Amer-networks E5Web GUI Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerzubehör Amer-networks E5Web GUI herunter. Amer Networks E5Web GUI User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 777
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Clavister cOS Core
Administration Guide
Version: 10.20.02
Clavister AB
Sjögatan 6J
SE-89160 Örnsköldsvik
SWEDEN
Phone: +46-660-299200
www.clavister.com
Published 2014-03-31
Copyright © 2014 Clavister AB
Seitenansicht 0
1 2 3 4 5 6 ... 776 777

Inhaltsverzeichnis

Seite 1 - Administration Guide

Clavister cOS CoreAdministration GuideVersion: 10.20.02Clavister ABSjögatan 6JSE-89160 ÖrnsköldsvikSWEDENPhone: +46-660-299200www.clavister.comPublish

Seite 2

8.1. Normal LDAP Authentication ... 5338.2. LDAP for PPP with CHAP, MS-CHAPv1 or

Seite 3 - Table of Contents

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: System > Device > Remote Management > Add > SNMP ma

Seite 4

Default: N/ASystem LocationThe physical location of the node.Default: N/AInterface Description (SNMP)What to display in the SNMP MIB-II ifDescr variab

Seite 5

Default: 500Using the hwm CLI CommandTo get a list current values from all available sensors, the following command can be used:Device:/> hwm -allT

Seite 6

Note: Sensors can differ depending on hardware typeEach hardware model can have a different set of sensors in different locations and withdifferent op

Seite 7

Sensor Name Sensor Type Sensor Number Minimum Limit Maximum LimitCPUTemp TEMP 0 0 65SysTemp TEMP 1 65 65• Eagle E5Monitoring is not available.• Eagle

Seite 8

• 2 - PSU inserted, powered up.2.4.6. Memory Monitoring SettingsThe System > Device > Hardware Monitoring section of the Web Interface or InCont

Seite 9 - List of Figures

2.5. Diagnostic Tools2.5.1. OverviewIn the case of a serious system problem cOS Core provides some tools to aid in identifying thecause. These are:• D

Seite 10

Generation date/time: 2008-07-04 14:23:56 List of loaded PE-modules:fwloader(1.07.04): BA:0x00100000, EP:0x00101028, SS:0x0, IS:0xe7000fwcore(810.20.0

Seite 11 - List of Examples

At this point, the file cap_lan.cap should be downloaded to the management workstation foranalysis.5. A final cleanup is performed and all memory take

Seite 12

information to a file on the Clavister Security Gateway.These output files are placed into the cOS Core root directory and the file name is specified

Seite 13

List of Examples1. Example Notation ... 142.1. Remote Manage

Seite 14 - Examples

hardware units and they should each be reset to the base configuration.Resetting to the base configuration can be done through the CLI or Web Interfac

Seite 15 - Highlighted Content

If the -burnin option is used, a set of tests, known as the test subset, is repeated continuously for aperiod of time. The default test period is two

Seite 16 - Important

2.6. Maintenance2.6.1. Software UpgradesClavister Security Gateways are driven and controlled by cOS Core and this consists of two majorcomponents: th

Seite 17 - Chapter 1: cOS Core Overview

These have bug fixes only with no feature additions. They are freely available to all customerswho are licensed to run the base version involved in th

Seite 18

It can be advisable to make a full system backup before performing a system upgrade. If there isa requirement to wind back the upgrade, the system bac

Seite 19

• Appendix A, Update Subscriptions2.6.3. Backing Up ConfigurationsThe administrator has the ability to take a snapshot of a cOS Core system at a given

Seite 20

version, an cOS Core upgrade can then be performed.The Management Interfaces UsedBoth types of backup, configuration and system, can be performed eith

Seite 21

As an alternative to using SCP, the administrator can initiate a backup or restore of theconfiguration or complete system directly through the Web Int

Seite 22 - 1.2. cOS Core Architecture

1. Go to: Status > Maintenance > Reset & Restore > Reset2. Select Restore the entire unit to factory defaults then confirm and wait for t

Seite 23 - 1.2.3. Basic Packet Flow

Note: Original CorePlus 8.nn systems need two resetsIf an upgrade from a CorePlus 8.nn version has been done previously on Clavisterhardware that was

Seite 24 - Note: Additional actions

3.31. Uploading a Certificate with the Web Interface or InControl ... 2273.32. Uploading a Certificate with Web Interface o

Seite 25

can explicitly choose the driver from a list using the -force_driver option.The index number of the PCI card is first identified from the output of th

Seite 26

2.7. LicensingOverviewTo use cOS Core in a live environment, a cOS Core license file must be installed. A unique licensefile is needed for each proces

Seite 27

license installed before.2. Automatically through the Web InterfaceGo to Status > Maintenance > License and enter the customer username and pass

Seite 28

Lockdown ModecOS Core will enter a state known as Lockdown Mode if certain license violations occur. While inlockdown mode, only remote management tra

Seite 29 - Apply Rules

Warning: More restrictive licenses can cause lockdownIf a more restrictive license is loaded into cOS Core so that the existing number of anobject typ

Seite 30

HA Cluster LicensingIn a cOS Core High Availability Cluster, two identical licenses must be purchased, one for themaster and one for the slave unit. B

Seite 31 - 2.1. Managing cOS Core

Chapter 2: Management and Maintenance126

Seite 32 - Remote Management Policies

Chapter 3: FundamentalsThis chapter describes the fundamental logical objects which make up a cOS Core configuration.These objects include such items

Seite 33 - 2.1.3. The Web Interface

• It increases understanding of the configuration by using meaningful symbolic names.• Using address object names instead of entering numerical addres

Seite 34 - Virtual Series If1

3. Enter 192.168.10.16 for the IP Address4. Click OKExample 3.2. Adding an IP NetworkThis example adds an IPv4 network named wwwsrvnet with address 19

Seite 35 - The Web Browser Interface

6.20. Activating Anti-Virus Scanning ... 4656.21. Setting up IDP for a Mail Server .

Seite 36 - Interface Layout

4. Click OKExample 3.4. Deleting an Address ObjectTo delete an object named wwwsrv1 in the address book, do the following:Command-Line InterfaceDevice

Seite 37 - Using CA Signed Certificates

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Objects > Address Book > Add > Ethernet Address2. Spec

Seite 38 - HTTPSCertificate=HostA

Note: IP and MAC AddressesAddress book objects can never contain both IP addresses and Ethernet MAC addressessince these are entirely different in the

Seite 39 - 2.1.4. The CLI

address book folders. These folders are just like a folder in a computer's file system. They arecreated with a given name and can then be used to

Seite 40 - Tip: Getting help about help

3.2. IPv6 SupportAll the IP addresses discussed so far are of the IPv4 type. The IP address standard IPv6 is designedas a successor to IPv4 with the p

Seite 41 - Tab Completion

2. Specify a suitable name for the object, in this case: wan_net63. Enter 2001:DB8::/32 for the IP6 Address4. Click OKAdd the IP address:1. Go to: Obj

Seite 42 - Object Categories

Web Interface1. Go to: System > Advanced Settings > IP Settings2. Enable the setting: Enable IPv63. Click OKB. Enable IPv6 on an InterfaceOnce I

Seite 43 - Referencing by Name

enabled by default).Enabling IPv6 Router AdvertisementAn additional option for an Ethernet interface is to enable IPv6 router advertisement. This mean

Seite 44 - Serial Console CLI Access

Enabling ICMP Error Pass ThroughUnlike IPv4, fragmentation of IPv6 packets is only done by the originating host using the host'sselection of MTU

Seite 45 - Device:/> shutdown

First, change the CLI context to be the main routing table:Device:/> cc RoutingTable mainAdd the IPv6 route:Device:/main> add Route6 Network=my_

Seite 46 - Logging on to the CLI

PrefaceIntended AudienceThe target audience for this reference guide is Administrators who are responsible forconfiguring and managing Clavister Secur

Seite 47 - Changing the CLI Prompt

The above rule assumes that IPv6 has been enabled on the wan interface.A general discussion of ping and its options along with IPv4 usage can be found

Seite 48 - Device:/> reconf

examines the cOS Core neighbor discovery cache.Neighbor discovery handling in cOS Core resembles ARP handling in that a cache is maintainedin local me

Seite 49 - Logging off from the CLI

given the value AcceptLog. This can help identify if the cause is the same IPv6 address movingbetween hardware Ethernet addresses.• NDCacheSizeThe nei

Seite 50 - 2.1.5. CLI Scripts

3.3. Services3.3.1. OverviewA Service object is a reference to a specific IP protocol with associated parameters. A servicedefinition is usually based

Seite 51 - Script Variables

all_tcpudp All TCP and UDP servicesipsec-suite The IPsec+IKE suitel2tp-ipsec L2TP using IPsec for encryption and authenticationl2tp-raw L2TP control a

Seite 52 - Saving Scripts

3.3.2. Creating Custom ServicesIf the list of predefined cOS Core service objects does not meet the requirements for certaintraffic then a new service

Seite 53 - Listing Scripts

Single Port For many services, a single destination port is sufficient. Forexample, HTTP usually uses destination port 80. The SMTPprotocol uses port

Seite 54

sent to reduce the rate of traffic flow. On the other hand, dropping ICMP messages increasessecurity by preventing them being used as a means of attac

Seite 55 - 2.1.6. Secure Copy

This example shows how to add a TCP/UDP service, using destination port 3306, which is used byMySQL:Command-Line InterfaceDevice:/> add Service Ser

Seite 56

When a message type is selected but no code values are given then all codes for that type isassumed.ICMP Message TypesThe message types that can be se

Seite 57 - 2.1.7. The Console Boot Menu

prompt followed by the command:Device:/> somecommand someparameter=somevalueInControlThe InControl actions for the example are shown here. They are

Seite 58 - The Reset Menu

IP protocol numbersThe currently assigned IP protocol numbers and references are published by the InternetAssigned Numbers Authority (IANA) and can be

Seite 59

a configuration and decrease the ability to troubleshoot problems.3.3.6. Custom Service TimeoutsAny service can have its custom timeouts set. These ca

Seite 60

3.4. Interfaces3.4.1. OverviewAn Interface is an important logical building block in cOS Core. All network traffic that transitsthrough, originates fr

Seite 61 - Device:/> activate

• Virtual LAN (VLAN) interfaces as specified by IEEE 802.1Q. When routing IP packets over aVirtual LAN interface, they will be encapsulated in VLAN-ta

Seite 62 - IP=192.168.1.2

Important: Remove references before removing interfacesIf a logical interface is to be deleted from a cOS Core configuration, it is important to first

Seite 63 - Changing a Remote Access Rule

Ethernet FramesDevices broadcast data as Ethernet frames and other devices "listen" to determine if they are theintended destination for any

Seite 64

Each Ethernet interface is required to have an Interface IP Address, which can be either a staticaddress or an address provided by DHCP. The interface

Seite 65

packets.Auto is the default behavior.• Enable DHCP ClientcOS Core includes a DHCP client feature for dynamic assignment of address information by acon

Seite 66

on an interface with this option.When enabled, default switch routes are automatically added to the routing table for theinterface and any correspondi

Seite 67 - Object Organization

• Change the IP address directly on the interface. For example, if we want to change the IPv4address of the lan interface to 10.1.1.2, we could use th

Seite 68

ImportantThis is an essential point that the reader should read and understand.WarningThis is essential reading for the user as they should be aware t

Seite 69

3.4.2.1. Useful CLI Commands for Ethernet InterfacesThis section summarizes the CLI commands most commonly used for examining andmanipulating cOS Core

Seite 70

InterfaceAddresses/lan_ip InterfaceAddresses/wan_netInterfaceAddresses/lan_net ServerSetting Interface AddressesThe CLI can be used to set the address

Seite 71 - Listing Modified Objects

To enable the interface lan:Device:/> set EthernetDevice lan -enableTo set the driver on an Ethernet interface card the command is:Device:/> set

Seite 72

Require that the assigned broadcast address is the highest address in the assigned network.Default: EnabledDHCP_MinimumLeaseTimeMinimum lease time (se

Seite 73 - 2.2. Events and Logging

Size of Yukon-II receive ring (per interface).Default: 256Ringsize_yukonii_txSize of Yukon-II send ring (per interface).Default: 256Interface Monitor

Seite 74 - 2.2.3. Creating Log Receivers

Percentage of errors in sent packets at which to declare a problem.Default: 73.4.3. Link AggregationWhere individual physical Ethernet interfaces of a

Seite 75 - Message Format

With negotiated aggregation, the switch to which the aggregated interfaces are connected isconfigured to use LACP (Link Aggregation Control Protocol).

