to specific Websites with a content that doesn t match the subjects in  the Surf Protection Categories     Open the access control list by clicking on the field with the entry   e g  O entries   Enter the Internet addresses one beneath the other   Comments must be identified with a   sign at the beginning of each  line    Save your changes by clicking on the Save button  To keep an entry   click cancel     Surf Protection Categories  In this field  choose the kinds of  websites to which access should not be allowed    Open the access control list by clicking on the field with the entry   e g  0 entries      The Surf Protection option contains 17 defined Surf Protection  Categories  Those 17 categories are administered and edited in the  same table     The administration of the Surf Protection Categories is described  on page 216     219    Using the Security System    Embedded Object Filter  This function deletes embedded objects  such as ActiveX  Flash or Java from the incoming HTTP traffic     A Security Note   Enable this function only  if high securi
128. e can also  be defined as the last step in creating the policy     Key Exchange  Only IKE is supported     In the ISAKMP  IKE  Settings window  configure the settings  for IKE     IKE Mode  The IKE mode is used to support key exchange  At  the moment  only the Main Mode is supported    Encryption Algorithm  The encryption algorithm is the algo   rithm used to encrypt IKE connections  The IPSec VPN function  of this security system supports 1DES 56bit  3DES 168bit   AES  Rijndael  128bit  AES Rijndael 192bit  AES Rijndael  256bit  Blowfish  Serpent 128bit and Twofish   Authentication Algorithm  The hashing algorithm ensures the  integrity of the IKE messages  The MD5 128bit  SHA1 160bit   SHA2 256bit and SHA2 512bit algorithms are supported  The  algorithm used is determined by the remote endpoint of the  IPSec connection     Important Note     The SHA2 256bit and SHA2 512bit algorithms require a great  deal of system resources     IKE DH Group  The IKE group  Diffie Hellmann group   describes the kind of asymmetric encryption used during key  exchange  The IPSec VPN system on this security system  supports the Group 1  MODP768   Group 2  MODP 1024    Group 5  MODP 1536   Group X  MODP 2048   Group X    Using the Security System     MODP 3072  and Group X  MODP 4096  protocols  The  group used is determined by the remote endpoint    SA lifetime  secs   This option allows you to set the lifetime of  IKE sessions in seconds  This is set by default to 7800 seconds   2h  10 min   
129. e following settings     A description of how to use the selection field tool can be found  in chapter 4 3 2 on page 36    Allowed Networks  Here you can select the networks and  hosts that should be allowed to use the proxy     All settings take effect immediately and will be saved if you leave this  menu     SOCKS Proxy with User Authentication     If you have enabled the User Authentication function  proxy users  must use a username and password to log into the SOCKS proxy   Because only SOCKSv5 supports User Authentication  SOCKSv4 is  automatically disabled     The Authentication Methods selection menu allows you to select  the user authentication method to be used  Only those authentication  methods  you have configured in the Settings User Authentication  menu are available here  If you choose to use the Local Users  method  you can select which local users may access the SOCKS    230    Using the Security System    Proxy   Local Users are managed in the Definitions Users menu     231    Using the Security System    5 6 4  POPS           Transparent POP3 Proxy    Status  eo Disable    POP3 stands for Post  Office Protocol 3  This is a  protocol  which allows the  retrieval of e mails from a  mail server  POP3 is the   logical opposite of SMTP   Sak Rien  lt  SMTP stands for Simple Mail  CEE Transfer Protocol  This proto   Paia m col is used to deliver e mails   to a mail server              Proxied Source Destination  e    networks     Please select   gt    i Please se
130. e system encounters another problem  delivering it  the message will return to its previous status     Download as  zip file  The chosen e mails are packed into a zip file  and then saved to the selected local host     257    Using the Security System    Global Actions    In order to save disk space on the security system  you can use this  option to delete all messages of a certain type  E mails being sent or  forwarded while the system is deleting messages will not be affected   From the Please select drop down menu  select the type and start  the action by clicking on the Start button    If you wish to actualize the SMTP POP3 Proxy Content table  select  the Refresh proxy content table action from the Please select  drop down menu     Attention     Messages of the selected type will be deleted without further  confirmation     Filters    The Filters function allows you to filter E Mai s with specific attributes  from the table  The function facilitates the management of huge  networks  since the protocols of a specific type can be presented in a  concise way   Filtering e mails   1  Click on the Filters button   The entry window will open   2  Enter the filter attributes in the following fields  Not all attributes  have to be defined   Type  If you wish to filter e mails of a specific type  select them  from the drop down menu     Status  If you wish to filter e mails of a specific status  select  them from the drop down menu     258    Using the Security System    Content
131. e wireless LAN can coexist    131    Using the Security System    in the same physical space provided that they have different  names or use separate channels  The name of a network can be  chosen freely  the only requirement is that it not contain any  space characters    If you are configuring a Wireless LAN Station interface to  connect to an already existing wireless network  this must be the  name of that network  The name can be up to 32 characters long     e Channel  This system must be manually configured with the radio  channel to use  If other wireless networks are in the area  you  should chose an unused channel for your network    Please also note that only certain channels may be used in certain  countries     USA  amp  Canada Spain 10 11  Europe  ETSI  France 1 to 13  Japan    e WEP  In order to use WEP encryption  you will need at least one  WEP key   up to four can be used  You can choose between a 40  bit and 104 bit keys  A 40 bit key requires 5 hexadecimal num   bers  while a 104 bit key requires 13 numbers  Please note that a  hexadecimal number is two characters  each either a number  0 9   or a letter  A F     Example of a 40 bit key  17 A5 6B 45 23       e Access Mode  only for Wireless LAN Access Point mode   If you  wish to use the MAC address filter  you must compile a list of the  MAC addresses which are explicitly allowed to connect to the  network  positive filter   or which are explicitly not allowed to   negative filter     How to determine the 
132. eaeeeaseseeeeeeeeueuaeaeaeeeeeeeeaeonee 200  AVANCE 2    ceceeeeeeeeeeeeeeeeeeeeeseeeeseeeeeeeeaseeeeseeeaseeees 203  Application Gateways  ProxieS         ssssseseseseeeeees 209  HTTP  Surf Protection     ccccccsecseeseeeseeeeeeeeeseseeeeees 210  DNS cases aanaeio a aa aaa aaar oaa 227  SOCKS    occ ccceeeeeeeeeeeeeeeeeeeeeeeeeaeaeaeeseseeeeeeeeueeeneeaeagas 229  POPS wiscicccecsieecne tec ecenseseviseeeesceceeeweweueceesceeseaseeecen 232  TOI cc r A E E 237  SMTP  oa ccccceeeeeeeeeeeeeeeeeeeeeeeeeeeaeaeaeeeeseeeeeeneueeenenaeaeas 238  Virus Protection Content Filter         ccsscssesseseeees 243  Spam Protection        cccceeeeeeseeeeeeeeeeeeeeeeeveeeeeeeeeees 248  Proxy Content Manager       ccsceseeeeeeeeeeeeeeeneeneeeens 255  Virtual Private Networks  IPSec VPN  s s s    260  CONMNECUIONS      ccceceeeeeeeeeeneeeeeeeseneeeeeeeseneeseeeeseneeae 269  Policies uana aeaaea aap naaa anaE aia 277  Local KCYS     cccscsccceceeeeeeeeeeueueeeeeeeeeeeseeeeeeueuenenenaes 282  Remote KEyYyS   ssssssssssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn 285  L2TP Over IPSCC    cccseeseeeceeeeeeeeeeeeeeeeeaeeseeeeeeneeaeen 288  CA Manageme nt     ccccssccceeeeeeeeseeeeeeeeeeeueeeeueeeeeeneas 290  AROVANCO vaiciscetsiescscieedsceevacedswerevedecsuewescevedeancsaues 295    Table of Contents    Contents Page  5 8  System Management  Reporting           sseseseseeees 298  5 8 1  Administration        cccecseseseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 298  5 8 2  VIFUS we eeece cece eee eee eee nena ee ea
133. echanisms           hitelist   URL Bl    Oentries Oentries    Those protection mechanisms are   e Virus Protection  VP    e Embedded Object Filter   e Script Content Filter    This Surf Protection option can only be configured when the HTTP  proxy is enabled     215       Using the Security System    Surf Protection Categories              The Surf Protection  SSS g option contains 17 de   Community_Education_Religion e Cities Countries Regions a     Te fined Surf Protection  ae F  eoan Categories  The cat   e Upbringing Education Reconnoitring i  Criminal_Activities o Shiner egories are based on  e Illegal Activities  Drugs Haone the URL data base  S uE   z  o E E from Cobion Security  Entertainment_Culture e Art Museums    Sa es Technologies and  Humor  Bae tes can be edited in this  Extremistic_Sites Extreme    Finance_Investing 0 ocume atonal eapicayinvesting ta ble   e Brokerage Stock Exchange  Games_Gambles e Computer Games          Editing Surf Protection Categories     1  Enable this option by clicking the Enable button in the Surf  Protection  Content Filter  window     The status light will show green and an advanced entry window  will open     2  Click the Show Hide button to open the table with the  categories     The name of category is displayed in the Name field  This name  will be selected later from the Profiles Table  The Subcategories  field lists the subcategories     3  Now click on the entry  you wish to edit     Clicking on Name opens another entry wind
134. ectet ter rue ts dsabied    DBE  statu ight  rocket fiter rue enabled         193    Using the Security System    Icon Spalte Anzeige Einstellung      p  Action Allow  low priority      D Action Drop  pa  I Action Reject   Vw Log Log disabled  Q  Log Log enabled    Adding editing groups  Clicking in the field in the Group column  opens an entry window  Clicking on the Save button saves your  changes    To cancel this service click on the Cancel button     Enabling Disabling Packet filter rules  The status light in the  fourth column shows the rule status  Clicking the status light toggles  the state between active  green light  and inactive  red light    Deactivated rules remain in the database  but have no effect on  firewall behavior     Edit rules  Clicking on the correspondent setting will open an entry  window  The rule can then be modified  Click Save to save your  changes    In order to interrupt this process  click on the Cancel button     Re order rules  The order of the rules in the table determines the  behavior of the firewall  having the correct order is essential for  secure operation  By clicking the position number  you can adjust the  order to suit your needs  In the drop down menu select the Position   to which you wish to place the packet filter rule and confirm your  settings by clicking on the Save button     Delete rules  Click the trash can icon to delete a rule from the table     Sorting the rules table  By clicking on the column headers  you can  sort
135. ection  the standby system can monitor the active system  through the serial interface  No data is transferred over this  connection  Use the drop down menu to select the appropriate  serial interface to use this option     Note     sine you save the settings  according to the following     instructions  the system will shut down and reboot immediately     4  Click the Save button to save these settings     The first system will shut down and reboot immediately  If you  have connected a keyboard to this machine  the Num Lock light  will flash     When the system is in Hot Standby Mode  it will beep twice and  the LED display will stop blinking  Because system 2 is still  disabled  the first system will boot normally into normal mode   and the Num Lock light will continue to blink    After system 1 completes the boot process  the Num Lock light  will stop blinking  and the system will beep five times  This  signals that the middleware has successfully loaded and  initialized all services  rules  and processes     Note     If the beeps are not heard  and the LED light continues to blink     the middleware was unable to initialize all services  rules  and  processes  If this happens  please contact the service  department of your security solution supplier     100    Using the Security System    Configuring System 2  Hot Standby Mode      1  Start system 2 as normal     2  Complete steps 3 through 6 as above  and click Save     The system 2 will now shut down and reboot immediat
136. ectly  The Certificate window will open  These  registers allow you to inspect the information contained in the  certificate before installing it     Click the OK button to start the process     Note    l Due to system time differences and timezone offsets  the generated  certificate may not yet be valid  Many browsers wrongly report that  such certificates have expired  however this is not the case and any  generated certificates will become valid after a maximum of 12  hours     96    Using the Security System    5 1 10 High Availability    The main cause of system failure is hardware failure  such as a failure  of the network card  hard disk  or processor  The High Availability   HA  option allows you to use two systems with identical hardware in  parallel  The first system runs normally  master mode   while the  second runs in standby  slave  mode  monitoring the active system  over the data transfer link using the link beat  The standby system  also receives periodic updates over this link so that  in the case of  system failure on the primary  it can take over operations  immediately   External Network   a    Ea Router  Internal Network  LAN    Site       IE    snnm       a                     Internet    External IP         data transfer       DMZ        Firewall 1 Firewall 2  Normal Hot Standby    gt    gt  Mode              Mode S  Switch    E   switch       Hardware and Software Requirements  e The High Availability  HA  License  e 2 security systems with identical 
137. ectory and Novell  eDirectory LDAP servers as well as those based on the Open Source  OpenLDAP software     Microsoft Active Directory is an indexing service designed espe   cially for Windows NT 2000 networks  and allows the central manage   ment and organization of network resources  It allows users to access  system resources after a single sign on to a central server  and offers  administrators centrally organized management of users  regardless  of network topology or protocols used    In order to use this directory service  you will need an MS Windows  NT 2000 Domain Controller     Novell eDirectory   Novell Directory Service 8   is an X 500 based  index service designed to manage users  access rights  and other  network resources  eDirectory is available for Netware versions 5 and  higher  MS Windows NT 2000  Linux  and Solaris     78    Using the Security System    The OpenLDAP Foundation  the group which manages the Open   LDAP open source project  has released the Stand Alone LDAP  server  called SLAPD  OpenLDAP can also be used to build a  networked directory service with various other LDAP servers  For  instance  the iPlanet Directory Server from Sun Microsystems is  based on OpenLDAP code and fully compatible     User Authentication    LDAP uses the Distinguished Name  DN  of a user to identify him  or her  This name must be unique within the directory     Microsoft Active Directory  AD  and Novell eDirectory  NDS8   give every object a defined DN  This DN identi
138. ecurity System    If the destination computer is reachable  you will receive the  ping replies and some information about network latency     5  Enter the following command   arp  g  6  Press the Enter key     Your computer   s local ARP table will now be displayed  The  Physical Address column of this table shows the MAC address  for each known IP address     In order to connect to a remote computer on the same subnet  the  local computer addresses Ethernet frames to the remote computer   s  MAC address  In order to do this  it must first determine the remote  hardware address by issuing an ARP request  When you issue the ping  request  your local computer automatically determines the remote  computer   s MAC address and stores it in the local ARP table for future  use     If you wish to configure a PCMCIA Card for the Wireless LAN as an  Access Point  complete the following steps  Configuration as a  Station is described on page 137     Configuring a Wireless LAN Access Point   1  In the Network tab  open the Interfaces menu   2  Click on the New button    The Add Interface window will open     3  In the Name entry field  enter a descriptive name for the  interface     4  Use the Hardware drop down menu to select the Wireless LAN  network card     5  Use the Type drop down menu to select the Wireless LAN  Access Point interface type     134    Using the Security System    Fill in the required settings for the Wireless LAN Access Point     Address  Assign an IP address for t
139. eeeeeeeeseeeeeeeeeeeeeeneneeaeaees 299  5 8 3  HardWware    ccscscscececeeeeeeeeueeeeeeeeeeeeeseseeeeeeeeueuenenaes 299  5 8 4  NeCtWOFkK     ccceeeeeeeeeeeeeeeeeeeeeeeeuaeaeaeaeeseeeeeeeeeeeenauas 300  5 8 5  Packet Filter     c ccccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeenenanaes 301  5 8 6  Content Filter      cccccceeeeeeeeeeeeeeeeeeeeeeeeeeeeveeeeeeeeeees 301  5 8 7  PPTP IPSeCC VPN     ccccceeeeeeeeeeeeeeeeeeeeeeeeeeeeenenenenas 302  5 8 8  Intrusion Protection        cccccceeeeeeeeeeeeeeeeeeeeeeeeeenee 302  5 8 9  r a T 302  5 8 10  HTTP Proxy USAGE    ssssssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn 302  5 8 11  Executive Report      ccccceeeeeeeeeeeeeseeeeeeeeeeeeeeenenenaes 302  5 8 12  ACCOUNTING    ce ceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeueneneneeaeaees 303  5 8 13  System Information         ccscscseeeeeeeeeeeeeeeeeeeeeeeeeees 305  5 9  Local Logs  Log FileS           ssssssesssensseseeesensseneeens 307  5 9 1  Settings      cceceeeeeeecee ee eeeeeeeeeeeaeeeeeeeeeeeeeeeeeeeneeeeaeas 307  5 9 2  Local Log File QUerry       csscseseseeeseeeeeeeeeeeeeeenenenaes 311  5 9 3  BrOWSE  wcsccecceeceeeeeeeeeeeeeeeeeeeeeneeeeeeeeeeeeneeeennaneeneen 312  5 9 3 1  LOG File      ccecseseecee eee eeeeeeeeeeeaeeeeeeseseseeeeeeeeeenenans 316  5 9 3 2  Error COCCS    cccsccccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeueueuenenaes 320  5 10  Online Hel p    ccscsceceeeeeeeeeeeeeaeeeeeeeeeeeueueueveeeeseesaees 333  5 11  Exiting the Security Solution            cccseeeeeeeeeeeees 334  GIOSSALY A A ETT 3
140. el  domain  such as    com        de     or    org     The Hostname will be  included in all Notification E Mails    Save the settings by clicking Save     29    Installation    6  Configure the Internal Network Interface  eth0O     In the Network tab  open the Interfaces menu and check the  settings for ethO     The settings for this network card are based on the information  entered during the software installation  After starting the  security system  they are shown in the Current Interface  Status window        cine sen m9 If you wish to change    Internal  Standard ethernet interface  TAR 17 7 25a 285 288 0 setti ngs for this ca rd    l   for example changing  V nac  00 06r8e1b6 23 f3 the configured name     please open the Edit  Interface window by clicking the edit button and make these  changes now     Attention     If you misconfigure the IP Address of the ethO network card   you may be locked out of WebAdmin     The configuration of network cards and virtual interfaces is  described in chapter 5 3 2 on page 119     7  Configure the Internal Network    Network Definitions Total 4enties E New ena V  a  In the Definitions  sia tab  open the Net   Za Works menu and  Internal  Network  Interface up  192 168 5 0 24 Network on interface    Internal seek the eettings  for the internal network  Three logical networks were defined  during installation based on your settings for the internal net   work card  ethO    The interface Internal  Interface   consisting of the defined
141. ely  If you  have connected a keyboard to this machine  the Num Lock light  will flash    When the system is in Hot Standby Mode  it will beep twice and  the LED display will stop blinking  System 2 recognizes system 1  through the data connection  and remains in Hot Standby Mode     The High Availability system is now active     System 2 will be updated at regular intervals over the data transfer  connection  Should the active system encounter an error  the standby  system will immediately and automatically change to normal mode  and take over the system   s functions     101    Using the Security System    5 1 11 Shut down Restart    Restart will shut the system down completely and reboot  Depending  on your hardware and configuration  a complete Restart can take up  to 5 minutes     Restart    1  Under the System tab  open the Shut down Restart menu    2  In the action drop down menu  choose Restart    3  Begin the reboot by clicking Start    4  When asked Do you really want to restart   click OK    The action Shut down allows you to shut the system down  and  allows you to cleanly stop all running services     For systems without a monitor or LCD display  the end of the shut  down process is signaled by an unending series of beeps at one   second intervals     Depending on your hardware and configuration  this process can take  up to 5 minutes  Only after the system has completely shut down   signaled by the Power down message  should you turn off the  power  If the syste
142. em    5 1 7 1  RADIUS    RADIUS stands for Remote Authentication Dial In User Service  and is a protocol for allowing network devices  e g   routers  to  authenticate users against a central database  In addition to user  information  RADIUS can store technical information used by network  devices  Such as protocols supported  IP addresses  telephone  numbers  routing information  and so on  Together this information  constitutes a user profile that is stored in a file or database on the  RADIUS server    In addition to authenticating dial up users  RADIUS can be used as a  generic authentication protocol     The RADIUS protocol is very flexible  and servers are available for  most operating systems  including Microsoft Windows NT 2000  The  RADIUS implementation on this security system allows you to con   figure access rights on the basis of proxies and users     Before you can use RADIUS authentication  you must have a  functioning RADIUS server on the network  As passwords are trans   ferred in clear text  unencrypted   we strongly recommend that the  RADIUS server be inside the network protected by the security  system  and that the security system and server be on the same  switch     The following section details the setting up Microsoft IAS  RADIUS  Server for MS Windows NT and 2000   If you use a different server   you will need the following information to enable the operation of the  security system together with the user authentication     The authentication reques
143. entry menu    Type  Use this drop down menu to filter the networks of a  specific type    Address Values  If you wish to filter networks by specific  addresses  enter the IP address in this entry field     3  To start the filter  click on the Apply Filters button   Only the filtered networks will be displayed in the table  Next time    when you open the menu  the complete network table will be  displayed     Further Functions    Editing Definitions   Click on the settings in the Name  Value and  Comment columns in order to open an editing window  You can then  edit the entries     Deleting Definitions  Clicking on the symbol of the trash will delete  the definition from the table     109    Using the Security System    5 2 2  Services    Service Definitions es A New on       7 7 The Services menu is  ee   used to define the Services  Protocol   TcP uor    TA te has   ra and Service Groups     Comment                          Add Definition   Services define certain    All protocols and services Any   matches any service H  1165505 222 stati types of traffic over net   1024 65535  static    1024 65595 static works like the Internet  A    1 65535 static    EE aa service is defined by a    static    TSS   name  a protocol  and    1024 65535 static    1024 65535 static po rts      1024 65535 static    1024 65535 static       The following protocols can  be used  TCP  UDP  TCP   UDP  ICMP  ESP  AH and  IP     UDP uses port numbers between 0 and 65535  inclusive  and is a  stateles
144. er of topics in the Tab  List     Enter your license key ol    si  NAT MasqueradiWh       35    WebAdmin    4 3  Menus    Every function of the security system has its own separate menu in  WebAdmin  This chapter describes the tools and displays used in the  configuration menus     4 3 1  The Status Light    pasar  Many features and subsys   a  a    tems of the security system  can be enabled or disabled  oko ae while the system is running   A status light displays the  current status of such sub   systems        DNS Proxy          Status Disable             Select to append    Allowed Networks Selected Available  Empty list  Ar          Broadcast      Network        e red   Function is disabled    Forwarding Name Servers  Add   e    i  no data in table                            e green   Function is en   abled    For many features  the configuration options and tools will not be  displayed until the status light is green     4 3 2  Selection Fields    There are two kinds of selection field which are used in configuring  the security system     Intemal_Interface Selection Fields like the one at  Internal Network    localhost the left  called here type A  are    localnet    NTP_Sewer Atlanta    used to select arbitrary groups of    Selected Available       things like users or networks  This  kind of field is used  for example  when selecting Allowed Networks  or Allowed Users     36    WebAdmin    Adding Objects to the Selected List     1  Inthe Available list  select the ob
145. erading or NAT rules must be in place     PPTP Client Parameters    PPTP Client Parameters This window allows you to    Client DNS Servers           define name servers  DNS          Client WINS Servers  and WINS  and the name    Client Domain           service domain  which  should be assigned to hosts  during the connection es   tablishment           Connections with MS Windows 2000     The following example shows how to configure a PPTP VPN connection  on a Windows 2000 host     1   2     Under the Network tab  open the PPTP VPN Access menu     In the PPTP VPN Access window  enable the system by clicking  Enable     The status light will show green and the menu will open     In the PPTP VPN Access window  make the settings for the  network access     Logging  Keep the setting Normal     171    Using the Security System    172    Encryption  In the drop down menu  select the encryption type   The available options are weak  40 bit  and strong  128 bit    Note that  in contrast to Windows 98 and Windows ME  Windows  2000 does not come with 128 bit encryption installed    to use this kind of connection  the High Encryption Pack or  Service Pack 2 must be installed  SP2 cannot be uninstalled  later  The selected encryption strength will take effect  immediately     Important Note     Both sides of the connection must use the same encryption  strength  If WebAdmin is set to use 40 bit encryption  and the  MS Windows 2000 client is set to use 128 bit encryption   Windows will in
146. erface     Please note that one network card cannot be used as both a  Standard ethernet interface and a PPP over Ethernet   PPPoE DSL  or PPPTP over Ethernet  PPPoA DSL  con   nection simultaneously     124    Using the Security System    Now make the specific settings for this interface type     Address  If you wish to use a static IP address for this interface   select Static from the drop down menu and enter the address to  use in the entry field  If you wish to have a gateway dynamically  assigned via DHCP  select Assign by DHCP from the drop down  menu    Netmask  If you wish to use a statically defined network mask  for this interface  use the drop down menu to select Static and  enter the netmask to use in the entry field  If you wish to have a  netmask dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu    Default Gateway  If you wish to use a statically defined default  gateway  use the drop down menu to select Static and enter the  address of the gateway in the entry field  If you wish to have a  gateway dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu  Otherwise  select None   Proxy ARP  When this function is enabled  the security system  will answer ARP requests on the selected interface for all known  networks  This system will thus act as a proxy on this interface  for all of the other directly connected networks    This function is only required in special cases  for example when  an attached network canno
147. erface by clicking the status light     The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system  requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     The new virtual interface will appear in the Hardware Device  Overview just as an additional IP address  IP alias  on a standard  Ethernet network card would  The Sys ID of this virtual interface is  composed of the SysID of the network card and the number of the  VLAN tag     5 3 2 5  PPPoE DSL Connection       Belinea This interface type is used  i   to connect to the Internet  over a DSL connection  using the PPP over Ether   fee net protocol  The configur   Password  ation will require the DSL  nee connection information  in   See cluding username and pass   word  provided by your  Internet Service Provider           Hardware  etht  Realtek RT8139        Type  PPP over Ethernet  PPPoE DSL  connection       Address  Assigned by remote       Ld Ld Ld be    Default Gateway  Assigned by remote                            MTU Size     Note     The installation and specific settings required for DSL connections is  described in the DSL Network guidebook  Also note that  once the  DSL connection is activated  the security system will be connected to  your ISP 24 hours a day  You should therefore ensure that your ISP  bills on a flat rate or bandwidth based system rather than based on  
148. ervice  QoS  function is described in chapter 5 5 1     Uplink Bandwidth  kbits   These settings will only appear  if  the QoS function is enabled  In this entry menu  enter the avail   able bandwidth for the Uplink in full kilobits  This value can be  determined either from the values of the upstream interface or  from the router    Downlink Bandwidth  kbits   These settings will only appear   if the QoS function is enabled  In this entry menu  enter the  available bandwidth for the Downlink in full kilobits    MTU Size  The MTU is the size  in bytes  of the largest trans   mittable packet  MTU stands for Maximum Transfer Unit  For  connections  using the TCP IP protocol  the data will be grouped  into packets  A maximum size will be defined for these packets   Packets larger than this value will be considered too long for the  connection and fragmented into smaller ones before transmis   sion  These data packets will be sent again  However  the per   formance can be limited  if the upper value is too low    The largest possible MTU for an Ethernet interface is 1500 Bytes   The following values are the defaults for the VLAN Ethernet  Interface  1500 Byte     Confirm these settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red         Using the Security System    8  Enable the int
149. ery menu in WebAdmin  has an Online Help screen  which provides a short ex   planation of the available  configuration options                          You can open the help    oot  e ERE screen by clicking the      button at the top right           hand corner of the screen                 40        alala                   I   wechsehnzu    Links                Time Zone    Use NTP Server              Set Time           SSH  Shell Access  Settin       Status    Allowed Netwarks            El WebAchin on hast domain com  192 168 5217   Bi E internet    WebAdmin    ma To load the menu again     click the Refresh button   Don   t use the Refresh  button of the tool bar of  your browser to actualize  the menu   otherwise  you are logged off the  session and have to log  in again under the Web   Admin configuration  tool     41    Using the Security System    5  Using the Security System    We have already seen  ara          the web based configur   eke m       l ation tool WebAdmin in    action during the instal   Allowed Networks re a lation process  This chap      ter will describe how to  use WebAdmin to con   Fae trol and monitor your se   curity system on a day   to day basis    The specific settings  what they do  and how to change them will be  described step by step  Please look to chapter 4 for a more general  description of how to use the tools provided by the WebAdmin  interface           TCP Port           Authentication Methods     Allowed Users  Selected Available 
