User Guide
Export
Licensing
Contents
Upgrading the NVG Software
Snmp Agent 183
Copyright 2007-2008 Nortel Networks
Preface
Who Should Use This Book
Related documentation
VPN Gateway 6.0 Application Guide for SSL Acceleration
Product Names
Appendices
How This Book Is Organized
Users Guide
Adding User Preferences Attribute to Active Directory
Host# telnet IP Address
Typographic Conventions
AaBbCc123
How to Get Help
Getting help from the Nortel Web site
Introducing the VPN Gateway
VPN
SSL Acceleration
VPN
Hardware Platforms
Web Portal
Feature List
Software Features
User Authorization
Transparent Mode Access
User Authentication
Secure Service Partitioning
Client Security
Accounting and Auditing
Networking
SSL Acceleration
Branch Office Tunnels
Portal Guard
Public Key Infrastructure
Scalability and Redundancy
Certificate and Key Management
Supported Key and Certificate Formats
Supported Handshake Protocols
Hash Algorithms
Cipher Suites
Virtual Desktop
Secure Portable Office SPO Client
Introducing the VPN Gateway
Introducing the ASA 310-FIPS
HSM Overview
Extended Mode vs. Fips Mode
FIPS140-1 Level 3 Security
Wrap Keys for ASA 310-FIPS Clusters
Concept of iKey Authentication
Types of iKeys
Available Operations and iKeys Required
CODE-USER
HSM-SO HSM-US
Additional HSM Information
Introducing the ASA 310-FIPS
Initial Setup
Clusters
New and Join
Configuration is Replicated among Master NVGs
Clustering Over Multiple Subnets
IP Address Types
Ports
Two-Armed Configuration
Interfaces
One-Armed Configuration
Two-Armed Configuration without Application Switch
Configuration at Boot Up
Setup Menu
Installing an NVG in a New Cluster
Setting Up a One-Armed Configuration
Step Action Choose new from the Setup menu
Specify the port you want to use for network connectivity
Enter a Management IP address MIP
Enter a default gateway address
Enter network mask and Vlan tag ID
Specify the host IP address for the current VPN Gateway
Setting Up a Two-Armed Configuration
Configure the management interface port number
Enter a default gateway address on the traffic interface
Specify a new port number for the traffic interface
Specify a host IP address on the traffic public interface
Interface gateway IP address
Complete the New Setup
Select
Press Enter if correct
Enter if correct
To accept
Wizard
Enter to accept
Create the account
10.10.20.99
Enter Network mask for the pool range Creating IP pool
Settings Created by the VPN Quick Setup Wizard
Basic VPN Setup
Default Network
Default Services
Joining a VPN Gateway to an Existing Cluster
Specify the port to be used for network connectivity
Enter the VPN Gateway ’s host IP address
Step Action Choose join from the Setup menu
Enter the Management IP address MIP of the existing cluster
Accepts
Specify the VPN Gateway type
Complete the Join Setup
Enter the default gateway on the traffic interface
As slave
Wait until the Setup utility has finished
Admin user
Installing an ASA 310-FIPS
Installing an ASA 310-FIPS in a New Cluster
Use Fips or Extended Security Mode? fips/extended
HSM-SO password
HSM-SO password, or use the same HSM-SO password as for Card
Press Enter to select new
Adding an ASA 310-FIPS to an Existing Cluster
Setup Menu Join Join an existing iSD cluster New
Adding an ASA 310-FIPS to an Existing Cluster
Re-enter to confirm HSM-SO iKey has been updated
For this HSM card
Verify that CODE-SO iKey black is inserted in card
Cluster
That you used in Step
End
Reinstalling the Software
Log in as user boot, password ForgetMe
If correct
Continue y/n? y Press Enter to continue
Tag id or Enter
Restarting system Alteon WebSystems,I nc C Booting Login
Upgrading the NVG Software
Performing Minor/Major Release Upgrades
Main# boot/software/download
Activating the Software Upgrade Package
Enter the host name or IP address of the server
Enter hostname or IP address of server server host
Name or IP
At the Software Management# prompt, enter
Software Management# cur
Here
Activate ok, relogin
Main# boot/software/cur
Upgrading the NVG Software
Managing Users and Groups
User Rights and Group Membership