Seite 76

However, it is recommended that the physical cabling is in place before the LinkAggregationobject is activated and saved. This will provide the behavi

Seite 77 - Setting the Hostname

4. Repeat the previous step to add the If2 interface5. Click OK3.4.4. VLANOverviewVirtual LAN (VLAN) support in cOS Core allows the definition of one

Seite 78 - Log Message Exceptions

• A physical interface does not need to be dedicated to VLANs and can carry a mixture of VLANand non-VLAN traffic.Physical VLAN Connection with VLANTh

Seite 79 - 2.2.8. SNMP Traps

Chapter 1: cOS Core OverviewThis chapter outlines the key features of cOS Core.• Features, page 17• cOS Core Architecture, page 22• cOS Core State Eng

Seite 80 - 2.2.9. Advanced Log Settings

• More than one interface on the security gateway can carry VLAN trunk traffic and these willconnect to separate switches. More than one trunk can be

Seite 81

It is important to understand that the administrator should treat a VLAN interface just like aphysical interface in that they require both appropriate

Seite 82 - 2.3. RADIUS Accounting

Point-to-Point Protocol over Ethernet (PPPoE) is a tunneling protocol used for connecting multipleusers on an Ethernet network to the Internet through

Seite 83 - STOP Message Parameters

address of the interface.User authenticationIf user authentication is required by the ISP, the username and password can be setup in cOSCore for autom

Seite 84 - Message Frequency

This example shows how to configure a PPPoE client on the wan interface with traffic routed overPPPoE.CLIDevice:/> add Interface PPPoETunnel PPPoEC

Seite 85 - Further RADIUS Considerations

• Traversing network equipment that blocks a particular protocol.• Tunneling IPv6 traffic across an IPv4 network.• Where a UDP data stream is to be mu

Seite 86 - Special Accounting Events

The GRE protocol allows for an additional checksum over and above the IPv4 checksum. Thisprovides an extra check of data integrity.The Virtual Routing

Seite 87 - 2.3.9. Limitations with NAT

Any traffic passing between A and B is tunneled through the intervening network using a GREtunnel and since the network is internal and not public the

Seite 88 - Maximum Radius Contexts

• Use Session Key: 1• Additional Encapsulation Checksum: Enabled3. Define a route in the main routing table which routes all traffic to remote_net_A o

Seite 89 - 2.4. Monitoring

Name The name of the interface for display and reference in cOS Core.Loop to This is the name of the other loopback interface in the pair. The other i

Seite 90 - Interface/VLAN/VPN Statistics

addition, cOS Core supports features such as Virtual LANs,Route Monitoring, Proxy ARP and Transparency.For more information, please see Chapter 4, Rou

Seite 91 - DHCP Server Statistics

It can be useful to outline the steps required to make use of loopback interfaces in the simplestpossible example.Figure 3.2. A Simple Network with Lo

Seite 92 - SMTP ALG DNSBL Statistics

illustrated below.Figure 3.3. Components of Loopback Interface SetupThe example below explains the detailed management user interface steps required f

Seite 93 - IP Pools Statistics

B. Create the second loopback interface1. Go to: Network > Interfaces and VPN > Loopback > Add > Loopback Interface2. Under General enter:

Seite 94 - 2.4.3. The Link Monitor

Device:/> add Interface InterfaceGroup examplegroupMembers=exampleIf1,exampleIf2InControlFollow the same steps used for the Web Interface below.Web

Seite 95 - Link Monitor Uses

3.5. ARP3.5.1. OverviewAddress Resolution Protocol (ARP) allows the mapping of a network layer protocol (OSI layer 3)address to a data link layer hard

Seite 96 - IPsec Tunnels and HA Clusters

The Expires ColumnThe third column in the table, Expires, is used to indicate how much longer the ARP entry will bevalid for.For example, the first en

Seite 97

The Size of the ARP CacheBy default, the ARP Cache is able to hold 4096 ARP entries at the same time. This is adequate formost scenarios but on rare o

Seite 98 - 2.4.4. SNMP Monitoring

Proxy ARP is covered in Section 4.2.6, “Proxy ARP” and is not discussed further in this section.ARP Object PropertiesAn ARP object has the following p

Seite 99 - Preventing SNMP Overload

To understand the difference between Publish and XPublish it is necessary to understand thatwhen cOS Core responds to an ARP query, there are two MAC

Seite 100 - System Name

Device:/> add ARPND Interface=lanIP=192.168.10.15Mode=StaticMACAddress=4b-86-f6-c5-a2-14InControlFollow the same steps used for the Web Interface b

Seite 101 - 2.4.5. Hardware Monitoring

For details of this feature, seeSection 6.4, “Anti-VirusScanning”.Intrusion Detection andPreventionTo mitigate application-layer attacks towards vulne

Seite 102 - Using the hwm CLI Command

ARP RequestsThe ARP specification states that a host should update its ARP Cache with data from ARPrequests received from other hosts. However, as thi

Seite 103

3.6. IP Rules and IP Policies3.6.1. Security PoliciesBefore examining IP rule sets in detail, we will first look at the generic concept of security po

Seite 104 - Note: Values for the W5 PSUs

The IP Policy object is an alternative to using IP Rule objects. They are designed to simply thecreation of policies and make it easier to define such

Seite 105

Specifying Any Interface or NetworkWhen specifying the filtering criteria in any of the policy rule sets, there are several usefulpredefined configura

Seite 106 - 2.5. Diagnostic Tools

As stated above, when cOS Core is started for the first time, the default IP rules drop all traffic soat least one IP rule must be added to allow traf

Seite 107 - A Simple Example

which allows monitoring of opened and active connections passing through the ClavisterSecurity Gateway. If the action is Drop or Reject then the new c

Seite 108 - Downloading the Output File

• ServiceThe Service in an IP rule is also important because if an Application Layer Gateway object is to beapplied to traffic then it must be associa

Seite 109 - Preparing Hardware

types allow bi-directional traffic flow once the initial connection is set up. The Source Networkand Source Interface in the rule means the source of

Seite 110 - The -burnin Option

If the action is Return then the rule scanning resumes at the rule which follows the last Gotoaction (if there was no last Goto then the connection is

Seite 111

rules with a Goto action are then added to the main rule set, and these point to the rule set thatcontains the individual rules that related to the tr

Seite 112 - 2.6. Maintenance

Clavister cOS CoreAdministration GuideVersion: 10.20.02Published 2014-03-31Copyright © 2014 Clavister ABCopyright NoticeThis publication, including al

Seite 113 - The Upgrade Procedure

Chapter 2, Management and Maintenance.High Availability High Availability (HA) is supported through automaticfault-tolerant fail-over to a secondary C

Seite 114 - 2.6.2. Auto-Update Mechanism

Using folders is simply a way for the administrator to conveniently divide up IP rule set entriesand no special properties are given to entries in dif

Seite 115 - Version Compatibility

be used when organizing IP rules.A compliment and alternative to folders for organizing objects is using configuration objectgroups. Object groups all

Seite 116 - Backup and Restore using SCP

properties.If it is desirable to create an object group for the two IP rules for web surfing, this is done with thefollowing steps:• Select the first

Seite 117 - Device:/> reset -unit

box is selected, a full spectrum color palette appears which allows selection by clicking anycolor in the box with the mouse.In this example, we might

Seite 118 - End of Life Procedures

Moving Group ObjectsOnce an object, such as an IP rule, is within a group, the context of move operations becomes thegroup. For example, right clickin

Seite 119 - Forcing the Choice of Driver

Creating IP PoliciesAn IP policy has the following basic properties:• Allow or Deny ActionAn IP policy either allows a particular type of traffic or i

Seite 120

Viewing IP Rules Created by IP PoliciesAs mentioned previously, IP policies create IP rules in the background. These IP rules cannot beviewed through

Seite 121 - 2.7. Licensing

Command-Line InterfaceDevice:/> add IPPolicyName=http_to_serverAction=AllowSourceInterface=wanSourceNetwork=all-netsDestinationInterface=coreDestin

Seite 122 - Device:/> shutdown -reboot

Enabling Application ControlApplication Control can be enabled in two ways:• Specifying applications directly for IP rules or IP policies.This is the

Seite 123 - Ending Lockdown Mode

Name=Allow_CompInControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > Add > IPRule2. Specify a suitab

Seite 124 - Replacing Hardware

• The Hardware Replacement Guide for swapping out Clavister hardware with the same ordifferent unit.• The Migration Guide for upgrading cOS Core from

Seite 125 - Licensing with VMware

been authenticated by cOS Core and are one of the usernames specified for the rule orbelong to one of the specified groups.For a Deny rule, the reques

Seite 126

Now, add the ApplicationRule object:Device:/bt_app_list> add ApplicationRuleAction=AllowAppFilter=3UserAuthGroups=rogue_userForwardChain=narrow_025

Seite 127 - Chapter 3: Fundamentals

2. Specify a suitable name for the list, in this case bt_app_list3. Select Application Control4. In the dialog:• Set Enable Application Control to Yes

Seite 128 - 3.1.2. IP Addresses

InControlFollow the same steps used for the Web Interface below.Web InterfaceFirst, define the Application Rule Set:1. Go to: Policies > Firewallin

Seite 129

Extended LoggingWhen using application content control, it is possible to enable logging for different content.This means that special log messages wi

Seite 130 - 3.1.3. Ethernet Addresses

5. Choose Matches specific applications6. Open the Web node and choose Facebook7. Press the Select button to close the filter dialogDefine an Applicat

Seite 131 - 3.1.4. Address Groups

Device:/> appcontrol compressioncompression - Compression:ccpcomp2 application(s)To view a single definition, the individual name can be used witho

Seite 132 - 3.1.6. Address Book Folders

All the saved filters can be displayed with the command:Device:/> appcontrol -filter -show_listsTo delete all saved filters, use the command: All t

Seite 133

bandwidth usage. For example, video streaming sites, Java/Flash game sites• Risk Level 1Low-risk. Signatures that could be candidates for blocking. Ty

Seite 134 - 3.2. IPv6 Support

3.7. SchedulesIn some scenarios, it might be useful to control not only what functionality is enabled, but alsowhen that functionality is being used.F

Seite 135

1.2. cOS Core Architecture1.2.1. State-based ArchitectureThe cOS Core architecture is centered around the concept of state-based connections.Tradition

Seite 136 - IPv6Network=wan_net6

Section 3.9, “Date and Time”.Example 3.30. Setting up a Time-Scheduled Security PolicyThis example creates a schedule object for office hours on weekd

Seite 137 - The all-nets6 Address Object

• SourceInterface: lan• SourceNetwork lan_net• DestinationInterface: any• DestinationNetwork: all-nets4. Click OKChapter 3: Fundamentals221

Seite 138 - Proxy Neighbor Discovery

3.8. Certificates3.8.1. OverviewThe X.509 StandardcOS Core supports digital certificates that comply with the ITU-T X.509 standard. This involvesthe u

Seite 139

Property Value Remarks---------------- -------------- ---------Name: HTTPSAdminCertType: LocalCertificateData: (binary data)PrivateKey: (binary data)N

Seite 140 - IPv6 and Transparent Mode

Between creating the request and importing the signed certificate file, the certificate objecthas a Type set to the value Request.These functions are

Seite 141

which the certificate is valid. When this validity period expires, the certificate can no longer beused and a new certificate must be issued.Important

Seite 142

Identification ListsIn addition to verifying the signatures of certificates, cOS Core also employs identification lists.An identification list is a li

Seite 143 - 3.3. Services

Graphical Interface UploadingExample 3.31. Uploading a Certificate with the Web Interface or InControlIn this example a certificate stored on the mana

Seite 144

4. Use the file chooser to select a certificate file with the filetype .cer. No private key file shouldbe present. When InControl asks if the private

Seite 145 - Specifying Port Numbers

3.9. Date and Time3.9.1. OverviewCorrectly setting the date and time is important for cOS Core to operate properly. Timescheduled policies, auto-updat

Seite 146 - Tip: Specifying source ports

combinations. Also important are the Application Layer Gateway (ALG) objects which are used todefine additional parameters on specific protocols such

Seite 147 - Specifying All Services

1. Go to: System > Device > Date and Time2. Click Set Date and Time3. Set year, month, day and time via the dropdown controls4. Click OKNote: A

Seite 148 - 3.3.3. ICMP Services

principles regulating DST vary from country to country, and in some cases there can be variationswithin the same country. For this reason, cOS Core do

Seite 149 - ICMP Message Types

Internet. The server sends back the time in seconds since midnight on January 1st, 1900.Configuring Time ServersUp to three time servers can be config

Seite 150 - 3.3.5. Service Groups

Example 3.38. Manually Triggering a Time SynchronizationTime synchronization can be triggered from the CLI. The output below shows a typical response.

Seite 151

Example 3.40. Forcing Time SynchronizationThis example demonstrates how to force time synchronization, overriding the maximumadjustment setting.Comman

Seite 152 - 3.4. Interfaces

Primary Time ServerDNS hostname or IP Address of Timeserver 1.Default: NoneSecondary Time ServerDNS hostname or IP Address of Timeserver 2.Default: No

Seite 153 - Interfaces have Unique Names

3.10. DNSOverviewA DNS server can resolve a Fully Qualified Domain Name (FQDN) into the corresponding numericIP address. FQDNs are unambiguous textual

Seite 154 - 3.4.2. Ethernet Interfaces

2. Enter the following:• Primary Server: 10.0.0.1• Secondary Server: 10.0.0.23. Click OKDNS Lookup and IP RulesIn the case of DNS server request being

Seite 155 - Note: Interface naming

myuid:[email protected]/nic/update?hostname=mydns.dyndns.orgThis could be sent by using HTTP Poster. Alternatively, the URL could be automatica

Seite 156

3.11. Internet Access SetupOverviewOne of the first things an administrator often wants to do after starting cOS Core for the first timeis to set up a

Seite 157

tables to confirm that there is a route with this network as the destination on the sameinterface.If the Access Rule lookup or the reverse route looku

Seite 158

• The IP address of the ISP's "gateway" router.• A network address for the network between the ISP and the Clavister Security Gateway.

Seite 159 - Address=10.1.1.2

See Chapter 5, DHCP Services for more information about this topic.Example 3.42. Enabling DHCPAssume that the wan is connected to the gateway of the I

Seite 160 - Showing Assigned Interfaces

3.11.4. Creating a RouteInitially, no route will exist in the main routing table that allows traffic to reach the Internet sothis must be defined. The

Seite 161 - Ethernet Device Commands

• Interface: wan• Network: all-nets• Gateway: isp_gw_ip3. Click OK3.11.5. Creating IP Rules or IP PoliciesBefore traffic can flow to the ISP, appropri

Seite 162 - DHCP_ValidateBcast

Device:/> add IPPolicySourceInterface=lanSourceNetwork=lan_netDestinationInterface=wanDestinationNetwork=all-netsService=dns-allSourceAction=NATNam

Seite 163

• Destination Network: all-nets• Service: dns-all3. Select Address Translation and in the dialog:• Under Source Address Translation enable NAT• Close

Seite 164

configured during initial connection to the ISP.When DHCP configures the DHCP servers in cOS Core, names are automatically assigned to theseservers so

Seite 165 - 3.4.3. Link Aggregation

3.12. ICMP PingThe combination of the ICMP echo request and echo reply messages are known as ping. Theyprovide a simple diagnostic tool to find out if

Seite 166 - Physical Switch Connections

ping-inbound. An example IP rule for ping messages arriving on the wan interface would be thefollowing:Action SourceInterfaceSourceNetworkDestinationI

Seite 167 - Setting the MTU Value

Incoming Packet Simulation with -srcifInstead of testing the responsiveness of a remote host, the cOS Core ping command can be usedto simulate an inco

Seite 168 - 3.4.4. VLAN

use of the different Application Layer Gateways, layer 7 scanning engines and so on, tofurther analyze or transform the traffic.• If the contents of t

Seite 169

Combining -srcif with -srcipIt is possible to combine -srcip with the -srcif option to simulate a packet arriving on a giveninterface with a given sou

Seite 170 - Port Based VLAN

Chapter 3: Fundamentals251

Seite 171 - 3.4.5. PPPoE

Chapter 4: RoutingThis chapter describes how to configure IP routing in cOS Core.• Overview, page 252• Static Routing, page 253• Policy-based Routing,

Seite 172 - IP address information

4.2. Static RoutingThe most basic form of routing is known as Static Routing. The term "static" is used because mostentries in a routing tab

