ASL V6 Manual EN
ASL V6 Manual EN
ASL V6 Manual EN
User Manual
Release 1.00 – Date: 04.07.2005
The specifications and information in this document are subject to
change without notice. Companies, names, and data used in
examples herein are fictitious unless otherwise noted. This document
may not be copied or distributed by any means, in whole or in part,
for any reason, without the express written permission of Astaro AG.
Limited Warranty
Contents Page
3. Installation .......................................................... 19
4. WebAdmin ........................................................... 36
5
Table of Contents
Contents Page
5.1.7. User Authentication ............................................. 73
5.1.7.1. Novell eDirectory ................................................. 75
5.1.7.2. RADIUS................................................................ 78
5.1.7.3. SAM – NT/2000/XP ............................................. 83
5.1.7.4. Active Directory/NT Domain Membership ............ 85
5.1.7.5. LDAP Server......................................................... 88
5.1.8. WebAdmin Settings ........................................... 101
5.1.9. WebAdmin Site Certificate ................................. 104
5.1.10. High Availability ................................................ 107
5.1.11. Shut down/Restart ............................................ 114
6
Table of Contents
Contents Page
5.3.6. DHCP Service ..................................................... 181
5.3.7. PPTP VPN Access ............................................... 187
5.3.8. Accounting......................................................... 194
5.3.9. Ping Check ......................................................... 196
Contents Page
5.7.3. Local Keys.......................................................... 334
5.7.4. Remote Keys...................................................... 337
5.7.5. L2TP over IPSec................................................. 341
5.7.6. CA Management................................................. 344
5.7.7. Advanced ........................................................... 349
8
Table of Contents
Contents Page
9
Welcome to Astaro
1. Welcome to Astaro
Congratulations on your purchase of the Internet security system
Astaro Security Linux V6, and welcome to the Astaro family.
This manual will take you step-by-step through the installation pro-
cess, will explain the web-based WebAdmin™ configuration tool, and
can be used to document your configuration.
You can download the current version of this user manual from the
Astaro Knowledgebase under the following Internet address:
http://www.astaro.com/kb
You can find the user manuals and additional documentation (Guides)
for Astaro Security Linux via the navigation on the left side in the
Astaro Manuals and Guides sub-tab.
In order to provide you with the most up-to-date information pos-
sible, this document makes occaisonal reference to other documents
available at the web sites of Astaro and other organizations. Please
note that these addresses may change over time, and that documents
hosted by other organizations may even be removed entirely.
http://www.astaro.org
10
Introduction to the Technology
Networks
11
Introduction to the Technology
The Firewall
• Access control
• Protocol analysis
13
Introduction to the Technology
14
Introduction to the Technology
Protection Mechanisms
• Masquerading
15
Introduction to the Technology
16
Introduction to the Technology
17
Introduction to the Technology
18
Installation
3. Installation
The installation of this Internet security system proceeds in two main
steps: loading the software, and configuring the system parameters.
The initial configuration required for loading the software is performed
through the console-based Installation Menu, while the final con-
figuration and customization can be performed from your manage-
ment workstation through the web-based WebAdmin interface.
Attention:
If you are upgrading your system from version 5 to version 6, and
you wish to keep the settings from your existing installation, you
must first upgrade your system to version 5.200 at least. Only
backup files from this or higher versions of Astaro Security Linux can
be loaded into Version 6. Further information on the Up2Date Service
and the Backup function can be found in chapters 5.1.3 and 5.1.4.
19
Installation
The requirements for installing and using this security system are:
Hardware
• 256 MB RAM
Important Note:
For a monitoring via the Heart Beat requests, two Ethernet network
cards are necessary that are supported by the security system!
The Hardware Compatibility List (HCL) can be found under
http://www.astaro.com/kb. Use the HCL search term to access
fastly to the corresponding site.
20
Installation
Administration PC
Example Configuration
21
Installation
Address Table
1)
The third and further network cards are optional.
2)
Network interface for the High Availability system.
22
Installation
Attention:
The installation process will destroy all existing data on the hard disc!
Preparation
Before installation, please make sure you have the following items
ready:
23
Installation
Since in older hardware components APIC and ACPI are often not
supported, we recommend using the Classic Kernel in this case!
Attention:
The installation will destroy all data on the PC!
24
Installation
Example:
Address: 192.168.2.100
Netmask: 255.255.255.0
You must enter a value in the Gateway field if you wish to use
the WebAdmin interface from a workstation outside the subnet
defined by the netmask. Note that the gateway itself must be
within the subnet.
For example, if you are using a network mask of 255.255.255.0,
the subnet is defined by the first three values of the address: in
this case, 192.168.2. If your administration computer is at, for
example, 192.168.10.5, it is not on the same subnet, and thus
requires a gateway to be configured here. The gateway router
must have an interface on the 192.168.2 subnet, and must be
able to contact the administration computer.
25
Installation
Gateway: 192.168.2.1
If the administration computer is on the same subnet as the
internal network card (in our example, if its address is
192.168.2.x) it does not need a gateway. In this case, enter the
following value here:
Gateway: none
Confirm your entries with the Enter key.
Note:
Please read the license agreement carefully.
Attention:
Please read the notes and warnings presented during the
installation carefully. After confirming them, all existing data on
the PC will be destroyed!
26
Installation
27
Installation
Error:
The security system is not reachable from the internal network.
Possible Causes:
• The IP address of the security system is incorrect
Note:
If you connect to the Internet through a DSL connection, please read
the installation instructions at http://www.astaro.com/kb.
28
Installation
Note:
Please read the terms of the license carefully.
Security Note:
Use a secure password! Your name spelled backwards is,
for example, not a secure password – while something like
xfT35$4 would be.
You will only be able to start WebAdmin once you have entered
passwords for the functions listed below. Enter the password for
each service, and then re-enter it in the text field labeled
Confirm. The usernames are pre-defined, and cannot be
changed.
WebAdmin user: access to WebAdmin
This user is called admin.
29
Installation
Security Note:
Use different passwords for the Shell Login and Shell
Administrator users.
4. Log in to WebAdmin:
User: admin
Password: Password of the WebAdmin user
Please note that passwords are case-sensitive!
Click Login.
Note:
Please follow steps 0 through 16 in the order listed below.
30
Installation
Note:
When using a license with the High Availability (HA) option,
you must import the License Key to both security systems
(Normal and Hot Standby mode).
31
Installation
Attention:
If you change the IP address of the eth0 network card, you
will be locked out of WebAdmin.
32
Installation
33
Installation
34
Installation
Problems
http://www.astaro.org
35
WebAdmin
4. WebAdmin
The WebAdmin tool allows you to configure every aspect of the
Internet security system. This chapter explains the tools and concepts
used by WebAdmin, and shows how to use the built-in online help
system.
(2) Tabs
(3) Menus
(5) Refresh
36
WebAdmin
Uptime: Displays how long the security system has been running
without a restart.
37
WebAdmin
4.3. Menus
Every function of the security system has its own separate menu in
WebAdmin. This chapter describes the tools and displays used in the
configuration menus.
You can select more than one object at a time by holding the
CTRL key while you make your selection.
38
WebAdmin
Again, you can select more than one object at a time by holding
the CTRL key while you make your selection.
2. Click the Right Arrow button.
The entry is immediately disabled. The functions in this line will then
be no longer available.
40
WebAdmin
4.3.5. Lists
Lists are used, in contrast, to
configure functions that not only
allow more than one value to be
configured, and where the listed
objects do not need to be first
defined by the administrator. In
some instances, the order of the
configured values is also relevant.
Each list can contain many pages
of values, and each page displays
ten entries.
The Interfaces menu, for instance, uses a list to allow access to the
Wireless LAN Access Point.
The first row of the table shows
the number of pages in the list on
the left (the current page is
shown in white) and the total
number of entries on the right
(next to the # symbol). Note
that, if you roll the mouse over one of the red page numbers, a tooltip
appears showing the first and last entries on that page (see picture at
right). This can help to navigate quickly between pages.
The second row contains tools to control the display of the list. Note
that these do not change the configuration information, but rather the
way in which these entries are displayed within WebAdmin. In cases
where order is important, only the order indicated by the numbers
next to entries has an effect on the configuration of the function. The
buttons and in the left-hand column display the list in ascending
and descending numerical order respectively, while the and
buttons in the middle column display the list in ascending or
descending alphabetical order.
41
WebAdmin
Add entry: Type a value in the text-entry field and click Add.
The new value will appear in the last row of the table.
42
WebAdmin
4.5. Refresh
43
Using the Security System
Tip:
Draw up a plan of your network and determine which computer is to
have access to which services before configuring the security
system. This will simplify the configuration process and save you a
lot of time.
44
Using the Security System
Starting WebAdmin:
1. Start your browser and enter the address of the Security system
(i.e., the address of the eth0 interface) as follows:
https://IP Address.
3. Log in to WebAdmin.
User: admin
Password: the password
of the WebAdmin user.
In the Reason field, type a reason for ending the other user’s
session and click Login.
45
Using the Security System
You are now logged in, and can use the WebAdmin to manage the
system.
The menus under the System tab allow you to configure and manage
the basic settings of your security system.
5.1.1. Settings
Administrator Contact
Important Note:
Notification E-Mails can only be sent to the administrator when the
DNS Proxy is enabled and configured (chapter 5.6.2 on page 269), or
when the SMTP menu (chapter 5.6.8 on page 305) has been
configured with a route for incoming e-mails.
46
Using the Security System
Time Settings
Important Note:
We do not recommend changing the system time for daylight savings
time. Instead, we recommend setting the system clock to Central
European Time (CET). In summer, this corresponds to a deviation of
less than one hour.
When system time settings are changed, the following “time warp”
effects may be noticeable:
Time-based reports will have no data for the skipped hour. In most
graphs, this time period will appear as a straight line in the
amount of the old value.
• Log data will be written as normal when the time point before the
reset is reached again.
47
Using the Security System
• Most diagrams will display the values recorded during this period
as compressed.
• Accounting reports will retain the values recorded from the
“future”. Once the time point of the reset is re-reached, the ac-
counting files will be written again as normal.
Note:
Changing the timezone will only change the current system time
if you are using an NTP server to control time settings.
48
Using the Security System
Important Note:
Take note of the issue date of your License Key. If this date is
after the current date set on the security system, the license will
be deactivated.
49
Using the Security System
If you wish to access the security system through SSH, the SSH
Status light must be enabled (status light shows green).
The SSH protocol uses name resolution (valid name server) if no
valid name servers are found, SSH access attempts will time out. The
time-out takes about a minute. During which time the connection
seems to be frozen or failed. Once the time-out has expired, the con-
nection process continues without further delay.
You must also add the networks allowed to access the SSH service in
the Allowed Networks selection field. In order to ensure a seamless
50
Using the Security System
Security Note:
By default, anyone has access to the SSH service. The Allowed
Networks field contains the Any option. For increased security,
we recommend that access to the SSH service be limited. All
other networks should be removed!
51
Using the Security System
5.1.2. Licensing
Licensing the Internet se-
curity system is done in the
registration portal of My-
Astaro (the address is:
http://my.astaro.com).
You can download a 30 days
test version from MyAstaro
and convert it later to a
company version.
The price of the company
version depends on the size of the network to be protected, of the
scope of support and of the functions and security packages, sub-
scribed to in addition to the basic license.
This base license and the three functions and security packages con-
tain the following modules:
52
Using the Security System
You can obtain detailed information about licensing and the corres-
ponding Activation Key at any certified Astaro Partner, or from
Astaro itself at [email protected].
Note:
The Activation Key cannot be directly imported through the
WebAdmin configuration tool to the security system. The Activation
Key is only used to activate the License Key. Only this License Key
can be imported to the security system!
Note:
When using a license with the High Availability (HA) option, you
must import the License Key to both security systems (Normal and
Hot Standby mode).
54
Using the Security System
3. From the Select File dialogue, select the license file and click on
the Open button.
Licensing Information
The functions in this window are used for licenses that do not allow
for an unlimited number of users (IP addresses).
View current User (IP) Listing: The table contains all IP addresses
that are relevant for the licensing. The current user table is always
loaded when this menu is opened.
55
Using the Security System
Important Note:
In order to download updates, the Up2Date Service makes a TCP
connection to the update server on port 443. The security system will
permit this connection without any adjustment. If there is another
security system in place upstream, you must allow the communi-
cation via the port 443 TCP to the update servers.
Note:
When using the High Availability (HA) system, please note the
special functions of System Up2Date.
56
Using the Security System
System Up2Date
Note:
If you are using the High Availability (HA) system, please note the
special notes for the import and installation of the System Up2-
Dates. The HA system is described in chapter 5.1.10 on page 107.
57
Using the Security System
The available choices are: every hour, every day, or once per
week.
58
Using the Security System
Important Note:
When using Microsoft Windows, make sure not to use a UNC
Path. Instead, choose the updates by using the Look in option.
59
Using the Security System
Note:
If more than one System Up2Date file is listed in the table,
start the highest version. The smaller versions will be installed
automatically.
Note:
If more than one System Up2Date file is listed, start with the
smallest version. Only one package can be installed with the
HA system.
60
Using the Security System
Pattern Up2Date
The Latest Pattern Up2Dates table shows the date of the most
recently installed Pattern Up2Date. Virus Protection Patterns and
Intrusion Protection attack signatures will be listed separately.
61
Using the Security System
The system checks now, whether new Pattern Up2Date packages are
available on the Update Server, downloads and installs them to the
Internet security system. Details on the complete Up2Date process
can be found in the Log Window, shown in real-time. When the
DONE message appears, the process has completed successfully.
The Installed Pattern Date will be updated when you click the
Up2Date Service under the System tab, or when you next open this
menu.
When using the High Availability (HA) solution, the virus scanner
on system 2 will be automatically synchronized with system 1.
The available choices are: every hour, every day, or once per
week.
Security Note:
Choose the hourly update option to ensure that your sys-
tem is always up to date.
When using the High Availability (HA) solution, the virus scanner
on system 2 will be automatically synchronized with system 1.
2. Click Enable next to Status to enable the function and make the
following settings:
63
Using the Security System
5.1.4. Backup
The Backup function allows you
to save the settings of your Se-
curity system to a file on a local
disk.
This backup file allows you to
install a known-good configur-
ation on a new or misconfigured
security system. This is espe-
cially useful in case of hardware
failure, as it means replacement
systems can be up and running
within minutes.
Attention:
Version 6 of the security system can only load backups from version
5.200 or higher.
Install the License Key in the Licensing menu before loading the
backup. Without the appropriate license, the system will only support
three network cards – under certain circumstances, this can lead to
WebAdmin not being reachable.
Note:
After every system change, be sure to make a backup. This will
ensure that the most current security system settings are always
available. Make sure that backups are kept securely, as the backup
contains all of the configuration options, including certificates and
keys.
After generating a backup file, you should always check it for
readability. It is also a good idea to use an external MD5 program to
generate checksums: this will allow you to check the integrity of the
backup later.
