Secure Computing Sidewinder Version 5.1.0.02, SafeNet Understanding pre-shared key authentication

Page 25

Identifying authentication requirements

Acloser look at CA-based certificates

A VPN implemented using CA-based certificates requires access to a private or public CA. Each end-point (client, firewall, etc.) in the VPN retains a private key file that is associated with a public certificate. In addition, each end-point in the VPN needs the CA root certificate on their system. Figure 2-3 shows the certificates involved in a VPN using CA-based certificates.

Figure 2-3. CA-based digital certificate summary

Protected Network

 

 

*.pem

4

Client

2

Firewall

Cert.

 

 

 

 

 

*.pk

Cert.

 

 

 

Sidewinder

Internet

 

Soft-PK

 

 

 

CA

 

3

CA

 

Cert.

*.pem

 

 

 

 

Cert.

1

 

 

 

 

CA

Private CA server (could be a public CA server not in the network)

1Admin requests CA root certificate

2Admin requests firewall certificate

3Admin provides CA root certificate to client (or instructions to obtain it)

4Admin provides client key/certificate to client (or instructions to obtain it)

Understanding pre-shared key authentication

A pre-shared key (referred to as shared password by Sidewinder) is an alphanumeric string—from eight to 54 characters—that can replace a digital certificate as the means of identifying a communicating party during a Phase 1 IKE negotiation. This key/password is called "pre- shared" because you have to share it with another party before you can communicate with them over a secure connection. Once you both have this key/password, you would both have to enter it into your respective IPSec-compliant devices (e.g., firewall and software client). Using a pre-shared key/password for authentication is the easiest type of VPN association to configure.

IMPORTANT: You should only use this method along with Extended Authentication.

Planning Your VPN Configuration

2-5

 

 

Image 25
Contents VPN Administration Guide Page Copyright Notice Printing History B L E O F C O N T E N T S Installing and Working with Soft-PK Who should read this guide? About this GuideOrganized How this guide isAbout Sidewinder About Soft-PKAbout digital certificates Viewing and printing this document onlineViii About this chapter Getting StartedAbout Soft-PK & Sidewinder VPNs Sidewinder and other network requirements RequirementsSoft-PK requirements Roadmap to deploying your VPNs 4c1 Define remote identities within Sidewinder Sidewinder systemSatisfy Sidewinder, network, & system requirements Plan your VPN configurationCreate/Request the digital certificates If using pre-shared keys passwordsConfigure the VPN connections on the Sidewinder Troubleshoot any connection problems Planning Your VPN Configuration Identifying basic VPN connection needs Using digital certificate authentication Identifying authentication requirementsPrivate key file Certificate file with public keyNo CA needed Closer look at self-signed certificatesFor a small number of VPN ClientsCloser look at CA-based certificates Understanding pre-shared key authenticationExtended authentication VPN tunnel terminating on trusted burb Determining where you will terminate your VPNsMore about virtual burbs and VPNs Select Firewall Administration Burb ConfigurationDefining a virtual burb Sidewinder Understanding Sidewinder client address poolsUnderstanding Sidewinder client address pools Configuring Sidewinder for Soft-PK Clients Click Apply Configure the Isakmp server Enable the cmd, egd, and isakmp serversEnable Select VPN Configuration Isakmp ServerConfiguring ACL & proxies entries for VPN connections Creating & exporting a firewall certificate Managing Sidewinder self- signed certsClick OK when done Specify the following Firewall Certificate settingsMail Address Creating & exporting remote certificates Select Services Configuration Certificate ManagementSelect the Remote Certificates tab. Click New Click Add to add the certificate to the Certificates list Specify the following Remote Certificate settingsKey File GeneratedReturn to for each remote client Defining a CA to use and obtaining the CA root cert Managing CA- based certificatesRequesting a certificate for the firewall Click Add to send the enrollment request Specify the firewall certificate informationRetrieve the key, revoke, etc Determining identifying information for client certificates Certificate Identities defined on the firewall Defining remote client identities in SidewinderManaging pre- shared keys passwords Configuring the VPN on the Sidewinder Enabled Select Yes Burb Field Setting Local Network/IPNew button to specify the IP Address / Hostname Example, if you specify 24 with an IP addressCertificate VPN from the list provided Firewall Identity Require Extended Enable this checkbox AuthenticationType Firewall to the remote client Value This field cannot be editedClient TypeEdited Click Close Save your settings!4. Click Add to save the settingsRemote Identity Page Installing and Working with Soft-PK Soft-PK installation notes Determining Soft-PK status from icon variations Starting Soft-PKActivating/Deactivating Soft-PK Right-click the Soft-PK tray icon to access menuMeans Soft-PK security policy is currently active Certificate Manager About the Soft-PK program optionsSecurity Policy Editor Log ViewerManaging certificates on Soft-PK Setting up Sidewinder self-signed certificatesSetting up CA-based certificates Get your CA administrator to approve your request Click Advanced to select a certificate service providerSelect the Generate Exportable Key check box Importing certificate in Soft-PK Verification window Importing a personal certificate into Soft-PK Import Certificate Password WindowCertificate file Select Options Secure Specified Connections Configuring a security policy on the Soft-PKEnable the Connect using Secure Gateway Tunnel box If using digital certificatesSpecify the interface information New connection Named SecureVPNConfiguring a security policy on the Soft-PK Encryption and Data Integrity/Algorithms fields Optional Click Save to save the policy on this system SA Life Select Unspecified to default to Sidewinder settingsPage Deploying Soft-PK to Your End Users Word OverviewFormat Security policy Soft-PK setup.exe file and supporting filesCannot modify Customizing the user worksheet Specifying installation instructionsSpecifying dial-up network instructions Specifying certificate import/request instructions Specifying basic connection information Specifying security policy instructionsAbout this appendix Soft-PK Log ViewerSoft-PK Connection Monitor To view the details More about the Connection MonitorSidewinder troubleshooting commands Page Part Number 86-0935037-A