150. es     Please see chapter 4 3 4 on page 39 for a description of how to use  the ordered list     5 1 5  SNMP Access    GEES        The Simple Network Manage   oer memm E ae ment Protocol  SNMP  moni     n  tors and manages the local net    work  SNMP allows the adminis   trator to make quick queries  about the condition of the network devices  such as the number and  configuration of the network interfaces  the forwarded traffic  the  current processes and hard disk utilization  Next to the current state   tendencies and time rows are interesting  They give a detailed insight  into the functions of a network   the history can be monitored and  remedied before turning into a real problem                    Community String       Configure the access rights to the SNMP service in the SNMP Access  window  The users of the configured networks can then conduct  queries about the SNMP server on the Security system with their read  only rights     A Security Note   The SNMP data traffic  Protocol version 2  between the Security  system and the network is not encrypted     68    Using the Security System    Authorizing access to the SNMP server     1  Enable SNMP Access by clicking the Enable button     2  From the Allowed Networks selection field  select the networks  that you wish to allow for accessing the SNMP server     3  Enter the Community String in this entry window     4  Save your configuration by clicking Save     5 1 6  Remote Syslog Server    Rene GGL This function allo
151. essage Authentication Code  HMAC  in connection with a key  One  of the following hashing algorithms will be used     Message Digest Version 5  MDS5  This algorithm generates a 128   bit checksum from a message of any size  This checksum is like a  fingerprint of the message  and will change if the message is altered   This hash value is sometimes also called a digital signature or a  message digest    The Secure Hash  SHA 1  algorithm generates a hash similar to  that of MD5  though the SHA 1 hash is 160 bits long  SHA 1 is more  secure than MDS  due to its longer key    Compared to MD5  an SHA 1 hash is somewhat harder to compute   and requires more CPU time to generate  The computation speed  depends  of course  on the processor speed and the number of IPSec  VPN connections in use at the Security Gateway     In addition to encryption  the Encapsulated Security Payload  Protocol  ESP  offers the ability to authenticate senders and verify  packet contents  If ESP is used in Tunnel Mode  the complete IP  packet  header and payload  is encrypted  New  unencrypted IP and  ESP headers are added to the encapsulating packet  The new IP  header contains the address of the receiving gateway and the address    266    Using the Security System    of the sending gateway  These IP addresses are those of the VPN  tunnel     For ESP with encryption normally the following algorithms are used   e Triple Data Encryption Standard  3DES   e Advanced Encryption Standard  AES     Of these  AES 
152. ey distribution 267  POLICIES ake vies aa asians 277  PSK authentication        284  Remote KeyYS       eeeeeeee 285  RSA authentication        283  Transport mode            265  Tunnel mode             55 265  VPN Routes          seeeeee 270  VPN StatuS       cceeeeeeaee 270  IPSec VPN  CONFIQUIING aeee 271    configuring a Policy       278  defining remote keys     285    344    generate a client host  certificate    292  L2TP over IPSec  L2TP over IPSec client  parameters    289  L2TP over IPSec IP pool 289  L2TP over IPSec settings    Paea Pimia aea i bane 288  Licensed Users  aecccccn 53  LICENSING        cee eee einai 50  Licensing Information          53  Load Balancing   deleting rules               164   editing rules                 164  Load Balancing                 163  Load Balancing   defining rules               163  Local Logs   BrOWSE  oseeecee eect eee eens 312   configuring local log file   leveli irii h uaiiie 308   configuring remote log file   archive eases rairs  309   filtEriN G arcana 315  filt  rS isinisi 315  introduction seee 307    local log file archive       308  Local Log File Query      311    Log Filesissscciscc estas  316   remote log file archive   309   Setting Sisin le sce dito 307   starting search             311  Local User   deleting  sssini 117   editing isisisi sirine iiaii 117  Local User   adding aiana 115  Log files   error codes sasen 320  Log Files   Admin notifications        318   Astaro Configuration   Manager  ensenen 316
153. f  an error  the system was unable to forward     This menu uses the following concepts to display and manage the e   mails                                Global Actions  Please select   Refresh proxy contenttable  gt    SMTP   POP3 proxy content Total 17 entries 9 Filters 7    l Type   7 Age Sender Recipient s         Pops 4hi10m   SP  lt rdiehl vinet qa gt  rdiehl vinet ga       SMTP 2d 23h 34m   EXP  lt rdiehl vinet qa gt    rdichl vinet gqa      SMTP 2d 23h 36m   EXP  lt rdiehl vinet qa gt    rdichl vinet ga  r   POP3 3d0h4m   vP  lt rdiehl vinet qa gt  rdiehl vinet ga  B 8 POP3 3dih7m      SP  lt rdiehl vinet qa gt  rdiehl vinet qa  r   Pops  3dih9m   SP  lt rdiehl vinet qa gt  rdiehl vinet ga      Pops 3dihi0m   vP  lt rdiehl vinet qa gt  rdiehl vinet ga      PoP3 3dihiim   vP  lt rdiehl vinet qa gt  rdiehl vinet ga  m   SMTP 3dih20m   SP  lt rdiehl vinet qa gt    rdichl vinet ga      SMTP 3dih37m   vP  lt rdiehl vinet qa gt    rdiehl vinet ga      SMTP 3dih46m   FILE  lt rdiehl vinet qa gt    rdiehl vinet gqa      SMTP  3d2h8m   vP  lt rdiehl vinet qa gt    rdiehl vinet ga      SMTP 3d2h10m   vP  lt rdiehl vinet qa gt    rdichl vinet ga      POP3 3d2hiim   vP  lt rdiehl vinet qa gt  rdiehl vinet ga      SMTP 3d2hi6m   vP  lt rdiehl vinet qa gt    rdiehl vinet ga   gt      SMTP  3d2hi7m   vP  lt rdiehl vinet qa gt    rdiehl vinet ga  r   SMTP 3d3h24m    lt  gt    do not reply fw notify net  checked entries        ID  Every e mail in this security system contains a uniqu
154. fetime  secs   This option allows you to set the lifetime of  the IPSec connection  This is set by default to 3600 seconds   1h   In general  times between 60 and 28800 seconds  1 min to  8 hours  are allowed    PFS  The IPSec key used for VPN connections is generated from  random numbers  When Perfect Forwarding Secrecy  PFS  is  enabled  the system will ensure that the numbers used have not  already been used for another key  such as for an IKE key  If an  attacker discovers or cracks an old key  he or she will have no  way of guessing future keys    The IPSec VPN system on this security system supports the  Group 1  MODP768   Group 2  MODP 1024   Group 5   MODP 1536   Group X  MODP 2048   Group X  MODP  3072  and Group X  MODP 4096  protocols  If you do not  wish to use PFS  select No PFS     By default  this is set to Group 5  MODP 1536      PFS requires a fair amount of processing power to complete the  Diffie Hellmann key exchange  PFS is also often not 100   compatible between manufacturers  In case of problems with  the firewall   s performance or with building connections to  remote systems  you should disable this option       Important Note     Compression  This algorithm compresses IP packets before  they are encrypted  resulting in faster data speeds     This system supports the Deflate algorithm     6  If you have not yet named this policy  scroll back to the Name  field and enter one now     280    Using the Security System    7  Create the new policy by clicki
155. fficulty if you use  the Masquerading function  in that case  the Forward Connection  function will pass the ident request on to the internal masquerading  host    Please note  however  that the actual  internal  IP address will not be  released  Instead  the system will query the internal machine  and  simply pass the response string to the remote server  This is often  useful for internal clients with a mini ident server  such as the ones  often included in IRC and FTP clients     237    Using the Security System    Global Settings       Status    An SMTP Proxy allows you    Disable       Hostname  MX    Postmaster Address     Max Message Size        fox  domain  example       postmaster tw notify        net    to protect an internal mail  server from remote attacks        unlimited       Save         While forwarding and receiv        DoS Protection    Incoming Mail    eu       Disable    ing messages  the proxy can       Domain Name    SMTP Host       SMTP Routes Table     by DNS MX record    E     i  no SMTP routes defined       also scan them for potentially  dangerous contents  This       Recipient Verification     Outgoing Mail    oe    menu also allows you to con     Enable      figure anti spam parameters       Allowed Networks     Selected    Empty list    Available  Internal  Address   Internal  Broadcast   gt    Internal  Network         Marketing a       in order to block unwanted e   mails        Use Smarthost     oe       This menu allows you to  configure the
156. fied this as       medium priority level  Event buffering has been  activated  Further Intrusion Protection events  will be collected and sent to you when the  collection period has expired  If more events  occur  this period will be increased  Further  information on the Intrusion Prevention event    can be found in the notification e mail     System Up2Date failed  Could not connect to    Authentication Server  s     The authentication server is not reachable  If  the problem continues  please contact the sup     port department of your firewall provider     System Up2Date failed  Download of System  Up2Date Packages failed    If the problem continues  please contact the    support department of your firewall provider     System Up2Date  Wrong MD5sum for local System  Up2Date package    Please download a new Up2Date package  The       Up2Date packages can be downloaded from http     download astaro de asl up2date  If the problem  recurs  please contact the support department of    your firewall provider     System Up2Date failed  Wrong MD5sum for down   loaded Up2Date Package    Please download a new Up2Date package  If the  problem recurs  please contact the support    department of your firewall provider     327    Using the Security System    320    322    323    324    325    333    334    335    336    328    System Up2Date failed  Wrong start parameters    If the problem recurs  please contact the sup     port department of your firewall provider     System Up2date st
157. fies the object uniquely  in the AD index or NDS tree  This DN is composed of the Common  Name  CN  and Domain Component  DC     Example  CN Administrator  CN Users  DC example  DC com    MS Active Directory also allows for user authentication by User  Principal Name  UPN   This name consists of the login name and  DNS name of the domain    Example  admin example com    OpenLDAP simply uses the Common Name  CN  to identify users   Please make certain that every user has a unique CN     A Security Note   User authentication with a stand alone LDAP server involves  sending passwords in clear text over the network  As these  passwords are not encrypted  an attacker with access to the  network may be able to intercept them     79    Using the Security System    Note     User authentication with an LDAP Server requires that the DNS  Proxy on the Proxies DNS menu be enabled        Configuring the Microsoft Active Directory Server     Make sure that there is a user configured on your LDAP server to have  full read privileges for the directory  This will be the query user     A Security Note   Make sure that the user has only read privileges     Microsoft Active Directory  AD  can grant privileges on the basis  of group memberships  or on the basis of particular user attributes  In  most cases  it is easier to use the Member Of query type to  authenticate by group    The Directory can be extended by self defined attributes  If you wish  to authenticate on the basis of particular User
158. file is e mailed to the entered e   mail address  These e mailed files are about 100 kilobytes long     Generating an E Mail Backup File     1   2     Open the Backup menu in the System tab     In the Advanced window enable the Send Backups by E Mail  function by clicking on the Enable button     The Backups by E Mails function is enabled  if the status light  shows green     Important Note     If the Encryption function has been enabled  the backup file  will be encrypted with either the DES or 3DES algorithms  and  can only be read or loaded using the correct password     Use the Interval drop down menu to define how often backups  should be made   The available choices are  Daily  weekly  and monthly     In the E Mail to field  enter the e mail addresses  which should  receive the backup files in regular intervals     Click the Add button next to the E Mail to entry field  to add  this address to the ordered list     If you would like to add more addresses  repeat step 5     If you wish to generate and send a backup file immediately  click  the Start button next to Send backup now     Check the generated files for readability by importing the  respective backup file and clicking on the Start button     67    Using the Security System    The security system will now load and check the backup file  If  the ckecksums are correct  you will now receive the Backup  Information     8  Abort the restore process by opening a different menu within the  tab     Editing E Mail Address
159. g connections  in the opposite direction     When a computer in the protected network establishes a connection  with an external server  the stateful packet filter will allow the  server   s response packets in to the protected network  When the  original connection is closed  however  the packet filter will block all    12    Introduction to the Technology    further packets from the unprotected network  unless  of course  they  have been explicitly allowed      Application Layer Gateways  Application Proxies    The second main kind of firewall is the application layer gateway   These gateways act as a middleman in connections between external  systems and protected ones  With such gateways  packets aren t for   warded so much as translated and rewritten  with the gateway  performing the translation     The translation process on the gateway is called a proxy server  or  proxy for short  Because each proxy serves only one or a few well   defined application protocols  it is able to analyze and log protocol  usage at a fine grained level  and thereby offer a wide range of  monitoring and security options     The analysis can be especially intensive at the application level   because the application data transferred conforms to standardized  protocols  The firewall knows about and can inspect every aspect of  the data flow  This also means that small  manageable modules can  be used for each kind of data  which in turn means the system is less  prone to problems due to impleme
160. gainst a Denial of  Service  DoS  attack  a maximum of 25 incoming concurrent  connections are supported  The 26    connection will not be  accepted    By default  the DoS Protection function is enabled    In the Incoming Mail window  set the route for incoming mails   Domain Name  In order to send mails for a certain domain to    the correct machine  the domain name  e g   mydomain com   must be configured here     SMTP Host  All e mails for this domain can be forwarded to a  certain host  This will normally be a host like Microsoft    239    Using the Security System    240    Exchange Server or Lotus Notes  The host must be defined in  the Definitions Networks before it will appear in the drop   down menu    You can also set the system to forward e mails to the system  specified by the MX record  You should take care that the firewall  itself is not the MX host for the domain     Confirm your selection by clicking Add     Recipient Verification  The SMTP proxy will only accept in   coming e mails after verifying that the receiving address exists   This will dramatically reduce the number of spam messages re   ceived  as only messages with valid destination addresses will be  accepted    This function requires that the internal SMTP server reject  messages to unknown addresses  The basic rule  The basic rule  is that if the mail server rejects a message  then so too will the  firewall     In the Outgoing Mail window  select the Allowed Networks or  hosts to which outgoing m
161. gt     gt  Admin notifications Sunday April 04 2004    notifier 2004 04 04 log gz 784  amp   m    Admin notifications Saturday April 03 2004    notifier 2004 04 03 log gz 644 S  r a Admin notifications Friday April 02 2004    notifier 2004 04 02 log gz 457 P   a a Admin notifications Thursday April 01 2004    notifier 2004 04 01 log gz 439  amp        checked entries   The following additional functions are available in the sub tab    Date  For older protocols  listed in the sub tab the date and time will  be displayed      B   Return to the overview by clicking on the folder icon    7   This is today s protocol  Clicking on the icon opens the Live  Log window      B   This in an archived protocol  Clicking on the symbol opens the  Log window     File Count Name  In the protocol from today  the path to the log  file and the Live Log message will be displayed in this column    In this column  the file names will be displayed next to the archived  log files     314    Using the Security System    Filters    The Filters function allows you to filter Log Files with specific  attributes from the table  This function enhances the management of  huge networks  as log files of a specific type can be presented in a  concise form     Filtering Log files     1     3     Click on the Filters button   The entry window will open     Enter the filter attributes in the fields  Not all attributes have to  be defined    Group  If you wish to filter the log files of a specific group   select it
162. hardware    e 2 additional Ethernet interfaces  if you wish to use heartbeat  monitoring  both of these must support link beat     e One Ethernet crossover cable    e One serial interface cable  optional   97    Using the Security System    The hardware components  supported by the Internet security      Important Note     system  e g  for a monitoring through Heart Beat requests are listed  under http   docs astaro org in the Hardware Compatibility  List for Astaro Security Linux tab     Installing the High Availability System    Preparation     1     First install the software on both machines and configure the first   active  system as described in chapter 3 2 on page 22     Security Note       If you install High Availability  HA  to a system updated  using Up2Date  please ensure that the standby system is  using the same version of the security solution as the  normal mode system     Shut both systems down     Connect the firewall system 2  standby  to the firewall system 1   active  as in the graphic     Configuring the Firewall System 1  normal mode      1   2     98    Start system 1 as normal   In the System tab  open the High Availability menu   Enable the HA system by clicking Enable  under Status      Device Name  Enter a descriptive name for the system here   This name will be shown to allow you to know which system is  active at a given time  The name can be up to 11 characters  long     Using the Security System    Device IP  Assign an IP address from a Class C
163. he Enable button under Prefetch Up2Dates automatic     ally     3  In the selection menu Interval  specify how often the security  system should contact the Up2Date Server to check for new    System Up2Dates     The available choices are  every hour  every day  or once per    week     56    Using the Security System    Newly imported Up2Date packages are presented with their respective  version number and file name in the Unapplied Up2Dates table   Further information is available by clicking the Info button    Note that the Unapplied Up2Dates in the table have not yet been  installed yet     If you are using the HA system  unapplied updates will be listed in  the Unapplied Up2Dates Master window     Loading System Up2Dates from a local disk     The filename of an Up2Date update consists of the version number   tar to signify it is an encrypted archive file  and the file extension   gpg  Example  3 033 tar gpg  Up2Date packages can be downloaded  from the ftp astaro com FTP server     1  Open the Up2Date Service menu in the System tab     2  In the System Up2Date window  click on the Browse button  next to Import from File     3  In the File Upload window  choose the Up2Date packages you  would like to load and click on the Open button   Important Note     When using Microsoft Windows  make sure not to use a UNC  Path  Instead  choose the updates by using the Look in option     4  In the System Up2Date window  next to Import from File   click Start     Successfully loaded upd
164. he access point  For this  interface type  the address must be statically defined  Enter the  address into this entry field    Netmask  This interface type requires a statically defined  netmask  Enter the network mask into this entry field    Default Gateway  If you wish to use a default gateway with  this interface  select Static from the drop down menu and enter  the gateway address in the entry field  Otherwise  select None   SSID  Enter the network name for the wireless network here   Enter a string without space characters here  This should be a  string up to 32 characters long    Channel  Use the drop down menu to select a frequency  channel for the network    Use WEP  If you wish to use WEP encryption on the wireless  LAN  select Yes from the drop down menu     A Security Note   You should always use WEP encryption  as an unencrypted  network presents a serious threat to network security     If you select No from the drop down menu  the WEP specific  configuration options will be ignored by the system    WEP Authentication  If you wish to enable WEP authentication   select Yes from the drop down menu  All nodes on the wireless  network must be configured with the correct WEP Key    Require WEP  If you do not wish to allow nodes not supporting  WEP onto the wireless network  choose Yes here    WEP Key  Enter the WEP key to use in the WEP Key O through  3 entry fields  In order to use WEP encryption  you will need at  least one WEP key   up to four can be used    For a 
165. he password  you might not be able to  access the newly configured system     65    Using the Security System    Advanced    Encryption  The backup file contains all configuration settings as well  as the respective certificates and keys  The Encryption function  allows you  to encrypt the file using DES or 3DES     Encryption of e mail Backup Files   1  Open the Backup menu in the System tab   2  Scroll to the Advanced window     3  Enable the Encryption function by clicking on the Enable  button     The Encryption function is enabled  when the status light shows  green     4  Inthe Passphrase entry field  enter the password     A Security Note   With passwords with up to seven characters  the Backup  file will be encrypted with DES and from eight characters  on with 3DES     5  To confirm  enter the password again into the Confirmation  entry field     6  Click the Save button to save these settings     All Backup files that have been created manually or automatically by  the system  will now be encrypted with the defined password   Important Note     A backup file that has been encrypted with Encryption can only be  loaded to the system with the password that was used for the  creation of the Backup     66    Using the Security System    Send Backups by E Mail  The Security system can also send you  automatically created backup files by e mail  so that you don   t have  to remember to save the settings of your Internet security system  manually on a data carrier  Then the 
166. ich it can be sorted or  filtered on the mail server or in the e mail programs of the  recipient     244    Using the Security System    For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     Trigger on  In this drop down menu you define  which errors cause   that the e mail is treated according to the Action function     Level 1  This step causes  that only e mails with most serious  errors are treated  This setting is recommended  since many users  use a deficient encryption program  that already responds in the  higher levels  Level 2 und 3      Level 2  With the exception of the e mails with the ordinary  errors  all are being treated     Level 3  Any e mails with errors are being treated     File Extension Filter    This module allows the firewall to selectively filter attachments based  on their file extensions  The extensions to filter can be selected in the  Extensions list tool     Action  This drop down menu allows you to select the action the  proxy should take upon finding a message with a filtered string  The  following actions are possible     Reject  The message will be bounced back to the sender with a  5xx error message  The bounce message sent to the sender will  also contain an explanation of why the message was blocked     Blackhole  The e mail will be accepted and silently dropped  Do  not use this action unless you are absolutely certain no legitimate  e mails will be lost     Quarantine  The e mail will be accepte
167. ield     Save your changes by clicking Save     Using the Security System    5 9 2  Local Log File Query    aeaea The Local Log File Query    Time Span  Yesterday and Today          a aa  ae action allows you  to search  sms Gals for specific Log Files in a   eee local archive  The search  result will be displayed in a  separate window              Mode        Search Term          Starting searches     1  Inthe Time Span drop down menu select the time span     2  In the selection field Logs  choose the protocols     Please see chapter 4 3 2 on page 36 for a description of how to  use selection fields     3  In the Mode drop down menu  select the mode     4  If you are looking for protocols with specific strings  enter the  strings into the Search Term entry field     5  Begin the search by clicking seek     The protocols will be listed in a separate window     311    Using the Security System    5 9 3  Browse    Each protocol is contained in the Browse menu  If this menu is  opened  the protocol groups  logs  will be displayed in the Browse  Local Log Files overview     The Log File Overview    All protocol groups  logs  are contained in this overview  The groups  with the current protocols can directly be opened from this overview        Browse local Log Files   Total 121 entries  102 filtered     Filters 7        7Name   Date in File Count Name  Accounting data    4 files  Admin notifications    6 files  Boot messages    6 files  Content filter D 4 files  DHCP server 4 file
168. ill be  displayed in real time in the Log Window  When the DONE  message appears  the process has completed successfully    Then the installation automatiscally starts on system 2  During  this process  the Up2Date package and the message Polled by  slave will be displayed in the Unapplied Up2Dates Slave  table    The table will show the message No locally stored Up2Date  packages available when the installation on system 2 has  completed successfully     5  If the Unapplied Up2Dates Master table lists more unapplied  updates  repeat steps 2 and 3 until all updates have been  installed     The HA system is fully updated when the Unapplied Up2Dates  Master table shows the message No locally stored Up2Date  packages available and if both systems display the same  version number     Pattern Up2Date        The Pattern Up2Date function  ees Sin Cau ees pater updates the virus patterns for    Up2Date packages now                         ae   the security system   s integrated  virus scanner and the Intrusion  Protection System  IPS  with  IPS attack signatures  You can  choose to update signatures  manually or automatically at  certain intervals              The Latest Pattern Up2Dates table shows the date of the most  recently installed Pattern Up2Date  Virus Protection Patterns and  Intrusion Protection attack signatures will be listed separately     59    Using the Security System    Manual Pattern Up2Date   1  Open the Up2Date Service menu in the System tab     2  In the Patter
169. ill extend all the way to that computer   where the data is encrypted and decrypted  If one end point is a net   work  the connection will end at a Security Gateway  which man   ages the VPN functions for the rest of the network  The data  transmission within the network  between the security gateway and  client computers  is not encrypted    Data transfer between two computers over a Public Wide Area  Network  WAN  uses public routers  switches  and other network  components  This is  in general  not secure as messages can be read  in clear text at every point between the end computers  An IPSec  VPN  however  builds a secured IP Security  IPSec  tunnel through  the public WAN  Messages sent through this tunnel cannot be read     An IPSec tunnel consists of a two directional Security Associations   SAs   one for each direction of communication     260    Using the Security System    An IPSec SA consists of three components   e the Security Parameter Index  SPI    e the IP address of the receiver     e a Security Protocol Authentication Header  AH  or En   capsulated Security Payload  ESP      With the help of the SA  the IPSec VPN tunnel has the following  features     e Data confidentiality through encryption  e Data integrity through data authentication  e Sender authentication through PSK  RSA  or X 509 certificates    The security features can be combined as desired  Most adminis   trators use at least the encryption and authentication components     There are a few scen
170. ill only be displayed after clicking on the show support logs  button     Content Filter  The activities of the content filters on the HTTP   SMTP and POP3 Proxies are logged to these log files     DHCP client  If the interfaces are automatically assigned to IP   addresses on the Internet security system  the activities are recorded  to these log files     DHCP server  If the Internet security system is used as DHCP server  and assigns dynamic IP addresses to the clients in the network  the  activities are recorded to these log files     Fallback archive  These log files are used as a security archive for  logged processes  which cannot be assigned to one of the log files     316    Using the Security System    The log files belong to the support logs and will only be displayed  after clicking on the show support logs button  In general  those log  files are empty    High Availability  The activities of the High Availability  HA   system are logged to these log files     HTTP daemon  The log files for the HTTP daemon belong to the  support logs and will only be displayed after clicking on the show  support logs button     WebAdmin access  The requests to the user data base are recorded  to these log files     Intrusion Protection  The activities of the Intrusion Protection  System  IPS  are recorded to these log files     IPSec VPN  Extensive information on the configuration of the IPSec   VPN and L2TP over IPSec connections is recorded to these log  files  And also informati
171. in the Comment field  enter a  description of this backup   When restoring system backups  this description will be  displayed to help distinguish between different configurations     If the Encryption function has been enabled  the backup file     will be encrypted with either the DES or 3DES algorithms  and  can only be read or loaded using the correct password       Important Note     3  To generate the backup file  click the Start button     The system will now generate a backup file  When the message  Backup has been restored successfully appears  the process  has completed successfully     4  To copy the backup file to your local PC  click the Save button   64    Using the Security System    On the File download menu  choose the Save file to disk and  click the OK button     Choose a descriptive file name on the Safe file as menu    The security system will automatically produce file names   consisting of backup  date and time   backup_yyyymmdd_hhmmss abf  astaro backup file      Check the generated backup file for readability by importing it  back into WebAdmin and clicking on the Start button     The security system will now load and check the backup file  If  the ckecksums are correct  you will now receive the Backup  Information     Abort the restore process by opening a different menu within the  tab   Attention     After each system change  create a new backup file  If you load  a new backup file and if  for example  you have changed the IP  address or forgotten t
172. in the certificate   private key  and verification CA     Delete  Delete the specified certificate     Issue CERT from CSR  This function signs a CSR  generating a full  host certificate     291    Using the Security System    Generating a Client Host Certificate     Step 1  Create a Signing CA     1   2     8     The    Under the IPSec VPN tab  open the CA Management menu   In the Certificate Authorities table  click the New button   The Add Certificate Authority window will open     Select the Generate option     In the Name field  enter a descriptive Name for the certificate  authority     Allowed characters are  Only alphanumeric and underscore  characters are allowed     Enter a password with at least four characters in the Pass   phrase field     Use the Key Size drop down menu to select the desired key  length     Use the drop down menus and entry fields from Country to E   Mail Address to enter identifying on the CA     To save the entries  click the on the Start button     Signing CA will be loaded into the Certificate Authorities    menu  This CA will answer CSR requests by generating new host  certificates     Step 2  Generate a Certificate Request     1     292    In the Host CSR or Certificate table  click the New button   The Host CSR or Certificate window will open   Select the Generate CSR option     In the VPN ID drop down menu  select the type of VPN ID to  use  If you select E Mail Address  Hostname or IPv4 Ad   dress  you must enter the relevant informatio