Seite 173 - User authentication

• Local IP AddressThis parameter usually does not need to be specified. If it is specified, cOS Core responds toARP queries sent to this address. A sp

Seite 174 - 3.4.6. GRE Tunnels

Route # Interface Destination Gateway1 lan 192.168.0.0/242 dmz 10.4.0.0/163 wan 195.66.77.0/244 wan all-nets 195.66.77.4The above routing table provid

Seite 175 - Setting Up GRE

through ARP queries. ARP works because the clients and the cOS Core interface are part of thesame network.A second network might then be added to the

Seite 176 - An Example GRE Scenario

second network must also have their Default Gateway set to 10.2.2.1 in order to reach theClavister Security Gateway.This feature is normally used when

Seite 177

If an established connection cannot be found, then the routing table is consulted. It is importantto understand that the route lookup is performed bef

Seite 178 - 3.4.7. Loopback Interfaces

• It does not matter even if there is a separate route which includes the gateway IP address andthat routes traffic to a different interface.Composite

Seite 179

1.3. cOS Core State Engine Packet FlowThe diagrams in this section provide a summary of the flow of packets through the cOS Corestate-engine. There ar

Seite 180

InControlFollow the same steps used for the Web Interface below.Web InterfaceTo see the configured routing table:1. Go to: Network > Routing > R

Seite 181

When this option is selected, the appropriate all-nets route is automatically added to the mainrouting table for the interface.Example 4.2. Adding a R

Seite 182 - 3.4.8. Interface Groups

present for cOS Core to understand how to route traffic that is destined for the itself.There is one route added for each Ethernet interface in the sy

Seite 183 - Members=exampleIf1,exampleIf2

Tip: Understanding output from the routes commandFor detailed information about the output of the CLI routes command, refer to theseparate CLI Referen

Seite 184 - 3.5. ARP

as healthy. This method is appropriate for monitoring that theinterface is physically attached and that the cabling is workingas expected. As any chan

Seite 185 - Flushing the ARP Cache

disabled and instigate route failover for existing and new connections. For already establishedconnections, a route lookup will be performed to find t

Seite 186 - 3.5.3. ARP Publish

should fail.There are, however, some problems with this setup: if a route failover occurs, the default routewill then use the dsl interface. When a ne

Seite 187 - Publish and XPublish Modes

security gateway comes online.Minimum Number of HostsAvailableThis is the minimum number of hosts that must beconsidered to be accessible before the r

Seite 188 - ARP and Neighbor Discovery

The maximum number of milliseconds allowable between a poll request and the response. Ifthis threshold is exceeded then the host is considered unreach

Seite 189 - Unsolicited ARP Replies

ARP poll intervalThe time in milliseconds between ARP-lookup of hosts. This may be overridden in individualroutes.Default: 1000Ping poll intervalThe t

Seite 190 - Matching Ethernet Addresses

Figure 1.2. Packet Flow Schematic Part IIThe packet flow is continued on the following page.Chapter 1: cOS Core Overview27

Seite 191 - 3.6. IP Rules and IP Policies

impose security policies on the traffic passing between the different network parts.A Typical ScenarioAs an example of a typical proxy ARP scenario, c

Seite 192 - The Default main IP Rule Set

Figure 4.4. A Proxy ARP ExampleTransparent Mode as an AlternativeTransparent Mode is an alternative and preferred way of splitting Ethernet networks.

Seite 193 - Creating a Drop All Rule

4.3. Policy-based RoutingOverviewPolicy-based Routing (PBR) is an extension to the standard routing described previously. It offersadministrators sign

Seite 194 - 3.6.2. IP Rule Set Evaluation

Routing TablescOS Core, as standard, has one default routing table called main. In addition to the main table, itis possible to define one or more, ad

Seite 195 - 3.6.3. IP Rule Actions

to say routes to the core interface (which are routes to cOS Core itself).4. Click OKExample 4.5. Adding RoutesAfter defining the routing table MyPBRT

Seite 196 - Bi-directional Connections

Example 4.6. Creating a Routing RuleIn this example, a routing rule called my_routing_rule is created. This will select the routing tableMyPBRTable fo

Seite 197 - 3.6.4. Multiple IP Rule Sets

The Forward and Return Routing Table can be DifferentIn most cases, the routing table for forward and return traffic will be the same. In some cases i

Seite 198 - The ExtraRules IP rule set

2. A search is now made for a routing rule that matches the packet's source/destinationinterface/network as well as service. If a matching rule i

Seite 199 - 3.6.5. IP Rule Set Folders

The first two options can be regarded as combining the alternate table with the main table andassigning one route if there is a match in both tables.I

Seite 200

Contents of the Policy-based Routing Policy:SourceInterfaceSourceRangeDestinationInterfaceDestinationRangeSelected/ServiceForwardVR tableReturnVR tabl

Seite 201 - Object Groups and the CLI

Figure 1.3. Packet Flow Schematic Part IIIChapter 1: cOS Core Overview28

Seite 202 - Editing Group Properties

4.4. Route Load BalancingOverviewcOS Core provides the option to perform Route Load Balancing (RLB). This is the ability todistribute traffic over mul

Seite 203 - Adding Preceding Objects

processing steps is as follows:1. Route lookup is done in the routing table and a list of all matching routes is assembled. Theroutes in the list must

Seite 204 - 3.6.7. IP Policies

Figure 4.6. The RLB Spillover AlgorithmSpillover Limits are set separately for ingoing and outgoing traffic with only one of thesetypically being spec

Seite 205 - Creating IP Policies

different metric. The route with the lowest metric is chosen first and when that route'sinterface limits are exceeded, the route with the next hi

Seite 206

Internet access is available from either one of two ISPs, whose gateways GW1 GW2 are connectedto the security gateway interfaces WAN1 and WAN2. RLB wi

Seite 207 - 3.6.8. Application Control

Example 4.8. Setting Up RLBIn this example, the details of the RLB scenario described above will be implemented. Theassumption is made that the variou

Seite 208 - Enabling Application Control

• Click OK5. Select Add > Route again to add the second route6. The dialog for a new route will appear. For the second route, enter:• Interface: WA

Seite 209 - Using an Application Rule Set

• Use two ISPs, with one tunnel connecting through one ISP and the other tunnel connectingthrough the other ISP. RLB can then be applied as normal wit

Seite 210

4.5. Virtual Routing4.5.1. OverviewVirtual Routing is a cOS Core feature that allows the creation of multiple, logically separatedvirtual systems with

Seite 211

Figure 4.8. Virtual RoutingWhen the administrator configures this in cOS Core, interface If1 is made a member of routingtable pbr1 but not pbr2. In ot

Seite 212 - Application Content Control

Apply RulesThe figure below presents the detailed logic of the Apply Rules function in Figure 1.2, “Packet FlowSchematic Part II” above.Figure 1.4. Ex

Seite 213

communication between the virtual systems. For example, Department A does not need tocommunicate with Department B. If communication between them is n

Seite 214 - Extended Logging

Route # Interface Network Gateway2 If2 192.168.0.0/24Getting traffic from each network to and from the Internet is straightforward. Assuming onlyoutbo

Seite 215 - Data Leakage Can Occur

Here, each organization gets a virtual system of its own. These connect to the main routing tableusing pairs of loopback interfaces. The routing table

Seite 216 - Managing Filters

Also note how the IPv4 addresses of the internal interfaces of the virtual systems differ. Ifper-interface routing table membership were not used, the

Seite 217 - Risk Guidelines

Note that SAT rules do not need to take into account that there are more organizationsconnected to the same physical unit. There is no direct connecti

Seite 218 - Application Control Licensing

connection will be shown; before and after address translation. Also, the routing tables usedin the forward and return direction will be shown.• Enabl

Seite 219 - 3.7. Schedules

4.6. OSPFThe feature called Dynamic Routing is implemented in cOS Core using the Open Shortest Path First(OSPF) architecture.This section begins by lo

Seite 220

In contrast to DV algorithms, Link State (LS) algorithms enable routers to keep routing tables thatreflect the topology of the entire network.Each rou

Seite 221

Under OSPF, this exchange of routing information is completely automatic.OSPF Provides Route RedundancyIf we now take the above scenario and add a thi

Seite 222 - 3.8. Certificates

and to determine the optimal path. The principal metrics used include:Path length The sum of the costs associated with each link. A commonly used valu

Seite 223 - The NoCRLs Property

Table of ContentsPreface ... 141. cOS Core

Seite 224 - Validity Time

Chapter 1: cOS Core Overview30

Seite 225 - Trusting Certificates

It is possible to configure separate authentication methods for each AS.OSPF AreasAn OSPF Area consists of networks and hosts within an AS that have b

Seite 226 - 3.8.2. Uploading Certificates

With cOS Core, the DR and the BDR are automatically assigned.NeighborsRouters that are in the same area become neighbors in that area. Neighbors are e

Seite 227 - Uploading Remote Certificates

This virtual link is established between two Area Border Routers (ABRs) that are on one commonarea, with one of the ABRs connected to the backbone are

Seite 228 - Using Uploaded Certificates

Figure 4.14. Virtual Links with Partitioned BackboneThe virtual link is configured between fw1 and fw2 on Area 1 as it is used as the transit area. In

Seite 229 - 3.9. Date and Time

having a route in its routing tables for the destination.The key aspect of an OSPF setup is that connected Clavister Security Gateways share theinform

Seite 230 - Daylight Saving Time

interface participating in the OSPF AS.Private Router ID This is used in an HA cluster and is the ID for this securitygateway and not the cluster.Note

Seite 231 - 3.9.3. Time Servers

In other words, the OSPF authentication method must be replicated on all ClavisterSecurity Gateways.AdvancedTime SettingsSPF Hold Time Specifies the m

Seite 232 - Configuring Time Servers

There can only be one backbone area and it forms the centralportion of an AS. Routing information that is exchangedbetween different area always trans

Seite 233 - Maximum Time Adjustment

multicast address 224.0.0.5. Those packets will be heard by all otherthe OSPF routers on the network. For this reason, no configuration ofOSPF Neighbo

Seite 234

InfTrans Delay Specifies the estimated transmit delay for the interface. This valuerepresents the maximum time it takes to forward a LSA packettrough

Seite 235

Chapter 2: Management and MaintenanceThis chapter describes the management, operations and maintenance related aspects of cOSCore.• Managing cOS Core,

Seite 236 - 3.10. DNS

Network The network consisting of the smaller routers.Advertise If the aggregation should be advertised or not.In most, simple OSPF scenarios, OSPF Ag

Seite 237 - Dynamic DNS and HTTP Poster

received routing information, and it might be crucial to avoid parts of the routing databasegetting published to other routers.For this reason, Dynami

Seite 238 - HTTP Poster Has Other Uses

Figure 4.16. Dynamic Routing Rule Objects4.6.4.2. Dynamic Routing RuleThis object defines a dynamic routing rule.General ParametersName Specifies a sy

Seite 239 - 3.11. Internet Access Setup

OSPF Tag Specifies an interval that the tag of the routers needs to be in between.4.6.4.3. OSPF ActionThis object defines an OSPF action.General Param

Seite 240 - 3.11.2. DHCP Setup

Figure 4.17. Setting Up OSPFIn this example we connect together the two Clavister Security Gateways with OSPF so they canshare the routes in their rou

Seite 241

Finally, a Dynamic Routing Rule needs to be defined to deploy the OSPF network. This involvestwo steps:i. A Dynamic Routing Policy Rule object is adde

Seite 242 - 3.11.4. Creating a Route

and those interfaces are configured with OSPF Router Process objects, OSPF will beginexchanging routing information.Confirming OSPF DeploymentIt is no

Seite 243

2. Choose a random internal IP networkFor each security gateway, we need to choose a random IP network using internal, private IPv4addresses. For exam

Seite 244

4.6.6. An OSPF ExampleThis section goes through the detailed setup steps for the simple OSPF scenario illustratedbelow.Figure 4.19. An OSPF ExampleHer

Seite 245 - 3.11.6. Defining DNS Servers

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Network > Routing > OSPF > Add > OSPF Router Process2. Enter

Seite 246 - Device:/> dhcp -show wan

based computer. The server serves as a repository for all cOS Coreconfiguration data and mediates all management commands sentby clients.More informat

Seite 247 - 3.12. ICMP Ping

5. Click OKNow, repeat this for security gateway B, using the same OSPF Area object name of area_0.Example 4.11. Add OSPF Interface ObjectsFor securit

Seite 248 - Using the -verbose Option

Example 4.12. Import Routes from an OSPF AS into the Main Routing TableIn this example, the routes received using OSPF will be added into the main rou

Seite 249 - Specifying the Source IP

Web Interface1. Go to: Network > Routing > Routing Rules2. Click on the newly created ImportOSPFRoutes3. Go to: Routing Action > Add > Dyn

Seite 250 - Ping with IPv6

Command-Line InterfaceFirst, change the CLI context to be the DynamicRoutingRule just added for export:Device:/> cc DynamicRoutingRule ExportDefRou

Seite 251

• DebugDDesc - Log database description packets.• DebugExchange - Log exchange packets.• DebugLSA - Log LSA events.• DebugSPF - Log SPF calculation ev

Seite 252 - Chapter 4: Routing

The OSPF CLI commandThe CLI command ospf provides various options for examining the behavior of OSPF in real-timeon a particular.In order to see gener

Seite 253 - 4.2. Static Routing

4.7. Multicast Routing4.7.1. OverviewThe Multicast ProblemCertain types of Internet interactions, such as conferencing and video broadcasts, require a

Seite 254 - A Typical Routing Scenario

For multicast to function with an Ethernet interface on any Clavister Security Gateway,that interface must have multicast handling set to On or Auto.

