Amer-networks E5Web GUI Manual de usuario

Busca en linea o descarga Manual de usuario para Accesorios De Computador Amer-networks E5Web GUI. Amer Networks E5Web GUI User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 777
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
Clavister cOS Core
Administration Guide
Version: 10.20.02
Clavister AB
Sjögatan 6J
SE-89160 Örnsköldsvik
SWEDEN
Phone: +46-660-299200
www.clavister.com
Published 2014-03-31
Copyright © 2014 Clavister AB
Vista de pagina 0
1 2 3 4 5 6 ... 776 777

Indice de contenidos

Pagina 1 - Administration Guide

Clavister cOS CoreAdministration GuideVersion: 10.20.02Clavister ABSjögatan 6JSE-89160 ÖrnsköldsvikSWEDENPhone: +46-660-299200www.clavister.comPublish

Pagina 2

8.1. Normal LDAP Authentication ... 5338.2. LDAP for PPP with CHAP, MS-CHAPv1 or

Pagina 3 - Table of Contents

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: System > Device > Remote Management > Add > SNMP ma

Pagina 4

Default: N/ASystem LocationThe physical location of the node.Default: N/AInterface Description (SNMP)What to display in the SNMP MIB-II ifDescr variab

Pagina 5

Default: 500Using the hwm CLI CommandTo get a list current values from all available sensors, the following command can be used:Device:/> hwm -allT

Pagina 6

Note: Sensors can differ depending on hardware typeEach hardware model can have a different set of sensors in different locations and withdifferent op

Pagina 7

Sensor Name Sensor Type Sensor Number Minimum Limit Maximum LimitCPUTemp TEMP 0 0 65SysTemp TEMP 1 65 65• Eagle E5Monitoring is not available.• Eagle

Pagina 8

• 2 - PSU inserted, powered up.2.4.6. Memory Monitoring SettingsThe System > Device > Hardware Monitoring section of the Web Interface or InCont

Pagina 9 - List of Figures

2.5. Diagnostic Tools2.5.1. OverviewIn the case of a serious system problem cOS Core provides some tools to aid in identifying thecause. These are:• D

Pagina 10

Generation date/time: 2008-07-04 14:23:56 List of loaded PE-modules:fwloader(1.07.04): BA:0x00100000, EP:0x00101028, SS:0x0, IS:0xe7000fwcore(810.20.0

Pagina 11 - List of Examples

At this point, the file cap_lan.cap should be downloaded to the management workstation foranalysis.5. A final cleanup is performed and all memory take

Pagina 12

information to a file on the Clavister Security Gateway.These output files are placed into the cOS Core root directory and the file name is specified

Pagina 13

List of Examples1. Example Notation ... 142.1. Remote Manage

Pagina 14 - Examples

hardware units and they should each be reset to the base configuration.Resetting to the base configuration can be done through the CLI or Web Interfac

Pagina 15 - Highlighted Content

If the -burnin option is used, a set of tests, known as the test subset, is repeated continuously for aperiod of time. The default test period is two

Pagina 16 - Important

2.6. Maintenance2.6.1. Software UpgradesClavister Security Gateways are driven and controlled by cOS Core and this consists of two majorcomponents: th

Pagina 17 - Chapter 1: cOS Core Overview

These have bug fixes only with no feature additions. They are freely available to all customerswho are licensed to run the base version involved in th

Pagina 18

It can be advisable to make a full system backup before performing a system upgrade. If there isa requirement to wind back the upgrade, the system bac

Pagina 19

• Appendix A, Update Subscriptions2.6.3. Backing Up ConfigurationsThe administrator has the ability to take a snapshot of a cOS Core system at a given

Pagina 20

version, an cOS Core upgrade can then be performed.The Management Interfaces UsedBoth types of backup, configuration and system, can be performed eith

Pagina 21

As an alternative to using SCP, the administrator can initiate a backup or restore of theconfiguration or complete system directly through the Web Int

Pagina 22 - 1.2. cOS Core Architecture

1. Go to: Status > Maintenance > Reset & Restore > Reset2. Select Restore the entire unit to factory defaults then confirm and wait for t

Pagina 23 - 1.2.3. Basic Packet Flow

Note: Original CorePlus 8.nn systems need two resetsIf an upgrade from a CorePlus 8.nn version has been done previously on Clavisterhardware that was

Pagina 24 - Note: Additional actions

3.31. Uploading a Certificate with the Web Interface or InControl ... 2273.32. Uploading a Certificate with Web Interface o

Pagina 25

can explicitly choose the driver from a list using the -force_driver option.The index number of the PCI card is first identified from the output of th

Pagina 26

2.7. LicensingOverviewTo use cOS Core in a live environment, a cOS Core license file must be installed. A unique licensefile is needed for each proces

Pagina 27

license installed before.2. Automatically through the Web InterfaceGo to Status > Maintenance > License and enter the customer username and pass

Pagina 28

Lockdown ModecOS Core will enter a state known as Lockdown Mode if certain license violations occur. While inlockdown mode, only remote management tra

Pagina 29 - Apply Rules

Warning: More restrictive licenses can cause lockdownIf a more restrictive license is loaded into cOS Core so that the existing number of anobject typ

Pagina 30

HA Cluster LicensingIn a cOS Core High Availability Cluster, two identical licenses must be purchased, one for themaster and one for the slave unit. B

Pagina 31 - 2.1. Managing cOS Core

Chapter 2: Management and Maintenance126

Pagina 32 - Remote Management Policies

Chapter 3: FundamentalsThis chapter describes the fundamental logical objects which make up a cOS Core configuration.These objects include such items

Pagina 33 - 2.1.3. The Web Interface

• It increases understanding of the configuration by using meaningful symbolic names.• Using address object names instead of entering numerical addres

Pagina 34 - Virtual Series If1

3. Enter 192.168.10.16 for the IP Address4. Click OKExample 3.2. Adding an IP NetworkThis example adds an IPv4 network named wwwsrvnet with address 19

Pagina 35 - The Web Browser Interface

6.20. Activating Anti-Virus Scanning ... 4656.21. Setting up IDP for a Mail Server .

Pagina 36 - Interface Layout

4. Click OKExample 3.4. Deleting an Address ObjectTo delete an object named wwwsrv1 in the address book, do the following:Command-Line InterfaceDevice

Pagina 37 - Using CA Signed Certificates

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Objects > Address Book > Add > Ethernet Address2. Spec

Pagina 38 - HTTPSCertificate=HostA

Note: IP and MAC AddressesAddress book objects can never contain both IP addresses and Ethernet MAC addressessince these are entirely different in the

Pagina 39 - 2.1.4. The CLI

address book folders. These folders are just like a folder in a computer's file system. They arecreated with a given name and can then be used to

Pagina 40 - Tip: Getting help about help

3.2. IPv6 SupportAll the IP addresses discussed so far are of the IPv4 type. The IP address standard IPv6 is designedas a successor to IPv4 with the p

Pagina 41 - Tab Completion

2. Specify a suitable name for the object, in this case: wan_net63. Enter 2001:DB8::/32 for the IP6 Address4. Click OKAdd the IP address:1. Go to: Obj

Pagina 42 - Object Categories

Web Interface1. Go to: System > Advanced Settings > IP Settings2. Enable the setting: Enable IPv63. Click OKB. Enable IPv6 on an InterfaceOnce I

Pagina 43 - Referencing by Name

enabled by default).Enabling IPv6 Router AdvertisementAn additional option for an Ethernet interface is to enable IPv6 router advertisement. This mean

Pagina 44 - Serial Console CLI Access

Enabling ICMP Error Pass ThroughUnlike IPv4, fragmentation of IPv6 packets is only done by the originating host using the host'sselection of MTU

Pagina 45 - Device:/> shutdown

First, change the CLI context to be the main routing table:Device:/> cc RoutingTable mainAdd the IPv6 route:Device:/main> add Route6 Network=my_

Pagina 46 - Logging on to the CLI

PrefaceIntended AudienceThe target audience for this reference guide is Administrators who are responsible forconfiguring and managing Clavister Secur

Pagina 47 - Changing the CLI Prompt

The above rule assumes that IPv6 has been enabled on the wan interface.A general discussion of ping and its options along with IPv4 usage can be found

Pagina 48 - Device:/> reconf

examines the cOS Core neighbor discovery cache.Neighbor discovery handling in cOS Core resembles ARP handling in that a cache is maintainedin local me

Pagina 49 - Logging off from the CLI

given the value AcceptLog. This can help identify if the cause is the same IPv6 address movingbetween hardware Ethernet addresses.• NDCacheSizeThe nei

Pagina 50 - 2.1.5. CLI Scripts

3.3. Services3.3.1. OverviewA Service object is a reference to a specific IP protocol with associated parameters. A servicedefinition is usually based

Pagina 51 - Script Variables

all_tcpudp All TCP and UDP servicesipsec-suite The IPsec+IKE suitel2tp-ipsec L2TP using IPsec for encryption and authenticationl2tp-raw L2TP control a

Pagina 52 - Saving Scripts

3.3.2. Creating Custom ServicesIf the list of predefined cOS Core service objects does not meet the requirements for certaintraffic then a new service

Pagina 53 - Listing Scripts

Single Port For many services, a single destination port is sufficient. Forexample, HTTP usually uses destination port 80. The SMTPprotocol uses port

Pagina 54

sent to reduce the rate of traffic flow. On the other hand, dropping ICMP messages increasessecurity by preventing them being used as a means of attac

Pagina 55 - 2.1.6. Secure Copy

This example shows how to add a TCP/UDP service, using destination port 3306, which is used byMySQL:Command-Line InterfaceDevice:/> add Service Ser

Pagina 56

When a message type is selected but no code values are given then all codes for that type isassumed.ICMP Message TypesThe message types that can be se

Pagina 57 - 2.1.7. The Console Boot Menu

prompt followed by the command:Device:/> somecommand someparameter=somevalueInControlThe InControl actions for the example are shown here. They are

Pagina 58 - The Reset Menu

IP protocol numbersThe currently assigned IP protocol numbers and references are published by the InternetAssigned Numbers Authority (IANA) and can be

Pagina 59

a configuration and decrease the ability to troubleshoot problems.3.3.6. Custom Service TimeoutsAny service can have its custom timeouts set. These ca

Pagina 60

3.4. Interfaces3.4.1. OverviewAn Interface is an important logical building block in cOS Core. All network traffic that transitsthrough, originates fr

Pagina 61 - Device:/> activate

• Virtual LAN (VLAN) interfaces as specified by IEEE 802.1Q. When routing IP packets over aVirtual LAN interface, they will be encapsulated in VLAN-ta

Pagina 62 - IP=192.168.1.2

Important: Remove references before removing interfacesIf a logical interface is to be deleted from a cOS Core configuration, it is important to first

Pagina 63 - Changing a Remote Access Rule

Ethernet FramesDevices broadcast data as Ethernet frames and other devices "listen" to determine if they are theintended destination for any

Pagina 64

Each Ethernet interface is required to have an Interface IP Address, which can be either a staticaddress or an address provided by DHCP. The interface

Pagina 65

packets.Auto is the default behavior.• Enable DHCP ClientcOS Core includes a DHCP client feature for dynamic assignment of address information by acon

Pagina 66

on an interface with this option.When enabled, default switch routes are automatically added to the routing table for theinterface and any correspondi

Pagina 67 - Object Organization

• Change the IP address directly on the interface. For example, if we want to change the IPv4address of the lan interface to 10.1.1.2, we could use th

Pagina 68

ImportantThis is an essential point that the reader should read and understand.WarningThis is essential reading for the user as they should be aware t

Pagina 69

3.4.2.1. Useful CLI Commands for Ethernet InterfacesThis section summarizes the CLI commands most commonly used for examining andmanipulating cOS Core

Pagina 70

InterfaceAddresses/lan_ip InterfaceAddresses/wan_netInterfaceAddresses/lan_net ServerSetting Interface AddressesThe CLI can be used to set the address

Pagina 71 - Listing Modified Objects

To enable the interface lan:Device:/> set EthernetDevice lan -enableTo set the driver on an Ethernet interface card the command is:Device:/> set

Pagina 72

Require that the assigned broadcast address is the highest address in the assigned network.Default: EnabledDHCP_MinimumLeaseTimeMinimum lease time (se

Pagina 73 - 2.2. Events and Logging

Size of Yukon-II receive ring (per interface).Default: 256Ringsize_yukonii_txSize of Yukon-II send ring (per interface).Default: 256Interface Monitor

Pagina 74 - 2.2.3. Creating Log Receivers

Percentage of errors in sent packets at which to declare a problem.Default: 73.4.3. Link AggregationWhere individual physical Ethernet interfaces of a

Pagina 75 - Message Format

With negotiated aggregation, the switch to which the aggregated interfaces are connected isconfigured to use LACP (Link Aggregation Control Protocol).

Pagina 76

However, it is recommended that the physical cabling is in place before the LinkAggregationobject is activated and saved. This will provide the behavi

Pagina 77 - Setting the Hostname

4. Repeat the previous step to add the If2 interface5. Click OK3.4.4. VLANOverviewVirtual LAN (VLAN) support in cOS Core allows the definition of one

Pagina 78 - Log Message Exceptions

• A physical interface does not need to be dedicated to VLANs and can carry a mixture of VLANand non-VLAN traffic.Physical VLAN Connection with VLANTh

Pagina 79 - 2.2.8. SNMP Traps

Chapter 1: cOS Core OverviewThis chapter outlines the key features of cOS Core.• Features, page 17• cOS Core Architecture, page 22• cOS Core State Eng

Pagina 80 - 2.2.9. Advanced Log Settings

• More than one interface on the security gateway can carry VLAN trunk traffic and these willconnect to separate switches. More than one trunk can be

Pagina 81

It is important to understand that the administrator should treat a VLAN interface just like aphysical interface in that they require both appropriate

Pagina 82 - 2.3. RADIUS Accounting

Point-to-Point Protocol over Ethernet (PPPoE) is a tunneling protocol used for connecting multipleusers on an Ethernet network to the Internet through

Pagina 83 - STOP Message Parameters

address of the interface.User authenticationIf user authentication is required by the ISP, the username and password can be setup in cOSCore for autom

Pagina 84 - Message Frequency

This example shows how to configure a PPPoE client on the wan interface with traffic routed overPPPoE.CLIDevice:/> add Interface PPPoETunnel PPPoEC

Pagina 85 - Further RADIUS Considerations

• Traversing network equipment that blocks a particular protocol.• Tunneling IPv6 traffic across an IPv4 network.• Where a UDP data stream is to be mu

Pagina 86 - Special Accounting Events

The GRE protocol allows for an additional checksum over and above the IPv4 checksum. Thisprovides an extra check of data integrity.The Virtual Routing

Pagina 87 - 2.3.9. Limitations with NAT

Any traffic passing between A and B is tunneled through the intervening network using a GREtunnel and since the network is internal and not public the

Pagina 88 - Maximum Radius Contexts

• Use Session Key: 1• Additional Encapsulation Checksum: Enabled3. Define a route in the main routing table which routes all traffic to remote_net_A o

Pagina 89 - 2.4. Monitoring

Name The name of the interface for display and reference in cOS Core.Loop to This is the name of the other loopback interface in the pair. The other i

Pagina 90 - Interface/VLAN/VPN Statistics

addition, cOS Core supports features such as Virtual LANs,Route Monitoring, Proxy ARP and Transparency.For more information, please see Chapter 4, Rou

Pagina 91 - DHCP Server Statistics

It can be useful to outline the steps required to make use of loopback interfaces in the simplestpossible example.Figure 3.2. A Simple Network with Lo

Pagina 92 - SMTP ALG DNSBL Statistics

illustrated below.Figure 3.3. Components of Loopback Interface SetupThe example below explains the detailed management user interface steps required f

Pagina 93 - IP Pools Statistics

B. Create the second loopback interface1. Go to: Network > Interfaces and VPN > Loopback > Add > Loopback Interface2. Under General enter:

Pagina 94 - 2.4.3. The Link Monitor

Device:/> add Interface InterfaceGroup examplegroupMembers=exampleIf1,exampleIf2InControlFollow the same steps used for the Web Interface below.Web

Pagina 95 - Link Monitor Uses

3.5. ARP3.5.1. OverviewAddress Resolution Protocol (ARP) allows the mapping of a network layer protocol (OSI layer 3)address to a data link layer hard