173. ing Protocol  PPTP  option   Sharing  This menu allows you to share the PPTP connection  with other computers on the local network     To start the PPTP connection  simply click the new icon in the  Start Settings Network and Dialup Connections menu    Further information is usually available from the network  administrator     174    Using the Security System    5 3 7  Accounting    Tra ReIASSOUNT     When the Accounting func   ii a       tion is enabled  the security  system will track all trans   ELIE z2 mitted data and compile    Ignored Networks  Selected Available    EE Cema aaea statistics about it  The ac   ose counting menu allows you   to select which network   cards should be monitored  You can download the data from the Log  Files Accounting menu  or view daily reports in the Reporting     Accounting menu           Interfaces  Empty list                   Important Note     In the normal case  you should only enable Accounting on one  network card  because  if more than one card is monitored  data  forwarded from one monitored interface to another monitored one  will be counted twice    If you use Masquerading  you should probably use Accounting on  the internal interface  Otherwise  data packets dropped by the  security system filters will be included  and will appear to come from  the wrong interface     It is also possible to exclude certain Hosts or Networks from the  accounting records  After installation  all networks are included in  accounting records    I
174. ing files will be displayed in  this column  The old protocols can be opened from the sub tab     Activity  If the protocols in a group have been logged since Midnight   a correspondent message will be displayed     e Now  The protocols are being generated right now   e Today  Protocols have been generated since Midnight     Open the protocols by clicking on the message Now or Today  Open  the current protocol  Live Log  by clicking on the message Now or  Today  see left hand picture     Size  The size of the log file group will be displayed in this column          Clicking the download icon will allow you to download this Log  File to your local client computer  You can then use these Log Files  to import data into another program  for example Microsoft Excel     313    Using the Security System    The Log File Sub Tab    All protocols  Logs  of a group are listed in this sub tab  The sub   group can be opened in the overview by clicking on the folder icon             s  102 filtered  E 7   A    r  Accounting data 4 files 184 4  ria Admin notifications re files Today  3064    rig Boot messages 6 files 3473  amp   rs Content filter    4 files 254  amp               Total 121 entries  114 filtered          File Count Name                    m    Admin notifications    6 files Today  3064    B Admin notifications Tuesday April 06 2004  amp    var log notifier log  Live log  Today  225  amp   r a Admin notifications Monday April 05 2004    notifier 2004 04 05 log gz 515  amp    
175. ing services in ad   Internal  Broadcast   Slept rea dition to simple proxy ser        Surf Protection  Content Filter  a        vices  resulting in dramatic  performance increases  be    Advanced     are _      cause the system can store   Block CONNECT Method  oe Enable a copy of often visited   Alowed Target Services Selected AS pages locally  these pages    FTP CONTROL ra faus  HTTP    BGP   DAP Top eg do not need to be loaded  SQUID EUDORA  across the Internet     Status  oe  _ Enable                                  TCP Port  8080          Clear HTTP Proxy Cache        Note     WebAdmin should not be used through a proxy  Configure your  browser so that connections to the security system   s IP address do  not use a proxy server     Disabling Netscape Communicator  Proxy     1  In Netscape  open the Edit Settings Advanced Proxies  menu     2  Under Manual Proxy Configuration click Show     3  In the No Proxy for this address field  enter the IP address of  your security system     4  Click OK to save your changes     210    Using the Security System    Disabling Proxy Use with Microsoft Explorer   In Explorer  open the Extras Internet Options menu     Choose the Connections tab     1   2   3  Open the LAN Settings Advanced menu    4  Under Exceptions  enter the IP Address of your security system   5    Click OK to save your settings     The HTTP proxy controls web transactions using the HTTP Protocol   usually TCP IP Port 80   Please note that some web servers transmit 
176. ion address    If Strict Routing is enabled  it is possible to simultaneously set  encrypted and decrypted connections from different source  addresses to one network    If the Strict Routing function is disbled  Off   further networks  and hosts can be connected to the IPSec VPN tunnel through the  setting of Source NAT rules    The Strict Routing function can only be disabled or enabled in  the Standard type of connection  For all other types of con   nections the function is always enabled     In the Endpoint Definition window  select the endpoint of the  IPSec tunnel    Local Endpoint  Use the drop down menu to select the local  endpoint  Always choose the network interface on the same side  of the firewall as the remote endpoint     Remote Endpoint  Choose the IP address of the remote end   point here    With the Road Warrior or MS Windows L2TP IPSec types of con   nection  the remote endpoint has always a dynamic IP address     The Subnet definition  optional  window allows you to set an  optional subnet for both endpoints     Local Subnet  Choose the local subnet here   Remote Subnet  Choose the remote subnet here     273    Using the Security System    274    With a road warrior connection  only the local subnet can be  configured  This is no more possible if you additionaly enable the  L2TP Encapsulation function in step 7     Note     With the MS Windows L2TP IPSec connection this window will  not be displayed  The IPSec VPN access will be managed  through the Packe
177. is  The WebAdmin is currently occupied by the following user      wane admin already logged in to Web   Address or Hostname 10 113 113 3 Admin  a notice will ap   pear on screen  The IP ad   dress shows you which    computer the other administrator is using     You can terminate this users    session by confirming your login  and optionally provide a  reason for the takeover        Reason        The kick function allows you to end the other administrator   s  session     In the Reason field  type a reason for ending the other user   s  session and click Login     43    Using the Security System    You are now logged in  and can use  system     the WebAdmin to manage the    5 1  Basic Settings  System     The menus under the System tab allow you to configure and manage  the basic settings of your Security Solution     5 1 1  Settings    Administrator Contact    Administrator Contact       E Mail Addresses                               E Mail Addresses  Whenever    certain important events occur   such as portscans  failed logon    attempts  or reboots  as well as whenever the self monitor or Up2   Date systems generate alerts or reboots  the security system will  send a notification e mail to the administrator through the e mail  addresses entered into the ordered list  At least one e mail address  must be present  otherwise the E Mail Reporting module will be    disabled     To add a new e mail address  enter it in the entry field and click Add     Please see chapter 4 3 4 on
178. is correctly configured  start it and enter the  management address of the security system  the internal IP  address configured for eth0  as follows  https   IP Address    In the example from step 6 above  this would be  https   192 168 2 100    A security notice will appear  When you generate a certificate  for WebAdmin in a later step  this notice will disappear    Further information on generating and installing certificates can  be found in chapter 5 1 9 on page 94    For now  simply accept the security notice by clicking the Yes  button    The first time you start WebAdmin  two windows will open  the  first contains the License Agreement  and the second is used  for Setting system passwords     Complete the License Agreement    In the License Agreement window  accept the terms of the  license by clicking the I agree to the terms of the license  selection box     Note     Please read the terms of the license carefully         27    Installation    28    Set the System Passwords    In the Setting system passwords window  enter the pass   words for the Internet security system     A Security Note   Use a secure password  Your name spelled backwards is     for example  not a secure password   while something like  xfT35 4 would be     You will only be able to start WebAdmin once you have entered    passwords for the functions listed below  Enter the password for  each service  and then re enter it in the text field labeled  Confirm  The usernames are pre defined  and cannot 
179. is initially disabled  when it is added  to the table  Active rules are applied in the given order  ending with  the first matching rule  The order of this process will be displayed in  the table through the Position number  second column from the  left   If you re sort the rules table later  for example according to the  source address please  note that the rules won t be displayed in the  order in which the system processes the rules  If  however  you  change the numerical rule order via the Position number  the  processing order will change correspondingly  In our example  if rule    189    Using the Security System    2 were moved to be before rule 1  all SMTP traffic for both networks  would be blocked  Be very careful when defining rules and their order   as this will determine the security of your firewall     When one filter rule applies  all other rules will be ignored  The  sequence of rules is thus very important  Never place a rule like Any   Source    Any  Service    Any  Destination    Allow  Action  at  the top of the rule set     Important Note     Setting Packet Filter Rules     1  Under the Packet Filter tab  open the Rules menu     2  Click on the New button   The entry window will open     Packet Filter Rules Total 1 entries    New Rule       7 Filters 7    Position   Tebotom a Group   mon Al   Source   maketin zl Service   rrr xl   Destination   ay       xl Action   Anw      Comment    S I Log  Add Definition    Group Source   Service Action Destination  
180. is not yet enabled  status light is  red     The profile assignment will be enabled by clicking on the status light   status light is green      Profile Name  Select the Surf Protection Profile in this field from  the Profiles Table    Clicking on the field with the entry opens the drop down menu  Save  your changes by clicking on the Save button  To keep an entry  click  cancel     Assigned local Users  Select the local user from this field    Clicking on this field with the entry opens the selection field  Save  your changes by clicking on the Save button  To keep an entry  click  cancel     224    Using the Security System    Important Note     If you are simultaneously assigning a Profile to a local user and to  a network  this Profile will only take effect  if the user accesses the  HTTP proxy from the  configured    network  Only one Surf Pro   tection Profile can be configured for each user or network     Assigned Network Blocks  Select the Network from this field   Clicking on this field with the entry opens the selection field  Save  your changes by clicking on the Save button  To keep an entry  click  cancel     Assigning Surf Protection Profiles     By default  the table contains already a Blank Assignment  If this  blank assignment has not been edited yet  continue with step 1     1  By clicking on the Add blank Assignment button  add a new  blank assignment     2  From the Profile Name field  select the Surf Protection  Profile     3  From the Assigned local User
181. isplayed then  When the  menu is closed  the complete set of rules will be displayed again     Quality of Service  QoS           The graphic at left  for example  shows a  network with a web server and an FTP server   Both servers share a 2Mbit uplink to the  Internet  Due to the protocols  TCP based applications  e g  FTP   always use the full bandwidth  It might thus happen that not enough  bandwidth is available for the Web Server     Internet Internet Service Providers usually measure the  rie   service they provide in terms of bandwidth   aa   gt    measured in kBit s  If a server tries to cross   the saturation boundary   if it tries to send   Web Server  u   More information than the link can carry   the    a 2mBivs  communication can either slow to a crawl or be   gt  Toren  dropped altogether            100 MBit s  FTP Server Firewall                   The Quality of Service  QoS  function allows you to assign  different priorities to the connections  if the Uplink is overloaded   These priorities are defined in the packet filter rules through the  Allow  Allow  high priority  and Allow  low priority  actions     Important Note     In order to enable the priorities high priority and low priority  you  must select the respective interface for the QoS function in the  Network Interfaces menu and also define the values Uplink  Bandwidth  kbits  and Downlink Bandwidth  kbits      196    Using the Security System    In order to assign the same bandwidth to the connection 
182. ity System           sseseeeeeee 27  4  WebAdmin     ose seeeeeeceeee eee eeeeeeeaeaeaeeeeeeeeeeeeeeeeeneneeae 34  4 1  Info BOX  ccccccceeeeeeeeeeeeeeeeeeeaeeeeeeeeeeeeeeeuaeaeaeeeeeeeeoeenes 35  4 2  Tab List     cccccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeasesaeaeeeeeeeeenenenans 35  4 3  MenUS 2  cecceeeceeeeeeeeeeeeeeeeeeeueeeeeuaseaneeneeneegeeseeaeuaneagne 36  4 3 1  The Status Light         cccccceeseeeeeeeeeeeeeeeeeeeeeeeeeeeeenaes 36  4 3 2  Selection Fields          cccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaeaees 36  4 3 3  Drop down MeMUS      cceceeeeeeeeeeeeeeeeeeeeeeueeeeeeenenenans 38  4 3 4  LESUS wa cei scene cei cnecete cece eesedeveseresevececnweseueneseceessssesenenss 39  4 4  Online Hel p    scccsceceeeeeeeeeeeeeaeaeeeeeeeeeeeeeeeeeeeueeeeaeaees 40  4 5  ReEFIreSH oo  cccceceeeeeeeeeeeeeeeeeeeeeeeeeeeaeeeaeaeaseeueeeeeeeneeenans 41  5  Using the Security System         cscscseeeeeeeeeeeeeeeneeaes 42  5 1  Basic Settings  System        ccscseseseseseeeeeeeeeeeeenenans 44  5 1 1  SettingS      cceeeeeeeeeeeeeeeeeeeeeeeeeeeavaeeeeeeeeseeeeeeeeeenenenae 44  5 1 2  LICENSING    eececeeeeeeeeeeeeeeeeeeeeeeeeeaeeeaseeeseeueeeeeeeuenenans 50  5 1 3  Up2Date ServiCe      cccccceeeeeeeeueeeeeeeeeeeeeeeeeeeeeeeenenaes 54  5 1 4  BaCKUP   occ cececeeeeeeeeeeeeeeeeeeeeeeeeeaeaeaeaeaeuseeueeeeeueneuenans 62  5 1 5  SNMP ACCESS    ccccceeeeeeeeeeeeeeeeeeeueeeeueeeeueeeeueeeeneeeenas 68  5 1 6  Remote Syslog Server     s ssscseseseseeeeeeeeeeeeeeeeeneneeaes 69  5 1 7  User Authentic
183. ity System    DN Template  For the VPN ID Type Distinguished Name you  will need the following data from the X 509 tab tree  Country   C   State  ST   Local  L   Organization  O   Unit  OU  Common  Name  CN  and E Mail Address  E     The data must be listed in the same order as a certificate in this  entry field    Comment  You can enter a IPsec user group description in this  entry field     Save the IPsec user group by clicking on the Add Definition  button     After successful definition  the new IPSec user group will appear in  the network table  The IPSec user group name will also be available  for use in various configuration menus     Filters         The Filters function allows  you to filter networks or  hosts with specific attributes    from the table  This function    Any    0 0 0 0 0  none   Internal  Address    Interface up 192 168 5 217 Address of interface    Internal       Internal  Broadcast  interface up 192166 5255 Gresdcastaccress irename   Considerably enhances the    Internal  Network       Interface up 192 168 5 0 24 Network on interface    Internal       management of huge net     works  as networks of a certain type can be presented in a concise  way     Filtering networks     1     Click on the Filters button   The entry window will open     Enter the filter attributes in the fields listed  You don   t have to  define all attributes     108    Using the Security System    Name  If you want to filter the networks by names  enter the  expression in the 
184. ived  the backup interface will be enabled by the failover  In  this entry field  there must always be an IP address for the  failover    QoS Status  In order to use Quality of Service  QoS  band   width management on an interface  enable this option  To enable  the Quality of Service  QoS  function  select On from the  drop down menu     Important Note     For the bandwidth management Quality of Service  QoS  you  must define the values for Uplink Bandwidth  kbits  and  Downlink Bandwidth  kbits   These values are used as basis  for the bandwidth management system  incorrect values can  lead to poor management of the data flow  The Quality of  Service  QoS  function is described in chapter 5 5 1     Uplink Bandwidth  kbits   These settings will only appear  if  the QoS function is enabled  In this entry menu  enter the    Using the Security System    available bandwidth for the Uplink in full kilobits  This value can  be determined either from the values of the upstream interface  or from the router  On an interface to the Internet  this value  corresponds to the bandwidth of the Internet connection   on an  ADSL access the Uplink bandwidth amounts to 128 kBit s and on  a 2 Megabit fixed connection to 2048 kBit s    Downlink Bandwidth  kbits   These settings will only appear   if the QoS function is enabled  In this entry menu  enter the  available bandwidth for the Downlink in full kilobits  On an inter   face to the Internet  this value corresponds to the bandwidth of  the
185. ject  e g  the network or user   you wish to add by clicking its name     You can select more than one object at a time by holding the  CTRL key while you make your selection     2  Click the Left Arrow button     The names you selected in the Available window will be moved  to the Selected window     Removing Objects from the Selected List     1  In the Selected list  choose the objects  networks or users  you  wish to remove by clicking them     Again  you can select more than one object at a time by holding  the CTRL key while you make your selection     2  Click the Right Arrow button     The objects will be moved back to the Available window     Local Users The second kind of Selection  Menu  type B  is used to append  objects to a list  for example       Select to append he    Authentication Methods or  Network Interfaces     As a rule  the administrator must first configure these objects  If  there are objects available  the drop down list in the selection menu  will display the message Select to append  otherwise  it will read  Empty List     37    WebAdmin    Appending Objects to the List   1  Open the drop down menu   2  Choose the object to add by clicking its name   The name will be moved to the list immediately   Removing Objects from the List   1  Double click the name of the object to be removed     The object will be moved back to the drop down menu  immediately     4 3 3  Drop down Menus    Drop down menus are used to     Europe   Berlin z  A     Europe   Ber
186. l be terminated     IPS Network Exclusions  Specific connections between the net   works of the Intrusion Protection System  IPS  can be excluded in this  selection menu     The connections will be listed in a table below the selection menu   Clicking the trash can icon  8  deletes the defined connection from  the table     186    Using the Security System    Performance Tuning    The performance of the Intrusion Prevention System  IPS  can be  enhanced through the settings in this window  in which the servers  and ports are defined  The correspondent IPS rules will only be used  for the configured servers and ports     The server must first be added as host in the Definitions  Networks  menu  For more information on adding hosts  please refer to chapter  5 2 1 on page 103     Note     If you don   t configure a server in this window  the Intrusion  Protection System  IPS  will monitor the complete data traffic ac   cording to the settings in the Global Settings window     HTTP Service  In this drop down menu select the target port for the  HTTP data traffic  by selecting a Service  In the Definitions Ser   vices menu  you can change or add a Service  if necessary  The  added service will only use the target port number  In the case of a  port range  only the first and last port will be used    Example  In a port range 80 8080 the HTTP rule will be used for the  target port 80 and 8080     HTTP Servers  Select the HTTP servers in this selection field   DNS Servers  Select the
187. le  click the domain with  the right mouse button     Example  Domain example com   2  With the left mouse button  click New and then Group   A new window will open labeled New Object   Group    3  Enter a unique name for the group in the Group name field   Example  socks_users for the SOCKS Proxy   4  Under Group type select Security    5  Save your settings by clicking OK     You have now created a new Security Group named  socks_users     Step 2   Adding Users to the Group   1  Inthe directory  right click the username   Example  John Smith in the Trainees directory   2  Left click the Properties button   A window named Properties will open     3  Inthe Properties window  select Member Of tab     81    Using the Security System    7     Click Add to add the new group    The Select Groups window will open    Now choose the Security Group you wish to add the user to   Example  socks_users   Save your changes by clicking OK     The new Security Group will be added in the Member Of  window     Save your settings by clicking OK     Now execute the settings on the Internet security system  The  settings in the configuration tool WebAdmin are explained on page    87     Microsoft Active Directory  self defined attributes     User authentication with Microsoft Active Directory can also use user  attributes to assign access rights  For large organizations  however   this can be time consuming to configure     Note   According to the LDAP standard  each user attribute must have an  
188. lect  z   agg       Content Filter                Virus Protection  Enable          Spam Protection  oe Enable                               1 no data in table            This menu allows you to configure the POP3 Proxy for incoming e   mails  The POP3 proxy works transparently  requiring no configuration  on the client side  POP3 requests coming from the internal network on  port 110 are intercepted and redirected through the proxy  This  process is not visible to the client  The advantage of this mode is that  no additional administration or configuration is required on the client  of the end user     Configuring the POP3 Proxy     Normally  the POP3 proxy must only be enabled in order to process  POP3 requests  as it proxies for all networks by default  The  Configured Proxied Networks displays which networks are to be  allowed     If only POP3 requests from certain networks should be forwarded  the  configuration must be changed  Note that the drop down menus  contain only those networks you have already defined in the  Definitions Networks menu     Example  POP3 queries from the subnet 192 168 0 0  255 255 0 0  to pop yoursite com should be forwarded through the proxy  These  networks must first be defined in the Networks menu  Once this is  done  continue as follows     232    Using the Security System    1  Inthe Proxies tab  open the POP3 menu     2  Click the Enable button next to Status to start the proxy   An advanced entry window will open     3  In the Proxied Ne
189. licly assigned IP addresses or private IP   addresses according to RFC1918    In the Action drop down menu  select the action to execute if a  data packet complies with the settings for Source  Service und  Destination  In connection with this action  the priority for the  Quality of Service  Qos  function is also configured here     Important Note     In order to enable the priorities high priority and low priority   you must select the respective interface for the QoS function in  the Network Interfaces menu and also define the values Up   link Bandwidth  kbits  and Downlink Bandwidth  kbits      Allow  All packets  complying with this rule are allowed to  pass     191    Using the Security System    Allow  high priority   All packets  complying with this rule  are allowed to pass  In addition  this data traffic gets a higher  priority if the Uplink is overloaded    Allow  low priority   All packets  complying with this rule are  allowed to pass through  In addition  this data traffic gets a  lower priority if the Uplink is overloaded    Drop  All packets matching this rule are blocked    Reject  All packets  complying with this rule are denied  In  addition  the firewall will send an ICMP error to the sending  computer    Log  Any violation of the rule will be reported in the Packet  Filter Live Log  This action is enabled by clicking on the check  box    For such filter violations  which take place very often  and  which are not particularly security relevant and only red
190. lient  In the second step the  server replies by setting an ACK Bit  Acknowledge  to the header and  also transmits the window size  In the last step  the client accepts this  with the ACK Bit and starts to send the data themselves    The firewall accepts PSH packets without having received a TCP  Handshake  This is necessary  if  for example after a Restart of the  Internet security system or after a transfer of the second firewall  system with a High Availability system the existing connections  shall be maintained              205    Using the Security System    If the Strict TCP Session Handling function is enabled  the  connection set up is done by TCP Handshake     Validate Packet Length  The Packet Filter checks the data packets  for minimal length if the icmp  tcp or udp protocol is being used     The minimal data lengths for the individual protocols are   e icmp  22 bytes   e tcp  48 bytes   e udp  28 bytes    If the data packets are shorter than the minimal values  they are  blocked and recorded to the Packet Filter log file with the annotation  INVALID_PKT     The log files are administered in the Local Logs Browse menu     Logging Options       Log Unique DNS Requests   DNS packets  which are sent  to or through the Firewall and  receive a DNS request are recorded to the Packet Filter log file with  the annotation DNS_REQUEST     The log files are administered in the Local Logs Browse menu           Log FTP Data Connections  All FTP data connections   either in th
191. light   all  IP addresses can ping the firewall  when ICMP forwarding is  enabled  computers on the external network can ping hosts behind  the firewall  Pings to single IP addresses cannot then be blocked with  packet filter rules     Settings configured here take precedence over rules configured in the    i Important Note   packet filter rules table     When the ICMP settings are disabled  packet filter rules can be used  to allow specific IP addresses or networks to ping the firewall or  internal network     ICMP Forwarding  This allows you to forward all ICMP packets  behind the firewall  This means  that all IPs in the local network and  in all connected DMZs can be pinged    Click the Enable button to enable the function  status light shows  green      200    Using the Security System    If you wish to disable ICMP forwarding  you must ensure that the  Packet Filter Rules menu does not contain a rule of the form Any   Source    Any  Service    Any  Destination    Allow  Action    Otherwise ICMP forwarding will remain active irrespective of the  setting here       Important Note     ICMP on Firewall  The firewall directly receives and forwards all  ICMP packets  This is enabled by default  status light shows green    Click the Disable button to change disable the function  status light  shows red      Note   l ICMP on firewall must be activated to use the Ping action  The  i action is described in more detail in the Network Ping Check menu  and is described in chapter 5 
192. lin configure functions that can have    Bratislava    Brussels only one of a few values  To use     Bucharest simply select the value from the    Budapest        Chisinau list  as a rule  values chosen in    Copenhagen    Dublin drop down menus take effect    Gibraltar x i    Helsinki immediately       Istanbul       38    WebAdmin    Lists are used  in contrast  to  configure functions that not only  allow more than one value to be    ae not reply  fw notify net  Ravy         gt   nastemann sgeney com     Configured  and where the listed    pees saa a Ra objects do not need to be first  myelertagency eam defined by the administrator  In     5 _ koenig agency com Rvs      e EA A some instances  the order of the  configured values is also relevant           ese    fmarin ageney E  Each list can contain many pages  E fremna com i  Gia esamesa  E  of values  and each page displays    ten entries              The Interfaces menu  for instance  uses a list to allow access to the  Wireless LAN Access Point     The first row of the table shows  ESTI   the number of pages in the list on    soeder    heinri    the left  the current page is  do not reply  fw notify net         __r        shown in white  and the total    mustermann agency com    3  richard striegel projektagentur com evs   number of entries on the right   next to the   symbol   Note  that  if you roll the mouse over one of the red page numbers  a tooltip  appears showing the first and last entries on that page   See pi
193. ll  SA as an ADSL modem with an  Upin ralover on Ethernet port  The connection  Qos Status  z to the Internet proceeds  aa through two separate con     nections  see graphic   Between the se        Username                         curity system and the ADSL modem  a  BEROA odem connection using the PPTP over Ether   IP Address    net protocol is established  The ADSL  modem is  in turn  connected to the ISP  using the PPP over ATM dialing  protocol     PPTPOE    eth1    athos The configuration will require the DSL  Internal Network i 2 P 3 r  q4 connection information  including user   name and password  provided by your    Address  eth0   192 168 2 100  Example  INternet Service Provider   Address  eth1   NIC IP Address       Firewall    150    Using the Security System    Note      The installation and specific settings required for DSL connections is  described in the DSL Network guidebook  Also note that  once the  DSL connection is activated  the security system will be connected to  your ISP 24 hours a day  You should therefore ensure that your ISP  bills on a flat rate or bandwidth based system rather than based on  connection time  The DSL Network guidebook is available at  http    docs astaro org     Configuring PPTP over Ethernet  PPPoA DSL      1  Inthe Network tab  open the Interfaces menu   2  Click the New button to open the Add Interface window     3  In the Name entry field  enter a descriptive name for the inter   face     4  Use the Hardware drop down menu t
194. ll road warriors  use the same type of authentication  PSK  RSA or X 509    a  mixed operation can result in malfunctions     Further configuration parameters can be set for the chosen  connection type    4  Make the following basic settings for the IPSec VPN connection   IPSec Policy  The policy controls the parameters for the VPN  connection  This includes the settings for Key Exchange  IKE   and the IPSec connection     The drop down menu contains a number of pre defined policies   You can define custom ones in the IPSec VPN Policies menu     Note     A standard policy is used for the MS Windows L2TP IPSec       type of connection     The configuration of IPSec Policies is detailed in chapter 5 7 2  on page 277    Auto Packet Filter  Once the IPSec VPN connection is success   fully established  the packet filter rules for the data traffic will  automatically be added  After the completion of the connection   the packet filter rules will be removed    The Auto Packet Filter function is available for the Standard  and road warrior connection types     272    Using the Security System    A Security Note   If you want greater control over the packet filter rules  or  wish to manage them in a more centralized way  disable  the Auto Packet Filter function and enter the rules manu   ally in the Packet Filter  Rules menu     Strict Routing  When this function is enabled  On   VPN Rout   ing is not only done with the destination address  but in harmony  with the source and destinat
195. lso  chapter 1  on page 9     The IPSec standard defines two service modes and two protocols     e Transport Mode  e Tunnel Mode  e Authentication Header  AH  Authentication protocol    e Encapsulated Security Payload  ESP  Encryption  and Authen   tication  protocol    IPSec also offers methods for manual and automatic management of  Security Associations  SAs  as well as key distribution  These  characteristics are consolidated in a Domain of Interpretation   DOT      IPSec Architecture    Transport Mode aml Tunnel Mode  AH Protocol ee 2 ee ESP Protocol  Authentication Algorithm Encryption Algorithm   MD5  SH 1   DES  3DES     Domain of Interpretation  DOI        SA and Key Management  Manual and Automatic     Note     This security system uses the Tunnel Mode and the Encapsulated      Security Payload  ESP  protocol     264    Using the Security System    IPSec Modes    IPSec can work in either Transport Mode or Tunnel Mode  In  principle  a host to host connection can use either mode  If  however   one of the endpoints is a security gateway  the Tunnel Mode must be  used  The IPSec VPN connections on this security system always use  the Tunnel Mode     In Transport Mode  the  original IP packet is not  encapsulated in another  pioa packet  The original IP  L Encrypted header is retained  and the  aR rest of the packet is sent  either in clear text  AH  or encrypted  ESP   Either the complete  packet can be authenticated with AH  or the payload can be  encrypted and authen