Seite 255 - 4 wan all-nets 195.66.77.4

Figure 4.20. Multicast Forwarding - No Address TranslationNote: SAT Multiplex rules must have a matching Allow ruleRemember to add an Allow rule that

Seite 256

1. Go to: Objects > Services > Add > TCP/UDP2. Now enter:• Name: multicast_service• Type: UDP• Destination: 1234B. Create an IP rule:1. Go to

Seite 257 - 4.2.2. Static Routing

2.1.2. Default Administrator AccountsBy default, cOS Core has a local user database, AdminUsers, which contains two predefined useraccounts:• Username

Seite 258

If, for example, multiplexing of the multicast group 239.192.100.50 is required to the outputinterfaces if2 and if3, then the command to create the ru

Seite 259 - Displaying Routing Tables

The following SAT Multiplex rule needs to be configured to match the scenario described above:InControlFollow the same steps used for the Web Interfac

Seite 260 - The all-nets Route

4.7.3. IGMP ConfigurationIGMP signalling between hosts and routers can be divided into two categories:• IGMP ReportsReports are sent from hosts toward

Seite 261 - Routes to the Core Interface

Figure 4.23. Multicast Proxy ModeIn Snoop Mode, the Clavister Security Gateway will act transparently between the hosts andanother IGMP router. It wil

Seite 262 - 1 core 224.0.0.0/4

1. Go to: Network > Routing > IGMP Rules > Add > IGMP Rule2. Under General enter:• Name: A suitable name for the rule, for example Reports

Seite 263

4.7.3.2. IGMP Rules Configuration - Address TranslationThe following examples illustrates the IGMP rules needed to configure IGMP according to theAddr

Seite 264 - Failover Processing

2. Under General enter:• Name: A suitable name for the rule, for example Queries_if1• Type: Query• Action: Proxy• Output: if1 (this is the relay inter

Seite 265 - Route Interface Grouping

• Destination Interface: core• Destination Network: auto• Multicast Source: 192.168.10.1• Multicast Group: 239.192.10.0/244. Click OKB. Create the sec

Seite 266 - Enabling Host Monitoring

the default route.Default: EnabledIGMP Before RulesFor IGMP traffic, by-pass the normal IP rule set and consult the IGMP rule set.Default: EnabledIGMP

Seite 267 - Specifying Hosts

The interval in milliseconds between General Queries sent by the device to refresh its IGMP state.Global setting on interfaces without an overriding I

Seite 268 - Iface poll interval

Clavister Product Default Web Interface Management InterfaceLynx X8 G1Eagle E5/E7 geswWolf W3/W5 M1Virtual Series If1Changing the management interface

Seite 269 - 4.2.6. Proxy ARP

4.8. Transparent Mode4.8.1. OverviewTransparent Mode UsageThe cOS Core Transparent Mode feature allows a Clavister Security Gateway to be placed at ap

Seite 270 - Setting Up Proxy ARP

• Routing Mode using non-switch routes.• Transparent Mode using switch routes.With non-switch routes, the Clavister Security Gateway acts as a router

Seite 271 - Automatically Added Routes

interface. As the Layer 3 Cache is only used for IP traffic, Layer 3 Cache entries are stored as singlehost entries in the routing table.For each IP p

Seite 272 - 4.3. Policy-based Routing

Specifying a network or address range is, of course, only possible if the administrator has someknowledge of the network topology and often this may n

Seite 273 - Routing Tables

Transparent Mode with VLANsIf transparent mode is being set up for all hosts and users on a VLAN then the techniquedescribed above of using multiple r

Seite 274 - Routing Rules

clients located behind a security gateway operating in transparent mode. In this case, cOS Coremust be correctly configured as a DHCP relayer to corre

Seite 275

single logical IP network in Transparent Mode with a common address range (in this example192.168.10.0/24).Figure 4.25. Transparent Mode Internet Acce

Seite 276

Clavister Security Gateway is acting like a level 2 switch and address translation is done at thehigher IP OSI layer.The other consequence of not usin

Seite 277 - The Ordering parameter

Network=10.0.0.0/24AutoSwitchRoute=YesAdd the IP rule:Device:/> add IPRule Action=AllowService=httpSourceInterface=lanSourceNetwork=10.0.0.0/24Dest

Seite 278

• Name: http_allow• Action: Allow• Service: http• Source Interface: lan• Destination Interface: any• Source Network: 10.0.0.0/24• Destination Network:

Seite 279

After entering a valid username and password the Login button is clicked. If the user credentialsare valid, the administrator is taken to the main Web

Seite 280 - 4.4. Route Load Balancing

Example 4.21. Setting up Transparent Mode for Scenario 2Configure a Switch Route over the lan and dmz interfaces for address range 10.0.0.0/24 (assume

Seite 281

Device:/> add IPRule Action=AllowService=httpSourceInterface=wanSourceNetwork=all-netsDestinationInterface=dmzDestinationNetwork=wan_ipName=http_wa

Seite 282

3. Click OKConfigure the routing:1. Go to: Network > Routing > Routing Tables > main > Add > SwitchRoute2. Now enter:• Switched Interfa

Seite 283 - An RLB Scenario

7. Go to: Policies > Add > IPRule8. Now enter:• Name: http_wan_to_dmz• Action: Allow• Service: http• Source Interface: wan• Destination Interfac

Seite 284

Figure 4.28. An Example BPDU Relaying ScenarioImplementing BPDU RelayingThe cOS Core BDPU relaying implementation only carries STP messages. These STP

Seite 285

• Drop/Log - Drop all MPLS packets without verification and log these drops.4.8.6. Advanced Settings for Transparent ModeCAM To L3 Cache Dest Learning

Seite 286 - RLB with VPN

Transparency ATS SizeDefines the maximum total number of ARP Transaction State (ATS) entries. Valid values are128-65536 entries.Default: 4096Note: Opt

Seite 287

• Drop - Drop packets• DropLog - Drop and log packetsDefault: DropLogRelay Spanning-tree BPDUsWhen set to Ignore all incoming STP, RSTP and MSTP BPDUs

Seite 289 - Using Loopback Interfaces

Chapter 5: DHCP ServicesThis chapter describes DHCP services in cOS Core.• Overview, page 359• cOS Core DHCP Servers, page 361• IPv4 DHCP Relay, page

Seite 290 - Routing Table pbr2

cOS Core objects. The central area of the Web Interface displays information about thosemodules. Current performance information is shown by default.N

Seite 291

The lease time can be configured in a DHCP server by the administrator.Chapter 5: DHCP Services360

Seite 292 - Loopback Interfaces

5.2. cOS Core DHCP ServerscOS Core DHCP servers assign and manage the IP addresses taken from a specified address pool.These servers are not limited t

Seite 293 - IP Rules

This is the IP address of the DHCP relayer through which the DHCP request has come.Requests from local clients or other DHCP relayers will be ignored.

Seite 294 - 4.5.6. Trouble Shooting

parameter, Lease Store Interval.• Lease Store IntervalThe number of seconds between auto saving the lease database to disk. The default value is86400

Seite 295

10.4.13.244 00-00-00-00-02-14 INACTIVE(STATIC)10.4.13.254 00-00-00-00-02-54 INACTIVE(STATIC)10.4.13.1 00-12-79-3b-dd-45 ACTIVE10.4.13.2 00-12-79-c4-06

Seite 296 - 4.6. OSPF

Figure 5.1. DHCP Server ObjectsThe following sections discuss these two DHCP server options.5.2.1. Static IPv4 DHCP HostsWhere the administrator requi

Seite 297 - A Simple OSPF Scenario

Device:/DHCPServer1> show DHCPServerPoolStaticHost 1Property Value----------- -----------------Index: 1Host: 192.168.1.1MACAddress: 00-90-12-13-14-

Seite 298 - A Look at Routing Metrics

Data This is the actual information that will be sent in the lease. This can be one value or acomma separated list.The meaning of the data is determin

Seite 299 - 4.6.2. OSPF Concepts

5.3. IPv4 DHCP RelayNoteDHCP relaying is a feature which is currently only available with IPv4 DHCP.The DHCP ProblemWith DHCP, clients send requests t

Seite 300 - The Designated Router

TargetDHCPServer=ip-dhcpSourceInterface=ipgrp-dhcpAddRoute=YesProxyARPInterfaces=ipgrp-dhcpInControlFollow the same steps used for the Web Interface b

Seite 301 - Virtual Links

change the ordering and other operations. The Clone function is used tomake a complete copy of the current object and then add it as the lastobject in

Seite 302

Transaction TimeoutFor how long a dhcp transaction can take place.Default: 10 secondsMax PPMHow many dhcp-packets a client can send to through cOS Cor

Seite 303 - Using OSPF with cOS Core

5.4. IP PoolsNoteIP pools can currently only be used with IPv4 DHCP.OverviewAn IP pool is used to offer other subsystems access to a cache of DHCP IP

Seite 304 - 4.6.3. OSPF Components

Advanced IP Pool OptionsAdvanced options available for IP Pool configuration are:Routing Table The routing table to be used for lookups when resolving

Seite 305 - Authentication

This displays all the configured IP pools along with their status. The status information is dividedinto four parts:• Zombies - The number of allocate

Seite 306 - 4.6.3.2. OSPF Area

5.5. DHCPv6 ServerscOS Core provides the ability to set up one or more DHCPv6 servers. Configuring these is almostidentical to configuring an IPv4 DHC

Seite 307 - 4.6.3.3. OSPF Interface

DHCPv6 server. Together, these can significantly increase the speed of addressallocation.Available Memory Can Limit Lease AllocationWhen a DHCPv6 leas

Seite 308

interface lan. Assume that the pool of available IP addresses is already defined by the IPv6address object dhcpv6_range1.The server will also use the

Seite 309 - 4.6.3.5. OSPF Aggregates

2. Now enter:• Name: dhcpv6_server1• Interface Filter: lan• IP Address Pool: dhcpv6_range13. Select the Options tab4. Enable Handle Rapid Commit Optio

Seite 310 - 4.6.4. Dynamic Routing Rules

5. Click OK to save the prefix6. Click OK to save the advertisementStatic DHCPv6 HostsWhere the administrator requires a fixed relationship between a

Seite 311 - Dynamic Routing Rule Objects

Chapter 5: DHCP Services379

Seite 312 - 4.6.4.2. Dynamic Routing Rule

Example 2.1. Remote Management via HTTPS with CA Signed CertificatesCommand-Line InterfaceDevice:/> set Settings RemoteMgmtSettingsHTTPSCertificate

Seite 313 - 4.6.5. Setting Up OSPF

Chapter 6: Security MechanismsThis chapter describes cOS Core security features.• Access Rules, page 380• ALGs, page 384• Web Content Filtering, page

Seite 314

and a Default Access Rule log message will be generated.When troubleshooting dropped connections, the administrator should look out for DefaultAccess

Seite 315

• Network: The IP span that the sender address should belong to.Access Rule ActionsThe Access Rule actions that can be specified are:• Drop: Discard t

Seite 316 - Confirming OSPF Deployment

1. Go to: Network > Routing > Access > Add > Access2. Now enter:• Name: lan_Access• Action: Expect• Interface: lan• Network: lan_net3. Cli

Seite 317

6.2. ALGs6.2.1. OverviewTo complement low-level packet filtering, which only inspects packet headers in protocols suchas IP, TCP, UDP, and ICMP, Clavi

Seite 318 - 4.6.6. An OSPF Example

Maximum Connection SessionsThe service associated with an ALG has a configurable parameter associated with it called MaxSessions and the default value

Seite 319

The opposite to blacklisting, this makes sure certain URLs are always allowed.Wildcarding can also be used for these URLs, as described below.It is im

Seite 320 - Device:/>

the download will be dropped. If nothing is marked in this mode then no files can bedownloaded.Additional filetypes not included by default can be add

Seite 321

Figure 6.2. HTTP ALG Processing OrderUsing Wildcards in White and BlacklistsEntries made in the white and blacklists can make use of wildcarding to ha

Seite 322

File Transfer Protocol (FTP) is a TCP/IP-based protocol for exchanging files between a client and aserver. The client initiates the connection by conn

Seite 323 - 4.6.7. OSPF Troubleshooting

After finishing working with the Web Interface, it is advisable to always logout to prevent otherusers with access to the workstation getting unauthor

Seite 324

certain control commands and provide buffer overrun protection.Hybrid ModeAn important feature of the cOS Core FTP ALG is its automatic ability to per

Seite 325 - The OSPF CLI command

active mode, the cOS Core FTP ALG will handle the conversion automatically to active mode.A range of client data ports is specified with this option.

Seite 326 - 4.7. Multicast Routing

The FTP ALG also allows restrictions to be placed on the FTP control channel which can improvethe security of FTP connections. These are:• Maximum lin

Seite 327

In this case, we will set the FTP ALG restrictions as follows.• Enable the Allow client to use active mode FTP ALG option so clients can use both acti

Seite 328

5. Click OKB. Define the Service:1. Go to: Objects > Services > Add > TCP/UDP Service2. Enter the following:• Name: ftp-inbound-service• Type

Seite 329

• Action: NAT• Service: ftp-inbound-service3. For Address Filter enter:• Source Interface: dmz• Destination Interface: core• Source Network: dmz_net•

Seite 330

In this case, we will set the FTP ALG restrictions as follows.• Disable the Allow client to use active mode FTP ALG option so clients can only use pas

Seite 331

B. Create the Service1. Go to: Objects > Services > Add > TCP/UDP Service2. Now enter:• Name: ftp-outbound-service• Type: select TCP from the

Seite 332 - 4.7.3. IGMP Configuration

• Action: NAT• Service: ftp-outbound-service3. For Address Filter enter:• Source Interface: lan• Destination Interface: wan• Source Network: lan_net•

Seite 333

be written by a TFTP client. The default value is Allow.Remove Request Option Specifies if options should be removed from request. Thedefault is False

Seite 334

2.6.3. Backing Up Configurations ... 1152.6.4. Restore to Factory Defaults ...

Seite 335

completion would not be able to help complete the above command if the tab is pressed duringor after the IPAddress object type.The same object name co

Seite 336

Email size limiting A maximum allowable size of email messages can bespecified. This feature counts the total amount of bytes sentfor a single email w

Seite 337 - 4.7.4. Advanced IGMP Settings

As described above, if an address is found on the whitelist then it will not be blocked if it alsofound on the blacklist. Spam filtering, if it is ena

Seite 338

extension list that is returned to the client by an SMTP server behind the Clavister SecurityGateway. When an extension is removed, a log message is g

Seite 339 - IGMP Startup Query Interval

email is from a spammer or not. cOS Core examines the IP packet headers to do this.The reply sent back by a server is either a not listed response or

Seite 340

If dnsbl1 and dnsbl2 say an email is Spam but dnsbl3 does not, then the total calculated will be3+2+0=5. Since the total of 5 is equal to (or greater

Seite 341

• X-Spam-TXT-Records - A list of TXT records sent by the DNSBL servers that identified theemail as Spam.• X-Spam_Sender-IP - IP address used by the em

Seite 342 - Enabling Transparent Mode

• Specify the DNSBL servers that are to be used. There can be one or multiple. Multiple serverscan act both as backups to each other as well as confir

Seite 343

• Number of positive (is Spam) responses from each configured DNSBL server.• Number of queries sent to each configured DNSBL server.• Number of failed