64
Using the Security System
Restore a Backup
This window allows you to install the backup file of the configuration.
Loading a Backup:
1. Open the Backup menu in the System tab.
3. In the File Upload window, choose the Backup file, you would
like to load and click on the Open button.
Note:
When using Microsoft Windows, make sure not to use a UNC
Path for loading the backup. Select the Backup file with the help
of the Look in selection window.
The security system will now load and check the backup file. If
the ckecksums are correct, you will now receive the Backup
Information.
65
Using the Security System
Create a Backup
This window allows you to create and archive a backup file of the
configuration of your Security system.
Important Note:
If the Encryption function has been enabled, the backup file
will be encrypted with either the DES or 3DES algorithms, and
can only be read or loaded using the correct password.
The system will now generate a backup file. When the message
Backup has been created successfully appears, the process
has completed successfully.
4. To copy the backup file to your local PC, click the Save button.
5. On the File download menu, choose the Save file to disk and
click the OK button.
66
Using the Security System
The security system will now load and check the backup file. If
the ckecksums are correct, you will now receive the Backup
Information.
Attention:
After each system change, create a new backup file. If you load
a new backup file and if, for example, you have changed the IP
address or forgotten the password, you might not be able to
access the newly configured system.
Advanced
Security Note:
With passwords with up to seven characters, the Backup
file will be encrypted with DES and from eight characters
on with 3DES.
67
Using the Security System
Important Note:
A backup file that has been encrypted with Encryption can only be
loaded to the system with the password that was used for the
creation of the Backup.
Send Backups by E-Mail: The Security system can also send you
automatically created backup files by e-mail, so that you don’t have
to remember to save the settings of your Internet security system
manually on a data carrier. Then the file is e-mailed to the entered e-
mail address. These e-mailed files are about 100 kilobytes long.
Important Note:
If the Encryption function has been enabled, the backup file
will be encrypted with either the DES or 3DES algorithms, and
can only be read or loaded using the correct password.
68
Using the Security System
5. Click the Add button next to the E-Mail to entry field, to add
this address to the ordered list.
The security system will now load and check the backup file. If
the ckecksums are correct, you will now receive the Backup
Information.
69
Using the Security System
5.1.5. SNMP
The Simple Network Manage-
ment Protocol (SNMP) moni-
tors and manages the local net-
work. SNMP allows the adminis-
trator to make quick queries
about the condition of the network devices, such as the number and
configuration of the network interfaces, the forwarded traffic, the
current processes and hard disk utilization. Next to the current state,
tendencies and time rows are interesting. They give a detailed insight
into the functions of a network – the history can be monitored and
remedied before turning into a real problem.
Configure the access rights to the SNMP service in the SNMP Access
window. The users of the configured networks can then conduct
queries about the SNMP server on the security system with their read
only rights.
Security Note:
The SNMP data traffic (Protocol version 2) between the Security
system and the network is not encrypted.
70
Using the Security System
The messages, which are sent as SNMP Trap, contain the Object ID
(OID) of the Astaro AG. The OID for messaging events (1500), the
classification of the message (DEBUG = 0, INFO = 1, WARN = 2, CRIT
= 3) and the relevant error code (000 bis 999) are attached.
The status light will show green and an advanced entry window
will open.
4. Enter the IP address into the entry field of the server and save
your entry by clicking on the Save button.
71
Using the Security System
Attention:
In the System/Remote Syslog Server menu, do not select one of
the security system’s interfaces (such as eth0) as the destination
address (host).
Host: Enter the host, which should receive logging information in the
drop-down menu. When a host has been selected, log forwarding is
enabled immediately: no further messages are displayed.
In order to select a logging host (i.e., a network with netmask
255.255.255.255) you will first have to define it in the Definitions/
Networks menu. The definition of networks is covered in greater
detail in chapter 5.2 on page 115.
Service: The Syslog protocol is set by default. You can also use this
drop-down menu to configure the service ( port) that should be used
on the remote server.
Logs: This selection field allows you to select log files that should be
delivered to the remote host.
72
Using the Security System
Important Note:
Please note, that several authentication methods cannot be sup-
ported at the same time.
73
Using the Security System
• a RADIUS server
• an LDAP server
The five user databases can be checked one after the other.
74
Using the Security System
Security Note:
Ensure to grant only reading rights to the user.
http://www.novell.com/documentation/lg/edir87/index.html
Then make the settings for the Internet security system.
75
Using the Security System
Security Note:
Make sure that the user has only read privileges.
76
Using the Security System
Note:
Novell Directory Service groups can either be defined through
Common Name (CN) of the group or through the complete
Distinguished Name (CN) in the LDAP-syntax. As separator a
comma is used. Dots for a delimitation are not supported.
HTTP: Controls the profile assignment for the use of the HTTP-proxy.
SMTP: Controls the SMTP-authentication, if for example the TLS-
encryption is enabled for the connection.
77
Using the Security System
5.1.7.2. RADIUS
RADIUS stands for Remote Authentication Dial In User Service
and is a protocol for allowing network devices (e.g., routers) to
authenticate users against a central database. In addition to user
information, RADIUS can store technical information used by network
devices. Such as protocols supported, IP addresses, telephone num-
bers, routing information, and so on. Together this information
constitutes a user profile that is stored in a file or database on the
RADIUS server.
In addition to authenticating dial-up users, RADIUS can be used as a
generic authentication protocol.
The RADIUS protocol is very flexible, and servers are available for
most operating systems, including Microsoft Windows NT/2000. The
RADIUS implementation on this security system allows you to con-
figure access rights on the basis of proxies and users.
• Username
78
Using the Security System
Tip:
Name the group according to the proxy to be used. For
example, name the group for the HTTP Proxy HTTP Proxy
Users.
3. For each group, add the users who should be allowed to use this
proxy service.
4. Make sure that the user flag Allow dial-in access to the net-
work is set for every user in these groups.
You can find this setting in the user properties dialog box. MS
Windows NT/2000 needs this flag to answer RADIUS inquiries.
79
Using the Security System
Security Note:
For the Shared Secret only passwords consisting of
alphanumeric, minus (-), and period (.) characters are
allowed. Other characters, for example %!#_{} are not
allowed.
80
Using the Security System
10. Open the WebAdmin configuration tool and open the User
Authentication menu in the System tab.
Address or Hostname:
Enter the IP address or the
host name of the RADIUS
server.
Shared Secret: Enter the Shared Secret from step 6.
13. In the Proxies tab, open the menu corresponding to the proxy
service you wish to use.
81
Using the Security System
This may mean that changes in the RADIUS database will not be
reflected at the security system for a few minutes.
Attention:
The security system sends queries on UDP port 1812.
82
Using the Security System
83
Using the Security System
Note:
This is not the Internet domain, as in Company.com, but rather
a simple designator, e.g., Intranet. If you are using a stand-
alone server rather than a Domain Controller, enter its NETBIOS
name here. This corresponds to the PDC Name entry.
Security Note:
For the Shared Secret only passwords consisting of
alphanumeric, minus (-), and period (.) characters are
allowed. Other characters, for example %!#_{} are not
allowed.
Security Note:
If you use SAM authentication, make sure to disable the Guest
account on your Windows domain. Otherwise all username/
password combinations will be accepted as valid.
84
Using the Security System
Note:
In order for the domain joining process to work, one of the Domain
Controllers (DC) for this domain must be in the systems broadcast
range. The authentication with NTLM can at present only be used for
the HTTP proxy to perform Single-Sign-On for Internet Explorer
clients!
85
Using the Security System
86
Using the Security System
Note:
This is not the Internet domain, as in company.com, but rather
a simple designator, e.g., Intranet.
Attention:
Please make sure not to use hostnames that are used by other
systems and especially not the hostname of the domain con-
troller – it could demote the Domain Controller to a Member
Server!
87
Using the Security System
88
Using the Security System
User Authentication
Security Note:
User authentication with a stand-alone LDAP server involves
sending passwords in clear text over the network. As these
passwords are not encrypted, an attacker with access to the
network may be able to intercept them.
Note:
User authentication with an LDAP Server requires that the DNS
Proxy on the Proxies/DNS menu be enabled.
89
Using the Security System
Security Note:
Make sure that the user has only read privileges.
90
Using the Security System
2. With the left mouse button, click New and then Group.
3. Enter a unique name for the group in the Group name field.
Example: socks_users
6. Save your changes by clicking OK.
91
Using the Security System
Note:
According to the LDAP standard, each user attribute must have an
associated object ID, or OID. Object ID numbers are designed to
be unique across the entire Internet; in order to manage this, the
Internet Assigned Numbers Authority (IANA) has been charged
with assigning OID prefixes to organizations. For example, the OID
prefix for Astaro AG is: 1.3.6.1.4.1.9789.
If your organization does not yet have an official OID space, you can
request an OID prefix from the IANA at www.iana.org. Once you
have an OID space, you should consider how best to use it to
describe your network structure. Remember that each user attribute
will require a unique OID.
92
Using the Security System
93
Using the Security System
2. Right-click Users.
Syntax: This value was set while creating the attribute and
cannot be changed.
From step 2, this should be. Boolean.
Edit Attribute: You can use this field to set the value of the
attribute. The possible values are TRUE and FALSE.
Value(s): The current value of the attribute is shown here.
94
Using the Security System
Now make the settings on the Internet security system. The settings
in the configuration tool WebAdmin are explained on page 97.
Security Note:
Make sure that the user has only read privileges.
http://www.novell.com/documentation/lg/edir87/index.html
Then make the settings for the Internet security system. The settings
in the configuration tool WebAdmin are explained on page 97.
95
Using the Security System
Security Note:
Make sure that the user has only read privileges.
Important Note:
With the installation of the software alle existing data will be deleted
from the computer!
96
Using the Security System
Security Note:
Make sure that the user has only read privileges.
97
Using the Security System
98
Using the Security System
Security Note:
Use a secure password! Your name spelled backwards is,
for example, not a secure password – while something like
xfT35$4 would be.
Security Note:
As long as the LDAP authentication by attribute func-
tion is disabled, all users who are listed in the directory
with a unique DN and a valid password can use the HTTP,
SMTP and SOCKS proxies, and can also access the
WebAdmin tool.
99
Using the Security System
4. In the Attribute Value field, enter the DN for the attribute. The
attribute value is the DN.
100
Using the Security System
General Settings
101
Using the Security System
Security Note:
As soon as you can limit the access to the Internet security
administration (for example your IP address in the local network), re-
place the Any entry in the Allowed Networks selection field
through a smaller network.
The safest solution is, if only one administrator PC has access to the
Internet security system through HTTPS.
Networks can be defined in the Definitions/Networks menu.
102
Using the Security System
103
Using the Security System
104
Using the Security System
system’s hostname.
The next few steps depend on your browser. For example, with
Microsoft Internet Explorer, the File download dialog opens.
Save file to disk: This option allows you to save the certificate
to a local disk before installing it.
Open the file from current position: This allows you to install
the certificate directly. The Certificate window will open. These
105
Using the Security System
Note:
Due to system time differences and timezone offsets, the generated
certificate may not yet be valid. Many browsers wrongly report that
such certificates have expired, however this is not the case and any
generated certificates will become valid after a maximum of 12
hours.
106
Using the Security System
107
Using the Security System
Important Note:
For a monitoring via the Heart Beat requests, two Ethernet network
cards are necessary that are supported by the security system!
The Hardware Compatibility List (HCL) can be found under
http://www.astaro.com/kb. Use the HCL search term to access
fastly to the corresponding site.
Important Note:
If you use a security system for the High Availability (HA) system
that was already in use, ensure that you update the second security
system to the same version as system 1 prior to the configuration.
108
Using the Security System
Preperation:
109
Using the Security System
Important Note:
The network card for the data transfer connection mustn’t be
configured in the Network/Interfaces menu. This interface is
set-up later in the System/High Availability menu. For the
monitoring via Heart Beat request reserve a network card that
supports this function.
110
Using the Security System
Security Note:
Use a secure password! Your name spelled backwards is,
for example, not a secure password – while something like
xfT35$4 would be.
Important Note:
The network cards must have the same Sys ID (e.g., eth 2) on
both systems. If you wish to use Heart Beat monitoring, use this
menu to choose network cards on both the normal and standby
systems which support this function.
111
Using the Security System
Note:
The data transfer connection must only use a Class C network –
that is a network with mask 255.255.255.0. The bitmask form
cannot be entered here. The network defined for the data
transfer cannot be used anywhere else.
Note:
When you save the settings as described in the following, the
system will shut down and reboot immediately.
Note:
If the beeps are not heard, and the LED light continues to blink,
the middleware was unable to initialize all services, rules, and
processes. If this happens, please contact the service depart-
ment of your security solution supplier.
112
Using the Security System
113
Using the Security System
Restart:
1. Under the System tab, open the Shut down/Restart menu.
The action Shut down allows you to shut the system down, and
allows you to cleanly stop all running services.
For systems without a monitor or LCD display, the end of the shut
down process is signaled by an unending series of beeps at one-
second intervals.
Shut down:
1. Under the System tab, open the Shut down/Restart menu.
114
Using the Security System
The Definitions tab allows you to define networks and services for all
of the other configuration menus (e.g., the packet filter, VPN, proxies,
etc.) in one central location. This allows you to work with the names
you define, rather than struggling with addresses, ports, and network
masks. Another advantage is, that you can group individual networks
and services together and configure them all at once. If, at a later
date, you assign certain settings to these groups, they will apply to all
networks and services contained therein. It is even possible to make
groups of groups. Local users for the proxy services can also be
defined here.
5.2.1. Networks
In the Networks menu, the
hosts and networks and also
the network groups are
defined.
115
Using the Security System
The Symbols
Adding Host:
1. Under the Definitions tab, open the Networks menu.
116
Using the Security System
Adding Network:
1. Under the Definitions tab, open the Networks menu.
117
Using the Security System
The DNS Hostname type should only be used in connection with the
DynDNS end points. The security system resolves the definition ac-
cording to the Time-to-live-value (TTL) and then updates it with the
new IP address. This network-definition can be used in all configura-
tions. It is particularly useful for IPSec-VPN-endpoints and SMTP
Route Targets.
The DNS Hostname type (multiple records) should be used
universally for all other address resolutions, when it is not
sure, that from this DNS only one IP address will be mapped.
1. Under the Definitions tab, open the Networks menu.
118
Using the Security System
After successful definition, the new network group will appear in the
network table. The network group name will also be available for use
in various configuration menus.
119
Using the Security System
Name: In the entry field, enter a unique name for the IPsec user
group.
This name will be used later, for example to configure packet
filter rules. Allowed characters are: The only allowed characters
are alphanumeric characters, minus (-), space ( ), and under-
score (_). Names may be up to 39 characters long.
Type: Select IPsec User Group from the drop-down menu.
DN Template: For the VPN-ID-Type Distinguished Name you
will need the following data from the X.509 tab tree: Country
(C), State (ST), Local (L), Organization (O), Unit (OU) Common
Name (CN) and E-Mail Address (E).