Pagina 96 - IPsec Tunnels and HA Clusters

The Expires ColumnThe third column in the table, Expires, is used to indicate how much longer the ARP entry will bevalid for.For example, the first en

Pagina 97

The Size of the ARP CacheBy default, the ARP Cache is able to hold 4096 ARP entries at the same time. This is adequate formost scenarios but on rare o

Pagina 98 - 2.4.4. SNMP Monitoring

Proxy ARP is covered in Section 4.2.6, “Proxy ARP” and is not discussed further in this section.ARP Object PropertiesAn ARP object has the following p

Pagina 99 - Preventing SNMP Overload

To understand the difference between Publish and XPublish it is necessary to understand thatwhen cOS Core responds to an ARP query, there are two MAC

Pagina 100 - System Name

Device:/> add ARPND Interface=lanIP=192.168.10.15Mode=StaticMACAddress=4b-86-f6-c5-a2-14InControlFollow the same steps used for the Web Interface b

Pagina 101 - 2.4.5. Hardware Monitoring

For details of this feature, seeSection 6.4, “Anti-VirusScanning”.Intrusion Detection andPreventionTo mitigate application-layer attacks towards vulne

Pagina 102 - Using the hwm CLI Command

ARP RequestsThe ARP specification states that a host should update its ARP Cache with data from ARPrequests received from other hosts. However, as thi

Pagina 103

3.6. IP Rules and IP Policies3.6.1. Security PoliciesBefore examining IP rule sets in detail, we will first look at the generic concept of security po

Pagina 104 - Note: Values for the W5 PSUs

The IP Policy object is an alternative to using IP Rule objects. They are designed to simply thecreation of policies and make it easier to define such

Pagina 105

Specifying Any Interface or NetworkWhen specifying the filtering criteria in any of the policy rule sets, there are several usefulpredefined configura

Pagina 106 - 2.5. Diagnostic Tools

As stated above, when cOS Core is started for the first time, the default IP rules drop all traffic soat least one IP rule must be added to allow traf

Pagina 107 - A Simple Example

which allows monitoring of opened and active connections passing through the ClavisterSecurity Gateway. If the action is Drop or Reject then the new c

Pagina 108 - Downloading the Output File

• ServiceThe Service in an IP rule is also important because if an Application Layer Gateway object is to beapplied to traffic then it must be associa

Pagina 109 - Preparing Hardware

types allow bi-directional traffic flow once the initial connection is set up. The Source Networkand Source Interface in the rule means the source of

Pagina 110 - The -burnin Option

If the action is Return then the rule scanning resumes at the rule which follows the last Gotoaction (if there was no last Goto then the connection is

Pagina 111

rules with a Goto action are then added to the main rule set, and these point to the rule set thatcontains the individual rules that related to the tr

Pagina 112 - 2.6. Maintenance

Clavister cOS CoreAdministration GuideVersion: 10.20.02Published 2014-03-31Copyright © 2014 Clavister ABCopyright NoticeThis publication, including al

Pagina 113 - The Upgrade Procedure

Chapter 2, Management and Maintenance.High Availability High Availability (HA) is supported through automaticfault-tolerant fail-over to a secondary C

Pagina 114 - 2.6.2. Auto-Update Mechanism

Using folders is simply a way for the administrator to conveniently divide up IP rule set entriesand no special properties are given to entries in dif

Pagina 115 - Version Compatibility

be used when organizing IP rules.A compliment and alternative to folders for organizing objects is using configuration objectgroups. Object groups all

Pagina 116 - Backup and Restore using SCP

properties.If it is desirable to create an object group for the two IP rules for web surfing, this is done with thefollowing steps:• Select the first

Pagina 117 - Device:/> reset -unit

box is selected, a full spectrum color palette appears which allows selection by clicking anycolor in the box with the mouse.In this example, we might

Pagina 118 - End of Life Procedures

Moving Group ObjectsOnce an object, such as an IP rule, is within a group, the context of move operations becomes thegroup. For example, right clickin

Pagina 119 - Forcing the Choice of Driver

Creating IP PoliciesAn IP policy has the following basic properties:• Allow or Deny ActionAn IP policy either allows a particular type of traffic or i

Pagina 120

Viewing IP Rules Created by IP PoliciesAs mentioned previously, IP policies create IP rules in the background. These IP rules cannot beviewed through

Pagina 121 - 2.7. Licensing

Command-Line InterfaceDevice:/> add IPPolicyName=http_to_serverAction=AllowSourceInterface=wanSourceNetwork=all-netsDestinationInterface=coreDestin

Pagina 122 - Device:/> shutdown -reboot

Enabling Application ControlApplication Control can be enabled in two ways:• Specifying applications directly for IP rules or IP policies.This is the

Pagina 123 - Ending Lockdown Mode

Name=Allow_CompInControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > Add > IPRule2. Specify a suitab

Pagina 124 - Replacing Hardware

• The Hardware Replacement Guide for swapping out Clavister hardware with the same ordifferent unit.• The Migration Guide for upgrading cOS Core from

Pagina 125 - Licensing with VMware

been authenticated by cOS Core and are one of the usernames specified for the rule orbelong to one of the specified groups.For a Deny rule, the reques

Pagina 126

Now, add the ApplicationRule object:Device:/bt_app_list> add ApplicationRuleAction=AllowAppFilter=3UserAuthGroups=rogue_userForwardChain=narrow_025

Pagina 127 - Chapter 3: Fundamentals

2. Specify a suitable name for the list, in this case bt_app_list3. Select Application Control4. In the dialog:• Set Enable Application Control to Yes

Pagina 128 - 3.1.2. IP Addresses

InControlFollow the same steps used for the Web Interface below.Web InterfaceFirst, define the Application Rule Set:1. Go to: Policies > Firewallin

Pagina 129

Extended LoggingWhen using application content control, it is possible to enable logging for different content.This means that special log messages wi

Pagina 130 - 3.1.3. Ethernet Addresses

5. Choose Matches specific applications6. Open the Web node and choose Facebook7. Press the Select button to close the filter dialogDefine an Applicat

Pagina 131 - 3.1.4. Address Groups

Device:/> appcontrol compressioncompression - Compression:ccpcomp2 application(s)To view a single definition, the individual name can be used witho

Pagina 132 - 3.1.6. Address Book Folders

All the saved filters can be displayed with the command:Device:/> appcontrol -filter -show_listsTo delete all saved filters, use the command: All t

Pagina 133

bandwidth usage. For example, video streaming sites, Java/Flash game sites• Risk Level 1Low-risk. Signatures that could be candidates for blocking. Ty

Pagina 134 - 3.2. IPv6 Support

3.7. SchedulesIn some scenarios, it might be useful to control not only what functionality is enabled, but alsowhen that functionality is being used.F

Pagina 135

1.2. cOS Core Architecture1.2.1. State-based ArchitectureThe cOS Core architecture is centered around the concept of state-based connections.Tradition

Pagina 136 - IPv6Network=wan_net6

Section 3.9, “Date and Time”.Example 3.30. Setting up a Time-Scheduled Security PolicyThis example creates a schedule object for office hours on weekd

Pagina 137 - The all-nets6 Address Object

• SourceInterface: lan• SourceNetwork lan_net• DestinationInterface: any• DestinationNetwork: all-nets4. Click OKChapter 3: Fundamentals221

Pagina 138 - Proxy Neighbor Discovery

3.8. Certificates3.8.1. OverviewThe X.509 StandardcOS Core supports digital certificates that comply with the ITU-T X.509 standard. This involvesthe u

Pagina 139

Property Value Remarks---------------- -------------- ---------Name: HTTPSAdminCertType: LocalCertificateData: (binary data)PrivateKey: (binary data)N

Pagina 140 - IPv6 and Transparent Mode

Between creating the request and importing the signed certificate file, the certificate objecthas a Type set to the value Request.These functions are

Pagina 141

which the certificate is valid. When this validity period expires, the certificate can no longer beused and a new certificate must be issued.Important

Pagina 142

Identification ListsIn addition to verifying the signatures of certificates, cOS Core also employs identification lists.An identification list is a li

Pagina 143 - 3.3. Services

Graphical Interface UploadingExample 3.31. Uploading a Certificate with the Web Interface or InControlIn this example a certificate stored on the mana

Pagina 144

4. Use the file chooser to select a certificate file with the filetype .cer. No private key file shouldbe present. When InControl asks if the private

Pagina 145 - Specifying Port Numbers

3.9. Date and Time3.9.1. OverviewCorrectly setting the date and time is important for cOS Core to operate properly. Timescheduled policies, auto-updat

Pagina 146 - Tip: Specifying source ports

combinations. Also important are the Application Layer Gateway (ALG) objects which are used todefine additional parameters on specific protocols such

Pagina 147 - Specifying All Services

1. Go to: System > Device > Date and Time2. Click Set Date and Time3. Set year, month, day and time via the dropdown controls4. Click OKNote: A

Pagina 148 - 3.3.3. ICMP Services

principles regulating DST vary from country to country, and in some cases there can be variationswithin the same country. For this reason, cOS Core do

Pagina 149 - ICMP Message Types

Internet. The server sends back the time in seconds since midnight on January 1st, 1900.Configuring Time ServersUp to three time servers can be config

Pagina 150 - 3.3.5. Service Groups

Example 3.38. Manually Triggering a Time SynchronizationTime synchronization can be triggered from the CLI. The output below shows a typical response.

Pagina 151

Example 3.40. Forcing Time SynchronizationThis example demonstrates how to force time synchronization, overriding the maximumadjustment setting.Comman

Pagina 152 - 3.4. Interfaces

Primary Time ServerDNS hostname or IP Address of Timeserver 1.Default: NoneSecondary Time ServerDNS hostname or IP Address of Timeserver 2.Default: No

Pagina 153 - Interfaces have Unique Names

3.10. DNSOverviewA DNS server can resolve a Fully Qualified Domain Name (FQDN) into the corresponding numericIP address. FQDNs are unambiguous textual

Pagina 154 - 3.4.2. Ethernet Interfaces

2. Enter the following:• Primary Server: 10.0.0.1• Secondary Server: 10.0.0.23. Click OKDNS Lookup and IP RulesIn the case of DNS server request being

Pagina 155 - Note: Interface naming

myuid:[email protected]/nic/update?hostname=mydns.dyndns.orgThis could be sent by using HTTP Poster. Alternatively, the URL could be automatica

Pagina 156

3.11. Internet Access SetupOverviewOne of the first things an administrator often wants to do after starting cOS Core for the first timeis to set up a

Pagina 157

tables to confirm that there is a route with this network as the destination on the sameinterface.If the Access Rule lookup or the reverse route looku

Pagina 158

• The IP address of the ISP's "gateway" router.• A network address for the network between the ISP and the Clavister Security Gateway.

Pagina 159 - Address=10.1.1.2

See Chapter 5, DHCP Services for more information about this topic.Example 3.42. Enabling DHCPAssume that the wan is connected to the gateway of the I

Pagina 160 - Showing Assigned Interfaces

3.11.4. Creating a RouteInitially, no route will exist in the main routing table that allows traffic to reach the Internet sothis must be defined. The

Pagina 161 - Ethernet Device Commands

• Interface: wan• Network: all-nets• Gateway: isp_gw_ip3. Click OK3.11.5. Creating IP Rules or IP PoliciesBefore traffic can flow to the ISP, appropri

Pagina 162 - DHCP_ValidateBcast

Device:/> add IPPolicySourceInterface=lanSourceNetwork=lan_netDestinationInterface=wanDestinationNetwork=all-netsService=dns-allSourceAction=NATNam

Pagina 163

• Destination Network: all-nets• Service: dns-all3. Select Address Translation and in the dialog:• Under Source Address Translation enable NAT• Close

Pagina 164

configured during initial connection to the ISP.When DHCP configures the DHCP servers in cOS Core, names are automatically assigned to theseservers so

Pagina 165 - 3.4.3. Link Aggregation

3.12. ICMP PingThe combination of the ICMP echo request and echo reply messages are known as ping. Theyprovide a simple diagnostic tool to find out if

Pagina 166 - Physical Switch Connections

ping-inbound. An example IP rule for ping messages arriving on the wan interface would be thefollowing:Action SourceInterfaceSourceNetworkDestinationI

Pagina 167 - Setting the MTU Value

Incoming Packet Simulation with -srcifInstead of testing the responsiveness of a remote host, the cOS Core ping command can be usedto simulate an inco

Pagina 168 - 3.4.4. VLAN

use of the different Application Layer Gateways, layer 7 scanning engines and so on, tofurther analyze or transform the traffic.• If the contents of t

Pagina 169

Combining -srcif with -srcipIt is possible to combine -srcip with the -srcif option to simulate a packet arriving on a giveninterface with a given sou

Pagina 170 - Port Based VLAN

Chapter 3: Fundamentals251

Pagina 171 - 3.4.5. PPPoE

Chapter 4: RoutingThis chapter describes how to configure IP routing in cOS Core.• Overview, page 252• Static Routing, page 253• Policy-based Routing,

Pagina 172 - IP address information

4.2. Static RoutingThe most basic form of routing is known as Static Routing. The term "static" is used because mostentries in a routing tab

Pagina 173 - User authentication

• Local IP AddressThis parameter usually does not need to be specified. If it is specified, cOS Core responds toARP queries sent to this address. A sp

Pagina 174 - 3.4.6. GRE Tunnels

Route # Interface Destination Gateway1 lan 192.168.0.0/242 dmz 10.4.0.0/163 wan 195.66.77.0/244 wan all-nets 195.66.77.4The above routing table provid

Pagina 175 - Setting Up GRE

through ARP queries. ARP works because the clients and the cOS Core interface are part of thesame network.A second network might then be added to the

Pagina 176 - An Example GRE Scenario

second network must also have their Default Gateway set to 10.2.2.1 in order to reach theClavister Security Gateway.This feature is normally used when

Pagina 177

If an established connection cannot be found, then the routing table is consulted. It is importantto understand that the route lookup is performed bef

Pagina 178 - 3.4.7. Loopback Interfaces

• It does not matter even if there is a separate route which includes the gateway IP address andthat routes traffic to a different interface.Composite

Pagina 179

1.3. cOS Core State Engine Packet FlowThe diagrams in this section provide a summary of the flow of packets through the cOS Corestate-engine. There ar

Pagina 180

InControlFollow the same steps used for the Web Interface below.Web InterfaceTo see the configured routing table:1. Go to: Network > Routing > R

Pagina 181

When this option is selected, the appropriate all-nets route is automatically added to the mainrouting table for the interface.Example 4.2. Adding a R

Pagina 182 - 3.4.8. Interface Groups

present for cOS Core to understand how to route traffic that is destined for the itself.There is one route added for each Ethernet interface in the sy

Pagina 183 - Members=exampleIf1,exampleIf2

Tip: Understanding output from the routes commandFor detailed information about the output of the CLI routes command, refer to theseparate CLI Referen

Pagina 184 - 3.5. ARP

as healthy. This method is appropriate for monitoring that theinterface is physically attached and that the cabling is workingas expected. As any chan

Pagina 185 - Flushing the ARP Cache

disabled and instigate route failover for existing and new connections. For already establishedconnections, a route lookup will be performed to find t

Pagina 186 - 3.5.3. ARP Publish

should fail.There are, however, some problems with this setup: if a route failover occurs, the default routewill then use the dsl interface. When a ne

Pagina 187 - Publish and XPublish Modes

security gateway comes online.Minimum Number of HostsAvailableThis is the minimum number of hosts that must beconsidered to be accessible before the r

Pagina 188 - ARP and Neighbor Discovery

The maximum number of milliseconds allowable between a poll request and the response. Ifthis threshold is exceeded then the host is considered unreach

Pagina 189 - Unsolicited ARP Replies

ARP poll intervalThe time in milliseconds between ARP-lookup of hosts. This may be overridden in individualroutes.Default: 1000Ping poll intervalThe t

Pagina 190 - Matching Ethernet Addresses

Figure 1.2. Packet Flow Schematic Part IIThe packet flow is continued on the following page.Chapter 1: cOS Core Overview27

Pagina 191 - 3.6. IP Rules and IP Policies

impose security policies on the traffic passing between the different network parts.A Typical ScenarioAs an example of a typical proxy ARP scenario, c

Pagina 192 - The Default main IP Rule Set

Figure 4.4. A Proxy ARP ExampleTransparent Mode as an AlternativeTransparent Mode is an alternative and preferred way of splitting Ethernet networks.