196. lso called the trusted and  untrusted interfaces  respectively     Network cards are automatically recognized during the installation  if  new network cards are added later  a new installation will be  necessary  In order to re install the system  simply make a backup of  your configuration  install a new copy of the software  and re load  your backed up configuration     Internet As is shown in the graphic at left  the firewall  fe init be the only point of contact between  az   internal networks and external ones  All data   Carre cN must pass through the security system     a We strongly recom  Internet  mend against con  rep  necting nori internal   gt     and external interfaces Wrong    to one hub or switch   LAN    except if the switch is  configured as a VLAN switch  There might be  wrong ARP resolutions  Address Resolution  Protocol   ARP clash   which cannot be T mz  administered by all operating systemen  such   as those from Microsoft   Therefore  one physical network segment  has to be used for each firewall network interface        Firewall       Firewall    The Interfaces menu allows you to configure and manage all  network cards installed on the security system and also all interfaces  with the external network  Internet  and interfaces to the internal  networks  LAN  DMZ      120    Using the Security System    Note    While planning your network topology and configuring the security  system  take care to note which interface is connected to which  network  I
197. m  and that you keep the worksheets in a safe place for future    reference     Attention     If you are upgrading your system from version 4 to version 5  and  you wish to keep the settings from your existing installation  you  must first upgrade your system to version 4 021 at least  Only  backup files from this or higher versions of Astaro Security Linux can  be loaded into Version 5  Further information on the Up2Date Service  and the Backup function can be found in chapters 5 1 3 and 5 1 4     18    Installation    3 1  System Requirements    The requirements for installing and using this security system are     Hardware    e Processor  Pentium II or compatible  up to 100 users   e Processor  Pentium III or compatible  up to 100 users   e 256 MB RAM   e 8 GB IDE or SCSI hard drive   e Bootable IDE or SCSI CD ROM drive   e 2 or more PCI Ethernet network cards    e For wireless LAN access  a wireless LAN PCMCIA card with the  Prism2 chipset  or compatible     Important Note     The High Availability  HA   Wireless LAN  and Virtual LAN sub   systems require extra hardware  Please check the Hardware  Compatibility List for Astaro Security Linux  available at  http    docs astaro org for compatibility     To make Heart Beat Monitoring of the High Availability  HA   system easier  we recommend using network cards that support link  beat for all interfaces  The installation of the HA system is described  in detail in chapter 5 1 10 on page 97     19    Installation    Administr
198. m is turned off without being shut down properly   the system must check the consistency of the file system  this means  that the next boot will take longer  In the worst case  data may be  lost    The system will beep five times in a row to signal a successful startup   Shut down     1  Under the System tab  open the Shut down Restart menu    2  In the Action drop down menu  choose the Shut down action   3  Begin the shutdown by clicking Start   4    When asked Do you really want to shut down   click OK     102    Using the Security System    5 2  Networks and Services  Definitions     The Definitions tab allows you to define networks and services for all  of the other configuration menus  e g   the packet filter  VPN  proxies   etc   in one central location  This allows you to work with the names  you define  rather than struggling with addresses  ports  and network  masks  Another advantage is  that can group individual networks and  services together and configure them all at once  If  at a later date   you assign certain settings to these groups  they will apply to all  networks and services contained therein  It is even possible to make  groups of groups  Local users for the proxy services can also be  defined here     5 2 1  Networks    Network Definitions Se Es In the Networks menu  the    a   hosts and networks and also  Addes        EEE the network groups are  Add Definition z  defined              Any 0 0 0 0 0  none   Internal  Address  Interface up  192 168 5 217
199. ministratively enable    121    Using the Security System    or disable the interface  The functions in the Actions column allow  you to edit the configuration of the interface  or to delete it entirely     With this Internet security system  you assign one Name and also a  specific network card to one virtual interface  Three logical networks  will then be defined for each configured interface     e An interface  NAME  Address    consisting of the defined IP  address and the network mask 255 255 255 255  Host     e An interface  NAME  Network    consisting of the defined IP  address and the network mask 255 255 255 255  Network     e A Broadcast  NAME  Broadcast   network  consisting of the  broadcast IP for this interface and the network mask  255 255 255 255  Host     The networks are shown in the Networks menu  If an interface is  configured using a dynamic addressing scheme  for example through  DHCP or PPPoE  these settings are automatically updated  This  means that all functions  for example  packet filter rules  configured  with these aliases will automatically use the correct addresses     Hardware List    rier inn TE This table lists all net   ore sa0T  ag work cards installed on  REET the security system  to    gether with the relevant hardware information  The table shows  for  example  the system assigned ID  Sys ID   type of network card   hardware  MAC  address  Name Parameters   and PCI bus infor     mation  Bus Device Function  PCI Device ID         122    U
200. municate with the external  public  address  of the security system  DNAT can  in this case  take packets ad   dressed to port 80 of the system   s address and forward them to the  internal web server     Note    The method of setting up a web server behind the Internet security  solution is described in the Web Server DNAT guidebook  The Web  Server DNAT guidebook is available at http    docs astaro org     Source Network Address Translation  SNAT  is another special  case of NAT  and functions just as DNAT does  with the difference  that source addresses  rather than destination addresses  are  translated    This is useful in complex networks where replies should be sent from  other network addresses     Tip   To build a simple translation system from an internal network to the    Internet  use the Masquerading function instead of SNAT     158    Using the Security System    In contrast to Masquerading  which is dynamic  SNAT uses a static  address translation  That is  every internal address is translated to its  own externally visible IP address     Note      In order to forward port 443  HTTPS  to an internal server  you must  first change the value of the WebAdmin TCP Port  e g   1443  for  WebAdmin in the System WebAdmin Settings menu  This function  is described in chapter 5 1 8 in chapter General Settings     Note    Because translation occurs before Packet filtering  you must ensure  that appropriate rules are entered in the Packet Filter Rules menu   More informati
201. n   nection type  the authentification is based on Preshared Keys   Enter the password into this entry field     8  Save these settings by clicking Add     The newly configured IPSec profile will appear  deactivated  at the  bottom of the table  status light is red   Clicking on the status light  enables the IPSec connection     After you configure a new VPN tunnel  you will need to establish the  related packet filter rules to allow the two computers to communicate   Configuring packet filter rules is described in chapter 5 4 on page  179     275    Using the Security System    Example     In order to set up a Net to Net VPN connection  between network 1  and network 2   you will need to define the following rules     1  Under the Packet Filter tab  open the Rules menu     2  In the Add Rules window  add the following rule for network 1     Source  Network1  Service  Any  Destination  Network 2  Action  Allow    3  Confirm the entries by clicking on Add Definition   4  Inthe Add Rules window  add the following rule for network 2     Source  Network 2  Service  Any  Destination  Networki  Action  Allow    5  Confirm the entries by clicking on Add Definition     These rules will allow complete access between the two networks     276    Using the Security System    5 7 2  Policies    IPSec Policies In the Policies menu  you    aDES_COMP oe    yu    can customize parameters  3DES_PFS PFS edit   delete  CEU eee aiee   for IPSec connections and  AES  none  edit   delete  SEEEN ae 
202. n Treaa Time ATT Ei              306    Using the Security System    5 9  Local Logs  Log Files     The logs  generated by the system will be managed in the Local Logs  tab     5 9 1  Settings    Local Logging 4 Configure the basic settings  Status  n 7  eee A for the creation of log files  Remote Log Fie Archives  we    in the Settings menu                       Status  Click the Enable button to enable the function  status light  shows green      Important Note     When this function is disabled  the Internet security system will not  i create Log Files   Local Log File Archives  This function locally stores generated log  files to the Security system  Configure the settings for the local log  file archive in the Local Log File Archive window   By default  this function is enabled automatically  once the logging  functions are enabled     Remote Log File Archives  This function allows you  to save the  generated log files to a remote host or server  The settings for the  automization of the log file archive on a separate server are con   figured in the Remote Log File Archive     307    Using the Security System    Local Log File Archive                               Local Log File Archive    This window allows you to  Log file partition status  1  full  36 MB used  a N   oe wam   Observe the utilization of the   Sera     local log file partition  The   Threshold One  diagram first displays the       When usage reaches  85     used disk space in MB as  well as the utilizati
203. n Up2Date window  click the Start button under  Update now     The system checks now  whether new Pattern Up2Date packages are  available on the Update Server  downloads and installs them to the  Internet security system  Details on the complete Up2Date process  can be found in the Log Window  shown in real time  When the  DONE message appears  the process has completed successfully     The Installed Pattern Date will be updated when you click the  Up2Date Service under the System tab  or when you next open this  menu     When using the High Availability  HA  solution  the virus scanner  on system 2 will be automatically synchronized with system 1     Automatic Pattern Up2Date   1  Open the Up2Date Service menu in the System tab     2  Click the Enable button under Update automatically     3  In the selection menu Interval  specify how often the security  system should contact the Up2Date Server to check for new  Pattern Up2Dates     The available choices are  every hour  every day  or once per    week     A Security Note   Choose the hourly update option to ensure that your sys   tem is always up to date     60    Using the Security System    The automatic Pattern Up2Date is now activated  The Security sys   tem will contact the Up2Date Server at regular intervals and check  for new Pattern Up2Dates  Whenever new Pattern Up2Dates are  installed  the administrator will be sent an e mail containing a list of  the newest virus signatures     When using the High Availability  HA
204. n chapter 4 3 4 on page 39     The Header     Many of the functions will add headers to the messages scanned   The Header will inform the user on specific characteristics of a mes   sage  If you select the Pass action  recipients can configure their e   mail programs to filter messages with high spam scores  The following  is a list of the headers the SMTP proxy may insert     e X Spam Score  This header will be added to the Spam  Detection module  It contains a score  consisting of a numerical  value and of a number of minus and plus characters  The higher  the value  the more likely it is that the message is spam    If you select the Pass action under Spam Detection  recipients  can configure their e mail programs to filter messages with high  spam scores     e X Spam Flag  This header is set to Yes when the proxy classifies  a message as spam     251    Using the Security System    X Spam Report  The proxy identified a message as spam  The  added Multiline Header contains a readable and accessible anti   spam report     X Infected  This header is added if a virus is detected within the  message  The value of the header is the name of the virus found     X Contains File  When the File Extension Filter is enabled and  an attachment with a potentially dangerous extension is found  the  proxy will add this header     X Regex Match  When the Expression Filter is enabled and an  attachment matching the configured regular expression is found   the proxy will add this header     X
205. n in the field at    7     Using the Security System    right   The field should be empty if you select the X509 DN option     In the Name field  enter a descriptive name for this certificate  request     Allowed characters are  Only alphanumeric and underscore  characters are allowed     Enter a password with at least four characters in the  Passphrase field     Use the Key Size drop down menu to select the desired key  length     Use the drop down menus and entry fields from Country to E   Mail Address to enter identifying information about the  certificate holder     Common Name  If the CSR is for a road warrior connection   enter the name of the user here  If the CSR is for a host  enter  the hostname     To save the entries  click the on the Start button     The Certificate Request CSR   KEY will appear in the Host CSRs and  Certificates table  The table will also show the type  name  and VPN  IP of the CSR  The request can now be signed by the Signing CA  created in the first step     Step 3  Generate the Certificate     1     In the Host CSRs and Certificates table  select the CSR   KEY  certificate request     Use the drop down menu at the bottom of the table to select the  Issue CERT from CSR function     An entry field labeled Signing CA Passphrase will appear   Enter the password of the Signing CA here     Click Start     293    Using the Security System    From the CSR   KEY  the CA will generate the CERT   KEY  certificate  the certificate will replace the CSR in
206. n most configurations  the network interface with SysID  eth1 is chosen as the connection to the external network    In order to install the High Availability  HA  system  the selected  network cards on both systems must have the same SysID  Installing  the HA system is described in more detail in chapter 5 1 10 on page  97     The following sections explain how to use the Current Interface  Status and Hardware List windows to manage the various Inter   face types     Current Interface Status    Current Interface Status P  This window allows you  to configure both  logical  Hardware Li l ee and virtual interfaces    ae      The table lists all inter     ethi D Link DFE 530TX rev A  irq 9 type eth mac 00 05 5d a2 14 1b    eth2 DLink DFESSOTK TeV A y faces which have al    ready been configured    The graphic at left shows the Interfaces menu after three Ethernet  network cards have been configured        During the installation  you will have configured the ethO interface   This interface is the connection between the security solution and the  internal network  LAN   By default  this network card is named  Internal  The table displays all of the most important information  about the interfaces  the administrative status  enabled disabled   indicated by a green or red status light   current connection status   Up Down   Name  Name   ID  Sys ID   network card type   eth wlan  as well as IP address and network mask  Parameters     Click the status light in the Admin column to ad
207. ncrypted  and are  transferred over a secure chan   nel  Only Astaro is entitled to create and digitally sign new Up2Dates  packages  Any unsigned or forged Up2Date packages are rejected  and deleted     Pattern Up2Date                            Astaro maintains a number of servers for both System Up2Date and  Pattern Up2Date that are dialed in the given sequence  If the first  Up2Date server is not available  the system will automatically query  the next system or pattern Up2Dates in the list     In order to download updates  the Up2Date Service makes a TCP  connection to the update server on port 443  The security system will  permit this connection without any adjustment  If there is another  security system in place upstream  you must allow the communi   cation via the port 443 TCP to the update servers     i Important Note     Note     When using the High Availability  HA  system  please note the  special functions of System Up2Date     54    Using the Security System    System Up2Date    The System Up2Date function allows you to import system patches  and new security features into your Internet security system  The  Up2Date packages can be downloaded either manually over an en   crypted connection or automatically from the Update Server  If you  don t have an Internet connection  you can also import Up2Date  packages from a local volume     Newly imported Up2Date packages are presented with their respective  version number and file name in the Unapplied Up2Dates table
208. nd in the Local Logs   Browse menu  By default  this function is disabled    Enable this function by clicking on the Enable button  status light on  green      Block Password Guessing    Block Password Guessing    a This function can be used          After failed Attempts     Block IP for Period  seconds            3       00       Never block Networks     Selected Available     Any  KT  Internal  Address   intemal  Broadcast        Empty list        p  Internal  Network     to limit the number of at   tempts to log in to the  WebAdmin configuration  tool  After a specific num        ber of attempts  the access from this IP address will be denied for a  given time span     Configuring the blocking protection for Login attempts     1  Configure the maximum allowable number of attempts in the  After failed Attempts drop down menu     2  Enter the time span for the blocking protection in the Block IP  for Period entry field     3  Save your changes by clicking Save     Now  the blocking protection is enabled  The Never block Networks  window  allows you to exclude networks or hosts from the blocking  protection     93    Using the Security System    5 1 9  WebAdmin Site Certificate    Encryption systems are an important part of many modern security  systems  They are used  for example  when transmitting confidential  information over Virtual Private Networks  in chapter 5 7 on page  260   in user authentication and Up2Date Service or  to securely  administer the security system 
209. nel with ID 0x133a has been established  and the IP  address of the Remote Endpoint is 233 23 43 1      Example    AB   gt  C   gt  D   23 192 168 105 0 24   gt  192 168 104 0 24   gt   tun0x1234 123 4 5 6    This message shows that 23 data packets have been sent from  network 192 168 105 0 24 to network 192 168 104 0 24  The  tunnel   s ID number is 0x1234  and the remote endpoint is has IP  address 123 4 5 6      Configuring an IPSec Connection     1  Under the IPSec VPN tab  open the Connections menu     2  Enable the option by clicking the Enable in the Global IPSec  Settings window     The New IPSec Connection window will open     3  In the Name field  enter a descriptive name for the new IPSec  VPN connection     Name  Enter a descriptive name for this IPSec VPN tunnel   Allowed characters are  Only alphanumeric and underscore  characters are allowed    Type  Choose the type of connection to use    Use Standard for Net to Net connections    The Road Warrior  Road Warrior CA and MS Windows L2TP  IPSec connection types are useful with HOST to NET con   nections  e g  for sales representatives  The telecommuter will  then be able to build an IPSec connection to the firm   s internal  network  A road warrior connection can only be used through a  default gateway     271    Using the Security System    Note      Multiple remote key objects can be added to a single road  warrior connection  This can serve to reduce configuration  hassles  It must be respected  however  that a
210. network card   124    introduction         ccceeeee 119   introduction           00000e 119   MTU size      127  144  148   154    PPPoE DSL connection   145  PPPoE DSL connections 150    Proxy ARP          seeeeeeee 125  QoS status            126  147  QoS Status           143  153  Standard Ethernet interface   TA AN cient 124    uplink bandwidth  kbits   iaiia san 126  144  148  154  Uplink Failover on Interface    E E T 125  Virtual LAN        ccceee eee 140  Wireless LAN          0008 130    Wireless LAN Security    130  Interfaces   determining MAC addresses   oia a E A D 133    343    Index    hardware overview        122  Wireless LAN access point  sialdnis ae Selenielddnawehevalecte re 134    Wireless LAN station      137  Intrusion Protection    global settings              179  Introduction             006  179  notification levels          181  Portscan Detection        179  PUIES iea inde sb ction ete 182  IPS rule  SOttiNG teas cha vei eects  184  IPSec user group  defining    107  IPSec VPN  AH Protocol           220085 266  CA Management           290  CONNECTIONS          000aee 269  global IPSec settings     269  Introduction            0006  260  IPSEC  eideded cnten aaae 264  IPSec connections         270  IPSec MOde S        2  008 265  IPSec protocols             266  IPSec system information  E E on uvievabwadvedaene 270  key managemert          267  L2TP over IPSec           288  local IPSec X 509 key    282  Local K YS          eeeeee es 282  manual k
211. ng Add     The new policy will appear in the IPSec Policies table     281    Using the Security System    5 7 3  Local Keys    Local IPSec X 509 Key The Local Keys menu  Local Certificate  Please select Benig  allows an administrator to  manage local X 509 cer   VPN Identifier  IPv4 Address tifi cates  to d efi ne th e  Local tunnel IP address vil _ local IPSec identifier  and  to generate a local RSA  key pair              Passphrase     Local IPSec RSA Key                   Please select a key size and click Save to generate the local RSA key  A key size of at least 2048 bits  is recommended           RSA Key Length      Please select z Save       Local IPSec X 509 Key    In this window  you can define keys for X 509 certificates provided  you have already generated these certificates in the IPSec VPN CA  Management menu    Chapter 5 7 6 on page 290 describes the process of generating X 509  certificates     If you wish to use X 509 authentication  use the Local certificate  drop down menu to select the certificate  This menu only contains  those certificates for which the associated private key is available    In the Passphrase field  enter the password used to secure the  private key     The active key will appear with its name in the Local IPSec X 509  Key window  If you choose a new local key  the old key will  automatically be replaced     The firewall will use the ID and public private keypair of the current  local Local X 509 key to sign  authenticate  and encrypt X 
212. ng menu  This will  however  usually only be necessary  in complex network environments     31    Installation    10     11     12     13     32    Configure the DNS Proxy    In order to speed up name resolution  you can specify a local  DNS name server  or one provided by your ISP  in the  Proxies DNS menu  Otherwise  the security system will auto   matically use the root name servers    If you wish to use the proxy  you should configure the DNS  Proxy settings now    More information about configuring the DNS Proxy can be found  in chapter 5 6 2 on page 227     Connect Other Networks    If you wish to connect other internal networks to the security  system  attach their cables now     Configure the HTTP Proxy    If computers on the internal network should use the HTTP proxy  to connect to the Internet  open the HTTP menu in the Proxies  tab and click Enable    The configuration of the HTTP proxy is described in more detail  in chapter 5 6 1 on page 210    Please note that the computers on the internal network will have  to be configured to make use of the proxy     Configure the Packet Filter    In the Rules menu under the Packet Filter tab  you can  establish packet filtering rules     By default  all packets are filtered until you explicitly enable  certain services  New rules are added to the bottom of the list   and are inactive until explicitly enabled  The rules are processed  starting with the first and moving down the list  stopping at the  first applicable rule  To
213. ngs     Name  In the entry field  enter a unique Service name   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters  are alphanumeric characters  minus      space      and  underscore  _   Names may be up to 39 characters long   Type  Select Service from the drop down menu   Protocol  Select the Protocol from the drop down menu   Source Destination Ports  In the left entry menu  enter the  Source Port  that is the Client Side of the service  In the right  entry menu  enter the Destination Port  that is the Server Side of  the service     The other settings depend on the selected protocol     For the TCP and UDP protocols you need the following two  values  Entry options  A single port  e g  80  or a port range   e g  1024 64000      111    Using the Security System    5     Source Destination Ports  In the left hand entry menu  enter  the Source Port  i e  the Client Side of the service  In the right  hand entry menu  enter the Destination Port  i e  the Server Side  of the service    The ESP and AH protocols are used for IPsec VPN connections   The port entered here should be agreed upon with the remote  end of the IPSec VPN tunnel    SPI  Enter a value from 256 to 65535  Values up to and including  255 are reserved by the Internet Assigned Numbers  Authority  IANA     For the ICMP protocol  select a type of ICMP packet from the  ICMP type drop down menu    For the IP protocol enter the protocol num
214. ns a Blank Surf Protection  Profile     To add a new Blank Surf Protection Profile to the table  click  on the Add blank Profile button     There you can edit the Surf Protection Profile     Editing Surf Protection Profiles     1     In the Profiles table go to the Surf Protection Profile that you  wish to edit     In the Name field enter a descriptive name for the Surf  Protection Profile     Now make the settings for the Surf Protection Categories  functional group in the following order     Surf Protection Categories  In this field  choose the websites  topics to which access should be blocked from your network   URL Whitelist  In the access control list enter those Internet  addresses  for which you wish to  allow  access  even though  their topic matches a topic in the Surf Protection Categories  field    URL Blacklist  In the access control list enter those Internet ad   dresses  for which you wish to  forbid  access  even though their  topic doesn t match a topic in the Surf Protection Categories  field     221    Using the Security System    The    A Security Note    In the HTTP protocol the header of the request will be  filtered by the HTTP Cache Proxy Squid    This is different in the HTTPS protocol   in this case  the  squid does not read the header of the request  but per   forms a pass through  Therefore  the requested URL is  unknown and cannot be filtered again  This means that the  Surf Protection option cannot block URLs on the basis of  White  or Blacklists
215. ns and immediately informs the adminis   trator via e mail when one is detected  The administrator can also  decide what further measures should be taken in response to the    180    Using the Security System    scan  The e mail address of the administrator can be configured in the  System Settings menu     Security Note    se The administrator should take special care that all systems have  the most recent security patches installed   The Up2Date service  which updates the security system itself   is detailed in chapter 5 1 3 on page 54     Notification Levels    sella If the Intrusion Protec   Sy oat te tion System  IPS  detects  Blocked Packets   High smeny o E IPS attack signatures or   prevents an intrusion  the  system will send a message to the administrator  The e mail address  of the administrator can be configured in the System Settings  menu        Status  Disable _                    Detected Packets  Use this drop down menu to select the severity  level from which on a warning should be sent  Intrusion Detection      e All levels  For each level of risk    e High and medium severity  for high and medium levels of risk   e High severity only  only for high risk levels    e None  No warning will be sent     Blocked Packets  Use this drop down menu to select the level of  risk  from which on a warning should be sent  Intrusion Prevention      e All levels  For each level of risk   e High and medium severity  for high and medium levels of risk   e High severity only 
216. ntation errors     For example  this security solution includes the following proxies   e An HTTP proxy with Java  JavaScript and Activex    e An SMTP proxy  which scans e mails for viruses and controls e   mail distribution    e A SOCKS proxy which acts as a generic authenticating circuit level  proxy for many applications    Application level gateways have the advantage of allowing the  complete separation of protected and unprotected networks  They  ensure that no packets are allowed to move directly from one network  to the other  This results in reduced administration costs  as proxies  ensure the integrity of protocol data  they can protect all of the clients    13    Introduction to the Technology    and servers in your network  independent of brand  version  or  platform     Protection Mechanisms  Some firewalls contain further mechanisms to ensure added security     One such mechanism is supporting the use of private IP addresses in  protected networks through Network Address Translation  NAT    specifically    e Masquerading  e Source NAT  SNAT   e Destination NAT  DNAT     This allows an entire network to hide behind one or a few IP  addresses  and hides the internal network topology from the outside     This allows internal machines       Internet    to access Internet servers while    m making it is impossible to  E identify individual machines  A sn  gt    gt  from the outside     5 4 3 2 1111 Request  Using Destination NAT  it is    nevertheless possible to mak
217. nter  its IP address here  If you do not use a BDC  enter the name of  the PDC here    NT4 Domain  Enter the name of your MS Windows NT  2000   Domain    Allowed characters are  Letters of the alphabet  digits from 0 to  9  hyphen  and underscore characters     Note     This is not the Internet domain  as in Company com  but rather  a simple designator  e g   Intranet  If you are using a stand   alone server rather than a Domain Controller  enter its NETBIOS  name here  This corresponds to the PDC Name entry     Click the Save button to save these settings     Security Note    am the Shared Secret only passwords consisting of  alphanumeric  minus      and period     characters are  allowed  Other characters  for example    _   are not  allowed     77    Using the Security System    A Security Note   If you use SAM authentication  make sure to disable the Guest  account on your Windows domain  Otherwise all username   password combinations will be accepted as valid     5 1 7 3  LDAP Server    LDAP  the Lightweight Directory Access Protocol defines the way  in which clients communicate with X 500 conforming directory  services  The protocol thus specifies the type of access to such a  directory service     The security system uses the LDAP protocol to authenticate users for  several of its services  The security system allows or denies access on  the basis of certain attributes or group memberships established on  the LDAP server    This system supports the Microsoft Active Dir
218. nternal  Address  z       day  summarizes their size   Statistics for the preceding  month are also generated at the beginning of each new month  These  statistics are then used to generate a report  This report is useful  for  instance  when an organization pays its service provider based on the  volume of data transmitted     Accounting is configured and enabled in the Network Accounting  menu  Further information is available in chapter 5 3 7 on page 175     Browse Accounting Reports  The existing accounting protocols will  be displayed in this window  Select the month from the Select  Report drop down menu  The report will appear in the window below     303    Using the Security System    Use the Local Logs Browse menu to download or delete reports     Report for current Month  This window displays the accounting  report for the current month     Configuring Accounting     1   2     The    Under the Reporting tab  select the Accounting menu     Enable the Accounting Reports subsystem by clicking the  Enable button     The entry window will open     Use the selection field in the Queried networks window to  select the networks for which detailed reports should be gener   ated  This will usually include your LAN and or DMZ networks     Please see chapter 4 3 2 on page 36 for a description of how to  use selection fields     Important Note     Do NOT use the  Any  network  since it will match all source and  destination networks  meaning no traffic will be counted in the  re
219. o select a network card     Tip     For an external connection  e g   to the Internet  choose the   lt  card with Sys ID eth1     You cannot choose a network card that has already been config   ured with a primary network address    5  Use the Type drop down menu to select the PPTP over Ether   net  PPPoA DSL  connection interface type   You will need the connection settings provided by your ISP to  configure the following settings   Address  If you have not been assigned a static IP address by  your provider  keep the default Assigned by remote setting  here     151    Using the Security System    If you have a static IP address  choose Static from the drop   down menu and enter the address in the entry field    Default Gateway  You should probably keep the default setting  Assigned by remote  Other possible values are Static and  None    Modem IP Address  Enter the IP address of your ADSL modem  here  This address will usually be provided by your ISP or the  modem hardware  and cannot be changed    Example  10 0 0 138  with AonSpeed    NIC IP Address  Enter the IP address of the network card on  the security system which is attached to the modem here  This  address must be in the same subnet as the modem    Example  10 0 0 140  with AonSpeed    NIC Netmask  Enter the network mask to use here    Example  255 255 255 0  with AonSpeed    Address to Ping  In order to test the connection between the  security system and the external network  you can enter an IP  address of a hos
