Home
        netasq unified manager v.9.0 userconfiguration manual
         Contents
1.                                  Vulnerability manager          Previous   Next gt      Cancel         63  Figure 38   Restoration wizard  Simple  C       D  O   e    4  2       In your previous selections  if you had selection either    From the original firewall    or    From a specific  5   l l   I    firewall     the restoration wizard will allow you to select three types of restoration   S  Cc  D       Configuration and LDAP  Full restoration   this choice allows you to restore the appliance   s configuration and all  information stored in the LDAP database  user records   This configuration restores everything without options        Simple  Partial restoration   this choice allows you to restore the appliance   s configuration according to the  administrator   s choices  This type of partial configuration allow  for example  restoring the object database and to  ease the administrator   s workload        Advanced  Partial restoration   this option  which is more granular than the simple mode  allows the most specific  selection restoration wise  But proceed with caution  as this type of restoration allows the restoration of  incomplete configurations  IPSec VPN tunnels without their keys  for example      USER MANUAL    NETASQ    we secure IT       The restoration options are as follows      Configuration  selects all the elements classified under this header        Interfaces and static routing  appliance   s network configuration  configuration of interfaces  default 
2.         BP Breakpoint  firewalls above this breakpoint will be updated  the firewall on the line  of the breakpoint will be included in this group  before the firewalls under it  The  results of operations performed on the first group have to be successful before the  second group can be treated     USER MANUAL    NETASQ    we secure IT       Task in progress Progress of the task    Result Results of the update    Message Explicative message with regards to the    results    field     As some of the information displayed may not necessarily be useful to you  you may wish to display only  information you need  You can hide or show columns by clicking on Customize columns     In this window  there are names of columns which are not displayed but can be made visible  To display a  column  left click on the column   s name and hold down the mouse button  Drag the column to where you  wish to insert it in the column title bar and let go for the mouse button     drop    the column      To hide a column  do the opposite  using the left mouse button  select the name of the column to hide in  the column title bar  Hold down the left button and drag the column to the    Customization    window    before letting go     The layout of the displayed columns can be rearranged by using the same drag and drop mechanism  All  you need to do is to select a column and move it to the desired location     To close the    Customization    window  click on the white cross found at the top right of t
3.      USER MANUAL    NETASQ    we secure IT       Bridge    Device connecting 2 LAN segments together  which may be of similar or dissimilar types  eg  Ethernet and  Token Ring   The bridge is inserted into a network to segment it and keep traffic contained within segments  to improve performance  Bridges learn from experience and build and maintain address tables of the nodes  on the network  By keeping track of which station acknowledged receipt of the address  they learn which  nodes belong to the segment     Bridge or transparent mode    The transparent mode  also known as  bridge   allows keeping the same address range between interfaces   It behaves like a filtering bridge  meaning that all the network traffic passes through it  However  it is  possible to subsequently filter traffic that passes through it according to your needs and to therefore  protect certain portions of the network    Brute force attack    An exhaustive and determined method of testing all possible combinations  one by one  to find out a  password or secret key by trial and error  This method only works when the sought after password  contains very few characters    This attack can be thwarted simply by choosing longer passwords or keys  which the intruder will take  longer to find out     119  Buffer  C       D  Q Temporary storage zone    gt   E  f am  S  o Buffering  S  z Temporary storage of information for the purpose of processing it at one goes  instead of as and when it is    received     Bu
4.     a        jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       Appendix H  Role of the DMZ    The main purpose of a DMZ  De Militarized Zone  is to isolate from your internal network machines which  have to receive connections from the outside     Thus  you can completely isolate direct access of the external network to your internal network  Possible  accesses from the outside occur only in the DMZ  which is physically separated from the internal network     You enjoy efficient protection for the internal network as such  Hosts in the DMZ are exposed to a greater  risk  as they can be contacted from outside      You then need to carefully define the relations between the DMZ and the internal network in order to  avoid compromising the level of security achieved     Example of setting up a DMZ    Internet                      111 K  e    A A     oe  internal Network be i    External Network   Router   a  a G    g    so  O      Q                Q           0    m    S     ol    5 M   gt  C oe  Q  i    r               Lk    Figure 62   Setting up a DMZ    The DMZ can be used for other purposes  e g  separating an enterprise   s branches      USER MANUAL    NETASQ    we secure IT       Appendix I  Connecting to the SSH server    The NETASQ Firewall has an SSH server installed  Connection to this server may serve as the Firewall  configuration in console mode  in command line      Definition of Secure Shell    Secure Shell is a secure communication protocol al
5.     ao oad See     eee ar  Administration  corresponds to the menu Administration tasks      For arranging the windows of the current project horizontally  corresponds to the menu       Windows Tile horizontal      For arranging the windows of the current project horizontally  corresponds to the menu       jenuey uoleinbiuo0d asp    Windows Tile vertical      soseeeeeeeennneneeeaaasaanecicceeenneeneeeeasaaausiiiiecnnneneeeenaaaaanuiiieennnnnnneeen ie oos sy pt coveenecssseecnnaenecanaenesnnsenncnnareneansseneeanaseneanaseeesgnseeesnseeeeaueeeeauseeeeeQueeeeeueeeeeQMeeeeQQseeeeQMeeeeeQaseeeeQQseeeQQaseeeeQQseeeQQaseeeeQMseeeeQaseeeeQQsseeeQQsseeeeQasseeeQQsseeeeQMseeeQQsseeeeQMsseteQQsteeeeQasseteQQsseeteQQsseteQQsseeeeQMsseeeeQsteeeeQaseteQQsseeteQMseeeGesteeeeQaseeeeasseeeeQaseeteGQsteeeeeaseteeeseeeeeaseeeeeanenn en        For cascading the windows of the current project  corresponds to the menu    Windows  Cascade      For arranging the windows of the current project   corresponds to the menu       Windows  Arrange      USER MANUAL    NETASQ    we secure IT       3 2 1 1  Object bar    The object bar is organized as follows     It contains all the objects that can be used in the topological view to construct a graphic view of the  network or the sub network administered  These objects are divided into 5 categories     NETASO    NETASQ  Computers  1 Network     Hardware    Other            NG1000  2g  NG5000  V  zg     lt   w  n    p     z    jenuey uoneniuos sn       Figur
6.    DNS     DHCP     SNMP     NTP    lf you do not possess this knowledge  don t worry  any general book on TCP IP can provide you with the  required elements     The better your knowledge of TCP IP  the more efficient your filter rules and the greater your IP security     USER MANUAL    NETASQ    we secure IT       1 2  TYPOGRAPHICAL CONVENTIONS    1 2 1  Abbreviations    For the sake of clarity  the usual abbreviations have been kept  For example  VPN  Virtual Private  Network   Other acronyms will be defined in the Glossary     1 2 2  Display    Names of windows  menus  sub menus  buttons and options in the application will be represented in the  following fonts     Example    Menu Interfaces    11      1 2 3  Indications   C         D   8 Indications in this manual provide important information and are intended to attract your attention     gt    a Among these  you will find    S   5   z 0 NOTE REMARKS   Q      These messages provide a more detailed explanation on a particular point     i  WARNING RECOMMENDATION  These messages warn you about the risks involved in performing a certain manipulation or about  how not to use your appliance     Q TIP    This message gives you ingenious ideas on using the options on your product       DEFINITION  Describes technical terms relating to NETASQ or networking  These terms will also be covered in  the glossary     USER MANUAL    NETASQ    we secure IT       1 2 4  Messages    Messages that appear in the application are indicated in d
7.    E E  5 Remove   X Saai        teh    z   D Figure 22   Topology classification Figure 23   New Topology    The name will then appear at the root level of the hierarchy     To create a sub level in a group  you must select the group that you want to create the sublevel for  and  click on Add  then on  lt Name of the group gt   or click with the right mouse button and select Add on   lt Name of the group gt        A contextual menu is available to rename or delete this level  or add a sub level  click with the right mouse  button and choose the option desired     You can create as many groups and sub levels as you desire    The sub levels in a group can be displayed or hidden  When the sub levels are displayed  the following icon  appears in front of the name of the group  Just click on this icon to hide the sub levels of the group  When  the sub levels are hidden  then the following icon appears in front of the name of the group  Just click on  this symbol to display the sub level of the group     USER MANUAL    NETASQ    we secure IT       3 3 3 1 1  Quick view of indicators    In addition to the different topologies and the objects present in these topologies  the classification zone of  the topologies also provides a quick view of system and security indicators  as well as of the accumulated  alarms present on each Firewall  A more detailed explanation of the indicators is provided later in the  document     3 3 3 2  Topology viewing zone    A  VI          jenuey uoleinb
8.    NETASQ UNIFIED MANAGER  V  9 0    USER CONFIGURATION MANUAL     Version  amer    Objet    NETASQ  NETASQ Updating    NETASQ Updating       USER MANUAL    NETASQ    we secure IT       Copyright    NETASQ 2010  All rights reserved     Any reproduction  adaptation or translation of this current document without prior written permission is  prohibited  except where expressly allowed by copyright laws     NETASQ applies a method of continual development and as such reserves the right to modify and improve  any product described in the document without prior notice     Under no circumstances shall NETASQ be held liable for any loss of data or revenue  or any special damage  or incident  resulting from or indirectly caused by the use of the product and its associated documentation     The contents of this document relate to the developments in NETASQ   s technology at the time of its  writing  With the exception of the mandatory applicable laws  no guarantee shall be made in any form  whatsoever  expressly or implied  including but not limited to implied warranties as to the merchantability  or fitness for a particular purpose  as to the accuracy  reliability or the contents of the document  NETASQ  reserves the right to revise this document  to remove sections or to remove this whole document at any  moment without prior notice     To ensure the availability of products  which may vary according to your geographical locations  contact  your nearest NETASQ distributor     Product
9.   3 3 12 1 1  Choosing the intrusion prevention profile    The profile is used in the intrusion prevention  ASQ  module   2 Select  Intrusion prevention   if you intend to deploy the configuration of the ASQ kernel  The following  window will appear     The drop down list will allow you to select a profile  This profile must be configured beforehand in Firewall  Manager mode in the intrusion prevention menu    amp  Reminder  profiles contain all the parameters defined inthe Intrusion Prevention menu     3 3 12 1 1  List of QOS elements    For this deployment  the list is limited to 253 elements  In fact  if a new source is selected  the new  configurations from this source will overwrite the older configuration  which may render the filter  configuration obsolete    The list has been reduced in order to prevent the firewall capacity from being exceeded     3 3 12 1  Deploying the object database    Copy the source object This option will activate the deployment options for the object database described  database tothe below   This option applies to the following windows  intrusion prevention  address  destination clients translation  NAT   Filtering  Global filtering  URL filtering      Replace duplicate When this option is checked  the value of the object in the source database will  entries replace the value of the object in the destination database if an object in the  destination object database bears the same name as an object in the source object  database   This option
10.   makes this task easier  If the administrator has defined a PKI     unknown    users will now request the  creation of their accounts and respective certificates     UTM  Unified Threat Management     Concept that consists of providing the most unified solution possible to counter multiple threats to  information security  viruses  worms  Trojan horses  intrusions  spyware  denials de service  etc      USER MANUAL    NETASQ    we secure IT       VLAN  Virtual Local Area Network     Network of computers which behave as if they are connected to the same network even if they may be  physically located on different segments of a LAN  VLAN configuration is done by software instead of  hardware  thereby making it very flexible     VPN  Virtual Private Network     The interconnection of networks in a secure and transparent manner for participating applications and  protocols     generally used to link private networks to each other through the internet     VPN keep alive    The artificial creation of traffic in order to remove the latency time which arises when a tunnel is being set  up and also to avoid certain problems in NAT     139 VPN Tunnel   c Virtual link which uses an insecure infrastructure such as the internet to enable secure communications  S  authentication  integrity  amp  confidentiality  between different network equipment   S   2   c   o           z   S   5 W    WAN  Wireless Area Network     Local wireless network     Wifi  Wireless Fidelity     Technology allowi
11.   s activity in real time     NETASQ VULNERABILITY MANAGER    Module that allows the network administrator to collect information in real time and to analyze it in order  to weed out possible vulnerabilities that may degrade the network  Some of its functions include raising  ASQ alarms and maintaining an optimal security policy     USER MANUAL    NETASQ    we secure IT       NETASQ UNIFIED MANAGER    Module in NETASQ   s Administration Suite that allows configuring firewalls     Non repudiation    The capacity of parties involved in a transaction to attest to the participation of the other person in the said  transaction     NTP  Network Time Protocol     Protocol that allows synchronizing clocks on an information system using a network of packets of variable  latency     130      Object   a   S Objects used in the configuration of filter or address translation  These may be hosts  users  address  S ranges  networks  service  protocols  groups  user groups and network groups    2   S   5    gt  OS detection   S   Cc   D    A method of determining the operating system and other characteristics of a remote host  using tools such  as queso or nmap     OSI    International standard defined by ISO describing a generic 7 layer model for the interconnection of  heterogeneous network systems  The most commonly used layers are the    Network    layer  which is linked  to IP  the    Transport    layer  linked to TCP and UDP and the    Application    layer  which corresponds to  applic
12.   saturation     Stateful Inspection    Method of filtering network connections invented by Check Point  based on keeping the connection status   Packets are authorized only if they correspond to normal connections  If a filter rule allows certain  outgoing connections  it will implicitly allow incoming packets that correspond to the responses of these  connections     Static quarantine    A quarantine that the administrator sets when configuring the firewall     USER MANUAL    NETASQ    we secure IT       Symmetrical key cryptography    A type of cryptographic algorithm in which the same key is used for encryption and decryption  The  difficulty of this method lies in the transmission of the key to the legitimate user  DES  IDEA  RC2 and RC4  are examples of symmetrical key algorithms     TCP  Transmission Control Protocol     A reliable transport protocol in connected mode  The TCP session operates in three phases     establishment  of the connection  the transfer of data and the end of the connection     Throughput    The speed at which a computer processes data  or the rate of information arriving at a particular point ina  network system  For a digital link  this means the number of bits transferred within a given timeframe  For  an internet connection  throughput is expressed in kbps  kilobits per second      137  a  D Trace route  O  S  a Mechanism that detects the path a packet took to get from one point to another   f am  S      gt   S Trojan horse  Cc  D    A code i
13.  2 GB for server software   oO       About 300MB of hard disk space as this is what the software will occupy after its installation   S  c  2    If possible  reserve several gigabytes of space for the database  depending on the activity of the connected firewall s       Ethernet 100 or 1000 Mbps network card    NETASQ supports the execution of the software in a defined environment     Client software applications are supported on the following 32 bit operating systems     Microsoft Windows Server 2003 SP2     Microsoft Windows XP Service Pack 2 and higher      Microsoft Windows Vista     Microsoft Windows Server 2008    Server software applications are supported on the following 32 bit operating systems     Microsoft Windows Server 2003 SP2    Microsoft Windows XP Service Pack 2 and higher    jenuey uoleinbiyuo0d 1asp    USER MANUAL    NETASQ    we secure IT       2 6  INSTALLING VIA CD ROM    Insert the installation CD ROM that has been provided     Once the CD ROM has been inserted  the administration suite installation wizard will launch automatically  and will guide you step by step     NETASOW a    Home   Software  e Documentation    WELCOME TO THE INSTALLATION WIZARD    This wizard will guide you through the following        installation of your appliance  rm     presentation of the administration tools  91  YOUR APPLIANCE  5 the first steps in configuring your appliance           Copyright NETASO 2010    Figure 1  CD ROM installation wizard    2 3  INSTALLING VIA YOUR 
14.  Firewall is installed    The address of the place in which the Firewall is installed   Postal code of the city where the Firewall is installed     o    60 6 6   8      Country where the Firewall is installed     Ww  VI    Each line of the file must correspond to a firewall  The information must be separated by commas  or by  semi colons  or by a character of your choice        WARNING  This character should not be a commonly used character to prevent the risk of it being used in the  information fields  None of the fields are mandatory  therefore it is not necessary to fill in all the    jenuey uoneniuos sn    above information  we strongly recommended not entering the password in the CSV file  as it is an  unencrypted file   The order of fields in the file is not important     Example    FW_1 10 0 0 1 admin FRANCE jean dupont  NETASQ com  FW_2 10 0 0 2 admin ITALY  FW_3 10 0 0 3 BELGIU M    In this example the first part of the information corresponds to that contained in the name of the firewall  field  the second corresponds to the IP address of the Firewall  the third  to the name of the administration  account  the fourth to the country where the Firewall is installed  and the last to the E mail address of the  contact person     USER MANUAL    NETASQ    we secure IT       Q REMARKS    1  A field can be empty for certain appliances and filled in for the others  as is the case with  FW_ 3   thus you must leave the separation characters in this case   2  Only indicate tho
15.  Firewall type and the name of the Firewall concerned       Two gauges which represent the indicators  The System gauge represents the System indicator  The Security  gauge represents the Security indicator  The higher the value of the gauge  the more critical the Firewall   s situation       Values of the information used to calculate both indicators     3 3 8 2  Administration Suite    Software in the NETASQ Administration Suite can be used to ease the supervision and monitoring of  appliances  As such  it is possible to connect directly using one of these software components in the  desired appliance     Tools in the Administration Suite have the following functions     N  N    3 3 8 2 1  Launching NETASQ REAL TIME MONITOR and NETASQ EVENT REPORTER    NETASQ REAL TIME MONITOR and NETASQ EVENT REPORTER are indispensable to the supervision and  monitoring of the set of appliances  NETASQ REAL TIME MONITOR enables supervising appliances    activities    jenuey uoneniuos sn    in real time  throughput  connections  authenticated users  VPN tunnels  use of system resources  alarms  generated  etc    NETASQ EVENT REPORTER enables viewing logs generated by the appliance and  conducting analyses on these logs  graphical analyses  edition of filters  hierarchical groupings  etc       To launch NETASQ REAL TIME MONITOR  select the Firewall that you wish to administer in flat view or  topological view  then right click with the mouse and select the Tools Launch NETASQ REAL TIME  MONI
16.  Global Administration is to facilitate the administration of a group of  NETASQ appliances using the various tools integrated in the product     NETASQ Global Administration can connect to the NETASQ website in order to automatically download  firmware updates  and appliance licenses  and it can also install them automatically on the various  appliances that are being managed     0 WARNING  During administrative tasks  you are advised to deactivate the NETASQ Global Administration  monitor  see the Monitoring and supervision section for more details      The    Administration tasks    menu item is the main administrative tool of NETASQ Global Administration  which enables updating appliances and licenses  deploying security policies  creating scripts  etc     3 3 5 2  Configuration    The Global Administration mode allows you to back up or restore the configurations of the selected  appliances  These functionalities are accessible through the following menu   Administrative tasks configuration Backup or Restore     uw  O    jenuey uoneniuos sn    USER MANUAL    NETASQ    we secure IT       3 3 5 2 1  Configuration backup    A Backup wizard appears     T Step 1    Configuration Backup Wizard    Select firewalls of which you would like make a configuration  backup     name Address    Clients who are not fit for deployment are displayed in red     Step 1 of 2       Figure 33   Backup wizard   Step 1    Select the Firewall whose configuration you want to back up   Click on Add  
17.  HEE aE HE aE EE aE    Stateful    oe       host     fragment   7 ICMP    gt  connection     data tracking    oe    oe    OOO OO     oe    oe       1012 1056 7798 mbufs in use  current peak max       1012 mours ellocaved to data   4 261 272 5199 mbuf clusters in use  current peak max   7 808 Kbytes allocated to network  6  of mb map in use   70 requests for memory denied      0 requests for memory delayed    0 Calls to protocol drain routines    USER MANUAL    NETASQ    we secure IT       Appendix G  FAQ    1   What is the meaning of the message    Impossible to locate the machine on x x x x      2   How can   check the IP address es  really assigned to the Firewall    3   What is the meaning of the message    You lost the MODIFY privilege       4   What is the meaning of the message    The operation has exceeded the allotted time      5   How do   stop the major alarm warning indicator on the Firewall    6   How do   know if there has been an attempted intrusion    7   What happens when the Firewall sets off an alarm    8   It is possible to allow protocols other than IP     1  What is the meaning of the message    Impossible to locate the machine on    X X X X    P  This message means that the host on which you are connected cannot reach the Firewall by the IP address  you have specified in the connection window  This may be for one of several reasons     Check       that the IP address which you have specified in the connection window is that of the Firewall  that of the i
18.  Internal LDAP   Users with nights on the source firewall will keep nights  on the source firewall but not on the target firewall           Previous   Finish     Cancel         Figure 39   Restoration wizard    65  5   Configuration restoration manager  O   l When all parameters have been defined  click on Finish to restore the configurations  The configuration  Q  S restoration window will appear  It will summarize the parameters defined in the configuration backup  5 wizard  In this window  you will be able to modify the defined parameters   z  Q    gt   Cc  D    3 3 5 1  Updating the firmware    2 S  lectionner le menu T  ches administratives  Mettre    jour le firmware     By default the first column entitled    BP    is for specifying the breakpoints in the execution of the configured  task  The principle is as follows  upon specifying a breakpoint on a line  the configured task will first be  started on each of the appliances located below or on this breakpoint in the table  then if all the tasks are  successfully completed  the Global Administration mode will execute the tasks for the appliances which  follow  To specify a breakpoint  double click on the desired line  To delete a breakpoint  double click on the  breakpoint     USER MANUAL    NETASQ    we secure IT       By default the second column displays a signal light  The color of the signal light depends on the status of  the action     eee Sa  ca nn    Bee EERE EEE e tee eee eee eLetter eee tee re teeter teeter 