Step Action Log in to the NVG cluster as the admin user
Access the User Menu
Adding a New User
Add the new user and designate a user name
Define a login password for the user
User# edit certadmin
Assign the new user to a user group
Verify and apply the group assignment
Groups# /cfg/sys/user User# edit certadmin
Apply the changes
Verify and apply the changes
Remove the admin user from the certadmin group
User# edit admin
Adding Users through Radius
Step Action Log in to the NVG cluster
Login certadmin
Changing a Users Group Assignment
User admin# groups/add Enter group name certadmin
Type the passwd command to change your current password
Changing a Users Password
Changing Your Own Password
Changing Another Users Password
Type the password command to initialize the password change
Apply the changes
User# del certadmin
Deleting a User
User# list Oper Root Admin Certadmin User# apply
Certificates and Client Authentication
Generating and Submitting a CSR Using the CLI
~ ! @ # $ % * / \ ?
Save the private key to a file
Apply your changes
Save the CSR to a file
KEY----- and -----END RSA Private KEY
Open and copy the CSR
Submit the CSR to Verisign, Entrust, or any other CA
Adding Certificates to the NVG
PEM NET DER
Copy the contents of your certificate file
Copy-and-Paste Certificates
Certificate 1# apply Changes applied successfully
Copy-and-Paste Private Key
Copy the contents of your private key file
Paste the contents of the key file at the command prompt
Using TFTP/FTP/SCP/SFTP to add Certificates and Keys
Enter the desired file name
Name or IP address
Add your private key if in a separate file
End
Update Existing Certificate
Create a New Certificate
Step Action Check the certificate numbers currently in use
Add a certificate with a new certificate number
Configure a Virtual SSL Server to Require a Client Certificate
Step Action
Apply your settings
Main# cfg/cur ssl
SSL# server
Require
Generating client certificates
Enter for client certificate
Specify the validity period, key size, and serial number
Key size 512/1024 Serial number of client certificate
Main# cfg/ssl/server
Cert.pfx
Export Client Certificate
Com
Transmit Private Key and Certificate to User
Download and add a CRL from a TFTP/FTP/SCP/SFTP server
Revoking Client Certificates Issued by an External CA
Managing Revocation of Client Certificates
Crl.der
Crl.ascii
Creating Your Own Certificate Revocation List
Automatic CRL Retrieval
Http//10.42.128.30/server.crl
Main /cfg/cert 1/revoke/automatic
Info/certs command
Click Connect
Enter the password in the Ndic login screen Click Connect
Client certificate support
Signing CSRs
Paste the CSR
Main# cfg/ssl/server #/adv/sslconnect/verify/cacer
Provide the requested information
Generate Test Certificate
Step Action Specify an unused certificate number
Automatic CRL Retrieval
General Commands
Show Certificate Information
Show Subject Information
Check if Key and Certificate Match
Show Key Size
Show Key Information
Certificates and Client Authentication
Virtual Desktop
Running the Virtual Desktop on Client Computers
Licensing vdesktop
Launch Vdesktop from Portal
Click Save
Virtual Desktop Operations
Command Line Interface
Connecting to the VPN Gateway
Procedure
Establishing a Console Connection
Requirements
Running Telnet
Enabling and Restricting Telnet Access
Establishing a Telnet Connection
Establishing a Connection Using SSH Secure Shell
Enabling and Restricting SSH Access
Running an SSH Client
Telnet IP address
Establishing a Connection Using SSH Secure Shell
Accessing the NVG Cluster
User Access Level Description Default Account Group Passwo
ForgetM
CLI vs. Setup
Command Line History and Editing
Idle Timeout
Troubleshooting the NVG
Enable Telnet or SSH Access
Check the Access List
Cannot Connect to VPN Gateway through Telnet or
Verify the Current Configuration
Check the IP Address Configuration
Cannot Add an NVG to a Cluster
Cannot Contact the MIP
Add Interface 1 IP Addresses and MIP to Access List
# /cfg/sys/accesslist/add
Troubleshooting the NVG
Console Connection
NVG Stops Responding
