Secure Computing Sidewinder Version 5.1.0.02 manual Field Setting Local Network/IP, Accepted, Pool

Page 46

Configuring the VPN on the Sidewinder

Field

Setting

 

 

Local Network/IP

Specify the network names or IP addresses to use as

 

the destination for the client(s) in the VPN. Click the

 

New button to specify the IP Address / Hostname

 

and Number of bits in Netmask. The value specified

 

identifies the network portion of the IP address. For

 

example, if you specify 24 with an IP address of

 

10.10.10.0, all IP addresses that begin with 10.10.10 are

 

accepted.

 

Note: If you are using Client Address Pools, the local

 

(destination for clients) is configured using different

 

windows.

 

 

Enabled

Select Yes.

 

 

Burb

Click the dropdown list to assign this VPN to a burb.

 

Sidewinder terminates each VPN in a burb so that

 

access rules may or may not be applied to the VPN.

 

 

If you selected Dynamic IP Restricted Client in the Mode field, you will need to define one of the following mutually exclusive options.

Client Address

Determine if you want remote clients to be assigned

Pool

only the IP addresses contained within one of the

 

available client address pools. If so, use the dropdown

 

list to select the client address pool you want to use.

 

With this option, Sidewinder selects an IP address from

 

the available pool and assigns it to the client for use

 

during the VPN connection.

 

Note: For information on creating Client Address Pools,

 

see Chapter 11 in the Sidewinder Administration Guide.

 

 

Dynamic Virtual

Define the range of addresses a client can use when

Address Range

initiating a VPN connection. The addresses specified

 

here do not represent a real network but are virtual

 

addresses. With this option the client assigns their own

 

IP address, although the address must be within the

 

approved address range.

 

 

3-16

Configuring Sidewinder for Soft-PK Clients

Image 46
Contents VPN Administration Guide Page Copyright Notice Printing History B L E O F C O N T E N T S Installing and Working with Soft-PK About this Guide Who should read this guide?How this guide is OrganizedAbout digital certificates About Soft-PKAbout Sidewinder Viewing and printing this document onlineViii Getting Started About this chapterAbout Soft-PK & Sidewinder VPNs Requirements Sidewinder and other network requirementsSoft-PK requirements Roadmap to deploying your VPNs Sidewinder system 4c1 Define remote identities within SidewinderPlan your VPN configuration Satisfy Sidewinder, network, & system requirementsIf using pre-shared keys passwords Create/Request the digital certificatesConfigure the VPN connections on the Sidewinder Troubleshoot any connection problems Planning Your VPN Configuration Identifying basic VPN connection needs Private key file Identifying authentication requirementsUsing digital certificate authentication Certificate file with public keyFor a small number of VPN Closer look at self-signed certificatesNo CA needed ClientsUnderstanding pre-shared key authentication Closer look at CA-based certificatesExtended authentication Determining where you will terminate your VPNs VPN tunnel terminating on trusted burbMore about virtual burbs and VPNs Select Firewall Administration Burb ConfigurationDefining a virtual burb Understanding Sidewinder client address pools SidewinderUnderstanding Sidewinder client address pools Configuring Sidewinder for Soft-PK Clients Enable Enable the cmd, egd, and isakmp serversClick Apply Configure the Isakmp server Select VPN Configuration Isakmp ServerConfiguring ACL & proxies entries for VPN connections Managing Sidewinder self- signed certs Creating & exporting a firewall certificateClick OK when done Specify the following Firewall Certificate settingsMail Address Creating & exporting remote certificates Select Services Configuration Certificate ManagementSelect the Remote Certificates tab. Click New Key File Specify the following Remote Certificate settingsClick Add to add the certificate to the Certificates list GeneratedReturn to for each remote client Managing CA- based certificates Defining a CA to use and obtaining the CA root certRequesting a certificate for the firewall Click Add to send the enrollment request Specify the firewall certificate informationRetrieve the key, revoke, etc Determining identifying information for client certificates Defining remote client identities in Sidewinder Certificate Identities defined on the firewallManaging pre- shared keys passwords Configuring the VPN on the Sidewinder New button to specify the IP Address / Hostname Field Setting Local Network/IPEnabled Select Yes Burb Example, if you specify 24 with an IP addressType Firewall to the remote client Value Require Extended Enable this checkbox AuthenticationCertificate VPN from the list provided Firewall Identity This field cannot be editedClient TypeEdited Click Close Save your settings!4. Click Add to save the settingsRemote Identity Page Installing and Working with Soft-PK Soft-PK installation notes Starting Soft-PK Determining Soft-PK status from icon variationsActivating/Deactivating Soft-PK Right-click the Soft-PK tray icon to access menuMeans Soft-PK security policy is currently active Security Policy Editor About the Soft-PK program optionsCertificate Manager Log ViewerSetting up Sidewinder self-signed certificates Managing certificates on Soft-PKSetting up CA-based certificates Get your CA administrator to approve your request Click Advanced to select a certificate service providerSelect the Generate Exportable Key check box Importing certificate in Soft-PK Verification window Import Certificate Password Window Importing a personal certificate into Soft-PKCertificate file Configuring a security policy on the Soft-PK Select Options Secure Specified ConnectionsSpecify the interface information If using digital certificatesEnable the Connect using Secure Gateway Tunnel box New connection Named SecureVPNConfiguring a security policy on the Soft-PK Encryption and Data Integrity/Algorithms fields SA Life Select Unspecified to default to Sidewinder settings Optional Click Save to save the policy on this systemPage Deploying Soft-PK to Your End Users Word OverviewFormat Security policy Soft-PK setup.exe file and supporting filesCannot modify Customizing the user worksheet Specifying installation instructionsSpecifying dial-up network instructions Specifying certificate import/request instructions Specifying security policy instructions Specifying basic connection informationSoft-PK Log Viewer About this appendixSoft-PK Connection Monitor More about the Connection Monitor To view the detailsSidewinder troubleshooting commands Page Part Number 86-0935037-A