19.  TCP File Transfer  Default Data   ftp 21 TCP File Transfer  Control   telnet 23 TCP Telnet   smtp 25 TCP Simple Mail Transfer   time 37 TCP UDP   rip 39 UDP Ressource Locator Protocol  nameserver 42 TCP UDP Host Name Server  nicname 43 TCP   login 49 TCP UDP   domain 53 TCP UDP Domain Name Server  DNS   Sql net 66 TCP UDP Oracle SQL Net   bootps 67 UDP Bootstrap Protocol Server  bootpc 68 UDP Bootstrap Protocol Client  tftp 69 TCP UDP Trivial File Transfer   gopher 70 TCP Gopher   finger 79 TCP Finger   WWW 80 TCP World Wide Web   kerberos 88 TCP UDP Kerberos   npp 92 TCP UDP Network Printng Protocol  hostname 101 TCP NIC Host Name Server  Uucp path 117 TCP ISO TSAP Class 0    USER MANUAL    NETASQ    we secure IT    sqlserv 118 TCP UDP SQL Services  nntp 119 TCP Network News Trasfer Protocol  ntp 123 UDP Network Time Protocol  epmap 135 TCP UDP Netbios Net Service  netbios ns 137 TCP UDP DCE edpoint resolution  netbios dgm 138 UDP Netbios Datagram Service  netbios ssn 139 TCP Netbios session service  Imap2 143 TCP Interim Mail Access Protocol version 2  sql net 150 TCP UDP SQL NET  snmp 161 UDP Simple Network Management Protocol  snmptrap 162 UDP SNMP trap  print srv 170 TCP  bgp 179 TCP Border Gateway Protocol  irc 194 TCP Internet Relay Chat Protocol  ipx 213 UDP IPX over IP  imap3 220 TCP   UDP Internet Message Access Protocol 3  Idap 389 TCP Lightweight Directory Access Protocol  netware ip 396 TCP   UDP Novell Netware over IP  ups 401 TCP   UDP Uninterruptible power Su
20.  WARNING  Not all objects can be added in this way     In these two cases the following window opens  asking you to fill in the information relating to the object        Parameters             NETASO  ar  lt noname gt          sill senna Internet   s  Network  General      noun   Nig   46 Internet       C Resolve    Description   C              O  O         Q  c     A Router  O    cS            SiG  i   D    c  gt   D Hub Switch    Ej    Hardware  Other      CA Ke                   Figure 25   Parameters     General    Editing an object    To modify the properties of an object  just double click on it  or right click on the object and choose the     Configure    option in the contextual menu that appears     Deleting an object    To delete an existing object  select the object with the left mouse button and press the Del button     A          jenuey uoleinbiyuo0d 1asp    USER MANUAL    NETASQ    we secure IT       Updating object information    To manually update the attributes of a NETASQ appliance  software version  high availability status  etc    double click on the object representing the appliance with the left mouse button and click on the button  Update info which is present in the new window     3 3 3 2 1  For  NETASQ  category objects    The following window is the first one displayed        m  Select a client                 New client              Select a client                     Figure 26   Choosing a client    If the appliance has already been defined in the 
21.  action     jenuey uoneniuos sn    ANARARARNARARNANARNANANIARNMNANIRNMNANIARNMNANARNANANARNANANARNANANARNANARARNANARA RANIN a a Saaka S FFEA A a i ii a T B D D T SE aT R EATER IE AE ET IE EAE ETE DTE T RT SE TRT TERS RS TE ET ET TE TE R E A T T B E B S R I ES S T A ES T A T EB S A B E B S T ES S T TE RT TETERE IEDERE IE AEIR AERE IEIRA IRAE IEA IR AERE IE AEIR AERE IE AERAR AE AIEA IRAR AIEA IR AERE IEEE AERE IEA IR AERE LIE AERAR IEA IR AERE IEA IRAE RAE PEAR AERA AIEA IRAE RAE AIEA IRAE RAE IEA IR AERA IEA IR AERE IE AEIR AERE PE AEIR AERE IEA IRAER IE PEAR AERE PEAR AERE IEA IRAER E IEA IRAER IE PE AEIR AERE IE AEIR AE RIE IE AEIR AE RAE PE AEIR AERE IE AEIR AERE IE AEIR AERE IE AEIR AERE IE AEIR AERE EERE ER    Name Name chosen for the appliance    Address IP address of the appliance    USER MANUAL    NETASQ    we secure IT       i WARNING  The version number of the license does not correspond to the version number of the firmware   These two numbering systems are totally independent     3 3 5 1 1  Choosing the appliances for which licenses must be updated    Add the appliances you want to update to the table of appliances by clicking with the right mouse button   and then choosing Add in the contextual menu that is displayed     Then choose Firewalls if you want to select the appliances to update or All activated firewalls if you want  to update all the active Firewalls  those with ON status in the flat view      68  c To remove an appliance from the list  select it  rig
22.  applies to the following windows  intrusion prevention    address translation  NAT   Filtering  Global filtering  URL filtering      Merge   WARNING    If unchecked  all objects in the destination object database which are not in the source  object database will be deleted  Warning  Rules which use the deleted objects may  fail to work if this option is checked      This option applies to the following windows  intrusion prevention  address  translation  NAT   Filtering  Global filtering  URL filtering      USER MANUAL    NETASQ    we secure IT       objects from the source database used in the deployed filter policy   s rules to  the destination object database     When you click on OK  the filter policy will continue to be deployed  the Global Administration mode will  load the source Firewall   s filter slots     3 3 12 2  Deployment windows    Upon completing the definition of a deployment  objects  ASQ  filters  etc  the Global Administration mode  will display a deployment window  which recaps the Firewalls on which the configured deployment will be  performed    The title of the tab changes according to the type of deployment     3 3 12 2 1  Data grid    In the second column of the table  by default  an indicator will be displayed  The indicator   s color depends  on the status of the action     85 W Onstandby     ee ar a eee a  ee i  S Action has been canceled or has not been performed   To    S A E E r E A e  D   Action successfully completed  ee      Q     gt    Cc
23.  be sorted by clicking on the title of the column you wish to sort  It is also  possible to filter lines by clicking on the little black arrow to the right of the column title on which you wish  to place the filter and by choosing the filtering criterion in the drop down list     i WARNING   If certain appliances are filtered  the NETASQ Global Administration mode may consider them non   operational even if they may be operating perfectly fine  Likewise  if the equipment does not  respond to ICMP commands  it will be considered non operational  In order to use the NETASQ  Global Administration mode effectively  ensure that there is no equipment filtering ICMP requests  coming from the administration workstation in Global Administration mode and that the  equipments are configured to respond to ICMP queries     3 3 8 1  Indicator display    76     To display a firewall   s indicators  point the mouse   s cursor over the indicator in the viewing zone  V       g  topological view     z       2 The following window then appears    te         gt      V  5 y   50         a System problem status 20     O   Log Oz HA  20  Ethernet 0     Daemon  0   CPL     i Security problem status OF     0  Minor alarm 0  Major alarm  04 450 memory    UE Alarm status  Je ajor  D Cumulated  0    gt  Minor  Oo Curnulated  0    Last connection  11 27 56    Figure 42   Indicators    USER MANUAL    NETASQ    we secure IT       The following is found in this window        A graphical representation of the
24.  can also be used on the    Name    column to find a firewall more easily    S       Q     gt    Cc   D    3 3 12 1 2     Destination  Firewalls    Firewalls selected to receive object databases from the source Firewall are presented in the form of a list in  which the following is possible       adding a new Firewall  click on the Add and select the Firewall or some or all of the Firewalls in the list  hold down  the Ctrl key and select the desired Firewalls   The selection of destination Firewalls is presented according to the  general view in the Flat View tab  you can use the search filter in the    name    column  or according to the  topological view model in the Topologies tab  which appears only if Firewalls have been defined in a topology        removing a firewall from the list of destination Firewalls  select the Firewall or some or all of the Firewalls in the list   hold down the Ctrl key and select the desired Firewalls  in the list of destination Firewalls and click on Remove     USER MANUAL    NETASQ    we secure IT       i  WARNING   The selected Firewall appears in red on the list of Firewalls if its version is not suitable for the  source Firewall  the configuration of a firewall cannot be deployed en version 7 to a firewall in  version 6 and vice versa      3 3 12 1 1  Action bar    The action bar in the object configuration deployment menu consists of two buttons     Cancel Cancels modifications     When you click on OK  objects will continue to be deploye
25.  claims to be  and to provide the receiver of a message with a  o way to encrypt his reply  The X 509 format is most typically used and contains information regarding the  E user and the certification authority   f am  S      gt   S Digital signature  Cc  D    Method of verifying identities on a network based on public key encryption     DMZ  Demilitarized Zone     Buffer zone of an enterprise s network  situated between the local network and the internet  behind the  firewall  It corresponds to an intermediary network grouping together public servers  HTTP  SMTP  FTP   etc   and whose aim is to avoid any direct connection with the internal network in order to warn it of any  external attack from the web     DNS  Domain Name System     Distributed database and server system which ensures the translation of domain names used by internet  users into IP addresses to be used by computers  in order for messages to be sent from one site to another  on the network     USER MANUAL    NETASQ    we secure IT       Dynamic quarantine    An imposed quarantine following a specific event  eg  when a particular alarm is raised     Dynamic routing    Routing that adapts automatically to changes that arise on a network so that packets can be transported via  the best route possible     Encapsulation    A method of transmitting multiple protocols within the same network  The frames of one type of protocol  are carried within the frames of another     Encryption   123 The process of translating
26.  destination port number  which is useful if you do not know it     You can also analyze everything that has been blocked and check that these flows really should be blocked     Access to the mail server    103    In order to be able to send and receive Email on a client workstation  the SMTP and POP3 services of the     client workstation to the mail server must be authorized   O  2 Of course  this is only useful if your mail server communicates with the outside  If the rules are applicable  2 only the internal mail server  then they are useless   te       gt        The mail server sends or receives mail from different mail servers which are unidentifiable  They will be    represented by the host  any    Both rules  one for sending and one for receiving  are the following     Fa FILTER rule edition          Slot name   Comment      Status Protocol Source Destination Destination Port Action Log Comme  10n tcp E  Private_SMTP_server     lt Any gt  fa smtp  2 O0n tcp O  lt Any gt  gz Private_SMTP_server k smtp  Figure 58  Editing filter rules  0 REMARK    If your mail server is just a go between for your ISP   s mail server  the exchange takes place only  from port 25  SMTP  to your server   s port 25     USER MANUAL    NETASQ    we secure IT       Authentication    Authentication may be requested for access to certain services or to certain hosts  For this  you must have  already defined forms for the users who may authenticate themselves on the Firewall  For example  access  
27.  file  select the line that indicates where a  change has been made and click on the button   to the right of the selection  The configured comparison  tool will then execute  displaying the differences identified in the files     3 3 10  Quitting Global Administration mode    To exit the application in Global Administration mode  select the menu File Quit or click on the button  that closes the window  in the top right corner of the NETASQ Global Administration mode window      If the project in progress has not been saved  a confirmation window will appear asking you if you wish to  Save your project     80  Cc      8 3 3 11  Direct configuration  E  f am  N      gt  3 3 11 1  20 310 1  Direct configuration  S  S    The    Direct Configuration    menus in Global Administration mode enable quick and direct access to the  configuration of selected Firewalls  no need to reauthenticate on the selected Firewall to make the  configuration menu appear      These configuration sections  Intrusion Prevention  Network  Objects  Logs  ASQ  Address Translation   Filter  Global Filter  QoS  VPN and URL Filtering  are specific to the selected Firewall in Global  Administration mode and in particular to the installed firmware version        Each of the menus in    Direct Configuration    is accessed via the contextual menus in flat and topological  views     T Select a NETASQ appliance     ra Right click to make the contextual menu associated to this product appear     EJ Select the    Di
28.  in favor of NETASQ in any contravention of this agreement     Limited warranty and limitation of liability    a   Hardware    uw    NETASQ warrants its Hardware products   Hardware   to be free of defects in materials and  workmanship for a period of one year  in effect at the time the Purchaser order is accepted  This  period begins with effect from the date on which the product is activated     b   Software    jenuey uoleinbiuo0d sn    NETASQ Software products   Software   are warranted for a period of 90 days  unless otherwise  stated at purchase  from the date of the product   s activation to be free from defects and to operate  substantially according to the manual  as it exists at the date of delivery  under the operating  system versions supported by NETASQ     NETASQ does not warrant its software products for use with operating systems not specifically  identified    c     Default  NETASQ   s entire liability and your exclusive remedy shall be  at NETASQ   s option  either a return of    the price paid for this License or Product resulting in termination of the agreement  or repair or  replacement of the Product or media that does not meet this limited warranty    USER MANUAL    NETASQ    we secure IT       d     Warranty    Except for the limited warranties set forth in the preceding paragraph  this product is provided  as  is  without warranty of any kind  either expressed or implied  NETASQ does not warrant that the  product will meet your requirements or that its
29.  key   133 One of two necessary keys in a public or asymmetrical key cryptography  The public key is usually made  known to the public    O   S   E PVM   c   te    5 Software that enables using a set of UNIX workstations linked to a network much like a parallel workstation      PVM is the internal name for NETASQ Vulnerability Manager          Cc   D    Q    QID    QoS queue identifier     QoS  Quality of Service     A guaranteed throughput level in an information system that allows transporting a given type of traffic in  the right condition  ie  in terms of availability and throughput  Network resources are as such optimized  and performance is guaranteed on critical applications     USER MANUAL    NETASQ    we secure IT       RADIUS  Remote Authentication Dial In User Service     An access control protocol that uses a client server method for centralizing authentication data  User  information is forwarded to a RADIUS server  which verifies the information  then authorizes or prohibits  access     RAID  Redundant array of independent disks   Hardware architecture that allows accelerating and securing access to data stored on hard disks and or    making such access reliable  This method is based on the multiplication of hard disks     Replay    Anti replay protection means a hacker will not be able to re send data that have already been transmitted     RFC  Request for Comments     134  A series of documents which communicates information about the internet  Anyone can subm
30.  link  click on it with the left mouse button and press the Del button on your keyboard     Moving one or several objects    Select an object or the objects that you want to move  and then move the selection to the required  location  keeping the left mouse button depressed     3 3 4  System and security indicators    The Global Administration mode allows high performance monitoring of system and security events for  NETASQ objects in Topological View  Indeed  the Global Administration mode offers an indicators window  for each NETASQ appliance  This window can be updated by the monitor in the Global Administration  mode  or it can be manually updated using the    status verification    function     These indicators are grouped in two categories  System indicators  which apply to the surveillance of events  relating to the Ethernet interfaces supported by the Firewall processor  and security indicators  which apply  to the surveillance of alarms and the events relating to the ASQ kernel     3 3 4 1  Topological View indicator window    V  y v50    i System problem status 20     0   Log Oz HA  20  Ethernet 0   Daemon  O   CPU     a Security problem status OF    0  Minor alarm 0  Major alarm  02  ASG memory    UE Alarm status  Je h ajor  D Cumulated  0    gt  Minor  Oo Curnulated  0    Last connection  11 27 56    Figure 32   Indicators    USER MANUAL    NETASQ    we secure IT       The indicator window groups several information items concerning the Firewall monitored        T
31.  not be blocked  between both extremities  Furthermore  the NETASQ Global Administration administration host has to be  able to conduct DNS resolution  therefore this service has to be authorized and accessible     Lastly  it would be preferable not to require authentication for HTTP and HTTPS data flows passing between  the administration host and the NETASQ website  as this might disrupt the application   s operation     Rules for authorizing data flows between the NETASQ Global Administration administration host and  NETASQ appliances   The NETASQ Global Administration administration host and NETASQ appliances use several data flow types  depending on the features used     NETASQ REAL TIME MONITOR  Port TCP 1300  NETASQ EVENT REPORTER  Web Administration Interface Port TCP 443  as ee eee   Gree E  B araa e a a a a a a took    To use a feature correctly  ensure that the necessary data flows are not filtered between the NETASQ Global  Administration host and the appliances  It is therefore advisable to add filter rules authorizing these data  flows     jenuey uoleinbiyuo0d sn    Lastly  it would be preferable not to require authentication for necessary data flows passing between the  administration host and the appliances  as this might disrupt the application   s operation     USER MANUAL    NETASQ    we secure IT       GLOSSARY    The terms found in this glossary are related to the subjects covered in this manual     100BaseT    Also known as  Fast Ethernet   100BaseT is E
32.  of the operating system     USER MANUAL    NETASQ    we secure IT       LAN  Local Area Network     A communications network that is spread out over a limited area  usually a building or a group of buildings  and uses clients and servers   the  clients  being a user s PC which makes requests and the  servers  being  the machine that supplies the programs or data requested     LDAP  Lightweight Directory Access Protocol     A protocol or set of protocols used to access directory listings     Leased line    A permanent telephone connection between two points  as opposed to dialup  Typically used by  enterprises to connect remote offices     Load balancing    Distribution of processing and communications activity across a computer network to available resources    128 so that servers do not face the risk of being overwhelmed by incoming requests   C   D   2 Logs   ie    2 A record of user activity for the purpose of analyzing network activity   te         gt    z   Q     gt    Cc   D    MAC address  Media Access Control Address     A hardware address that physically identifies each node of a network and is stored on a network card or  similar network interface  Itis used for attributing a unique address at the data link level in the OSI model     Man in the middle attack    Also known as a  replay attack   this consists of a security breach in which information is stored without the  user s authorization and retransmitted  giving the receiver the impression that he is participa
33.  operation will be uninterrupted or error free   NETASQ disclaims any implied warranties or merchantability or fitness for particular purpose  or  non infringement     e   Recommendations    In no event will NETASQ be liable to you or any third party for any damages arising out of this  agreement or the use of the product  including lost profit or savings  whether actual  indirect   incidental  or consequential  irrespective of whether NETASQ has been advised of the possibility of  such damages  NETASQ   s maximum liability for damages shall be limited to the license fees  received by NETASQ under this license for the particular product s  which caused the damages     Any possible legal action relating to the alleged defectiveness of the software will come under the  jurisdiction of NETASQ   s headquarters  French law being the binding authority     r i WARNING   P 1  Certain NETASQ products enable gathering and analyzing logs  This log information allows  o the activity of internal users to be tracked and may provide nominative information  The  o legislation in force in the destination country may impose the application of certain measures  E  namely administrative declarations  for example  when individuals are subject to such  5 monitoring  Ensure that these possible measures have been applied before any use of the  5 product     2  NETASQ products may provide cryptographic mechanisms which are restricted or forbidden    by the legislation in force in the destination coun
34.  operational even if they may be operating perfectly fine  Likewise  if the equipment does not  respond to ICMP commands  it will be considered non operational  In order to use the NETASQ  Global Administration mode effectively  ensure that there is no equipment filtering ICMP requests  coming from the administration workstation in Global Administration mode and that the  equipments are configured to respond to ICMP queries     When the monitor in NETASQ Global Administration mode has been activated  appliance status indicators  will be automatically refreshed           VI    3 3 8 2 2  Individual check    It is also possible to individually check the operating status of each appliance or equipment  This operation  may be carried out in flat and topological views for appliances and only in topological view for other  equipment     In order to do this  select the desired equipment and right click with the mouse  Choose the Test    jenuey uoneniuos sn    availability option in the contextual menu which is displayed and the following window will open  NETASQ  Global Administration attempts to connect to servers in the case of appliance  and to ping other objects      You will be able to view certain information     LED     status indicator The color of the indicator changes according to the operating status   Blue for operation in progress  green for successful operation and orange for failed  operation     USER MANUAL    NETASQ    we secure IT       Information in the table may
35.  raw data  known as plaintext  into a seemingly meaningless version  ciphertext      s to protect the confidentiality  integrity and authenticity of the original data  A secret key is usually needed   5 to unscramble  decrypt  the ciphertext    o    e     4   2     Ethernet       5    gt  Packet switching information network protocol  a technology that allows all hosts on a local network to  2 connect to the same communication line    D    Ethernet port     see Ethernet           Filtering router    Router which implements packet filters     USER MANUAL    NETASQ    we secure IT       Filter policy    One of the more important aspects in the security of the resources that the firewall protects     the creation  of filter rules that allow avoiding network flaws     Filter rule    A rule created to perform several possible actions on incoming or outgoing packets  Possible actions  include blocking  letting through or disregarding a packet  Rules may also be configured to generate alarms  which will inform the administrator of a certain type of packet passing through     Firewall  A basic feature in peripheral information security  a firewall can be a hardware or software that allows    filtering access to and from the company network     Firmware    Software that allows a component to run before the drivers     FTP  File Transfer protocol     mn Common internet protocol used for exchanging files between systems  Unlike other TCP IP protocols  FTP  uses two connections     one f
36.  rule edition       Slot name   Comment    Status Protocol Source Destination Destination Port Action Log Comment  1  On   group    partenare    lt  Any   E Serveur_web_priv  l i web A pass  2 0n tcp Q  lt Any H Fwall_dialup fy https    pass  3q  On top GA a EF wall_dialup Afirewal_auth J pass    Figure 61  Editing filter rules    If you wish to authorize authentication for users situated outside the security perimeter of the Firewall  you  also have to authorize the services which are necessary for authentication  the HTTPS service and NETASQ   s  proprietary authentication service via SRP  port 1200   Warning  the port 1200 must be open only if you  are using the authentication via SRP  In other cases  only HTTPS is necessary     USER MANUAL    NETASQ    we secure IT       Appendix F  Commands    Connecting in console mode  SSH  serial port or screen keyboard  allows maintenance of the Firewall by a  set of commands   This appendix sets out the main commands  pay attention to case      0 REMARK  To see the full list of these commands  please refer to the CLI console   SSH commands reference  guide  which can be found in the Document Base    Launching the command server       nsrpc user  127 0 0 1 ou cli  launches the Firewall   s command server with the admin login     0 REMARK  The full list of NETASQ commands is set out in the CLI SERVERD reference guide  which can be  found in the Document Base     Viewing configuration information       ifinfo  displays the corresponden
37.  sender  Like a written signature  the  S purpose of a digital signature is to guarantee that the individual sending the message really is who he  z    D claims to be   Cc  D    Single use password    A secure authentication method which deters the misuse of passwords by issuing a different password for  each new session     USER MANUAL    NETASQ    we secure IT       Slot    Configuration files in the NETASQ UNIFIED MANAGER application  numbered from 01 to 10 and which allow  generating filter and NAT policies  for example     SMTP  Simple Mail Transfer Protocol     TCP IP communication protocol used for electronic mail exchange over the internet     SMTP Proxy    A proxy server that specializes in SMTP  mail  transactions     SNMP  Simple Network Management Protocol     Communication protocol that allows network administrators to manage network devices and to diagnose  network incidents remotely     SSH  Secure Shell     Software providing secure logon for Windows and UNIX clients and servers     136      SSL  Secure Socket Layer   T  S Protocol that secures exchanges over the internet  It provides a layer of security  authentication  integrity   S confidentiality  to the application protocols that it supports   2  S       Star topology   Network  Q    gt   S A LAN in which all terminals are connected to a central computer  hub or switch by point to point links  A    disadvantage of this method is that all data has to pass through the central point  thus raising the risk of