Pagina 193 - Creating a Drop All Rule

4.3. Policy-based RoutingOverviewPolicy-based Routing (PBR) is an extension to the standard routing described previously. It offersadministrators sign

Pagina 194 - 3.6.2. IP Rule Set Evaluation

Routing TablescOS Core, as standard, has one default routing table called main. In addition to the main table, itis possible to define one or more, ad

Pagina 195 - 3.6.3. IP Rule Actions

to say routes to the core interface (which are routes to cOS Core itself).4. Click OKExample 4.5. Adding RoutesAfter defining the routing table MyPBRT

Pagina 196 - Bi-directional Connections

Example 4.6. Creating a Routing RuleIn this example, a routing rule called my_routing_rule is created. This will select the routing tableMyPBRTable fo

Pagina 197 - 3.6.4. Multiple IP Rule Sets

The Forward and Return Routing Table can be DifferentIn most cases, the routing table for forward and return traffic will be the same. In some cases i

Pagina 198 - The ExtraRules IP rule set

2. A search is now made for a routing rule that matches the packet's source/destinationinterface/network as well as service. If a matching rule i

Pagina 199 - 3.6.5. IP Rule Set Folders

The first two options can be regarded as combining the alternate table with the main table andassigning one route if there is a match in both tables.I

Pagina 200

Contents of the Policy-based Routing Policy:SourceInterfaceSourceRangeDestinationInterfaceDestinationRangeSelected/ServiceForwardVR tableReturnVR tabl

Pagina 201 - Object Groups and the CLI

Figure 1.3. Packet Flow Schematic Part IIIChapter 1: cOS Core Overview28

Pagina 202 - Editing Group Properties

4.4. Route Load BalancingOverviewcOS Core provides the option to perform Route Load Balancing (RLB). This is the ability todistribute traffic over mul

Pagina 203 - Adding Preceding Objects

processing steps is as follows:1. Route lookup is done in the routing table and a list of all matching routes is assembled. Theroutes in the list must

Pagina 204 - 3.6.7. IP Policies

Figure 4.6. The RLB Spillover AlgorithmSpillover Limits are set separately for ingoing and outgoing traffic with only one of thesetypically being spec

Pagina 205 - Creating IP Policies

different metric. The route with the lowest metric is chosen first and when that route'sinterface limits are exceeded, the route with the next hi

Pagina 206

Internet access is available from either one of two ISPs, whose gateways GW1 GW2 are connectedto the security gateway interfaces WAN1 and WAN2. RLB wi

Pagina 207 - 3.6.8. Application Control

Example 4.8. Setting Up RLBIn this example, the details of the RLB scenario described above will be implemented. Theassumption is made that the variou

Pagina 208 - Enabling Application Control

• Click OK5. Select Add > Route again to add the second route6. The dialog for a new route will appear. For the second route, enter:• Interface: WA

Pagina 209 - Using an Application Rule Set

• Use two ISPs, with one tunnel connecting through one ISP and the other tunnel connectingthrough the other ISP. RLB can then be applied as normal wit

Pagina 210

4.5. Virtual Routing4.5.1. OverviewVirtual Routing is a cOS Core feature that allows the creation of multiple, logically separatedvirtual systems with

Pagina 211

Figure 4.8. Virtual RoutingWhen the administrator configures this in cOS Core, interface If1 is made a member of routingtable pbr1 but not pbr2. In ot

Pagina 212 - Application Content Control

Apply RulesThe figure below presents the detailed logic of the Apply Rules function in Figure 1.2, “Packet FlowSchematic Part II” above.Figure 1.4. Ex

Pagina 213

communication between the virtual systems. For example, Department A does not need tocommunicate with Department B. If communication between them is n

Pagina 214 - Extended Logging

Route # Interface Network Gateway2 If2 192.168.0.0/24Getting traffic from each network to and from the Internet is straightforward. Assuming onlyoutbo

Pagina 215 - Data Leakage Can Occur

Here, each organization gets a virtual system of its own. These connect to the main routing tableusing pairs of loopback interfaces. The routing table

Pagina 216 - Managing Filters

Also note how the IPv4 addresses of the internal interfaces of the virtual systems differ. Ifper-interface routing table membership were not used, the

Pagina 217 - Risk Guidelines

Note that SAT rules do not need to take into account that there are more organizationsconnected to the same physical unit. There is no direct connecti

Pagina 218 - Application Control Licensing

connection will be shown; before and after address translation. Also, the routing tables usedin the forward and return direction will be shown.• Enabl

Pagina 219 - 3.7. Schedules

4.6. OSPFThe feature called Dynamic Routing is implemented in cOS Core using the Open Shortest Path First(OSPF) architecture.This section begins by lo

Pagina 220

In contrast to DV algorithms, Link State (LS) algorithms enable routers to keep routing tables thatreflect the topology of the entire network.Each rou

Pagina 221

Under OSPF, this exchange of routing information is completely automatic.OSPF Provides Route RedundancyIf we now take the above scenario and add a thi

Pagina 222 - 3.8. Certificates

and to determine the optimal path. The principal metrics used include:Path length The sum of the costs associated with each link. A commonly used valu

Pagina 223 - The NoCRLs Property

Table of ContentsPreface ... 141. cOS Core

Pagina 224 - Validity Time

Chapter 1: cOS Core Overview30

Pagina 225 - Trusting Certificates

It is possible to configure separate authentication methods for each AS.OSPF AreasAn OSPF Area consists of networks and hosts within an AS that have b

Pagina 226 - 3.8.2. Uploading Certificates

With cOS Core, the DR and the BDR are automatically assigned.NeighborsRouters that are in the same area become neighbors in that area. Neighbors are e

Pagina 227 - Uploading Remote Certificates

This virtual link is established between two Area Border Routers (ABRs) that are on one commonarea, with one of the ABRs connected to the backbone are

Pagina 228 - Using Uploaded Certificates

Figure 4.14. Virtual Links with Partitioned BackboneThe virtual link is configured between fw1 and fw2 on Area 1 as it is used as the transit area. In

Pagina 229 - 3.9. Date and Time

having a route in its routing tables for the destination.The key aspect of an OSPF setup is that connected Clavister Security Gateways share theinform

Pagina 230 - Daylight Saving Time

interface participating in the OSPF AS.Private Router ID This is used in an HA cluster and is the ID for this securitygateway and not the cluster.Note

Pagina 231 - 3.9.3. Time Servers

In other words, the OSPF authentication method must be replicated on all ClavisterSecurity Gateways.AdvancedTime SettingsSPF Hold Time Specifies the m

Pagina 232 - Configuring Time Servers

There can only be one backbone area and it forms the centralportion of an AS. Routing information that is exchangedbetween different area always trans

Pagina 233 - Maximum Time Adjustment

multicast address 224.0.0.5. Those packets will be heard by all otherthe OSPF routers on the network. For this reason, no configuration ofOSPF Neighbo

Pagina 234

InfTrans Delay Specifies the estimated transmit delay for the interface. This valuerepresents the maximum time it takes to forward a LSA packettrough

Pagina 235

Chapter 2: Management and MaintenanceThis chapter describes the management, operations and maintenance related aspects of cOSCore.• Managing cOS Core,

Pagina 236 - 3.10. DNS

Network The network consisting of the smaller routers.Advertise If the aggregation should be advertised or not.In most, simple OSPF scenarios, OSPF Ag

Pagina 237 - Dynamic DNS and HTTP Poster

received routing information, and it might be crucial to avoid parts of the routing databasegetting published to other routers.For this reason, Dynami

Pagina 238 - HTTP Poster Has Other Uses

Figure 4.16. Dynamic Routing Rule Objects4.6.4.2. Dynamic Routing RuleThis object defines a dynamic routing rule.General ParametersName Specifies a sy

Pagina 239 - 3.11. Internet Access Setup

OSPF Tag Specifies an interval that the tag of the routers needs to be in between.4.6.4.3. OSPF ActionThis object defines an OSPF action.General Param

Pagina 240 - 3.11.2. DHCP Setup

Figure 4.17. Setting Up OSPFIn this example we connect together the two Clavister Security Gateways with OSPF so they canshare the routes in their rou

Pagina 241

Finally, a Dynamic Routing Rule needs to be defined to deploy the OSPF network. This involvestwo steps:i. A Dynamic Routing Policy Rule object is adde

Pagina 242 - 3.11.4. Creating a Route

and those interfaces are configured with OSPF Router Process objects, OSPF will beginexchanging routing information.Confirming OSPF DeploymentIt is no

Pagina 243

2. Choose a random internal IP networkFor each security gateway, we need to choose a random IP network using internal, private IPv4addresses. For exam

Pagina 244

4.6.6. An OSPF ExampleThis section goes through the detailed setup steps for the simple OSPF scenario illustratedbelow.Figure 4.19. An OSPF ExampleHer

Pagina 245 - 3.11.6. Defining DNS Servers

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Network > Routing > OSPF > Add > OSPF Router Process2. Enter

Pagina 246 - Device:/> dhcp -show wan

based computer. The server serves as a repository for all cOS Coreconfiguration data and mediates all management commands sentby clients.More informat

Pagina 247 - 3.12. ICMP Ping

5. Click OKNow, repeat this for security gateway B, using the same OSPF Area object name of area_0.Example 4.11. Add OSPF Interface ObjectsFor securit

Pagina 248 - Using the -verbose Option

Example 4.12. Import Routes from an OSPF AS into the Main Routing TableIn this example, the routes received using OSPF will be added into the main rou

Pagina 249 - Specifying the Source IP

Web Interface1. Go to: Network > Routing > Routing Rules2. Click on the newly created ImportOSPFRoutes3. Go to: Routing Action > Add > Dyn

Pagina 250 - Ping with IPv6

Command-Line InterfaceFirst, change the CLI context to be the DynamicRoutingRule just added for export:Device:/> cc DynamicRoutingRule ExportDefRou

Pagina 251

• DebugDDesc - Log database description packets.• DebugExchange - Log exchange packets.• DebugLSA - Log LSA events.• DebugSPF - Log SPF calculation ev

Pagina 252 - Chapter 4: Routing

The OSPF CLI commandThe CLI command ospf provides various options for examining the behavior of OSPF in real-timeon a particular.In order to see gener

Pagina 253 - 4.2. Static Routing

4.7. Multicast Routing4.7.1. OverviewThe Multicast ProblemCertain types of Internet interactions, such as conferencing and video broadcasts, require a

Pagina 254 - A Typical Routing Scenario

For multicast to function with an Ethernet interface on any Clavister Security Gateway,that interface must have multicast handling set to On or Auto.

Pagina 255 - 4 wan all-nets 195.66.77.4

Figure 4.20. Multicast Forwarding - No Address TranslationNote: SAT Multiplex rules must have a matching Allow ruleRemember to add an Allow rule that

Pagina 256

1. Go to: Objects > Services > Add > TCP/UDP2. Now enter:• Name: multicast_service• Type: UDP• Destination: 1234B. Create an IP rule:1. Go to

Pagina 257 - 4.2.2. Static Routing

2.1.2. Default Administrator AccountsBy default, cOS Core has a local user database, AdminUsers, which contains two predefined useraccounts:• Username

Pagina 258

If, for example, multiplexing of the multicast group 239.192.100.50 is required to the outputinterfaces if2 and if3, then the command to create the ru

Pagina 259 - Displaying Routing Tables

The following SAT Multiplex rule needs to be configured to match the scenario described above:InControlFollow the same steps used for the Web Interfac

Pagina 260 - The all-nets Route

4.7.3. IGMP ConfigurationIGMP signalling between hosts and routers can be divided into two categories:• IGMP ReportsReports are sent from hosts toward

Pagina 261 - Routes to the Core Interface

Figure 4.23. Multicast Proxy ModeIn Snoop Mode, the Clavister Security Gateway will act transparently between the hosts andanother IGMP router. It wil

Pagina 262 - 1 core 224.0.0.0/4

1. Go to: Network > Routing > IGMP Rules > Add > IGMP Rule2. Under General enter:• Name: A suitable name for the rule, for example Reports

Pagina 263

4.7.3.2. IGMP Rules Configuration - Address TranslationThe following examples illustrates the IGMP rules needed to configure IGMP according to theAddr

Pagina 264 - Failover Processing

2. Under General enter:• Name: A suitable name for the rule, for example Queries_if1• Type: Query• Action: Proxy• Output: if1 (this is the relay inter

Pagina 265 - Route Interface Grouping

• Destination Interface: core• Destination Network: auto• Multicast Source: 192.168.10.1• Multicast Group: 239.192.10.0/244. Click OKB. Create the sec

Pagina 266 - Enabling Host Monitoring

the default route.Default: EnabledIGMP Before RulesFor IGMP traffic, by-pass the normal IP rule set and consult the IGMP rule set.Default: EnabledIGMP

Pagina 267 - Specifying Hosts

The interval in milliseconds between General Queries sent by the device to refresh its IGMP state.Global setting on interfaces without an overriding I

Pagina 268 - Iface poll interval

Clavister Product Default Web Interface Management InterfaceLynx X8 G1Eagle E5/E7 geswWolf W3/W5 M1Virtual Series If1Changing the management interface

Pagina 269 - 4.2.6. Proxy ARP

4.8. Transparent Mode4.8.1. OverviewTransparent Mode UsageThe cOS Core Transparent Mode feature allows a Clavister Security Gateway to be placed at ap

Pagina 270 - Setting Up Proxy ARP

• Routing Mode using non-switch routes.• Transparent Mode using switch routes.With non-switch routes, the Clavister Security Gateway acts as a router

Pagina 271 - Automatically Added Routes

interface. As the Layer 3 Cache is only used for IP traffic, Layer 3 Cache entries are stored as singlehost entries in the routing table.For each IP p

Pagina 272 - 4.3. Policy-based Routing

Specifying a network or address range is, of course, only possible if the administrator has someknowledge of the network topology and often this may n

Pagina 273 - Routing Tables

Transparent Mode with VLANsIf transparent mode is being set up for all hosts and users on a VLAN then the techniquedescribed above of using multiple r

Pagina 274 - Routing Rules

clients located behind a security gateway operating in transparent mode. In this case, cOS Coremust be correctly configured as a DHCP relayer to corre

Pagina 275

single logical IP network in Transparent Mode with a common address range (in this example192.168.10.0/24).Figure 4.25. Transparent Mode Internet Acce

Pagina 276

Clavister Security Gateway is acting like a level 2 switch and address translation is done at thehigher IP OSI layer.The other consequence of not usin

Pagina 277 - The Ordering parameter

Network=10.0.0.0/24AutoSwitchRoute=YesAdd the IP rule:Device:/> add IPRule Action=AllowService=httpSourceInterface=lanSourceNetwork=10.0.0.0/24Dest

Pagina 278

• Name: http_allow• Action: Allow• Service: http• Source Interface: lan• Destination Interface: any• Source Network: 10.0.0.0/24• Destination Network:

Pagina 279

After entering a valid username and password the Login button is clicked. If the user credentialsare valid, the administrator is taken to the main Web

Pagina 280 - 4.4. Route Load Balancing

Example 4.21. Setting up Transparent Mode for Scenario 2Configure a Switch Route over the lan and dmz interfaces for address range 10.0.0.0/24 (assume

Pagina 281

Device:/> add IPRule Action=AllowService=httpSourceInterface=wanSourceNetwork=all-netsDestinationInterface=dmzDestinationNetwork=wan_ipName=http_wa

Pagina 282

3. Click OKConfigure the routing:1. Go to: Network > Routing > Routing Tables > main > Add > SwitchRoute2. Now enter:• Switched Interfa

Pagina 283 - An RLB Scenario

7. Go to: Policies > Add > IPRule8. Now enter:• Name: http_wan_to_dmz• Action: Allow• Service: http• Source Interface: wan• Destination Interfac

Pagina 284

Figure 4.28. An Example BPDU Relaying ScenarioImplementing BPDU RelayingThe cOS Core BDPU relaying implementation only carries STP messages. These STP

Pagina 285

• Drop/Log - Drop all MPLS packets without verification and log these drops.4.8.6. Advanced Settings for Transparent ModeCAM To L3 Cache Dest Learning

Pagina 286 - RLB with VPN

Transparency ATS SizeDefines the maximum total number of ARP Transaction State (ATS) entries. Valid values are128-65536 entries.Default: 4096Note: Opt

Pagina 287

• Drop - Drop packets• DropLog - Drop and log packetsDefault: DropLogRelay Spanning-tree BPDUsWhen set to Ignore all incoming STP, RSTP and MSTP BPDUs

Pagina 289 - Using Loopback Interfaces

Chapter 5: DHCP ServicesThis chapter describes DHCP services in cOS Core.• Overview, page 359• cOS Core DHCP Servers, page 361• IPv4 DHCP Relay, page

Pagina 290 - Routing Table pbr2

cOS Core objects. The central area of the Web Interface displays information about thosemodules. Current performance information is shown by default.N

Pagina 291

The lease time can be configured in a DHCP server by the administrator.Chapter 5: DHCP Services360

Pagina 292 - Loopback Interfaces

5.2. cOS Core DHCP ServerscOS Core DHCP servers assign and manage the IP addresses taken from a specified address pool.These servers are not limited t

Pagina 293 - IP Rules

This is the IP address of the DHCP relayer through which the DHCP request has come.Requests from local clients or other DHCP relayers will be ignored.