The data must be listed in the same order as a certificate in this
entry field.
Comment: You can enter a IPsec user group description in this
entry field.
After successful definition, the new IPSec user group will appear in
the network table. The IPSec user group name will also be available
for use in various configuration menus.
120
Using the Security System
Filters
Filtering networks:
1. Click on the Filters button.
2. Enter the filter attributes in the fields listed. You don’t have to
define all attributes.
Only the filtered networks will be displayed in the table. Next time
when you open the menu, the complete network table will be
displayed.
Further Functions
Editing Definitions: Click on the settings in the Name, Value and
Comment columns in order to open an editing window. You can then
edit the entries.
121
Using the Security System
5.2.2. Services
The Services menu is
used to define the Services
and Service Groups.
Services define certain
types of traffic over net-
works like the Internet. A
service is defined by a
name, a protocol, and
ports.
122
Using the Security System
The ESP and AH protocols are used for Virtual Private Networking
(VPN). These protocols are covered in chapter 5.7 on page 312.
The network table contains the defined services and groups. By
Default, the table contains the already pre-defined statically entered
services.
Add Service:
1. Under the Definitions tab, open the Service menu.
123
Using the Security System
For the TCP and UDP protocols you need the following two
values. Entry options: A single port (e.g., 80) or a port range
(e.g., 1024:64000).
Source/Destination Ports: In the left-hand entry menu, enter
the Source Port, i.e. the Client Side of the service. In the right
hand entry menu, enter the Destination Port, i.e. the Server Side
of the service.
The ESP and AH protocols are used for IPsec VPN connections.
The port entered here should be agreed upon with the remote
end of the IPSec VPN tunnel.
SPI: Enter a value from 256 to 65535. Values up to and including
255 are reserved by the Internet Assigned Numbers
Authority (IANA).
For the ICMP protocol, select a type of ICMP packet from the
ICMP type drop-down menu.
For the IP protocol enter the protocol number into the Protocol
Number entry field.
Comment: You can enter a service description in this entry field.
After successful definition, the new service will appear in the service
table.
124
Using the Security System
After successful definition, the new service group will appear in the
service table.
Filters
Filtering services:
1. Click on the Filters button.
Only the filtered services will be displayed in the table. Next time
when you open the menu, the complete service table will be
displayed.
Further Functions
Editing Definitions: Click on the settings in the Name, Value and
Comment columns in order to open an editing window. You can then
edit the entries.
Deleting Definitions: Clicking on the symbol of the trash will delete
the definition from the table.
5.2.3. Users
In the Users menu Local
Users are added, if the use
of proxy services should be
limited to sepcial persons.
This is an alternative to
using an external user database. This menu allows you to define
which user has access to which proxy services. Available options are
HTTP proxy, SMTP proxy, SOCKS proxy, WebAdmin, L2TP over
IPSec and PPTP (Remote Access).
Security Note:
Normally, only the admin user has access to WebAdmin. The
password to WebAdmin should be changed at regular intervals.
126
Using the Security System
Security Note:
Use a secure password! Your name spelled backwards is,
for example, not a secure password – while something like
xfT35$4 would be.
127
Using the Security System
Filters
Filtering users:
1. Click on the Filters button.
2. Enter the filter attributes in the fields listed. You don’t have to
define all attributes.
Only the filtered users will be displayed in the table. Next time when
you open the menu, the complete user table will be displayed.
128
Using the Security System
Further Functions
Editing Local Users: Click on the settings in the Name, Password,
PPTP Address and Comment columns in order to open an editing
window. You can then edit the entries.
Deleting Local Users: Clicking on the symbol of the trash can will
delete the definition from the table.
These defined Time Events can be used with the following modules:
• In the Packet Filter the rules for the data traffic for specific time
intervals can be defined.
• Single: The defined time interval will only take place once. The
beginning and the end are defined through date and time
indications. Weekdays may also be defined.
129
Using the Security System
Further Functions
Deleting a Time Event: Clicking on the trash can icon deletes a
definition from the table.
130
Using the Security System
The Network tab contains menus which allow you to configure net-
work cards and virtual interfaces, as well as to perform network-
specific configuration and management tasks.
5.3.1. Hostname/DynDNS
Firewall Hostname
Note:
The Hostname will appear in the subject line of all Notification E-
Mails to the Administrator.
Dynamic DNS
131
Using the Security System
long as it online, at least. A mobile user, for example can access his
company network through Dynamic DNS, even if the company only
uses standard DSL connections with dynamic IP addresses. In
addition to VPN applications, Dynamic DNS can also be used for
remote maintenance and control.
132
Using the Security System
5.3.2. Interfaces
A firewall requires at least
two network cards in
order to securely connect an
internal network (LAN) to an
external one (the Internet).
In our examples, the Net-
work card eth0 is always
the interface connected to
the internal network. Net-
work card eth1 is the
interface connected to the
external network (e.g., to
the Internet). These
interfaces are also called the trusted and untrusted interfaces,
respectively.
Network cards are automatically recognized during the installation: if
new network cards are added later, a new installation will be
necessary. In order to re-install the system, simply make a backup of
your configuration, install a new copy of the software, and re-load
your backed-up configuration.
We strongly recom-
mend against connect-
ing both internal and
external interfaces to one hub or switch –
133
Using the Security System
Note:
While planning your network topology and configuring the security
system, take care to note which interface is connected to which
network. In most configurations, the network interface with SysID
eth1 is chosen as the connection to the external network.
In order to install the High Availability (HA) system, the selected
network cards on both systems must have the same SysID. Installing
the HA system is described in more detail in chapter 5.1.10 on page
107.
134
Using the Security System
During the installation, you will have configured the eth0 interface.
This interface is the connection between the security system and the
internal network (LAN). By default, this network card is named
Internal. The table displays all of the most important information
about the interfaces: the administrative status (enabled/disabled,
indicated by a green or red status light), current connection status
(Up/Down), Name (Name), ID (Sys ID), network card type (eth/
wlan) as well as IP address and network mask (Parameters).
Click the status light in the Admin column to administratively enable
or disable the interface. The functions in the Actions column allow
you to edit the configuration of the interface, or to delete it entirely.
With this Internet security system, you assign one Name and also a
specific network card to one virtual interface. Three logical networks
will then be defined for each configured interface:
135
Using the Security System
Hardware List
PPP modems, which are based on the serial console can be connected
to the serial interface. For more information on configuring the serial
interface with a PPP modem, please see chapter 5.3.2.6 on page 161.
136
Using the Security System
Error:
The Hardware List table doesn’t list all of the network cards.
Possible Causes:
The missing network cards were added after the installation of
the security system, or were not recognized during instal-
lation. Please contact the support department of your security
system provider.
Attention:
If you change the IP Address of the internal network card (eth0),
you may lock yourself out.
137
Using the Security System
Tip:
For an external connection (e.g., to the Internet) choose the
card with Sys ID eth1.
138
Using the Security System
Important Note:
If you wish to configure the Uplink Failover on Interface
function, observe the description of this function while entering
the network!
139
Using the Security System
Important Note:
When the Uplink Failover on Interface function is used, two
different networks must be defined on the Primary and Backup
Interface. Therefore you need two separate Internet accesses
next to the additional network card.
140
Using the Security System
Important Note:
For the bandwidth management Quality of Service (QoS) you
must define the values for Uplink Bandwidth (kbits) and
Downlink Bandwidth (kbits). These values are used as basis
for the bandwidth management system: incorrect values can
lead to poor management of the data flow. The Quality of
Service (QoS) function is described in chapter 5.5.1.
141
Using the Security System
sion. These data packets will be sent again. However, the per-
formance can be limited, if the upper value is too low.
The largest possible MTU for an Ethernet interface is 1500 Bytes.
The following value is the default for the Standard Ethernet
Interface: 1500 Byte.
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
143
Using the Security System
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
145
Using the Security System
146
Using the Security System
Example configuration:
The graphic at left
shows an office where
computers are distrib-
uted across two floors.
Each floor has a separ-
ate switch, and each
computer is connected
to the switch on its
floor. In this configur-
ation, PC1 and PC2 on the first floor and PC4 on the second floor will
be connected together on VLAN 10. PC3, PC5 and PC6 will be
connected together on VLAN 20.
147
Using the Security System
Attention:
In order to configure a Virtual LAN interface, you will need a net-
work card with a tag-capable driver. The Hardware Compatibility
List (HCL) can be found under http://www.astaro.com/kb. Use
the HCL search term to access fastly to the corresponding site.
148
Using the Security System
Important Note:
For the bandwidth management Quality of Service (QoS) you
must define the values for Uplink Bandwidth (kbits) and
Downlink Bandwidth (kbits). These values are used as basis
for the bandwidth management system: incorrect values can
lead to poor management of the data flow. The Quality of
Service (QoS) function is described in chapter 5.5.1.
149
Using the Security System
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
8. Enable the interface by clicking the status light.
The new virtual interface will appear in the Hardware Device Over-
view just as an additional IP address (IP alias) on a standard Ether-
net network card would. The Sys ID of this virtual interface is
composed of the SysID of the network card and the number of the
VLAN tag.
150
Using the Security System
Note:
The installation and specific settings required for DSL connections is
described in the DSL Network guide. Also note that, once the DSL
connection is activated, the security system will be connected to your
ISP 24 hours a day. You should therefore ensure that your ISP bills
on a flat-rate or bandwidth-based system rather than based on
connection time. The DSL Network guide is available at
http://www.astaro.com/kb.
151
Using the Security System
Tip:
For an external connection (e.g., to the Internet) choose the
card with Sys ID eth1.
Important Note:
If you wish to configure the Uplink Failover on Interface
function, observe the description of this function while entering
the network!
152
Using the Security System
Important Note:
When the Uplink Failover on Interface function is used, two
different networks must be defined on the Primary and Backup
Interface. Therefore you need next to the additional network
card for the Backup Interface two separate Internet accesses.
153
Using the Security System
Important Note:
For the bandwidth management Quality of Service (QoS) you
must define the values for Uplink Bandwidth (kbits) and
Downlink Bandwidth (kbits). These values are used as basis
for the bandwidth management system: incorrect values can
lead to poor management of the data flow. The Quality of
Service (QoS) function is described in chapter 5.5.1.
154
Using the Security System
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
155
Using the Security System
156
Using the Security System
Note:
The installation and specific settings required for DSL connections is
described in the DSL Network guide. Also note that, once the DSL
connection is activated, the security system will be connected to your
ISP 24 hours a day. You should therefore ensure that your ISP bills
on a flat-rate or bandwidth-based system rather than based on
connection time. The DSL Network guide is available at
http://www.astaro.com/kb.
3. In the Name entry field, enter a descriptive name for the inter-
face.
Tip:
For an external connection (e.g., to the Internet) choose the
card with Sys ID eth1.
You cannot choose a network card that has already been config-
ured with a primary network address.
5. Use the Type drop-down menu to select the PPTP over Ether-
net (PPPoA-DSL) connection interface type.
157
Using the Security System
Important Note:
If you wish to configure the Uplink Failover on Interface
function, observe the description of this function while entering
the network!
158
Using the Security System
Important Note:
When the Uplink Failover on Interface function is used, two
different networks must be defined on the Primary and Backup
Interface. Therefore you need next to the additional network
card for the Backup Interface two separate Internet accesses.
159
Using the Security System
Important Note:
For the bandwidth management Quality of Service (QoS) you
must define the values for Uplink Bandwidth (kbits) and
Downlink Bandwidth (kbits). These values are used as basis
for the bandwidth management system: incorrect values can
lead to poor management of the data flow. The Quality of
Service (QoS) function is described in chapter 5.5.1.
160
Using the Security System
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
7. Enable the interface by clicking the status light.
161
Using the Security System
access data including password. You will get these data from your
provider.
3. Now enter the name of the interface into the Name entry field.
5. From the Type drop-down menu select the PPP over serial
modem line type of interface.
Important Note:
If you wish to configure the Uplink Failover on Interface
failover for the network card, adhere to the description of this
function for the entry of this network!
162
Using the Security System
163
Using the Security System
Important Note:
When the Uplink Failover on Interface function is used, two
different networks must be defined on the Primary and Backup
Interface. Therefore you need two separate Internet accesses
next to the additional network card.
164
Using the Security System
Important Note:
For the bandwidth management Quality of Service (QoS) you
must define the values for Uplink Bandwidth (kbits) and
Downlink Bandwidth (kbits). These values are used as basis
for the bandwidth management system: incorrect values can
lead to poor management of the data flow. The Quality of
Service (QoS) function is described in chapter 5.5.1.
165
Using the Security System
The system will now check the address and network mask for
semantic validity. After a successful check, the new interface
will appear in the Current Interface Status table. The interface
is not yet enabled (status light is red).
166
Using the Security System
5.3.3. Bridging
Through the Bridging
two or several similar
Ethernet-networks or
network segments can
be connected to each
other. The data packages
are forwarded through Bridging-tables, which assign the MAC-
addresses to a Bridge Port. The Bridge works on layer 2 of the
ISO/OSI-layer-model (see chapter 2 on page 11) of the open
communication and is independent of higher protocols.
3. Select the network cards for the corresponding network from the
Member Interfaces selection field.
167
Using the Security System
Now, the network cards will be connected to each other and the
Bridge will be activated. The selected network cards will be displayed
in the Current Bridged Interfaces table. Then further functions will
be available in this table.
Further functions
Adding Network Cards: Clicking on the Add interface to Bridge
button imports a new line to the table. Clicking on the Click here to
select interface message opens a selection field. Now select the new
network card and save your settings by clicking on the Save button.
The Cancel button will reject the selection again.
168
Using the Security System
Bridge Options
After a specific time interval the module will remove inactive MAC
addresses from the Bridging-table. You can edit the control and
deleting behavior through the two following settings.
Garbage Collection Interval (seconds): Use this entry field to
define the time interval, with which the Bridging table shall be
scrutinized for inactive MAC addresses. Addresses with corresponding
timeouts will be deleted. The function is preset to 4 seconds.
Ageing timeout: Use this entry field to define, after which time
interval an inactive address shall be deleted. The function is preset to
300 seconds.
169
Using the Security System
5.3.4. Routing
Every network-connected computer uses a routing table to determine
where outbound packets should be sent. The routing table contains
the information necessary to determine, for instance, if the destin-
ation address is on the local network, or if traffic must be sent via a
router – and, if a router is to be used, the table details which router is
to be used for which network.
Static Routes
This menu allows you to define which network card or router should
be used to contact various external networks.
170
Using the Security System
Policy Routes
171
Using the Security System
multiple Internet uplinks. Among others this allows to save costs and
to influence the used bandwidth and priorities.
Position: Define the line of the table, into which the route rule
shall be entered. It is possible, to change the sequence of the
routes later. By default, the route is placed at the end (To
Bottom) of the route-table.
Source: Select the source network of the data packets, which
are to be routed, from the drop-down-menu. The Any setting
applies to all networks.