Seite 344 - Transparent Mode with DHCP

Tip: DNSBL serversA list of DNSBL servers can be found at:http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists.6.2.6. The POP3 ALGPOP3 is a mail

Seite 345 - Non-switch if1 all-nets gw-ip

The PPTP ALG is provided to deal with a specific issue when PPTP tunnels are used with NAT.Let us suppose we have two clients A and B on a protected i

Seite 346

pressing the up arrow key once will make the last command executed appear at the current CLIprompt. After a command appears it can be re-executed in i

Seite 347 - Scenario 1

iv. Select the ALG to be the PPTP ALG object that was defined in the first step. In this case, itwas called pptp_alg.• Associate this service object w

Seite 348

Important: Third Party Equipment CompliancecOS Core is based on the SIP implementation described in RFC 3261. However, correctSIP message processing a

Seite 349 - Scenario 2

supported by cOS Core.Registrars A server that handles SIP REGISTER requests is given the special name ofRegistrar. The Registrar server has the task

Seite 350

The SIP Proxy Record-Route OptionTo understand how to set up SIP scenarios with cOS Core, it is important to first understand theSIP proxy Record-Rout

Seite 351

cOS Core supports a variety of SIP usage scenarios. The following three scenarios cover nearly allpossible types of usage:• Scenario 1Protecting local

Seite 352

The proxy should be configured with the Record-Route feature enabled to insure all SIP traffic toand from the office clients will be sent through the

Seite 353

Action Src Interface Src Network Dest Interface Dest NetworkAllow(or NAT)lan lan_net wan ip_proxyAllow wan ip_proxy lan(or core)lan_net(or wan_ip)With

Seite 354 - 4.8.5. MPLS Pass Through

2. The SIP ALG properties will be displayed3. Specify a name for the ALG, for example sip_alg4. Click OKC. Define a custom Service object for SIP:1. G

Seite 355

• Service: sip_serv• Source Interface: ext• Source Network: proxy_ip• Destination Interface: core• Destination Network: ip_wan• Comment: Allow incomin

Seite 356 - Note: Optimal ATS handling

• Type set to TCP/UDP3. Define three rules in the IP rule set:• A NAT rule for outbound traffic from the local proxy and the clients on the internalne

Seite 357 - Relay MPLS

makes examining and understanding the configuration easier.Getting the Default or Current Property ValueThe period "." character before a ta

Seite 358

This scenario is similar to the previous but the major difference is the location of the local SIPproxy server. The server is placed on a separate int

Seite 359 - Chapter 5: DHCP Services

well as a setup without NAT (Solution B below).Solution A - Using NATThe following should be noted about this setup:• The IP address of the SIP proxy

Seite 360

This rule has core as the destination interface (in other words, cOS Core itself). When anincoming call is received, cOS Core uses the registration in

Seite 361 - 5.2. cOS Core DHCP Servers

Action Src Interface Src Network Dest Interface Dest NetworkOutboundToProxy Allow lan lan_net dmz ip_proxyOutboundFromProxy Allow dmz ip_proxy lan lan

Seite 362 - DHCP Server Advanced Settings

The different protocols used in implementing H.323 are:H.225 RAS signalling and CallControl (Setup) signallingUsed for call signalling. It is used to

Seite 363

• Number of TCP Data ChannelsThe number of TCP data channels allowed can be specified.• Address TranslationFor NATed traffic the Network can be specif

Seite 364 - Additional Server Settings

InControlFollow the same steps used for the Web Interface below.Web InterfaceOutgoing Rule:1. Go to: Policies > Add > IPRule2. Now enter:• Name:

Seite 365 - 5.2.1. Static IPv4 DHCP Hosts

• Service: H323• Source Interface: any• Destination Interface: lan• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: lan_net• Comment: Allow

Seite 366 - 5.2.2. Custom IPv4 Options

1. Go to: Policies > Add > IPRule2. Now enter:• Name: H323In• Action: SAT• Service: H323• Source Interface: any• Destination Interface: core• So

Seite 367

the Internet, the following rules need to be added to the rule listings in both security gateways.Make sure there are no rules disallowing or allowing

Seite 368 - 5.3. IPv4 DHCP Relay

Not all object types belong in a category. The object type UserAuthRule is a type without acategory and will appear in the category list after pressin

Seite 369 - Max Transactions

• Service: H323• Source Interface: any• Destination Interface: lan• Source Network: 0.0.0.0/0 (all-nets)• Destination Network: lan_net• Comment: Allow

Seite 370

1. Go to: Policies > Add > IPRule2. Now enter:• Name: H323In• Action: SAT• Service: H323• Source Interface: any• Destination Interface: core• So

Seite 371 - 5.4. IP Pools

H.323 phones are connected on the internal network and to the Gatekeeper on the DMZ. TheGatekeeper on the DMZ is configured with a private address. Th

Seite 372 - Listing IP Pool Status

2. Now enter:• Name: H323In• Action: Allow• Service: H323-Gatekeeper• Source Interface: any• Destination Interface: core• Source Network: 0.0.0.0/0 (a

Seite 373 - PrefetchLeases=10

should be make sure there are no rules disallowing or allowing the same kind of ports/trafficbefore these rules.InControlFollow the same steps used fo

Seite 374 - 5.5. DHCPv6 Servers

possible for internal phones to call the external phones that are registered with thegatekeeper.Example 6.11. Using the H.323 ALG in a Corporate Envir

Seite 375 - DHCPv6 Server Setup

• Name: LanToGK• Action: Allow• Service: H323-Gatekeeper• Source Interface: lan• Destination Interface: dmz• Source Network: lan_net• Destination Netw

Seite 376

• Comment: Allow communication from the Gateway to H.323 phones on lan_net3. Click OK1. Go to: Policies > Add > IPRule2. Now enter:• Name: Branc

Seite 377

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > Add > IPRule2. Now enter:• Name: ToGK• Action:

Seite 378 - Static DHCPv6 Hosts

• Destination Network: hq-net• Comment: Allow the Gateway to communicate with the Gatekeeper connected to theHead Office3. Click OKNote: Outgoing call

Seite 379

The naming of some objects is optional and is done with the Name= parameter in an addcommand. An object, such as a threshold rule, will always have an

Seite 380 - 6.1. Access Rules

sent to a client at the beginning of a TLS session in order to establish the server's identity andthen be the basis for encryption. Certificates

Seite 381 - 6.1.3. Access Rule Settings

The steps to take to enable TLS in cOS Core are as follows:1. Upload the host and root certificates to be used with TLS to cOS Core if not done alread

Seite 382 - Note: Enabling logging

• Renegotation is not supported.• Sending server key exchange messages is not supported which means the key in thecertificate must be sufficiently wea

Seite 383

6.3. Web Content Filtering6.3.1. OverviewWeb traffic is one of the biggest sources for security issues and misuse of the Internet.Inappropriate surfin

Seite 384 - 6.2. ALGs

web content. Many web sites use Javascript and other types of client-side code and inmost cases, the code is non-malicious. Common examples of this is

Seite 385 - 6.2.2. The HTTP ALG

Gateway's whitelist, access to that URL is always allowed, taking precedence over DynamicContent Filtering.WildcardingBoth the URL blacklist and

Seite 386

Finally, make an exception from the blacklist by creating a specific whitelist:Device:/content_filtering> add ALG_HTTP_URLURL=www.Clavister.com/*.e

Seite 387

Using URL Filter ObjectsAn alternative method for URL filtering is to define a separate URL Filter object. These are used inthe following series of st

Seite 388 - 6.2.3. The FTP ALG

Dynamic WCF DatabasescOS Core Dynamic WCF allows web page blocking to be automated so it is not necessary tomanually specify beforehand which URLs to

Seite 389 - The cOS Core ALG Solution

Figure 6.8. Dynamic Web Content Filtering FlowIf the requested web page URL is not present in the databases, then the webpage content at theURL will a

Seite 390 - Hybrid Mode

• A terminal or a computer with a serial port and the ability to emulate a terminal (such asusing the Hyper Terminal software included in some Microso

Seite 391 - Control Channel Restrictions

6.3.4.2. Setting Up Dynamic Web Content FilteringActivationDynamic Content Filtering is a feature that is enabled by purchasing a subscription to the

Seite 392 - Anti-Virus Scanning

Then, create a service object using the new HTTP ALG:Device:/> add ServiceTCPUDP http_content_filtering Type=TCPDestinationPorts=80ALG=content_filt

Seite 393

1. On a workstation on the lan_net network, launch a standard web browser.2. Try to browse to a search site. For example, www.google.com.3. If everyth

Seite 394

Command-Line InterfaceFirst, create an HTTP Application Layer Gateway (ALG) Object:Device:/> add ALG ALG_HTTP content_filteringWebContentFilteringM

Seite 395

Reclassification of Blocked SitesAs the process of classifying unknown web sites is automated, there is always a small risk thatsome sites are given a

Seite 396

previous examples.Dynamic content filtering is now activated for all web traffic from lan_net to all-nets and the useris able to propose reclassificat

Seite 397

on recent events pertaining to topics surrounding a locality (for example, town, city or nation) orculture, including weather forecasting information.

Seite 398 - 6.2.4. The TFTP ALG

A web site may be classified under the Game Sites category if its content focuses on or includesthe review of games, traditional or computer based, or

Seite 399 - 6.2.5. The SMTP ALG

A web site may be classified under the Malicious category if its content is capable of causingdamage to a computer or computer environment, including

Seite 400

A web site may be classified under the Drugs/Alcohol category if its content includes drug andalcohol related information or services. Some URLs categ

Seite 401 - Enhanced SMTP and Extensions

SSH (Secure Shell) CLI AccessThe SSH (Secure Shell) protocol can be used to access the CLI over the network from a remotehost. SSH is a protocol prima

Seite 402 - 6.2.5.1. Anti-Spam Filtering

HTML Page ParametersThe HTML pages contain a number of parameters that can be used as needed. The parametersavailable are:• %URL% - The URL which was

Seite 403 - Creating a DNSBL Consensus

9. Click OK to exit editing10. Go to: Policies > User Authentication User Authentication Rules11. Select the relevant HTML ALG and click the Agent

Seite 404 - Adding X-Spam Information

6.4. Anti-Virus Scanning6.4.1. OverviewThe cOS Core anti-virus module protects against malicious code carried in data passing throughthe Clavister Sec

Seite 405 - Setup Summary

and can determine, with a high degree of certainty, if a virus is in the process of beingdownloaded to a user behind the Clavister Security Gateway. O

Seite 406 - Real-time Monitoring

Protocol Specific behaviorSince anti-virus scanning is implemented through an Application Level Gateway (ALG), specificprotocol specific features are

Seite 407 - The dnsbl CLI Command

When used with IP rules, an ALG must then be associated with an appropriate service objectfor the protocol to be scanned. The service object is then a

Seite 408 - 6.2.7. The PPTP ALG

3. Select the TCP in the Type dropdown list4. Enter 80 in the Destination Port textbox5. Select the HTTP ALG just created in the ALG dropdown list6. C

Seite 409 - PPTP ALG Setup

specified in Appendix C, Verified MIME filetypes) then the filetype in the file's name is used whenthe excluded list is checked.3. Compression Ra

Seite 410 - 6.2.8. The SIP ALG

2. The active unit performs an automatic reconfiguration to update its database.3. This reconfiguration causes a failover so the passive unit becomes

Seite 411 - SIP Components

6.5. Intrusion Detection and Prevention6.5.1. OverviewIntrusion DefinitionComputer servers can sometimes have vulnerabilities which leave them exposed

Seite 412 - SIP ALG Options

Changing the admin User PasswordIt is recommended to change the default password of the admin account from admin tosomething else as soon as possible

Seite 413 - SIP Usage Scenarios

latest intrusion threats. For full details about obtaining the IDP service please refer to Appendix A,Update Subscriptions.Figure 6.11. IDP Database U

Seite 414

> Update Center.Updating in High Availability ClustersUpdating the IDP databases for both the units in an HA Cluster is performed automatically byc

Seite 415

ordered by group. However, its purpose is for reference only and it is not possible to add rulesignatures through this tree. A screen shot of the list

Seite 416

• Invalid hex encodingA valid hex sequence is where a percentage sign is followed by two hexadecimal values torepresent a single byte of data. An inva

Seite 417

Evasion AttacksAn evasion attack has a similar end-result to the insertion Attack in that it also generates twodifferent data streams, one that the ID

Seite 418

Attackers who build new intrusions often reuse older code. This means their new attacks canappear in circulation quickly. To counter this, Clavister I

Seite 419 - Scenario 3

The group type is one of the values IDS, IPS or Policy. These types are explained above.2. Signature Group CategoryThis second level of naming describ

Seite 420

6.5.7. Setting Up IDPThe steps for setting up IDP are as follows:• Create an IDP Rule object which identifies the traffic to be processed.• Add one or

Seite 421

Device:/> add IDPRule Service=smtpSourceInterface=wanSourceNetwork=wan_netDestinationInterface=dmzDestinationNetwork=ip_mailserverName=IDPMailSrvRu

Seite 422

from the external network that are based on the SMTP protocol.1. Select the Rule Action for the IDP rule2. Now enter:• Action: Protect• Signatures: IP

Seite 423 - 6.2.9. The H.323 ALG

Device:/> commitshould be issued to make those changes permanent.Note: Examples in this guide assume activation will be performedMost of the exampl

Seite 424 - H.323 ALG Configuration

The following are the recommendations for IDP employment:• Enable only the IDP signatures for the traffic that is being allowed. For example, if the I

Seite 425

6.6. Denial-of-Service Attacks6.6.1. OverviewThe same advantages that the Internet brings to business also benefit hackers who use the samepublic infr

Seite 426

The triggering factor is that the last fragment makes the total packet size exceed 65535 bytes,which is the highest number that a 16-bit integer can s

Seite 427

• By stripping the URG bit by default from all TCP segments traversing the system. This isconfigurable in the Web Interface by going to:System > Ad

Seite 428

• Smurf and Papasmurf type floods will be seen as ICMP Echo Responses at the victim side.Unless FwdFast rules are in use, such packets are never allow

Seite 429

If the attacker chooses a fragment offset higher than the limits imposed by the values specifiedin System > Advanced Settings > Length Limit Set

Seite 430

6.7. Blacklisting Hosts and NetworksOverviewcOS Core implements a Blacklist of host or network IP addresses which can be utilized to protectagainst tr