Pagina 294 - 4.5.6. Trouble Shooting

parameter, Lease Store Interval.• Lease Store IntervalThe number of seconds between auto saving the lease database to disk. The default value is86400

Pagina 295

10.4.13.244 00-00-00-00-02-14 INACTIVE(STATIC)10.4.13.254 00-00-00-00-02-54 INACTIVE(STATIC)10.4.13.1 00-12-79-3b-dd-45 ACTIVE10.4.13.2 00-12-79-c4-06

Pagina 296 - 4.6. OSPF

Figure 5.1. DHCP Server ObjectsThe following sections discuss these two DHCP server options.5.2.1. Static IPv4 DHCP HostsWhere the administrator requi

Pagina 297 - A Simple OSPF Scenario

Device:/DHCPServer1> show DHCPServerPoolStaticHost 1Property Value----------- -----------------Index: 1Host: 192.168.1.1MACAddress: 00-90-12-13-14-

Pagina 298 - A Look at Routing Metrics

Data This is the actual information that will be sent in the lease. This can be one value or acomma separated list.The meaning of the data is determin

Pagina 299 - 4.6.2. OSPF Concepts

5.3. IPv4 DHCP RelayNoteDHCP relaying is a feature which is currently only available with IPv4 DHCP.The DHCP ProblemWith DHCP, clients send requests t

Pagina 300 - The Designated Router

TargetDHCPServer=ip-dhcpSourceInterface=ipgrp-dhcpAddRoute=YesProxyARPInterfaces=ipgrp-dhcpInControlFollow the same steps used for the Web Interface b

Pagina 301 - Virtual Links

change the ordering and other operations. The Clone function is used tomake a complete copy of the current object and then add it as the lastobject in

Pagina 302

Transaction TimeoutFor how long a dhcp transaction can take place.Default: 10 secondsMax PPMHow many dhcp-packets a client can send to through cOS Cor

Pagina 303 - Using OSPF with cOS Core

5.4. IP PoolsNoteIP pools can currently only be used with IPv4 DHCP.OverviewAn IP pool is used to offer other subsystems access to a cache of DHCP IP

Pagina 304 - 4.6.3. OSPF Components

Advanced IP Pool OptionsAdvanced options available for IP Pool configuration are:Routing Table The routing table to be used for lookups when resolving

Pagina 305 - Authentication

This displays all the configured IP pools along with their status. The status information is dividedinto four parts:• Zombies - The number of allocate

Pagina 306 - 4.6.3.2. OSPF Area

5.5. DHCPv6 ServerscOS Core provides the ability to set up one or more DHCPv6 servers. Configuring these is almostidentical to configuring an IPv4 DHC

Pagina 307 - 4.6.3.3. OSPF Interface

DHCPv6 server. Together, these can significantly increase the speed of addressallocation.Available Memory Can Limit Lease AllocationWhen a DHCPv6 leas

Pagina 308

interface lan. Assume that the pool of available IP addresses is already defined by the IPv6address object dhcpv6_range1.The server will also use the

Pagina 309 - 4.6.3.5. OSPF Aggregates

2. Now enter:• Name: dhcpv6_server1• Interface Filter: lan• IP Address Pool: dhcpv6_range13. Select the Options tab4. Enable Handle Rapid Commit Optio

Pagina 310 - 4.6.4. Dynamic Routing Rules

5. Click OK to save the prefix6. Click OK to save the advertisementStatic DHCPv6 HostsWhere the administrator requires a fixed relationship between a

Pagina 312 - 4.6.4.2. Dynamic Routing Rule

Example 2.1. Remote Management via HTTPS with CA Signed CertificatesCommand-Line InterfaceDevice:/> set Settings RemoteMgmtSettingsHTTPSCertificate

Pagina 313 - 4.6.5. Setting Up OSPF

Chapter 6: Security MechanismsThis chapter describes cOS Core security features.• Access Rules, page 380• ALGs, page 384• Web Content Filtering, page

Pagina 314

and a Default Access Rule log message will be generated.When troubleshooting dropped connections, the administrator should look out for DefaultAccess

Pagina 315

• Network: The IP span that the sender address should belong to.Access Rule ActionsThe Access Rule actions that can be specified are:• Drop: Discard t

Pagina 316 - Confirming OSPF Deployment

1. Go to: Network > Routing > Access > Add > Access2. Now enter:• Name: lan_Access• Action: Expect• Interface: lan• Network: lan_net3. Cli

Pagina 317

6.2. ALGs6.2.1. OverviewTo complement low-level packet filtering, which only inspects packet headers in protocols suchas IP, TCP, UDP, and ICMP, Clavi

Pagina 318 - 4.6.6. An OSPF Example

Maximum Connection SessionsThe service associated with an ALG has a configurable parameter associated with it called MaxSessions and the default value

Pagina 319

The opposite to blacklisting, this makes sure certain URLs are always allowed.Wildcarding can also be used for these URLs, as described below.It is im

Pagina 320 - Device:/>

the download will be dropped. If nothing is marked in this mode then no files can bedownloaded.Additional filetypes not included by default can be add

Pagina 321

Figure 6.2. HTTP ALG Processing OrderUsing Wildcards in White and BlacklistsEntries made in the white and blacklists can make use of wildcarding to ha

Pagina 322

File Transfer Protocol (FTP) is a TCP/IP-based protocol for exchanging files between a client and aserver. The client initiates the connection by conn

Pagina 323 - 4.6.7. OSPF Troubleshooting

After finishing working with the Web Interface, it is advisable to always logout to prevent otherusers with access to the workstation getting unauthor

Pagina 324

certain control commands and provide buffer overrun protection.Hybrid ModeAn important feature of the cOS Core FTP ALG is its automatic ability to per

Pagina 325 - The OSPF CLI command

active mode, the cOS Core FTP ALG will handle the conversion automatically to active mode.A range of client data ports is specified with this option.

Pagina 326 - 4.7. Multicast Routing

The FTP ALG also allows restrictions to be placed on the FTP control channel which can improvethe security of FTP connections. These are:• Maximum lin

Pagina 327

In this case, we will set the FTP ALG restrictions as follows.• Enable the Allow client to use active mode FTP ALG option so clients can use both acti

Pagina 328

5. Click OKB. Define the Service:1. Go to: Objects > Services > Add > TCP/UDP Service2. Enter the following:• Name: ftp-inbound-service• Type

Pagina 329

• Action: NAT• Service: ftp-inbound-service3. For Address Filter enter:• Source Interface: dmz• Destination Interface: core• Source Network: dmz_net•

Pagina 330

In this case, we will set the FTP ALG restrictions as follows.• Disable the Allow client to use active mode FTP ALG option so clients can only use pas

Pagina 331

B. Create the Service1. Go to: Objects > Services > Add > TCP/UDP Service2. Now enter:• Name: ftp-outbound-service• Type: select TCP from the

Pagina 332 - 4.7.3. IGMP Configuration

• Action: NAT• Service: ftp-outbound-service3. For Address Filter enter:• Source Interface: lan• Destination Interface: wan• Source Network: lan_net•

Pagina 333

be written by a TFTP client. The default value is Allow.Remove Request Option Specifies if options should be removed from request. Thedefault is False

Pagina 334

2.6.3. Backing Up Configurations ... 1152.6.4. Restore to Factory Defaults ...

Pagina 335

completion would not be able to help complete the above command if the tab is pressed duringor after the IPAddress object type.The same object name co

Pagina 336

Email size limiting A maximum allowable size of email messages can bespecified. This feature counts the total amount of bytes sentfor a single email w

Pagina 337 - 4.7.4. Advanced IGMP Settings

As described above, if an address is found on the whitelist then it will not be blocked if it alsofound on the blacklist. Spam filtering, if it is ena

Pagina 338

extension list that is returned to the client by an SMTP server behind the Clavister SecurityGateway. When an extension is removed, a log message is g

Pagina 339 - IGMP Startup Query Interval

email is from a spammer or not. cOS Core examines the IP packet headers to do this.The reply sent back by a server is either a not listed response or

Pagina 340

If dnsbl1 and dnsbl2 say an email is Spam but dnsbl3 does not, then the total calculated will be3+2+0=5. Since the total of 5 is equal to (or greater

Pagina 341

• X-Spam-TXT-Records - A list of TXT records sent by the DNSBL servers that identified theemail as Spam.• X-Spam_Sender-IP - IP address used by the em

Pagina 342 - Enabling Transparent Mode

• Specify the DNSBL servers that are to be used. There can be one or multiple. Multiple serverscan act both as backups to each other as well as confir

Pagina 343

• Number of positive (is Spam) responses from each configured DNSBL server.• Number of queries sent to each configured DNSBL server.• Number of failed

Pagina 344 - Transparent Mode with DHCP

Tip: DNSBL serversA list of DNSBL servers can be found at:http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists.6.2.6. The POP3 ALGPOP3 is a mail

Pagina 345 - Non-switch if1 all-nets gw-ip

The PPTP ALG is provided to deal with a specific issue when PPTP tunnels are used with NAT.Let us suppose we have two clients A and B on a protected i

Pagina 346

pressing the up arrow key once will make the last command executed appear at the current CLIprompt. After a command appears it can be re-executed in i

Pagina 347 - Scenario 1

iv. Select the ALG to be the PPTP ALG object that was defined in the first step. In this case, itwas called pptp_alg.• Associate this service object w

Pagina 348

Important: Third Party Equipment CompliancecOS Core is based on the SIP implementation described in RFC 3261. However, correctSIP message processing a

Pagina 349 - Scenario 2

supported by cOS Core.Registrars A server that handles SIP REGISTER requests is given the special name ofRegistrar. The Registrar server has the task

Pagina 350

The SIP Proxy Record-Route OptionTo understand how to set up SIP scenarios with cOS Core, it is important to first understand theSIP proxy Record-Rout

Pagina 351

cOS Core supports a variety of SIP usage scenarios. The following three scenarios cover nearly allpossible types of usage:• Scenario 1Protecting local

Pagina 352

The proxy should be configured with the Record-Route feature enabled to insure all SIP traffic toand from the office clients will be sent through the

Pagina 353

Action Src Interface Src Network Dest Interface Dest NetworkAllow(or NAT)lan lan_net wan ip_proxyAllow wan ip_proxy lan(or core)lan_net(or wan_ip)With

Pagina 354 - 4.8.5. MPLS Pass Through

2. The SIP ALG properties will be displayed3. Specify a name for the ALG, for example sip_alg4. Click OKC. Define a custom Service object for SIP:1. G

Pagina 355

• Service: sip_serv• Source Interface: ext• Source Network: proxy_ip• Destination Interface: core• Destination Network: ip_wan• Comment: Allow incomin

Pagina 356 - Note: Optimal ATS handling

• Type set to TCP/UDP3. Define three rules in the IP rule set:• A NAT rule for outbound traffic from the local proxy and the clients on the internalne

Pagina 357 - Relay MPLS

makes examining and understanding the configuration easier.Getting the Default or Current Property ValueThe period "." character before a ta

Pagina 358

This scenario is similar to the previous but the major difference is the location of the local SIPproxy server. The server is placed on a separate int

Pagina 359 - Chapter 5: DHCP Services

well as a setup without NAT (Solution B below).Solution A - Using NATThe following should be noted about this setup:• The IP address of the SIP proxy

Pagina 360

This rule has core as the destination interface (in other words, cOS Core itself). When anincoming call is received, cOS Core uses the registration in

Pagina 361 - 5.2. cOS Core DHCP Servers

Action Src Interface Src Network Dest Interface Dest NetworkOutboundToProxy Allow lan lan_net dmz ip_proxyOutboundFromProxy Allow dmz ip_proxy lan lan

Pagina 362 - DHCP Server Advanced Settings

The different protocols used in implementing H.323 are:H.225 RAS signalling and CallControl (Setup) signallingUsed for call signalling. It is used to

Pagina 363

• Number of TCP Data ChannelsThe number of TCP data channels allowed can be specified.• Address TranslationFor NATed traffic the Network can be specif

Pagina 364 - Additional Server Settings

InControlFollow the same steps used for the Web Interface below.Web InterfaceOutgoing Rule:1. Go to: Policies > Add > IPRule2. Now enter:• Name:

Pagina 365 - 5.2.1. Static IPv4 DHCP Hosts

• Service: H323• Source Interface: any• Destination Interface: lan• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: lan_net• Comment: Allow

Pagina 366 - 5.2.2. Custom IPv4 Options

1. Go to: Policies > Add > IPRule2. Now enter:• Name: H323In• Action: SAT• Service: H323• Source Interface: any• Destination Interface: core• So

Pagina 367

the Internet, the following rules need to be added to the rule listings in both security gateways.Make sure there are no rules disallowing or allowing

Pagina 368 - 5.3. IPv4 DHCP Relay

Not all object types belong in a category. The object type UserAuthRule is a type without acategory and will appear in the category list after pressin

Pagina 369 - Max Transactions

• Service: H323• Source Interface: any• Destination Interface: lan• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: lan_net• Comment: Allow

Pagina 370

1. Go to: Policies > Add > IPRule2. Now enter:• Name: H323In• Action: SAT• Service: H323• Source Interface: any• Destination Interface: core• So

Pagina 371 - 5.4. IP Pools

H.323 phones are connected on the internal network and to the Gatekeeper on the DMZ. TheGatekeeper on the DMZ is configured with a private address. Th

Pagina 372 - Listing IP Pool Status

2. Now enter:• Name: H323In• Action: Allow• Service: H323-Gatekeeper• Source Interface: any• Destination Interface: core• Source Network: 0.0.0.0/0 (a

Pagina 373 - PrefetchLeases=10

should be make sure there are no rules disallowing or allowing the same kind of ports/trafficbefore these rules.InControlFollow the same steps used fo

Pagina 374 - 5.5. DHCPv6 Servers

possible for internal phones to call the external phones that are registered with thegatekeeper.Example 6.11. Using the H.323 ALG in a Corporate Envir

Pagina 375 - DHCPv6 Server Setup

• Name: LanToGK• Action: Allow• Service: H323-Gatekeeper• Source Interface: lan• Destination Interface: dmz• Source Network: lan_net• Destination Netw

Pagina 376

• Comment: Allow communication from the Gateway to H.323 phones on lan_net3. Click OK1. Go to: Policies > Add > IPRule2. Now enter:• Name: Branc

Pagina 377

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > Add > IPRule2. Now enter:• Name: ToGK• Action:

Pagina 378 - Static DHCPv6 Hosts

• Destination Network: hq-net• Comment: Allow the Gateway to communicate with the Gatekeeper connected to theHead Office3. Click OKNote: Outgoing call

Pagina 379

The naming of some objects is optional and is done with the Name= parameter in an addcommand. An object, such as a threshold rule, will always have an

Pagina 380 - 6.1. Access Rules

sent to a client at the beginning of a TLS session in order to establish the server's identity andthen be the basis for encryption. Certificates

Pagina 381 - 6.1.3. Access Rule Settings

The steps to take to enable TLS in cOS Core are as follows:1. Upload the host and root certificates to be used with TLS to cOS Core if not done alread

Pagina 382 - Note: Enabling logging

• Renegotation is not supported.• Sending server key exchange messages is not supported which means the key in thecertificate must be sufficiently wea

Pagina 383

6.3. Web Content Filtering6.3.1. OverviewWeb traffic is one of the biggest sources for security issues and misuse of the Internet.Inappropriate surfin

Pagina 384 - 6.2. ALGs

web content. Many web sites use Javascript and other types of client-side code and inmost cases, the code is non-malicious. Common examples of this is

Pagina 385 - 6.2.2. The HTTP ALG

Gateway's whitelist, access to that URL is always allowed, taking precedence over DynamicContent Filtering.WildcardingBoth the URL blacklist and

Pagina 386

Finally, make an exception from the blacklist by creating a specific whitelist:Device:/content_filtering> add ALG_HTTP_URLURL=www.Clavister.com/*.e

Pagina 387

Using URL Filter ObjectsAn alternative method for URL filtering is to define a separate URL Filter object. These are used inthe following series of st

Pagina 388 - 6.2.3. The FTP ALG

Dynamic WCF DatabasescOS Core Dynamic WCF allows web page blocking to be automated so it is not necessary tomanually specify beforehand which URLs to

Pagina 389 - The cOS Core ALG Solution

Figure 6.8. Dynamic Web Content Filtering FlowIf the requested web page URL is not present in the databases, then the webpage content at theURL will a

Pagina 390 - Hybrid Mode

• A terminal or a computer with a serial port and the ability to emulate a terminal (such asusing the Hyper Terminal software included in some Microso

Pagina 391 - Control Channel Restrictions

6.3.4.2. Setting Up Dynamic Web Content FilteringActivationDynamic Content Filtering is a feature that is enabled by purchasing a subscription to the

Pagina 392 - Anti-Virus Scanning

Then, create a service object using the new HTTP ALG:Device:/> add ServiceTCPUDP http_content_filtering Type=TCPDestinationPorts=80ALG=content_filt

Pagina 393

1. On a workstation on the lan_net network, launch a standard web browser.2. Try to browse to a search site. For example, www.google.com.3. If everyth

Pagina 394

Command-Line InterfaceFirst, create an HTTP Application Layer Gateway (ALG) Object:Device:/> add ALG ALG_HTTP content_filteringWebContentFilteringM

Pagina 395

Reclassification of Blocked SitesAs the process of classifying unknown web sites is automated, there is always a small risk thatsome sites are given a

Pagina 396

previous examples.Dynamic content filtering is now activated for all web traffic from lan_net to all-nets and the useris able to propose reclassificat

Pagina 397

on recent events pertaining to topics surrounding a locality (for example, town, city or nation) orculture, including weather forecasting information.