Destination: Select the target network of the data packets from
the drop-down-menu. The Any setting applies to all networks.
Service: Use the drop-down menu to select a service.
This drop-down-menu contains all pre-defined services included
to the security system, as well as any you have defined yourself.
These services allow you to define precisely which traffic should
be processed. The Any entry matches any combination of
protocols and source and destination ports.
Source Interface: Select a network card here for those data
packets, which will be received by the security system and which
will be routed.
Target: Choose the target IP-address for the data packets from
this drop-down-menu.
Either a network card on the security system or a „Next-Hop“-
Host can be configured as target here.
172
Using the Security System
5.3.5. NAT/Masquerading
5.3.5.1. NAT
The Network Address
Translation (NAT) func-
tion translates one set of IP
addresses (usually private
ones) to addresses in an-
other set (usually public).
NAT makes it possible for
computers on an internal
LAN to use private IP ad-
dresses, while still allowing
them to communicate – through the security system – with the public
Internet.
When a client sends an IP packet to the router, NAT translates the
sending address to a different, public IP address (from the address
space given by the Internet provider) before forwarding the packet to
the Internet. When a response packet is received, NAT translates the
public address into the original address and forwards it on to the
internal client. Depending on system resources, the NAT function can
handle arbitrarily large internal networks.
Destination Network Address Translation (DNAT) is a special
case of NAT whereby the destination addresses of packets are trans-
lated. This is especially useful when an internal network uses private
173
Using the Security System
Important Note:
PPTP VPN Access is incompatible with DNAT.
Example:
Your internal network uses the address space 192.168.0.0/255.255.
255.0 and a web server running at IP address 192.168.0.20 port 80
should be available to Internet-based clients.
Because the 192.168 address space is private, the Internet-based
clients cannot send packets directly to the web server. It is, however,
possible for them to communicate with the external (public) address
of the security system. DNAT can, in this case, take packets ad-
dressed to port 80 of the system’s address and forward them to the
internal web server.
Note:
The method of setting up a web server behind the Internet security
system is described in the Web Server/DNAT guide. The Web
Server/DNAT guide is available at http://www.astaro.com/kb.
Tip:
To build a simple translation system from an internal network to the
Internet, use the Masquerading function instead of SNAT.
174
Using the Security System
Note:
In order to forward port 443 (HTTPS) to an internal server, you must
first change the value of the WebAdmin TCP Port (e.g., 1443) for
WebAdmin in the System/WebAdmin Settings menu. This function
is described in chapter 5.1.8 in chapter General Settings.
Note:
Because translation occurs before Packet filtering, you must ensure
that appropriate rules are entered in the Packet Filter/Rules menu.
More information on setting packet filter rules can be found in
chapter 5.4 on page 198.
2. In the Name field, enter a descriptive name for this NAT rule.
Note:
A service can only be redirected when the communicating
addresses are also redirected. In addition, a service can only be
redirected to another service when the two services use the
same protocol.
5. Use the next drop-down menus to define how the packets should
be translated.
176
Using the Security System
Further Functions
Edit rule: Click edit to load the rule into the Edit NAT Rule window.
The rule can now be changed as desired.
5.3.5.2. Masquerading
Masquerading is a special
case of SNAT, which allows
you to associate many intern-
al (private) addresses with
one external (public) ad-
dress. This allows you to hide
internal IP addresses and network information from the outside
network.
• The translation only occurs when the packet is sent via the
supplied network card. The new source address will be that of the
interface.
177
Using the Security System
Note:
In order for clients from the defined network to build a connection to
the Internet, the appropriate rules must be entered in the Packet
Filter/Rules menu.
More information on setting packet filter rules can be found in
chapter 5.5 on page 215.
After a masquerading rule has been defined and added, it will appear
in the NAT Rules table. The further functions in the NAT table can
now be used for further customization.
Further Functions
Edit Masquerading rules: Click edit to load the rule into the Edit
NAT Rule window. The rule can now be changed as desired.
178
Using the Security System
Before the load-balancing rule can be defined, the two HTTP servers
must be defined as networks (consisting of single hosts) in the
Definitions/Networks menu. Next, add both to a single network
group.
The procedures for adding networks and network groups are
described in chapters 5.2.1 and 115, respectively.
Once these definitions have been saved, the load balancing rules can
be defined.
179
Using the Security System
When the load-balancing rule has been defined and saved, it will
appear in the NAT Rules table. The further functions in the NAT table
can now be used for further customization.
Editing Load Balancing rules: Click edit to load the rule into the
Edit NAT Rule window. The rule can now be changed as desired.
Deleting Load Balancing rules: Click delete to remove a rule from
the list.
180
Using the Security System
The DHCP Service menu offers two operation modes. In the DHCP
Relay mode the service is provided from a separate DHCP server and
the security system works as relay. In the DHCP Server mode the
security system provides the address range for the connected
network.
The configuration of the DHCP Relay mode is described in the
following. The basic settings and advanced function for the DHCP
Server mode are described on page 183.
181
Using the Security System
182
Using the Security System
5. Use the Range Start and Range End menus to set the address
space from which IP addresses will be distributed.
183
Using the Security System
NetBIOS networks can also use a WINS server for name resolution.
WINS stands for Windows Internet Name Service. WINS servers are
MS Windows NT servers with both the Microsoft TCP/IP stack and the
WINS server software installed. These servers act as a database
matching computer names with IP addresses, thus allowing com-
puters using NetBIOS networking to take advantage of the TCP/IP
network.
WINS Server IP: Enter the IP address of the WINS server here.
WINS Node Type: Use the drop-down menu to choose which
kind of name resolution clients should use. If you choose Do not
set node type, the client will choose by itself which to use.
184
Using the Security System
MAC Address: In the MAC Address entry field, enter the MAC
address of the network card. The MAC address must be entered
as in the following example
Example: 00:04:76:16:EA:62
IP Address: Enter the IP address into this entry field. The
address must be within the range specified by the Range Start
and Range End options.
Comment: In this entry field you can optionally enter a com-
ment on a static mapping.
The static address mapping will appear in the Static Mapping Table.
To remove an entry from this table, click delete.
185
Using the Security System
186
Using the Security System
http://support.microsoft.com/support/kb/articles/Q191/5/40.ASP
Select the VPN Update and, if you use Windows 95, also the RAS
Update.
187
Using the Security System
Security Note:
You should always set Encryption to Strong (128-bit) except
when your network includes endpoints, which cannot support
this.
188
Using the Security System
PPTP IP Pool
Note:
If you use private IP addresses for the PPTP pool and you wish
PPTP-connected computers to be allowed to access the Internet,
appropriate Masquerading or NAT rules must be in place.
DHCP Settings
189
Using the Security System
1. Under the Network tab, open the PPTP VPN Access menu.
The status light will show green and the menu will open.
3. In the PPTP VPN Access window, make the settings for the
network access:
190
Using the Security System
Important Note:
Both sides of the connection must use the same encryption
strength. If WebAdmin is set to use 40-bit encryption, and the
MS Windows 2000 client is set to use 128-bit encryption,
Windows will incorrectly report that the connection has been
established.
The rest of the configuration takes place on the user’s machine. This
will require the IP address of the server, as well as a valid username
and password. These should be supplied by the security system
administrator.
192
Using the Security System
To start the PPTP connection, simply click the new icon in the
Start/Settings/Network and Dialup Connections menu. Further
information is usually available from the network administrator.
193
Using the Security System
5.3.8. Accounting
When the Accounting func-
tion is enabled, the security
system will track all trans-
mitted data and compile
statistics about it. The ac-
counting menu allows you to
select which network cards should be monitored. You can download
the data from the Log Files/Accounting menu, or view daily reports
in the Reporting/Accounting menu.
Important Note:
In the normal case, you should only enable Accounting on one
network card, because, if more than one card is monitored, data
forwarded from one monitored interface to another monitored one
will be counted twice.
If you use Masquerading, you should probably use Accounting on
the internal interface. Otherwise, data packets dropped by the
security system filters will be included, and will appear to come from
the wrong interface.
194
Using the Security System
Important Note:
Do not use accounting on network interfaces. Doing so may
overload the system.
The status light will show green and another entry window will
open.
195
Using the Security System
Ping Check also allows you to check the connection with a host by
entering the DNS hostname. In order to do that, DNS Proxy must be
enabled in the Proxies/ DNS menu.
Note:
• Ping will not work unless ICMP on firewall (in the Packet
Filter/ICMP menu) is activated.
• Name Resolution will not work unless DNS Proxy (in the
Proxies/DNS menu) is activated.
196
Using the Security System
Using Ping:
1. Under the Network tab, open the Ping Check menu.
197
Using the Security System
5.4.1. Settings
Global Settings
Anomaly Detection
Notification Levels
• High and medium severity: for high and medium levels of risk.
• High and medium severity: for high and medium levels of risk.
199
Using the Security System
5.4.2. Rules
The Rules menu contains the Intrusion Protection System (IPS)
set of rules. The already existing base set of rules with the IPS attack
signatures can be updated through the Pattern Up2Date function, if
desired. New IPS attack signatures will automatically be imported as
IPS rule to the IPS rules table.
: Clicking on the folder icon opens the sub-tab with all protocols of
this group.
By clicking again on the icon, you will get back to the overview. The
200
Using the Security System
Info: This column provides short information on this IPS rule group.
All IPS rules of a group are listed in this sub-tab. The sub-group can
be opened in the overview by clicking on the folder icon ( ).
201
Using the Security System
Hits: This column displays, how often a rule from the group became
active.
Info: The first line provides short information on this IPS rule group.
You can obtain detailed information on the IPS rules by clicking on the
correspondent icon with the mouse.
202
Using the Security System
The new IPS rule is always locally imported to an IPS set of rules.
The rule is immediately enabled (status light shows green).
203
Using the Security System
204
Using the Security System
Since 65535 ports are available for the TCP and UDP Internet
protocols, the ports are scanned at very short intervals. When the
firewall detects an unusually large number of attempts to connect to
services, especially when these attempts come from the same source
address, this is almost certainly due to a portscan.
PSD watches for such scans and immediately informs the adminis-
trator via e-mail when one is detected. The administrator can also
decide what further measures should be taken in response to the
scan. The e-mail address of the administrator can be configured in the
System/Settings menu.
Security Note:
The administrator should take special care that all systems have
the most recent security patches installed.
The Up2Date service, which updates the security system itself,
is detailed in chapter 5.1.3 on page 56.
205
Using the Security System
206
Using the Security System
Denial-of-Service attacks
(DoS) on servers, shall
deny the service access to
legitimate users. In the
simplest case, the attacker
overloads the server with
useless packets, to overload
its performance. Since a
large bandwidth is required
for such attacks, more and
more attackers start using so-called SYN Flood attacks, which don't
aim at overloading the bandwidth, but at blocking the system
resources. For this purpose, they send so-called SYN packets to the
TCP port of the service, i.e. in a web server to Port 80.
207
Using the Security System
5. Define the maximum rate for the data packets in the following
two settings.
208
Using the Security System
filtered for the source address. If, in addition to that, there are
also too many requests, also the SYN packets for the destination
address will be filtered.
Destination address only: Only those UDP packets will be
rejected in this mode, which treat especially the destination IP
address.
Source address only: Only those UDP packets will be rejected
in this mode, which treat especially the source IP address.
Logging: UDP flood attacks might result in the creation of very
bulky protocols. This drop-down-menu allows you to define the
logging scope. The potential settings are Everything, Limited
and Off.
211
Using the Security System
5. Define the maximum rate for the data packets in the following
two settings.
212
Using the Security System
5.4.5. Advanced
This menu allows you, to
configure additional settings
for the Intrusion Protec-
tion System (IPS). This
should, however, only be
done by experienced users.
Policy: From this drop-down menu select the security policy that the
Intrusion Protection System should use, if a blocking rule detects an
IPS attack signature.
213
Using the Security System
Performance Tuning
Note:
If you don’t configure a server in this window, the Intrusion
Protection System (IPS) will monitor the complete data traffic ac-
cording to the settings in the Global Settings window.
HTTP Service: In this drop-down menu select the target port for the
HTTP data traffic, by selecting a Service. In the Definitions/Ser-
vices menu, you can change or add a Service, if necessary. The
added service will only use the target port number. In the case of a
port range, only the first and last port will be used.
Example: In a port range 80:8080 the HTTP rule will be used for the
target port 80 and 8080.
214
Using the Security System
The Packet Filter is the central part of the firewall. In the Rules
menu you define the allowed data traffic between the networks and
hosts in the form of Packet filter rules. You can also define specific
packets, which will never be allowed to pass through the firewall. The
packet filter management is done in the Rules table.
The tools in the ICMP menu allow you to check the network
connections and functions of the security system. The additional and
reporting functions are available in the Advanced menu.
5.5.1. Rules
The Rules menu allows you
to define packet filter sets of
rules. These rules are de-
fined with the help of the
network and service def-
initions.
215
Using the Security System
Example:
Network A is a subset of network B. Rule 1 allows SMTP traffic
destined for Network A. Rule 2 blocks SMTP for network B. Result:
Only SMTP traffic for network A will be allowed. SMTP packets from
the rest of network B IP addresses will be blocked.
216
Using the Security System
2 were moved to be before rule 1, all SMTP traffic for both networks
would be blocked. Be very careful when defining rules and their order,
as this will determine the security of your firewall.
Important Note:
When one filter rule applies, all other rules will be ignored! The
sequence of rules is thus very important. Never place a rule like Any
(Source) – Any (Service) – Any (Destination) – Allow (Action) at
the top of the rule set.
Position: Define the line of the table, in which the packet filter
rule will be entered. It is possible, to change the sequence of the
packet filter rules later. By default, the rule is placed at the end
(To Bottom) of the rules table.
Group: For a smooth management of the set of rules, the
packet filter rules can be grouped together in one group. This
does not influence the way, in which a rule will be processed
within the set of rules.
217
Using the Security System
For the first rule, no group can be selected from the drop-down
menu yet. New groups are defined in the set of rules table.
Source: In the drop-down menu, select the source address of
the data packets. The Any setting applies to all IP addresses,
regardless of whether these are publicly assigned IP addresses
or private IP addresses according to RFC1918.
Service: Use the drop-down menu to select a service.
This list includes all the pre-defined services included in the
Security system, as well as the ones that you defined yourself.
This allows you to define precisely which traffic should be
allowed. The Any setting represents here all combinations of
protocols and source and/or destination ports.
Destination: In the drop-down menu, select the destination ad-
dress of the data packets.
The Any setting applies to all IP addresses, regardless of
whether these are publicly assigned IP addresses or private IP
addresses according to RFC1918.
Action: In the Action drop-down menu, select the action to
execute if a data packet complies with the settings for Source,
Service and Destination: In connection with this action, the
priority for the Quality of Service (Qos) function is also config-
ured here.
Important Note:
In order to enable the priorities high priority and low priority,
you must select the respective interface for the QoS function in
the Network/Interfaces menu and also define the values Up-
link Bandwidth (kbits) and Downlink Bandwidth (kbits).