38.  tool is activated        Q     gt    Cc   D    a  WARNING   During administrative tasks  you should deactivate the monitor in NETASQ Global Administration  mode    To deactivate or reactivate it  right click with the mouse on the icon       3 3 8 2  Checking the operational status of appliances  3 3 8 2 1  Overall check    The topological view allows checking the operating status of all equipment in the viewing zone  To launch  this tool  click on the Check all button  A status indicator  in the form of a colored signal light  will then  appear in the top left corner of certain objects in the view  all objects for which an IP address has been  defined      USER MANUAL    NETASQ    we secure IT       This indicator may take on the following colors     a aenaeeeeeeeenaeansneeeeeennenasaaeceeeeeenaenaeeaeeeeeeeesaenaeeeeneeneesaeeaeeeeeneenaeseeeOQganiyessaeeemesnaesaeseeeeeeesnaesaeeeeeeenesSaeeGeeeeOesSesGaseGeeeSGesSGssGeeGeSGNSSGsS0s00H000000000000000000000000000000000000000000000000000000000000000000000080080000000000000000000000000800NSEEESEESOSOGEOOESOSSSSSOGSOGESOESSSSSOSOGESGESSSSSSSOGEOGESOESSSSSOSOGSSGESOSSSSSOGEOGESOESSSSSOSOGSSGESSSSSSSOGSOGESGESSSSSOSOGSSGESSSSSSSOGSOGSSGESSSSSSSOGSSGESSSSSSSOGSOGESSESSSSSOSOGSSGESSESSSSSGSOGEESEESSS     The NETASQ Global Administration mode will ping all equipment in the view for which an IP address has  been defined     i  WARNING   If certain appliances are filtered  the NETASQ Global Administration mode may consider them non  
39.  tunnel  the    FW_peer    object has to be replaced by    ANY           Ed FILTER rule edition    Slot name   Comment       Status Interface Protocol Message Source Source Port Destination Destination Port Action QoS      1 0n jE auto udp Fw _peer  lt Any gt     BF wall_dialup SJ isakmp    pass     2  0n  Fs auto ypn esp H Fw_peer   lt any gt     BF wall_dialup    lt Any      pass     3  0n  FS auto vph esp H Fwall_dialup   lt Any gt  H Fw_peer    lt Any    pass   4  0n   PSec al EANtwk_peer   lt Any gt  Bel NetworkiN   cany    pass   101   5 On  IPSec tcp E  Ntwk_peer   lt Any gt  H Private_web_server Alhttp Z amp  pass      c Figure 55  Editing filter rules             Once these first 3 rules are in place  the tunnel can be created    Q  5 You can then filter VPN access to the internal hosts  To filter packets reaching the Firewall through the  O tunnel  you have to specify the IPSec interface  in advanced mode  in order to define the filter rules  To    filter packets going out from your Firewall to the VPN tunnel  you do not have to define the interface  leave      5 the interface as    auto     if the source and destination objects have been specified     The last two rules indicate how to filter traffic coming from the remote network and passing through the  VPN     PPTP connections    After configuring the PPTP server on the Firewall  you will need to create the associated filter rules  except  if implicit rules have been activated for this traffic type     You will 
40. 5 another project      Q    gt   Cc  D    3 3 1 1  Saving a project    Save a project by either using the menu item  File Save  or by using the corresponding shortcut in the  shortcut bar  or by using the keyboard shortcut CTRL S  All modifications will be saved in the current  project     It is also possible to save a project under another name or in another location  To do this  you can use the  menu item  File Save as     or you can use the corresponding shortcut in the shortcut bar     When a project is saved for the first time  or when using the Save as    function  a message window will  ask you to enter and confirm a password to protect the project     USER MANUAL    NETASQ    we secure IT       3 3 1 2  Importing NETASQ UTM appliances into a project    2 It is possible to import a database of IPS Firewall objects into a project  To do this you must use the menu  item File Import firewall file  A window appears asking you to choose a file of firewall  objects  This file must be in  csv format     This file can contain the following information     Name of the Firewall  IP address of the Firewall     Name of the administration account     o Oo   6    Password for the administration account     Go WARNING    For security reasons  you are advised against filling in this field     Description of the Firewall    Last name of the contact person for the Firewall    First name of the contact person for the Firewall   Company of the Firewall   s contact person    City where the
41. Certain servers are physically replicated on several machines so as to respond more efficiently to the many  connections reaching them     With the NETASQ Firewall  these servers can be reachable via one IP address alone  The Firewall will re   direct connection requests made to the public IP address towards the servers     Business A  for example  possesses a web server  www netasq com  which has been physically installed on  several machines in the DMZ  DNS resolution sends IP address 192 36 253 10 for the site www netasq com     We are going to create a host group with the servers    physical IP addresses and give a translation rule to  the Firewall     USER MANUAL    NETASQ    we secure IT                gt    gt                    gt   a   E        K   gt            4  7        4        a Groupes 3 objets      Groupe_serveur_web 3 membres dans le g    E Serveur_web_priv  l 192 168 10 10  Host Static  W Serveur_web_priv  2 192 168 10 12  Host Static  a Serveur_web_priv  3 192 168 10 13  Host Static    a groupe  O membres dans le g       gt         O   o gt      Figure 47   Groups    The traffic directed to public IP address 192 36 253 10 is distributed evenly and sequentially between the  different hosts of the web server group     jenuey uoleinbiyuo0d 1asp    Status Action Option Source Destination Destination port Translated Description    i E  a on ee    _           ae Se   reas oe r eons eet  0 REMARK    The source ports of the source and destination hosts can be spec
42. Firewall chooses the interfaces where the virtual IP  address is located  OUT in the example      Status Interface Action Option Source Destination Destination Translated Translated port Description  port  a a  oc i     hhc    ee Oh  map _web_server1  es a eo ee le er Po  map _web_server1    In this way  requests coming from the outside  OUT Interface  and from the internal network  IN Interface   with destination address 192 36 253 10 are changed to 192 168 10 11 and routed directly by the Firewall to  the DMZ     0 REMARKS    O  A    1  The order of rules is important here  For this case  it is essential to place the rule with the  virtual IP address and the network interface  direction  belonging to the same network in first  place  In our example  the virtual address belongs to the external network  OUT   It is therefore  necessary to put in first place the rule having the direction of the OUT interface     2  It is impossible to contact the server with its virtual address if the client and the server are  actually on the same network  In fact  the message will reach the server but the server will  respond directly to the client  since they are on the same network  with its real address  The  client then receives the response with a different address from his initial request and rejects  the packet     jenuey uoneniuos sn    Example 4  Internet connection via modem    In a modem connection  the addresses of internal hosts wishing to use the modem must be translated on  th
43. Information   Custom fields    39 Name    a   O Resolve  c Address         D     O eine  O Login     gt        Password   Confirm password    S    Description      Q    gt   Cc  D         Update info       K                   Figure 17   Parameters   General    USER MANUAL    NETASQ    we secure IT        General  tab    The information requested in the General tab is necessary to insert the appliance in NETASQ Global  Administration     Name Enter the name selected for the appliance  This name will be used to distinguish the appliance  from other equipment  The Resolve button will resolve IP addresses of    manual    hosts     Address Enter the IP address of the appliance that the host  on which NETASQ Global Administration is  installed  can contact     Confirm Confirm the password for the administration account   password    Q REMARK  Fields in bold are mandatory      Attributes  tab    A  O        Parameters       NETASQ   lt noname gt     af VSS         General Attributes   Information   Custom fields      Name Value    jenuey uoleinbiyuo0d 1asp         gt  Update info                  Figure 18   Parameters   Attributes    A       jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       This zone does not display data until after an initial update of the appliance information  The data displayed  are     Global Admin Options License option that allows the Firewall to be run in    service    mode  Contact your    dealer or NETASQ commercial service for more 
44. NETASQ REAL TIME  MONITOR or NETASQ EVENT REPORTER        You can receive an alarm report at regular intervals  see Receiving alarms  via the NETASQ UNIFIED MANAGER  application  which can be configured so that whenever an alarm is raised  an e mail is sent  When several alarms are  raised in a short period  they will be sent in a collective e mail      Finally NETASQ REAL TIME MONITOR displays on the screen the alarms received in real time     USER MANUAL    NETASQ    we secure IT       7  What happens when the firewall raises an alarm     All intrusion attempts or detected attacks are automatically thwarted  Depending on the configuration  the  packet that caused the alarm to be raised will either be blocked  or the connection will be reset  Moreover   an action can be added  sending an e mail to the administrator or quarantining the packet behind the  alarm     Quarantining involves blocking all packets originating from the host in question     In the case of open hacking  you should closely monitor incoming connections with the NETASQ REAL TIME  MONITOR or NETASQ EVENT REPORTER or other network analysis tools     8  It is possible to allow protocols other than IP     The NETASQ Firewall can only analyze IP based protocols  All protocols that the Firewall does not analyze  are regarded as suspicious and are blocked     However  in transparent mode  Novell   s IPX  IPv6  PPPoE  Appletalk and Netbios protocols may be allowed  through even though they are not analyzed       a
45. PRIVATE AREA    Download the necessary files from NETASQ   s website and execute the  EXE program corresponding to the  administration suite  The installation information will appear in the same language as the version of  Windows that has been installed     USER MANUAL    NETASQ    we secure IT       2 3 1  Verification procedure    2 3 1 1  Signature verification procedure    When you download an application from your client or partner area on www netasg com  the following  message will appear     Open a file or save on your computer          If you choose    Open     your web browser will check the signature automatically and inform you about the  results     If you choose    Save     recommended option   you will need to perform the check manually     2 3 1 2  Manual verification    To manually check the application   s signature  follow the procedure below before installing the application     Right click on the NETASQ appliance whose signature you wish to check then select the menu  Properties from the contextual menu that appears     Z Select the Digital signatures tab then the name of the signor  NETASQ    E Click on Details  this window will indicate whether the digital signature is valid     16  C             2 2 3 2  Client and server administration suite  choice of package  te   5    Several packages may be selected   5 The basic library corresponds to all the modules necessary for the other programs  15 3 MB of hard disk    space is necessary     The minimum inst
46. R MANUAL    NETASQ    we secure IT       qh WARNING  In order for updates to be carried out  information on the selected firewalls has to be updated   using the button Update information in flat view      3 3 5 1 1  Updating NETASQ UTM appliances    Select the update version to install for each appliance  in the    Update version    column  then click on  Update button  The signal light then changes to orange on the appliances that are being updated and you  can see the progress bar advance  All the appliances will be updated  one after another     i  WARNING  You are strongly advised to perform a partition backup after each firmware update     3 3 5 1  Updating the license    2 When you select the Administration tasks Update the license menu item the window     Licenses updating    opens     By default the first column entitled    BP    is for specifying the breakpoints in the execution of the configured  task  The principle is as follows  upon specifying a breakpoint on a line  the configured task will first be    f     N    started on each of the appliances located below or on this breakpoint in the table  then if all the tasks are    successfully completed  the Global Administration mode will execute the tasks for the appliances which  follow  To specify a breakpoint  double click on the desired line  To delete a breakpoint  double click on the  breakpoint     By default the second column displays a signal light  The color of the signal light depends on the status of  the
47. TOR option in the contextual menu  The link will be grayed out if NETASQ REAL TIME MONITOR has  never been launched before     If the path to NETASQ REAL TIME MONITOR has not been defined for the software version of the appliance   or if the software version is unknown  then an assistant will help you choose the appropriate firewall  The  NETASQ REAL TIME MONITOR launch window then appears     USER MANUAL    NETASQ    we secure IT       Connection to the software is automatic  no need to enter a password  IP address or login   You may then  monitor the Firewall  Several NETASQ REAL TIME MONITOR windows may be opened  connected to  different Firewalls     To launch NETASQ EVENT REPORTER  select the Firewall that you wish to administer in flat view or  topological view  then right click with the mouse and select the option Tools Launch NETASQ  EVENT REPORTER in the contextual menu  The link will be grayed out if the firewall has never been  launched before or if the appliance concerned is a U30  U70 or VBox Agency     If the path to NETASQ EVENT REPORTER has not been defined for the appliance   s software version or if the  software version in unrecognized  an assistant will help you choose the appropriate Reporter     Connection to the software is automatic  no need to enter a password  IP address or login   You may then  monitor the Firewall  Several NETASQ EVENT REPORTER windows may be opened  connected to different  Firewalls     ch WARNING  NETASQ EVENT REPORTER is always 
48. a specific firewall       Figure 36   Restoration wizard    From source Firewall  This option is for specifying a backup located in the configuration backup directory  created from the Firewall on which the restoration will be executed   From a specific firewall  This option is for specifying a backup located in the configuration backup directory    62    created from the selected Firewall   C    E  1 Step 3  8      Configuration Restore Wizard  Q   a  D    Select firewalls whose configurations you would like restore    gt    gt  name Address      ec  D    Clients who are not fit for deployment are displayed in red       Reboot if necessary       Figure 37   Restoration wizard    USER MANUAL    NETASQ    we secure IT       Step 3 consists of defining the Firewalls on which a restoration has to be performed   The option Reboot if necessary allows indicating whether the appliance will be rebooted if the need arises   to apply changes to files due to the restoration     Etape 4    Configuration Restore Wizard    Warning  restoring some categories will require rebooting  your firewall  Ho check will be done by Advanced  restoration     Cd Full backup  configuration and LDAP       Partial backup  simple mode   C  Advanced  ee E  Configuration  E  Network interface and static routes  object  Filter policies    VPN  F  LDAP  Global configuration  urlfiltering  sslfiltering      Secured configuration and files    Active Update  Services                                                
49. al and electronic  5 equipment    te     For further details  please refer to NETASQ s website at this address   http   www netasq com recycling html    License Agreement    Introduction    The information contained in this document may be changed at any time without prior notification   Despite the care taken in preparing this document  it may contain some errors  Please do not hesitate to  contact NETASQ if you notice any    NETASQ will not be held responsible for any error in this document or for any resulting consequence     USER MANUAL    NETASQ    we secure IT       Acceptance of terms  By opening the product wrapping or by installing the administration software you will be agreeing  to be bound by all the terms and restrictions of this License Agreement     License   NETASQ hereby grants  and you accept  a non exclusive  non transferable license only to use the  object code of the Product  You may not copy the software and any documentation associated with  the Product  in whole or in part  You acknowledge that the source code of the Product  and the  concepts and ideas incorporated by this Product  are valuable intellectual property of NETASQ  You  agree not to copy the Product  nor attempt to decipher  reverse translate  de compile  disassemble  or create derivative works based on the Product or any part thereof  or develop any other product  containing any of the concepts and ideas contained in the Product  You will be held liable for  damages with interests therein
50. allation groups together      Netasq Unified Manager  Graphical interface for the administration of NETASQ firewalls     Netasq Real Time Monitor  Real time viewer of your NETASQ firewall  2 58 MB      Netasq Event Reporter  Log consultation and management on your firewall  140 MB      Netasq Updater  Help download service for alarms  system events and vulnerabilities  10 5 MB    Cf   Please refer to the documentation relating to this program for further information      Server addition group together      Netasg Autoreport  Automatic report creation and scheduling according to your firewall   s logs  stored in  a database  165 7 MB       Netasq Collector  service and database for keeping your firewall   s logs  165  7 MB      Netasq Syslog  service that allows retrieving logs generated by the firewalls  131 6 MB     USER MANUAL    NETASQ    we secure IT       The minimum installation comprises all the graphic configuration tools of the NETASQ suite  which serve as  the interface between the user and the appliance  These tools are installed on an administration  workstation     As for the server additions  they comprise all the communication tools used in retrieving logs from    appliances that belong to you  These tools are generally installed on a dedicated host due to the amount of  resources that they require     2 3 3  Registration    During installation  you will be asked to register your product  This registration is mandatory in order to  obtain your product   s licen
51. alls in the flat view 38  3 3 3 Managing firewalls using the topological view 43  3 3 4 System and security indicators 55  3 3 5 Administration tasks 58  3 3 6 Scripts 70  3 3 7 Deployment 73  3 3 8 Monitoring and supervision 74  3 3 9 Configuration monitoring 78  3 3 10  Quitting Global Administration mode 80  3 3 11  Direct configuration 80    3 3 12  Deploying configurations 81    USER MANUAL    NETASQ    we secure IT       FOREWORD    Copyright     Copyright NETASQ 2010  All rights reserved  Under copyright law  any form of reproduction    whatsoever of this user manual without NETASQ s prior written approval is prohibited  NETASQ  rejects all liability arising from the use of the information contained in these works     Liability  This manual has undergone several revisions to ensure that the information in it is as accurate as  possible  The descriptions and procedures herein are correct where NETASQ firewalls are  concerned  NETASQ rejects all liability directly or indirectly caused by errors or omissions in the  manual as well as for inconsistencies between the product and the manual     Notice  4      WEEE Directive   7   o All NETASQ products that are subject to the WEEE directive will be marked with the mandated  E EE c ossed out wheeled bin  symbol  as shown above  for items shipped on or after August 13   a 2005  This symbol means that the product meets the requirements laid down by the WEEE  7 directive with regards to the destruction and reuse of waste electric
52. and bases      NAT        USER MANUAL    NETASQ    we secure IT       Global filtering Deployment of global filter policy configuration  It is similar to classic filtering except that  global filtering has priority when filters are executed  Network packets that pass through  the firewall will first apply rules established in the global filter instead of applying those in  the local filters     The description of NETASQ Global Administration   s deployment functionalities are explained in the section  Deployment     i WARNING  These features are only available for deploying configurations on Firewalls in versions 7 or 8  As a  result  security policies or object bases in version 9 will not be compatible     3 3 8  Monitoring and supervision    The NETASQ Global Administration mode also provides monitoring and supervision tools for all your  appliances  allowing an overall view of the status of the equipment installed  In order to monitor and  supervise your appliances  use the topological view and its topology visualization zone     74 3 3 8 1  Monitor   5 The NETASQ Global Administration mode provides a tool which enables monitoring appliances in the  o background  When this tool has been activated  the following icon will be visible in the bottom left corner  E of the main window      The monitor enables the automatic update of information  indicators and  a operating statuses  represented by a signal light in the object frame  relating to the appliances  By default   S the
53. andwidth is controlled through filtering  using the  Limit to  action  Instead of blocking packets  or  allowing them to pass  they will be authorized to pass up to the defined threshold  Beyond this they will be  rejected if the threshold is reached during the defined period     The example bellow shows how to limit FTP downloads from the internal network     Ed FILTER rule edition    Slot name   Comment         Status Protocol Source Destination Destination Port Action Log Comment      T  On tcp 4  NetworkIN Qrin Alte       Figure 57  Editing filter rules    USER MANUAL    NETASQ    we secure IT       Filter control    After having configured the simplest rules  you may begin to wonder if there isn t anything missing in order  to ensure proper network operation     It is also possible that an application server uses a specific protocol that you don t know     If you have not defined any explicit blocking rules for these hosts or protocols  a simple solution is to  temporarily place a log rule at the end of the filtering  This rule will log all elements blocked by the Firewall     Thus  the flow that you have not explicitly authorized passes through all rules and arrives at the end of the  table where it is subjected to the default rule  block   If you place a rule that logs everything just before the  default rule  that is not displayed in the list of filter rules   the flow is entered into the log files that you can  then view     The log file will show  in particular  the
54. ase      A certified distribution network  As such  you will be able to call on your distributor      Documents  these can be accessed from your client or partner area  You will need a client account in  order to access these documents     For further information regarding technical assistance  please refer to the document  Standard NETASQ  support        USER MANUAL    NETASQ    we secure IT       2  SOFTWARE INSTALLATION    This section provides you with the elements for installing the software suite that would allow you to  administer your poduct     For further information on the appliances and how to install them  please refer to the product installation  guide    Presentation and installation of NETASQ products      Ref  naengde_product installation  pdf      You will need the graphical interface installation file  This file can be found on the CD ROM that comes  with your firewall or on the NETASQ website  www netasq com   The installation file is in English and    French     You will also need your firewall   s internal IP address as well as its serial number     2 1  PRE REQUISITES    The NETASQ firewall is fully configured via a software program developed by NETASQ     NETASQ UNIFIED    14  MANAGER  Using this program  you will be able to configure your firewall from a Windows workstation   T  S You will need the following elements in order to install this software   S  a    CPU with a minimum of 2GHz  S   A minimum of 512 MB of RAM  Windows XP  for client software 
55. asnsnasisansasaasisaasasasasasasiasassasasiasussessssessssesissesissesiseesissesiseesiseesiseesiseesiseesiseesiseesiseesiseesuseesuseesiseesiseesuseesuseesusensiiies  Import address To retrieve an existing address book in  gap format   book    3 2 2 2  View    General view For opening or closing the general view   Topological view For opening or closing the topological view   Topological main For showing or hiding the object bar     toolbar    USER MANUAL    NETASQ    we secure IT       3 2 2 4  Administration tasks    Configuration Opens the configuration   s backup or restore screen   a es a  eae S E  ETA nee een T inden A  E lie parton ees a enon bce einciow Ce  D ee ee CCSC S  T sn ae y   a a ET n TA 7 5 oe    and or the object bases     jenuey uoleinbiyuo0d 1asp    Horizontal tile For organizing the windows of the current project in a horizontal layout   7 E Farcieanene ee wi ie ioe  SCSC C CS S  a   ie e CSCS  a a e    Help Displays the online help file    E oe o a EE E  UNIFIED MANAGER   7 ri sie FSS ow Ieee Ie ection Tine ve WEG Gear    Administration     USER MANUAL    NETASQ    we secure IT       3 2 3  Project      There are several options that are specific to each project  To configure them  go to the  Project Options     3 2 3 1  Client monitoring              r      Project options            o ent inenkovog Client monitoring nr  z  sep Alarm indicators be      ses Configuration monitoring         Automatic recovery information              Hide detailed indica