Pagina 398 - 6.2.4. The TFTP ALG

A web site may be classified under the Game Sites category if its content focuses on or includesthe review of games, traditional or computer based, or

Pagina 399 - 6.2.5. The SMTP ALG

A web site may be classified under the Malicious category if its content is capable of causingdamage to a computer or computer environment, including

Pagina 400

A web site may be classified under the Drugs/Alcohol category if its content includes drug andalcohol related information or services. Some URLs categ

Pagina 401 - Enhanced SMTP and Extensions

SSH (Secure Shell) CLI AccessThe SSH (Secure Shell) protocol can be used to access the CLI over the network from a remotehost. SSH is a protocol prima

Pagina 402 - 6.2.5.1. Anti-Spam Filtering

HTML Page ParametersThe HTML pages contain a number of parameters that can be used as needed. The parametersavailable are:• %URL% - The URL which was

Pagina 403 - Creating a DNSBL Consensus

9. Click OK to exit editing10. Go to: Policies > User Authentication User Authentication Rules11. Select the relevant HTML ALG and click the Agent

Pagina 404 - Adding X-Spam Information

6.4. Anti-Virus Scanning6.4.1. OverviewThe cOS Core anti-virus module protects against malicious code carried in data passing throughthe Clavister Sec

Pagina 405 - Setup Summary

and can determine, with a high degree of certainty, if a virus is in the process of beingdownloaded to a user behind the Clavister Security Gateway. O

Pagina 406 - Real-time Monitoring

Protocol Specific behaviorSince anti-virus scanning is implemented through an Application Level Gateway (ALG), specificprotocol specific features are

Pagina 407 - The dnsbl CLI Command

When used with IP rules, an ALG must then be associated with an appropriate service objectfor the protocol to be scanned. The service object is then a

Pagina 408 - 6.2.7. The PPTP ALG

3. Select the TCP in the Type dropdown list4. Enter 80 in the Destination Port textbox5. Select the HTTP ALG just created in the ALG dropdown list6. C

Pagina 409 - PPTP ALG Setup

specified in Appendix C, Verified MIME filetypes) then the filetype in the file's name is used whenthe excluded list is checked.3. Compression Ra

Pagina 410 - 6.2.8. The SIP ALG

2. The active unit performs an automatic reconfiguration to update its database.3. This reconfiguration causes a failover so the passive unit becomes

Pagina 411 - SIP Components

6.5. Intrusion Detection and Prevention6.5.1. OverviewIntrusion DefinitionComputer servers can sometimes have vulnerabilities which leave them exposed

Pagina 412 - SIP ALG Options

Changing the admin User PasswordIt is recommended to change the default password of the admin account from admin tosomething else as soon as possible

Pagina 413 - SIP Usage Scenarios

latest intrusion threats. For full details about obtaining the IDP service please refer to Appendix A,Update Subscriptions.Figure 6.11. IDP Database U

Pagina 414

> Update Center.Updating in High Availability ClustersUpdating the IDP databases for both the units in an HA Cluster is performed automatically byc

Pagina 415

ordered by group. However, its purpose is for reference only and it is not possible to add rulesignatures through this tree. A screen shot of the list

Pagina 416

• Invalid hex encodingA valid hex sequence is where a percentage sign is followed by two hexadecimal values torepresent a single byte of data. An inva

Pagina 417

Evasion AttacksAn evasion attack has a similar end-result to the insertion Attack in that it also generates twodifferent data streams, one that the ID

Pagina 418

Attackers who build new intrusions often reuse older code. This means their new attacks canappear in circulation quickly. To counter this, Clavister I

Pagina 419 - Scenario 3

The group type is one of the values IDS, IPS or Policy. These types are explained above.2. Signature Group CategoryThis second level of naming describ

Pagina 420

6.5.7. Setting Up IDPThe steps for setting up IDP are as follows:• Create an IDP Rule object which identifies the traffic to be processed.• Add one or

Pagina 421

Device:/> add IDPRule Service=smtpSourceInterface=wanSourceNetwork=wan_netDestinationInterface=dmzDestinationNetwork=ip_mailserverName=IDPMailSrvRu

Pagina 422

from the external network that are based on the SMTP protocol.1. Select the Rule Action for the IDP rule2. Now enter:• Action: Protect• Signatures: IP

Pagina 423 - 6.2.9. The H.323 ALG

Device:/> commitshould be issued to make those changes permanent.Note: Examples in this guide assume activation will be performedMost of the exampl

Pagina 424 - H.323 ALG Configuration

The following are the recommendations for IDP employment:• Enable only the IDP signatures for the traffic that is being allowed. For example, if the I

Pagina 425

6.6. Denial-of-Service Attacks6.6.1. OverviewThe same advantages that the Internet brings to business also benefit hackers who use the samepublic infr

Pagina 426

The triggering factor is that the last fragment makes the total packet size exceed 65535 bytes,which is the highest number that a 16-bit integer can s

Pagina 427

• By stripping the URG bit by default from all TCP segments traversing the system. This isconfigurable in the Web Interface by going to:System > Ad

Pagina 428

• Smurf and Papasmurf type floods will be seen as ICMP Echo Responses at the victim side.Unless FwdFast rules are in use, such packets are never allow

Pagina 429

If the attacker chooses a fragment offset higher than the limits imposed by the values specifiedin System > Advanced Settings > Length Limit Set

Pagina 430

6.7. Blacklisting Hosts and NetworksOverviewcOS Core implements a Blacklist of host or network IP addresses which can be utilized to protectagainst tr

Pagina 431

It is also important to understand that although whitelisting prevents a particular source frombeing blacklisted, it still does not prevent cOS Core m

Pagina 432

Chapter 6: Security Mechanisms488

Pagina 433

Chapter 7: Address TranslationThis chapter describes cOS Core address translation capabilities.• Overview, page 489• NAT, page 491• NAT Pools, page 49

Pagina 434

mean the tunnels are lost and have to be re-established because the tunnel SAs are no longervalid.Checking Configuration IntegrityAfter changing a cOS

Pagina 435

This section describes and provides examples of configuring NAT and SAT rules.Chapter 7: Address Translation490

Pagina 436

7.2. NATDynamic Network Address Translation (NAT) provides a mechanism for translating original sourceIP addresses to a different address. Outgoing pa

Pagina 437

destination port is used.However, since there is a possible range of 64,500 source ports and the same number fordestination ports, it is theoretically

Pagina 438

195.11.22.33:32789 => 195.55.66.77:803. The recipient server then processes the packet and sends its response.195.55.66.77:80 => 195.11.22.33:32

Pagina 439 - 6.2.10. The TLS ALG

The NATAction option could be left out since the default value is to use the interface address. Thealternative is to specify UseSenderAddress and use

Pagina 440 - Enabling TLS

Service=http-allAction=AllowSourceAction=NATThe NATAction option could be left out since the default value is to use the interface address. Thealterna

Pagina 441 - URLs Delivered by Servers

• Several internal machines can not communicate with the same external server using thesame IP protocol.Note: Restrictions only apply to IP level prot

Pagina 442

protocol but the PPTP tunnel from the client terminates at the security gateway. When this trafficis relayed between the security gateway and the Inte

Pagina 443 - 6.3. Web Content Filtering

7.3. NAT PoolsOverviewNetwork Address Translation (NAT) provides a way to have multiple internal clients and hosts withunique private, internal IP add

Pagina 444 - RemoveApplets=Yes

is reached then an existing state with the longest idle time is replaced. If all states in the table isactive then the new connection is dropped. As a

Pagina 445 - Wildcarding

4. Routing ... 2524.1. Overview ...

Pagina 446 - Action=Whitelist

The CLI provides a command called sessionmanager for managing management sessionsthemselves. The command can be used to manage all types of management

Pagina 447 - 6.3.4.1. Overview

Example 7.3. Using NAT PoolsThis example creates a stateful NAT pool with the external IP address range 10.6.13.10 to10.16.13.15. This is then used wi

Pagina 448 - Dynamic WCF Processing Flow

• Name: my_stateful_natpool• Pool type: stateful• IP Range: nat_pool_range3. Select the Proxy ARP tab and add the WAN interface4. Click OKC. Finally,

Pagina 449 - Dynamic WCF and Whitelisting

7.4. SAT7.4.1. IntroductioncOS Core Static Address Translation (SAT) functionality can translate ranges of IP addresses and/orport numbers to other, p

Pagina 450 - Tip: Using a schedule

Translating Both Source and Destination AddressIt also possible to have two SAT rules triggering for the same connection. Although unusual, it ispossi

Pagina 451 - ALG=content_filtering

Specifying the Type of Port MappingIf the Port property is specified for the SAT rule, cOS Core performs port translation in a way thatis slightly dif

Pagina 452 - Audit Mode

Command-Line InterfaceCreate a SAT IP rule:Device:/> add IPRule Action=SATService=httpSourceInterface=wanSourceNetwork=all-netsDestinationInterface

Pagina 453 - Allowing Override

2. Specify a suitable name for the rule, for example Allow_HTTP_To_DMZ3. Now enter:• Action: Allow• Service: http• Source Interface: wan• Source Netwo

Pagina 454 - AllowReclassification=Yes

interface of the SAT rule must be set to any. The correct second rule for the external or internaltraffic is then selected based on the source interfa

Pagina 455 - Category 2: News

Reversing the order of the NAT and Allow rules as shown below solves the problem.# Action Src Iface Src Net Dest Iface Dest Net Service SAT Action1 SA

Pagina 456

Original Destination Address Translated Destination Address194.1.2.19 192.168.0.53194.1.2.20 192.168.0.54194.1.2.21 192.168.0.55194.1.2.22 192.168.0.5

Pagina 457

The CLI script command is the tool used for script management and execution. The completesyntax of the command is described in the CLI Reference Guide

Pagina 458

Create a SAT rule for the translation:Device:/> add IPRule Action=SATService=httpSourceInterface=anySourceNetwork=all-netsDestinationInterface=wanD

Pagina 459 - Available Banner Files

3. Click OK and repeat for all 5 public IPv4 addressesCreate a SAT rule for the translation:1. Go to: Policies > Add > IPRule2. Specify a suitab

Pagina 460 - Customizing Banner Files

The SAT IP rule to perform the translation would be:# Action Src Iface Src Net Dest Iface Dest Net Service SAT Action1 SAT any all-nets wan 194.1.2.16

Pagina 461 - Tip: Saving changes

Device:/> add Address IPAddress wwwsrv_priv Address=10.10.10.5Publish the five public IPv4 addresses on the wan interface using ARP publish. A CLI

Pagina 462 - 6.4. Anti-Virus Scanning

Finally, create an associated Allow rule:1. Go to: Policies > Add > IPRule2. Specify a suitable name for the rule, for example Allow_HTTP_To_DMZ

Pagina 463 - Simultaneous Scans

• Attempts to communicate with the web server's public address - port 84, will result in aconnection to the web server's private address - p

Pagina 464 - Database Updates

• External traffic to wan_ip will match rules 1 and 4, and will be sent to wwwsrv. This is correct.• Return traffic from wwwsrv will match rules 2 and

Pagina 465

ii. Single Port - This is used for a one-to-one translation to the new port number specified.iii. Transposed - This transposes a range of port numbers

Pagina 466 - 6.4.4. Anti-Virus Options

7.4.8. Protocols Handled by SATGenerally, SAT can handle all protocols that allow address translation to take place. However,there are protocols that

Pagina 467 - Verifying the MIME Type

Chapter 7: Address Translation519

Pagina 468

Device:/> script -execute -name=my_script.sgs 126.12.11.01 "If1 address"When the script file runs, the variable replacement would mean th

Pagina 469 - 6.5.1. Overview

Chapter 8: User AuthenticationThis chapter describes how cOS Core implements user authentication.• Overview, page 520• Authentication Setup, page 522•

Pagina 470 - Automatic Updating

Method A may require a special piece of equipment such as a biometric reader. Another problemwith A is that the special attribute often cannot be repl

Pagina 471 - 6.5.3. IDP Rules

8.2. Authentication Setup8.2.1. Setup SummaryThe following list summarizes the steps for User Authentication setup with cOS Core:• Have an authenticat

Pagina 472 - HTTP Normalization

policy that allows the connections.When specifying the Source Network for an IP rule or policy, a user defined IP object can be usedwhere the Authenti

Pagina 473 - Insertion Attacks

If the Network behind user option is specified then this is the metric that will be used withthe route that is automatically added by cOS Core. If the

Pagina 474 - 6.5.5. IDP Pattern Matching

Web InterfaceFirst, create a new user database:1. Go to: System > Device > Local User Databases > Add > LocalUserDatabase2. Now enter:• Na

Pagina 475 - 6.5.6. IDP Signature Groups

RADIUS SecurityTo provide security, a common shared secret is configured on both the RADIUS client and theserver. This secret enables encryption of th

Pagina 476 - IDP Signature Wildcarding

for security.A retry timeout value of 2 means that cOS Core will resend the authentication request to thesever if there is no response after 2 seconds

Pagina 477 - 6.5.7. Setting Up IDP

LDAP IssuesUnfortunately, setting up LDAP authentication may not be as simple as, for example, RADIUSsetup. Careful consideration of the parameters us

Pagina 478

• NameThe name given to the server object for reference purposes in cOS Core. For example, cOSCore authentication rules may be defined which reference

Pagina 479 - IDP Traffic Shaping

Removing ScriptsTo remove a saved script, the script -remove command can be used. For example, to remove themy_script.sgs script file, the command wou

Pagina 480 - IDP Database Updating

In Microsoft Active Directory, the groups a user belongs to can be found by looking at a usersdetails under the MemberOf tab.• Use Domain NameSome ser

Pagina 481 - 6.6.3. Ping of Death Attacks

• Base ObjectDefines where in the LDAP server tree search for user accounts shall begin.The users defined on an LDAP server database are organized int

Pagina 482 - 6.6.6. The WinNuke attack

contains the user password in plain text. The LDAP server administrator must make sure thatthis field actually does contain the password. This is expl

Pagina 483 - 6.6.7. Amplification Attacks

• Total number of invalid usernames.• Total number of invalid password.LDAP Authentication CLI CommandsThe CLI objects that correspond to LDAP servers