218
Using the Security System
If the definition was successful, the new Packet filter rule will
be added to the rule table in a deactivated state, marked by the
red status light.
After the rule is added to the table, further options are available for
managing and editing rules in the rules table.
219
Using the Security System
Note:
By default, new rules are added in an inactive state in the table. The
rule will only become effective when it is set to be active. See
Activating/deactivating rules.
The following table explains all symbols from the rules table.
The Symbols
Trash can
Source/Destination Host
Source/Destination Network
Action Allow
220
Using the Security System
Action Drop
Action Reject
Activating the time control: Clicking on the field in the column with
the clock symbol ( ) opens a drop-down menu. Now, you can select
the time interval for the packet filter rule. Click on the Save button to
save your changes.
In order to interrupt this process, click on the Cancel button.
If a time interval is configured for a packet filter rule, a clock symbol
will be displayed in the corresponding field. The precise settings for
this time interval will be displayed, if you touch the clock symbol with
the mouse.
The time intervals are defined in the Definitions/Time Events
menu. The menu is described in more detail in chapter 5.2.4 on page
129.
221
Using the Security System
Re-order rules: The order of the rules in the table determines the
behavior of the firewall; having the correct order is essential for se-
cure operation. By clicking the position number, you can adjust the
order to suit your needs. In the drop-down menu select the Position,
to which you wish to place the packet filter rule and confirm your
settings by clicking on the Save button.
Delete rules: Click the trash can icon to delete a rule from the table.
Sorting the rules table: By clicking on the column headers, you can
sort the table: for instance, to sort the rules by sender address, click
Source. To return to the precedence-based sorting Matching, click
the column with the position numbers.
Filters
The Filters function allows you to filter Packet Filter Rules by specific
attributes. This function enhances the management of huge networks
with extensive sets of rules, since rules of a specific type can be
presented in a concise way.
Filtering rules:
1. Click on the Filters button.
3. Enter the filter attributes in the fields. Not all attributes must be
defined.
222
Using the Security System
Only the filtered packet filter rules will be displayed then. When the
menu is closed, the complete set of rules will be displayed again.
223
Using the Security System
Important Note:
In order to enable the priorities high priority and low priority, you
must select the respective interface for the QoS function in the Net-
work/Interfaces menu and also define the values Uplink Band-
width (kbits) and Downlink Bandwidth (kbits).
In order to assign the same bandwidth to the connection with the web
server, as shown in the example, as the one for the connection with
the FTP server, both packet filter rules must be set to the same
Action:
224
Using the Security System
If the Uplink is only used by the data packets of these two servers,
each connection receives one half of the bandwidth (1MBit/s) in the
Worst Case. The High Priority setting becomes only relevant, if a
third data connection is established. All connections with a lower
priority, Allow or Allow (low priority), will be treated with a lower
ranking.
Internet-wide Broadcast:
In order to drop IP broadcast packets, first define the broadcast
address in the Definitions/Networks menu in the form of a new
network. Next, install the appropriate packet filter rule and activate it.
Name: Broadcast32
Type: Host
IP Address: 255.255.255.255
Comment (optional): Enter a comment.
3. Under Packet Filter, open the Rules menu and enter the
following rule:
Source: Any
Service: Any
Destination: Broadcast32
Action: Drop
225
Using the Security System
Segment-wide Broadcast:
For each network card configured in the Interfaces menu, the system
automatically defines a network named NAME (Broadcast).
For more information, please see the Current Interface Status
section of chapter 5.3.2 on page 133.
1. Under Packet Filter, open the Rules menu and enter the
following rule:
Source: Any
Service: Any
Destination: Select the broadcast network for the relevant
interface here.
Example: NAME (Broadcast)
Action: Drop
Comment (optional): Enter a comment.
2. Confirm the entries by clicking Add Definition.
226
Using the Security System
5.5.2. ICMP
ICMP Settings
Note:
More information on ICMP can also be found in the Ping and
Traceroute sections.
Important Note:
Settings configured here take precedence over rules configured in the
packet filter rules table.
When the ICMP settings are disabled, packet filter rules can be used
to allow specific IP addresses or networks to ping the firewall or
internal network.
227
Using the Security System
Important Note:
If you wish to disable ICMP forwarding, you must ensure that the
Packet Filter/Rules menu does not contain a rule of the form Any
(Source) – Any (Service) – Any (Destination) – Allow (Action).
Otherwise ICMP forwarding will remain active irrespective of the
setting here.
Note:
ICMP on firewall must be activated to use the Ping action. The
action is described in more detail in the Network/Ping Check menu
and is described in chapter 5.3.9 on page 196.
Log ICMP Redirects: ICMP Redirects are sent from one router to
the other, in order to find a better route for a destination. Router then
change their routing tables and forward the following packets to the
same destination on the supposed better route.
This function logs the ICMP Redirects. Clicking on the Enable button
enables the function (status light is green).
Traceroute Settings
Note:
These two functions, Firewall is Traceroute visible and Firewall
forwards Trace route, are probably only useful when both are
enabled.
229
Using the Security System
Ping Settings
Ping from Firewall: The Ping command can be used on the firewall.
Click the Enable button to enable the function (status light shows
green).
5.5.3. Advanced
230
Using the Security System
• H323
Protocol Handling
231
Using the Security System
• icmp: 22 bytes
• tcp: 48 bytes
• udp: 28 bytes
If the data packets are shorter than the minimal values, they are
blocked and recorded to the Packet Filter log file with the annotation
INVALID_PKT:.
The log files are administered in the Local Logs/Browse menu.
232
Using the Security System
Logging Options
Log FTP Data Connections: All FTP data connections – either in the
active or in the passive mode – are recorded to the Packet Filter
log file with the annotation FTP_DATA:.
The log files are administered in the Local Logs/Browse menu.
System Information
see which action has been performed for the respective violation of a
rule:
• Red: The package was dropped.
Packages that have been blocked due to the Spoof Protection,
Validate Packet Length and SYN Rate Limiter functions also have a
red background color.
To reset the filter, click the Clear button. From this moment on, all
violations of rules will be displayed in the Packet Filter Live Log again.
Clicking on the Pause Log check box interrupts or continues the
update.
Note:
Please note that only those processed rules will be filed in a protocol,
for which the Log function has been enabled under Packet Filter/
Rules!
235
Using the Security System
In the Proxies tab, select the Proxies with the same name and
configure the settings. By default, all proxies are disabled. This
security system contains proxies for HTTP (Web), SMTP (e-mail),
POP3, DNS (Name server), SIP, SOCKS (point-to-point connec-
tions), Ident.
236
Using the Security System
5.6.1. HTTP
The HTTP menu allows you
to configure the security
system as a HTTP Caching
Proxy. This proxy can pro-
vide caching services in
addition to simple proxy
services, resulting in dra-
matic performance in-
creases: pages, that had al-
ready been requested be-
fore are no longer re-loaded via the Internet but only retrieved from
the proxy cache after the first transmission.
Note:
WebAdmin should not be used through a proxy. Configure your
browser so that connections to the security system’s IP address do
not use a proxy server.
237
Using the Security System
The HTTP proxy controls web transactions using the HTTP protocol
(usually TCP/IP Port 80). Please note that some web servers transmit
some data, in particular streaming video and audio, over a port other
than 80. These requests will not be noticed when the proxy is in
Transparent mode: to support such requests, you must either use a
different mode, or enter an explicit rule in the Packet Filter/Rules
allowing them.
Example:
Action: Allow
238
Using the Security System
HTTPS (TCP/IP Port 443) data is passed directly through the security
system without processing.
Note:
In order to use the Proxy in Standard mode, the client Browser
must be configured with the TCP/IP Address of the security
system and the proxy port configured in the Proxies/HTTP menu.
In addition, the HTTP proxy service requires a valid Name server
(DNS). Without configuring the client browser, the Proxy can only
be used in Transparent mode.
Global Settings
Operation Modes:
Standard: In this mode, you must select all networks which should
be allowed to use the HTTP proxy service. If a browser on a non-
configured network is configured to use the proxy, it will have no
access to HTTP services.
If the Word Wide Web shall be accessed without the HTTP proxy, you
have to enable the HTTP data traffic between the internal network and
the Internet or the web server by a rule in the Packet Filter/Rules
menu.
Example:
Service: HTTP
Action: Allow
To access the World Wide Web via the proxy enter the IP address of
the proxy – which is in general the IP address of the internal network
card - and the port address 8080 into the browser.
239
Using the Security System
240
Using the Security System
Note:
Changes in Proxies become effective immediately, without further
notice.
241
Using the Security System
Access Log only: The log only records access information, for
example URL accessed and username/IP address of the client.
None except Content Filter: No data are logged for the
Caching function. The entries of the content filter log are still
recorded.
Note:
In Standard and Paranoid modes, the proxy blocks all cookies.
If you wish to use cookies, you should use the none mode.
Parent Proxy
Host: Select the parent proxy server from the drop-down menu.
Prior to this, the server must be defined in the Definitions/
Networks menu.
243
Using the Security System
Advanced
244
Using the Security System
TCP Port: Enter the TCP/IP Port in the entry field. By default, this
is set to the TCP/IP Port 8080.
Clear HTTP Proxy Cache: The HTTP Proxy Cache proxy stores a
copy of often-visited pages locally, reducing load times.
By clicking the Start button, the cache will be cleared, and any new
accesses will be loaded from the remote Internet site.
245
Using the Security System
• Strip Scripts
This Surf Protection option can only be configured when the HTTP
proxy is enabled. The modules and protection mechanisms are de-
scribed in the Profiles Table section.
The information and error messages that are returned by the HTTP
proxy are listed in chapter 5.10.3.3 on page 393.
246
Using the Security System
Important Note:
The Content Filter connects to Cobion via Port 6000.
The functions of the Control List are identical to the Ordered List
and described in chapter 4.3.5 on page 41.
247
Using the Security System
Community_Education_Religion*
(1) Governmental Organizations
Websites with content for which governmental organizations are
responsible (e.g. police departments, fire departments, hospitals)
and supranational government organizations (e.g. the United
Nations or the European Community).
(4) Education/Enlightenment
Websites of universities, colleges, public schools, schools,
kindergartens, adult education, course offerings, dictionaries and
encyclopedias of any topic.
248
Using the Security System
Criminal_Activities*
(8) Illegal Activities
Websites describing illegal activities according to German law (e.g.
instructions for murder, manuals for bomb building, manuals for
murder, instructions for illegal activity, child pornography).
(9) Computer Crime
Websites describing illegal manipulation of electronic devices (e.g.
methods and also password encryption and decryption, virus
programming and credit card misuse).
(10) Hate and Discrimination
Websites with extremes (e.g. extreme right and left-wing groups,
sexism, racism and the suppression of minorities).
(11) Hacking
Information on hacks and cracks (e.g. license key lists and illegal
license key generators).
Drugs*
(12) Illegal Drugs
Websites about illegal drugs (e.g. LSD, heroine, cocaine, XTC, pot,
amphetamines, hemp and the utilities for drug use).
(13) Alcohol
Websites dealing with alcohol as a pleasurable activity (e.g. wine,
beer, liquor, breweries) and websites of alcohol distributors.
(14) Tobacco
Websites about tobacco and smoking (cigarettes, cigars, pipes),
and websites of tobacco vendors.
249
Using the Security System
Entertainment_Culture*
(16) Cinema/Television
Websites from cinemas and TV providers (e.g. program informa-
tion and video on demand).
(18) Art/Museums
Websites about cultural events and museums (e.g. theatres,
museums, exhibitions, and opening days).
(19) Music
Websites from music providers (e.g. radio stations, MP3, Real
Audio, Microsoft Media, homepages of bands, record labels and
music vendors).
(20) Literature/Books
Websites about literature and books (e.g. novels, poems,
specialized books, cooking books, advisories, etc.).
(21) Humor/Comics
Websites with humorous content (e.g. jokes, sketches).
(22) Extremistics
Websites with extreme content (e.g. violence). These URLs are
generally already assigned to other sub-categories.
Finance_Investing*
(23) Brokerage
Websites displaying stock exchanges rates dealing exclusively with
the main stocks (e.g. finance, brokerage and online trading).
(24) Investing
Websites about real estate (e.g. insurance, and construction
financing).
250
Using the Security System
(25) Banking
Websites of banks (e.g. bank offices, credit unions, and online
bank accounts).
Games_gambles*
(26) Gambling
Websites of lottery organizations (e.g. casinos and betting
agencies).
(27) Computer Games
Websites of computer games (e.g. computer game producers,
cheat sites and online gaming zones).
(28) Toys
Websites containing information about toys (e.g. dolls, modeling,
scale trains/cars, board games, card games and parlor games).
Information_Communication*
(29) General News/Newspapers/Magazines
Websites that inform about general topics (e.g. magazines or
newspapers).
(30) Web Mail
Websites that enable internet users to send or to receive e-mails
via the internet. All providers of web mail services are categorized
in this sub-category as well.
(31) Chat
Websites that allow users to have a direct exchange of information
with another user from place to place. All providers of web mail
services are categorized in this sub-category as well.
(32) Newsgroups/Bulletin New Boards/Discussion Sites
Websites that enable sharing information such as on a pin board,
including a variety of topics.
services for mobile phone accessories that are not necessary for
daily use (e.g. games, ring tones and covers).
(34) Digital Postcards
Websites that allow people to send digital postcards via the
internet, and also the providers of these services.
IT*
(36) Software and Hardware Vendors/Distributors
Websites of producers of hardware used for information,
measuring and modular technology, vendors of software, and
distributors that provide hardware and software.
Job_Search*
(41) Job Search
Websites of job offerings (e.g. job searches, job agencies, labor
exchanges, temporary work, etc).
252
Using the Security System
Lifestyle*
(42) Dating/Relationship
Websites that promote interpersonal relationships.
(43) Restaurant/Bars
Websites about bars, restaurants, discotheques, and fast food
restaurants.
(44) Travel
Websites about traveling (e.g. monuments, buildings, sights,
travel agencies, hotels, resorts, motels, airlines, railways, car
rental agencies and tourist information).
(45) Fashion/Cosmetics/Jewelry
Websites about fashion, cosmetics, jewelry, perfume, modeling
and model agencies.
(46) Sports
Websites about fan clubs, events (e.g. Olympic Games, World
Championships), sport results, clubs, teams and sporting
federations.
(47) Building/Residence/Furniture
Websites about building equipment (e.g. property markets,
furniture markets, prefabricated houses, design, etc.).
(48) Nature/Environment
Websites about nature and environment (e.g. pets, market
gardens, environmental protection etc.).
Locomotion*
(49) Locomotion
Websites about all kinds of transportation means (e.g. resort
automobiles, car tuning, car-exhibitions, motorbikes, airplanes,
ships, submarines, bikes, railway, etc.).
253
Using the Security System
Medicine*
(50) Health/Recreation/Nutrition
Websites about health, recreation and nutrition (e.g. hospitals,
doctors, drugstores, psychology, nursing, health food stores and
medicine, etc.).