56. ation  configuration of authentication     Indicators  system and security   indicators found in Global Administration     o 0    DHCP server  appliance   s DHCP service     jenuey uoleinbiyuo0d sn        NTP Client  appliance   s NTP service     D    DNS Proxy  appliance   s DNS service   SNMP Agent  appliance   s SNMP service     o 0    Logs  configuration of logs only     5    Static routing  default gateway and configured static routes   System events  configuration of system events     Dynamic routing  configuration of the dynamic routing platform     o O 0    Antispam  Antispam module     D    Communication  syslog  notifications   appliance   s communication module  notably the sending of logs to syslog  servers and the sending of alarm notifications to administrators        Data  selects all the elements classified under this header     Dynamic URL groups  all dynamic URL groups  obtained via Active Update        Contextual signatures  ASQ signatures obtained via Active Update     USER MANUAL    NETASQ    we secure IT       E Step 5    Configuration Restore Wizard    A Warning    When mas  s deploying an firewall configuration  very  that the destination firewalls have the same  functionalities  license   model limita  filter rules     PH  tunnels     and environment  extemal services      If this i not the case the application of the configuration may nat  succeed     External LDAP    Users with nights on the source firewall won t have rights  on target firewalls    
57. ation is made to a monitored configuration  the icon H will appear in the flat or  z I    5 topological view   D    Right clicking on the appliance whose configuration has been modified will open the menu View  modifications  Click on this menu in order to view the changes made     View modifications    The modification window displays all existing modifications between    validated    files and the files on the  appliance  Three types of modifications are identified        Differences        Addition    and    Deletion         Differences    indicates that there are differences in one of the files among the    validated    ones and those  on the appliance     Addition    indicates that a file which did not exist in the    validated    files has been added      Deletion    indicates that a file that existed in the    validated    files has been deleted     USER MANUAL    NETASQ    we secure IT       As mentioned earlier  configuration monitoring is based on a    validated    backup in order to warn the  administrator of possible changes made to the configuration  By default  this means the most recent  backup  In the comparison window  you will be able to select an older backup  It is even possible to  restore the    validated    configuration if the administrator monitoring the configuration does not approve of  the changes made  To do so  click on the button Restore this configuration     File comparison tool    To view details of modifications made to a given configuration
58. ation monitoring you must make a validated backup  to begin monitoring     Password policy    Default password    jenuey uoleinbiuo0d sn    Comparison tool    To view modifications  select a comparison tool application like  Winmerge    The argument line must have     F1    F2     local validated file and  firewall file  Use   around the file name if there are spaces in the  firewalls object name  and other arguments that you can specify     LS   Validated files    Firewall files                    XK caesi            Figure 11   Project options     Configuration monitoring    USER MANUAL    NETASQ    we secure IT       The Configuration monitoring menu makes it possible to monitor modifications made to the  configuration of appliances managed by NETASQ Global Administration  features available only for  appliances in version 6 3 and upwards      Use configuration Option that activates configuration monitoring  The configurations of the  monitoring monitored appliances have to be backed up and validated before you begin   Password policy By default  passwords are not needed when validating a configuration  However     passwords can be defined  either a single identical password for all managed  appliances  or specific passwords for each appliance  This option enables defining  the mode for managing the validation of passwords       Default password  default management mode      A single password for all  a single password has to be defined  It will be the  same for all the ma
59. ation protocols  SMTP  HTTP  HTTPS  IMAP  Telnet  NNTP         USER MANUAL    NETASQ    we secure IT       p    Pack    Rfers to a unit of information transported over a network  Packets contain headers  which contain  information on the packet and its data  and useful data to be transmitted to a particular destination     Packet analyzer    When an alarm is raised on a NETASQ Firewall  the packet that caused this alarm to be raised can be  viewed  To be able to do so  a packet viewing tool like    Ethereal    or    Packetyzer    is necessary  Specify the  selected tool in the Packet analyzer field  which Reporter will use in order to display malicious packets     Partition    A section of disk or memory that is reserved for a particular application     PAT  Port Address Translation     Modification of the addresses of the sender and recipient on data packets  Changes in IP address involve  the PAT device s external IP address  and port numbers  instead of IP addresses  are used to identify  different hosts on the internal network  PAT allows many computers to share one IP address     131  J Peer to peer  3  3 Workstation to workstation link enabling easy exchange of files and information through a specific  S software  This system does not require a central server  thus making it difficult to monitor       gt         e    Ping  Packet Internet Groper     An internet utility used to determine whether a particular IP address is accessible  or online   It is used to  test and d
60. ature  All you need to do  is to add a rule in the filter rules authorizing ICMP  in particular the ping command  data flows in the  direction of the appliance     114    Using an external tool   a   2 Using an external tool to connect to an appliance in SSH requires activating the SSH service  Select the  O   2 Firewall Security menu  Check the    Activate SSH access to firewall    box  If you wish to carry out  2 an SSH connection with certificates  do not check the box    Enable password access     but rather  export the    keys  certificates  into the external tool  If you wish to carry out an SSH connection using passwords  check   gt    z the box    Enable password access     In this case  the admin login and its password will be used     gt    Cc   D    Next  create the filter rule authorizing the SSH connection on the appliance     Configuring filtering devices    Certain equipment on your network may prevent the application from functioning properly  It is therefore  important to identify all the elements which risk filtering traffic that NETASQ Global Administration needs  and modifying their configuration as a result     Rules for authorizing data flows between the NETASQ Global Administration administration host and the  NETASQ website    USER MANUAL    NETASQ    we secure IT       The NETASQ Global Administration administration host and the NETASQ website communicate via HTTP   port TCP 80  and HTTPS  port TCP 443   therefore it is important that these data flows
61. automatic update of licenses     backup of system partitions     administration tool execution      launching NETASQ tools  NETASQ UNIFIED MANAGER  NETASQ REAL TIME MONITOR  NETASQ EVENT REPORTER  for administering  monitoring and analyzing logs on every firewall in the fleet     NETASQ Global Administration connects automatically to the NETASQ website to download updates and  appliance licenses  it can also connect completely automatically to the appliances managed to update  them  which considerably reduces the time required for asset administration     USER MANUAL    NETASQ    we secure IT       The other function supplied by NETASQ Global Administration is to provide tools for monitoring and  supervision of the NETASQ equipment assets        status indicator of the NETASQ product or networked host  on line  inaccessible  or switched off  current software  version  license version etc       system status indicator for each product      security status indicator    The information can be displayed in tabular form or graphically in topology form  which offers the easiest  method of reading the information and the most intuitive and user friendly administration    This section describes the various elements and functions of NETASQ Global Administration and is designed  to guide the administrator in his task of configuring and using the product     3 1 2  Access      To use NETASQ Global Administration  start the application using the Windows Start menu  from the  following pa
62. ce      Configuring NETASQ appliances    Certain manipulations have to be conducted on the NETASQ appliances managed by NETASQ Global  Administration depending on the administration and supervisory operations you wish to perform     If the NETASQ Global Administration mode accesses the appliance by its internal interface  or another  protected interface    As arule  no operation is necessary  except to use the operation checking tool and external tools   You only  need to check that implicit rules for the administration server are active     For a firewall in version 5 or 6  connect to the appliance using the corresponding NETASQ UNIFIED  MANAGER  then select the Configuration Implicit rules menu  The    Administration server    option should  be checked  If you wish to use EZAdmin from NETASQ Global Administration  ensure that the    113  oa    Authentication server    option has also been checked   c For a firewall in version 4  connect to the appliance using the corresponding NETASQ UNIFIED MANAGER   S then select the menu Configuration Filter Edit the active slot  and click on Extra   e     parameters   Q  f am  S  5 The boxes    access NETASQ UNIFIED MANAGER on internal networks    and    Access authentication service on  S internal networks    have to be checked   Cc  D    If the NETASQ Global Administration mode accesses the appliance by its external interface  or another  unprotected interface    In this case  you have to create a specific filter rule where the applia
63. ce between the names of interfaces defined in network configuration  with    105  NETASQ UNIFIED MANAGER  and the names used by the system   c    ifconfig  displays information about the Firewall   s network configuration        sfctl  s filter  displays the active filter rules   S  E You can view the contents of configuration files with an editor such as vi       S Configuration files are found in  Firewall ConfigFiles   S     Q    gt   c  2    Activating Deactivating a filter policy or an option    enfilter xx  activates the filter slot bearing the number xx    enfilter 10  activates slot 10  pass_all in the default configuration  the Firewall allows all packets to pass   endialup  reconnects to a modem   ennetwork  reloads a network configuration    o a    6      engui  reactivates NETASQ UNIFIED MANAGER   s connection authorization on internal networks    Firewall activity    sfctl  s stat  gives the Firewall   s statistics   sfctl  T  displays    real time    information on the Firewall   s stateful engine   dstat  gives the list of active services     o      6    top  u  gives the activity of the processor and the processes and the memory used    USER MANUAL    NETASQ    we secure IT          tcpdump  i  lt interface name gt   lt filter gt   Real time display of packets transiting by a firewall interface      lt interface name gt  is the name of the interface used by the system  this name can be retrieved using the  ifinfo command         lt filter gt  filters the proto
64. cols or services displayed     A service   s filter must be preceded by the word    port     Services can be indicated by their port number or by  their name  if the service is part of the current services      Examples of filters       tcpdump  i fxpO not port 23  to mask telnet traffic        tcpdump  i fxpO udp OR port HTTP  only displays UDP and http traffic        tcpdump  i fxp0 tcp AND port 53  to display only DNS TCP traffic        tcpdump  s0    w  tmp dump  i fxpO  writes traffic in a file        tcpdump    sO    i fxpO ESP OR port isakmp  viewing ESP encrypted traffic or VPN negotiation phases      VPN Commands      showSPD  Displays the SPD  Security Policy Database  containing all the data regarding defined tunnels  active or  inactive       showSAD  Displays the SAD  Security Association Database  containing data relating to active tunnels     Deactivation    106    envpn 00  deactivates the active VPN tunnel   c Activation   D   O   g    envpn xx  activates the VPN slot bearing the number xx            S         gt    S       Miscellaneous   2       getversion  displays the Firewall software version    Q WARNING    1  Use this command to check that the version delivered corresponds to the expected version as soon as  you receive your Firewall    2  The handling of files and the use of certain commands must be done carefully  as certain operations can  adversely affect the operation of the Firewall        O  N    jenuey uoneniuos sn    USER MANUAL    NETASQ    w
65. configurable objects in  NETASQ UNIFIED MANAGER mode     NETASQ UTM    Host  NETASQ UNIFIED MANAGER workstations  servers  others   Network object  switch  modem  other    Hardware object    Notes     o 0  amp   6        Topologies     3 3 3 3  Adding  editing  and deleting a link between two objects    ul  Ww    Adding a link    When several objects have been created and added to the topology visualization zone  you can represent  the physical links that exist between them  Ethernet connection  dial up connection  WiFi  customized   etc       To do this  just use the right mouse button  Click on the first object that you would like to include in this  link  with the right mouse button  Keep the button depressed and move the cursor to the object that    jenuen uoleinbiyuo0d 1SN    constitutes the second extremity of the link  then release the button  A line has been drawn between the  two objects and a window opens     Enter the following information in this window     Link label Enter a name here to denote the link  This name will be displayed below the link  in the    visualization zone     Types Link types  Ethernet  WIFI  radio   dial up  or custom  Each link type has a different color  in the display  Use the custom link type to define a personalized link type     Attributes Link attributes  high throughput  100M or Gigabyte link  for example   encryption level   none  low or high encryption     USER MANUAL    NETASQ    we secure IT       Link color You can define a colo
66. cursor movement techniques when editing a comment  mouse or keyboard   gt    gt  arrows    Q    gt   Cc  D    File name    Certain characters  such as accents and spaces are not accepted in file names     Object name   Certain characters  such as accents and spaces are not accepted in object names  When editing an object  name  if an accented character is entered using the keyboard  the configuration software inserts the  corresponding non accented character  A non accepted character is not validated and does not appear on  screen     jenuey uoleinbiuo0d asp    NETASQ    we secure IT    Appendix C  ICMP Codes    Description    Requ  te Erreur    USER MANUAL       communication administratively prohibited by  filtering    O    address mask reply    USER MANUAL    NETASQ    we secure IT       Appendix D  Configuration examples for NAT    The examples below illustrate different configurations using address translation  They use the different  possibilities available according to needs and network structure in deliberately simplified cases       Unidirectional address translation of the internal network for internet access      Configuration with a web server in the DMZ      Configuration with a web server in the DMZ which must be accessible from the internal and external networks with  its official address       Connection via modem on the Firewall   s serial port for internet access       Port re direction  using only one IP address to contact several servers       Load balanci
67. d     As the screen indicates  two options have to be defined before deployment of the source Firewall   s object  database can be continued     Replace When this option is checked  the value of the object in the source database will replace the  duplicate value of the object in the destination database if an object in the destination object database    0  Ww    entries bears the same name as an object in the source object database     Merge   WARNING    If unchecked  all objects in the destination object database which are not in the source object  database will be deleted  Warning  Rules which use the deleted objects may fail to work if this    option is checked     Deploy When you click on this button  the Global Administration mode will begin    jenuey uoneniuos sn    loading the object database and will ask you if you wish to edit it before  sending  A screen will subsequently appear  enabling you to execute the  deployment     3 3 12 1 1  Objects categories    Categories are used in the deployment of objects     2 Select    Objects    if you wish to deploy an object database     0  A    jenuey uoneniuos sn    USER MANUAL    NETASQ    we secure IT       Source data options in the configuration deployment menu can be defined with two parameters  First of  all  select a source  then select the categories that will be sent to the destination firewalls  The categories  that can be configured are  Hosts  Address ranges  Networks  Protocols  Services  Service groups  Groups   
68. d with the same objects     This view can be displayed by selecting the menu item View Topological view  If the view is already  open  then just click on Topological view at the bottom of the screen in the view change bar  to access the    view     The view is organized as follows     D  w       Figure 21   Topological view    jenuey uoneniuos sn    The window is divided into three parts      a zone for classifying the topologies  left side of the screen       a zone to view a network   s or sub network   s topology  in the center      the object bar  right side of the screen      3 3 3 1  Topology classification zone    You can define the group of topologies under a tree structure in this zone  Thus  administration of the sub   network will be facilitated by dividing the network into several topologies  each one corresponding to a  sub network      USER MANUAL    NETASQ    we secure IT       To create the topology tree structure that will be used in the project  create as many levels and sub levels  that you would like in order to better organize your project  The appliances belonging to each level or sub   level will be displayed in this window     To create a new grouping at the root level of the tree structure  click on Add then    On the root     A window  will ask you to enter the name of the group        H  Es sous_soe  H S VMWARES                                44   C                 O    e  r     New topology   a i  gt    Enter a name for your new topology     a    a
69. e      Ss el be ee Contextual menu    gt                     2 Right click on a NETASQ Firewall object to view the contextual menu for flat and topological views           Objets     QoS      Disponibilit    ping   v  rification de l   tat  Politique  Translation d adresses  NAT      Filtrage     Filtrage global     Filtrage URL          Figure 43   Contextual menu    USER MANUAL    NETASQ    we secure IT       3 3 12 1  Presentation of the deployment interfaces    These interfaces are almost the same as the configuration interface  except that the deployment options  are different     The deployment interface has 4 distinct sections        source firewall  the  server       destination firewall s   the  clients       action bar      deployment options     3 3 12 1 1  The source firewall    Select a firewall by clicking on Source     D WARNING   If there has not been any deployment from the current open project  the message    No client  selected    will appear in red under the button   s icon  Otherwise  the Firewall selected in the last  deployment from the current open project will be indicated by default     82 When the general selection window appears  select the Firewall from which you intend to perform the    deployment  its object database will be deployed to all the selected destination Firewalls  using the button   5 in the    Source    zone    o   S   Ei There are 2 tabs that allow you to look for firewalls     the flat view and topological view    a Search filters
70. e 5   Object bar    3 2 1 1 1  Category descriptions    NETASQ This category groups together all the NETASQ equipment that can be managed by NETASQ  Global Administration    Computers This category groups two subsets together  workstations on which NETASQ Global  Administration is installed and other network workstations  mobile computers  and servers      Network This category groups together the network connection equipment  Internet network  router   modem  hub  switch  WIFI  Intranode scanner     Other This category contains an object that allows you to add a note to the topological diagram   and an object that allows you to represent a link to another existing topology     USER MANUAL    NETASQ    we secure IT       3 2 1 1  Switching views    The bar  located at the bottom of the NETASQ Global Administration screen  indicates the open views   topological and flat view   The view displayed is the one which is indented  To move to another open view   click on its name      1  Flat view   3 Topological view      Figure 6  Switching views    Two cases are present by default  Topological View and General View  By choosing to hide one view or the  other in the icon or shortcut bar  or in the View menu  you hide the corresponding box     0 REMARK  Also note that other boxes can appear when you configure certain functionalities of NETASQ Global  Administration  Configuration  Partition backup  and Deployment      3 2 1 2  Monitor and web mode    There is a bar containing two in
71. e NETASQ Firewall   s serial port or external interface     Addresses must be translated to the address firewall dialup  This interface has an IP address  fixed or not   negotiated with the provider during the connection request     USER MANUAL    NETASQ    we secure IT       In this example  we want to allow internet access to the internal network via the modem installed on the  appliance   s serial port     If you are operating in transparent mode  you have to implement this rule  by replacing the object  Network_in with Network or Bridge  in order to access the internet with your modem     Example 5  Port redirection    In the event you have only one public IP address and several public servers  port re direction allows you to  re direct traffic to these servers using the port number alone     Business A has the public IP address 192 36 253 240  It hosts a web server and a mail server in the DMZ     The Firewall will redirect traffic to the appropriate server using the port number targeted  If the connection  request concerns port 80  HTTP   the firewall will redirect to the web server  If the connection request is  made on port 25  SMTP   the firewall will redirect traffic to the mail server     Status Interface Action Option Source Destination Destination port Translated Translated port  Um     A aree    e T e   y a ee  a    a    a  ce as a a ae  0 REMARK    Traffic can be to another port on the destination host     jenuey uoleinbiuo0d sn    Example 6  Load balancing    
72. e following information   Name  SSH    Path   lt path to putty exe gt   Options   ssh  2  pw SPASSWORDS SLOGINS SADDRESSS    WwW  w    Therefore  once the tool is launched  it will connect directly to the desired appliance and you will not need to enter  either a login or password     jenuen uoleinbiuo0d asp    USER MANUAL    NETASQ    we secure IT       3 3  USING THE GLOBAL ADMINISTRATION MODE    3 3 1  General    3 3 1 1  Presentation    NETASQ Global Administration works in project mode  The projects correspond to network or sub network  administration configurations  All projects are protected by a password     3 3 1 2  Creating a project    A project can be created by using the menu item File New project  or by using the corresponding  shortcut in the shortcut bar     3 3 1 3  Opening and closing a project    You can open a project by starting NETASQ Global Administration  Creating Opening a project   or via the  menu item File Open  A window opens asking you to select the project file to open  The project files  have  gap as the extension  You can also open a file by clicking on the corresponding shortcut in the    34  shortcut bar  Only one project may be open at a time  If you open a project when another project is in use   c then the latter  the project in use  will be closed automatically  When opening a project you must enter the  S password that protects it   3  S 2 Close a project either by exiting the application  or via the menu item File Quit  or by opening  
73. e secure IT       Technical support and  sysinfo     The command    sysinfo    allows viewing the full configuration of a NETASQ UTM appliance  The information  that this command returns is absolutely necessary in helping you to understand the cause of your problem   and you will be asked to provide it when you contact technical support for the resolution of a case     For information  the return of this command can be obtained from the menu Firewall NETASQ  technical support in NETASQ UNIFIED MANAGER  This menu allows saving the result for the  purpose of sending it to technical support  for example    An example  partial  of a sysinfo command return is shown below     CoP AE TE aT af Ht Ht He ae ea aE at ae ae ae ae ee ae ae a HEH        Software information it    HHHHHHHREEERAPEHREEEEAAEEHESS SHG     current date   2006 07 18 18 42 42   Seri al  gt   U70OXXA0Z0899020   7 Model  gt  U70      Software  gt   Netasg Firewall software version 6 2 1       Branch Build   EUROPE   M   UH eer LeLons   Active Main BackupVersion  6 2 1  BackupBranch   EUROPE    4 Date  Z00G O7 1li 14442 3239  Boolv Main     Uptime E 26 devs  3352  DoOurs    CHAAR EAA AA AAA EEE AHHH HS    YHHEHEHHEEHHEHEEHHEHEEHEEEAHEEEEHEEEHEHSE  oH Slot information    C HHHHEEEEEEPERAEEEREEEPRERAEEHE EES    filtering   slot filter 01      NAT s SLOL_ nat    VPN   LoL vpi    URL      TEE EEE EER AAA     gt  HHHHPHHAAHHAAHHAAHHAAHHAA HHH S  ve Memory information i  OH aE aE a aE aE aE aE aE aE aE aE aE aE aE aE aE aE