220. of the  attribute  The possible values are TRUE and FALSE     Value s   The current value of the attribute is shown here   6  Save your settings by clicking OK     Now make the settings on the Internet security system  The settings  in the configuration tool WebAdmin are explained on page 87     Configuring a Novell eDirectory Server     Make sure that there is a user configured on your LDAP server to have  full read privileges for the directory  This will be the query user     A Security Note   Make sure that the user has only read privileges     In most cases  you should use the groupMembership query type  with Novell eDirectory  NDS8   as this allows an existing user  index to be easily extended for proxy rights    The index can also be configured to use user defined attributes  which  must be manually set for each user in the index  If you wish to  authenticate on the basis of particular User Attributes  every user  account in the directory must be edited to define access rights  This is  done by setting a particular attribute for each user which either grants  or denies access to a service    You will need Novell ConsoleOne to configure the eDirectory Server     The configuration and management of the Novell eDirectory server is  described in detail in the accompanying documentation  You can find  these documents at     http    www novell com documentation lg edir87 index htmi    Then make the settings for the Internet security system  The settings  in the configuration 
221. offers the highest standard of security  The effective  key lengths that can be used with AES are 128  192 and 256 Bits   This security system supports a number of encryption algorithms     Either the MD5 or SHA 1 algorithms can be used for authentication     Key Management    The secure generation  management  and distribution of keys is  crucial to the security of IPSec connections  IPSec supports both  manual and automatic key distribution     Manual key distribution requires that both sides of the connection  be configured by hand  This means that for every Security  Association  SA   there are two per tunnel   a Security Parameter  Index  SPI  must be selected  a key for encryption and authenti   cation must be generated  and the keys must be installed on both  sides of the tunnel  These keys should also be changed at regular  intervals    Clearly  manual distribution is labor intensive  Because of the com   plexity of the process  manual intervention intensifies the risk that an  unauthorized party gains access to the keys    For these reasons  Manual Key Distribution is not often used     The Internet Key Exchange  IKE  protocol provides IPSec with  automatic key management capabilities  Keys are automatically  generated and securely exchanged  IKE also allows the generation  and management of multiple VPN tunnels and the use of dynamic IP  addresses  The IKE protocol automatically manages the Security  Associations  SAs  for a connection     267    Using the Security 
222. omputer     The definition of networks is covered in greater detail in chapter 5 2  on page 103  If the NTP server has already been defined  please  begin with step 6     1  Open the Networks menu in the Definitions tab     2  Inthe Name entry field enter a distinct Name   Allowed characters are  Letters of the alphabet  digits from O to  9  hyphen  space  and underscore characters  The name must be  fewer than 39 characters long     3  Now enter the IP Address of the NTP Server     47    Using the Security System    4  In the Subnet Mask entry field  enter the network mask  255 255 255 255     5  Now confirm your settings by clicking on the Add button     WebAdmin will now check your entries for semantic validity   Once accepted  the new network will appear in the network  table     6  Open the Settings menu in the System tab     7  Inthe Time Settings window make the following settings in the  given order     Time Zone  Now select the time zone   Use NTP Server  Select the NTP Server here     The system clock of the Internet Security system will be synchronized  with the external NTP server every hour     SSH  Shell Access  Settings       Ssi esne Access  selitys        Secure Shell  SSH  is a text   based access mode for the  ae         security system intended only  Allowed Networks z ER   for advanced administrators  In    order to access this shell  you  will need an SSH Client  which  comes standard with most Linux distributions  For MS Windows  we  recommend Putty as 
223. on         cceeeeee 203    loading helper modules  204  Connection Tracking Table  208  Current System NAT Rules 208  Current System Packet Filter   RUIGS ss danian iaaii 208  DHCP Server   assigning DNS servers   166    CONFIQUIING           0 e eee 165   current IP leasing table 168   introduction              06 165  DHCP Server   static mappings            167  DNS Proxy   CONFIQUIING seeen 228    342    DNS Server  deleting  iiini 109  Editing isian irana 109  DNS servers  AACING  ieder 106  Dynamic DNS  Host defining                119  Dynamic DNS       cceeeeeeees 118  Error codes  CREM aa ASE ete 327  INFO  uiuis dense semen 320  WARN eisein sicini niiina 325  Errors  CAUSES aaan tsaa 123  E E E ET 26  EXIM  sadinane na iaia 334  Factory Restin i iria 50  Firewall Hostname             118  General System Settings      44  Glossary  broadcast    335  CHENG snorri siete 335  client server model       335  DNS anenun 335  dual homed gateway     336  firewall           cceeeeeeeees 336  Header   duuichadwecwetcasies 336  NOSES ennu 336  IGMP eeu caries 337  LP a AEA ice os tees 337  IP address s   338  Masquerading               338  NSIOOKUD        eeeee eee eee 339  POPE ii iogan went dene 339  PrOtOCOl          eceeeee eee 339  PIOXY eon iaa ara aa ta 339  RADIUS      ccceee eee ea ees 340  POUT E TE 340  SEMVGR  iienwettveawesaieians ie 340  SOCKS siekiais 340    subnet MaSK saec 341  UNC path ccecce 341  GlOSSAFY ee 333  Group  deleting    109  editihgi inn 109  Hea
224. on Protection System  IPS  recognizes attacks with  the help of a signature based Intrusion Detection set of rules  The  system analyzes the complete traffic and automatically blocks attacks  before they can reach the network     The existing set of rules and or IPS attack signatures are updated  through the Pattern Up2Date function  New IPS attack signatures  will automatically be imported as IPS rule to the IPS set of rules     5 4 1  Settings    Global Settings    Global Settings    z In the window  configure  Status  eo  _Disable  Locsin Selected NRE the basic settings for the    Empty list           Any  Internal  Address     eral roadeas  Intrusion Protection Sys        Internal  Network   PPTP Pool       tem  IPS  option   Status  Clicking on the Enable button enables the option     Local Networks  From the selection field select those networks that  should be monitored by the Intrusion Protection System  IPS   If no  specific network is selected  the complete data traffic will be  monitored     Portscan Detection    paea The Portscan Detection  eam       PSD  feature allows you to  detect possible attacks from unauthorized users  Portscans are used  by hackers to probe secured systems for available services  In order  to intrude into a system  or to start a Denial of Service  DoS   attack  attackers need information on network services  If this       179    Using the Security System    information is available  attackers might make use of the security  deficiencies of
225. on of the  partition in percent     Ld ls       do this  Send Notification    Threshold Two        When usage reaches  30        LJ ls    do this  Delete oldest log files    Threshold Three  In the lower window  select  Dy eae   from the drop down menu   how the system has to react             LJ Ls       do this  Shutdown system        _ Save    if a specific part of the partition is overloaded with log files  Three  levels with different actions can be selected here     Configuring the Log Files Level     For each level  the following settings can be configured     When Usage reaches  Configure here  at which utilization in percent  of the system partition an action will be executed     do this  Configure the action in this selection menu     The following actions can be configured     Delete oldest Log Files  The oldest log files will automatically be  deleted by the Security system  The administrator previously  receives the WARN 711 notification e mail     Send Notification  Only the INFO 710 notification e Mail with the  correspondent warning will be sent to the administrator     Shut down System  The security system will automatically shut   down  The administrator receives the CRIT 712 notification e Mail  before     Nothing  No actions will be started     308    Using the Security System    Save the settings by clicking on the Save button     Remote Log File Archive                               Remote Log File Archive 3  In this window configure the      settings fo
226. on of why the message was blocked     e Blackhole  The e mail will be accepted and silently dropped     e Quarantine  The e mail will be accepted  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status  Quarantine  This menu presents further options  including options  to safely read the message     e Pass  The e mail will be treated by the filter  but allowed to pass   A Header will be added to the e mail  by which it can be sorted or    246    Using the Security System    filtered on the mail server or in the e mail programs of the  recipient     For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     Expression Filter    There is the chance that new viruses will appear which are not yet  recognized by the firewall  Various viruses can be identified because  of known strings   such as the IloveYou virus  The strings are entered  into this module  If an e mail contains this string  it will be blocked   Next to simple strings  also expressions in the form of Perl  Compatible Regular Expressions can be defined     Action  This drop down menu allows you to select the action the  proxy should take upon finding a message with a filtered string  The  following actions are possible     e Reject  The message will be bounced back to the sender with a  5xx error message  The bounce message sent to the sender will  also contain an explanation of why the message was blocked     e Blackhole  The e mail will be acce
227. on on setting packet filter rules can be found in  chapter 5 4 on page 179     Defining NAT rules     1   2     In the Network tab  open the NAT Masquerading menu   In the Name field  enter a descriptive name for this NAT rule     In the Rule type drop down menu  select the DNAT SNAT  function   A window named Properties will open     In the Packets to match window  define which packets should  be translated     At least one parameter in this window must be defined in order  to create a valid DNAT SNAT rule  The setting No match means  that packets will not be matched on the basis of this parameter     159    Using the Security System    160    Source address  Choose the original source address here  This  can be either a single host or an entire network    Destination address  Choose the original destination address  here  This can be either a single host or an entire network   Service  Choose the original service here  the service is defined  by source and destination ports as well as protocol used  e g    TCP      Note    A service can only be redirected when the communicating  addresses are also redirected  In addition  a service can only be  redirected to another service when the two services use the  same protocol     Use the next drop down menus to define how the packets should  be translated    At least one parameter in this window must be defined in order  to create a valid DNAT SNAT rule  If you redirect the original ad   dress to an entire network  the addresses in
228. on on the Key Exchange and Encryption     Virus Protection  The activities of the Virus Protection System  are recorded to these log files     Kernel  The Kernel logs record the system status  including mes   sages from device drivers  messages relating to the boot process  and  information about blocked packets     Logging  The local archives of the log files on the Internet security  system and the forwarding of files to the Remote Log File Archive are  recorded to these log files     Local login  Information on the log in processes to the local console  is recorded to these log files     MiddleWare  The activities of the MiddleWare are recorded to these  log files  The log files belong to the support logs and will only be  displayed after clicking on the show support logs button     Network accounting daemon  The efficiency of the accounting is  recorded to these log files     317    Using the Security System    BIND name server  The releases of host names to IP addresses are  recorded to these log files     Admin notifications  The Notification Log Files record all notifi   cation e mails sent by the firewall  This allows an administrator to  monitor critical system messages even if the e mail system is down     Error  warning  and information codes are listed in chapter 5 9 3 2 on  page 320     HTTP proxy  The HTTP proxy logs show the activity of the HTTP  proxy    Packet Filter  Messages relating to blocked packets are shown in the  Packet Filter logs  These log files a
229. onfigure the access to the WebAdmin configuration tool in this  menu     General Settings          CETE I Language  In this drop   Language  z   ee down menu you can deter   TOP Port       mine the language                          Timeout  seconds   In this entry field enter the intervals in sec   onds  in which WebAdmin automatically logs you out  if there are no  actions  By default  the system is set to 300 seconds after the instal   lation  The smallest possible interval amounts to 60 seconds    Click the Save button to save these settings     If you close your browser with an open WebAdmin session without  closing WebAdmin through Exit  the last session reamins active until  the end of the time out     TCP Port  If you want to use the standard port 443 for the HTTPS  service for another purpose  such as a deviation with DNAT   you  must enter another TCP Port for the WebAdmin Interface here   Possible values are 1024 65535  while certain ports are reserved for  other services  In order to address WebAdmin after a modification   you must separately link the port through a colon to the IP address of  the Internet security system    e g   https   192 168 0 1  1443     91    Using the Security System    Access and Authentication       Access and Authentication 4  Allowed Networks  Add    Allowed Networks  Selected Available  Any          those networks to the se   lection field that are au   thorised to access Web   Empty Admin  As with SSH  Any  ERa Selected  __ cade is en
230. opped  Next Up2Date install   lation locked by HA          System Up2Date failed  Corrupt Up2Date Package    Found corrupt Up2Date package  Please start pro   cess again  If the problem recurs  please con   tact the support department of your firewall    provider   System Up2Date failed  Invalid License    Your license is no longer valid           System Up2Date failed  License check failed    Your license could not be checked  If the  problem continues  please contact the support    department of your firewall provider        System Up2Date failed  Internal error    The system updat failed  Pleas contact the       support department of your firewall provider     System Up2Date failed  Invalid syntax       The system updat failed  Pleas contact the    support department of your firewall provider        System Up2Date failed  Could not read Up2Date    directory       The system updat failed  Pleas contact the    support department of your firewall provider   System Up2Date failed  No installation directory    The system updat failed  Pleas contact the       support department of your firewall provider     337    338    339    340    342       343    344    345    346    Using the Security System    System Up2Date failed  Could not extract tar    Please start process again  If the problem  recurs  please contact the support department of    your firewall provider     System Up2Date failed  Main Up2Date package not    found    Please start process again  If the problem  recurs  
231. ork card can be    Name  Marketing          ie eal aceon configured with multiple add   ye onal aadress on aa etace M itional IP addresses  also  cane called IP aliases   This func   tion allows you to manage  multiple logical networks on  one physical network card  It can also be used to assign further  addresses to a security system running NAT  NAT is described in  further detail in chapter 5 3 4 on page 157  Each network card can be  configured with up to 255 additional addresses              Netmask             Default Gateway       Adding additional addresses to a network card   1  In the Network tab  open the Interfaces menu   2  Click on the New button    The Add Interface window will open     3  In the Name entry field  enter a descriptive name for the  interface     4  Use the Hardware drop down menu to select a network card     5  Use the Type drop down menu to select Additional address on  Ethernet interface     6  Now make the specific settings for this interface type     Address  For this interface type  the address must be statically  defined  This kind of interface can only use static addresses     128    8     Using the Security System    Netmask  This interface type requires a statically defined net   mask  This kind of interface can only use static masks    Default Gateway  If you wish to use a default gateway with  this interface  select Static from the drop down menu and enter  the gateway address in the entry field  Otherwise  select None     Confirm the
232. otal 1 entries   Add blank Profile       7 Name  URL Whitelist URL Blacklist  Surf Protection Categories Content Removal  YP       Example 1 entries O entries e Information_and_Communication  lt  gt  0 entries Q       The functions from the left to the right are     Deleting Profiles  8   Click on the trashcan icon to delete a profile  from the table     Name  This is the name of the Surf Protection Profile  This Name is  necessary to assign this profile to a specific Network or User    Open the editing window by clicking on the field with the entry  e g   Default   Save your changes by clicking on the Save button  To keep  an entry  click cancel     URL Whitelist  This is an additional function from the Surf Pro   tection Categories  With this access control list you can  allow  the  access to specific Websites with a content that matches the subjects  in the Surf Protection Categories     Profiles Total 1 entries   Add blank Profile         7 Name  URL Whitelist URL Blacklist Surf Protection Categories Content Removal  VP      Example 0 one  O entries e Information_and_Communication  lt  gt  0 entries Q       Example  If you have chosen the Information and Communi   cation subject in the Surf Protection Categories menu  but wish to  explicitly allow access to the www astaro org website  simply add  this address to the Whitelist     218    Using the Security System       Open the access control list  oe E   by clicking on the field with  the entry  e g  O entries    Enter th
233. otocol  The update is available from Microsoft  at     http   support microsoft com support kb articles Q191 5 40 ASP    Select the VPN Update and  if you use Windows 95  also the RAS  Update     PPTP VPN Access             PPTP VPN Access This window allows you to  Status  eo     en ma   enable or disable PPTP VPN  Encryption  Stony  2B z access by clicking the En   Authentication  Local Users Z                able Disable button     Logging  This drop down menu allows you to choose how detailed  the information recorded in the PPTP Logs should be  The Extensive  setting should be used when you are using the Live Log to debug  connection problems  When you start the connection  you can view  the process in real time     The PPTP Live Log is in the Local Logs Browse menu     Encryption  This drop down menu allows you to choose between  encryption strengths  40 bit or 128 bit   Note that  in contrast to  Windows 98 and Windows ME  Windows 2000 does not come with 128  bit encryption installed  to use this kind of connection  the High    169    Using the Security System    Encryption Pack or Service Pack 2 must be installed  SP2 cannot  be uninstalled later     A  Security Note   You should always set Encryption to Strong  128 bit  except  when your network includes endpoints  which cannot support  this     Authentication  Use this drop down menu to select an authenti   cation method If you have defined a RADIUS server in the Sys   tem User Authentication menu  you can use RADIU
234. ou to check the integrity of the  backup later     Restore a Backup   This window allows you to install the backup file of the configuration   Loading a Backup    1  Open the Backup menu in the System tab     2  In the Restore a Backup window next to the Upload Backup  File entry field  click on the Browse button     3  In the File Upload window  choose the Backup file  you would  like to load and click on the Open button     Note     When using Microsoft Windows  make sure not to use a UNC  Path for loading the backup  Select the Backup file with the help  of the Look in selection window   4  Click on the Start button     If  during the generation of the backup file  the Encryption  function was enabled  the Enter Passphrase window will open     5  Inthe Passphrase field  enter the password     63    Using the Security System    6  Confirm your settings by clicking Start     The security system will now load and check the backup file  If  the ckecksums are correct  you will now receive the Backup  Information     7  Check the Backup Information     8  To import the backed up settings into the active system  click  the Start button     When the message Backup has been restored successfully  appears  the process has completed successfully     Create a Backup    This window allows you to create and archive a backup file of the  configuration of your Security system     Manually Creating a Backup     1  Open the Backup menu in the System tab     2  Inthe Create a Backup window  
235. over events  total                    The following events will be displayed   e WebAdmin Logins   e Remote Logins   e Local Logins   e System Up2Dates   e Virus Pattern Up2Dates    e Intrusion Protection Pattern Up2Dates  298    Using the Security System    e Config Changes    e Astaro Configuration Manager Uploads    e System Restarts    e High Availability Takeover    5 8 2  Virus    Report  Virus Protection Statistics       Today Yesterday Last 7 Days Last 30 Days  SMTP viruses  POPS viruses    HTTP viruses                      The following viruses will be displayed   e SMTP Viruses  e POP3 Viruses  e SMTP Viruses    5 8 3  Hardware    Report  Hardware Usage Graphs          CPU load  Daily Graph     CPU load  Daily     40 00 12100 14 00 16 00 18 00 20 00 22 00 00 00 02 00 04 00 06 00    4 ximur 20  0 42 Average  119 65 m Maximum  770 00 m  09 average  99 48 m Maximum  360 00 m    tinute average Currer  rinute Average Current   nute Average Cu    Show all CPU graphs    Memory usage  Daily Graph     Memory usage  Daily        o          10 00 12 00 14 00 16 00 18 00 20 00 22 00 00 00 02 00 04 00 06 00    m icad anas Eau w          The Virus menu contains an  overview of the filtered vir   uses of the last 7 days     This menu shows the cur   rent values relating to your  system hardware  The sys   tem collects statistics about  CPU utilization  RAM utiliza   tion  and swap utilization     The security system collects  graphics and statistics every  five minutes and updates
236. over the network     Certificates and Certificate Authorities  CA  are an essential part of  modern cryptographic protocols  and help close the gaps left open by  other systems  Public Key Algorithms offer a particularly elegant  form of encryption  They do  however  presuppose that the public  keys of all communications partners are known    At this point  a third  trusted party is used to ensure the validity of  public keys  The third party issues certificates guaranteeing the  authenticity of these keys  this third party is called a Certificate  Authority  CA   A certificate is a record in a standardized format  with the owner   s most important data   his name  and his public key    and is signed with the private key of the CA  The format for these  certificates is defined in the X 509 standard    In a certificate  the CA certifies  with its own signature  that the  public key belongs to the person  or entity  it says it does  As the  certificate contains information such as the name of the owner   duration of validity  issuing authority  and the signature of the CA  it  can be seen as a kind of digital passport                          Certificate Information The WebAdmin Site Certi   Country  United States  i   A     ficate menu allows you to  city  a create two certificates  first  Organization  Defaultcompani a CA certificate  which will  ia Sars be installed in your browser   E Mail Address  myname mydomain com   Hostnem eee TA darese AE and second the server        
237. ow  If you click on  the subcategories  another selection window will open  All avail   able subcategories will be listed in this selection field     216    Using the Security System       7 Name  Subcategories    Community_Education_Religion Cities Countries Regions  Government Institutions  Save Cancel   Non Government Organizations  Partys  Religion  Sects    Upbringing Education Reconnoitring  Computer Criminalism   Hate and Discrimination   Illegal Activities   Warez Sites    Criminal_Activities             Save your changes by clicking on the Save button  To keep an  entry  click cancel     4  To close the table  click on the Show Hide button     The Surf Protection Categories window will close     The Profiles Table    Each Surf Protection Profile will be displayed in the Profiles table  through a separate line  The different settings will either be displayed  as alphanumeric signs or as symbols  All settings can be edited by  clicking on the correspondent field     A Surf Protection Profile contains two function groups  The Surf  Protection Categories with the additional functions Blacklist   Whitelist and Content Removal  and the Content Filter  The Surf  Protection Categories prevent the access to Websites with a specific  content  The Content Filter contains a Virus Protection function and  filters Websites with specific technical components     217    Using the Security System    The Functions    The following picture shows a Surf Protection profile     Profiles T
238. owed networks menu  do not select Any unless  absolutely necessary  If any is selected  the DNS Proxy  can be used by any Internet user     Forwarding Name Servers  Enter the IP addresses of your  name server here    Click Add to add each name server to the list    Ordered Lists are described in chapter 4 3 4 on page 39     All settings take effect immediately and will be saved if you leave this  menu     5 6 3  SOCKS    Seet SOCKS is a generic proxy   Status  ao Disable       Allowed Networks Selected Available used by ma ny cl ient appli           Empty list    oan cations  Examples include In     stant Messaging Clients such  bes Attenyeatien T      as ICQ or AIM  FTP clients   aa     and RealAudio  SOCKS can  Seat to appar build TCP connections for  client applications  and can  also provide incoming  listening  TCP and UDP ports  This is especially  important for systems using NAT  as SOCKS mitigates the drawbacks  of having all internal clients use the same external address  This  security system supports the protocols SOCKSv4 and SOCKSv5                          229    Using the Security System    Please note  however  that the SOCKSv4 protocol does not support  User Authentication   Note     If you wish to use SOCKSv5 with name resolution  you must also  activate the DNS proxy service     Configuring the SOCKS Proxy   1  Inthe Proxies tab  open the SOCKS menu     2  Click the Enable button next to Status to start the proxy   Another entry window will open   3  Make th
239. page  133     1  Inthe Network tab  open the DHCP Server menu     2  Inthe Static Mappings window  make the following settings   MAC Address  In the MAC Address entry field  enter the MAC  address of the network card  The MAC address must be entered  as in the following example  Example  00 04 76 16 EA 62  IP Address  Enter the IP address into this entry field  The  address must be within the range specified by the Range Start  and Range End options     3  Save the settings by clicking Add     The static address mapping will appear in the Static Mapping Table   To remove an entry from this table  click delete     167    Using the Security System    Current IP Leasing Table    The Current IP Leasing table shows all current IP address map   pings  If more than one entry is shown for the same IP address  only  the last listed one is valid  This table will only be shown when there  are entries in it     168    Using the Security System    5 3 6  PPTP VPN    Point to Point Tunneling Protocol  PPTP  allows single Internet   based hosts to access internal network services through an encrypted  tunnel  PPTP is easy to set up  and requires on Microsoft Windows  systems no special client software     PPTP is included with versions of Microsoft Windows starting with  Windows 95  In order to use PPTP with this security system  the  client computer must support the MSCHAPv2 authentication protocol   Windows 95 and 98 users must apply an update to their systems in  order to support this pr
240. pends on the type of LDAP  server you are using    1  Microsoft Active Directory   Microsoft Active Directory can use either the User Principal  Name  UPN  or the full Distinguished Name  DN  of the  user    Examples    UPN  admin example com   DN  cn administrator  cn users  dc example  dc com   2  Novell eDirectory   Enter the full Distinguished Name  DN  of the user    Example    DN  cn administrator  o our_organisation   3  OpenLDAP   OpenLDAP and OpenLDAP conforming servers can only use the  Distinguished Name  DN  of users    Base DN  Enter the object name to be used as the basis for all  client actions     Using the Security System    Examples   For MS Active Directory  dc example  dc com  For Novel eDirectory  o our_organisation    Enter the password in the Password entry field  This password  should also be used for the Administration of the Stand alone   LDAP Server     A Security Note   Use a secure password  Your name spelled backwards is   for example  not a secure password   while something like  xfT35 4 would be     Click the Save button to save these settings     Security Note    a As long as the LDAP authentication by attribute  function is disabled  all users who are listed in the directory  with a unique DN and a valid password can use the HTTP   SMTP and SOCKS proxies  and can also access the  WebAdmin tool     Advanced Authentication with LDAP     1     Enable the LDAP authentication by attribute function by  clicking Enable next to Status     Use the Ser
241. please contact the support department of    your firewall provider        System Up2Date failed  Version conflict       The system updat failed  Pleas contact the    support department of your firewall provider        System Up2Date failed  Pre Stop Services script  failed       System Up2Date failed  Post Stop Services script  failed       System Up2Date failed  Pre Start Services script  failed    System Up2Date failed  Starting Services failed       The system updat failed  Pleas contact the    support department of your firewall provider     System Up2Date failed  Post Start Services  script failed          System Up2Date failed  Error occured while    running installer    The system updat failed  Pleas contact the       support department of your firewall provider     System Up2Date failed  Installer ended due to    internal error    329    Using the Security System    347    351    352    353    354    355    356    330       The system updat failed  Pleas contact the    support department of your firewall provider     System Up2Date failed  Started without rpm    parameters    The system updat failed  Pleas contact the       support department of your firewall provider     Pattern Up2Date failed  Could not select    Authentication Server  s     If the problem continues  please contact the    support department of your firewall provider     Pattern Up2Date failed  Could not connect to          Authentication Server  s     The authentication server is not reachable  If  
242. port     changes will be applied immediately  and the networks will    appear in the Queried networks window     304    5 8 13  System           Process     host domain com  Disk Partition Status     Using the Security System    Information    This menu offers additional       Disk Partition Status     List     Interface Information   ARP Table     Local Network Connections     F  host domain com  Disk Partition Status    Microsoft Internet Explorer    Filesystem 1K blocks Used Available Uset Mounted on  rootfs 608756 303736 274096 53       dev root 608756 303736 274096 53      tupts 32768 3284 29484 lls  opt tapfs   dev hdal 350007 15089 316845 5   boot   dev ndas 14845760 204764 13874696 2   var storage   dev hda6 350007 8239 323695 3   var up2date   dev ndes 396623 231242 144899 62   var sec   dev nda9 19825488 37568 18764560 1   var log   dev nda10 917104 16580 853936 2   tap   none 128240 O 128240 0   var shm        Show  Show  Show  Show  Show    system information  This in   formation will be displayed  in a separate window  Click   ing on the Show button  opens this window     Disk Partition  This table  lists the disk partitions on  the system and their usage  levels      ioj x     h manually                                                          E   sax P list  This t li    r a i  iejournald  rocess IISt  is tree lists  ls   sw 300  kjournald   oo ooe 2 AE   1i05  enta erstogny E my  oo 2672  gt   amp  00 00  0 00  E ENA all current processes on the  0 0 2672 2 s 