(51) Abortion
Websites about abortion.
Nudity*
(52) Pornography
Websites containing the depiction of sexually explicit activities and
erotic content unsuitable to children or persons under the age of
18.
(53) Erotic/Sex
Websites containing erotic photography and erotic material, as it
can be found on television or obtained from magazines free of
charge. Sex toys are also in this category. Sexually explicit
activities are not listed here.
(54) Swimwear/Lingerie
Websites containing nudity, but with no sexual references.
Includes bikini, lingerie and nudity.
Ordering*
(55) Online Purchasing
Websites from online shops where there is a possibility to choose
from a product range and order online.
(56) Auctions/Small Advertisements
Websites from online/offline auction sites, auction houses and
online/offline advertisements.
Private_Homepages*
(57) Private Homepages
Includes private websites and homepage servers.
254
Using the Security System
Suspicious_and_Uncategorized*
Weapons*
(59) Weapons
Websites dealing with guns, knives (not including household or
pocket knives), air guns, fake guns, explosives, ammunition,
military guns (tanks, bazookas), guns for hunting, and swords.
The status light will show green and an advanced entry window
will open.
Clicking on Name opens another entry window. You can edit the
name of a category here.
If you click on the sub-categories, another selection window will
open. All available sub-categories will be listed in this selection
field. You can add further sub-categories to the category here.
255
Using the Security System
The information and error messages that are returned by the HTTP
proxy are described in chapter 5.10.3.3 on page 393.
256
Using the Security System
The Functions
Virus Protection for Web: This functions checks incoming traffic for
dangerous content such as viruses.
Clicking on the check box enables and disables the Virus Protection
for Web.
257
Using the Security System
258
Using the Security System
Another huge benefit of this function is to prevent the user from so-
called Phishing attacks, since, as a rule, phishing mails contain sus-
picious links. Those links are either Uncategorized (Cobion sub-cat-
egory 73), Categorization Failed (74), or Suspicious (75) having the
effect that those categories will be blocked. Thus, even if a phishing
mail has been delivered, the user cannot click on the fraudulent links.
Next to potentially contaminated URLs, it might also happen that
259
Using the Security System
Security Note:
Enable the Strip Embedded Objects function only, if high
security demands apply to your network.
Clicking on the check box enables and disables the Strip Embedded
Objects.
Strip Scripts: This function deletes script contents, such as Java and
VBScript from incoming HTTP traffic.
Security Note:
Enable the Strip Scripts function only, if high security demands
apply to your network.
Clicking on the check box enables and disables the Strip Scripts.
File extension blocking: This function is used to block files with
extensions from the control list.
Open the access control list by clicking on the line with the entry (e.g.
0 entries). Enter the extensions one beneath the other. Please ensure
that only the „exe“ string stands in the line and not also the additional
dot in front of the extension (correct: exe, wrong: .exe). Comments
must be identified with a # sign at the beginning of each line. Save
your changes by clicking on the Save button. To keep an old entry,
click cancel.
260
Using the Security System
261
Using the Security System
Open the access control list by clicking on the line with the entry
(e.g., 0 entries). Enter the Internet addresses one beneath the other.
Comments must be identified with a # sign at the beginning of each
line.
Save your changes by clicking on the Save button. To keep an entry,
click cancel.
Open the access control list by clicking on the directory with the entry
(e.g., 0 entries). Enter the expressions one beneath the other.
Comments must be identified with a # sign at the beginning of each
line.
Save your changes by clicking on the Save button. To keep an entry,
click cancel.
The status light will show green and an advanced entry window
will open.
By Default the Profiles table contains a Blank Surf Protection
Profile.
2. To add a new Blank Surf Protection Profile to the table, click
on the Add blank Profile button.
262
Using the Security System
Security Note:
In the HTTP protocol the header of the request will be
filtered by the HTTP Cache Proxy Squid.
This is different in the HTTPS protocol - in this case, the
squid does not read the header of the request, but per-
forms a pass through. Therefore, the requested URL is
unknown and cannot be filtered again. This means that the
Surf Protection option cannot evaluate requested URLs
on the basis of White- or Blacklists.
263
Using the Security System
Security Note:
Enable the Strip Embedded Objects function only, if high
security demands apply to your network.
Strip Script: Clicking on the check box enables and disables the
function.
Security Note:
Enable the Strip Script function only, if high security
demands apply to your network.
264
Using the Security System
The Surf Protection Profiles from the Profiles table are assigned to
Local Users or Networks in the Profile Assignment table.
To assign a Surf Protection Profile to a local user, the HTTP proxy
must be used in the User Authentication mode. The assignment of
Profiles to a network is possible in every operation mode.
Important Note:
If you are simultaneously assigning a Profile to a local user and to
a network, this Profile will only take effect, if the user accesses the
HTTP proxy from the "configured“ network! Only one Surf Protec-
tion Profile can be configured for each user or network.
The Functions
265
Using the Security System
Clicking on the field with the entry will open a drop-down menu. This
drop-down menu allows you, to change the order of the profile
assignments. Save your changes by clicking on the Save button. To
keep an entry, click cancel.
Status light: The status light refers to the status of the profile
assignment: Each new assignment is not yet enabled (status light is
red).
The profile assignment will be enabled by clicking on the status light
(status light is green).
Profile Name: Select the Surf Protection Profile in this field from
the Profiles Table.
Clicking on the field with the entry opens the drop-down menu. Save
your changes by clicking on the Save button. To keep an entry, click
cancel.
Directory Groups: You will need this entry field only, if you use an
authentication via Radius, LDAP or Active Directory. Enter the Group
Name from the directory service, to which this Profile shall be
assigned into this column. For LDAP please enter the Distinguished
Name (DN), which is also used for the user requests on the LDAP-
server.
If you use Active Directory, you must define a group with the
266
Using the Security System
Important Note:
If you are simultaneously assigning a Profile to a local user and to
a network, this Profile will only take effect, if the user accesses the
HTTP proxy from the “configured” network! Only one Surf Pro-
tection Profile can be configured for each user or network.
267
Using the Security System
3. From the Assigned local Users field, select the local user for
this profile.
4. From the Assigned Network Blocks, select the network for this
profile.
268
Using the Security System
5.6.2. SMTP
An SMTP Proxy allows you
to protect an internal mail
server from remote attacks.
While forwarding and re-
ceiving messages, the proxy
can also scan them for poten-
tially dangerous contents.
This menu also allows you to
configure Spam Protection
parameters to block un-
wanted e-mails.
Note:
In order to use the SMTP Proxy correctly, a valid nameserver
(DNS) must be activated. System notifications are sent to the
administrator even if the SMTP proxy is disabled.
269
Using the Security System
Important Note:
If you wish to use TLS encryption, this hostname must be
identical with the one listed in your DNS server’s MX record.
Otherwise, other mail servers using TLS will refuse to send in-
coming mails.
Security Note:
Messages sent from networks listed in the Allow Relay
from window will never be scanned by Spam Detection.
From the hosts, which are not in the Selected selection field, e-
mails can only be sent to those domains, which are defined in
the Domain Groups.
6. In the Transparent Mode line click the Enable button, if you
wish to operate the proxy in this mode.
270
Using the Security System
271
Using the Security System
2. In the text entry field Group, enter a descriptive name for the
domain group.
272
Using the Security System
specified by the MX record. You should take care that the firewall
itself is not the MX host for the domain.
Sender Blacklist: This function allows you to create a list of sender
addresses, for example those of known spam senders. The proxy will
then reject all messages with
these addresses in either the
From or Reply-To headers.
273
Using the Security System
Use RBL: The Realtime Blackhole Lists (RBL) function uses an ex-
ternal database of known spam senders to check sending addresses.
Several services of this type are available on the Internet. This
function helps to massively reduce the number of spam.
One commercial service, for example, can be found at
http://www.mail-abuse.org.
The Internet addresses of the data bases are entered in the Feature
Settings window into the RBL Zones control list.
The function of the Control List is identical to the Ordered List and
described in chapter 4.3.5 on page 41.
Deny RCPT Hacks: The proxy will reject e-mails with a sender
address containing the characters !, %, /, or |or an additional @. In
addition, addresses with an extra @ symbol, or which begin with a
dot (.) will also be blocked.
SPF Fail Check: With this function, the Firewall controls through the
Sender Policy Framework (SPF), whether ingoing e-mails have been
sent from the correct server. SPF is made available through specific
DNS-entries, which are requested here. Through SPF the owners of a
domain can publish information on their mail-servers in DNS.
A domain uses public Records (DNS) to direct requests for the
different services (e. g. HTTP, SMTP, etc.) to those computers, which
execute those services. The Mail (MX) Records are already
published by all domains, to inform others on those computers, which
contain e-mails for this domain. By SPF are now published the
„reverse“ Mail (MX) Records, in which it is disclosed, which com-
puters send e-mails from a specific domain. The receiver of a mail can
only control those Records and determine whether they have really
been sent from this domain.
275
Using the Security System
senders of spam mail do not try to send mails again when there is a
Temporary Failures, in contrast to RFC-conforming mails-servers.
If the time stamp is older than five minutes, the e-mail will
immediately be delivered and the time stamp will be updated
with the current time minus five minutes.
Verify Recipient: This function is used to compare the receiver ad-
dresses of ingoing e-mails with the addresses on your Backend Mail
Server.
To make this work, the Backend Mail Server must reject e-mails to
unknown receiver addresses on SMTP-level! The general rule is: If the
Backend Mail Server rejects a mail, then the mail will also be rejected
by the firewall.
Verify Sender: This function is used to check the sender addresses
of incoming e-mails. It is checked whether messages can really be
delivered from the sender address, by connecting to the host and
executing a RCPT-command. If this is not the case the mail will be
rejected.
3. In the Route Target field, set the route for incoming mails.
276
Using the Security System
Feature Settings
RBL Zones: Enter the Internet addresses of the databases for the
Use RBL function into the control list.
The function of the Control List is identical to the Ordered List and
described in chapter 4.3.5 on page 41.
277
Using the Security System
BATV skip Recipients: Enter the recipients that should receive un-
signed messages into the control list. This is needed, for instance,
when posting on mailing lists that make use of the envelope sender
address. The disadvantage is that you don’t get bounces from the
addresses entered in this field.
BATV skip Senders: Enter the senders that are allowed to send un-
signed messages into the control list.
Greylist skip Recipients: Enter the recipients that are exempted
from greylisting into the control list.
The Scan Outgoing Messages function uses the Content Filter for
outgoing connections.
278
Using the Security System
Action: This drop-down menu allows you to select the action the
proxy should take upon finding a message with a filtered string. The
following actions are possible:
• Warn: The e-mail will be treated by the filter, but allowed to pass.
A Header will be added to the e-mail, by which it can be sorted or
filtered on the mail server or in the e-Mail programs of the
recipient.
279
Using the Security System
• Level 1: This step causes that only e-mails with most serious
errors are treated. This setting is recommended, since many users
use a deficient encryption program that already responds in the
higher levels (Level 2 und 3).
280
Using the Security System
• Warn: The e-mail will be treated by the filter, but allowed to pass.
A Header will be added to the e-mail, by which it can be sorted or
filtered on the mail server or in the e-Mail programs of the
recipient.
Extensions: Enter the file extensions, such as exe, that the firewall
should filter.
The function of the Control List is identical to the Ordered List and
described in chapter 4.3.5 on page 41.
Virus Protection
Action: This drop-down menu allows you to select the action the
proxy should take upon finding a message with a filtered string. The
following actions are possible:
281
Using the Security System
Expression Filter
There is the chance that new viruses will appear which are not yet
recognized by the firewall. Various viruses can be identified because
of known strings – such as the IloveYou virus. The strings are entered
into the control list. If an e-mail contains this string, it will be blocked.
Next to simple strings, also expressions can be defined in the form of
Perl Compatible Regular Expressions.
Action: This drop-down menu allows you to select the action the
proxy should take upon finding a message with a filtered string. The
following actions are possible:
• Warn: The e-mail will be treated by the filter, but allowed to pass.
A Header will be added to the e-mail, by which it can be sorted or
282
Using the Security System
Important Note:
When you use an upstream firewall, it must allow traffic from the
security system to the Internet on the following ports. They are used
for communication to the Spam Protection databases:
TCP Port 2703, UDP Port 6277, UDP Port 53 (DNS)
Two Thresholds can be defined for the Spam score. This ensures
that potential SPAM e-mails are treated differently by the Firewall.
The two Thresholds are equal; whereas the threshold with the
higher level should be treated more severely. The functioning is
explained below with the help of the default settings.
283
Using the Security System
Default settings:
Threshold One
When Spam Level exceeds: 05 (reasonable)
do this: Quarantine
Threshold Two
When Spam Level exceeds: 08 (conservative)
do this: Reject
The first threshold implicates that e-mails from level 5 on are filtered,
and put in quarantine. The e-mail will be displayed in the Proxy
Content Manger menu with the status Quarantine.
With the second threshold the e-mail will be sent back with a
comment.
Basically, the Threshold with the higher level is treated more
severely (do this).
Important Note:
On busy systems, the Spam Detection may require a large
percentage of system resources.
284
Using the Security System
do this: This drop-down menu allows you to select the action the
proxy should take upon finding a message with a filtered string. The
following actions are possible:
• Reject: The message will be bounced back to the sender with a
5xx error message. The bounce message sent to the sender will
also contain an explanation of why the message was blocked.
• Pass: The e-mail will be treated by the filter, but allowed to pass.
A Header will be added to the e-mail, by which it can be sorted or
filtered on the mail server or in the e-mail programs of the
recipient.
Spam Sender Whitelist: This control list is defined for the Spam
Protection function. Enter the e-mail addresses of those senders into
the list, whose messages you wish to allow through.
The function of the Control List is identical to the Ordered List and
described in chapter 4.3.5 on page 41.
285
Using the Security System
The Header:
Many of the functions will add headers to the messages scanned:
The Header will inform the user on specific characteristics of a
message. If you select the Warn action, recipients can configure their
e-mail programs to filter messages with high spam scores. The
following is a list of the headers the SMTP proxy may insert:
1. Start MS Outlook.
2. Click on Inbox.
The Rules Wizard opens, in order to set new rules. The Rules
wizard now leads you step-by-step through the configuration.
5. Which type of rule do you want to create? (step 1)
Type a distinct name for this rule into the input field. In the
options fields below, you can activate these rules and also apply
them on e-mails, which are already in the Inbox folder. You can
change your settings in the window Rule description.
287
Using the Security System
SMTP Authentication
Important Note:
Some mail servers, such as Lotus Domino, use non-standard
implementations of TLS. While these servers claim to support TLS
during connection negotiation, they cannot establish a TLS full
session. If TLS is enabled, it will not be possible to send messages to
these servers. In such situations, please contact the administrator of
the mail server.