74. e you will see  that each of the system events is weighted with a maximum weight threshold on the Firewall   s general  status     3 3 4 3  Security indicators  The second section of the indicator window groups the system indicators  These indicators concern       Minor alarms  indicators relating to the number of minor alarms     Major alarms  indicators relating to the number of major alarms      ASQ memory  indicators relating to the occupation rate of the ASQ memory     USER MANUAL    NETASQ    we secure IT       The display of these indicators is based on the weight of security events in relation to each other in order to  present a coherent status of the Firewall  Each indicator is presented in the following manner     Example     percent  percent  name of the indicator    See the section on system indicators for a more thorough explanation of the information presented     Alarm status    Alarm status is set out in the section    Security Indicators    because they are closely linked  Parameters can  be set in the project options in this section     The number of alarms  major or minor  raised between NETASQ REAL TIME MONITOR updates and a  cumulative total of alarms raised from the launch of NETASQ GLOBAL ADMINISTRATION  are presented by  alarm type  major or minor      uw  N    jenuen uoleinbiuo0d asp    uw  0    jenuey uoleinbiuo0d asp    USER MANUAL    NETASQ    we secure IT       3 3 5  Administration tasks    3 3 5 1  Presentation    The primary function of NETASQ
75. ebug a network and to troubleshoot internet connections by sending out a packet to the  specified address and waiting for a response     PKI  Public Key Infrastructure     A system of digital certificates  Certificate Authorities and other registration authorities which verify and  authenticate the validity of parties involved in an internet transaction     Plugin    An auxiliary program that adds a specific feature or service to a larger system and works with a major  software package to enhance its capacity     USER MANUAL    NETASQ    we secure IT       Port redirection  REDIRECT     The use of a single IP address to contact several servers     Port scanning    A port scan is a technique that allows sending packets to an IP address with a different port each time  in  the hopes of finding open ports through which malicious data can be passed and discovering flaws in the  targeted system  Administrators use it to monitor hosts on their networks while hackers use it in an  attempt to compromise it     PPP  Point to Point Protocol     A method of connecting a computer to the internet  It provides point to point connections from router to  router and from host to network above synchronous and asynchronous circuits  It is the most commonly  used protocol for connecting to the internet on normal telephone lines     PPPoE  Point to Point Protocol Over Ethernet     A protocol that benefits from the advantages of PPP  security through encryption  connection control  etc    Often us
76. ed on internet broadband connections via ADSL and cable     132  c PPTP  Point to Point Tunneling Protocol   D  8 A protocol used to create a virtual private network  VPN  over the Internet  The internet being an open  a network  PPTP is used to ensure that messages transmitted from one VPN node to another are secure   S  z   gt        D Private IP Address  c  D    Some IP address ranges can be used freely as private addresses on an Intranet  meaning  on a local TCP IP  network  Private address ranges are     172 16 0 0 to 172 31 255 255     192 168 0 0 to 192 168 255 255     10 0 0 0 to 10 255 255 255    Private key    One of two necessary keys in a public or asymmetrical key system  The private key is usually kept secret by  its owner     USER MANUAL    NETASQ    we secure IT       Protocol analysis    A method of analysis and intrusion prevention that operates by comparing traffic against the standards that  define the protocols     Protocols    A set of standardized rules which defines the format and manner of a communication between two  systems  Protocols are used in each layer of the OSI model     Proxy    System whose function is to relay connections that it intercepts  or which have been addressed to it  In this  way  the proxy substitutes the initiator of the connection and fully recreates a new connection to the initial  destination  Proxy systems can in particular be used to carry out cache or connection filter operations     Proxy server     see Proxy      Public
77. ed with the implementation of a policy regulating  their creation and verification     USER MANUAL    NETASQ    we secure IT       Example    Combination of letters and numbers  minimum length  addition of special characters  words  which are not taken from ordinary dictionaries  etc     Administrators have the task of directing users    awareness to these practices  Cf  Part 13  PKI   chapter 6 User Awareness      For equipment in    trusted    networks which have to be protected  the control policy for traffic to be  implemented should be defined in the following manner        Complete  the standard scenarios of how equipment is used have all been considered when defining the  rules and their authorized limits have been defined       Strict  only the necessary uses of the equipment are authorized       Correct  rules do not contradict each other       Unambiguous  the wording of the rules provides a competent administrator with all the relevant elements  for direct configuration of the appliance     Hypotheses relating to human media    8 Administrators are competent non hostile persons  possessing the necessary means to accomplish  their tasks  They are trained to carry out the operations of which they are responsible  Their   C      competence and organization mean that    O    e    E    Different administrators having the same rights will not perform administrative actions which conflict   f am   S   S Example   z   S   5 Incoherent modifications to the control policy fo
78. eee e teeter treet etree ee eee eet Senet eet et etter eter etre teeter eee reenter ete e etre teeter etter rere eter tree etree eee e teeter treet rere rete teeter eter e tee ee ete e etter et ee etre rete rete eter e teeter tree ere t eee rete ee rete eet e teeter ete e terete eee teeter eee e teeter eee rete eter e teeter etter eee tree etter ene eter e etter et eet e terete terete eee rete eter eee eee eter eee ete et etter et etter etter er eee terete er ete te ttet    Thereafter the table is composed of the following columns     jenuey uoleinbiuo0d 1asp    Adding configuration    Add the appliances you want to back up to the table of appliances by clicking with the right mouse button   and then choosing Add in the contextual menu that is displayed     Then choose Firewalls if you want to select the appliances to back up or All activated  firewalls if you want to update all the active Firewalls  those with ON status in the flat view       e2        jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       To remove an appliance from the list  select it and right click on it and select Remove   The Reset button resets the configuration backup tasks     0 WARNING  for the backup to be effective the information concerning the chosen appliances must have been  updated  via the Update info button of the flat view      Backing up configurations    Click on the Update all button  The signal light then changes to orange on the appliances that are being  updated and y
79. en be requested     Address Enter the IP address of the object which the host  on which NETASQ Global  Administration is installed  can contact     Fields in bold are mandatory   Click on OK  The object is then added in the preview zone     ui       jenuey uoleinbiyuo0d asp    USER MANUAL    NETASQ    we secure IT       3 3 3 2 1  For    Network    category objects    Then the following information will be requested     Name Enter the name selected for the object  This name will be used to distinguish the object    from other equipment     Address Enter the IP address of the object which the host  on which NETASQ Global  Administration is installed  can contact     Fields in bold are mandatory   Click on OK  The object is then added in the preview zone     3 3 3 2 1  For a    Hardware    category object    Then the following information is requested     Address Enter the IP address of the object which the host  on which NETASQ Global  Administration is installed  can contact     Fields in bold are mandatory   Click on OK  The object is then added in the preview zone     ul  N    jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       3 3 3 2 1  For    Other    category objects    This category only contains the objects    Note    and    Topology     The    Note    object allows you to define a  zone where it is possible to include text in the visualization zone  Enter the text that you would like to have  displayed     The    Topology    object allows you to def
80. ere eter ete eee REPEC Eee EL EEL EE eee eee eee eee eee eter e eee e eee e teeter eet terete eter e eter e eee ere ee eee terete eee eee eee eee eee eee eee eee eee rete eee eee ee rere eee e eee e eee etree eee eee eee eee eee e eee eee eee e tee e ete etree eee eee eee eee eee eee eee eee eee ee rete e eee eee ee eee rere eee e teeter et eLetter eee ee ere eee eet etter eee e eee teeter eee eee ee eee ete e       Action successfully completed    Update version Update versions available for this appliance  You can choose the    custom    option in the  drop down list  This option allows you to choose an update file that will be stored    locally on the administration machine     fo    e2     Some information displayed may not be particularly necessary for you  and by the same token  you may    jenuen uoleinbiyuo0d 1SN    want to display information that is useful to you  You can hide and display certain table columns  To do this   click on the Customize Columns button     3 3 5 1 1  Choosing the UTM appliances to update    Add the appliances you want to back up to the table of appliances by clicking with the right mouse button   and then choosing Add in the contextual menu that is displayed     Then choose Firewalls if you want to select the appliances to back up or All activated  firewalls if you want to update all the active Firewalls  those with ON status in the flat view      To remove an appliance from the list  select it and right click on it and select Remove     USE
81. es    HTTP proxy which intercepts client requests and requires all users to  authenticate with their browsers     Protocol Port Interface   Profile Comment  HTTP 80 in 00  default  SMTP 25 out 00  default  POP3 110 in 00  default       9   fe      Figure 50  General proxy configuration  2   S       5       S   E Access to a web server    In this example  we assume that your Web server is located in the DMZ    It must be accessible from the external network  from the internet  and from the internal network  in other  words  accessible to everyone    Filtering configuration is therefore quite simple  the source host is  any   the destination host is   Private_web_ server   the service is  http  and the action to take it  Pass      Fi FILTER rule edition       Slot name   Comment    Status Protocol Source Destination  Sas Destination Port Action Log Comment    1  On tcp Q Anp H Private_web_server 2  hitp A pass       Figure 51  Editing filter rules    USER MANUAL    NETASQ    we secure IT       Q WARNING    If you carry out address translation for this web server  you have to configure and additional translation rule  to access it from your internal network using its domain name  For more information  refer to the example    on address translation dealing with this case     DNS access    We will give the group requiring web access  Network_in  access to the DNS service in order to use domain  names instead of IP addresses     The following rule allows the internal network to acc
82. ess DNS servers  internal and external   This rule is also  included in the WEB group of services     Ed FILTER rule edition    Slot name   Comment         Status Protocol Source Destination Destination Port Action Log Comment   1 0n TCP  BiNetwork_in    lt Any       Figure 52  Editing filter rules    99   c         D   Q FTP access             o FTP is a particular protocol  It uses two types of connections   S       A command connection to send and receive FTP commands       S   A data connection for the transit of traffic     In addition  FTP can be used in two different modes       Active FTP  in DOS  for example   in which the data transfer connection is made by the server   s FTP data port  The  server initiates this connection  In active FTP  the client   s private IP address is sent to the server via the command  connection  so that the server can establish the second connection  If the client   s private address is translated  the     Support for active FTP    option has to be checked in the address translation configuration so that the Firewall will  automatically modify the address sent in the FTP commands      Passive FTP  with a web browser  for example   in which the source host makes both connections itself on the FTP    server  However  the data transfer is not carried out on the server   s FTP data port but on an ephemeral port     USER MANUAL    NETASQ    we secure IT       General rule    The NETASQ Firewall includes an FTP plugin which automatically genera
83. ffer overflow    An attack which usually works by sending more data than a buffer can contain so as to make a program  crash  a buffer is a temporary memory zone used by an application   The aim of this attack is to exploit the  crash and overwrite part of the application s code and insert malicious code  which will be run after it has  entered memory     USER MANUAL    NETASQ    we secure IT       CA Certificate  or Certification     Authority   A trusted third party company or organization which issues digital certificates  Its role is to  guarantee that the holder of the certificate is indeed who he claims to be  CAs are critical in data security  and electronic commerce because they guarantee that parties exchanging information are really who they  claim to be     Certificate     see digital certificate   Certificate Revocation List  CRL   A list of expired  revoked  certificates or of those that are no longer considered trustworthy  It is published    and regularly maintained by a CA to ensure the validity of existing certificates     Challenge response    120        An authentication method for verifying the legitimacy of users logging onto the network wherein a user is  5 prompted  the challenge  to provide some private information  the response   When a user logs on  the  o server uses account information to send a  challenge  number back to the user  The user enters the  E number into a credit card sized token card that generates a response which is sent back to the 
84. flat view  then click on the Select a client button and  choose the appliance desired  this appliance is then added to the visualization zone  If you want to create a  new appliance  then click on the New client button and the following window is displayed           Parameters            NETASO   lt noname     t aonr   Computer internet         Network       General       nc   Name      Internet      Resolve    Description           Router    Hub Switch  Hardware  Other      CA  cae                Figure 27   Parameters   General    Information will then be requested under several tabs     USER MANUAL    NETASQ    we secure IT       General tab    The information requested in the General tab is necessary to insert the appliance in NETASQ UNIFIED  MANAGER     Name Enter the name selected for the appliance  This name will be used to distinguish the  appliance from other equipment     Address Enter the IP address of the appliance that the host  on which NETASQ Global  Administration is installed  can contact     Fields in bold are mandatory     Attributes tab    A  co       Parameters    NETASO               General   Attributes Information   Custom fields      Hame Value    jenuey uoleinbiuo0d asp             Computer    Network           Hardware    Other      gt  Update info      X canca         Figure 28   Parameters   Attributes    A  O    jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       This zone does not display data until after an initial update of t
85. formation items underneath the change view bar  These two information  items refer to the monitor status and the web mode status        24  a  D Figure 7  Monitor and web mode  S The web mode status is represented by an electric socket plugged  webmode activated  or unplugged  5  webmode deactivated   This option determines whether or not NETASQ Global Administration can connect    to the NETASQ web site to obtain information to update the Firewalls  To modify the mode status  double  5 click on the icon representing the plug  or define the Work offline option in the menu    Options Preferences Website access     3 2 1 3  Topological view    This view is the first view displayed when a new project is created     USER MANUAL    NETASQ    we secure IT             Figure 8  Topological view    More information about this view is provided in the course of the manual     N  ul    3 2 2  Menus    T   x 3 2 2 1  File   O    e     i Aaaa ea eo a a A A   a New project For creating a new project    z Open To open an existing project     gt  Save To save modifications made to the current project    2 Save as For saving the project under a different name    v sean ecaceonsiescuaceusuesuutendurcecacensctsnsaceeducesacsusun user on sacbevacsevacsesatonsutonsuteseasussausnsaasnssastsanszasnszsaustssussssuuansuazsauacsscsnsnsinsauazezaszesasacasinsnasisscsinaastsausuasastesssassastenasasduazsssausauvasazsusnastuansnssasisatsasnasaensitiaaansdastsaastsausisaasnsaasnsausiassstsaustssasasaasasa
86. gateway and  Static routes       Objects  object database  excluding users     NAT policies  all the address translation configuration slots     Filter policies  all filter configuration slots        Configuration and LDAP  PKI databases  configuration of the appliance   s LDAP database  as well as the elements  saved in the database  users  and PKI configuration        URL filter groups and policies  all URL filter configuration slots as well as static URL groups  created by the  administrator         Global configuration  all global configuration slots as well as global objects     a    Secure configuration and secure files  secure configuration and encrypted files secured by secure configuration     Active Update  configuration of the appliances automatic update module        0    Proxies  configuration of HTTP  SMTP and POP3 proxies     D    Certificates and pre shared keys  certificates stored in the    Certificates    menu and configured pre shared keys     D    Intrusion prevention  ASQ   configuration of the appliance   s intrusion prevention engine  ASQ    SSL VPN module configuration  configuration of the SSL VPN module     o 0    PPTP tunnel configuration  configuration of the PPTP server     D    IPSec VPN tunnels  configuration of IPSec VPN tunnels only     Lep   f gt     Time schedule  schedule defined for slots     Event rules  event rules configured manually by the administrator     o O0 0    QoS  configuration of Quality of Service policies     D    Authentic
87. hat is the meaning of the message    You lost the MODIFY privilege        Only one user can be connected to the Firewall with the MODIFY privilege  This message means that a user  has already opened a session with this privilege     In order to force this session to close  you need only connect  adding an exclamation mark before the user   s  name   admin      1 WARNING  If an administrator session is open on another machine with the MODIFY right  it will be closed     4  What is the meaning of the message    The operation has exceeded the allotted  time      As a security measure any connection between the Firewall and the graphic interface is disconnected after    a given time whether finished or not  In particular  this prevents an indefinite wait for a connection if the  Firewall cannot be reached via the network     5  How do I stop the major alarm warning indicator on the Firewall     109  c The major alarm LED lights up as soon as a major alarm is received and it remains alight as long as no one  S validates the alarm display   3  T To stop the LED  validate the option Switch off LEDs in the firewall menu in NETASQ UNIFIED MANAGER   te       gt      Q    gt   S    6  How do I know if there has been an attempted intrusion     Each attempted intrusion triggers a major or minor alarm  depending on its gravity and configuration  You  are informed of these alarms in four ways       The alarms are logged in a specific file which you can consult from the graphical interface  
88. he appliance information  The data then  displayed are     GlobalAdminOption License option that allows the Firewall to be run in    service    mode  Contact your    dealer or NETASQ sales department for more information about this mode     To refresh the data of this table  click on the Update info button at the bottom of the window     Information tab       Parameters    NETASO V50  V  gt   v0      General   Attributes   Information Custom fields          Locality  Yy Company                            Address    Yy Zip code City Country    50 T  Administration  Y Last name First name     u    E Mail    al    Computer    Network           Hardware    Other      gt  Update info    eee        Figure 29   Parameters   Information    wi  O    jenuen uoleinbiyuo0d 1SN    USER MANUAL    NETASQ    we secure IT       The information requested in this tab is optional and is used to identify the appliance     Company Enter the name of the company  or the subsidiary  department  etc   where the appliance  is installed    You can also change the appliance model selected  to do this  just select a new model in the bar to the left  of the window     The appliance is then added in the visualization zone  A question mark   is displayed in the top left corner  of the object if no information regarding the appliance has been downloaded yet  This icon will disappear  as soon as information will be updated     3 3 3 2 1  For a    computer    category object    The following information will th
89. he left mouse button  Keep the left button depressed and move the name of  the column to the    Customization    window  and then release the button     You can change the layout of the columns displayed by using the same drag  amp  drop method  This is all that  is necessary to select one column and to move it to the location desired     To revert to the original column layout  click on the Columns button  and then click on Reset     Lastly  if you want to export all project appliances  then select the menu item  All clients  If you only want    to export the previous selection then check the box Only the selection    a   Click on the Export button  choose the name and the location of the file  Then the information will be  O   S inserted in the file in a particular format  one line per appliance and each field delimited by a previously  2 selected separator    te         gt    S     3 3 1 1    Modifying the project password    It is possible to modify the password protecting the current project   Select the menu item Project Modify password   Enter the old project password  and then enter and confirm the new password     USER MANUAL    NETASQ    we secure IT       3 3 2  Managing firewalls in the flat view    3 3 2 1  Flat view    3 s Vv WS eip   amp  ons    amp    Drag a colum header here to group by that oimn  n Si      Sisus   Name    PAdders v Model v i Main pertliony   Monfotng   Serial number  gt  Logn v Password   Descnpton v Custom    Backup            Figure 16   F
90. he name of the Firewall      The level of system problems      The level of security problems      The status of the alarms        The last time the monitor in Global Administration mode connected to this firewall     3 3 4 2  System indicators  The first section of the indicators window groups the system indicators  These indicators concern     Logs  indicators relating to the occupation of space allocated to logs   Ethernet  indicators relating to interface connectivity     oO   D      CPU  indicators relating to the load of the Firewall processor       HA  indicators relating to the high availability set up  if this is present on the Firewall   J    Server  Indicators relating to some of the Firewall   s critical servers     The display of these indicators is based on the weight of system events in relation to each other in order to  present a coherent status of the Firewall  Each indicator is presented in the following manner      percent  percent  name of the indicator    56   c The following example is used to explain the information presented    D   9   S Example         D  75   17   Ethernet   S   S The first percentage listing refers to the level of Ethernet problems  For instance in this case 3 out of 4  S Firewall interfaces are not connected whereas the administrator has defined them as active in NETASQ    UNIFIED MANAGER  Surely there is a problem with these interfaces     The second percentage refers to the global incidence of these problems on the Firewall  Her
91. he walls are made of paper     Backed by the Common Criteria  NETASQ advises taking into consideration the hypotheses of use  for the Administration Suite and Firewall product stated below  These hypotheses set out the  usage requirements by which to abide in order to ensure that your Firewall operates within the  context of the common criteria certification     N    Hypotheses on physical security measures  NETASQ UTM appliances are installed and stored in compliance with the state of the art regarding  sensitive security devices  secured access to the premises  shielded twisted pair cables  labeled  cables  etc     jenuen uolneinbiuo0s 1SN    Hypotheses on organizational security measures  A particular administrative role that of the super administrator  has the following characteristics       Only the super administrator is permitted to connect via the local console on NETASQ UTM appliances   and only when installing the Firewall or for maintenance operations  apart from actual use of the equipment      He is in charge of defining the profiles of other administrators      All access to the premises where the appliances are stored has to be under his supervision  regardless of  whether the access is due to an intervention on the appliance or on other equipment  He is responsible for    all interventions carried out on appliances     User and administrator passwords have to be chosen in such a way that successful attempts at  cracking them will take longer  This can be assur