243. private networks to hide behind small  numbers of IP addresses  or even single addresses   thus allowing the  relatively limited IPv4 address space to meet the demands of an ever   expanding Internet     337    Glossary    IP Address    Every  publicly addressable  host on the Internet has a unique IP  address  similar to a telephone number  An IP address consists of  decimal numbers  separated by points  Possible numbers are 0 to 255  inclusive    Example  a possible IP address is 212 6 145 1     At least one IP name in the form hostname   subdomain s   domain   z  B  kises rz uni konstanz de is assigned to an IP address  This  refers to a computer  named kises  which stands in the sub domain  rz of the sub domain uni konstanz of the de domain  As with IP  addresses  the individual parts of the name are separated from each  other by a point  Whereas  in contrast to IP addresses  IP names are  not limited to four numbers  Moreover  several IP names can be  assigned to one IP address  which are referred to as aliases     Masquerading    Dynamic Masquerading is a technology based on NAT that allows an  entire LAN to use one public IP address to communicate with the rest  of the Internet     Example  The administrator has established an internal LAN  and has  given each computer on it IP addresses from the private IP range  10 x x x  One computer  for example  has the address 10 1 2 3  Only  one  official IP address is assigned to all computers in its network  i e   if only one 
244. pted and silently dropped     e Quarantine  The e mail will be accepted  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status  Quarantine  This menu presents further options  including options  to read or to send the message     e Pass  The e mail will be treated by the filter  but allowed to pass   A Header will be added to the e mail  by which it can be sorted or  filtered on the mail server or in the e mail programs of the  recipient     For a description of how to create rules in Microsoft Outlook  2000 please see on page 252     Expressions  Enter the strings to filter in this list     247    Using the Security System    The function of the Control List is identical to the Ordered List and  described in chapter 4 3 4 on page 39     5 6 6 2  Spam Protection    Sender Address Verification    When this function is enabled  the sending address of incoming e   mails will be checked  And also sending domain will be checked  If the  sending domain does not exist  the e mail will be rejected    If the Callout function is also enabled  the proxy will connect to the  mail server of the sending domain and check the sender address  using an RCPT command  If the sending address does not exist  the  proxy will reject messages from it     Realtime Blackhole Lists  RBL     The RBL module uses an external database of known spam senders  to check sending addresses  Several services of this type are available  on the Internet  This function helps to mas
245. querading requires a source network  It will automatically  include all services  ports  on that network     e The translation only occurs when the packet is sent via the  supplied network card  The new source address will be that of the  interface     Masquerading is intended to hide privately addressed LANs behind  one official  public  Internet address     161    Using the Security System    Defining Masquerading rules     To define masquerading rules  select which network should masquer   ade as which network card  Normally  the external network card is  used     Note     In order for clients from the defined network to build a connection to  the Internet  the appropriate rules must be entered in the Packet  Filter Rules menu    More information on setting packet filter rules can be found in  chapter 5 4 on page 179     1  In the Network tab  open the NAT Masquerading menu     2  In the Name field  enter a descriptive name for this Masquer   ading Rule     3  Use the Rule type drop down menu to select Masquerading   A window named Properties will open     4  Use the Network drop down menu to select a network   5  Use the Interface drop down menu to select an interface   6  Save the settings by clicking Add     After a masquerading rule has been defined and added  it will appear  in the NAT rules table  The further functions in the NAT table can  now be used for further customization     Further Functions    Edit Masquerading rules  Click edit to load the rule into the Edi
246. r a remote log  port a files archive  If the Remote  Username  eb Sana Log File Archive is on a ser   aan ver  you must first add it to          the Definitions Networks  menu     Configuring Remote Log File Archive    1  In the Global Settings window  enable the Remote Log File  Archives function by clicking on the Enable button   The Remote Log File Archive window will open    2  Use the Type drop down menu to select the archiving type   The drop down menus and or entry fields for the selected  archiving type will be displayed    3  Configure the settings for the archiving type     3 1 FTP Server  Host  Use the drop down menu to select a host     Port  Use the drop down menu to select a port   By default  FTP is already selected     Username  Enter a username in the entry field   Password  Enter the password in this entry field   Remote Path  Enter the path in the entry field     309    Using the Security System    310    3 2 SMB  CIFS  Share   Host  Use the drop down menu to select a host   Username  Enter a username in the entry field   Password  Enter the password in this entry field   Share Name  Enter the share name in the entry field     3 3 Secure Copy  SSH  Server    Public DSA Key  The Public DSA Key is displayed in this  window     Host  Use the drop down menu to select a host   Username  Enter a username in the entry field     Remote Path  Enter the absolute path in the entry field     3 4 Send by E Mail  E Mail Address  Enter the e Mail address into this entry f
247. r with useless packets  to overload its performance  Since a  large bandwidth is required for such attacks  more and more        _ Disable       204    Using the Security System    attackers start using so called SYN Flood attacks  which don t aim at  overloading the bandwidth  but at blocking the system resources  For  this purpose  they send so called SYN packets to the TCP port of the  service  i e  in a web server to Port 80     The SYN Rate Limiter function reduces the number of SYN packets   sent to the local network  This is disabled by default  status light  shows red      Click the Enable button to enable the function  status light shows  green      Protocol Handling    Strict TCP Session Hand   ling  To secure a reliable  data transport  the Trans   mission Control Protocol  TCP  that is in the transport layer is used   TCP then creates computer to computer connections and continues to  send data  until it receives an affirmative answer that the data have  been transmitted  This type of connection is called TCP Handshake  and is executed in three steps  Before a client is able to exchange  data  with a server  for example  he sends a TCP packet  in the  header of which there is also a so called SYN Bit  sequential number    This is an order to the server  to set up a connection  In addition  the  client transmits the so called window size  This value defines the  maximum number of bytes for the usable data in the data package   so that they can be processed on the c
248. rading or NAT rules must  be in place for the IPSec Pool     L2TP over IPSec Client Parameters             L2TP over IPSec Client Parameters This window allows you to  Client DNS Servers  g   i define DNS and WINS ser   E vers which should be as              signed to hosts when the  connection is established        289    Using the Security System    5 7 6  CA Management    A Certificate Authority  CA  certifies the authenticity of public  keys  This ensures that the certificate used in a VPN connection really  belongs to the endpoint  and not to an attacker  The CA Manage   ment menu allows you to create and manage your own X 509  Certificate Authority  CA   The authority will verify the validity of  X 509 certificates exchanged during IPSec VPN connections  The  relevant information is stored in the X 509 certficates    But you can also use certificates  signed by commercial providers   such as VeriSign     Note     Every certificate has unique CA with respect to its identifying  information  Name  Firm  Location  etc    If the first certificate is lost   a second cannot be generated to replace it     The CA Management menu allows you to manage three distinct  kinds of certificates  which are used for different purposes  The three  certificates differentiate themselves according to use  and  import   antly  whether or not the Private Key is stored     CA  Certificate Authority  Certificate  If a CA is saved without  private key  it can be used for the authentication of the
249. rated with the packet filter  will  be tracked by the Conntrack module  this is referred to as Con     nection Tracking                 Some protocols  such as FTP or IRC require several communication  channels  which cannot be connected through port numbers  In order  to use these protocols with the Packet filter  or to replace an address  through NAT  the Connection Tracking Helpers are required     203    Using the Security System    Helpers are structures  referring to so called Conntrack Helpers   Generally speaking these are additional Kernel modules that help the  Conntrack module to recognize existing connections     For FTP data connections  a FTP Conntrack helper  for example  is  necessary  It recognizes the data connections  belonging to the  control connection  normally TCP Port 21   which can have any  destination port and adds the respective expect structures to the  expect list     The following protocols are supported  By default  all Helper modules  are loaded     e FIP   e H323   e IRC  for DCC    e MMS  Microsoft Media Streaming   e PPTP    Loading Helper Modules  By default  all Helper modules are  loaded   The helper modules are loaded and deleted in the selection field     A description of how to use the selection fields can be found in  chapter 4 3 2 on page 36     SYN Rate Limiter    SYN Rate Limiter Denial of Service attacks   DoS  on servers  shall  deny the service access to  legitimate users  In the simplest case  the attacker overloads the  serve
250. re also included in the kernel  logs     POP3 proxy  The activities of the POP3 Proxy are logged to these log  files  All outgoing e Mails will be listed there  In addition  all  irregularities  such as interruptions or blocked e mails will be logged     Portscan Detection  The Portscan Detection system watches for and  blocks portscans and sends e mail messages to the administrator   When examining the Log Files  however  do not draw too many  conclusions from the source IP addresses  SRC  and port numbers   SPT   as they can easily be falsified by the sender  The destination  addresses  DST  and port numbers  DPT   however  provide useful  information about what the scanner was looking for     PPPOA DSL dial up  The processes executed in the dial up with PPP  over ATM are recorded to these log files     PPPoA DSL dial up  The processes executed in the dial up with PPP  over Ethernet are recorded to these log files     PPTP VPN Access  These logs record the progress of PPTP sessions  from external clients  This includes login and authentication infor   mation as well as error messages     318    Using the Security System    If you select the Extensive parameter in the Logging function of the  Network PPTP VPN Access menu  these logs will contain very  detailed information about PPP connections     Self monitor  The Self monitoring continually checks the integrity  of the firewall systems and notifies the administrator of important  events  Self monitoring checks the function
251. rity System    are alphanumeric characters  minus      space      and under   score  _   Names may be up to 39 characters long   Type  Select Network Group from the drop down menu   Initial Members  From the selection field  select the network  card by pressing the Ctrl key on the keyboard and selecting the  name with the mouse   Comment  You can enter a network group description in this  entry field   Save the network group by clicking on the Add Definition  button     After successful definition  the new network group will appear in the  network table  The network group name will also be available for use  in various configuration menus     Defining IPSec user group       This definition contains only the Distinguished Name  DN   It is  used for incoming IPSec connections  using X 509 certificates  If the  DN of the group corresponds to the one of the user  his virtual IP   address will dynamically be added to the group     1   2     Under the Definitions tab  open the Networks menu     Click on the New Definition button   The entry window will open   Make the following settings   Name  In the entry field  enter a unique name for the IPsec user  group   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters    are alphanumeric characters  minus      space      and under   score  _   Names may be up to 39 characters long     Type  Select IPsec User Group from the drop down menu   107    Using the Secur
252. rror Checking module can detect errors in messages  that have been encrypted with MIME  MIME stands for Multipurpose  Internet Mail Extensions  MIME defines the structure and the  composition of e mails and of other Internet messages  This is an  encoding rule  which allows for the transmission of non text docu   ments  e g  pictures  audio and video in text based transmission  systems  The non text elements are encrypted at the sender and  decrypted at the receiver     The MIME Error Checking module can help detecting attacks  in  which error tolerance variations in the MIME decryption software are  being utilized     Action  This drop down menu allows you to select the action the  proxy should take upon finding a message with a filtered string  The  following actions are possible     e Reject  The message will be bounced back to the sender with a  5xx error message  The bounce message sent to the sender will  also contain an explanation of why the message was blocked     e Blackhole  The e mail will be accepted and silently dropped  Do  not use this action unless you are absolutely certain no legitimate  e mails will be lost     e Quarantine  The e mail will be accepted  but kept in quarantine   The Proxy Content Manager menu will list this e mail with status  Quarantine  This menu presents further options  including options  to read or to send the message     e Pass  The e mail will be treated by the filter  but allowed to pass   A Header will be added to the e mail  by wh
253. rscore  _   Names may be up to 39 characters long     Type  Select Host from the drop down menu   Address  Enter the IP address in the entry field   Comment  You can enter a host description in this entry field     Save the host by clicking on the Add Definition button     If the definition is successful  the new Host will be entered in the  network table  You will now find this host under its name also in    104    Using the Security System    different other menus  You could  for example define this host under  System Remote Syslog as Remote Syslog Server     Adding Network     1   2     4     Under the Definitions tab  open the Networks menu     Click on the New Definition button   The entry window will open   Make the following settings     Name  In the entry field  enter a network name   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters  are alphanumeric characters  minus      space      and  underscore  _   Names may be up to 39 characters long   Type  Select Network from the drop down menu   Address Netmask  Enter the IP address in the entry field and  select the network mask from the drop down menu   Comment  You can enter a network description in this entry  field     Save the network by clicking on the Add Definition button     WebAdmin will check that your entries are valid     After successful definition  the new network will appear in the  network table  The network name will also be a
254. rted by the security system is listed in the Hardware  Compatibility List for Astaro Security Linux available at  http     docs astaro org     The wireless LAN interface on the security system can be configured  either as a Wireless LAN Access Point or a Wireless LAN Station     The Wireless LAN Access Point mode connects wireless nodes with  one another  its function is analogous to that of a hub in a traditional  wired network  Wireless nodes can also communicate with the  wired   LAN through the security system     In the Wireless LAN Station mode  the security system functions as  a normal node on an existing wireless network  Only in this mode can  the system acquire an IP address through DHCP     Wireless LAN Security   The 802 11 standard includes the WEP standard for encrypting radio  communications  WEP stands for Wired Equivalent Privacy  This  encryption method is based on the RC4 cipher  and uses a secret  130    Using the Security System    string to encrypt and decrypt messages  Activating WEP requires this  secret key to be configured on all interfaces on the wireless network   All transmissions over the network are encrypted with this key at the  sending station  and then decrypted at the receiving station  Without  this key  the data cannot be decrypted     This security system can also use WEP for Authentication  A  computer attempting to connect to the network which is not con   figured with the correct key will be dropped at the access point     The Wirele
255. rtificates are signed and issued by a trusted Certificate Authority   CA   During the Key Exchange process  the certificates are ex   changed and authenticated using a locally stored CA certificate    Further information on Certificate Authorities  CAs  can be found  in chapter 5 1 9 on page 94 and in chapter 5 7 6 on page 290     268    Using the Security System    5 7 1  Connections    The Connections menu allows you to configure local settings for new  IPSec VPN tunnels and to manage existing connections     Global IPSec Settings    Global IPSec Settings This section allows you to  ae enable or disable the  IPSec VPN system by  clicking the Enable Dis        IKE Debugging     New IPSec Connection          Name  hpn                                              Tea Sienaan able button next to   IPSec Policy  Please select X Statu sS    Auto packet filter  On   SR on IKE Debugging  This  Se function allows you to   Endpaint Definition   Local Endpoint  Pease elect check the IPSec connec    Remote Endpoint  Please select tion  Detailed information          is logged to the IPSec   Subnet definition  optional    Local Subnet  logs  These protocols can   ier cates   be displayed in real time   Gone iana aao SEn in the Local Log IPSec   key  Please select VPN menu or down              loaded to your local com   puter  Further information on the Local Logs menu can be found in  chapter 5 9 on page 307     Important Note     The IKE Debugging function requires a large amount of sys
256. rtment of your firewall provider        Pattern Up2Date failed  MD5Sum Error occurred       If the problem continues  please contact the    support department of your firewall provider     System shut down due to full log file partition       The log file partition usag reached th       specified value in percent  To prevent the loss  of important log files  the system has been shut  down automatically  Pleas check th WebAdmin       settings and or remove old log files        Intrusion Protection Event    A packet was identified that may be part of an    intrusion  The matching rule classified this as    331    Using the Security System    851    860    332    highest priority level  Further information on  the Intrusion Prevention event can be found in    the notification e mail     Intrusion Protection Event   Event buffering    activated    A packet was identified that may be part of an    intrusion  The matching rule classified this as       highest priority level  Event buffering has been       activated  Further Intrusion Protection events  will be collected and sent to you when the  collection period has expired  If more events  occur  this period will be increased  Further  information on the Intrusion Prevention event    can be found in the notification e mail           Intrusion Protection Event   Buffered Events    After the activation of the event buffering  further IPS events have been collected  Please  see the attached file for a list of collected  events  This
257. ry aspect of the  Astaro Security Linux system  This chapter explains the tools and  concepts used by WebAdmin  and shows how to use the built in    online help system     WebAdmin has four main components                 Europe   Berlin       Please select                2004    03 2              SSH  Shell Access  Setuings          T Use slow adjustment       Status  ao    Allowed Networks  Selected        Any    34           1  Info Box   2  Tabs    3  Menus    4  Online help   5  Refresh    WebAdmin    4 1  Info Box    The system time and time  MEME CMU Emile Zone are always displayed in  petting  the top left hand corner of    Configuration of the hostname  g    the screen  If you roll the    mouse over the time display   E i the Info Box will appear  con     ed S   taining the following infor      z mation        Uptime  Displays how long the security system has been running  without a restart     User  Displays which user is currently logged in to WebAdmin  as  well as the client the user is logged in from     Last Login  Displays when and from which client WebAdmin was  last used     4 2  Tab List    The Tab List on the left of the screen          organizes the various menus ac    Dra __Hostname DynDNs cording to subject  To list the menus   Rout contained under a subject heading    simply click the tab  the available   menus will appear below  For ease of   use  chapter 5     Using the Security   User Authentication   system     has been structured to   match the ord
258. s               161   editing rules               161   introduction sessen 157  Network   AAGING sive iia cease 105   deleting  sssini 109   editing ssri irem einn 109   filtering ini sanansa 108   introduction     ssssecees 103  Network group   defiNiNg a srania 106  Networks   PCES asidan cniri araeir 108  Networks      ccsseeeeeeeeeeaeeae 103  Notification          ccceeeeaeees 118  Packet Filter   advanced sss 203   system information       207  Packet Filter Live Log         207    Packet filter rule  adding editing groups    194    enable  disable             194  sorting rules table         194  Packet filter rules  rules table              0065 193  Packet Filter Rules  GeletinGsesieiiseceevenes isnt 194  editing ioiii anaiai 194  filteri aan nni 195  filters erinan 195  introduction             0 65 188  re ordering        sceeeee eee 194  Packet Filter Rules  SGtUING nenia anai 190    Pattern Up2Date    Index    installation  automatic    60    installation  manual         60  Ping  USING ese i ahead abet dan 178  Ping Check            eeceeeeeee 177  POP3  CONFIQUIING           2ee eee 232  Content Filter               233  NO AED    eeeeeeseeneeaeees 235  Spam Protection           233  Virus Protection            233  PPTP VPN  introduction    sss 169  MS Windows 2000 Scenario  E A 171  PPTP Client Parameters 171  PPTP IP pool scce 170  PPTP VPN access           169  Protocols  Al  E E 110  112  ESP asirni hied 110  112  IPies isra gunaan s iaa 112  TOP ANENE AE 
259. s  DNS proxy    6 files  HTTP proxy 4 files  Intrusion Protection System    4 files  Kernel messages P 6 files  Local logins    6 files  Logging subsystem    6 files  Packet filter    6 files  PPTP daemon 4 files  Selfmonitoring    6 files  SMTP proxy    6 files  SSH daemon    6 files  System log messages 6 files       User authentication daemon    6 files  Webadmin 6 files        checked entries   The functions from the left to the right     Ry By By By By By  By  Rr  Re Ry Ry Ry  By Br  By Re Be Be By    E  E  a  a  a  a  g  a  s  a  a  a  E  E  a  a  a  a  E             z  F  z                             z     F                Selection box  This setting is required in connection with the drop   down menu at the footer of the table  Select the protocol groups and  then choose the action  Delete or Download as ZIP File  from the  drop down menu    The action will start immediately    Clicking on the selection box in the header selects all protocol groups     312    Using the Security System    8   Clicking on the trash can icon deletes a group from the table   Name  All protocols are listed in alphabetical order in this column   Date  The date of current protocols will not be displayed      B   Clicking on the folder icon opens the sub tab with all protocols of  this group    By clicking again on the icon  you will get back to the overview  The  additional functions in the sub tab are described in the   Log File Sub   tab    section     File Count Name  The number of exist
260. s  have been correctly con   figured in the Network   Interfaces menu    The configuration process  for network cards is de   scribed in chapter 5 3 2 on  page 119     Using the Security System    5 8 5  Packet Filter    Report  Packet Filter Statistics Packet fi Iter vio   ations in    Packet filter violations  Daily Graph        a ania diagrams will be displayed in   oF  o it HHA a graphic in this menu  The     rule violations will also be   logged to the Packet Filter   Logs  The log files are   saved to the Local Logs   Browse menu              5 8 6  Content Filter    The processed data and actions of the Content Filter  relating to the  HTTP  SMTP and POP3 proxies will be displayed in the form of tables  and diagrams in this menu  The Spam Protection option and the  Spam Score are described in chapter 5 6 6 2 on page 248     Information on the SMTP and POP3 proxies    e Sum of the treated messages   e The average size of messages in kilobytes   e The average height of Spam Score   Information on the HTTP proxy    e Sum of requested HTTP sites   e Sum of the HTTP sites  blocked by Spam Protection  Sum of the HTTP sites  blocked by Virus Protection    301    Using the Security System    5 8 7  PPTP IPSec VPN    The PPTP and IPSec VPN connections will be displayed in a graphic  this menu     5 8 8  Intrusion Protection    Intrusion Protection events will be displayed in a graphic in this menu     5 8 9  DNS    The DNS Query statistic is represented in this menu     5 8 10 
261. s allows mail clients such as  Microsoft Outlook  Outlook Express  or Netscape Messenger to  authenticate themselves to the SMTP Proxy  This is especially useful  for clients with dynamic IP addresses  where the client IP address  cannot be specified in the Outgoing Mail menu     When configuring clients  please note that SPA  Secure Password  Authentication  should not be used  SPA is an alternative encryption  method  which is not supported by this security system  You should  use an unencrypted authentication method instead  and use TLS  or  SSL  to encrypt the session     The Authentication Methods selection field allows you to select the  user authentication method to be used  Only those authentication  methods you have configured in the Settings User Authentication  menu are available here   Local users are defined in the Definitions Users menu    241    Using the Security System    Global Whitelist       Global Whitelist 3  Trusted Hosts Networks     Trusted Hosts Networks  Selected Available          Ena E In the hierarchy list a  GI Global Whitelist can be  erga         defined with reliable hosts          ii no data in table          or networks  which in this  case are excluded from the following options     e Realtime Blackhole Lists  e Sender Verification   e MIME Error Checking   e Spam Detection   e Expression Filter    This implicates  that the necessary computing power for scans is  reduced and that problematic hosts can be excluded from Content  Scanning    
262. s become known that  the receiver of the certificate fraudulently obtained it by using wrong  data  name  etc   or because an attacker has got hold of the private  key  which is part of the certified public key  For this purpose  so   called Certificate Revocation Lists or CRLs are used  They normally  contain the serial numbers of those certificates of a certifying  instance  that have been held invalid and that are still valid according  to their respective periods of validity    After the expiration of this periods the certificate will no longer be  valid and must therefore not be maintained in the block list     The Automatic CRL Fetching function automatically requests the  CRL through the URL defined in the partner certificate via HTTP   Anonymous FTP or LDAP Version 3  On request  the CRL can be  downloaded  saved and updated  once the validity period has expired   Enable the function by clicking on the Enable button  status light is  green     Please  check if the packet filter rules in the Packet Filter Rules    menu are configured such that the CRL Distribution Server can be  accessed     Strict CRL Policy  Any partner certificate without a corresponding  CRL will be rejected    Enable the function by clicking on the Enable button  status light is  green      296    Using the Security System    Send ICMP Messages  If a data packet exceeds a set MTU value   the system will send the following ICMP message to the source ad   dress  Destination unreachable fragmentation
263. s clients     In addition to simplifying the configuration of client computers and  allowing mobile computers to move painlessly between networks   DHCP helps to localize and troubleshoot IP address related problems   as these are mostly issues with the configuration of the DHCP server  itself  It also allows for a more effective use of address space   especially when not all computers will be active at the same time  as  addresses can be distributed as needed and re used when unneeded     Configuring the DHCP Server   1  Inthe Network tab  open the DHCP Server menu     2  In the Interface drop down menu  select the interface from  which the IP addresses should be assigned to the clients     3  Click Enable next to Status to enable the function   Another entry window will open     4  Use the Range Start and Range End menus to set the address  space from which IP addresses will be distributed     165    Using the Security System    By default  the configured address area of the network card will  appear in the entry field     The settings will take effect without further confirmation     Assigning DNS Servers and Gateway IP Addresses     You can transmit further parameters for the network configuration to  the clients  Such as the DNS Server Addresses and the Default  Gateway to be used by the clients  The security system itself will  usually fill both of these functions  in this case  you should enter the  internal address of the system in these entry fields     The DNS Proxy
264. s control   Collection of audit trails   Protocol analysis   Reporting of security related events  Concealing internal network structure    Separation of servers and clients using proxies  11    Introduction to the Technology    e Guaranteeing information confidentiality    A firewall combines several network components in order to provide  these assurances  The following is a brief look at some of these tools  and their uses     Network Layer Firewalls  Packet Filters    As the name suggests  this component filters IP packets on the basis  of source and destination address  IP flags  and packet payload  This  allows an administrator to grant or deny access to services based on  factors such as     e The source address   e The destination address   e The protocol  e g  TCP  UDP  ICMP   e The port number    The primary advantages of packet filters are their speed and their  independence of operating systems and applications in use behind the  firewall     Advanced implementations of packet filters also inspect packets at  higher network layers  Such filters interpret transport level infor   mation  such as TCP and UDP headers  to analyze and record all  current connections  This process is known as stateful inspection     A stateful packet filter records the status of all connections  and  allows only those packets associated with a current connection to  pass  This is especially important for allowing connections from a  protected network to an unprotected one  but disallowin
265. s field  select the local user for  this profile     4  From the Assigned Network Blocks  select the network for this  profile    5  Enable the profile assignment by clicking the status light   The status light is green     If a user or computer defined in the profile attempts to access a  blocked website  access will be blocked  and the user will receive a  message explaining why     225    Using the Security System                      Advanced  iver 3  Caching  This function buf   Caching  ao      fers often used Websites to  Block CONNECT Method  oe le  Howl TEISES       the HTTP Proxy Cache   FTP CONTROL   aus y   7  fries ere This is enabled by default       SQUID    J EUDORA x     status light shows green    Clicking on the Disable  button disbles this function              TCP Port   8080          Clear HTTP Proxy Cache     Block CONNECT Method  All HTTP connection requests will be  blocked by the HTTP proxy  Only the HTTP methods GET and PUT  will be allowed through the proxy     Each Client Request will be introduced through the information of the  method  Methods define the respective action for requests  The  current HTTP specification offers eight methods  OPTIONS  GET   HEAD  POST  PUT  DELETE  TRACE and CONNECT  Only the GET and  PUT methods are explained in this section    The GET method is used with requests from a document or another  source  A source in this case is defined through the request URL   There are two types  Conditional GET and partial GET  With