288
Using the Security System
Advanced Settings
Trusted Hosts/Networks:
In the selection field a
Global Whitelist can be
defined with reliable hosts
or networks, which in this
case are excluded from the
following options:
• Expression Filter
• Spam Protection
This implicates, that the necessary computing power for scans is
reduced and that problematic hosts can be excluded from Content
Scanning.
• Greylisting
• Sender Verification
Security Note:
This function should only be used carefully, since sender
addresses can easily be falsified.
Max message size: Enter the maximum message size for in- and
out-bound mail messages. Normal values are 20 or 40 MB. Please
note that the encoding used to transmit e-mails can make the size of
the message larger than the files sent.
289
Using the Security System
Important Note:
Some mail servers, such as Lotus Domino, use non-standard
implementations of TLS. While these servers claim to support TLS
during connection negotiation, they cannot establish a TLS full ses-
sion. If TLS is enabled, it will not be possible to send messages to
these servers. In such situations, please contact the administrator of
the mail server.
290
Using the Security System
5.6.3. POP3
POP3 stands for Post Of-
fice Protocol 3: This is a
protocol, which allows the
retrieval of e-mails from a
mail server. POP3 is the
logical opposite of SMTP.
SMTP stands for Simple Mail
Transfer Protocol. This
protocol is used to deliver e-
mails to a mail server.
Important Note:
When you use an upstream firewall, it must allow traffic from the
security system to the Internet on the following ports. They are used
for communication to the Spam Protection databases:
TCP Port 2703, UDP Port 6277, UDP Port 53 (DNS)
292
Using the Security System
Two Thresholds can be defined for the Spam Score. This ensures
that potential SPAM e-mails are treated differently by the Firewall.
Default settings:
Thresholds
Important Note:
On busy systems, the Spam Protection may require a large per-
centage of system resources.
293
Using the Security System
• Pass: The proxy will add a Header to the message noting that it
has found a potentially dangerous string, but will then allow the
message to pass. A Header will be added to the e-mail, by which
it can be sorted or filtered on the mail server or in the e-mail
program of the recipient. In addition, the word *SPAM* will be
added to the message subject line.
A description of how the rules are created in Microsoft Outlook
2000 can be found on page 286.
294
Using the Security System
The Header:
Many of the SMTP proxy functions will add headers to the messages
scanned. The Header will inform the user on specific characteristics of
a message. If you select the Pass action, recipients can configure
their e-mail programs to filter messages with high spam scores.
The following list contains all possible Headers:
Expression Filter: This function allows to filter all e-mail texts and
attached text files, that pass through the POP3 proxy by specific
expressions. The expressions are defined in the check list in the form
of Perl Compatible Regular Expressions.
295
Using the Security System
5.6.4. DNS
The DNS Proxy service al-
lows you to provide internal
clients with a secure and
efficient name server ser-
vice. If you select multiple
remote name servers, they
will be queried in the order
they are entered.
296
Using the Security System
Tip:
Even if you do not plan to use the DNS proxy, you should enter the
address of your provider’s DNS server address as a forwarding
server. Those will be used by the firewall itself, even if the proxy is
disabled. This contributes to the discharge of the root name server
and the firewall produces only local queries, which generally receive
faster replies.
Security Note:
In the Allowed Networks menu, do not select any unless
absolutely necessary. If any is selected, the DNS proxy
can be used by any Internet user.
297
Using the Security System
298
Using the Security System
5.6.5. SIP
The Session Initiation
Protocol (SIP) is a sig-
nalization protocol for the
set-up, modification and
termination of sessions
between two or several
communication partners.
With the SIP Proxy, SIP
devices can be operated
behind the NAT Gateway.
In fact the sessions can
also directly run between the SIP clients, it is, however, not always
guaranteed that a client can always be reached and that it always has
the same IP address. Therefore, a SIP Client logs on to a SIP server in
general, working as Proxy. The SIP proxy registers the IP address. If
there is a call to the SIP address of the SIP client, the SIP address is
resolved and it will be determined, where the client can be reached.
Then the call and all other requests are forwarded to the client.
The SIP proxy thus works as mediator between local SIP clients and
external SIP providers or clients. This does not only apply to the SIP-
dataflow-control (the standard-port for SIP is 5060), but also to the
streaming of audio data. The Real-Time Transport Protocol (RTP) is
responsible for the transport of these real-time data.
The module has been successfully tested with the following SIP-
providers: Free IP Call, Freenet, FWD, SimtTex, Sipgate, Stanaphone
and Web.de.
299
Using the Security System
2. Enable the proxy by clicking the Enable button in the SIP Proxy
window.
300
Using the Security System
4.3 Smarthost
This setting can be used to define a special smarthost for the
forwarding of SIP calls. Strictly speaking, this is a SIP proxy,
which is controlled by the security system. If you have selected
Smarthost in the drop-down menu to further entry menus will
be displayed.
Save your settings by clicking on the Save button.
Local listening port: By default, the UDP Port 5060 is set here.
The Transparent Mode will not be affected by this setting. If
301
Using the Security System
Note:
Please remember that SIP over TCP is not supported. In addition to
that the STUN function (Simple Traversal of UDP over NATs) must be
disabled on the connected SIP-devices. As an alternative you can set
a rule in the Packet Filter, so that the STUN service will be blocked.
The packet filter rules are defined in the Packet Filter/Rules menu.
302
Using the Security System
5.6.6. SOCKS
SOCKS is a generic proxy,
used by many client appli-
cations. Examples include In-
stant Messaging Clients such
as ICQ or AIM, FTP clients,
and RealAudio. SOCKS can
build TCP connections for client applications, and can also provide
incoming (listening) TCP and UDP ports. This is especially important
for systems using NAT, as SOCKS mitigates the drawbacks of having
all internal clients use the same external address. This security
system supports the protocols SOCKSv4 and SOCKSv5.
Please note, however, that the SOCKSv4 protocol does not support
User Authentication.
Note:
If you wish to use SOCKSv5 with name resolution, you must also
activate the DNS proxy service.
All settings take effect immediately and will be saved if you leave this
menu.
303
Using the Security System
304
Using the Security System
5.6.7. Ident
The Ident protocol allows
external servers to asso-
ciate a username with
given TCP connections.
While this connection is not encrypted, it is nevertheless necessary for
many services.
If you enable the Ident function, the security system supports Ident
queries. The system will always reply with the string that you define
as Default Response, irrespective from which local service the
connection will be started.
305
Using the Security System
This menu uses the following concepts to display and manage the
e-mails:
ID: Every e-mail in this security system contains a unique ID. This
ID is contained in the header of the message, and is used by the
system to identify messages in the log files. The ID will be displayed,
when you touch the entry in the Type field with the mouse.
306
Using the Security System
Status: The states of the e-mails are displayed in the Proxy Content
Manager through symbols.
• deferred ( ): The e-mail will be sent to the intended recipient.
Normally, messages of this type are forwarded soon after the
proxy receives them. If, however, temporary problems delivering
the message are encountered, it may remain in the queue with
this status for a short while. Such messages will be delivered as
soon as the destination host can be contacted.
307
Using the Security System
Download as .zip file: The chosen e-mails are packed into a zip file
and then saved to the selected local host.
308
Using the Security System
Global Actions
In order to save disk space on the security system, you can use this
option to delete all messages of a certain type. E-Mails being sent or
forwarded while the system is deleting messages will not be affected.
From the Please select drop-down menu, select the type and start
the action by clicking on the Start button.
If you wish to actualize the SMTP/POP3 Proxy Content table, select
the Refresh proxy content table action from the Please select
drop-down menu.
Attention:
Messages of the selected type will be deleted without further
confirmation.
Filters
The Filters function allows you to filter e-mails with specific attributes
from the table. The function facilitates the management of huge
networks, since the protocols of a specific type can be presented in a
concise way.
Filtering e-mails:
1. Click on the Filters button.
2. Enter the filter attributes in the following fields. Not all attributes
have to be defined.
In this case, only the filtered e-mails will be displayed in the table.
Once the menu has been left, all protocols will be displayed again.
Automatic Cleanup
Save the settings by clicking on the Save button. The action will then
be executed once per hour, so that the maximum level is only
exceeded for short periods.
310
Using the Security System
Enable the function by clicking the Enable button in the Status line
(status light shows green).
Domains: Select the domains for which the daily digest of
quarantined messages should be called. All here available domains
must have previously been defined on the Proxies/SMTP menu.
The function of the Control List is identical to the Ordered List and
described in chapter 4.3.5 on page 41.
311
Using the Security System
312
Using the Security System
With the help of the SA, the IPSec VPN tunnel has the following
features:
313
Using the Security System
1. Net-to-Net Connection
This kind of connection can also be used to allow trusted third com-
panies (e.g., consultants and partner firms) access to internal
resources.
314
Using the Security System
2. Host-to-Net Connection
3. Host-to-Host Connection
315
Using the Security System
an untrusted network.
A VPN server is a cost effective and secure solution for transferring
sensitive data, and can replace existing expensive direct connections
and private lines.
• Transport Mode
• Tunnel Mode
Note:
This security system uses the Tunnel Mode and the Encapsulated
Security Payload (ESP) protocol.
316
Using the Security System
IPSec Modes
317
Using the Security System
IPSec Protocols
318
Using the Security System
For ESP with encryption normally the following algorithms are used:
Key Management
319
Using the Security System
320
Using the Security System
5.7.1. Connections
The Connections menu allows you to configure local settings for new
IPSec VPN tunnels and to manage existing connections.
Important Note:
The IKE Debugging function requires a large amount of system
resources, and can slow the IPSec VPN connection building process
down considerably. This system should only be enabled when IKE is
actively being debugged.
IPSec Connections
321
Using the Security System
322
Using the Security System
A B -> C => D
323
Using the Security System
Example:
A B -> C => D
23 192.168.105.0/24 -> 192.168.104.0/24 =>
[email protected]
This message shows that 23 data packets have been sent from
network 192.168.105.0/24 to network 192.168.104.0/24. The
tunnel’s ID number is 0x1234, and the remote endpoint is has IP
address 123.4.5.6..
3. Make the following basic settings for the IPSec VPN connection:
324
Using the Security System
Note:
Multiple remote key objects can be added to a single road
warrior connection. This can serve to reduce configuration
hassles. It must be respected, however, that all road warriors
use the same type of authentication (PSK, RSA or X.509) – a
mixed operation can result in malfunctions.
IPSec Policy: The policy controls the parameters for the VPN
connection. This includes the settings for Key Exchange, IKE,
and the IPSec connection.
The drop-down menu contains a number of pre-defined policies.
You can define custom ones in the IPSec VPN/Policies menu.
Note:
A standard policy is used for the MS Windows L2TP IPSec
type of connection.
325
Using the Security System
Security Note:
If you want greater control over the packet filter rules, or
wish to manage them in a more centralized way, disable
the Auto Packet Filter function and enter the rules manu-
ally in the Packet Filter/Rules menu.
326
Using the Security System
Note:
With the MS Windows L2TP IPSec connection this window will
not be displayed. The IPSec VPN access will be managed
through the Packet Filter.
7. 1 Standard
Key: Use the drop-down menu to select a Remote Key.
327
Using the Security System
After you configure a new VPN tunnel, you will need to establish the
related packet filter rules to allow the two computers to communicate.
Configuring packet filter rules is described in chapter 5.4 on page
198.
328
Using the Security System
Example:
In order to set-up a Net-to-Net VPN connection (between network 1
and network 2), you will need to define the following rules:
2. In the Add Rules window, add the following rule for network 1:
Source: Network1
Service: Any
Destination: Network 2
Action: Allow
4. In the Add Rules window, add the following rule for network 2:
Source: Network 2
Service: Any
Destination: Network1
Action: Allow
5. Confirm the entries by clicking on Add Definition.
These rules will allow complete access between the two networks.
329
Using the Security System
5.7.2. Policies
In the Policies menu, you
can customize parameters
for IPSec connections and
collect them into a policy.
Policies are used to define
IPSec connections, and
contain the configuration of the selected key exchange method,
IKE, and the IPSec connection.
The chosen key exchange method defines how the keys for the
connection are to be managed.
330
Using the Security System
Important Note:
The SHA2 256bit and SHA2 512bit algorithms require a great
deal of system resources.
331
Using the Security System
Important Note:
The SHA2 256bit and SHA2 512bit algorithms require a great
deal of system resources.
332
Using the Security System
enabled, the system will ensure that the numbers used have not
already been used for another key, such as for an IKE key. If an
attacker discovers or cracks an old key, he or she will have no
way of guessing future keys.
The IPSec VPN system on this security system supports the
Group 1 (MODP768), Group 2 (MODP 1024), Group 5
(MODP 1536), Group X (MODP 2048), Group X (MODP
3072) and Group X (MODP 4096) protocols. If you do not
wish to use PFS, select No PFS.
By default, this is set to Group 5 (MODP 1536).
Important Note:
PFS requires a fair amount of processing power to complete the
Diffie Hellmann key exchange. PFS is also often not 100%
compatible between manufacturers. In case of problems with
the firewall’s performance or with building connections to
remote systems, you should disable this option.
6. If you have not yet named this policy, scroll back to the Name
field and enter one now.
333
Using the Security System
In this window, you can define local keys for X.509 certificates pro-
vided you have already generated these certificates in the IPSec
VPN/CA Management menu. Chapter 5.7.6 on page 344 describes
the process of generating X.509 certificates.
Local Certificate: Select here the certificate for the X.509 authenti-
cation This menu only contains those certificates for which the associ-
ated private key is available.
Passphrase: In the entry field, enter the password used to secure
the private key.
The Active Key will appear with its name in the Local IPSec X.509
Key window. If you choose a new local key, the old key will auto-
matically be replaced.
The security system will use the ID and public/private key pair of
the current Local X.509 Key to identify, authenticate, and encrypt
X.509 IPSec key exchanges.
334
Using the Security System
RSA Authentication
For the authentication via RSA each side of the connection requires a
key pair consisting of a Public Key and a Private Key. The key pair
is created in two steps in the Local IPSec RSA Key window: First,
the Local IPSec Identifier is defined and then the key pair
generated.
1. In the Local IPSec RSA Key window, define a unique VPN
Identifier.
2. Generate a new RSA Key, by selecting the key length from the
RSA Key Length drop-down menu.
Important Note:
The key length must be identical on both security systems.
Depending on the selected key length and the processor of the
security solution, the generation of RSA keys can take several
minutes.
3. When you click Save, the system will begin generating a new
RSA key pair.
Then the active Public Key will be displayed in the Local Public RSA
Key window. The Public Key from this window will be exchanged with
the respective end point, e.g. via e-mail.
The Public Key from the endpoint will be entered later into the
Remote Keys menu in the Public Key window. The Remote Keys
menu is described in chapter 5.7.4 on page 337.
335
Using the Security System
PSK Authentication
You generate the PSK Key in the IPSec VPN/Remote Keys menu.
It will automatically be used as the Local PSK Key as well.
336
Using the Security System
The security system saves the profile of the X.509-based road warrior
connection to an INI-file. Clicking on the download icon ( ) allows
you to download this INI-file and to import it to an IPSec client
application with corresponding Profile Import function (e. g. Astaro
Secure Client V8.2).