92. he window     0  i gt      3 3 12 2 2  Deploying configurations on destination UTM appliances    You can manage the deployment with three buttons     Reset Removes all the destination Firewalls from the configured deployment     Update All Starts deployment     Close Closes the deployment window  This action will cancel the deployment     jenuey uoleinbiuo0d sn    i WARNING  Information on destination Firewalls have to be up to date in order to perform a deployment  If  you cancel the update  there will be no deployment on the Firewall which has not been updated     oO  N    jenuey uoneniuos sn    USER MANUAL    NETASQ    we secure IT       APPENDICES    Appendix A  TCP IP Services    In this appendix  you will find the list of commonly used TCP IP services such as  FTP  Telnet  www  SMTP   etc  This appendix is presented in the form of a list made up of four columns        A column containing the service name      A column containing the port number associated to the service      A column indicating the protocol used  TCP and or UDP        A column containing a description of the service    We recommend that you do not enter all of these services when defining the list of objects so as to avoid  overloading your display and thus improving legibility     Service Port Protocole Description   echo 7 TCP UDP Echo   discard 9 TCP Discard   systat 11 TCP UDP Systat   daytime 13 TCP UDP Daytime   qotd 17 TCP UDP Quote of tThe Day  chargen 19 TCP UDP Character generator  ftp data 20
93. ht click on it and select Remove   D  3  E    warning  5 For the updates to be effective the information concerning the chosen NETASQ UTM appliances  9 must have been updated  via the Update info button in the flat view    S   gt   S    3 3 5 1 2  Updating the licenses of the appliances    Click on Update  The signal light then changes to orange on the appliances that are being updated and you  can see the progress bar advance  All the appliances will be updated  one after another     USER MANUAL    NETASQ    we secure IT       3 3 5 2  Backing up the partition    This feature enables backing up a complete system remotely from the main partition  the active partition   onto the backup partition  In this way  if a problem arises on the active partition  it will be possible to boot  the system using an up to date backup partition  You are strongly advised to perform a backup after each  firmware update     Select the Administration tasks Partition backup menu     By default the first column entitled    BP    is for specifying the breakpoints in the execution of the configured  task  The principle is as follows  upon specifying a breakpoint on a line  the configured task will first be  started on each of the appliances located below or on this breakpoint in the table  then if all the tasks are  successfully completed  NETASQ Global Administration mode will execute the tasks for the appliances  which follow  To specify a breakpoint  double click on the desired line  To delete a b
94. ified in advanced mode  This  results in a combination of load balancing and port re direction     Load balancing is done evenly in this version  without taking into consideration the respective load  on each host and or the availability of these hosts     USER MANUAL    NETASQ    we secure IT       Appendix E  Examples of filter rules    In this appendix we will show you how to configure certain basic rules such as     DNS access   ICMP access   Telnet access   FTP access   Access to an internal web server from the outside and from the internal network  Internet access with or without URL filtering   Client workstations    access to the mail server   Configuring a mail server   Regulating bandwidth   Verifying filter rules          6 6060 6 6 6 amp 8 8 6    Authentication    G WARNING    Some configurations could be unnecessary if you activate the specific implicit rules     ICMP access       97      In this example  we will be adding the internal network   s access to ICMP  allowing namely the use of the   T    ping    program    D   9 To add ICMP  just select    ICMP    from the list of services     4   2   S  _  Status   Interface   Protocol   Message   Source   Source Port   Destination   Destination Port   Action   Log   ASQ options       1  0n E auto icmp echo request Aa NetworkIN      lt Any gt   Dano        lt Any gt  A S p ass      gt    z   Q      Figure 48   ICMP access   te     You can filter ICMP codes  In this example  only ping  echo request  is allowed     In
95. inaccessible in the Global Administration mode for F50 and  VBox Agency appliances  The link is therefore always grayed out for these appliances     78    3 3 9  Configuration monitoring      O  S Modifying the configuration of a security appliance is one of the most sensitive administrative tasks   2 Indeed  the appliance  which has its place at the heart of the infrastructure  acts as the key to the vault that  te   5 is the entire network architecture  Every modification can lead to errors that may sometimes turn out to    be even more catastrophic for the stability of the network and even more so for the company   s    productivity  This is why the different steps involved in modifying the configuration are measured  action    by action  option by option     Version 6 3 of NETASQ appliances will be providing a tool that allows comparing configurations  With this  feature  an administrator will be able to use a configuration as a reference when comparing modifications     3 3 9 1 1  Operating principle    The Global Administration mode will establish a model for comparing configurations based on a    validated     configuration backup  This means that the configuration is constantly compared with the configuration  currently running on the monitored appliance  As soon as a difference is detected between both  configurations  the Global Administration mode will indicate so via the usual visual cues  Thereafter  the  administrator will be informed of this modification and ca
96. ine a zone  representing a different topology already defined  on  the visualization zone  clicking on the object directly accesses the view of the corresponding topology   Choose the topology that will be linked when you edit this object     For both objects  indicate the text you would like to display   Click on OK  The object is then added in the preview zone     3 3 3 2 2  Topological View contextual menu    A right click on Topological View opens the contextual menu  The features accessible from the contextual  menu are different when selecting an object or when placing the pointer over empty space  Unlike in  General View  here they are complementary  We will describe both menus     Contextual menu on a Topological View object    The Topological View contextual menu provides access to the following submenus     Configure Access to the firewall configuration        Reminder  Double clicking on the object also allows you to access the configuration     Disable Stops a firewall from being taken into account in the General View  This action allows you  to block the appliance from all actions possible in NETASQ Global Administration  without  having to remove the appliance     Disable monitoring Monitoring can now be enabled and disabled  By default  it is enabled as long as the license    allows it     USER MANUAL    NETASQ    we secure IT       Contextual menu outside a Topological View object    This Topological View contextual menu provides access to submenus for adding 
97. information about this mode     To refresh the data of this table  click on the Update info button at the bottom of the window      Information  tab       Parameters       NETASG   lt noname        VS5    General   Attributes   Information   Custom fields            Locality  Company    Address    Zip code City Country    Administration    Last name First name    E Mail            Update info       ETTE                Figure 19   Parameters   Information    USER MANUAL    NETASQ    we secure IT       The information requested in this tab is optional and is used to identify the appliance     Company Enter the name of the company  or the subsidiary  department     where the appliance is  installed     Customized  tab       Parameters       NETASG   lt noname        VS5      General   Attributes   Information Custom fields       A  N    Custom field 1    Custom field 2    Custom field 3    jenuey uoleinbiuo0d sn            Update info          Kira                Figure 20   Parameters     Custom fields    This tab allows you to provide additional information regarding the firewall     USER MANUAL    NETASQ    we secure IT       3 3 3  Managing firewalls using the topological view    3 3 3 1  Topological view    The first view that appears when you open a new project is the topological view     This view  which is more intuitive than the flat view  presents project equipment in a graphic form  showing  the topology of the network and sub networks  Several topologies can be edite
98. ing the operating system recognize the change automatically     HTTP    Protocol used for transferring hypertext documents between a web server and a web client     HTTP Proxy    A proxy server that specializes in HTML  Web page  transactions     Hub    A central connection point in a network that links segments of a LAN     USER MANUAL    NETASQ    we secure IT       Hub and spoke    Any architecture that uses a central connecting point that is able to reach all nodes on the periphery      spokes         Hybrid mode    Mode which combines two operation modes   transparent mode  bridge principle  and advanced mode   independent interfaces   The purpose of the hybrid mode is to operate several interfaces in the same  address class and others in different address classes     Hypertext    Term used for text which contains links to other related information  Hypertext is used on the World Wide  Web to link two different locations which contain information on similar subjects     126  5 ICMP  Internet Control Message Protocol   o  S A TCP IP protocol used to send error and control messages and for exchanging control information   2  S  5    IDS  Intrusion Detection System   S  Cc  D    Software that detects attacks on a network or computer system without blocking them     IKE  Internet Key Exchange     A method for establishing an SA which authenticates the encryption and authentication algorithms to be  applied on the datagrams that it covers  as well as the associated keys     I
99. is means that not only the  source address but also the source port is translated  The NETASQ Firewall uses a port available for  translation in this range  which avoids conflicts if two hosts on the internal network are using the same  source port    If you wish to remove a host from the map operation  this host   s IP address will not be translated   use the     no map    operation     The following example demonstrates how to remove a host from the map operation  the IP addresses  specified no longer correspond to the previous example      Status Action Option Source Destination Destination Translated Description  port  a a a OCU CUM  a a te a a    In this case  the    Client    host will not be mapped     O  N    Example 2  Bi directional translation    The example below illustrates a configuration which features a Web server in the DMZ   Internet        jenuey uoneniuos sn    Internal aadi  External Netwk    10 0 0 0        192 36 253 0       Router       P DMZ    192 168 10 0    C e M    Figure 45   Bi directional translation    USER MANUAL    NETASQ    we secure IT       The configuration for the address translation on the Firewall must be the following     With bi directional address translation  the server is accessible from the outside  The address used  externally is the virtual address  routable on the internet     In this way  requests coming from the outside  OUT direction  with the destination address 192 36 253 10  are changed to 192 168 10 11 and routed by Fi
100. it a   c comment  but only the Internet Engineering Task Force  IETF  decides whether the comment should  S become an RFC  A number is assigned to each RFC  and it does not change after it is published  Any  S amendments to an original RFC are given a new number    2   S   5     Router   Q     gt    Cc   D    A network communication device that enables restricting domains and determining the next network node  to which the packet should be sent so that it reaches its destination fastest possible     Routing protocol    A formula used by routers to determine the appropriate path onto which data should be forwarded  With a  routing protocol  a network can respond dynamically to changing conditions  otherwise all routing decisions  have to be predefined     USER MANUAL    NETASQ    we secure IT       SA  Security Association     VPN tunnel endpoint     SCSI  Small computer system interface     Standard that defines an interface between a computer and it s  storage peripherals  known for its  reliability and performance     Security policy    An organization s rules and regulations governing the properties and implementation of a network security  architecture     Session key    A cryptographic key which is good for only one use and for a limited period  Upon the expiry of this period     135  the key is destroyed  so that if the key is intercepted  data will not be compromised   C       D  O     9 Signature  a  S A code that can be attached to a message  uniquely identifying the
101. iuo0d sn    Figure 24   Topology viewing zone    Use this zone to create and manage the topology of each hierarchical element of the classification zone  To  do this  select the element of the hierarchy that you would like to edit  then construct your topological view  graphically  The same object can be used in several topologies but may not be used several times in the  same topology     The action bar below the topology visualization zone allows you to        Check all  this button allows you to check the status of all clients in the zone       Legend  displays a window with information on the last connection  high availability  configuration tracking and the  connection       Zoom    zooms in on the visualization zone       Zoom    zooms out of the visualization zone       Default zoom  this button allows you to reset the zoom in the visualization zone     USER MANUAL    NETASQ    we secure IT       3 3 3 2 1  Adding  editing and deleting objects in the view  Adding an object  There are two ways to add an object in a view        using the object bar to the right of the view  if it is displayed  If the bar is not displayed  then select the menu item  View Topological Main Toolbar to display it  To add an object  just select the object you want in the  desired category  then click with the left mouse button in the general view       by using the contextual menu  to do this click with the right mouse button in the visualization zone of the view   Select the object type     0
102. lat view    w  0    This view contains the list of all the NETASQ equipment that has been added in the project  that has been  added from the flat view or from the topological view    This list is displayed in table form showing the information concerning each one of the appliances     At the bottom of the view there is a bar with action buttons     jenuey uoleinbiuo0d sn    Legend Displays an information window regarding the last connection  high availability   configuration tracking and the connection     USER MANUAL    NETASQ    we secure IT       3 3 2 1  Managing appliances in a table    3 3 2 1 1  Adding appliance to the table  There are three ways to add an appliance in the flat view        use the Add button located at the bottom of the view      use the object bar to the right of the view  if it is displayed  If the bar is not displayed  then select the menu item  Views Topological main toolbar to display it  Then to add an appliance  all you have to do is choose the  desired appliance model in the NETASQ category  then click with the left mouse button in the flat view  You cannot  use the objects of the other categories in the flat view       by using the contextual menu  To do this  click with the right mouse button in the flat view  Choose the    Add       option     In these three cases the following window opens  asking you to enter the information relating to the new  firewall        Parameters                NETASO   lt noname      vss  General   Attributes   
103. ll authorize the  Client  host to connect to the  Private WEB Server1  in order to    perform administrative duties   Fa FILTER rule edition       Slot name   Comment      Status Protocol Source Destination Destination Port Action Log Comment  Tw On tcp Client Ef Private_web_server       Figure 54  Editing filter rules    Only the host    Client    will be able to conduct telnet session on the web server located in the DMZ     USER MANUAL    NETASQ    we secure IT       IPSec connections    After setting the IPSEC VPN parameters on the Firewall  filter rules have to be implemented to authorize  these protocols on the Firewall  except if implicit rules are activated for this traffic type    The first phase of the IKE protocol is negotiated on UDP port 500  ISAKMP   It is therefore necessary to  authorize connections on this port on the Firewall interface with the tunnel is concerned     In the case of an outgoing IPSec connection  a connection on the remote Firewall on the ISAKMP port must  be accepted     Depending on the protocols selected in VPN configuration  ESP   these protocols have to be allowed to  reach the Firewall  These rules are not taken into account by the Stateful Inspection module and therefore  have to be positioned in both directions of communication   The first three rules in the following screen allow the VPN tunnel to be established between the local and  remote Firewalls  these 3 rules have to be indicated on both Firewalls using VPN   For an anonymous 
104. lowing remote access to the Firewall in order to run  programs  SSH bridges the security weaknesses of remote accesses such as telnet by providing the essential  security services  server authentication  confidentiality of traffic  especially passwords     SSH is based on the RSA asymmetric cryptography technique for authentication and it uses IDEA  symmetrical algorithms for traffic confidentiality     Activating the SSH server on the Firewall    The service is deactivated on the Firewall by default  so it must be activated through the  Firewall Security menu     me The admin user   s private key is required for authentication at the time of connection  You must therefore  Save it and store it in a directory on the PC from which the SSH connection will be run    8 The Firewall filtering blocks the Firewall   s connection to port 22  SSH  by default  so you must set up a filter  e rule to authorize this communication    D        gt        Q     gt    Cc   D    Client section configuration    G WARNING    You need SSH software that supports version 2 of this protocol in order to use it with the Firewall     The client configuration depends on the client software used     USER MANUAL    NETASQ    we secure IT       Appendix J  Configuring other equipment    In order to achieve optimum performance on your NETASQ Global Administration  there are several  operations to carry out on your NETASQ appliances and on filtering equipment on your network  the  central Firewall  for instan
105. mplicit filter rule    Filter rule that the firewall implicitly generates after the administrator has modified its configuration  For  example  when the http proxy is activated  a set of implicit filter rules will be generated in order to allow  connections between the client and the proxy as well as between the proxy and the server     USER MANUAL    NETASQ    we secure IT       Interface    A zone  whether real or virtual  that separates two elements  The interface thus refers to what the other  element need to know about the other in order to operate correctly     Internet Protocol    Protocol used for routing packets over networks  Its role is to select the best path for conveying packets  through the networks     IP Address     IP being Internet Protocol   An IP address is expressed in four sets of numbers  from 0 to 255  separated by  dots  and which identify computers on the internet    IPS  Intrusion Prevention System     System that enables detecting and blocking intrusion attempts  from the Network level to the Application  level in the OSI model     IPSEC   d A set of security protocols that provides authentication and encryption over the internet and supports  secure exchanges  Itis largely used for the setup of VPNs  Virtual Private Networks     z   E ISAKMP  Internet Security Association and Key Management Protocol    f am   D   5 A protocol through which trusted transactions between TCP IP entities are established        Q     gt    Cc   D    Kernel    The core
106. n account  i WARNING  For security reasons  you are advised against filling in this field  passwords are displayed in plaintext      E mail address for the administration account   Company of the Firewall contact person     Description of the firewall    Last name of the contact person for the Firewall     Custom1    First name of the contact person for the Firewall    Custom2   Postal code of the city where the Firewall is     Custom3 installed     ZipCode    SuperviseGenerationPassword     City where the Firewall is installed    SuperviseFirewallValidBackup     Country where the Firewall is installed    MonitoringOn    USER MANUAL    NETASQ    we secure IT          To export information on appliances to a file  go to the menu File Export firewall file       First select the type of separator that will be used between each field of the file  Also indicate the text  delimiter     Then choose the columns that you would like to export  To do this  click on the Columns button and then  click on Customize     In this window you will find the names of the columns that are not displayed but which can be displayed  To  display a column  select the name of this column with the left mouse button  and keep the mouse button  depressed  Then move the column header to where you would like to insert it in the preview  and then  release the mouse button     To hide a column  use the reverse operation  in the column header bar  select the name of the column that  you want to hide  by using t
107. n view the changes using the menus in the Global  Administration mode together with a file comparison software     USER MANUAL    NETASQ    we secure IT       3 3 9 1 2  Setting up configuration monitoring    T Step 1  Activating configuration monitoring  Enable configuration monitoring by selecting the option Enable configuration monitoring   Cf   Configuration monitoring for more information on the available parameters in this menu      z Step 2  Setting up the Monitor  Activate the monitor in Global Administration mode to enable constant monitoring of the appliances on  which configuration monitoring has been implemented   Cf  Configuration monitoring     El Step 3  Backing up and validating a configuration   The third step in setting up configuration monitoring is the backup of a configuration that will be  considered    validated      Refer to    Configuration    under the section    Administration    in the chapter     Project    to find out how to back up a configuration   During this backup  the option Validate the  configuration must be checked     When the configuration is backed up  monitoring for the backed up and validated configuration will be  activated  NETASQ Global Administration will then check for changes made to this configuration and  informs the administrator of the same     79    3 3 9 1 3  Detecting modifications on a monitored configuration  a  D  O   e      e Indicator of modifications made to the  validated  configuration  D  S As soon as a modific
108. naged appliances  In this case  indicate a password and  confirm it      One password per firewall  a different validation password is defined for each  appliance    m aa tet av cane io eae ee ee   an external comparison tool  such as Winmerge   To do so  first specify the file  comparison application by indicating the path to the program  Then select the    command lines that will be used when the application is launched  By default     N  O    two arguments      F1    and     F2    should be found  respectively representing    local    validated    configuration files and firewall files     0 REMARK  Quotes have to be used in command lines if the names of your firewalls  contain spaces or other arguments that you can specify     jenuey uoleinbiyuo0d asp    USER MANUAL    NETASQ    we secure IT       3 2 4  Options    3 2 4 1  Behavior           j     Preferences              4QG     i     See Interface   Behavior iii    O License     a N Website access         cee Automatic  ei Application update ia  a  H Interface     Re open the last project  auto launch   i ARF  Behavior   LIN  Obiect database l   Remember desktop layout     Folders   Close  Get Info  window when successful    2 Administration suite   External tools  V  Reconnect to host after firmware update   Es Connection settings      Confirmations     V  Confirm when disconnecting from host       Cancel message confirmation Reset settings                         w  O    Figure 12   Interface   Behavior    Reopen las
109. nce   s security policy is concerned   Select the menu Configuration Filter Edit the active slot     First  create a host by clicking on Edit objects  This host represents the NETASQ Global Administration  administration host and therefore possesses the host   s IP address    i WARNING  In the case of address translation  please pay careful attention  if an equipment carries out address  translation between the host and the appliance  the translated address has to be used     USER MANUAL    NETASQ    we secure IT       Then create a rule indicating that    firewall srv    type connections coming from the NETASQ Global  Administration host are authorized on the appliance     If the NETASQ Global Administration mode accesses the appliance via a VPN tunnel   If NETASQ Global Administration accesses the appliance via a VPN tunnel  do not forget to authorize TCP  port 1300 to pass through the tunnel  On a NETASQ Firewall  you only need to add a rule in the filter rules   authorizing    firewall _srv    connections coming from the IPSec interface to connect to the appliance     Next  select the menu Configuration VPN IPSec tunnels Edit the active slot  and  click on Extra parameters  Ensure that you have checked the option    Consider IPSec peers as internal        Using the operation check tool    The appliances    operation check tool and status indicators use ICMP  ping command   therefore it is  necessary to authorize this data flow type on the appliance in order to use this fe
110. need to add three rules        The first one to authorize PPTP clients to connect with PPTP  TCP port 1723  on the Firewall interface used for PPTP  connections     Two other ones to authorize the GRE protocol  encapsulation protocol  from the client to the Firewall and in the    opposite direction     USER MANUAL    NETASQ    we secure IT       Example    Take for example a host connecting to its provider A  Generally  this provider assigns IP addresses in a  particular range which is possible to locate     Therefore we will create an object called  Provider_IP_pool  with this range of addresses  If you don t know  these addresses  you can leave the object as  any      The internet connection is considered linked to the Out interface of the Firewall and the mobile  workstations reach this interface to connect with PPTP     The filter rules  in this case  are     Fa FILTER rule edition           Slot name   Comment    Status Protocol Source Destination Destination Port Action Log Comment  T On ge  HProvider_IP_pool HfFwal_daup ppp pass  2 0n tcp    BProvider_IP_pool    SF wall_dialup O  lt Any    pass    Figure 56  Editing filter rules    Di Bandwidth control   C      The NETASQ Firewall allows you to limit the available bandwidth  This is achieved by authorizing the  8 passage of a limited number of bytes per second    E   c     The level can be defined with precision as you can limit each of the IP protocol services  for each different  5       machine    Q     gt    S    B