Pagina 484 - 6.6.9. The Jolt2 Attack

B. PPP Authentication with CHAP, MS-CHAPv1 or MS-CHAPv2 EncryptionIf PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 is used for authentication, a digest of the

Pagina 485

between the Clavister Security Gateway and the server must be protected. A VPN linkshould be used if the link between the two is not local.Access to t

Pagina 486 - Whitelisting

rule since one single rule with XAuth as the agent will be used for all IPsec tunnels.However, this approach assumes that a single authentication sour

Pagina 487 - The CLI blacklist Command

The maximum time that a connection can exist (no value is specified by default).If an authentication server is being used then the option to Use timeo

Pagina 488

7. If a timeout restriction is specified in the authentication rule then the authenticated user willbe automatically logged out after that length of t

Pagina 489 - 7.1. Overview

HTTP authentication cannot operate unless a rule is added to the IP rule set to explicitly allowauthentication to take place. This is also true with H

Pagina 490

The following should be noted for automatically created scripts:• Automatically created scripts omit the object category.In the created script example

Pagina 491 - 7.2. NAT

after authentication, as it is defined in the IP rule.It is assumed that the authentication IPv4 address object lan_users_net has been defined and thi

Pagina 492 - Applying NAT Translation

2. Now enter:• Name: allow_http_auth• Action: NAT• Service: http-all• Source Interface: lan• Source Network: lan_users_net• Destination Interface any•

Pagina 493

8.3. ARP AuthenticationARP authentication (sometimes referred to as MAC authentication) is authentication based on theMAC address of a connecting clie

Pagina 494

Specifying the MAC Address on a ServerThe MAC address is entered as a text string in the database of the authenticating server. This textstring must f

Pagina 495 - Protocols Handled by NAT

8.4. Customizing Authentication HTML PagesUser Authentication makes use of a set of HTML files to present information to the user duringthe authentica

Pagina 496

HTML Page ParametersThe HTML pages for WebAuth can contain a number of parameters which are used as needed.These are:• %CHALLENGE_MESSAGE% - The quest

Pagina 497

Follow the same steps used for the Web Interface below.Web Interface1. Go to: System > Advanced Settings > HTTP Banner files > Add > ALG B

Pagina 498 - 7.3. NAT Pools

The usage of SCP clients is explained further in Section 2.1.6, “Secure Copy”.4. Using the CLI, the relevant user authentication rule should now be se

Pagina 499 - Using NAT Pools

8.5. Policies Requiring AuthenticationOnce a user is authenticated to cOS Core, it is then possible to create security policies in the formof IP rules

Pagina 500

InControlFollow the same steps used for the Web Interface below.Web InterfaceCreate the IP4Address object that specifies the IP range of connecting cl

Pagina 501

Commenting Script FilesAny line in a script file that begins with the # character is treated as a comment. For example:# The following line defines th

Pagina 502 - 7.4. SAT

8.6. User Identity AwarenessSometimes it is more convenient for client users if they can automatically validate themselves tocOS Core instead of being

Pagina 503 - SAT IP Rule Properties

iii. The user's IP.The Identity Awareness Agent must be installed on all domain controllers that make up theactive directory.• The user's IP

Pagina 504 - The Role of a DMZ

usernames that will be allowed are user1@mydomain and [email protected] is also assumed that the Clavister Authentication Agent software has already b

Pagina 505

2. Select the User Authentication tab3. In the username box enter: user1@mydomain,user2@mydomain4. Click OKCreate an IP Policy which allows access to

Pagina 506

Figure 8.4. The Identity Awareness Agent InterfaceThe Encryption Key and Listening IP should be set to the same values configured in the cOS CoreAuthe

Pagina 507

• At least Windows Server 2008™ R2.• The role Remote Desktop Session Host must be installed.• The option IP virtualization per session must be enabled

Pagina 508

8.7. Two Factor AuthenticationWhen access to resources is based on username and password credentials, the security can befurther strengthened by using

Pagina 509

“Customizing Authentication HTML Pages”.• The administrator must configure the RADIUS server appropriately and that is not covered inthis document.• I

Pagina 510

8.8. Radius RelayOverviewThe cOS Core feature RADIUS Relay is designed for telecom scenarios, such as Mobile DataOffloading (MDO), where User Equipmen

Pagina 511

If this is not done on all DHCP servers, irrespective of whether they are used with RADIUSrelay or not, it could possibly create a security vulnerabil

Pagina 512 - 194.1.2.30

File type Upload possible Download possibleSystem Backup (full.bak) Yes (also with WebUI) Yes (also with WebUI)Firmware upgrades Yes NoLicenses (licen

Pagina 513

This optional IP address will be used as the sending IP of the request sent to the RADIUSserver. If not set, the IP address of the sending interface w

Pagina 514 - 7.4.5. Port Translation

Device:/> add IPRule Action=AllowService=all_servicesSourceInterface=If1SourceNetwork=client_netDestinationInterface=If2DestinationNetwork=all-nets

Pagina 515 - 7.4.6. SAT with FwdFast Rules

• Netmask: 255.255.255.03. Select the Options tab and enable the option:Distribute leases only to RADIUS relay authenticated clients4. Click OKCreate

Pagina 516

specific attribute. The Clavister Vendor ID is 5089 and the Clavister-User-Group isdefined as vendor-type 1 with a string value type.Chapter 8: User A

Pagina 517

Chapter 8: User Authentication564

Pagina 518

Chapter 9: VPNThis chapter describes the Virtual Private Network (VPN) functionality in cOS Core.• Overview, page 565• VPN Quick Start, page 569• IPse

Pagina 519

2. Client to LAN connection - Where many remote clients need to connect to an internalnetwork over the Internet. In this case, the internal network is

Pagina 520 - 8.1. Overview

normally not handled at the network level but rather is usually done at a higher, transactionlevel.9.1.3. VPN PlanningAn attacker targeting a VPN conn

Pagina 521

access per user (group) in the future.• Should the keys be changed? If they are changed, how often? In cases where keys are sharedby multiple users, c

Pagina 522 - 8.2. Authentication Setup

9.2. VPN Quick StartOverviewLater sections in this chapter will explore VPN components in detail. To help put those latersections in context, this sec

Pagina 523 - PPTP/L2TP Configuration

To download a configuration backup to the current local directory, the command would be:> scp [email protected]:config.bak ./To upload a file to an

Pagina 524 - Specifying an SSH Public Key

9.2.1. IPsec LAN to LAN with Pre-shared KeysThe objective is to create a secure means of joining two networks: a Local Network which is onthe protecte

Pagina 525 - RADIUS Usage with cOS Core

• An Allow rule for outbound traffic that has the previously defined ipsec_tunnel object asthe Destination Interface. The rule's Destination Netw

Pagina 526 - Support for Groups

Note: The system time and date should be correctThe cOS Core date and time should be set correctly since certificates have an expiry dateand time.Also

Pagina 527 - 8.2.4. External LDAP Servers

A. IP addresses already allocatedthe IPv4 addresses may be known beforehand and have been pre-allocated to the roamingclients before they connect. The

Pagina 528 - General Settings

NoteThe option to dynamically add routes should not be enabled in LAN to LANtunnel scenarios.• Enable the option Require IKE XAuth user authentication

Pagina 529

• Specify if the client will use config mode.There are a variety of IPsec client software products available from a number of suppliers and thismanual

Pagina 530 - Database Settings

internal network and handed out to a client.• Use a new address range that is totally different to any internal network. This preventsany chance of an

Pagina 531 - Optional Settings

• Add individual users to TrustedUsers. This should consist of at least a username andpassword combination.The Group string for a user can also be spe

Pagina 532 - Usernames may need the Domain

The step to set up user authentication is optional since this is additional security to certificates.Also review Section 9.7, “CA Server Access”, whic

Pagina 533 - LDAP Authentication and PPP

As described for L2TP, the NAT rule lets the clients access the public Internet via the ClavisterSecurity Gateway.5. Set up the client. For Windows XP

Pagina 534

confirmation.The console password can be any sequence of characters but must be no greater than 64characters in length. It is recommended to use only

Pagina 535 - 8.2.5. Authentication Rules

with a PSK tunnel for L2TP/IPsec.7. Create a User Authentication Rule with the following properties:i. Authentication Agent: XAuthii. Authentication S

Pagina 536 - Connection Timeouts

9.3. IPsec ComponentsThis section looks at the IPsec standards and describes in general terms the various components,techniques and algorithms that ar

Pagina 537 - Multiple Logins

IPsec protocol used (ESP/AH/both) as well as the session keys used to encrypt/decrypt and/orauthenticate/verify the transmitted data.An SA is unidirec

Pagina 538 - 8.2.7. HTTP Authentication

will reply by saying that nothing on the list was acceptable, and possibly also provide a textualexplanation for diagnostic purposes.This negotiation

Pagina 539 - Forcing Users to a Login Page

unique piece of data uniquely identifying the endpoint.Authentication using Pre-Shared Keys is based on theDiffie-Hellman algorithm.Local and RemoteNe

Pagina 540

parameters, such as Diffie-Hellman groups and PFS, cannotbe negotiated and this mean it is important to have"compatible" configurations at b

Pagina 541

It is specified in time (seconds) as well as data amount(kilobytes). Whenever one of these expires, a new phase-1exchange will be performed. If no dat

Pagina 542 - 8.3. ARP Authentication

authentication.The algorithms supported by Clavister Security GatewayVPNs are:• SHA1• MD5IPsec Lifetime This is the lifetime of the VPN connection. It

Pagina 543 - 00-0c-19-f9-14-6f

Manual Keying AdvantagesSince it is very straightforward it will be quite interoperable. Most interoperability problemsencountered today are in IKE. M

Pagina 544 - HTTP Banner Files

case when using pre-shared keys and roaming clients. Instead, should a client be compromised,the client's certificate can simply be revoked. No n

Pagina 545

• Reset to Factory DefaultsThis option will restore the hardware to its initial factory state. The operations performed ifthis option is selected are

Pagina 546 - Uploading with SCP

Figure 9.2. The ESP protocol9.3.5. NAT TraversalBoth IKE and IPsec protocols present a problem in the functioning of NAT. Both protocols werenot desig

Pagina 547

UDP EncapsulationAnother problem that NAT traversal resolves is that the ESP protocol is an IP protocol. There is noport information as we have in TCP

Pagina 548

CAST128, MD5, SHA1.Example 9.1. Using an Algorithm Proposal ListThis example shows how to create and use an IPsec Algorithm Proposal List for use in t

Pagina 549

9.3.7. Pre-shared KeysPre-Shared Keys are used to authenticate VPN tunnels. The keys are secrets that are shared bythe communicating parties before co

Pagina 550 - 8.6. User Identity Awareness

2. Enter a name for the pre-shared key, for example MyPSK3. Choose Hexadecimal Key and click Generate Random Key to generate a key to thePassphrase te

Pagina 551 - Setting Up Identity Awareness

Command-Line InterfaceFirst create an Identification List:Device:/> add IDList MyIDListThen, create an ID:Device:/> cc IDList MyIDListDevice:/My

Pagina 552

• Country: Sweden• Email Address: [email protected]. Click OKFinally, apply the Identification List to the IPsec tunnel:1. Go to: Network > I

Pagina 553

9.4. IPsec TunnelsMany of the properties of the IPsec tunnel objects required for tunnel establishment havealready been discussed in Section 9.3.2, “I

Pagina 554

negotiations then take place, resulting in the tunnel becoming established to the remoteendpoint.Local Initiation of Tunnel EstablishmentAlternatively

Pagina 555 - Device:/> authagentsnoop

The advanced settings for DPD are described further in Section 9.4.6, “IPsec Advanced Settings”.DPD is enabled by default for cOS Core IPsec tunnels.

Pagina 556 - Processing Sequence

6.2.9. The H.323 ALG ... 4236.2.10. The TLS ALG ...

Pagina 557

Note: Output buffer limitationsThe only limitation with issuing CLI commands through the serial console is that there isa finite buffer allocated for

Pagina 558 - 8.8. Radius Relay

• Set up the Rules (a 2-way tunnel requires 2 rules).9.4.3. Roaming ClientsAn employee who is on the move who needs to access a central corporate serv

Pagina 559

1. Go to: Network > Interfaces and VPN > IPsec > Add > IPsec Tunnel2. Now enter:• Name: RoamingIPsecTunnel• Local Network: 10.0.1.0/24 (Th

Pagina 560

B. Upload all the client self-signed certificates:1. Go to: Objects > Key Ring > Add > Certificate2. Enter a suitable name for the Certificat

Pagina 561

• Identification List: Select the ID List that is to be associated with the VPN Tunnel. In thiscase, it will be sales5. Under the Routing tab:• Enable

Pagina 562

5. Enter the name for the client6. Select Email as Type7. In the Email address field, enter the email address selected when the certificate wascreated

Pagina 563

with IP addresses and corresponding netmasks, and to exchange other types of informationassociated with DHCP. The IP address provided to a client can

Pagina 564

Example 9.8. Using Config Mode with IPsec TunnelsAssuming a predefined tunnel called vpn_tunnel1 this example shows how to enable ConfigMode for that

Pagina 565 - Chapter 9: VPN

A Root Certificate usually includes the IP address or hostname of the Certificate Authority tocontact when certificates or CRLs need to be downloaded

Pagina 566 - 9.1.2. VPN Encryption

The ikesnoop command can be entered via a CLI console or directly via the RS232 Console.To begin monitoring the full command is:Device:/> ikesnoop

Pagina 567 - 9.1.4. Key Distribution

Life type : SecondsLife duration : 43200Life type : KilobytesLife duration : 50000Transform 2/4Transform ID : IKEEncryption algorithm : Rijndael-cbc (

Pagina 568

If the administrator expects that configuration changes will break the communicationbetween cOS Core and the web browser (for example, by changing the

Pagina 569 - 9.2. VPN Quick Start

Authentication method: Pre-shared key or certificateGroup description: Diffie Hellman (DH) groupLife type: Seconds or kilobytesLife duration: No of se

Pagina 570

Step 3. Clients Begins Key ExchangeThe server has accepted a proposal at this point and the client now begins a key exchange. Inaddition, NAT detectio

Pagina 571 - Interface Network Gateway

Payload data length : 16 bytesN (Notification)Payload data length : 8 bytesProtocol ID : ISAKMPNotification : Initial contactExplanation of Above Valu

Pagina 572

SA life duration : 50000Encapsulation mode : TunnelTransform 2/4Transform ID : Rijndael (aes)Key length : 128Authentication algorithm : HMAC-SHA-1SA l

Pagina 573

Packet length : 156 bytes# payloads : 5Payloads:HASH (Hash)Payload data length : 16 bytesSA (Security Association)Payload data length : 56 bytesDOI :

Pagina 574 - Configuring IPsec Clients

Default: 4 times the license limit of IPsec Max TunnelsIPsec Max TunnelsSpecifies the total number of IPsec tunnels allowed. This value is initially t

Pagina 575

turn be signed by another CA, which may be signed by another CA, and so on. Each certificatewill be verified until one that has been marked as "t

Pagina 576

Default: InlineDisable Public-Key Hardware AccelerationThis option would only be enabled for troubleshooting and diagnostic purposes. In normaloperati

Pagina 577

Default: 15 secondsChapter 9: VPN618

Pagina 578 - 9.2.7. PPTP Roaming Clients

9.5. PPTP/L2TPThe access by a client using a modem link over dial-up public switched networks, possibly withan unpredictable IP address, to protected

Pagina 579 - 9.2.8. iOS Setup

An Alternative Method of Changing Management InterfaceAn alternative method of changing the management interface and to avoid the 30 second delayentir

Pagina 580

Troubleshooting PPTPA common problem with setting up PPTP is that a router and/or switch in a network is blockingTCP port 1723 and/or IP protocol 47 b

Pagina 581 - 9.3. IPsec Components

9.5.2. L2TP ServersLayer 2 Tunneling Protocol (L2TP) is an IETF open standard that overcomes many of the problemsof PPTP. Its design is a combination

Pagina 582 - IKE Algorithm Proposals

4. Under the PPP Parameters tab, select L2TP_Pool in the IP Pool control.5. Under the Add Route tab, select all-nets in the Allowed Networks control.6