Seite 431

It is also important to understand that although whitelisting prevents a particular source frombeing blacklisted, it still does not prevent cOS Core m

Seite 432

Chapter 6: Security Mechanisms488

Seite 433

Chapter 7: Address TranslationThis chapter describes cOS Core address translation capabilities.• Overview, page 489• NAT, page 491• NAT Pools, page 49

Seite 434

mean the tunnels are lost and have to be re-established because the tunnel SAs are no longervalid.Checking Configuration IntegrityAfter changing a cOS

Seite 435

This section describes and provides examples of configuring NAT and SAT rules.Chapter 7: Address Translation490

Seite 436

7.2. NATDynamic Network Address Translation (NAT) provides a mechanism for translating original sourceIP addresses to a different address. Outgoing pa

Seite 437

destination port is used.However, since there is a possible range of 64,500 source ports and the same number fordestination ports, it is theoretically

Seite 438

195.11.22.33:32789 => 195.55.66.77:803. The recipient server then processes the packet and sends its response.195.55.66.77:80 => 195.11.22.33:32

Seite 439 - 6.2.10. The TLS ALG

The NATAction option could be left out since the default value is to use the interface address. Thealternative is to specify UseSenderAddress and use

Seite 440 - Enabling TLS

Service=http-allAction=AllowSourceAction=NATThe NATAction option could be left out since the default value is to use the interface address. Thealterna

Seite 441 - URLs Delivered by Servers

• Several internal machines can not communicate with the same external server using thesame IP protocol.Note: Restrictions only apply to IP level prot

Seite 442

protocol but the PPTP tunnel from the client terminates at the security gateway. When this trafficis relayed between the security gateway and the Inte

Seite 443 - 6.3. Web Content Filtering

7.3. NAT PoolsOverviewNetwork Address Translation (NAT) provides a way to have multiple internal clients and hosts withunique private, internal IP add

Seite 444 - RemoveApplets=Yes

is reached then an existing state with the longest idle time is replaced. If all states in the table isactive then the new connection is dropped. As a

Seite 445 - Wildcarding

4. Routing ... 2524.1. Overview ...

Seite 446 - Action=Whitelist

The CLI provides a command called sessionmanager for managing management sessionsthemselves. The command can be used to manage all types of management

Seite 447 - 6.3.4.1. Overview

Example 7.3. Using NAT PoolsThis example creates a stateful NAT pool with the external IP address range 10.6.13.10 to10.16.13.15. This is then used wi

Seite 448 - Dynamic WCF Processing Flow

• Name: my_stateful_natpool• Pool type: stateful• IP Range: nat_pool_range3. Select the Proxy ARP tab and add the WAN interface4. Click OKC. Finally,

Seite 449 - Dynamic WCF and Whitelisting

7.4. SAT7.4.1. IntroductioncOS Core Static Address Translation (SAT) functionality can translate ranges of IP addresses and/orport numbers to other, p

Seite 450 - Tip: Using a schedule

Translating Both Source and Destination AddressIt also possible to have two SAT rules triggering for the same connection. Although unusual, it ispossi

Seite 451 - ALG=content_filtering

Specifying the Type of Port MappingIf the Port property is specified for the SAT rule, cOS Core performs port translation in a way thatis slightly dif

Seite 452 - Audit Mode

Command-Line InterfaceCreate a SAT IP rule:Device:/> add IPRule Action=SATService=httpSourceInterface=wanSourceNetwork=all-netsDestinationInterface

Seite 453 - Allowing Override

2. Specify a suitable name for the rule, for example Allow_HTTP_To_DMZ3. Now enter:• Action: Allow• Service: http• Source Interface: wan• Source Netwo

Seite 454 - AllowReclassification=Yes

interface of the SAT rule must be set to any. The correct second rule for the external or internaltraffic is then selected based on the source interfa

Seite 455 - Category 2: News

Reversing the order of the NAT and Allow rules as shown below solves the problem.# Action Src Iface Src Net Dest Iface Dest Net Service SAT Action1 SA

Seite 456

Original Destination Address Translated Destination Address194.1.2.19 192.168.0.53194.1.2.20 192.168.0.54194.1.2.21 192.168.0.55194.1.2.22 192.168.0.5

Seite 457

The CLI script command is the tool used for script management and execution. The completesyntax of the command is described in the CLI Reference Guide

Seite 458

Create a SAT rule for the translation:Device:/> add IPRule Action=SATService=httpSourceInterface=anySourceNetwork=all-netsDestinationInterface=wanD

Seite 459 - Available Banner Files

3. Click OK and repeat for all 5 public IPv4 addressesCreate a SAT rule for the translation:1. Go to: Policies > Add > IPRule2. Specify a suitab

Seite 460 - Customizing Banner Files

The SAT IP rule to perform the translation would be:# Action Src Iface Src Net Dest Iface Dest Net Service SAT Action1 SAT any all-nets wan 194.1.2.16

Seite 461 - Tip: Saving changes

Device:/> add Address IPAddress wwwsrv_priv Address=10.10.10.5Publish the five public IPv4 addresses on the wan interface using ARP publish. A CLI

Seite 462 - 6.4. Anti-Virus Scanning

Finally, create an associated Allow rule:1. Go to: Policies > Add > IPRule2. Specify a suitable name for the rule, for example Allow_HTTP_To_DMZ

Seite 463 - Simultaneous Scans

• Attempts to communicate with the web server's public address - port 84, will result in aconnection to the web server's private address - p

Seite 464 - Database Updates

• External traffic to wan_ip will match rules 1 and 4, and will be sent to wwwsrv. This is correct.• Return traffic from wwwsrv will match rules 2 and

Seite 465

ii. Single Port - This is used for a one-to-one translation to the new port number specified.iii. Transposed - This transposes a range of port numbers

Seite 466 - 6.4.4. Anti-Virus Options

7.4.8. Protocols Handled by SATGenerally, SAT can handle all protocols that allow address translation to take place. However,there are protocols that

Seite 467 - Verifying the MIME Type

Chapter 7: Address Translation519

Seite 468

Device:/> script -execute -name=my_script.sgs 126.12.11.01 "If1 address"When the script file runs, the variable replacement would mean th

Seite 469 - 6.5.1. Overview

Chapter 8: User AuthenticationThis chapter describes how cOS Core implements user authentication.• Overview, page 520• Authentication Setup, page 522•

Seite 470 - Automatic Updating

Method A may require a special piece of equipment such as a biometric reader. Another problemwith A is that the special attribute often cannot be repl

Seite 471 - 6.5.3. IDP Rules

8.2. Authentication Setup8.2.1. Setup SummaryThe following list summarizes the steps for User Authentication setup with cOS Core:• Have an authenticat

Seite 472 - HTTP Normalization

policy that allows the connections.When specifying the Source Network for an IP rule or policy, a user defined IP object can be usedwhere the Authenti

Seite 473 - Insertion Attacks

If the Network behind user option is specified then this is the metric that will be used withthe route that is automatically added by cOS Core. If the

Seite 474 - 6.5.5. IDP Pattern Matching

Web InterfaceFirst, create a new user database:1. Go to: System > Device > Local User Databases > Add > LocalUserDatabase2. Now enter:• Na

Seite 475 - 6.5.6. IDP Signature Groups

RADIUS SecurityTo provide security, a common shared secret is configured on both the RADIUS client and theserver. This secret enables encryption of th

Seite 476 - IDP Signature Wildcarding

for security.A retry timeout value of 2 means that cOS Core will resend the authentication request to thesever if there is no response after 2 seconds

Seite 477 - 6.5.7. Setting Up IDP

LDAP IssuesUnfortunately, setting up LDAP authentication may not be as simple as, for example, RADIUSsetup. Careful consideration of the parameters us

Seite 478

• NameThe name given to the server object for reference purposes in cOS Core. For example, cOSCore authentication rules may be defined which reference

Seite 479 - IDP Traffic Shaping

Removing ScriptsTo remove a saved script, the script -remove command can be used. For example, to remove themy_script.sgs script file, the command wou

Seite 480 - IDP Database Updating

In Microsoft Active Directory, the groups a user belongs to can be found by looking at a usersdetails under the MemberOf tab.• Use Domain NameSome ser

Seite 481 - 6.6.3. Ping of Death Attacks

• Base ObjectDefines where in the LDAP server tree search for user accounts shall begin.The users defined on an LDAP server database are organized int

Seite 482 - 6.6.6. The WinNuke attack

contains the user password in plain text. The LDAP server administrator must make sure thatthis field actually does contain the password. This is expl

Seite 483 - 6.6.7. Amplification Attacks

• Total number of invalid usernames.• Total number of invalid password.LDAP Authentication CLI CommandsThe CLI objects that correspond to LDAP servers

Seite 484 - 6.6.9. The Jolt2 Attack

B. PPP Authentication with CHAP, MS-CHAPv1 or MS-CHAPv2 EncryptionIf PPP with CHAP, MS-CHAPv1 or MS-CHAPv2 is used for authentication, a digest of the

Seite 485

between the Clavister Security Gateway and the server must be protected. A VPN linkshould be used if the link between the two is not local.Access to t

Seite 486 - Whitelisting

rule since one single rule with XAuth as the agent will be used for all IPsec tunnels.However, this approach assumes that a single authentication sour

Seite 487 - The CLI blacklist Command

The maximum time that a connection can exist (no value is specified by default).If an authentication server is being used then the option to Use timeo

Seite 488

7. If a timeout restriction is specified in the authentication rule then the authenticated user willbe automatically logged out after that length of t

Seite 489 - 7.1. Overview

HTTP authentication cannot operate unless a rule is added to the IP rule set to explicitly allowauthentication to take place. This is also true with H

Seite 490

The following should be noted for automatically created scripts:• Automatically created scripts omit the object category.In the created script example

Seite 491 - 7.2. NAT

after authentication, as it is defined in the IP rule.It is assumed that the authentication IPv4 address object lan_users_net has been defined and thi

Seite 492 - Applying NAT Translation

2. Now enter:• Name: allow_http_auth• Action: NAT• Service: http-all• Source Interface: lan• Source Network: lan_users_net• Destination Interface any•

Seite 493

8.3. ARP AuthenticationARP authentication (sometimes referred to as MAC authentication) is authentication based on theMAC address of a connecting clie

Seite 494

Specifying the MAC Address on a ServerThe MAC address is entered as a text string in the database of the authenticating server. This textstring must f

Seite 495 - Protocols Handled by NAT

8.4. Customizing Authentication HTML PagesUser Authentication makes use of a set of HTML files to present information to the user duringthe authentica

Seite 496

HTML Page ParametersThe HTML pages for WebAuth can contain a number of parameters which are used as needed.These are:• %CHALLENGE_MESSAGE% - The quest

Seite 497

Follow the same steps used for the Web Interface below.Web Interface1. Go to: System > Advanced Settings > HTTP Banner files > Add > ALG B

Seite 498 - 7.3. NAT Pools

The usage of SCP clients is explained further in Section 2.1.6, “Secure Copy”.4. Using the CLI, the relevant user authentication rule should now be se

Seite 499 - Using NAT Pools

8.5. Policies Requiring AuthenticationOnce a user is authenticated to cOS Core, it is then possible to create security policies in the formof IP rules

Seite 500

InControlFollow the same steps used for the Web Interface below.Web InterfaceCreate the IP4Address object that specifies the IP range of connecting cl

Seite 501

Commenting Script FilesAny line in a script file that begins with the # character is treated as a comment. For example:# The following line defines th

Seite 502 - 7.4. SAT

8.6. User Identity AwarenessSometimes it is more convenient for client users if they can automatically validate themselves tocOS Core instead of being

Seite 503 - SAT IP Rule Properties

iii. The user's IP.The Identity Awareness Agent must be installed on all domain controllers that make up theactive directory.• The user's IP

Seite 504 - The Role of a DMZ

usernames that will be allowed are user1@mydomain and [email protected] is also assumed that the Clavister Authentication Agent software has already b

Seite 505

2. Select the User Authentication tab3. In the username box enter: user1@mydomain,user2@mydomain4. Click OKCreate an IP Policy which allows access to

Seite 506

Figure 8.4. The Identity Awareness Agent InterfaceThe Encryption Key and Listening IP should be set to the same values configured in the cOS CoreAuthe

Seite 507

• At least Windows Server 2008™ R2.• The role Remote Desktop Session Host must be installed.• The option IP virtualization per session must be enabled

Seite 508

8.7. Two Factor AuthenticationWhen access to resources is based on username and password credentials, the security can befurther strengthened by using

Seite 509

“Customizing Authentication HTML Pages”.• The administrator must configure the RADIUS server appropriately and that is not covered inthis document.• I

Seite 510

8.8. Radius RelayOverviewThe cOS Core feature RADIUS Relay is designed for telecom scenarios, such as Mobile DataOffloading (MDO), where User Equipmen

Seite 511

If this is not done on all DHCP servers, irrespective of whether they are used with RADIUSrelay or not, it could possibly create a security vulnerabil

Seite 512 - 194.1.2.30

File type Upload possible Download possibleSystem Backup (full.bak) Yes (also with WebUI) Yes (also with WebUI)Firmware upgrades Yes NoLicenses (licen

Seite 513

This optional IP address will be used as the sending IP of the request sent to the RADIUSserver. If not set, the IP address of the sending interface w

Seite 514 - 7.4.5. Port Translation

Device:/> add IPRule Action=AllowService=all_servicesSourceInterface=If1SourceNetwork=client_netDestinationInterface=If2DestinationNetwork=all-nets

Seite 515 - 7.4.6. SAT with FwdFast Rules

• Netmask: 255.255.255.03. Select the Options tab and enable the option:Distribute leases only to RADIUS relay authenticated clients4. Click OKCreate

Seite 516

specific attribute. The Clavister Vendor ID is 5089 and the Clavister-User-Group isdefined as vendor-type 1 with a string value type.Chapter 8: User A

Seite 517

Chapter 8: User Authentication564

Seite 518

Chapter 9: VPNThis chapter describes the Virtual Private Network (VPN) functionality in cOS Core.• Overview, page 565• VPN Quick Start, page 569• IPse

Seite 519

2. Client to LAN connection - Where many remote clients need to connect to an internalnetwork over the Internet. In this case, the internal network is

Seite 520 - 8.1. Overview

normally not handled at the network level but rather is usually done at a higher, transactionlevel.9.1.3. VPN PlanningAn attacker targeting a VPN conn

Seite 521

access per user (group) in the future.• Should the keys be changed? If they are changed, how often? In cases where keys are sharedby multiple users, c