111. ng  balancing connections over a pool of servers     Example 1  Unidirectional translation of the internal network    The diagram below offers an example of configuring unidirectional address translation from the whole  internal network to a virtual address on the external network     O          Router    Internal EEE  A External Netwk    10 0 0 0      192 36 253 0       jenuey uoleinbiyuo0d 1SN    Figure 44   Unidirectional translation    Concerning the NETASQ Firewall  the corresponding configuration for address translation is     Status Action Option Source Destination Destination Translated Description  port  On Map None Ntwk_in  lt Any gt   lt Any gt  Firewall_ out    Typically  this configuration allows all hosts situated on the internal network to gain access to the internet   The hosts leave the network with the virtual address 192 36 253 240 and can receive responses to their  requests     USER MANUAL    NETASQ    we secure IT       It is necessary  of course  for the virtual address on the external network to be routable on the internet   official IP address     However  internal hosts are not reachable from the outside  unidirectional   if a connection request to  address 192 36 253 240 reaches the Firewall  no address translation will be carried out to a host   s address  on the internal network     Moving on to advanced configuration  button EH it is worth noting that this rule translates  destination ports to a range called ephemeral_fw  port 20000 to 59999   Th
112. ng wireless access to a network     USER MANUAL  NETASQ       we secure IT          NETASQ    we secure IT    documentation netasq com    
113. nserted into a seemingly benign program  which when executed  will perform fraudulent acts such  as information theft     TTL  Time to Live     The period during which information has to be kept or cached     USER MANUAL    NETASQ    we secure IT       UDP  User Datagram Protocol     One of the main communication protocols used by the internet  and part of the transport layer in the  TCP IP stack    This protocol enables a simple transmission of packets between two entities  each of which has been  defined by an IP address and a port number  to differentiate users connected on the same host      Unidirectional translation  MAP     This translation type allows you to convert real IP addresses on your networks  internal  external or DMZ   into a virtual IP address on another network  internal  external or DMZ  when passing through the firewall     URL filter    Service that enables limiting the consultation of certain websites  Filters can be created in categories  containing prohibited URLs  eg  Porn  games  webmail sites  etc  or keywords     138      URL  Uniform Resource Locator    C         S Character string used for reaching resources on the web  Informally  it is better known as a web address    3   2   c     User enrolment    gt    z or     l     D When an authentication service has been set up  every authorized user has to be defined by creating a   Cc   D       user    object  The larger the enterprise  the longer this task will take  NETASQ   s web enrolment service
114. nternal  interface in advanced mode      108   that your host has indeed a different IP address from the Firewall but is on the same sub network          that the connections are properly in place  use a crossover cable only if you are connecting the Firewall directly to  T a host or a router  Type  arp  a  in a DOS window under Windows to see if the PC recognizes the NETASQ  S Firewall   s physical address  Ethernet   If it doesn   t  check your cables and the physical connections to your hub      S   that you have not changed the Firewall   s operating mode  transparent or advanced     S    that the Firewall recognizes the IP address  see    How can I check the IP address es  really assigned to the  o Firewall               that the access provider for the graphical interface has not been deactivated on the Firewall    gt    c         2  How can   check the IP address es  really assigned to the Firewall     If you wish to check the IP address es  or the operating mode  transparent or advanced  you need only  connect to the Firewall in console mode  To do so you can either conduct an SSH session on the Firewall  if  SSH is active and authorized  or connect directly to the appliance by the serial port or by connecting a  screen and a keyboard to the appliance     Once connected in console mode  with the admin login  type the command ifinfo  This will give you the  network adapter configuration and the present operating mode     USER MANUAL    NETASQ    we secure IT       3  W
115. of tricking an intrusion detection system by presenting to  it packets formed from similar headers but which contain data different from what the client host will  receive     Denial of service  DoS  attack    An attack which floods a network with so many requests that regular traffic is slowed down or completely  interrupted  preventing legitimate requests from being processed     USER MANUAL    NETASQ    we secure IT       DHCP  Dynamic Host Configuration Protocol     Protocol that allows a connected host to dynamically obtain its configuration  mainly its network  configuration   DHCP finds its own IP address  The aim of this protocol is to simplify network  administration     Dialup    Interface on which the modem is connected     Diffie Hellmann key exchange algorithm    An algorithm that enables parties to exchange public keys securely in order to arrive at a shared secret key  at both ends  without ever having to transmit the secret key  thereby avoiding the risk of the secret key  being intercepted  It does not carry out data encryption  and can even be used over untrusted channels     The Diffie Hellmann negotiation groups are  for example     Group 14 which uses a xxxx bit key length     Group 15 which uses a xxxx bit key length     Group 16 which uses a xxxx bit key length     Digital certificate    122   o The digital equivalent of an identity card for use in a public key encryption system  these are mainly used to  5 verify that a user sending a message is who he
116. ons backup will be stored   When NETASQ Global Administration retrieves a configurations backup  the file  will be stored in this directory  By default the folder is     administration Suite 7 0 installation directory  Backup     jenuey uoleinbiyuo0d sn    Script folder In this field  indicate the folder in which scripts will be saved  By default the folder is      Administration Suite 7 0 installation directory  seript     3 2 4 1  External tools    This tab enables configuring external tools such as SSH or telnet  max  12   which may be launched for an  appliance  or for any other equipment for which the    IP address        login    and    password    fields have been  entered in the information record      USER MANUAL    NETASQ    we secure IT                 s     Preferences    F pa he External tools  License ja     3 X Website access  oi 3 Application update Tool name  a Path db Add    a  H Interface    off  Behavior   Afi Object database  a Folders   3 Administration suite  a External tools   3 Connection settings                                     0 itemfs          Options      Display a warning in case of empty parameter                    CA Xie       Figure 14   Pr  f  rences   External tools    To add an external tool  click on Add     External tool config       Tool name      Ww  N    Path      Options      saian          ECTE          Figure 15   Configuring external tools    jenuey uoleinbiuo0d sn    In the window which appears  indicate the following informa
117. or exchanging parameters and another for the actual data    O   S     Full duplex   c   te    5 Two way communication in which sending and receiving can be simultaneous    z   Q     gt    Cc   D    Gateway    Host which acts as an entrance or connection point between two networks  such as an internal network  and the internet  which use the same protocols     Gigabit Ethernet    An Ethernet technology that raises transmission speed to 1 Gbps  1000Mbps      USER MANUAL    NETASQ    we secure IT       Half duplex    One way communication mode in which data can only be sent in one direction at a time     Hash function    An algorithm that converts text of a variable length to an output of fixed size  The hash function is often  used in creating digital signatures     Header    A temporary set of information that is added to the beginning of the text in order to transfer it over the  network  A header usually contains source and destination addresses as well as data that describe the  contents of the message     High availability    125  A solution based on a group of two identical Firewalls which monitor each other  If there is a malfunction in  c the Firewall software or hardware during use  the second Firewall takes over  This switch from one Firewall  S to the other is wholly transparent to the user   3  2  c    Hot swap  S  D The ability to pull out a device from a system and plug in a new one while the power is still on and the unit  Cc  D    is still running  all while hav
118. ou can see the progress bar advance  All the appliances will be updated  simultaneously     3 3 5 2 1  Restoring the configuration    2 To back up the configuration of one or several appliances  select the menu Administrative  tasks Configuration Restore  There are four steps in the restoration of a configuration     hu Step 1    Configuration Restore Wizard    Select a backup date  IF you select a date that has no  available backup  you will have to do a manual one       Last backup       Last backup made this day  18 04 2012      From a specified file        Previous   Cancel         Figure 35   Restoration wizard    Steps 1 and 2 consist of defining the backup to be used for the restoration by defining the backup date and  source    Last backup  This option is for specifying the last backup located in the configuration backup directory    Last backup made on the date indicated  This option is for specifying the last backup on the date indicated  in the configuration backup directory  Use the calendar provided to define the search date    From file  Specify the backup file that you wish to restore  If you select this parameter  the wizard will skip  Step 2  explained below      USER MANUAL    NETASQ    we secure IT       ka Step 2    Configuration Restore Wizard    Select a restoration mode  Wou can select a backup tile from  another firewall and mass deploy it  For firewalls in High  Availability  apply only ther own backup files         From source firewall      gt  From 
119. ouble quotes     Example     Delete this entry      1 2 5  Examples  Example    This allows you to have an example of a procedure explained earlier     1 2 6  Command lines  Command lines  Indicates a command line  for example  an entry in the DOS command  window         N    1 2 7  Reminders    Reminders are indicated as follows      Reminder     jenuen uoleinbiyuo0d 1SN    1 2 8  Access to features    Access paths to features are indicated as follows      Access the menu File Firewall     USER MANUAL    NETASQ    we secure IT       1 3  VOCABULARY USED IN THE MANUAL    Appliance Refers to the security device  firewall   The terms    appliance    and    security device     are used interchangeably     UTM Fxx Refers to the NETASQ product range  Other terms also used  NETASQ Fxx  Fxx  appliance     Intrusion Unified Threat Management is also used in its place   prevention    Configuration  or policy   Configuration files which allow generating filter and NAT policies  for  slot example     ray  w    1 4  GETTING HELP    To obtain help regarding your product and the different applications in it       website  www netasg com  Your secure access area allows you to access a wide range of  documentation and other information     user manuals  NETASQ UNIFIED MANAGER  NETASQ REAL TIME and NETASQ EVENT REPORTER     jenuey uoleinbiuo0d sn    lads TECHNICAL ASSISTANCE CENTRE    NETASQ provides several means and tools for resolving technical problems on your firewall       A knowledge b
120. oyed  A  macro has to be framed by the character         in order to be interpreted correctly  e g   MACRO      The following macros can be used in scripts     ib WARNING  Macros are not case sensitive     APP_PAT  Full path of the file  including the application    path delimiter      FW_ADDRESS  Firewall   s IP address    FW_COMPANY  Company in which the firewall has been installed   FW_COUNTRY  Country in which the firewall has been installed   FW_DESCRIPTION  Firewall   s    Description    field    FW_LOCATION  Location of the firewall    FW_MODEL  Firewall   s model    FW_NAME  Firewall   s name    FW_SERIAL  Firewall   s serial number    FW_VERSION  Firewall   s version name    FW_ZIP_CODE  Zip code of the area in which the firewall was installed   FW_CITY  City in which the firewall was installed    FW_CUSTOM1  Custom field number 1    FW_CUSTOM 2  Custom field number 2    FW_CUSTOMS  Custom field number 3    NOW  Full date of the local format    NOW_AS_DATE  Date of the local format    NOW_AS_TIME  Time of the local format    SCRIPT_PATH  Full path of the script file  including the application    path delimiter      ADMIN_LASTNAME  Administrator   s last name    ADMIN_FIRSTNAME  Administrator   s first name    ADMIN_EMAIL  Administrator   s e mail address     a E a E Se ee ee    ee    eS ee ee          ee ee ee ee ee a e    Functions    Certain undefined functions in the NSRPC commands have to be used for backup and restoration  operations  for example  These function
121. pply  smtpe 420 TCP   UDP SMPTE  https 443 TCP   UDP Https Mcom  microsoft ds 445 TCP   UDP  a kpasswd 464 TCP   UDP Kerberos  v5   c isakmp 500 UDP Internet Key Exchange  S exec 512 TCP   UDP Remote process execution  3 biff 512 TCP   UDP Notify user of new mail received  S login 513 TCP   UDP Remote login  5 who 513 TCP   UDP Who s logged in to machines  S cmd 514 TCP   UDP Remote exec  S syslog 514 TCP   UDP  printer 515 TCP Spooler  talk 517 UDP  ntalk 518 UDP  router 520 TCP   UDP Extended File Name Server  timed 525 UDP Timeserver  tempo 526 TCP  courier 530 TCP  conference 531 TCP  uucp 540 TCP  klogin 543 TCP Kerberos login  kshell 544 TCP Kerberos remote shell  remotefs 556 TCP Remote login using Kerberos  rmonitor 560 UDP       USER MANUAL    NETASQ    we secure IT       rmonitor 561 UDP   whoami 565 TCP   UDP   Idaps 636 UDP LDAP over TLS SSL  Kerberos adm 749 TCP   UDP Kerberos administration  Kerberos iv 750 UDP Kerberos version IV    Appendix B  Data input control    When configuring the firewall  different types of data will have to be entered         P address      Comments     File name       Object name  host  network  service      Each of these data types accepts a specific group of characters  These characters are filtered during  parameter input     s2 IP address  The only characters accepted are the figures  0  to  9  and the decimal point      To erase a character  use  C     the Backspace or Del keys   O   e      e Comments    You can use conventional 
122. r that has been personalized in the color palette for the    Custom     link type     Source The drop down list allows you to specify whether an arrow should point to the source  object  first object selected when creating the link      Destination The drop down list allows you to specify whether an arrow should point to the  destination object  second object selected when creating the link      The link is then completely created and joins both objects  It is also possible to link a topology object to  other objects     a    P 2    Figure 30   Link    The link will be displayed differently depending on parameters chosen in the previous window  a different  color for each link type  a thick line for a high throughput link  a key on the link if an encryption level has  been chosen     ui  A    Modifying a link    To modify the properties of a link  double click on it with the left mouse button and the window that was  described previously will open     jenuey uoleinbiuo0d sn    It is possible to modify the link appearance if you want curved lines to represent the links for layout and  object presentation reasons  To do this click with the left mouse button on the place where you want a  curve  then move the link  keeping the mouse button depressed  Release the button when the appearance  of the link is satisfactory     T    Server    Ful 2 b    Figure 31   Link    uw  ul    jenuey uolneinbiyuo0d 1asp    USER MANUAL    NETASQ    we secure IT       Deleting a link    To delete a
123. r traffic        The use of logs and treatment of alarms are carried out within the appropriate time limits     Hypotheses on the IT security environment  NETASQ UTM appliances and installed in accordance with the current network interconnection  policy and are the only passageways between the different networks on which the control policy  for traffic has to be applied  Connection peripherals  modems  are prohibited on    trusted     networks     Besides applying security functions  NETASQ UTM appliance do not provide any network service  other than routing and address translation     USER MANUAL    NETASQ    we secure IT       Example    no DHCP  DNS  PKI  application proxies  etc      NETASQ appliances are not configured to retransmit IPX  Netbios  Appletalk  PPPoE or IPv6 traffic     NETASQ UTM appliances do not rely on    online    external services  DNS  DHCP  RADIUS  etc   in  order to apply the control policy for traffic     Protecting workstations  remote administration stations are secure and kept to date of all known  vulnerabilities concerning operating systems and the hosted applications  They are exclusively  dedicated to the administration of firewalls     Network equipment which the firewall uses to establish VPN tunnels are subject to constraints  relating to physical access  protection and control of their configuration  These constraints are  equivalent to those faced by the TOE   s firewall VPN appliances     Protecting clients  workstations on which autho
124. reakpoint  double click  on the breakpoint     By default the second column displays a signal light  The color of the signal light depends on the status of the action     69    Action cancelled or not performed    ee eee eT TCE TCC ee eer errr CECE A N RCCL A C TCC T CECT LOTTE LOTTO RCCL CRETE CECT TEL N M E ORCC ETC TCT E CECT CCE ELC P CCE L CECE TCT C RCT TCT C CTE T CECT ITEC CTE ECCT ITEC CTI M CR CT ITE CRETE ECCT ITC ET ITEC T CETTE LCCC T TEC E i IEEE ITEC E TPCT I TCE TTC TIT TERETE TCC TTC R M M R E CRC ITEC T CTI TCC T CCITT CCITT ITT CeCe Tree TT Terre Ts      Action successfully completed    jenuey uoleinbiuo0d asp          O    jenuey uoleinbiyuo0d sn    USER MANUAL    NETASQ    we secure IT       3 3 6  Scripts    Global Administration enables the deployment and execution of formatted scripts according to the NSRPC  configuration mode  which allows the full configuration of NETASQ appliances  As such  scripts provide a  solution for deploying the configuration of a whole fleet of appliances for features that have not been  included in Global Administration   s deployment menus     2 Selecting the Administration tasks Script menu item opens the window    Executing scripts        Step 1    Script wizard    Step 1 of 2       Figure 40   Script wizard   Step 1    The first step in the script deployment wizard requires the definition of a script that has to be deployed and  then executed  Therefore  select the script to be executes on the firewalls and click on Nex
125. rect Configuration    section of your choice    USER MANUAL    NETASQ    we secure IT       3 3 12  Deploying configurations    3 3 12 1  Access    The cornerstone of a computer system   s security is a security policy that is calculated  designed and  implemented by administrators and persons in charge of data security  confidentiality  integrity and  authenticity  and the system   s resources     When network elements making up the computer system operate in various versions  this weakens security  policies defined on theoretical  therefore ideal  working models  Ensuring that your systems are  homogeneous means better use of an efficient and powerful security policy     Everyday  centralized management tools help administrators to locate the system   s weaknesses  even  flaws  and to fight their effects  The Global Administration mode takes a step further than other products  by easing the deployment of homogeneous configurations on products in the NETASQ range     Based on the principle of a client server mode  the Global Administration mode enables deploying  configurations  objects  ASQ kernel  QoS rules  or slots  filter  global filter  translation  URL filter  to all    NETASQ appliances     clients     on a network from a source Firewall  the    server         Deployment features are accessible in two ways     81   c    the contextual menu enabling general and topological views    D    the menu Administrative tasks Deployment in the main window         zA           t
126. rewall to the DMZ     Example 3  Access to a web server in the DMZ    The example below illustrates a configuration with three sub networks  internal  external and DMZ  and a  web server in the DMZ  We want the web server to be accessible from the outside but also from the inside  with its official  virtual  address     O  Ww       Internal ETE 4 External Netwk    10 0 0 0          192 36 253 0    Router       jenuey uoleinbiuo0d sn    Pe DMZ  192 168 10 0    ci Mm    Figure 46   Web server in DMZ    If a host on the internal network wants to connect to the web server via its URL  the first thing to be carried  out is DNS resolution     In the event the DNS server is external  it will send back the virtual address of the web server as it is known  on the internet  192 36 253 10   The machine therefore sends its request with this destination address   Because the targeted machine does not exist on the internal network  the request is sent to the internet  and is lost or sends back an error message  The request can also be sent back by the router     USER MANUAL    NETASQ    we secure IT       It is therefore necessary to translate this virtual address on the internal Firewall interface to the server s  real address in the DMZ  We also want the server to be accessible from the external network with this  virtual address     We therefore have the same rule twice but applied to different interfaces  The interface is selected in       advanced mode   gt   button   By default  the 
127. rized users execute their VPN clients are subject to  constraints equivalent to those on client workstations in    trusted    networks  These constraints are  namely  the control of physical access  protection and command of their configuration  Trusted    oO    networks are secured and kept to date of all known vulnerabilities concerning operating systems    and the hosted applications       These services are available on firewalls but are not part of the scope of evaluation of the  common criteria     jenuey uoleinbiyuo0d asp    USER MANUAL    NETASQ    we secure IT       1  INTRODUCTION    NETASQ UNIFIED MANAGER is an application that allows you to securely update your product locally or  remotely     With it  you will be able to configure the following     your network       your objects    a    your security poilcy     internet access from your internal network  NAT   a    your backups    1 1  WHO SHOULD READ THIS     This manual is intended for network administrators or  at the least  for users with IP knowledge     In order to configure your NETASQ UTM firewall in the most efficient manner  you must be familiar with IP    operation  its protocols and their specific features   7   ICMP  Internet Control Message Protocol   8    IP  Internet Protocol        TCP  Transmission Control Protocol   a   UDP  User Datagram Protocol   5  5  5 Knowledge of the general operation of the major TCP IP services is also desirable     HTTP     FTP     Mail  SMTP  POP3  IMAP      Telnet 
128. s begin with the character   and are case sensitive     The syntax for these functions is therefore as follows  SFUNCTION    file path      Please note that the  quotation marks following the opening bracket and preceding the closing bracket are mandatory        Ww    jenuen uoleinbiyuo0d 1SN    USER MANUAL    NETASQ    we secure IT       The following are the functions       SAVE_TO_DATA FILE  Saving a file without Unicode treatment      SAVE_TO_TEXT_FILE  Saving a file with Unicode treatment      FROM_DATA FILE  Reading a file without Unicode treatment      FROM_TEXT_FILE  Reading a file with Unicode treatment       DATA_FILE functions are used for   na files while  _TEXT_FILE functions will be used for slot files  for  example     a WARNING  File names must follow the restrictions imposed by Windows operating systems  ie  a file name  cannot contain Er Er E ar u nm n Ear         and ei    Example    Confirmation    A few examples of script are given below       Configuration backup  CONFIG BACKUP list all SSAVE TO DATA FILE   APP PATH3 FW NAME  all na       t RESEOCALION Of filter rules Greated on 1671777005  CONFIG RESTORE list filter  SFROM DATA FILE   APP PATH 16 12 2005 all na      HACTIVaLIOn Of Tilter rule 05  CONFIG SLOT ACTIVATE type filter config 5    3 3 7  Deployment  Use this menu to access each of the screens enabling the deployment of security policies and of object  databases  The NETASQ Global Administration mode allows deployment of the following policies 
129. s concerned    U30  U70  U120  U250  U450  U1100  U1500  U6000   NG1000 A and NG5000 A   VS5  VS10  V50  V100  V200  V500  VU     USER MANUAL    NETASQ    we secure IT       CONTENTS  FOREWORD 4 APPENDICES 87  Appendix A  TCP IP Services 87  Appendix B  Data input control 89  4  INTRODUCTION 10 Appendix C  ICMP Codes 90  1 1  WHO SHOULD READ THIS         140 Appendix D  Configuration examples for NAT 91  1 2  TYPOGRAPHICAL CONVENTIONS 11 APPENAD E ae ee erence sl  1 2 1 Abbreviations 11 Appendix r eommangs bate  1 2 2 Display 11 Appendix G  FAQ 108  1 2 3  Indications 11 Appendhi ti nor Ole DMZ MI  1 2 4 Messages 12 Appendix I  Connecting to the SSH server 112  Appendix J  Configuring other equipment 113  1 2 5 Examples 12 PP g g mP  1 2 6 Command lines 12  1 2 7 Reminders 12  1 2 8 Access to features 12 GLOSSARY 116  1 3  VOCABULARY USED IN THE MANUAL 13 TT  1 4  GETTING HELP 13  1 5  TECHNICAL ASSISTANCE CENTRE 13  2  SOFTWARE INSTALLATION 14  2 1  PRE REQUISITES 14  2 2  INSTALLING VIA CD ROM 15  2 3  INSTALLING VIA YOUR PRIVATE AREA 15  2 3 1 Verification procedure 16  2 3 2 Client and server administration suite  choice of  package 16  2 3 3 Registration 17  3  GLOBAL ADMINISTRATION 18  3 1  PRESENTATION 18  3 1 1 Description 18  3 1 2 Access 19  3 1 3 Creating opening a project 19  3 2  GLOBAL ADMINISTRATION 21  3 2 1 User interface 21  3 2 2 Menus 29  3 2 3 Project 27  3 2 4 Options 30  3 3  USING THE GLOBAL ADMINISTRATION MODE34  3 3 1 General 34  3 3 2 Managing firew