Pagina 583 - IPsec Tunnel Properties

Now we will setup the IPsec Tunnel, which will later be used in the L2TP section. As we are goingto use L2TP, the Local Network is the same IP as the

Pagina 584

l2tp_ipsec. ProxyARP also needs to be configured for the IPs used by the L2TP Clients.C. Setup the L2TP Tunnel:Command-Line InterfaceDevice:/> add

Pagina 585

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > User Authentication User Authentication Rules > Add >

Pagina 586

• Action: Allow• Service: all_services• Source Interface: l2tp_tunnel• Source Network: l2tp_pool• Destination Interface: any• Destination Network: all

Pagina 587 - 9.3.3. IKE Authentication

Pass L2TP traffic sent to the Clavister Security Gateway directly to the L2TP Server withoutconsulting the rule set.Default: EnabledPPTP Before RulesP

Pagina 588

• Activity Sense - Specifies if dial-on-demand should trigger on Send or Recv or both.• Idle Timeout - The time of inactivity in seconds to wait befor

Pagina 589 - AH (Authentication Header)

L2TP Version 3 (L2TPv3) is a tunneling protocol that is an alternative to standard L2TP (standardL2TP is also referred to as L2TPv2). L2TPv2 can only

Pagina 590 - 9.3.5. NAT Traversal

4. Set the following:• IP address: 192.168.1.25. Click OKNote: In virtualized configurations, interfaces addresses are stored in the top level of the

Pagina 591 - NAT Traversal Configuration

Change the properties of the Ethernet interface connected to the protected network so thatTransparent Mode is enabled.C. Set any required L2TPv3 Serve

Pagina 592

IP=If3_ipLocalNetwork=If3_netInterface=If2ServerIP=If2_ipB. Next, enable transparent mode on the protected interface If3:Device:/> set Interface Et

Pagina 593 - 9.3.7. Pre-shared Keys

Assume the same scenario as the previous example, but this time the L2TPv3 tunnel is itselfbeing tunneled through an IPsec Tunnel object called my_ips

Pagina 594 - 9.3.8. Identification Lists

The cOS Core L2TPv3 server can handle VLAN tagged Ethernet frames so that a protectedinternal network can be accessed by external clients over VLAN co

Pagina 595

Device:/> add Interface VLAN my_vlan_localEthernet=If3VLANID=555IP=If3_arbitrary_ip1Network=If3_netAutoSwitchRoute=YesC. Last, create a VLAN object

Pagina 596

5. Click OKC. Last, create a VLAN object on the L2TPv3 tunnel interface my_l2tpv3_if:1. Go to: Network > Interfaces and VPN > VLAN > Add >

Pagina 597 - 9.4. IPsec Tunnels

9.6. SSL VPN9.6.1. OverviewcOS Core provides an additional type of VPN connection called SSL VPN. This makes use of theSecure Sockets Layer (SSL) prot

Pagina 598 - Dead Peer Detection

iv. Client users need to be defined in the Authentication Source of the authentication rule.This source can be a local user database, a RADIUS server

Pagina 599 - IPsec Tunnel Quick Start

network and these define the relationship between the security gateway and the connectingclients.A private IP network should be used for this purpose.

Pagina 600 - 9.4.3. Roaming Clients

Note: Pool addresses must not exceed a /24 network sizeSSL VPN will not function correctly if an IP address is handed out that exceeds thesize of a Cl

Pagina 601

Example 2.7. Changing the HA Management IP AddressThis example will change the slave management IP address for the lan interface to 192.168.1.2 foran

Pagina 602

If this option has not been chosen before, it must be selected first to install theproprietary Clavister SSL VPN client application.ii. Connect the SS

Pagina 603

Figure 9.6. The SSL VPN Client LoginThe difference between the two approaches above is that when the SSL VPN client software isstarted by browsing to

Pagina 604 - Using Config Mode

Figure 9.7. The SSL VPN Client StatisticsSSL VPN Client OperationWhenever the SSL VPN client application runs, the following happens:• A route is adde

Pagina 605

Should the SSL VPN client application terminate prematurely for some reason, the Windowsrouting table may not be left in a consistent state and the au

Pagina 606 - Local Gateway

1. Go to: Network > Interfaces and VPN > SSL > Add > SSL VPN Interface2. Now enter:• Specify a suitable name, in this example my_sslvpn_if

Pagina 607 - Using ikesnoop

For external client connection, a web browser should be directed to the IP address my_sslvpn_if.This is done either by typing the actual IP address or

Pagina 608 - The Client and the Server

9.7. CA Server AccessOverviewCertificate validation can be done by accessing a separate Certifícation Server (CA) server. Forexample, the two sides of

Pagina 609 - Explanation of Values

Gateway through the public DNS system.The same steps should be followed if the other side of the tunnel is another securitygateway instead of being ma

Pagina 610

the way they work but the majority will attempt to validate the certificate.Placement of Private CA ServersThe easiest solution for placement of a pri

Pagina 611

9.8. VPN TroubleshootingThis section deals with how to troubleshoot the common problems that are found with VPN.9.8.1. General TroubleshootingIn all t

Pagina 612 - Step 6. Server ID Response

• User Database: AdminUsers• Interface: If2• Network: all-nets5. Click OK2.1.9. Management Advanced SettingsUnder the Remote Management section of the

Pagina 613

9.8.2. Troubleshooting CertificatesIf certificates have been used in a VPN solution then the following should be looked at as asource of potential pro

Pagina 614 - IPsec Max Rules

For example, with a large number of tunnels avoid using:Device:/> ipsecstat -num=allAnother example of what to avoid with many tunnels is:Device:/&

Pagina 615

3. Ike_invalid_payload, Ike_invalid_cookie.4. Payload_Malformed.5. No public key found.6. ruleset_drop_packet.1. Could not find acceptable proposal /

Pagina 616 - IPsec Hardware Acceleration

Name Local Network Remote Network Remote GatewayVPN-3 lannet office3net office3gwSince the tunnel L2TP in the above table is above the tunnel VPN-3, a

Pagina 617 - DPD Expire Time

• The Clavister Security Gateway is unable to reach the Certificate Revocation List (CRL) on theCA server in order to verify if the certificate is val

Pagina 618 - Default: 15 seconds

In this scenario, it can be seen that the defined remote network on Side B is larger than thatdefined for Side A's local network. This means that

Pagina 620 - Troubleshooting PPTP

Chapter 10: Traffic ManagementThis chapter describes how cOS Core can manage network traffic.• Traffic Shaping, page 657• IDP Traffic Shaping, page 67

Pagina 621 - 9.5.2. L2TP Servers

to the outer IP header of ESP packets of IPsec tunnels. The field can alternatively be set to afixed value in the outer tunnel packets as described in

Pagina 622

Clavister Security Gateway. Different rate limits and traffic guarantees can be created as policiesbased on the traffic's source, destination and

Pagina 623

• Realtime loggers: 4• Stat pollers: 4• Receive contexts: 2• Send contexts: 4NetConMaxChannels is the maximum total allowed for all these connection t

Pagina 624

Security Gateway. One, none or a series of pipes may be specified.• The Return ChainThese are the pipe or pipes that will be used for incoming (arrivi

Pagina 625

Figure 10.2. FwdFast Rules Bypass Traffic ShapingUsing Pipes with Application ControlWhen using the Application Control feature, it is possible to ass

Pagina 626 - L2TP Before Rules

3. Enter 2000 in the Total textbox under Pipe Limits4. Click OKTraffic needs to be passed through the pipe and this is done by using the pipe in a Pip

Pagina 627 - 9.5.4. PPTP/L2TP Clients

A single pipe does not care in which direction the traffic through it is flowing when it calculatestotal throughout. Using the same pipe for both outb

Pagina 628 - 9.5.5. L2TP Version 3

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Traffic Management > Traffic Shaping > Pipe Rules2. Right-click on

Pagina 629 - 9.5.5.1. L2TPv3 Server

Figure 10.3. Differentiated Limits Using ChainsIf surfing uses the full limit of 125 Kbps, those 125 Kbps will occupy half of the std-in pipe leaving1

Pagina 630

Figure 10.4. The Eight Pipe PrecedencesPrecedence Priority is RelativeThe priority of a precedence comes from the fact that it is either higher or low

Pagina 631 - Using IPsec for Encryption

handle. If a packet arrives with an already allocated precedence below the minimum then itsprecedence is changed to the minimum. Similarly, if a packe

Pagina 632 - Setup With VLANs

Lowest Precedence LimitsIt is usually is not needed to have a limit specified for the lowest (best effort) precedence sincethis precedence simply uses

Pagina 633 - ServerIP=If2_ip

If more than 96 Kbps of precedence 2 traffic arrives, any excess traffic will be moved down to thebest effort precedence. All traffic at the best effo

Pagina 634

Object OrganizationIn the Web Interface the configuration objects are organized into a tree-like structure based onthe type of the object.In the CLI,

Pagina 635

before ssh-in and telnet-in, then traffic will reach std-in at the lowest precedence onlyand hence compete for the 250 Kbps of available bandwidth wit

Pagina 636 - 9.6. SSL VPN

In addition to, or as an alternative to the total group limit, individual precedences can havevalues specified. These values are, in fact, guarantees

Pagina 637 - SSL VPN with PPPoE

• Set the pipe limit, as usual, to be 400 Kbps.• Set the Grouping option for the pipe to have the value Destination IP.• Set the total for the pipe&ap

Pagina 638

balancing lowers the limit per user to about 13 Kbps (64 Kbps divided by 5 users).Dynamic Balancing takes place within each precedence of a pipe indiv

Pagina 639

changing conditions.Attacks on BandwidthTraffic shaping cannot protect against incoming resource exhaustion attacks, such as DoS attacksor other flood

Pagina 640

• Dynamic Balancing can be used to specify that all users in a group get a fair and equalamount of bandwidth.10.1.10. More Pipe ExamplesThis section l

Pagina 641 - Client Transfer Statistics

RuleNameForwardPipesReturnPipesSourceInterfaceSourceNetworkDestinationInterfaceDestinationNetworkSelectedServiceall_1mbps out-pipe in-pipe lan lannet

Pagina 642 - Client Cleanup

RuleNameForwardPipesReturnPipesSourceInterfaceSourceNetworkDestInterfaceDestNetworkSelectedServicePrecedenceother out-otherout-pipein-otherin-pipelan

Pagina 643 - 9.6.4. SSL VPN Setup Example

Total: 2000The following pipe rules are then needed to force traffic into the correct pipes and precedencelevels:RuleNameForwardPipesReturnPipesSrcInt

Pagina 644

10.2. IDP Traffic Shaping10.2.1. OverviewThe IDP Traffic Shaping feature is traffic shaping that is performed based on information comingfrom the cOS

Pagina 645

values of the object properties. This example shows how to display the contents of aconfiguration object representing the telnet service.Command-Line

Pagina 646 - 9.7. CA Server Access

This will be the period of time after rule triggering during which traffic shaping is applied toany associated connections that are opened.Typically,

Pagina 647 - CA Server Access by Clients

Unintended ConsequencesTo explain this unintended traffic shaping, consider a client A that connects to host X with P2Ptraffic and triggers an IDP rul

Pagina 648 - Turning Off validation

Figure 10.8. IDP Traffic Shaping P2P Scenario10.2.6. Viewing Traffic Shaping ObjectsViewing HostsIDP traffic shaping has a special CLI command associa

Pagina 649 - 9.8. VPN Troubleshooting

Device:/> pipes -showThe IDP Traffic Shaping pipes can be recognized by their distinctive naming convention which isexplained next.Pipe NamingcOS C

Pagina 650 - The ipsecstat console command

10.3. Threshold RulesOverviewThe objective of a Threshold Rule is to have a means of detecting abnormal connection activity aswell as reacting to it.

Pagina 651 - The ikesnoop console command

• Host BasedThe threshold is applied separately to connections from different IP addresses.• Network BasedThe threshold is applied to all connections

Pagina 652 - 2. Incorrect pre-shared key

The length of time, in seconds, for which the source is blacklisted can also be set.This feature is discussed further in Section 6.7, “Blacklisting Ho

Pagina 653 - 5. No public key found

10.4. Server Load Balancing10.4.1. OverviewThe Server Load Balancing (SLB) feature allows the administrator to spread client applicationrequests over

Pagina 654 - 9.8.6. Specific Symptoms

• SLB can allow network administrators to perform maintenance tasks on servers orapplications without disrupting services. Individual servers can be r

Pagina 655

10.4.3. Selecting StickinessIn some scenarios, such as with SSL connections, it is important that the same server is used for aseries of connections f

Pagina 656

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Objects > Services2. Select the telnet entry in the list3. I

Pagina 657 - 10.1. Traffic Shaping

The default value for this setting is 2048 slots in the table.• Net SizeThe processing and memory resources required to match individual IP addresses

Pagina 658 - Traffic Shaping Objectives

Figure 10.11. Stickiness and Round-RobinIf the connection-rate algorithm is applied instead, R1 and R2 will be sent to the same serverbecause of stick

Pagina 659 - Pipe Rule Chains

that the routing table chosen must necessarily contain routes for all the servers in the SLB rule.)Monitoring MethodsThe method by which hosts are pol

Pagina 660

• PortsThe port number for polling when using the TCP or HTTP option.More than one port number can be specified in which case all ports will be polled

Pagina 661

The table below shows the rules that would be defined for a typical scenario of a set of webservers behind the Clavister Security Gateway for which th

Pagina 662

Device:/> add IPRule Action=SLB_SATSourceInterface=anySourceNetwork=all-netsDestinationInterface=coreDestinationNetwork=wan_ipService=http-allSLBAd

Pagina 663

1. Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule2. Enter:• Name: web_slb• Action: SLB_SAT• Service: HTTP• Source Interface

Pagina 664 - The Correct Solution

• Source Network: all-nets• Destination Interface: core• Destination Network: wan_ip3. Click OKChapter 10: Traffic Management697

Pagina 665 - 10.1.6. Precedences

Chapter 10: Traffic Management698

Pagina 666

Chapter 11: High AvailabilityThis chapter describes the high availability fault-tolerance feature in Clavister Security Gateways.• Overview, page 699•

Pagina 667 - Tip: Specifying bandwidth

8.8. Radius Relay ... 5589. VPN ...

Pagina 668 - The Need for Guarantees

4. In the Name text box, enter myhost5. Enter 192.168.10.10 in the IP Address textbox6. Click OK7. Verify that the new IP4 address object has been add

Pagina 669 - Differentiated Guarantees

longer operational.Interconnection of Cluster UnitsIn a cluster, the master and slave units must be directly connected to each other by asynchronizati

Pagina 670 - 10.1.7. Pipe Groups

network failures between a single Clavister Security Gateway and hosts. This technique isdescribed further in Section 2.4.3, “The Link Monitor”.Licens

Pagina 671 - Another Simple Groups Example

11.2. HA MechanismsThis section discusses in more depth the mechanisms cOS Core uses to implement the highavailability feature.Basic PrinciplesClavist

Pagina 672 - Dynamic Balancing

• The destination MAC address is the Ethernet multicast address corresponding to the sharedhardware address and this has the form:11-00-00-00-nn-mmWhe

Pagina 673 - Relying on the Group Limit

3. The inactive (slave) unit reconfigures to activate the new database files.4. The active (master) unit now reconfigures to activate the new database

Pagina 674 - Troubleshooting

11.3. Setting Up HAThis section provides a step-by-step guide for setting up an HA Cluster. Setup is explained in thefollowing subsections:• Physical

Pagina 675 - 10.1.10. More Pipe Examples

• The individual addresses specified for an interface in an IP4 HA Address object allowremote management through that interface. These addresses can a

Pagina 676 - Pipe Chaining

In the scenario shown above, the lan interface on the master and the lan interface on the slavewould be connected to the same switch which then connec

Pagina 677 - A VPN Scenario

connected to the slave unit in the cluster. The procedure for doing this with each unit is asfollows:1. Connect to the Clavister Security Gateway thro

Pagina 678 - SAT with Pipes

The easiest and quickest way to configure a new master unit is as follows:1. Use the normal configuration backup function to make a backup of the conf

Pagina 679 - 10.2. IDP Traffic Shaping

3. In the dropdown menu displayed, select Undo DeleteListing Modified ObjectsAfter modifying several configuration objects, you might want to see a li

Pagina 680 - 10.2.3. Processing Flow

Note: IP addresses could be public IPv4 addressesThe term "private IPv4 address" is not strictly correct when used here. Eitheraddress used