Seite 522 - 8.2. Authentication Setup

9.2. VPN Quick StartOverviewLater sections in this chapter will explore VPN components in detail. To help put those latersections in context, this sec

Seite 523 - PPTP/L2TP Configuration

To download a configuration backup to the current local directory, the command would be:> scp [email protected]:config.bak ./To upload a file to an

Seite 524 - Specifying an SSH Public Key

9.2.1. IPsec LAN to LAN with Pre-shared KeysThe objective is to create a secure means of joining two networks: a Local Network which is onthe protecte

Seite 525 - RADIUS Usage with cOS Core

• An Allow rule for outbound traffic that has the previously defined ipsec_tunnel object asthe Destination Interface. The rule's Destination Netw

Seite 526 - Support for Groups

Note: The system time and date should be correctThe cOS Core date and time should be set correctly since certificates have an expiry dateand time.Also

Seite 527 - 8.2.4. External LDAP Servers

A. IP addresses already allocatedthe IPv4 addresses may be known beforehand and have been pre-allocated to the roamingclients before they connect. The

Seite 528 - General Settings

NoteThe option to dynamically add routes should not be enabled in LAN to LANtunnel scenarios.• Enable the option Require IKE XAuth user authentication

Seite 529

• Specify if the client will use config mode.There are a variety of IPsec client software products available from a number of suppliers and thismanual

Seite 530 - Database Settings

internal network and handed out to a client.• Use a new address range that is totally different to any internal network. This preventsany chance of an

Seite 531 - Optional Settings

• Add individual users to TrustedUsers. This should consist of at least a username andpassword combination.The Group string for a user can also be spe

Seite 532 - Usernames may need the Domain

The step to set up user authentication is optional since this is additional security to certificates.Also review Section 9.7, “CA Server Access”, whic

Seite 533 - LDAP Authentication and PPP

As described for L2TP, the NAT rule lets the clients access the public Internet via the ClavisterSecurity Gateway.5. Set up the client. For Windows XP

Seite 534

confirmation.The console password can be any sequence of characters but must be no greater than 64characters in length. It is recommended to use only

Seite 535 - 8.2.5. Authentication Rules

with a PSK tunnel for L2TP/IPsec.7. Create a User Authentication Rule with the following properties:i. Authentication Agent: XAuthii. Authentication S

Seite 536 - Connection Timeouts

9.3. IPsec ComponentsThis section looks at the IPsec standards and describes in general terms the various components,techniques and algorithms that ar

Seite 537 - Multiple Logins

IPsec protocol used (ESP/AH/both) as well as the session keys used to encrypt/decrypt and/orauthenticate/verify the transmitted data.An SA is unidirec

Seite 538 - 8.2.7. HTTP Authentication

will reply by saying that nothing on the list was acceptable, and possibly also provide a textualexplanation for diagnostic purposes.This negotiation

Seite 539 - Forcing Users to a Login Page

unique piece of data uniquely identifying the endpoint.Authentication using Pre-Shared Keys is based on theDiffie-Hellman algorithm.Local and RemoteNe

Seite 540

parameters, such as Diffie-Hellman groups and PFS, cannotbe negotiated and this mean it is important to have"compatible" configurations at b

Seite 541

It is specified in time (seconds) as well as data amount(kilobytes). Whenever one of these expires, a new phase-1exchange will be performed. If no dat

Seite 542 - 8.3. ARP Authentication

authentication.The algorithms supported by Clavister Security GatewayVPNs are:• SHA1• MD5IPsec Lifetime This is the lifetime of the VPN connection. It

Seite 543 - 00-0c-19-f9-14-6f

Manual Keying AdvantagesSince it is very straightforward it will be quite interoperable. Most interoperability problemsencountered today are in IKE. M

Seite 544 - HTTP Banner Files

case when using pre-shared keys and roaming clients. Instead, should a client be compromised,the client's certificate can simply be revoked. No n

Seite 545

• Reset to Factory DefaultsThis option will restore the hardware to its initial factory state. The operations performed ifthis option is selected are

Seite 546 - Uploading with SCP

Figure 9.2. The ESP protocol9.3.5. NAT TraversalBoth IKE and IPsec protocols present a problem in the functioning of NAT. Both protocols werenot desig

Seite 547

UDP EncapsulationAnother problem that NAT traversal resolves is that the ESP protocol is an IP protocol. There is noport information as we have in TCP

Seite 548

CAST128, MD5, SHA1.Example 9.1. Using an Algorithm Proposal ListThis example shows how to create and use an IPsec Algorithm Proposal List for use in t

Seite 549

9.3.7. Pre-shared KeysPre-Shared Keys are used to authenticate VPN tunnels. The keys are secrets that are shared bythe communicating parties before co

Seite 550 - 8.6. User Identity Awareness

2. Enter a name for the pre-shared key, for example MyPSK3. Choose Hexadecimal Key and click Generate Random Key to generate a key to thePassphrase te

Seite 551 - Setting Up Identity Awareness

Command-Line InterfaceFirst create an Identification List:Device:/> add IDList MyIDListThen, create an ID:Device:/> cc IDList MyIDListDevice:/My

Seite 552

• Country: Sweden• Email Address: [email protected]. Click OKFinally, apply the Identification List to the IPsec tunnel:1. Go to: Network > I

Seite 553

9.4. IPsec TunnelsMany of the properties of the IPsec tunnel objects required for tunnel establishment havealready been discussed in Section 9.3.2, “I

Seite 554

negotiations then take place, resulting in the tunnel becoming established to the remoteendpoint.Local Initiation of Tunnel EstablishmentAlternatively

Seite 555 - Device:/> authagentsnoop

The advanced settings for DPD are described further in Section 9.4.6, “IPsec Advanced Settings”.DPD is enabled by default for cOS Core IPsec tunnels.

Seite 556 - Processing Sequence

6.2.9. The H.323 ALG ... 4236.2.10. The TLS ALG ...

Seite 557

Note: Output buffer limitationsThe only limitation with issuing CLI commands through the serial console is that there isa finite buffer allocated for

Seite 558 - 8.8. Radius Relay

• Set up the Rules (a 2-way tunnel requires 2 rules).9.4.3. Roaming ClientsAn employee who is on the move who needs to access a central corporate serv

Seite 559

1. Go to: Network > Interfaces and VPN > IPsec > Add > IPsec Tunnel2. Now enter:• Name: RoamingIPsecTunnel• Local Network: 10.0.1.0/24 (Th

Seite 560

B. Upload all the client self-signed certificates:1. Go to: Objects > Key Ring > Add > Certificate2. Enter a suitable name for the Certificat

Seite 561

• Identification List: Select the ID List that is to be associated with the VPN Tunnel. In thiscase, it will be sales5. Under the Routing tab:• Enable

Seite 562

5. Enter the name for the client6. Select Email as Type7. In the Email address field, enter the email address selected when the certificate wascreated

Seite 563

with IP addresses and corresponding netmasks, and to exchange other types of informationassociated with DHCP. The IP address provided to a client can

Seite 564

Example 9.8. Using Config Mode with IPsec TunnelsAssuming a predefined tunnel called vpn_tunnel1 this example shows how to enable ConfigMode for that

Seite 565 - Chapter 9: VPN

A Root Certificate usually includes the IP address or hostname of the Certificate Authority tocontact when certificates or CRLs need to be downloaded

Seite 566 - 9.1.2. VPN Encryption

The ikesnoop command can be entered via a CLI console or directly via the RS232 Console.To begin monitoring the full command is:Device:/> ikesnoop

Seite 567 - 9.1.4. Key Distribution

Life type : SecondsLife duration : 43200Life type : KilobytesLife duration : 50000Transform 2/4Transform ID : IKEEncryption algorithm : Rijndael-cbc (

Seite 568

If the administrator expects that configuration changes will break the communicationbetween cOS Core and the web browser (for example, by changing the

Seite 569 - 9.2. VPN Quick Start

Authentication method: Pre-shared key or certificateGroup description: Diffie Hellman (DH) groupLife type: Seconds or kilobytesLife duration: No of se

Seite 570

Step 3. Clients Begins Key ExchangeThe server has accepted a proposal at this point and the client now begins a key exchange. Inaddition, NAT detectio

Seite 571 - Interface Network Gateway

Payload data length : 16 bytesN (Notification)Payload data length : 8 bytesProtocol ID : ISAKMPNotification : Initial contactExplanation of Above Valu

Seite 572

SA life duration : 50000Encapsulation mode : TunnelTransform 2/4Transform ID : Rijndael (aes)Key length : 128Authentication algorithm : HMAC-SHA-1SA l

Seite 573

Packet length : 156 bytes# payloads : 5Payloads:HASH (Hash)Payload data length : 16 bytesSA (Security Association)Payload data length : 56 bytesDOI :

Seite 574 - Configuring IPsec Clients

Default: 4 times the license limit of IPsec Max TunnelsIPsec Max TunnelsSpecifies the total number of IPsec tunnels allowed. This value is initially t

Seite 575

turn be signed by another CA, which may be signed by another CA, and so on. Each certificatewill be verified until one that has been marked as "t

Seite 576

Default: InlineDisable Public-Key Hardware AccelerationThis option would only be enabled for troubleshooting and diagnostic purposes. In normaloperati

Seite 577

Default: 15 secondsChapter 9: VPN618

Seite 578 - 9.2.7. PPTP Roaming Clients

9.5. PPTP/L2TPThe access by a client using a modem link over dial-up public switched networks, possibly withan unpredictable IP address, to protected

Seite 579 - 9.2.8. iOS Setup

An Alternative Method of Changing Management InterfaceAn alternative method of changing the management interface and to avoid the 30 second delayentir

Seite 580

Troubleshooting PPTPA common problem with setting up PPTP is that a router and/or switch in a network is blockingTCP port 1723 and/or IP protocol 47 b

Seite 581 - 9.3. IPsec Components

9.5.2. L2TP ServersLayer 2 Tunneling Protocol (L2TP) is an IETF open standard that overcomes many of the problemsof PPTP. Its design is a combination

Seite 582 - IKE Algorithm Proposals

4. Under the PPP Parameters tab, select L2TP_Pool in the IP Pool control.5. Under the Add Route tab, select all-nets in the Allowed Networks control.6

Seite 583 - IPsec Tunnel Properties

Now we will setup the IPsec Tunnel, which will later be used in the L2TP section. As we are goingto use L2TP, the Local Network is the same IP as the

Seite 584

l2tp_ipsec. ProxyARP also needs to be configured for the IPs used by the L2TP Clients.C. Setup the L2TP Tunnel:Command-Line InterfaceDevice:/> add

Seite 585

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Policies > User Authentication User Authentication Rules > Add >

Seite 586

• Action: Allow• Service: all_services• Source Interface: l2tp_tunnel• Source Network: l2tp_pool• Destination Interface: any• Destination Network: all

Seite 587 - 9.3.3. IKE Authentication

Pass L2TP traffic sent to the Clavister Security Gateway directly to the L2TP Server withoutconsulting the rule set.Default: EnabledPPTP Before RulesP

Seite 588

• Activity Sense - Specifies if dial-on-demand should trigger on Send or Recv or both.• Idle Timeout - The time of inactivity in seconds to wait befor

Seite 589 - AH (Authentication Header)

L2TP Version 3 (L2TPv3) is a tunneling protocol that is an alternative to standard L2TP (standardL2TP is also referred to as L2TPv2). L2TPv2 can only

Seite 590 - 9.3.5. NAT Traversal

4. Set the following:• IP address: 192.168.1.25. Click OKNote: In virtualized configurations, interfaces addresses are stored in the top level of the

Seite 591 - NAT Traversal Configuration

Change the properties of the Ethernet interface connected to the protected network so thatTransparent Mode is enabled.C. Set any required L2TPv3 Serve

Seite 592

IP=If3_ipLocalNetwork=If3_netInterface=If2ServerIP=If2_ipB. Next, enable transparent mode on the protected interface If3:Device:/> set Interface Et

Seite 593 - 9.3.7. Pre-shared Keys

Assume the same scenario as the previous example, but this time the L2TPv3 tunnel is itselfbeing tunneled through an IPsec Tunnel object called my_ips

Seite 594 - 9.3.8. Identification Lists

The cOS Core L2TPv3 server can handle VLAN tagged Ethernet frames so that a protectedinternal network can be accessed by external clients over VLAN co

Seite 595

Device:/> add Interface VLAN my_vlan_localEthernet=If3VLANID=555IP=If3_arbitrary_ip1Network=If3_netAutoSwitchRoute=YesC. Last, create a VLAN object

Seite 596

5. Click OKC. Last, create a VLAN object on the L2TPv3 tunnel interface my_l2tpv3_if:1. Go to: Network > Interfaces and VPN > VLAN > Add >

Seite 597 - 9.4. IPsec Tunnels

9.6. SSL VPN9.6.1. OverviewcOS Core provides an additional type of VPN connection called SSL VPN. This makes use of theSecure Sockets Layer (SSL) prot

Seite 598 - Dead Peer Detection

iv. Client users need to be defined in the Authentication Source of the authentication rule.This source can be a local user database, a RADIUS server

Seite 599 - IPsec Tunnel Quick Start

network and these define the relationship between the security gateway and the connectingclients.A private IP network should be used for this purpose.