130. se  to download updates and to access NETASQ   s technical support        N    jenuen uoleinbiuo0d asp    USER MANUAL    NETASQ    we secure IT       3  GLOBAL ADMINISTRATION    In this section  the general use of the NETASQ GLOBAL ADMINISTRATION configuration graphical interface  is explained    Do note that in version 9  NETASQ UNIFIED MANAGER will no longer be supported  but it will continue to  be supported in versions 8 and earlier      NETASQ GLOBAL ADMINISTRATION is the software solution for easily and affordably managing from a  single central point certain administration actions over an entire fleet of NETASQ products     3 1  PRESENTATION    3 1 1  Description    Managing installed security assets is often a complex and time intensive task  involving numerous  operations on each product in order to maintain an optimal level of security  A security product must be  updated frequently in order to handle the new IT threats that appear on a daily basis  These updates  if    18 they are executed manually on each product  require significant human resources   5 NETASQ Global Administration allows conveniently managing certain administrative functions for the whole  o group of NETASQ products at a lower cost  since this is done from a central unique location  these functions   gt   a are   f am  5  o    centralized automatic update of NETASQ firmware       centralized automatic update of licenses      deployment of security policies and object databases   7    centralized 
131. se fields in the file for which you require information     You will then be able to define the rules governing the import of the information  First of all  you must  specify the type of separator between the information  comma  semi colon  or particular character that  you must define  and the type of delimiter for text zones    Then you can move the columns of the preview zone using a drag  amp  drop method so that the file  information corresponds to the preview of the column layout  This layout will then be applied to the file  during the import of the information     In our preceding example you had to choose the separator comma and place the columns in the following  order     Name Address Login Country Email    The contents of the file will then be displayed in the    Preview    zone  If information that is present in the file  does not appear  then verify that you have correctly separated the file fields using the right separator   Importing a file allows you to add the file information in the flat view  All the Firewall information already  contained in the flat view is retained after import     36  7 3 3 1 1  Exporting firewall from a project  O  S All appliances in the general view of a selection of some of them can be exported to a  csv or  txt file   2 This file could contain the following information for each appliance   te            Name of the Firewall       IP address of the Firewall  2    Name of the administration account     Password for the administratio
132. server   f am  S      gt     Chassis      Cc  D    Also called a case  it is a physical structure that serves as a support for electronic components  At least one  chassis is required in every computer system in order to house circuit boards and wiring     Context    The current status  condition or mode of a system     Common criteria    The common criteria  an international standard  evaluate  on an Evaluation Assurance Level or EAL scale of  1 to 7  a product   s capacity to provide security functions for which it had been designed  as well as the  quality of its life cycle  development  production  delivery  putting into service  update      USER MANUAL    NETASQ    we secure IT       Contextual signature    An attack signature  ie  the form that an attack takes  ASQ relies on a database of contextual signatures to  detect known attacks in a short time     CPU  Central Processing Unit     Better known as a processor  this is an internal firewall resource that performs the necessary calculations     Cryptography    The practice of encrypting and decrypting data     Daemon    An application that runs permanently in the background on an operating system     121  c Datagram      8 An information block sent over a communication line within a network   E  f am  S  S Data Encryption Standard  DES   z  Q   5 Cryptographic algorithm for the encryption of data  In particular  it allows encrypting data by blocks     Data evasion    Also known as IDS evasion  it is a hacker s method 
133. t     USER MANUAL    NETASQ    we secure IT    Script wizard    name Address    Step 2 of 2       Figure 41   Script wizard   Step 2    The second step in the script deployment wizard requires the definition of the appliances that will be  affected by this deployment  To do this  click on Add to open the window that displays the available  appliances  When you click on Finish  the script deployment and execution window will appear     71  C       D  Q 3 3 6 1  Executing the script on firewalls   gt   E  f am  S  o Click on Execute  The LED will turn to orange on appliances that are being backed up and you can track its  S progress with the progress bar  All the appliances will be updated  one after another   Cc  D    3 3 6 2  Building a script    Scripts are formatted as NSRPC commands grouped together in a file that will be specified in the script  deployment wizard  Refer to the related documentation on NETASQ   s website for further information on  the NSRPC configuration mode     Q WARNING  All commands with negative results will disrupt the execution of the script     NSRPC commands can be associated with macros or variables which will ease the mass deployment of  defined scripts           N    jenuey uoneniuos sn    USER MANUAL    NETASQ    we secure IT       Comments    Comments can be inserted between the different lines of script  and begin with the character       Macros    Macros represent the variables associated with the appliance on which the script will be depl
134. t project  autolaunch  If this option has been selected  the last edited project will automatically be  opened when the NETASQ Global Administration application is launched     Remember desktop layout If this option has been selected  the project will open with the windows laid    out in the same way as during the previous session     jenuey uoneniuos sn    Close  Get into  window when Closes this window automatically   successful    update    host    USER MANUAL    NETASQ    we secure IT       3 2 4 1  Folders              m     Preferences    4 QO General    cass   Folders    s X Website access                       ft 8  Application update EE ee              4  F Interface C  Users     AppD ata Roaming Netasq  45 49  0 update        a       n AREA Default backup folder  ae   SBE Fol a C  Users VAppD ata Roaming Netasg 45 49  0 B ackup      E S    sect Administration suite Script folder     i A Seen am C  Users      AppD ata Roaming Netasg    45 49  0  script    En          CA Xie                Figure 13   Preferences     Folders    Update folder In this field  indicate the directory in which updates will be stored  When NETASQ  Global Administration retrieves a firmware update on NETASQ   s website  the file  will be stored in this directory before being distributed and installed on the  appliances  The default folder is     w       SAdministration Suite 7 0 installation directory  Update     Default backup folder In this field  indicate the directory in which configurati
135. ternet access    To provide internet access to the internal network by passing through the Firewall  you only need to create  a rule which allows the internal network to contact everyone using  http  and the protocol  udp domain   for DNS resolution  These protocols are included in the    Web    service group     This becomes     __  Status   Protocol   Source   Destination   Destination Port   Action   Log   Comment       1  On group E NetworkiN Q9 c  n S web    Figure 49  Internet access    USER MANUAL    NETASQ    we secure IT       If you use URL filtering  you will indirectly pass through a web proxy located on the Firewall   Therefore  you no longer connect directly to the web server but to the web proxy  The proxy then connects  to the web server  These different phases are implicit in the filter rules     Where the workstations are concerned  you can configure your browser so as to connect to a remote proxy  server  In this case  to access the internet  the workstation no longer uses    http    on port 80 but on port  8080    If you have implicitly overlooked this protocol at the Firewall level  your users can access the internet  without passing through the URL filtering that you have set up     To avoid this  you can redirect all requests using a specific service  8080 for example  to URL filtering   General proxy configuration    Accelerated  Redirected ports       Cey Transparent  Transparent user authentication is only provided on interfaces attached to the Proxi
136. tes the second connection  data  connection   this allows you to define a single filter rule  the one needed to authorize the client server  connection command   The only rule you need to define is the following     Fi FILTER rule edition       Slot name   Comment    Status Protocol Source Destination Destination Port Action Log Comment    1  On tcp B Q cin fj tte A pass    Figure 53  Editing filter rules    This rule allows an internal network machine  Network _Bridge  to access FTP servers on the Internet     Access to a mail server in the DMZ    In order to send and receive e mails on a client workstation  the SMTP and POP3 services must be  authorized for the client workstation to the mail server    The mail server can be hosted internally or can be external to the network  with the provider for example    It is therefore necessary  in object configuration  to declare the mail server  using its IP address      100    You can then create a service group called  Mail  in which you will place the POP3 and SMTP services  This  5 will avoid the need to place two lines with the same properties in the filter rules   o You then need to create the filter rule for the internal network  where the client workstations are placed    gt     to the Mail server  using the  Mail  service group and the Pass action  This results in   f am  S      gt      S  5 Telnet access    The telnet service allows a shell to be opened on a remote host  generally a UNIX machine      In this example  we wi
137. th  Start Programs Netasq Administration Suite 7 0 NETASQ UNIFIED MANAGER     WARNING    Global Administration mode has to be indicated in the menu    Options Preferences General       O   e          S 3 1 3  Creating opening a project   e    gt   S  3 NETASQ Global Administration works in project mode  Thus it is possible to carry out several configurations  D     projects   each project corresponding to a group of NETASQ products that can be managed        When you launch NETASQ Global Administration    USER MANUAL    NETASQ    we secure IT    g  NETASQ Unified Manager    Beny ot A  8     NETASQ Unified Manager         New project    Start with an empty project  i X Open a project  Open and edit an exieting project  S  a    xit  y Shut down NETASQ UNIFIED MANAG          Figure 2   Launching Global Administration  Several choices are given      New project  for creating a new project or a new administration configuration       Open a project  opens an existing project  A window opens allowing you to select the appropriate project file      Open last project allows you to open the last project opened or created by NETASQ Global Administration     N  O      Reboot in Manager mode  temporary   opens NETASQ UNIFIED MANAGER in Firewall Manager mode  In this case     a message will appear asking whether you wish to permanently modify the application in Firewall Manager mode     Exit immediately closes the application     NETASQ Global Administration can only open one project at a 
138. the following window will appear     Step 2    Configuration Backup Wizard    Description     Backup directory   C  Users     AppD ata Roaming Netasq    5    Step 2 of 2           lt  Previous   Finish   Cancel            Figure 34   Assistant de sauvegarde   Etape 2    USER MANUAL    NETASQ    we secure IT       This step allows you to add a description to the backup and to specify the backup directory where you want  to store the backups  By default the backup directory is the one defined in the preferences in the Global  Administration mode  Click on Finish to back up the configurations     The window for managing the backups of the configurations will appear  It summarizes the parameters  defined in the configuration backup assistant     By default the first column entitled    BP    is for specifying the breakpoints in the execution of the configured  task  The principle is as follows  upon specifying a breakpoint on a line  the configured task will first be  started on each of the appliances located below or on this breakpoint in the table  then if all the tasks are  successfully completed  NETASQ Global Administration mode will execute the tasks for the appliances  which follow  To specify a breakpoint  double click on the desired line  To delete a breakpoint  double click  on the breakpoint     By default the second column displays a signal light  The color of the signal light depends on the status of  the action     SERRE EEE EEL EEL EEE eee eee eee ett eee eee treet 
139. thernet in 100 Mbps instead of the standard 10 Mbps  Like  regular Ethernet  Fast Ethernet is a shared media network in which all nodes share the 100 Mbps  bandwidth     A    Active Update    The Active Update module on NETASQ firewalls enables updating antivirus and ASQ contextual signature  databases as well as the list of Antispam servers and the URLs used in dynamic URL filtering     116  C  D Address book  3   l A centralized tool for several NETASQ applications  This address book can contain all the necessary  Q  5 information for connecting to a list of firewalls  simplifying the administrator   s access as he no longer has to  5 remember all the different passwords this entails      Q    gt   Cc  D    Address translation    Changing an address into another  For example  assemblers and compilers translate symbolic addresses  into machine addresses  Virtual memory systems translate a virtual address into a real address  address  resolution     Advanced mode  Router     Configuration mode in which the firewall acts as a router between its different interfaces  This involves  changes in IP addresses on routers or servers when you move them to a different network  behind an  interface on a different network     USER MANUAL    NETASQ    we secure IT       AES  Advanced Encryption Standard     A secret key cryptography method that uses keys ranging from 128 to 256 bits  AES is more powerful and  secure than Triple DES  until recently the de facto standard     Alias IP    A s
140. time   When using NETASQ Global Administration for the first time  select New Project     jenuey uoleinbiuo0d sn    USER MANUAL    NETASQ    we secure IT       3 2  GLOBAL ADMINISTRATION  3 2 1  User interface  3 2 1 1  Main window  The topological window is presented in the following manner when a new project is created     E  NETASQ Unified Manager   Project    Topological view     ha File View Project Administrationtasks Options Windows e    2e8 8   0 A  S     1100             21         Riemer   c       D  2 Figure 3   Main window        S    This window comprises several parts            D    a menu bar         D    an icon and shortcut bar        an object bar      a global view  a table listing the fwls in the project       a bar to change views     3 2 1 2  Menu bar    This bar contains the following menus     File   View   Project  Administration Tasks  Options   Windows   Help    o a 6606 6      USER MANUAL    NETASQ    we secure IT       3 2 1 1  Icon and shortcut bar    The following bar contains the shortcuts for certain operations     Bek Os         S 08     Figure 4  Icon and shortcut bar    For defining or modifying the NETASQ Global Administration preferences  corresponds       to the menu item Options Preferences      ounce renee neces a e oe he ie esis ens cones ee mica    View Topological view      Menu for accessing configuration features  Backup and Restore  in Global       Ss Administration  See    Administration tasks        i ee   ener     ae    lt r 
141. ting in an    USER MANUAL    NETASQ    we secure IT       authorized operation  As a result of this  an attacker can intercept keys and replace them with his own  without the legitimate parties    knowledge that they are communicating with an attacker in the middle     MAP    This translation type allows converting an IP address  or n IP addresses  into another  or n IP addresses   when going through the firewall  regardless of the connection source     Modularity    Term describing a system that has been divided into smaller subsystems which interact with each other     MSS  Maximum Segment Size     MSS value represents the largest amount of data  in bytes  that a host or any other communication device  van contains in a single unfragmented frame  To get the best yield possible  the size of the data segment  and the header have to be lower than the MTU     129  C       D  9 NAT  Network address Translation    gt   S Mechanism situated on a router that allows matching internal IP addresses  which are not unique and are  5 often unroutable  from one domain to a set of unique and routable external addresses  This helps to deal    with the shortage of IPv4 addresses on the internet as the IPv6 protocol has a larger addressing capacity       Cc  D    NETASQ EVENT REPORTER    Module in NETASQ   s Administration Suite that allows viewing log information generated by firewalls     NETASQ REAL TIME MONITOR    Module in NETASQ   s Administration Suite that allows viewing the firewall 
142. tion     Options You may specify an option string in this field  which will become a command line parameter when  the external tool is launched  In this string  during the launch of the tool  it is possible to  dynamically insert information from the object   s records peculiar to this object    Example    Connection login  IP address  password  e mail address  etc  To add dynamic  information to the option string  click on the associated button and select the  information in this list which appears     Next  click on OK     USER MANUAL    NETASQ    we secure IT       You may add as many tools as you wish  To easily locate a tool in the list  you may sort the list by clicking  on the title of the    Tool name    column or filter the tool names by clicking on the little black arrow in the  title of the    Tool name    column     To delete an external tool from the list  select the tool and click on the Remove button  To modify the  configuration of the launch of an external tool  select the tool and click on the Modify button     At the bottom of the window  the option Show warning if a field is empty  if selected  allows warning the  NETASQ Global Administration administrator that one of the fields which has to be in the option string is  empty  the field had not been entered in the object   s information records   This warning is given when the  tool is launched     Example   Using PUTTY to connect to an appliance in SSH command line  In the tool creation window  indicate th
143. to the web  for authenticated users belonging to the internal network  may be authorized by the following  rule     Ed FILTER rule edition    Slot name   Comment         Status Protocol Source Destination Destination Port Action Log Comm      i 1 ie On group E2 s  n  NetworkiN     lt Any gt  BY web    pass    Figure 59  Editing filter rules    You may also grant particular access to certain authenticated users  For example  the following policy  authorizes    Smith    to conduct FTP sessions  wherever he is located   authenticated users from  Network_bridge can surf the web and all the users on Network_bridge  authenticated or not  have access to  the mail server     Ed FILTER rule edition       Slot name   Comment    Status Protocol Source Destination Destination Port Action Log Comment  T wOn tcp OQ ismith  lt Any gt  Q  lt Any Aj http    pass   104 2  0n group E  lt Any gt   Network_bridge    lt Any By web    pass    3  On group  Network bridge QD lt Any gt  jma    pass   C         2 Figure 60  Editing filter rules   O    e      Authentication of users is also possible for incoming connections  coming from the internet   In this way   Q   5 you can grant certain internet users access to certain services hosted on your internal network  of course   O the connection information must have been given to these users beforehand   The following example  S shows how to grant the user group   Partner  access to a particular Web server  e g   for an extranet     Cc         Ed FILTER
144. tors on topological view                         27   Cc   D   D       o   S   2 TZ  Rea  a               2 Figure 9   Project options   Client monitoring      D            D    If the option Automatic information recovery has not been selected  data  version  model  status   attributes     and alarms  system and security  will not be automatically refreshed  If the box has been  checked  indicate the period between each refreshment in minutes     Detailed indicators can also be hidden  Levels of system issues  levels of security problems  alarm status  in  the topological view     3 2 3 1 1  Alarm indicators    The    Alarm indicators    screen allows you to define the display of the status of the alarms in the Topological  View  The different options allow you to view the aggregation of alarm status  or the status of alarms in real  time  or both of these options     USER MANUAL    NETASQ    we secure IT             Project options          a Ra Client monitoring             Client monitoring   Alarm indicators  Brat Alarm indicators    Boh Configuration monitoring  Enable     Cumulated  Real time  Both     Vi Show alarm indicators in the topological view             CZ Xira       Figure 10   Project options     Alarm indicators    3 2 3 2  Configuration monitoring    N   0e         Project options        lt  3 Client monitoring  t es Alarm indicators   E3 Configuration monitoring      Configuration monitoring        Use Configuration monitoring    After activating configur
145. try  Despite the control made by NETASQ    before exportation  ensure that the legislation in force allows you to use these cryptographic  mechanisms before using NETASQ products    3  NETASQ disclaims all liability for any use of the product deemed illegal in the destination  country     Hypotheses derived from the Common Criteria    O DEFINITION   The common criteria evaluate  on an Evaluation Assurance Level or EAL scale of 1 to 7  a products  capacity to provide security functions for which it had been designed  as well as the quality of its  life cycle  development  production  delivery  putting into service  update      USER MANUAL    NETASQ    we secure IT       They are a convergence of different security related quality standards devised since 1980   Orange Book     DoD   CTCPEC  Canadian Trusted Computer Product Evaluation Criteria    ITSEC  Information Technology Security Evaluation Criteria    TCSEC  Trusted Computer System Evaluation Criteria      Introduction  Installing a Firewall often comes within the scope of setting up a global security policy  To ensure  optimal protection of your assets  resources or information  it is not only a matter of installing a  Firewall between your network and the internet  This is namely because the majority of attacks  come from the inside  accidents  disgruntled employees  dismissed employee having retained  internal access  etc    However  one would also agree that installing a steel security door defeats  its purpose when t
146. upplementary address associated with an interface     Antispam    System that allows the reduction of the number of unsolicited and occasionally malicious electronic  messages that flood mail systems and attempt to abuse users     Antispyware    System that enables detecting and or blocking the spread of spy software  which gathers personal  information about the user in order to transmit it to a third party  on client workstations     Antivirus    System that detects and or eradicates viruses and worms     117  J Antivirus  Kaspersky   o  S An integrated antivirus program developed by Kaspersky Labs which detects and eradicates viruses in real  2 time  As new viruses are discovered  the signature database has to be updated in order for the antivirus  te   5 program to be effective     Q    gt   Cc  D    Appliance    Hardware that embeds the software as well as its operating system     Asic  Application Specific Integrated Circuit     Specially designed technology for a handful of specific features  These features are directly managed by  the circuit instead of the software  ASICs cannot be reprogrammed     ASQ  Active Security Qualification     Technology which offers NETASQ Firewalls not only a very high security level but also powerful  configuration help and administration tools  This intrusion prevention and detection engine integrates an  IPS which detects and gets rid of any malicious activity in real time     USER MANUAL    NETASQ    we secure IT       Asymmetrical cr
147. yptography    A type of cryptographic algorithm that uses different keys for encryption and decryption  Asymmetrical  cryptography is often slower than symmetrical cryptography and is used for key exchange and digital  signatures  RSA and Diffie Hellman are examples of asymmetrical algorithms     Authentication    The process of verifying a user s identity or origin of a transmitted message  providing the assurance that  the entity  user  host  etc   requesting access is really the entity it claims to be  Authentication can also  refer to the procedure of ensuring that a transaction has not been tampered with     Authentication header  AH     Set of data allowing verification that contents of a packet have not been modified and also to validate the  identity of a sender     118  C     B  O   e    4  2  f am  S  S Backup appliance     Q    gt   5 Formerly known as a  slave   a backup appliance is used in high availability  It transparently takes over the    master appliance s operations when the former breaks down  thereby ensuring the system to continue  functioning with minimum inconvenience to the network s users     Bandwidth    The transmission capacity of an electronic pathway  e g  communications lines   It is measured in bits per  second or bytes per second in a digital line and in an analog line  it is measured in Hertz  cycles per second      Blowfish    A secret key cryptography method that uses keys ranging from 32 to 448 bits as a free replacement for DES  or IDEA
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
ソフトウェア : DR-Visual Logic  Dataram DTM63372A memory module  取扱説明書 (2.11 MB/PDF)  Manual de Apresentação de Dados - ECHA  NEX-5N    Copyright © All rights reserved. 
   Failed to retrieve file