266. s protocol that uses no so called ACK Bit  Because it does not  keep state  UDP can be faster than TCP  especially when sending  small amounts of data  This statelessness  however  also means that  UDP cannot recognize when packets are lost or dropped  The  receiving computer does not signal the sender when it receives  packets successfully     TCP connections also use port numbers from 0 to 65535  inclusive    Lost packets can be recognized through TCP and be requested again   in a TCP connection  the receiver notifies the sender when a packet is  successfully received  connection related protocol   TCP sessions  begin with a three way handshake and are torn down at the close  of the session     The ESP and AH protocols are used for Virtual Private Networking   VPN   These protocols are covered in chapter 0 on page 258     110    Using the Security System    The network table contains the defined services and groups  By  Default  the table contains the already pre defined statically entered  services     Services can be grouped into Service Groups  These service groups  can be used the same way single services can  and can themselves be  included in other service groups  In the service table service groups  are labeled by the group symbole         The definition of Service Groups is described on page 112     Add Service     1   2     Under the Definitions tab  open the Service menu     Click on the New Definition button   The entry window will open   Make the following setti
267. s to ICMP   ping requests  e g   the DNS server of your ISP   The security  system will send ping requests to this host  if no answer is  received  the backup interface will be enabled by the failover  In  this entry field  there must always be an IP address for the  failover    QoS Status  In order to use Quality of Service  QoS   bandwidth management on an interface  enable this option  To  enable the Quality of Service  QoS  module  select On from  the drop down menu     Important Note     For the bandwidth management Quality of Service  QoS  you  must define the values for Uplink Bandwidth  kbits  and  Downlink Bandwidth  kbits   These values are used as basis  for the bandwidth management system  incorrect values can  lead to poor management of the data flow  The Quality of  Service  QoS  function is described in chapter 5 5 1     153    Using the Security System    154    Uplink Bandwidth  kbits   These settings will only appear  if  the QoS function is enabled  In this entry menu  enter the avail   able bandwidth for the Uplink in full kilobits  This value can be  determined either from the values of the upstream interface or  from the router  On an interface to the Internet  this value  corresponds to the bandwidth of the Internet connection   on an  ADSL access the Uplink bandwidth amounts to 128 kBit s and on  a 2 Megabit fixed connection to 2048 kBit s    Downlink Bandwidth  kbits   These settings will only appear   if the QoS function is enabled  In this entry men
268. sage in the    Type reason here    field which will be transmitted to  the other administrator     334    Glossary    Glossary    Broadcast    The address used by a computer to send a message to all other  computers on the network at the same time    Example  A network with address 212 6 145 0 and netmask  255 255 255 240 would have a broadcast address of 212 6 145 15     Client    A client is a program that communicates over a network with a server  in order to make use of a particular service    Example  Netscape is a WWW client  and communicates with a WWW  server to download web pages     Client Server model    Applications based on the client server model use a client program on  the user   s computer to communicate with a central server program on  the network  The server is usually responsible for keeping track of the  data  while the client is responsible for presenting the data to the  user  In order to function correctly  the client and server must both  use a well defined network protocol to communicate  All important  applications on the Internet  e g  WWW  FTP  news  use this model     DNS    The Domain Name Systems  also  The Domain Name Service   translates the underlying IP addresses of Internet connected com   puters into more human friendly names or aliases and vice versa   This translation from number to name is done by the name server   Every Internet connected institution must employ at least two  separate DNS servers to answer queries about its internal 
269. se packets  Packets larger than this value will be considered  too long for the connection and fragmented into smaller ones be   fore transmission  These data packets will be sent again  How   ever  the performance can be limited  if the upper value is too  low     Using the Security System    The following values are the defaults for the PPP over Ethernet   PPPoE DSL  connection  1492 Byte     6  Confirm these settings by clicking Add     The system will now check the address and netmask for seman   tic validity  After a successful check  the new interface will  appear in the Current Interface Status table  The interface is  not yet enabled  status light is red      7  Enable the interface by clicking the status light   The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system    requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     149    Using the Security System    5 3 2 6  PPTPoE PPPo0A DSL Connections       Tene i      This type of interface is re           Hardware  etht  Realtek RT8139                       quired for DSL connections  Type  PPTP over Ethernet  PPPoA DSL  connection  f  Address  Pasion by emote using the PPP over ATM  aang ae Sn protocol  To configure such a  Modem IP Address   spade connection  you will need an  NIC Netmask  unused Ethernet interface on          Address to Ping     the security system as we
270. se settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red     Enable the interface by clicking the status light     The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system  requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     129    Using the Security System    5 3 2 3  Wireless LAN    The industry standards IEEE 802 11 apply to Wireless LAN  This  Internet security system supports the IEEE 802 11b protocol  This  standard uses radio signals in the ISM frequencies  in the 2 4 GHz  band  to communicate between nodes  ISM stands for Industrial  Scientific and Medical  The ISM frequencies have been specifically  allocated for unlicensed communication by industrial  scientific  and  medical organizations  and are thus available for cost free private  use  The IEEE 802 11b standard allows for a maximum bandwidth of  11 Mbit s  When planning your network design  however  please note  that bandwidth actually available will be smaller when the distances  between nodes are large     Important Note     In order to configure a Wireless LAN  you will need a PCMCIA card  with a Prism2  Prism2 5  or Prism3 compatible chipset  The hard   ware suppo
271. ser of  MyAstaro  enter the password into the Yes  my password is  entry field     Then click on the Submit button    Create a new MyAstaro Account    E Mail Address  You can correct your address in this entry field   Password  Enter your desired password here    First Name  Enter your first name here    Last Name  Enter your last name here    Then click on the Register button     51    Using the Security System    If the registration was successful  the page with the message  Congratulations  you have created your MyAstaro account  will be displayed  Moreover  you receive a confirmation by e   mail     Now you can download different versions of the Internet security  system under MyAstaro and execute the following actions for  your license     1  Convert a Version 4 license to a Version 5 license    Register purchased Version 5 Activation Keys    Add options to your registered license      Download a free Home User license    uo A WN      Download a 30 days test version with additional features    Licensing the Internet security system     In order to license the Internet security system  you need a valid  license file on the local host  so that you can import it to the Internet  security system through the WebAdmin configuration tool     1  Open the Licensing menu in the System tab     2  In the Upload License File entry field  click on the Browse  button     3  From the Select File dialogue  select the license file and click on  the Open button     4  Click onthe Start but
272. sible for  computers on an internal  ceuusars dL LAN to use private IP ad   dresses  while still allowing  them to communicate   through the security system   with the public  Internet                 Rule Type  DNAT SNAT                                     NAT Rules       When a client sends an IP packet to the router  NAT translates the  sending address to a different  public IP address  from the address  space given by the Internet provider  before forwarding the packet to  the Internet  When a response packet is received  NAT translates the  public address into the original address and forwards it on to the  internal client  Depending on system resources  the NAT function can  handle arbitrarily large internal networks     Destination Network Address Translation  DNAT  is a special  case of NAT whereby the destination addresses of packets are trans   lated  This is especially useful when an internal network uses private  IP addresses  but an administrator wishes to make some services  available to the public Internet     157    Using the Security System    Important Note   l PPTP VPN Access is incompatible with DNAT     Example     Your internal network uses the address space 192 168 0 0   255 255 255 0 and a web server running at IP address 192 168 0 20  port 80 should be available to Internet based clients    Because the 192 168 address space is private  the Internet based  clients cannot send packets directly to the web server  It is  however   possible for them to com
273. sing the Security System    Error     The Hardware List table doesn   t list all of the network cards   Possible Causes     The missing network cards were added after the installation of  the security system  or were not recognized during instal   lation  Please contact the support department of your security  system provider     If you change the IP Address of the internal network card  ethO        Attention   you may lock yourself out     123    Using the Security System    5 3 2 1  Standard Ethernet Interface                      Bald ie To configure a network card  ee   for a standard Ethernet con   Type  Standard ethernet merac nection to an internal or ex   SE a ternal network  you must  ee   configure the card with an IP          address and netmask        Default Gateway     All network cards installed  Proxy ARP  E on the security system are  Uplink Failover on    Interface  E shown in the Hardware  QoS Status    x  List                          MTU Size        Configuring a Standard Ethernet Connection   1  In the Network tab  open the Interfaces menu   2  Click on the New button    The Add Interface window will open     3  In the Name entry field  enter a descriptive name for the  interface   example  Externally for an Internet connection     4  Use the Hardware drop down menu to select a network card     Tip     For an external connection  e g   to the Internet  choose the  H card with Sys ID eth1     5  Use the drop down menu Type to select Standard Ethernet  Int
274. sively reduce the number  of spam     One commercial service  for example  can be found at  http   www mail abuse org     Action  This drop down menu allows you to define how filtered e   mails originating from known spam sending domains should be  handled  The following actions are possible     e Warn  If an e mail is received from an RBL listed domain  the X   RBL Warning header will be inserted in the message  and the  message will be allowed to pass through the proxy  More infor   mation on inserted headers can be found in the Spam Detection  section     e Reject  E mails from listed domains will not be accepted  and will  instead be bounced back to the sender     248    Using the Security System    Zone  Enter the addresses of databases to use in this list     The function of the Control List is identical to the Ordered List and  described in chapter 4 3 4 on page 39     Spam Protection    This option heuristically checks incoming e mail for characteristics  suggestive of spam  This system uses an internal database of heuris   tic tests and characteristics  making the test independent from sender  information  and also more reliable     Two Thresholds can be defined for the Spam Score  This ensures  that potential SPAM e mails are treated differently by the Firewall   The two Thresholds are equal  Whereas the threshold with the  higher level should be treated more severely  The functioning is ex   plained below with the help of the default settings     Default settings  
275. ss LAN Access Point mode also allows stations to be  selectively granted access to the network on the basis of MAC Ad   dress  Normally  in the interest of flexibility  a wireless LAN will allow  any new node onto the network as long as it is configured with the  correct WEP settings  An administrator may choose  however  to  control which nodes should have access  Such a filter can be con   figured to allow only certain nodes   for instance  the one identified  by MAC address 00 04 76 26 65 4C   onto the network  When a new  node attempts to join the network  the security system will check its  MAC address  if the hardware address is in the list of allowed nodes  it  will be permitted to join  otherwise the connection will be dropped     This security solution supports two kinds of MAC address filter   negative and positive  A negative filter allows all hardware ad   dresses except those on the list to join the network  In the access  control you only define those network cards that should not be  accessed by Wireless LAN    A positive filter  on the other hand  first of all excludes all MAC  addresses  In the access control you define explicitly those network  cards that should can be accessed by Wireless LAN    If at all possible  a positive filter should be used  which is by far safer     The following settings are required to configure a wireless LAN  PCMCIA card     e SSID  An acronym for Service Set Identifier  this is essentially  the name of the network  More than on
276. t  NAT Rule window  The rule can now be changed as desired     Deleting Masquerading rules  Click delete to remove a rule from  the list     162    Using the Security System    5 3 4 3  Load Balancing    Add New NAT Rule The Load Balancing func   as tion allows you to balance   incoming connections  e g    Sey SMTP or HTTP sessions   ress or Hostname    Sie ase ela z across different servers be    hind the security system              Rule Type        Pre Balancing Target             Post Balancing  Target Group                 Example  In the enter    aN nat teaa o eaa prise   s DMZ sit two   identical HTTP servers with   IP addresses 192 168 66 10 and 192 168 66 20  Load Balancing can  split incoming HTTP requests between the two servers evenly        Before the load balancing rule can be defined  the two HTTP servers  must be defined as networks  consisting of single hosts  in the  Definitions Networks menu  Next  add both to a single network  group    The procedures for adding networks and network groups are  described in chapters 5 2 1 and 103  respectively     Once these definitions have been saved  the load balancing rules can  be defined     Defining Load Balancing rules     1  In the Network tab  open the NAT Masquerading menu     2  Enter a descriptive name for the load balancing rule in the  Name entry field     A window named Properties will open     3  Enter a descriptive name for the load balancing rule in the  Name entry field     4  Use the Rule Type drop down
277. t Filter     Select the associated key in the Authentication of Remote  Station s  window    IPSec remote keys are defined in the IPSec VPN Remote Key  menu  The settings in this window depend on the type of con   nection     7 1 Standard  Key  Use the drop down menu to select a Remote Key     7 2 Road Warrior   L2TP Encapsulation  This drop down menu allows you to  additionally enable L2TP over IPSec  On     Keys  Select the Remote Keys for the road warrior connection  from the selection window     7 3 Road Warrior CA   L2TP Encapsulation  This drop down menu allows you to ad   ditionally enable L2TP over IPSec  On     Use CA  With the road warrior CA connection type  the authenti   cation is based on the Distinguished Name  DN  of the remote  receiver  Remote Endpoint   You thus need a Certificate Au   thority  CA  from this endpoint  Only the VPN Identifier X 509  DN can be used     Using the Security System    From the drop down menu  select X 509 DN Certificate  Authority  CA     Client DN Mask  In order to use a Distinguished Name as an  ID  you will need the following information from the X 509 index   Country  C   State  ST   Local  L   Organization  O   Unit  OU    Common Name  CN  und E Mail Address  E     The data in this entry field must be in the same order as in the  certificate     7 3 MS Windows L2TP IPSec   L2TP Encapsulation  With this type of connection  L2TP over  IPSec is automatically enabled  On     IPSec Shared Secret  With the MS Windows L2TP IPSec co
278. t Gateway filled in    3 2 1  Software Installation  The first part of the installation uses the Installation Menu to con   figure basic settings     The setup program will check the hardware of the system  see  screenshot   and then install the necessary software on your PC     1  Boot your PC from the CD ROM drive  Step 1    In order to navigate through the menus  use the following keys   Please note the additional key functions listed in the green bar at  the bottom of the screen   Cursor keys  Use these keys to navigate through the text boxes   e g   the license agreement or when selecting a keyboard  layout   Enter key  The entered information is confirmed  and the install   lation proceeds to the next step     22    Installation    ESC key  Abort the installation   Tab key  Move between text boxes  entry fields  and buttons     Attention     The installation will destroy all data on the PC         2  Keyboard Layout  Step 2    Use the Cursor keys to select your keyboard layout and press  Enter to continue    3  Hardware Test  Step 3      The software will check the following hardware requirements   CPU  size and type of hard drive  CD ROM drive  network cards   and IDE or SCSI controllers    If your system does not meet the minimum requirements  the  installation will report the error and abort     4  License Agreement  Step 4    Note     Please read the license agreement carefully   I    Press F8 to agree to the terms of the license     5  Time and Date  Step 5    Use 
279. t be configured with normal routing  entries  e g   when the network includes a router over which you  have no control     By default  the Proxy ARP function is disabled  Off   To enable  it  select On from the drop down menu    Uplink Failover on Interface  This function will only displayed   if the parameter Assign by DHCP or Static has been selected in  the Default Gateway drop down menu    If a network card is an interface to the Internet  e g  2 Megabit  fixed connection  you can configure a standby connection by a  second Internet access  e g  DSL connection  and an additional    125    Using the Security System    126    network card  If the primary connection fails  the uplink will  automatically be set up through the second Internet access     Note     You need two separate Internet accesses and an additional  network card for the Uplink Failover on Interface connection     Uplink Failover on Interface is by default disabled  Off   If  you wish to use this network card as primary Internet con   nection  then configure it in the Primary Interface drop down  menu  If this network card shall contain the standby connection   select the setting Backup Interface    Uplink Failover check IP  Once the Uplink Failover on  Interface function has been enabled  this entry field will be  displayed  Enter the IP address of a host that replies to ICMP   ping requests  e g   the DNS server of your ISP   The security  system will send ping requests to this host  if no answer is  rece
280. t comprises three set fields   e Username  e Password in clear text  PAP     e Type of proxy  the string http  smtp or socks  in the NAS   Identifier field    72    Using the Security System    Your RADIUS server should use this information to determine whether  or not access should be granted  and should send back a properly  formatted reply     Configuring Microsoft   s IAS RADIUS Server     IAS is a part of all versions of Microsoft Windows 2000 Server  but is  generally not installed by default  For Microsoft Windows NT4  IAS is  a part of the NT4 Option Pack and is available without charge  The  MS Windows NT4 IAS has fewer features than the 2000 version  but is  nevertheless sufficient for user authentication with the security  system     1  Check that the IAS service is installed  If it is not  install it now     2  Create a user group for every proxy to be used     Tip     sam the group according to the proxy to be used  For     example  name the group for the HTTP Proxy HTTP Proxy  Users     3  For each group  add the users who should be allowed to use this  proxy service     4  Make sure that the user flag Allow dial in access to the net   work is set for every user in these groups   You can find this setting in the user properties dialog box  MS  Windows NT 2000 needs this flag to answer RADIUS inquiries     vl    Open the administration program for the IAS service     g    Add a client  This requires the following information    Client Name  Enter the DNS name of 
281. t may be useful to block certain hosts or networks from accounting  data  for instance when a DMZ host only communicates with internal  systems  but you are only interested in collecting accounting data  for outbound traffic  ince it might only be used for internal means  it  might not be useful to consider its traffic data     In the Reporting Accounting menu  you can monitor the collected  accounting data and edit accounting rules     175    Using the Security System    Do not use accounting on network interfaces  Doing so may over       Important Note     load the system     Configuring Traffic Accounting     1  In the Network tab  open the Accounting menu    2  Enable the function by clicking the Enable button    The status light will show green and another entry window will  open    3  Inthe Interfaces selection field  choose the network cards   Please see chapter 4 3 2 on page 36 for a description of how to  use selection fields    4  Use the Ignored Networks selection menu to choose which  networks to ignore    The settings in the Traffic Accounting menu will immediately be   enabled     176    Using the Security System    5 3 8  Ping Check    Pahoa Ping allows you to test the  Please note that Ping Check requires that the Ping from Firewall option is active in Packet Filter  gt ICMP   If you want to ping DNS hostnames  Proxies  gt DNS must also be configured        connection with a remote       Ping Host   lt  lt  Custom hostname IP address  gt  gt  7    Hostame IP A
282. t on the Internet  e g   the DNS server of your  ISP  here  The security system will send ping requests to this  host  if no answer is received  the connection will be broken   Username  Enter the username  provided by your ISP   Password  Enter the password  provided by your ISP    Click Enable to open the Advanced options configuration  settings    Uplink Failover on Interface this function will only be  displayed if the Assign by DHCP or Static is selected in the  Default Gateway drop down menu    You can configure a standby connection through a second inter   face  If the primary connection fails  the uplink will automatically  be set up through the second interface     Using the Security System    Note     You need two separate Internet accesses and one additional  network card for the Uplink Failover on Interface function   Please  note that the Security system only supports one DSL   connection  A standby connection for accessing the Internet can  therefore only consist  for example  of a fixed connection and a  DSL access     Uplink Failover on Interface is by default disabled  Off   If  you wish to use this virtual interface as primary connection   select Primary Interface from the drop down menu  If this  interface shall contain the standby connection  select the  Backup Interface configuration    Uplink Failover check IP  Once the Uplink Failover on  Interface function has been enabled  this entry field will be  displayed  Enter the IP address of a host that replie
283. tem  resources  and can slow the IPSec VPN connection building process  down considerably  This system should only be enabled when IKE is  actively being debugged     269    Using the Security System    IPSec Connections    In the IPSec Connections table  all current VPN connections are  listed     IPSec System Information       IPSec System Information VPN Status  In the VPN  DaS Status window  status in   formation is shown for ac   tive encryption algorithms  all active IPSec connections  and detailed  information about every Security Association  SA         VPN Routes        VPN Routes  The VPN Routes window shows all active IPSec SA  connections  If no entries exist here  no IPSec connections are active     Routing entries follow the following form    AB   gt  C   gt  D   3 192 168 105 0 24   gt  192 168 104 0 24   gt  Shold  8 192 168 105 0 24   gt  192 168 110 0 24   gt  Strap    O 192 168 105 0 24   gt  192 168 130 0 24  tun0x133a 233 23 43 1     gt     Column A  The number of packets in this VPN connection   Column B  The local subnet or host    Column C  The remote subnet or host    Column D  The status of the connection       trap  The connection is idle and is waiting for a packet  The status  initiates the end of the VPN connection      hold  The connection is being negotiated  All packets will wait until  the VPN tunnel is established  UP      tun0x133a 233 23 43 1  Messages like these show that the tunnel  is up     270    Using the Security System    A VPN tun
284. ter the filter attributes in the fields listed  You don   t have to  define all attributes     Name  If you want to filter the services by names  enter the  expression in the entry menu     Protocol  This drop down menu allows you to filter the services  by specific protocols     Source Port  If you want to filter services by a specific source  port  enter it in this entry field     Destination Port  If you want to filter services by a specific  target port  enter it in this entry field     Comment  If you want to filter services by specific comments   enter the expressions in this entry field     113    Using the Security System    3  To start the filter  click on the Apply Filters button     Only the filtered services will be displayed in the table  Next time  when you open the menu  the complete service table will be  displayed     Further Functions    Editing Definitions  Click on the settings in the Name  Value and  Comment columns in order to open an editing window  You can then  edit the entries     Deleting Definitions  Clicking on the symbol of the trash will delete  the definition from the table     5 2 3  Users    In the Users menu Local  Users are added  if the use    of proxy services should be  limited to sepcial persons   This is an alternative to  using an external user database  This menu allows you to define             which user has access to which proxy services  Available options are  HTTP Proxy  SMTP Proxy  SOCKS Proxy  WebAdmin  L2TP over  IPSec and PP
285. tered here for a  smooth installation  In this  case and if the password is  available  WebAdmin can  be accessed from every   where        Authentication Methods  Local Users                      Log Access Network Traffic  Enable       Security Note    As soon as you can limit the access to the Internet security  administration  for example your IP address in the local network   re   place the Any entry in the Allowed Networks selection field  through a smaller network     The safest solution is  if only one administrator PC has access to the  Internet security system through HTTPS   Networks can be defined in the Definitions Networks menu     Authentication Methods  Select the authentication method in the  selection field  In order to give you access to the Internet security  system through the configurations tool WebAdmin after the  installation  the authentication method Local Users has already been  defined here and the respective User hase been entered in the  Allowed Users selection menu     Further available authentication methods are NT 2000 XP Server   RADIUS Database and LDAP Server     Local Users are administered in the Definitions Users menu     Allowed Users  By default this is set to the user admin     92    Using the Security System    Local users are defined in the Definitions  Users menu     Log Access Network Traffic  All connections to the WebAdmin  configuration tool are logged to the Packet Filter Logs as Accept  rule  The Packet Filter Logs can be fou
286. the Cursor keys to select your country and press Enter to  confirm   Use the Cursor keys to select your time zone and press Enter to  continue   Next  enter the current time and date in the entry field  Use Tab  and the Cursor keys to switch between entry fields  Invalid  entries will be rejected   Confirm your entries with the Enter key     23    Installation    24    Network Card Selection and Configuration  Step 6      In order to use the WebAdmin tool to configure the rest of your  security system  you must now configure a card to be the in   ternal network card  ethO     Choose one of the available network cards from the list and  confirm your selection with the Enter key    Next  define the IP Address  Network Mask  and Default  Gateway for this network card     Example     Address  192 168 2 100    Netmask  255 255 255 0   You must enter a value in the Gateway field if you wish to use  the WebAdmin interface from a workstation outside the subnet  defined by the netmask  Note that the gateway itself must be  within the subnet    For example  if you are using a netmask of 255 255 255 0  the  subnet is defined by the first three values of the address  in this  case  192 168 2  If your administration computer is at  for  example  192 168 10 5  it is not on the same subnet  and thus  requires a gateway to be configured here  The gateway router  must have an interface on the 192 168 2 subnet  and must be  able to contact the administration computer     In our example  assume
287. the action move it to a specified folder     With one click on Specified folder in the window Rule descrip   tion  a new menu appears  Here you can either choose an  existing folder or create a new destination folder for the filtered  e mails  Example  Spam   Click OK to save the new settings in this menu     Then click on the button Next   Add exceptions  step 4     The module Spam Detection heuristically checks incoming e   mails for certain characteristics  It therefore might be  that safe  messages  e g  HTML Newsletter are filtered  This menu allows  you to define exceptions and to thus exclude e mails  e g   messages of a particular sender from this rule     Then click on the button Next   Enter a name for this rule  step 5     Type a distinct name for this rule into the input field  In the  options fields below  you can activate these rules and also apply  them on e mails  which are already in the Inbox folder  You can  change your settings in the window Rule description    253    Using the Security System    10     254    Then click on the button Finish   Apply rules in the following order  step 6     In the Rules Wizard you can activate or deactivate the rules by  one click on the option field or execute changes     In order to close the Rules Wizard  click on the button OK     Using the Security System    5 6 7  Proxy Content Manager    The Proxy Content Manager menu allows you to manage all of the  e mails quarantined by the proxy  as well as those which  because o
288. the problem continues  please contact the sup     port department of your firewall provider     Virus Pattern Up2Date failed  Could not connect    to Up2Date Server    The Up2Date server is not reachable  If the       problem continues  please contact the support    department of your firewall provider     Intrusion Protection Pattern Up2Date failed     Could not connect to Up2Date Server    The Up2Date server is not reachable  If the  problem continues  please contact the support    department of your firewall provider     Virus Pattern Up2Date failed  No active bases    for Virus Patterns found    Intrusion Protection Pattern Up2Date failed  No  active bases for Intrusion Protection Patterns    found    337    358    360    361    362    712    850    Using the Security System    Virus Pattern Up2Date failed  Internal MD5Sum       Error    Could not create correct MD5Sums  If the problem  recurs  please contact the support department of    your firewall provider     Intrusion Protection Pattern Up2Date failed        Internal MD5Sum Error    Could not create correct MD5Sums  If the problem          recurs  please contact the support department of    your firewall provider     Pattern Up2Date failed  Licence Check failed       Your license could not be checked  If the  problem continues  please contact the support    department of your firewall provider     Pattern Up2Date failed  Restart of Virus Scanner  failed    If the problem continues  please contact the    support depa