As a fallback position, the User Config file contains standard algo-
337
Using the Security System
Please remember that you need for the configuration of the road war-
rior client also the PKCS#12 container file with certificates. The con-
tainer file is generated in the IPSec VPN/CA Management menu
and can be downloaded from there. The CA Management menu is
described in detail in chapter 5.7.6 on page 344.
2. In the Name field, enter a name for the new Remote Key.
If you wish to use the IPSec Remote Key for a standard con-
nection, continue with step 3.
Virtual IP (optional): This function allows you to assign a
virtual IP address to the road warrior. This is the only way to
manually set IP addresses for such connections. If you enter an
IP address here, it must also be configured on the road warrior
system.
338
Using the Security System
Attention:
With a road warrior IPSec tunnel, the Virtual IP function must
be enabled if you wish to use the NAT Traversal function and
the L2TP Encapsulation function is disabled.
The IP address entered here should not be used anywhere else,
and cannot be a part of a directly connected network.
3. Use the Key type drop-down menu to select the IKE authenti-
cation method. Further options are available depending on the
chosen Key type.
Security Note:
Use a secure password! Your name spelled backwards is,
for example, not a secure password – while something like
xfT35$4 would be. Make certain that this password does
not fall into the wrong hands. With this password, an
attacker can build a VPN connection to the internal
network. We recommend changing this password at regular
intervals.
RSA: The key pair consists of a private key and a public key.
In order for the endpoints to communicate, they must exchange
their public keys. Public keys can be exchanged via e-mail.
In the VPN Identifier drop-down menu, choose the VPN ID type
of the endpoint. If you select E-Mail Address, Full qualified
domain name or IP Address, you must enter the address or
name in the entry field below.
X509: Use the VPN Identifier drop-down menu to select the
kind of VPN ID to use. If you select E-Mail Address, Full
339
Using the Security System
The new remote key object will appear in the Remote Keys table.
CA Management Remote Keys are shown in a separate table.
340
Using the Security System
http://www.microsoft.com/windows2000/server/evaluation/news/bull
etins/l2tpclient.asp
Debugging: This function allows you to check the L2TP over IPSec
connection. Detailed information is logged to the IPSec logs. These
protocols can be displayed in real time in the Local Logs/Browse
menu or downloaded to your local computer. Further information
about the Local Logs menu can be found in chapter 5.9 on page 362.
IP Address Assignment: You can use this function to define wheth-
er an address from a defined L2TP over IPSec IP Pool shall be as-
signed during the dial-up or whether the address will be automatically
341
Using the Security System
Note:
If you use private IP addresses for your IPSec Pool, such as the
pre-defined network and you wish IPSec hosts to be allowed to
access the Internet, appropriate Masquerading or NAT rules must
be in place for the IPSec Pool.
342
Using the Security System
DHCP Settings
343
Using the Security System
5.7.6. CA Management
A Certificate Authority (CA) certifies the authenticity of public
keys. This ensures that the certificate used in a VPN connection really
belongs to the endpoint, and not to an attacker. The CA Manage-
ment menu allows you to create and manage your own X.509
Certificate Authority (CA). The authority will verify the validity of
X.509 certificates exchanged during IPSec VPN connections. The
relevant information is stored in the X.509 certficates.
But you can also use certificates, signed by commercial providers,
such as VeriSign.
Note:
Every certificate has unique CA with respect to its identifying
information (Name, Firm, Location, etc.). If the first certificate is lost,
a second cannot be generated to replace it.
344
Using the Security System
Host Certificate: This certificate contains the public key of the host
as well as identifying information about the host (such as IP address
or owner). The certificate is also signed by a CA, verifying that the
key does indeed belong to the entity named in the identification
information. These valid certificates are used to authenticate remote
IPSec hosts/user endpoints.
345
Using the Security System
6. Use the Key Size drop-down menu to select the desired key
length.
346
Using the Security System
right.
The field should be empty if you select the X509 DN option.
3. In the Name field, enter a descriptive name for this certificate
request.
5. Use the Key Size drop-down menu to select the desired key
length.
The Certificate Request CSR + KEY will appear in the Host CSRs and
Certificates table. The table will also show the type, name, and VPN
IP of the CSR. The request can now be signed by the Signing CA
created in the first step.
2. Use the drop-down menu at the bottom of the table to select the
Issue CERT from CSR function.
347
Using the Security System
From the CSR + KEY, the CA will generate the CERT + KEY
certificate: the certificate will replace the CSR in the table.
3. Click Start.
You must now install the certificate on the remote computer. The
installation process depends on the IPSec software on that computer.
348
Using the Security System
5.7.7. Advanced
This menu allows you, to
make additional settings
for the IPSec VPN option.
This should, however, only
be done by experienced
users.
Important Note:
You cannot use local IP addresses for the Virtual IP address,
because the security system does not answer ARP requests for these.
349
Using the Security System
IKE debug Flags: This selection field allows you to configure the
scope of IKE-debugging logs. The IKE Debugging function must be
enabled in the IPSec VPN/Connections menu.
The following flags can be logged:
351
Using the Security System
5.8.1. Administration
The Administration menu
contains an overview of the
administrative events of the
last 30 days.
• WebAdmin Logins
• Remote Logins
• Local Logins
• System Up2Dates
• Config Changes
• System Restarts
5.8.2. Virus
The Virus menu contains an
overview of the filtered vir-
uses of the last 7 days.
• SMTP viruses
• POP3 viruses
• HTTP viruses
5.8.3. Hardware
This menu shows the cur-
rent values relating to your
system hardware. The sys-
tem collects statistics about
CPU utilization, RAM utiliza-
tion, and swap utilization.
353
Using the Security System
CPU Load (Daily Graph): This diagram shows the current utilization
of the CPU.
Memory Usage (Daily Graph): The current RAM utilization statistics
are shown here. When more functions and subsystems are enabled on
the firewall, more RAM will be required to support them.
5.8.4. Network
This menu shows current
statistics relating to net-
work traffic. These dia-
grams will not be useful
unless the network cards
have been correctly con-
figured in the Network/
Interfaces menu.
The configuration process
for network cards is de-
scribed in chapter 5.3.2 on
page 133.
354
Using the Security System
355
Using the Security System
5.8.9. DNS
The DNS-Query-statistic is represented in this menu.
5.8.10. SIP
In this menu the access to the SIP proxy is logged. Each line
consists of four columns, in which the sums of the incidents of this
day, the day before, the last seven days and the last 30 days are
indicated.
356
Using the Security System
357
Using the Security System
Current Report
5.8.13. Accounting
The Accounting function
monitors all IP packets,
transmitted over the various
network cards and, once a
day, summarizes their size.
Statistics for the preceding
month are also generated at the beginning of each new month. These
statistics are then used to generate a report. This report is useful, for
instance, when an organization pays its service provider based on the
volume of data transmitted.
Configuring Accounting:
1. Under the Reporting tab, select the Accounting menu.
Important Note:
Do NOT use the "Any" network, since it will match all source and
destination networks, meaning no traffic will be counted in the
report!
359
Using the Security System
360
Using the Security System
ARP Table: This table displays the current ARP cache of the system.
It lists all known associations between IP addresses and hardware
(MAC) addresses.
361
Using the Security System
In the ARM menu, you enable the interface to the Astaro Report
Manager (ARM) and make the settings for the generation of local
log files: Next to the settings for the transfer of the ARM Log Files to
the Astaro Report Manager you can also generate the ARM Log Files
for the historic log file archive and download them to a local
computer.
This chapter describes the functions and settings contained in the
ARM menu. Depending on the existing network topology and the
adjusted Astaro Report Manager Network architecture, some settings
must be made for the integration of the Remote Management Tool.
Possible Astaro Report Manager Network architectures are:
362
Using the Security System
363
Using the Security System
364
Using the Security System
This window allows you to configure the ARM Log Files Transfer.
The new settings do not influence existing log files.
Status: Click the Enable button to enable the function (status light is
green).
Security Note:
Both data transfer methods are unencrypted. If the log files are
sent to a server outside the private network this should be done
through a Host-to-Net IPSec VPN tunnel. An existing Net-to-Net
connection can not be used!
Method: For the data transfer the methods Syslog and SMB/CIFS
Share are available. For both methods you must first define an ARM
server on the security system to which the ARM Log Files are sent.
The server and/or the host are added in the Definitions/Networks
menu. Then you can make the following settings:
Host: From the drop-down menu select the ARM server to which
the ARM Log Files shall be sent.
Service: Select the service from the drop-down menu that shall
be used for the data transfer.
Do not confuse those
settings with the Sys-
tem/Remote Syslog
menu: There, usually
only one Syslog Server
can be defined for the
365
Using the Security System
Host: From the drop-down menu select the ARM server to which
the ARM Log Files shall be sent.
Share Name: Enter the Windows Share Name in the entry field.
Ensure that the associated rights for the tab have been defined in
the Astaro Report Manager.
Username: Enter the user name to use for the SMB Account.
The ARM log files are generated once the interface to the Astaro
Report Manager is enabled and a valid IP address has been entered in
the Licensed IP Address entry field. After the configuration of the
ARM Remote Connection the ARM log files are sent to the
associated server.
366
Using the Security System
The logs, generated by the system will be managed in the Local Logs
tab.
5.10.1. Settings
Configure the basic set-
tings for the creation of log
files in the Settings menu.
Status: Click the Enable button to enable the function (status light is
green).
Important Note:
When this function is disabled, the Internet security system will not
create Log Files!
Local Log File Archives: This function locally stores generated log
files to the Security system. Configure the settings for the local log
file archive in the Local Log File Archive window.
By default, this function is enabled automatically, once the logging
functions are enabled.
Remote Log File Archives: This function allows you, to save the
generated log files to a remote host or server. The settings for the
automating of the log file archive on a separate server are configured
in the Remote Log File Archive.
367
Using the Security System
Delete Log Files (span of time): In this drop-down menu select the
length of time, in days, after which the log files will automatically be
deleted by the security system.
• Send Notification: Only the INFO 710 notification e-mail with the
correspondent warning will be sent to the administrator.
368
Using the Security System
369
Using the Security System
370
Using the Security System
Starting searches:
1. In the Time Span drop-down menu select the time span.
4. If you are looking for protocols with specific strings, enter the
strings into the Search Term entry field.
371
Using the Security System
5.10.3. Browse
Each protocol is contained in the Browse menu. If this menu is
opened, the protocol groups (logs) will be displayed in the Browse
Local Log Files overview.
All protocol groups (logs) are contained in this overview. The groups
with the current protocols can directly be opened from this overview.
372
Using the Security System
( ): Clicking on the trash can icon deletes a group from the table.
Size: The size of the log file group will be displayed in this column.
( ): Clicking the download icon will allow you to download this Log
File to your local client computer. You can then use these Log Files
to import data into another program, for example Microsoft Excel.
373
Using the Security System
All protocols (Logs) of a group are listed in this sub-tab. The sub-
group can be opened in the overview by clicking on the folder icon
( ).
374
Using the Security System
File Count/Name: In the protocol from today, the path to the log
file and the Live Log message will be displayed in this column.
In this column, the file names will be displayed next to the archived
log files.
Filters
The Filters function allows you to filter Log Files with specific
attributes from the table. This function enhances the management of
huge networks, as log files of a specific type can be presented in a
concise form.
Only the filtered log files will be displayed in the table. Next time
when you open the menu, the complete log file table will be
displayed.
375
Using the Security System
Boot messages: The boot messages are recorded to these log files.
Configuration daemon: The activities of the AUA Daemon are
logged to these log files. The log files belong to the support logs and
will only be displayed after clicking on the show support logs
button.
Fallback archive: These log files are used as a security archive for
logged processes, which cannot be assigned to one of the log files.
376
Using the Security System
The log files belong to the support logs and will only be displayed
after clicking on the show support logs button. In general, those log
files are empty.
HTTP daemon: The log files for the HTTP daemon belong to the
support logs and will only be displayed after clicking on the show
support logs button.
WebAdmin access: The requests to the user data base are recorded
to these log files.
Logging: The local archives of the log files on the Internet security
system and the forwarding of files to the Remote-Log-File-Archive are
recorded to these log files.
377
Using the Security System
PPPoA DSL dial-up: The processes executed in the dial-up with PPP
over ATM are recorded to these log files.
PPPoA DSL dial-up: The processes executed in the dial-up with PPP
over Ethernet are recorded to these log files.
PPTP VPN Access: These logs record the progress of PPTP sessions
from external clients. This includes login and authentication infor-
mation as well as error messages.
378
Using the Security System
SMTP proxy: The activities of the SMTP proxy are recorded to these
log files. All ingoing e-mails will be listed there. In addition, all
irregularities, such as assigned Bounce conditions, interruptions or
blocked e-mails will be logged.
379
Using the Security System
INFO:
380
Using the Security System
381
Using the Security System
382
Using the Security System
383
Using the Security System
384
Using the Security System
WARN:
001 A feature will expire! The feature ... is time
limited and will expire in ...
385
Using the Security System
386
Using the Security System
CRIT:
301 System Up2Date failed: Could not connect to
Authentication Server(s)
387
Using the Security System
388
Using the Security System
389
Using the Security System
390
Using the Security System
391
Using the Security System
392
Using the Security System
Step 1 of 3
Step 2 of 3
Step 3 of 3
393
Using the Security System
394
Using the Security System
395
Using the Security System
The Help menu contains further functions for use with the Online
Help system.
Search
Starting a search:
1. Under the Online Help tab, open the Search menu.
Glossary
396
Using the Security System
397
Glossary
Glossary
Broadcast
Client
Client-Server model
DNS
398
Glossary
and IP numbers. Every top-level domain also has name servers which
contain information about their subordinate servers.
The DNS system is thus a distributed, hierarchical database. DNS
resolution is normally handled by network applications rather than by
the user him or herself.
Dual-Homed Gateway
Firewall
Header
Host
399
Glossary
ICMP
IP
The Internet Protocol is the basic protocol of the Internet, and has
been used without change since it was first developed in 1974. It
handles the basic transmission of data from one computer to another,
and serves as the basis for higher-level protocols like TCP and UDP. It
handles the connection and error management. Technologies like NAT
and Masquerading allow large private networks to hide behind small
numbers of IP addresses (or even single addresses), thus allowing the
relatively limited IPv4 address space to meet the demands of an ever-
expanding Internet.
400
Glossary
IP Address
Masquerading
401
Glossary
nslookup
Port
Protocol
402
Glossary
RADIUS
Router (Gateway)
Server
SOCKS
403
Glossary
Subnet Mask
UNC-Path
404
Index
Index
406
Index
407
Index
408
Index
409
Index
411
Index
412
Notes
Notes
413
Notes
414
WebAdmin
Astaro Security Linux V5
Astaro
Security Linux V5
WebAdmin
© 2005 Astaro AG www.astaro.com
Benutzerhandbuch