Telnet or SSH Connection to the Management IP Address
User Password is Lost
Administrator User Password
Operator User Password
Root User Password
Password enter the admin user password
An ASA 310-FIPS Stops Processing Traffic
# /info/events/alarms
Main# maint/hsm/login
Password associated with the HSM-USER iKey for card
Resetting HSM Cards on the ASA 310-FIPS
Main# /boot/delete
End
Step Action
Existing
Transfer the cluster wrap key to card
Enter the same secret passphrase as was used Former cluster
Wait for the setup of the added ASA 310-FIPS to finish
Same secret passphrase as was used in the former Cluster
Main# cfg/gtcfg
Main# maint/starttrace
User Fails to Connect to the VPN
Aaa
Dns
Ike
Ssl
Ipsec
Ippool
Ftp
Upref
Smb
Netdirect
Netdirectpacket
Is Net Direct enabled and configured correctly?
Netdirectpacket
End
Cannot download the NetDirect Zipped file from client PC
Network Diagnostics
System Diagnostics
Installed Certificates and Virtual SSL Servers
# /cfg/sys/cur
# /stats/dump
# /info/ethernet
# ping IP address of virtual server
Active Alarms and the Events Log File
Error Log Files
# /cfg/ssl/server #/trace/ssldump
# /info/events/download
Unable to download NetDirect from VPN server
Troubleshooting the NVG
Appendix Supported Ciphers
Supported Ciphers
Supported Ciphers cont’d
Cipher List Formats
Modifying a Cipher List
Supported Cipher Strings and Meanings
Cipher Strings and Meanings
Cipher Strings and Meanings cont’d
Appendix Snmp Agent
Supported MIBs
SNMPv2-MIB
SNMP-FRAMEWORK-MIB
SNMP-TARGET MIB
SNMP-USER-BASED-SM-MIB
Limitations
IP-MIB
ALTEON-ISD-PLATFORM-MIB
IANAifType-MIB
Supported Traps
Following Snmp traps are supported by the VPN Gateway
Snmp Agent
Appendix Syslog Messages
Config filesystem corrupt beyond repair
List of Syslog Messages
Operating System OS Messages
Root filesystem corrupt
Config filesystem corrupt
Missing files in config filesystem
System Control Process Messages
System started isdssl-version
Name isddown
Name singlemaster
Name logopenfailed
Name makesoftwarereleasepermanentfailed
Name copysoftwarereleasefailed Sender IP
Name license
Name sslhwfail
Name hsmnotloggedin
Name softwareconfigurationchanged
Name partitionednetwork
Name ssimipishere
Name licenseexpiresoon
Traffic Processing Messages
Javascript error reason for hostpath
Vbscript error reason for hostpath
Jscript.encode error reason
Css error reason
Html error reason
Socks error reason
Bad Ipport data line in hc script
Bad regexp expr in health check
Certificate CRL handling errors
Proxy connect host name too long host
Gzip error reason
TPS license limit limit exceeded
License expired
Certificate CRL handling warnings
Startup Messages
Configuration Reload Messages
AAA Subsystem Messages
Host host ip is up accounted for in the license pool
Log functionality
Ldap backends unreachable Vpn=\id\ AuthId=\authid\
IPsec Subsystem Messages
PFS is required but not provided by %s
All credits are exhausted for IPSec SA
Ignoring request to roam from %s to %s
Bad clicert, Can’t find issuer in clicert
Error while decoding certificate DER Id
Failed to allocate IP addr from empty pool
Failed to decode client cert
Deleting the QM replaced by new rekeyed QM
Revocation byte length %d
Loaded ca certificate %s
Loaded server cert %s
Syslog Messages in Alphabetical Order
Syslog Messages in Alphabetical Order
Syslog Messages in Alphabetical Order cont’d
Config filesystem re-initialized
Down
AAA
Html
IPsec Isakmp SA Established Isddown
Cfg/sys/cur command
Gateway but /cfg/vpn # /ser
Loaded server id *will not Processing
Received Delete Isakmp SA
Socks error reason
System started isdssl-version
VPN LoginFailed Vpn=id
OpenSSL License Issues
Appendix License Information
Original SSLeay License
GNU General Public License
GNU General Public License
Terms and Conditions for COPYING, Distribution Modification
227
License Information
No Warranty
Apache Software License, Version
231
License Information
Appendix HSM Security Policy
Scope
Applicable Documents
Overview
Capabilities
Algorithm How it is used by the HSM module Used Fips Mode?