Pagina 681 - 10.2.5. A P2P Scenario

so that it is unique (the default value is 0). The Cluster ID determines that the MAC address forthe cluster is unique.• Enabling the advanced setting

Pagina 682 - Viewing Pipes

11.4. HA IssuesThe following points should be kept in mind when managing and configuring an HA Cluster.VPN Tunnel SynchronizationcOS Core provides com

Pagina 683 - 10.2.8. Logging

The unique individual IP addresses of the master and slave cannot safely be used for anythingbut management. Using them for anything else, such as for

Pagina 684 - 10.3. Threshold Rules

Both Units Going ActiveIn the case of a misconfiguration of an HA cluster, a worst case scenario could arise where boththe master and slave think the

Pagina 685 - Threshold Rule Blacklisting

11.5. Upgrading an HA ClusterThe cOS Core software versions running on the master and slave in an HA cluster should be thesame. When a new cOS Core ve

Pagina 686

Now, connect to the active unit (which is still running the old cOS Core version) with a CLIconsole and issue the ha -deactivate command. This will ca

Pagina 687 - 10.4. Server Load Balancing

11.6. Link Monitoring and HARedundant Network PathsWhen using an HA configuration, it can be important to use redundant paths to vital resourcessuch a

Pagina 688 - Identifying the Servers

11.7. HA Advanced SettingsThe following cOS Core advanced settings are available for High Availability:Sync Buffer SizeHow much sync data, in Kbytes,

Pagina 689 - 10.4.3. Selecting Stickiness

Chapter 11: High Availability719

Pagina 690

This example shows how to activate and commit a new configuration.Command-Line InterfaceDevice:/> activateThe system will validate and start using

Pagina 691 - 10.4.5. SLB Server Monitoring

Chapter 12: Advanced SettingsThis chapter describes the additional configurable advanced settings for cOS Core that are notalready described in the ma

Pagina 692 - Polling Options

attack to be based on illegal checksums.Default: EnabledLog non IPv4/IPv6Logs occurrences of IP packets that are not IPv4 or IPv6.Default: EnabledLog

Pagina 693

Multicast TTL on LowWhat action to take on too low multicast TTL values.Default: DropLogDefault TTLIndicates which TTL cOS Core is to use when origina

Pagina 694

IP router alert optionHow to handle IP packets with contained route alert.Default: ValidateLogBadIP Options OtherAll options other than those specifie

Pagina 695

12.2. TCP Level SettingsTCP Option SizesVerifies the size of TCP options. This function acts in the same way as IPOptionSizes describedabove.Default:

Pagina 696

Default: 7000 bytesTCP Auto ClampingAutomatically clamp TCP MSS according to MTU of involved interfaces, in addition toTCPMSSMax.Default: EnabledTCP Z

Pagina 697

TCP Option ALTCHKREQDetermines how cOS Core will handle alternate checksum request options. These options wereinitially intended to be used in negotia

Pagina 698

TCP SYN/RSTThe TCP RST flag together with SYN; normally invalid (strip=strip RST).Default: DropLogTCP SYN/FINThe TCP FIN flag together with SYN; norma

Pagina 699 - Chapter 11: High Availability

Default: DropLogTCP Sequence NumbersDetermines if the sequence number range occupied by a TCP segment will be compared to thereceive window announced

Pagina 700

12.3. ICMP Level SettingsICMP Sends Per Sec LimitSpecifies the maximum number of ICMP messages cOS Core may generate per second. Thisincludes ping rep

Pagina 701 - Licensing

2.2. Events and Logging2.2.1. OverviewThe ability to log and analyze system activities is an essential feature of cOS Core. Loggingenables not only mo

Pagina 702 - 11.2. HA Mechanisms

12.4. State SettingsConnection ReplaceAllows new additions to the cOS Core connection list to replace the oldest connections if there isno available s

Pagina 703 - HA with Anti-Virus and IDP

• LogAll – Logs all packets in the connection.Default: LogLog Connection UsageThis generates a log message for every packet that passes through a conn

Pagina 704 - Dealing with Sync Failure

12.5. Connection Timeout SettingsThe settings in this section specify how long a connection can remain idle, that is to say with nodata being sent thr

Pagina 705 - 11.3. Setting Up HA

Connection lifetime for IGMP in seconds.Default: 12Other Idle LifetimeSpecifies in seconds how long connections using an unknown protocol can remain i

Pagina 706

12.6. Length Limit SettingsThis section contains information about the size limits imposed on the protocols directly under IPlevel, such as TCP, UDP a

Pagina 707

Max AH LengthSpecifies in bytes the maximum size of an AH packet. AH, Authentication Header, is used by IPsecwhere only authentication is applied. Thi

Pagina 708 - Installing a New Master Unit

Default: EnabledChapter 12: Advanced Settings736

Pagina 709

12.7. Fragmentation SettingsIP is able to transport up to 65536 bytes of data. However, most media, such as Ethernet, cannotcarry such huge packets. T

Pagina 710

number of samples, it is more likely to find mismatching duplicates. However, more comparisonsresult in higher CPU load.Default: Check8 – compare 8 ra

Pagina 711 - Problem Diagnosis

of the packet. DuplicateFrags determines whether such a fragment should be logged. Note thatDuplicateFragData can also cause such fragments to be logg

Pagina 712 - 11.4. HA Issues

• Emergency• Alert• Critical• Error• Warning• Notice• Info• DebugBy default, cOS Core sends all messages of level Info and above to any configured log

Pagina 713

packet from arriving.Default: 20Reassembly Illegal LimitOnce a whole packet has been marked as illegal, cOS Core is able to retain this in memory for

Pagina 714 - IPv6 Support

12.8. Local Fragment Reassembly SettingsMax ConcurrentMaximum number of concurrent local reassemblies.Default: 256Max SizeMaximum size of a locally re

Pagina 715 - 11.5. Upgrading an HA Cluster

12.9. SSL SettingsSSL Processing PriorityThe maximum amount of CPU resources that SSL processing is allowed to use for opening newSSL connections. Thi

Pagina 716 - HA going INACTIVE

Enable cipher TLS_RSA_EXPORT_WITH_NULL_SHA1 (no encryption, just message validation).Default: DisabledTLS RSA EXPORT NULL MD5Enable cipher TLS_RSA_EXP

Pagina 717 - 11.6. Link Monitoring and HA

12.10. Miscellaneous SettingsUDP Source Port 0How to treat UDP packets with source port 0.Default: DropLogPort 0How to treat TCP/UDP packets with dest

Pagina 718 - 11.7. HA Advanced Settings

value for some specific issues.If cOS Core is upgraded, Dynamic High Buffers should be enabled since the memoryrequirements of a new version may chang

Pagina 719

be allocated, regardless of this setting. For more information about pipes and pipe users, seeSection 10.1, “Traffic Shaping”.Default: 512Chapter 12:

Pagina 720 - Chapter 12: Advanced Settings

Chapter 12: Advanced Settings747

Pagina 721

Appendix A: Update SubscriptionsOverviewA number of cOS Core features function by accessing the Clavister Service Provisioning Network(CSPN) which con

Pagina 722

• Providing a log server has been configured, a log message will be sent which indicates thatsubscription renewal is required.Important: Renew subscri

Pagina 723

An SNMP2c Event Receiver can be defined to collect SNMP Trap log messages. These receiversare typically used to collect and respond to critical alerts

Pagina 724 - 12.2. TCP Level Settings

Querying Server StatusTo get the status of the Clavister network servers use the command:Device:/> updatecenter -serversDeleting Local DatabasesSom

Pagina 725

Appendix B: IDP Signature GroupsFor IDP scanning, the following signature groups are available for selection. There is a version ofeach group under th

Pagina 726

Group Name Intrusion TypeFTP_DIRNAME Directory name attackFTP_FORMATSTRING Format string attackFTP_GENERAL FTP protocol and implementationFTP_LOGIN Lo

Pagina 727

Group Name Intrusion TypeP2P_GENERAL General P2P toolsP2P_GNUTELLA Gnutella P2P toolPACKINGTOOLS_GENERAL General packing tools attackPBX_GENERAL PBXPO

Pagina 728 - Allow TCP Reopen

Group Name Intrusion TypeSSL_GENERAL SSL protocol and implementationTCP_GENERAL TCP protocol and implementationTCP_PPTP Point-to-Point Tunneling Proto

Pagina 729 - 12.3. ICMP Level Settings

Appendix C: Verified MIME filetypesSome cOS Core Application Layer Gateways (ALGs) have the optional ability to verify that thecontents of a downloade

Pagina 730 - 12.4. State Settings

Filetype extension Applicationcmf Creative Music filecore/coredump Unix core dumpcpl Windows Control Panel Extension filedbm Database filedcx Graphics

Pagina 731 - Max Connections

Filetype extension Applicationmmf Yamaha SMAF Synthetic Music Mobile Application Formatmng Multi-image Network Graphic Animationmod Ultratracker modul

Pagina 732

Filetype extension Applicationso UNIX Shared Library filesof ReSOF archivesqw SQWEZ archive datasqz Squeeze It archive datastm Scream Tracker v2 Modul

Pagina 733 - Other Idle Lifetime

Appendix D: The OSI FrameworkOverviewThe Open Systems Interconnection (OSI) model defines a framework for inter-computercommunications. It categorizes

Pagina 734 - 12.6. Length Limit Settings

Feb 5 2000 09:45:23 gateway.ourcompany.com EFW: DROP:Subsequent text is dependent on the event that has occurred.In order to facilitate automated proc

Pagina 735

Appendix E: Third Party Software LicensesThe cOS Core product makes use of a number of third party software modules which are subjectto the following

Pagina 736 - Default: Enabled

to that copy.3. Object Code Incorporating Material from Library Header Files. The object code form of anApplication may incorporate material from a he

Pagina 737 - 12.7. Fragmentation Settings

work.6. 6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundationmay publish revised and/or new versions of the GNU L

Pagina 738 - Duplicate Fragments

royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of,publicly display, publicly perform, sublicense, and distribute t

Pagina 739 - Reassembly Done Limit

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensorprovides the Work (and each Contributor provides its Con

Pagina 740 - Reassembly Illegal Limit

Martin Wendt. Dual licensed under the MIT (see above) or GPL Version 2 licenses.flot by MITJavascript plotting library for jQuery. Released under the

Pagina 741 - Large Buffers

Alphabetical IndexAaccess rules, 380accounting, 82advanced settings, 87and high availability, 86configuring, 84interim messages, 84limitations with NA

Pagina 742 - 12.9. SSL Settings

HTTP, 538identity awareness agent, 553local user database, 522MAC address duplicate problem, 543rules, 535setup summary, 522source, 536SSH client key

Pagina 743 - TLS RSA EXPORT NULL MD5

changing password, 58enabling password, 57line speed, 45password length, 57content filteringcategories, 455order of static and dynamic, 444phishing, 4

Pagina 744 - 12.10. Miscellaneous Settings

evasion attack prevention, 473events, 73log message receivers, 74log messages, 73FFailed Fragment Reassembly setting, 738filetype download block/allow

Pagina 745

RFC 5424 ComplianceBy default, cOS Core sends Syslog messages in a format that is suitable for most Syslog servers.However, some servers may require s

Pagina 746 - Default: 512

IGMP, 326advanced settings, 337configuration, 332rules configuration, 335IGMP Before Rules setting, 338IGMP Idle Lifetime setting, 732IGMP Last Member

Pagina 747

in routing rules, 275MTU size, 137neighbor discovery, 138ping command usage, 139proxy neighbor discovery, 138with high availability, 140ISP connection

Pagina 748 - Subscription renewal

Max Other Length setting, 735Max Pipe Users setting, 745Max PPM (DHCP) setting, 370Max PPP Resends setting, 627Max Radius Contexts setting, 88Max Reas

Pagina 749 - Database Console Commands

quick start guide, 578server, 619PPTP Before Rules setting, 627precedencesin pipes, 665pre-shared keys, 570, 593non-ascii character problem, 593Primar

Pagina 750 - Deleting Local Databases

server load balancing, 687connection-rate algorithm, 688idle timeout setting, 689max slots setting, 689net size setting, 689round-robin algorithm, 688

Pagina 751

threshold rules, 684Timeout setting, 745time servers, 231Time Sync Server Type setting, 234Time Zone setting, 234TLS ALG, 439advantages, 440cryptograp

Pagina 752

DSCP forwarding, 170license limitations, 170port based, 169port based VLAN, 170trunk, 169VMware, 17IPsec AES acceleration, 616licensing, 125setup docu

Pagina 753

Clavister ABSjögatan 6JSE-89160 ÖrnsköldsvikSWEDENPhone: +46-660-299200www.clavister.com

Pagina 754

For backwards compatibility, cOS Core versions older than 8.90 support output to this logger butthe software itself is not included with the distribut

Pagina 755

This specifies the log messages that will be affected by the exception. If the ID number of thelog message is not specified then all log messages for

Pagina 756

10.1.8. Traffic Shaping Recommendations ... 67310.1.9. A Summary of Traffic Shaping ...

Pagina 757

Note: SNMP Trap standardscOS Core sends SNMP Traps which are based on the SNMPv2c standard as defined byRFC1901, RFC1905 and RFC1906.Example 2.20. Sen

Pagina 758

The delay in seconds between alarms when a continuous alarm is used. As discussed inSection 2.4.5, “Hardware Monitoring”, the log event messages gener

Pagina 759 - Appendix D: The OSI Framework

2.3. RADIUS Accounting2.3.1. OverviewThe Central Database ApproachWithin a network environment containing large numbers of users, it is advantageous t

Pagina 760

Parameters included in START messages sent by cOS Core are:• Type - Marks this AccountingRequest as signaling the beginning of the service (START).• I

Pagina 761

• How Authenticated - How the user was authenticated. This is set to either RADIUS if the userwas authenticated via RADIUS, or LOCAL if the user was a

Pagina 762

• The external RADIUS server itself must be correctly configured.Source IP SelectionBy default, the Source IP property will be set to Automatic and th

Pagina 763

• Port: 1813• Retry Timeout: 2• Shared Secret: 231562514098273• Confirm Secret: 231562514098273• Routing Table: main3. Click OK2.3.5. RADIUS Accountin

Pagina 764

Three Connection Attempts are MadeOnly after cOS Core has made three attempts to reach the server will it conclude that theaccounting server is unreac

Pagina 765 - Open Source Code Requests

If this option is not enabled, cOS Core will shut down even though there may be RADIUSaccounting sessions that have not been correctly terminated. Thi

Pagina 766 - Alphabetical Index

2.4. MonitoringThe real-time performance of cOS Core can be monitored in a number of ways. They are:• Using the real-time monitoring functionality in

Pagina 767

List of Figures1.1. Packet Flow Schematic Part I ... 261.2. Packet Flow Schem

Pagina 768

TCP SYN - Total number of TCP connections in the SYN phase.TCP FIN - Total number of TCP connections in the FIN phase.Other - Total number of other co

Pagina 769

Frags received – The number of IP packet fragments received by this interface.Frag reass – The number of complete packets successfully reassembled fro

Pagina 770

Per Rule StatisticsUsage – Number of used IPs in the pool.Usage (%) – Above value calculated as a percentage.Active Clients – Number of currently acti

Pagina 771

Total Sessions Spam - Total number of URLs found to be Spam.Total Sessions Dropped - Total number of sessions dropped.SMTP ALG DNSBL Server Statistics

Pagina 772

Misses – Number of requests not met.High Availability StatisticsInterface Queue – Size of the queue used for the sync interface.Queue Usage Packets –

Pagina 773

The Link Monitor is a cOS Core feature that allows monitoring of the connectivity to one or moreIP addresses external to the Clavister Security Gatewa

Pagina 774

reconfigure takes place and the slave will take over when it detects this inactivity. Ifreconfiguration with failover is desirable it is better to sel

Pagina 775

reconfiguration or full restart. This means that an unreachablehost can be responsible for triggering an action once but nottwice.A group of three hos

Pagina 776

• Addresses: my_host3. Click OK2.4.4. SNMP MonitoringOverviewSimple Network Management Protocol (SNMP) is a standardized protocol for management ofnet

Pagina 777

• Network - The IP address or network from which SNMP requests will come.• Community - The community string which provides password security for the a

Modelos relacionados E7Web GUI | W3 | W5 Web GUI | X8 Web GUI |

Comentarios a estos manuales

Sin comentarios