289. ticated using ESP   In both cases  the original header is sent over the WAN in clear text     IP Packets    Original AH    Header Header Payload    Transport Mode   AH  Authenticated        Original ESP    Transport Mode   ESP Header Header    The original packet In Tunnel Mode  the com    IP Packets is encapsulated  i k h d d   Tunnel Medea iS  pter OSAI Payload E eanen ae  authenticatea_   _  Payload   is encapsulated   Tunnel Mode ESP esger Header Header Payload in a new IP packet  An IP      ner el      meve    header is added to the IP     packet  with the destination  address set to the receiving tunnel endpoint  The IP addresses of the  encapsulated packets remain unchanged  The original packet is then  encrypted and or authenticated in its entirety  The AH protocol allows  the entire packet to be authenticated     265    Using the Security System    IPSec Protocols    IPSec uses two protocols to communicate securely on the IP level     e Authentication Header  AH    a protocol for the authentication  of packet senders and for ensuring the integrity of packet data    e Encapsulating Security Payload  ESP    a protocol for en   crypting the entire packet and for the authentication of its  contents     Das Authentication Header Protocol  AH  checks the authenticity  and integrity of packet data  In addition  it checks that the sender and  receiver IP addresses have not been changed in transmission  Packets  are authenticated using a checksum created using a Hash based  M
290. tigate these risks     Networks    The Internet is already well established as a vital communications  medium and a key marketplace for both traditional and new services   Since its inception  its size has multiplied  with domain name growth  between 1995 and 2002 reaching almost exponential proportions   Computers on this worldwide network communicate using the  Internet Protocol  IP   as well as various higher level protocols  such as TCP  UDP  and ICMP  IP addresses uniquely identify each of  the computers reachable on the network     The Internet itself is a collection of smaller networks of various kinds   When two or more networks are connected  a number of issues arise  which are dealt with by devices such as routers  bridges  and  gateways  A firewall is another such device  designed with security in  mind    As a rule  three kinds of network meet at the firewall     e An external or Wide Area Network  WAN   e An internal or Local Area Network  LAN   e A De Militarized Zone  DMZ     An example configuration is shown on the next page     10       gt    gt      rr      Introduction to the Technology    External Network  Router       Internet    Internal Network    rnn a    3  hh            J                i               Firewall       E Mail  Server    Web  Server    The Firewall    One of the components in this security system is a firewall  The  characteristic tasks of a firewall connecting a WAN  LAN  and DMZ    are     Protection against unauthorized access  Acces
291. tion  IP address of the web server or Any  Action  Allow    To use the proxy  configure the client browser proxy settings to use  the IP address of the security system and port 8080     Transparent  In this mode  the system notices HTTP requests on the  internal network  automatically processes them  and forwards them to  the remote server  The client browser is entirely unaware of the proxy  server  The advantage of this mode is that no additional adminis   tration or configuration is required on the client  the disadvantage is  that only pure HTTP  port 80  requests can be forwarded    All networks allowed to use the transparent proxy must be explicitly  listed in the Allowed Networks menu  When Transparent mode is  used  the client browser settings cannot be used to control proxy  settings  Moreover  no data can be downloaded from a FTP server in  this mode  HTTPS connections  SSL  must be executed via a Packet  Filter     User Authentication  This mode complies with the functions of the  Standard mode  In addition  user access to the HTTP proxy is only  authorized after previous Authentication     212    Using the Security System    Note     Changes in Proxies become effective immediately  without further   ice       notice    Enabling the HTTP Proxy     1   2     In the Proxies tab  open the HTTP menu     Enable the proxy by clicking the Enable button in the Global  Settings window     Another entry window will open     In the Operation mode drop down menu  select the mo
292. ton     The system will require between 30 and 60 seconds to generate the  system  After successful registration  the License Information win   dow will contain the details of your license     52    Using the Security System    Licensing Information    After successful registration of the Internet security system  the  License Information window will show the details of your license     Licensed Users  IPs     The functions in this window are used for licenses that do not allow  for an unlimited number of users  IP addresses      View current User  IP  Listing  Clicking on the Show button  opens a table that lists all current users through their respective IP   address    Reset User  IPs  Listing  If you wish to reconfigure the internal  network  you can reset the user table by this action  Then there is a  reboot   the system will shut down completely and reboot    This action is enabled by clicking on the Start button     53    Using the Security System    5 1 3  UpeDate Service    System Up2Date The Up2Date Service makes    Prefetch Up2Dates now Click  Start  to prefetch    Sauer le ree x    it easy to keep your security             Prefetch Up2Dates automatically us syste m softwa re u pd ated   N ew    Import frorn File  Uneppled UpZDates mm   Virus definitions  system    no locally stored Up2Date packages available          patches  and security features  will be installed to your current  ca eet densa system     eee      All Up2Date data are digitally   ve signed and e
293. tool WebAdmin are explained on page 87     85    Using the Security System    Configuring the OpenLDAP Server     Make sure that there is a user configured on your LDAP server to have  full read privileges for the directory  This will be the query user     A Security Note   Make sure that the user has only read privileges     With OpenLDAP  users are identified on the basis of their Common  Names  CN   Please make certain that every user has a unique CN     With the installation of the software alle existing data will be deleted      Important Note   from the computer     Because there are many different LDAP servers based on the  OpenLDAP code  it is impossible to describe them all here  For  further information  please consult the documentation accompanying  your LDAP server    If you are using the SLAPD server from the OpenLDAP Foundation   the current documentation is available at   http  www openldap org     86    Using the Security System    Configuring LDAP on your Security System                                   LDAP Server Settings           Make sure that there is a  A   user configured on your  Unique User Attribute  ease sl z LDAP server to have full  IP Address  read privileges for the  ANA directory  This will be the  A query user    peared       You will need the Distin    LDAP Authentication by Attribute     w    guished Name  DN  of   this user as well as the IP   address of your LDAP server in order to complete the configuration of  the security system     
294. ttempt   ID 264    O  39 dns 0 E   DNS EXPLOIT named tsig overflow attempt   ID 303   80  pr dns 0 E   DNS named version attempt   ID 257   BO VG dns 0 E   DNS EXPLOIT named overflow  ADM    ID 259   80  pr dns o pB RNE SPOOF query response with TTL of 1 min  and no authority   ID  0 9 g dns 0 7  DNS EXPLOIT x86 Linux overflow attempt  ADMy2    ID 265       The functions in the sub tab from the left to the right   eG  BG  Clicking on the status light enables the IPS rule     tr  7 9  The IPS rule can be configured as alarm rule  Intrusion  Detection  or as blocking rule  Intrusion Prevention   Clicking on the  icon switches the application of the IPS rule in this group     183    Using the Security System        Return to the overview by clicking on the folder icon     Group  The name of the IPS group of rules is displayed in this  column     Hits  This column displays  how often a rule from the group became  active     Info  The first line provides short information on this IPS rule group   You can obtain detailed information on the IPS rules by clicking on the  correspondent icon with the mouse     o  This window presents the parameters of this as Low Layer  Information     Quw  Clicking on the icon connects you to the correspondent link in  the Internet  The Website contains further information on the IPS  rule  This information is compiled in projects such as Common  Vulnerabilities and Exposures  CVE  and published in the Internet     Setting an IPS rule     You can add 
295. tworks window  choose the networks that  the proxy should intercept requests from and to     Source  Choose the source address here   Example  The name of the 192 168 0 0 255 255 0 0 network     Destination  Choose the destination address here   Example  The name of the pop  yoursite com network     4  Confirm your selection by clicking Add     Content Filter       Content Filter Virus Protection  This op     Virus Protection on       tion scans e mails and at        Spam Protection   _ Disable  Thresholds tachments passing through  Pass when score exceeds    HOA e  the proxy for dangerous  Spam Sender Whitest     contents such as viruses or    a    sino data table Trojan horses  The results of                      File Extension Filter    the scan are inserted into a      i no data in table             Expression Filter        header of the message  Any  ETS messages blocked by the   proxy will be shown in the  Proxies Proxy Content Manager menu  Enable the Virus Protec   tion by clicking on the Enable button  status light is green                        Spam Protection  This option heuristically checks incoming e mail  for characteristics suggestive of spam  This system uses an internal  database of heuristic tests and characteristics  making the test inde   pendent from sender information  and also more reliable     Two Thresholds can be defined for the Spam Score  This ensures  that potential SPAM e mails are treated differently by the Firewall     233    Using the Securi
296. ty System    Default settings    Thresholds   Pass when Score exceeds  03  aggressive   Quarantine when Score exceeds  05  reasonable     The first threshold implicates that e mails from level 3 on are filtered   but allowed through  With the help of the attached Header the e mail  on the mail server or in the e mail program of the recipient can be  sorted or filtered  For the second threshold the e mail will be accepted  but put into quarantine     Basically  the Threshold with the higher level is treated more  severely     Important Note     On busy systems  the Spam Protection may require a large per   centage of system resources     Pass Quarantine when Score exceeds  These drop down menus  can be used to select the strategy to use in marking messages as  spam  The difference between the maximum values is defined  through the probability that legitimates messages  such as HTML  Newsletters will be blocked  It is possible to set a value between 1  and 15 in the drop down menu  With level 1  the e mails are already  treated with a low spam score  The following Levels serve as clue     e Aggressive  03   This strategy will catch most spam messages   It may also identify some legitimate messages  for example HTML  newsletters  as spam     e Reasonable  05   This strategy is a compromise between  Aggressive and Reasonable    e Conservative  08   This strategy will only catch messages that  are highly likely to be spam  Legitimate messages are unlikely to  be caught     234    
297. ty demands apply to your  network     Clicking on the symbol enables C82  and disables  GaP  the Em   bedded Object Filter     Script Content Filter  This function deletes script contents  such as  Java and VBScript from incoming HTTP traffic     A Security Note   Enable this function only  if high security demands apply to your  network     Clicking on the symbol enables   amp   and disables  2  the Script    Content Filter     Content Removal  This is an additional function of the Surf Pro   tection Categories  This access control list allows you to filter Web  pages that contain specific expressions  Such texts  which contain an  expression from the access control list  will be replaced by a HTML  comment     Open the access control list by clicking on the field with the entry   e g  O entries   Enter the expressions one beneath the other   Comments must be identified with a   sign at the beginning of each  line    Save your changes by clicking on the Save button  To keep an entry   click cancel     Virus Protection  This functions checks incoming traffic for danger   ous content such as viruses    Clicking on the symbol enables      and disables      the Virus  Protection     220    Using the Security System    Enabling Surf Protection  adding Profiles     1     Enable this option by clicking the Enable button in the Surf  Protection  Content Filter  window     The status light will show green and an advanced entry window  will open    By Default the Profiles table contai
298. u  enter the  available bandwidth for the Downlink in full kilobits  On an inter   face to the Internet  this value corresponds to the bandwidth of  the Internet connection   on an ADSL access the Uplink band   width amounts to 768 kBit s and on a 2 Megabit fixed connection  to 2048 kBit s    MTU Size  The MTU is the size  in bytes  of the largest  transmittable packet  MTU stands for Maximum Transfer Unit   For connections  using the TCP IP protocol  the data will be  subdivided into packets  A maximum size will be defined for  these packets  Packets larger than this value will be considered  too long for the connection and fragmented into smaller ones  before transmission  These data packets will be sent again   However  the performance can be limited  if the upper value is  too low    The following values are the defaults for the PPP over Ethernet   PPPoA DSL  connection  1460 Byte     Confirm these settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red     Enable the interface by clicking the status light     Using the Security System       Add Static Route The interface is now enabled   oT rere  status light shows green      The Oper column will at  ditional staro mutes God    first show that the interface  is Down  the system re   quires a short time to con   figure and load
299. uce the  readability of the Packet Filter Live Log  e g  Windows  NetBIOS broadcasts   we recommend not to enable the Log  function     Comment  In this entry field you can optionally enter a  comment on a rule    4  Save your configuration by clicking Add Definition   If the definition was successful  the new Packet filter rule will    be added to the rule table in a deactivated state  marked by the  red status light               p   n Comment    Marketing    HTTP   Example rule    5  Activate the Packet filter rule by clicking the status light     After the rule is added to the table  further options are available for  managing and editing rules in the rules table     192    Using the Security System    Note      By default  new rules are added in an inactive state in the table  The  rule will only become effective when it is set to be active  See  Activating   deactivating rules     The Rules Table    Each packet filter rule will be displayed in the table through a  separate line  The different settings will either be displayed as alpha   numeric signs or as symbols  While all settings with alphanumeric  signs can be edited by clicking on the correspondent field  this is not  possible with all symbol displays        Group Source Service Action Destination Comment       1  none  OU Marketing    HTTP  f    lany B Example rule       The following table explains all symbols from the rules table     The Symbols    tcon__ spaite   anzeige Emsteiumg    6   reshen  CBE  sensim  p
300. unchanged     Open the WebAdmin configuration tool and open the User  Authentication menu in the System tab     In the RADIUS Server Settings window  click the Enable  button next to Status  the status light will show green    Address or Hostname   Enter the IP address or the  host name of the RADIUS  server                       Shared Secret  Enter the Shared Secret from step 6     Click the Save button to save these settings     In the Proxies tab  open the menu corresponding to the proxy  service you wish to use     If User Authentication is not enabled  red status light   click  the Enable button     Authentication Methods  Choose RADIUS from the selection  field     Now confirm your settings by clicking on the Add button     The user authentication using RADIUS is now active   The IAS service will log every access attempt in the Microsoft  Windows NT 2000 Event Log     In order to prevent the Windows Event Log from overflowing  the  security system stores caches RADIUS access information for five    75    Using the Security System    minutes  This may mean that changes in the RADIUS database will  not be reflected at the security system for a few minutes     Attention     The security system sends queries on UDP port 1812     5 1 7 2  SAM   NT 2000 XP    This authentication method uses an MS Windows NT 2000 Domain  Controller or standalone server  Many businesses already use MS  Windows NT 2000 networks based on ActiveDirectory    The advantage of SAM is that it is very
301. ured for each user or network       Important Note     If you have configured the User Authentication configuration mode  in the Global Settings window  the Profile Assignment via drop   down menu will be displayed above the Profile Assignment table  By  default this is set to Local Users   Network blocks    If you have configured a radius or LDAP Server in the System User  Authentication menu  they will be displayed in the drop down menu   Once you have selected one of the servers  the Profile Assignment  table will be masked     223    Using the Security System    The Functions    The following picture shows a Profile assignment        Profile Assignment Total 1 entries Add blank Assignment       Ey i Profile Name Assigned local Users Assigned Network Blocks    8 1 BO Example   i none    Any a  Internal  Address     Internal  Broadcast   Internal  Network   X    Save   Cancel      The functions from the left to the right are        Deleting Profile assignments  8   Click the trash can icon to de   lete an assignment from the table     Position number  The workout sequence will be displayed in the  table through the respective Position number    Clicking on the field with the entry will open the drop down menu   This drop down menu allows you  to change the order of the profile  assignments  Save your changes by clicking on the Save button  To  keep an entry  click cancel     Status light  The status light refers to the status of the profile  assignment  Each new assignment 
302. uthentication using the  SOCKSv5  SMTP  and HTTP proxy services and can control which  users are allowed to use which services  User accounts can be defined  on the security system  through the Definitions  Users menu  Or on  an external user database  Supported external databases include  RADIUS  SAM  Windows NT Windows 2000 XP Server   Microsoft  Active Directory and OpenLDAP  If an external user database is  already present on the network  you can use it instead of having to  re enter user accounts on the security system itself     User Authentication requires users to identify themselves before using  network services  This allows for user based access control and  accounting rather than an IP based access control  This allows for  user based Accounting in the HTTP Proxy access protocol     Proxy Service and Authentication Methods    The SOCKSv5  SMTP  and HTTP services can be configured to allow  or disallow clients based on IP address or on username and password  combinations  In order to use User Authentication  you must select  at least one database against which the security system should  authenticate users  If user authentication is enabled and no database  is selected  the proxy service cannot be used     The security system supports user authentication against      e A RADIUS Server   e An NT SAM user list   e An LDAP Server   e An internal database defined in WebAdmin    The four user databases can be checked one after the other     71    Using the Security Syst
303. vailable for use in  various configuration menus    Using the network name you can  for instance  enable HTTP proxy  access for the new network under Proxies HTTP     105    Using the Security System    Adding DNS Server     1   2     4     Under the Definitions tab  open the Networks menu     Click on the New Definition button   The entry window will open   Make the following settings     Name  In the entry field  enter a unique DNS Server name   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters  are alphanumeric characters  minus      space      and  underscore  _   Names may be up to 39 characters long    Type  Select DNS Hostname from the drop down menu    Hostname  Enter the hostname in this entry field    Comment  You can enter a DNS Server description in this entry   field     Save the host by clicking on the Add Definition button     If the definition is successful  the new Host will be entered in the  network table  You will now find this host under its name also in  different other menus     Defining Network Group     1   2     106    Under the Definitions tab  open the Networks menu     Click on the New Definition button   The entry window will open   Make the following settings     Name  In the entry field  enter a unique network group name   This name will be used later  for example to configure packet  filter rules  Allowed characters are  The only allowed characters    Using the Secu
304. vice drop down menu to select a service     The available services are  HTTP  SMTP  SOCKS and Web   Admin   In the Attribute Name field  enter the name of the attribute   If you are using authentication using the MemberOf property on  a Microsoft Active Directory Server  this should be the name  of the Security Group to use   Example  socks_users    89    Using the Security System    4  Inthe Attribute Value field  enter the DN for the attribute  The  attribute value is the DN     IIE        ite   Sey    Chace group    Atrbae Vales   Stac  EN    EdtAtrbae           DSa ET  f displays the DN of attributes    Path  LDAF  LDAP erarple  con CN sooks_users DC eanple DC    Select uich properties to view   Both z         istnguishedare zi    Yaet   Ek eapo teen    z T                               Microsoft Active Directory    in the Management Con   sole  under ADSI Edit    Here  under the Base DN   example  dc example  dc   com   find the attribute name   example  socks _users  and  right click it  A window  labeled CN socks_users  Properties will open     Use the Select which properties to view drop down menu to  choose Both  and in the Select a property to view drop down  menu  choose distinguishedName  The DN for this attribute  will be shown in Value s      5  Click the Save button to save these settings     Every member defined as a MemberOf the security group  socks_users will be allowed to use this service     90    Using the Security System    5 1 8  WebAdmin Settings    C
305. with the web  server  as shown in the example  as the one for the connection with  the FTP server  both packet filter rules must be set to the same  Action     1  Rule for data packets from the web server     Source  web server   Service  HTTP   To  Server   Internet   Weight  Allow  high priority    2  Rule for data packets from the FTP server   Source  FTP server   Service  FTP    Destination  Internet  Action  Allow  high priority          EB Group   Source Service f Action ZET   Comment      1    none  Bo Marketing     HTP   gt    Any   Example rule    2  none  BO Web Server   HTP m  GF  Any   QoS Example rule    3  none  i FTP Server   FTPs fem GY Any   QoS Example rule        If the Uplink is only used by the data packets of these two servers   each connection receives one half of the bandwidth  1MBit s  in the  Worst Case  The High Priority setting becomes only relevant  if a  third data connection is established  All connections with a lower  priority  Allow or Allow  low priority   will be treated with a lower  ranking     197    Using the Security System    Additional Functions and Settings    Internet wide Broadcast     In order to drop IP broadcast packets  first define the broadcast  address in the Definitions Networks menu in the form of a new  network  Next  install the appropriate packet filter rule and activate it     1     198    Under Definitions  open the Networks menu and define the  following network     Name  Broadcast32  Type  Host  IP Address  255 255
306. ws you  Status  ao      to forward log messages  Servier  SySL06 from the Security system  tage a Avaiable to other hosts  This is    Empty list  Accounting data  La fAamin notification    pinea  especially useful for net   works using a log host to  collect logging informa   tion from a number of different hosts  By default  this function is  disabled  A Logging Daemon  compatible with Syslog protocol must be  running on the selected host           Host  Please select                   Attention     In the System Remote Syslog Server menu  do not select one of  the security system   s interfaces  such as eth0  as the destination  address  host      Host  Enter the host  which should receive logging information in the  drop down menu  When a host has been selected  log forwarding is  enabled immediately  no further messages are displayed    In order to select a logging host  i e   a network with netmask  255 255 255 255  you will first have to define it in the Defin   itions Networks menu  The definition of networks is covered in  greater detail in chapter 5 2 on page 103     69    Using the Security System    Service  The Syslog protocol is set by default  You can also use this  drop down menu to configure the service   port  that should be used  on the remote server     Logs  This selection field allows you to select log files that should be  delivered to the Remote Host     70    Using the Security System    5 1 7  User Authentication    The security system supports User A
307. y defined network mask  for this interface  use the drop down menu to select Static and  enter the netmask to use in the entry field  If you wish to have a  netmask dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu    Default Gateway  If you wish to use a statically defined default  gateway  use the drop down menu to select Static and enter the  address of the gateway in the entry field  If you wish to have a    137    Using the Security System    138    gateway dynamically assigned via DHCP  select Assign by  DHCP from the drop down menu  Otherwise  select None   SSID  Enter the network name for the wireless network here  If  you wish to establish a connection with an already existing  Wireless LAN  you must enter the existing network name    Use WEP  If you wish to use WEP encryption on the wireless  LAN  select Yes from the drop down menu     A Security Note     You should always use WEP encryption  as an unencrypted  network presents a serious threat to network security     If you select No from the drop down menu  the WEP specific    configuration options will be ignored by the system    WEP Authentication  If you wish to enable WEP authentication   select Yes from the drop down menu  All nodes on the wireless  network must be configured with the correct WEP Key     Require WEP  If you do not wish to allow nodes not supporting  WEP onto the wireless network  choose Yes here     WEP Key  Enter the WEP key to use in the WEP Key O through  3 entr
308. y fields  In order to use WEP encryption  you will need at  least one WEP key   up to four can be used    For a 40 bit key  enter a string with 5 hexadecimal digits  separated by colons  In order to use a 104 bit key  enter a string  of 13 hexadecimal digits separated by colons  The string must  consist of hexadecimal digits  Please note that a hexadecimal  number is two characters  each either a number  0 9  or a letter   A F     Example of a 40 bit key  17 A5 6B 45 23   Default WEP Key  Use the drop down menu to choose one of  the defined WEP Keys 0 3 which should be used as the default  key  This key will be used as the current key  which all the other  nodes must use to access the wireless network     Using the Security System    7  Confirm these settings by clicking Add     The system will now check the address and netmask for  semantic validity  After a successful check  the new interface  will appear in the Current Interface Status table  The interface  is not yet enabled  status light is red     8  Enable the interface by clicking the status light   The interface is now enabled  status light shows green   The Oper  column will at first show that the interface is Down  the system    requires a short time to configure and load the settings  When the  message Up appears  the interface is fully operational     139    Using the Security System    5 3 2 4  Virtual LAN    avbGlEaexe Virtual LAN  VLAN  tech   es min nology allows a network to  Type VAN shame inerare be segreg
309. your own IPS rules to the set of rules  The rules are  based on the syntax of the Snort Open Source ID System  Manually  configured IPS rules are always locally imported to an IPS set of  rules  For more information please see the following Internet address   http   www snort org     1  Under the Intrusion Protection tab  open the Rules menu     2  Click on the button     The entry window will open     184    Using the Security System    3  Make the following settings     Intrusion Protection 012 entries  1968  Rules    w Rule     4  7 Filters          Description  Jexample    Selector   icmp  EXTERNAL_NET any   gt   HOME_NET any  Filter   dsize   gt 800      Add local Rule    Hint  Local rules will be added to the local group          7 Group   Hits  Info  DO he BD attack responses O Recognition of successful attacks          Description  Enter a description of the rule in the entry field   Example  Large ICMP packet   Selector  Enter the selection parameters for the IPS rule in the  Snort syntax in the entry field    Example  icmp  EXTERNAL_NET any   gt   HOME NET any                               Filter  Enter the real identification parameter for the IPS rule in  Snort syntax in the entry field  Please make sure that the entry  ends with a   sign    Example  dsize   gt 800     4  Save your configuration by clicking Add local Rule     The new IPS rule is always locally imported to an IPS set of rules   The rule is immediately enabled  status light shows green      BO  p   
310. your security system  here    Protocol  Choose RADIUS     IP Address of the Client  Enter the internal IP address of the  security system     73    Using the Security System    74    Client Vendor  Choose RADIUS Standard    Shared Secret  Enter a password here  You will need this pass   word again when configuring the RADIUS server with Web   Admin     A Security Note   For the Shared Secret only passwords consisting of  alphanumeric  minus      and period     characters are  allowed  Other characters  for example    _   are not  allowed     Now open the RAS rules menu   A standard rule is listed here  If you intend to use IAS only with  the security system  you can delete this entry     For every proxy  enter a rule  Choose a descriptive name  such  as HTTP access     Add two conditions     1  Condition 1  The NAS Identifier field must correspond to a  string from the following table     HTTP http  L2TP over IPSec I2tp  PPTP pptp    SOCKS socks   SMTP smtp  WebAdmin Access webadmin  Surf Protection    Profilname          2  Condition  The Windows group of the user must match the  group established in step 2     Access is granted only when both conditions are met     10     11     12     13     14     15     Using the Security System    Edit the profile so that no unencrypted connection is allowed by  disabling the No Encryption function in the Encryption  register     Edit the profile for the rule so that unencrypted authentication   PAP  is allowed   Leave the other values 
311. ystem    Reboot the security system by pressing Ctrl   Alt   Del or the  Reset button     During the boot process  the IP addresses of the internal network  cards are changed  The Install Routine console  Alt   F1  may  display the message No IP on etho during this time     After the security system has rebooted  a process which  depending  on hardware  can take up to five minutes   ping the IP Address of the  ethO interface to ensure it is reachable     If no connection is possible  please check for the following possible  problems     Error     The security system is not reachable from the internal network     Possible Causes     The IP Address of the security system is incorrect   The IP Address of the client computer is incorrect   The Default Gateway on the client is incorrect   The network cable is connected to the wrong network card    All network cards are connected to the same hub    Note     If you connect to the Internet through a DSL connection  please read    the installation instructions at docs astaro org     26    Installation    3 2 2  Configuring the Security System    The rest of the configuration will use the WebAdmin interface   accessed through a standard web browser  e g   MS Internet  Explorer  from your administration PC     1     Start your browser open WebAdmin    Before you can access the WebAdmin interface  you must make  sure that your browser is configured correctly  Please see in  chapter 5 6 1 on page 210 for more details    Once your browser 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
1-877-630-5396 (sans frais)  Manuel d`utilisation.fm - Old Organizers Collection  Untitled  取扱説明書 - 筑水キャニコム    SD Card Mobile DVR User Manual V1.07E  MAXIDRIVE2.3+  SERIE 2000 PN 25    Copyright © All rights reserved. 
   Failed to retrieve file