SHA-1
Physical Security
Module Interfaces
Components
Definition of Security Relevant Data Items
HSM Security Policy
Roles and Services
Services
User Creation
YES
Service FIPS140-1 Level 3 Mode
EPK, DPK
EPK
MK, Sopin
Key Management
Key Generation
Key Distribution
Key Storage
Key Entry and Output
Fips 140-1 Mode
Modes
Key Destruction
Key Archiving
Non-FIPS 140-1 Mode
Self-Tests
Conclusion
RC4 KAT
Appendix Definition of Key Codes
Syntax Description
Allowed Special Characters
Redefinable Keys
Allowed Special Characters Explanation
Example of a Key Code Definition File
Appendix SSH host keys
Methods for Protection
VPN Gateway
SSH host keys
261
Step Action Click Start and select Run
Install All Administrative Tools Windows 2000 Server
Register the Schema Management dll Windows Server
Add Standalone Snap-in window is displayed
Under Snap-in, select Active Directory Schema and click Add
Create a Shortcut to the Console Window
Click Continue
Permit Write Operations to the Schema Windows 2000 Server
Right-click Attributes, point to New and select Attribute
Create the nortelSSLOffload class as shown
Create New Class
Create the isdUserPrefs attribute as shown Click OK
Add isdUserPrefs Attribute to nortelSSLOffload Class
Click Next Click Finish
Add the nortelSSLOffload Class to the User Class
Click OK
Adding User Preferences Attribute to Active Directory
Appendix Using the Port Forwarder API
General
Creating a Port Forwarder
=1&c=1
Demo Application
Content.zip file
Creating a Port Forwarder Authenticator
Example
Example
Using the Port Forwarder API
Adding a Port Forwarder Logger
Using the Port Forwarder API
Example
Connecting Through a Proxy
Statistics
Monitoring the Port Forwarder
Status
Using the Port Forwarder API
Access Rules
CLI Command Line Interface
Glossary
Base Profile
Cluster of VPN Gateways
Console Connection
CRL Certificate Revocation List
CSR Certificate Signing Request
DIP Destination IP Address
DPort Destination Port
DTE Data Terminal Equipment
Extended Profile
Http Proxy
IP Interface
Master
MIB Management Information Base
Nslookup
NTP Network Time Protocol
Passphrase
PEM Privacy Enhanced Mail
Setup Utility
Portal
Port Forwarder
Real Server Group
SIP Source IP Address
Slave
Snmp Simple Network Management Protocol
SPort Source Port
SSL Secure Sockets Layer Protocol
SSL VPN client
STP Spanning Tree Protocol
TLS Transport Layer Security
VIP Virtual Server IP Address
Virtual Router
Virtual SSL Server
Vlan Virtual Local Area Network
509
Index
HSM
SSL
298
Page
User Guide