Seite 600 - 9.4.3. Roaming Clients

Note: Pool addresses must not exceed a /24 network sizeSSL VPN will not function correctly if an IP address is handed out that exceeds thesize of a Cl

Seite 601

Example 2.7. Changing the HA Management IP AddressThis example will change the slave management IP address for the lan interface to 192.168.1.2 foran

Seite 602

If this option has not been chosen before, it must be selected first to install theproprietary Clavister SSL VPN client application.ii. Connect the SS

Seite 603

Figure 9.6. The SSL VPN Client LoginThe difference between the two approaches above is that when the SSL VPN client software isstarted by browsing to

Seite 604 - Using Config Mode

Figure 9.7. The SSL VPN Client StatisticsSSL VPN Client OperationWhenever the SSL VPN client application runs, the following happens:• A route is adde

Seite 605

Should the SSL VPN client application terminate prematurely for some reason, the Windowsrouting table may not be left in a consistent state and the au

Seite 606 - Local Gateway

1. Go to: Network > Interfaces and VPN > SSL > Add > SSL VPN Interface2. Now enter:• Specify a suitable name, in this example my_sslvpn_if

Seite 607 - Using ikesnoop

For external client connection, a web browser should be directed to the IP address my_sslvpn_if.This is done either by typing the actual IP address or

Seite 608 - The Client and the Server

9.7. CA Server AccessOverviewCertificate validation can be done by accessing a separate Certifícation Server (CA) server. Forexample, the two sides of

Seite 609 - Explanation of Values

Gateway through the public DNS system.The same steps should be followed if the other side of the tunnel is another securitygateway instead of being ma

Seite 610

the way they work but the majority will attempt to validate the certificate.Placement of Private CA ServersThe easiest solution for placement of a pri

Seite 611

9.8. VPN TroubleshootingThis section deals with how to troubleshoot the common problems that are found with VPN.9.8.1. General TroubleshootingIn all t

Seite 612 - Step 6. Server ID Response

• User Database: AdminUsers• Interface: If2• Network: all-nets5. Click OK2.1.9. Management Advanced SettingsUnder the Remote Management section of the

Seite 613

9.8.2. Troubleshooting CertificatesIf certificates have been used in a VPN solution then the following should be looked at as asource of potential pro

Seite 614 - IPsec Max Rules

For example, with a large number of tunnels avoid using:Device:/> ipsecstat -num=allAnother example of what to avoid with many tunnels is:Device:/&

Seite 615

3. Ike_invalid_payload, Ike_invalid_cookie.4. Payload_Malformed.5. No public key found.6. ruleset_drop_packet.1. Could not find acceptable proposal /

Seite 616 - IPsec Hardware Acceleration

Name Local Network Remote Network Remote GatewayVPN-3 lannet office3net office3gwSince the tunnel L2TP in the above table is above the tunnel VPN-3, a

Seite 617 - DPD Expire Time

• The Clavister Security Gateway is unable to reach the Certificate Revocation List (CRL) on theCA server in order to verify if the certificate is val

Seite 618 - Default: 15 seconds

In this scenario, it can be seen that the defined remote network on Side B is larger than thatdefined for Side A's local network. This means that

Seite 620 - Troubleshooting PPTP

Chapter 10: Traffic ManagementThis chapter describes how cOS Core can manage network traffic.• Traffic Shaping, page 657• IDP Traffic Shaping, page 67

Seite 621 - 9.5.2. L2TP Servers

to the outer IP header of ESP packets of IPsec tunnels. The field can alternatively be set to afixed value in the outer tunnel packets as described in

Seite 622

Clavister Security Gateway. Different rate limits and traffic guarantees can be created as policiesbased on the traffic's source, destination and

Seite 623

• Realtime loggers: 4• Stat pollers: 4• Receive contexts: 2• Send contexts: 4NetConMaxChannels is the maximum total allowed for all these connection t

Seite 624

Security Gateway. One, none or a series of pipes may be specified.• The Return ChainThese are the pipe or pipes that will be used for incoming (arrivi

Seite 625

Figure 10.2. FwdFast Rules Bypass Traffic ShapingUsing Pipes with Application ControlWhen using the Application Control feature, it is possible to ass

Seite 626 - L2TP Before Rules

3. Enter 2000 in the Total textbox under Pipe Limits4. Click OKTraffic needs to be passed through the pipe and this is done by using the pipe in a Pip

Seite 627 - 9.5.4. PPTP/L2TP Clients

A single pipe does not care in which direction the traffic through it is flowing when it calculatestotal throughout. Using the same pipe for both outb

Seite 628 - 9.5.5. L2TP Version 3

Follow the same steps used for the Web Interface below.Web Interface1. Go to: Traffic Management > Traffic Shaping > Pipe Rules2. Right-click on

Seite 629 - 9.5.5.1. L2TPv3 Server

Figure 10.3. Differentiated Limits Using ChainsIf surfing uses the full limit of 125 Kbps, those 125 Kbps will occupy half of the std-in pipe leaving1

Seite 630

Figure 10.4. The Eight Pipe PrecedencesPrecedence Priority is RelativeThe priority of a precedence comes from the fact that it is either higher or low

Seite 631 - Using IPsec for Encryption

handle. If a packet arrives with an already allocated precedence below the minimum then itsprecedence is changed to the minimum. Similarly, if a packe

Seite 632 - Setup With VLANs

Lowest Precedence LimitsIt is usually is not needed to have a limit specified for the lowest (best effort) precedence sincethis precedence simply uses

Seite 633 - ServerIP=If2_ip

If more than 96 Kbps of precedence 2 traffic arrives, any excess traffic will be moved down to thebest effort precedence. All traffic at the best effo

Seite 634

Object OrganizationIn the Web Interface the configuration objects are organized into a tree-like structure based onthe type of the object.In the CLI,

Seite 635

before ssh-in and telnet-in, then traffic will reach std-in at the lowest precedence onlyand hence compete for the 250 Kbps of available bandwidth wit

Seite 636 - 9.6. SSL VPN

In addition to, or as an alternative to the total group limit, individual precedences can havevalues specified. These values are, in fact, guarantees

Seite 637 - SSL VPN with PPPoE

• Set the pipe limit, as usual, to be 400 Kbps.• Set the Grouping option for the pipe to have the value Destination IP.• Set the total for the pipe&ap

Seite 638

balancing lowers the limit per user to about 13 Kbps (64 Kbps divided by 5 users).Dynamic Balancing takes place within each precedence of a pipe indiv

Seite 639

changing conditions.Attacks on BandwidthTraffic shaping cannot protect against incoming resource exhaustion attacks, such as DoS attacksor other flood

Seite 640

• Dynamic Balancing can be used to specify that all users in a group get a fair and equalamount of bandwidth.10.1.10. More Pipe ExamplesThis section l

Seite 641 - Client Transfer Statistics

RuleNameForwardPipesReturnPipesSourceInterfaceSourceNetworkDestinationInterfaceDestinationNetworkSelectedServiceall_1mbps out-pipe in-pipe lan lannet

Seite 642 - Client Cleanup

RuleNameForwardPipesReturnPipesSourceInterfaceSourceNetworkDestInterfaceDestNetworkSelectedServicePrecedenceother out-otherout-pipein-otherin-pipelan

Seite 643 - 9.6.4. SSL VPN Setup Example

Total: 2000The following pipe rules are then needed to force traffic into the correct pipes and precedencelevels:RuleNameForwardPipesReturnPipesSrcInt

Seite 644

10.2. IDP Traffic Shaping10.2.1. OverviewThe IDP Traffic Shaping feature is traffic shaping that is performed based on information comingfrom the cOS

Seite 645

values of the object properties. This example shows how to display the contents of aconfiguration object representing the telnet service.Command-Line

Seite 646 - 9.7. CA Server Access

This will be the period of time after rule triggering during which traffic shaping is applied toany associated connections that are opened.Typically,

Seite 647 - CA Server Access by Clients

Unintended ConsequencesTo explain this unintended traffic shaping, consider a client A that connects to host X with P2Ptraffic and triggers an IDP rul

Seite 648 - Turning Off validation

Figure 10.8. IDP Traffic Shaping P2P Scenario10.2.6. Viewing Traffic Shaping ObjectsViewing HostsIDP traffic shaping has a special CLI command associa

Seite 649 - 9.8. VPN Troubleshooting

Device:/> pipes -showThe IDP Traffic Shaping pipes can be recognized by their distinctive naming convention which isexplained next.Pipe NamingcOS C

Seite 650 - The ipsecstat console command

10.3. Threshold RulesOverviewThe objective of a Threshold Rule is to have a means of detecting abnormal connection activity aswell as reacting to it.

Seite 651 - The ikesnoop console command

• Host BasedThe threshold is applied separately to connections from different IP addresses.• Network BasedThe threshold is applied to all connections

Seite 652 - 2. Incorrect pre-shared key

The length of time, in seconds, for which the source is blacklisted can also be set.This feature is discussed further in Section 6.7, “Blacklisting Ho

Seite 653 - 5. No public key found

10.4. Server Load Balancing10.4.1. OverviewThe Server Load Balancing (SLB) feature allows the administrator to spread client applicationrequests over

Seite 654 - 9.8.6. Specific Symptoms

• SLB can allow network administrators to perform maintenance tasks on servers orapplications without disrupting services. Individual servers can be r

Seite 655

10.4.3. Selecting StickinessIn some scenarios, such as with SSL connections, it is important that the same server is used for aseries of connections f

Seite 656

InControlFollow the same steps used for the Web Interface below.Web Interface1. Go to: Objects > Services2. Select the telnet entry in the list3. I

Seite 657 - 10.1. Traffic Shaping

The default value for this setting is 2048 slots in the table.• Net SizeThe processing and memory resources required to match individual IP addresses

Seite 658 - Traffic Shaping Objectives

Figure 10.11. Stickiness and Round-RobinIf the connection-rate algorithm is applied instead, R1 and R2 will be sent to the same serverbecause of stick

Seite 659 - Pipe Rule Chains

that the routing table chosen must necessarily contain routes for all the servers in the SLB rule.)Monitoring MethodsThe method by which hosts are pol

Seite 660

• PortsThe port number for polling when using the TCP or HTTP option.More than one port number can be specified in which case all ports will be polled

Seite 661

The table below shows the rules that would be defined for a typical scenario of a set of webservers behind the Clavister Security Gateway for which th

Seite 662

Device:/> add IPRule Action=SLB_SATSourceInterface=anySourceNetwork=all-netsDestinationInterface=coreDestinationNetwork=wan_ipService=http-allSLBAd

Seite 663

1. Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule2. Enter:• Name: web_slb• Action: SLB_SAT• Service: HTTP• Source Interface

Seite 664 - The Correct Solution

• Source Network: all-nets• Destination Interface: core• Destination Network: wan_ip3. Click OKChapter 10: Traffic Management697

Seite 665 - 10.1.6. Precedences

Chapter 10: Traffic Management698

Seite 666

Chapter 11: High AvailabilityThis chapter describes the high availability fault-tolerance feature in Clavister Security Gateways.• Overview, page 699•

Seite 667 - Tip: Specifying bandwidth

8.8. Radius Relay ... 5589. VPN ...

Seite 668 - The Need for Guarantees

4. In the Name text box, enter myhost5. Enter 192.168.10.10 in the IP Address textbox6. Click OK7. Verify that the new IP4 address object has been add

Seite 669 - Differentiated Guarantees

longer operational.Interconnection of Cluster UnitsIn a cluster, the master and slave units must be directly connected to each other by asynchronizati

Seite 670 - 10.1.7. Pipe Groups

network failures between a single Clavister Security Gateway and hosts. This technique isdescribed further in Section 2.4.3, “The Link Monitor”.Licens

Seite 671 - Another Simple Groups Example

11.2. HA MechanismsThis section discusses in more depth the mechanisms cOS Core uses to implement the highavailability feature.Basic PrinciplesClavist

Seite 672 - Dynamic Balancing

• The destination MAC address is the Ethernet multicast address corresponding to the sharedhardware address and this has the form:11-00-00-00-nn-mmWhe

Seite 673 - Relying on the Group Limit

3. The inactive (slave) unit reconfigures to activate the new database files.4. The active (master) unit now reconfigures to activate the new database

Seite 674 - Troubleshooting

11.3. Setting Up HAThis section provides a step-by-step guide for setting up an HA Cluster. Setup is explained in thefollowing subsections:• Physical

Seite 675 - 10.1.10. More Pipe Examples

• The individual addresses specified for an interface in an IP4 HA Address object allowremote management through that interface. These addresses can a

Seite 676 - Pipe Chaining

In the scenario shown above, the lan interface on the master and the lan interface on the slavewould be connected to the same switch which then connec

Seite 677 - A VPN Scenario

connected to the slave unit in the cluster. The procedure for doing this with each unit is asfollows:1. Connect to the Clavister Security Gateway thro

Seite 678 - SAT with Pipes

The easiest and quickest way to configure a new master unit is as follows:1. Use the normal configuration backup function to make a backup of the conf

Seite 679 - 10.2. IDP Traffic Shaping

3. In the dropdown menu displayed, select Undo DeleteListing Modified ObjectsAfter modifying several configuration objects, you might want to see a li

Seite 680 - 10.2.3. Processing Flow

Note: IP addresses could be public IPv4 addressesThe term "private IPv4 address" is not strictly correct when used here. Eitheraddress used

Seite 681 - 10.2.5. A P2P Scenario

so that it is unique (the default value is 0). The Cluster ID determines that the MAC address forthe cluster is unique.• Enabling the advanced setting

Seite 682 - Viewing Pipes

11.4. HA IssuesThe following points should be kept in mind when managing and configuring an HA Cluster.VPN Tunnel SynchronizationcOS Core provides com

Seite 683 - 10.2.8. Logging

The unique individual IP addresses of the master and slave cannot safely be used for anythingbut management. Using them for anything else, such as for

Seite 684 - 10.3. Threshold Rules

Both Units Going ActiveIn the case of a misconfiguration of an HA cluster, a worst case scenario could arise where boththe master and slave think the

Seite 685 - Threshold Rule Blacklisting

11.5. Upgrading an HA ClusterThe cOS Core software versions running on the master and slave in an HA cluster should be thesame. When a new cOS Core ve

Seite 686

Now, connect to the active unit (which is still running the old cOS Core version) with a CLIconsole and issue the ha -deactivate command. This will ca

Seite 687 - 10.4. Server Load Balancing

11.6. Link Monitoring and HARedundant Network PathsWhen using an HA configuration, it can be important to use redundant paths to vital resourcessuch a

Seite 688 - Identifying the Servers

11.7. HA Advanced SettingsThe following cOS Core advanced settings are available for High Availability:Sync Buffer SizeHow much sync data, in Kbytes,

Seite 689 - 10.4.3. Selecting Stickiness

Chapter 11: High Availability719

Seite 690

This example shows how to activate and commit a new configuration.Command-Line InterfaceDevice:/> activateThe system will validate and start using

Seite 691 - 10.4.5. SLB Server Monitoring

Chapter 12: Advanced SettingsThis chapter describes the additional configurable advanced settings for cOS Core that are notalready described in the ma

Seite 692 - Polling Options

attack to be based on illegal checksums.Default: EnabledLog non IPv4/IPv6Logs occurrences of IP packets that are not IPv4 or IPv6.Default: EnabledLog

Seite 693

Multicast TTL on LowWhat action to take on too low multicast TTL values.Default: DropLogDefault TTLIndicates which TTL cOS Core is to use when origina

Seite 694

IP router alert optionHow to handle IP packets with contained route alert.Default: ValidateLogBadIP Options OtherAll options other than those specifie

Seite 695

12.2. TCP Level SettingsTCP Option SizesVerifies the size of TCP options. This function acts in the same way as IPOptionSizes describedabove.Default:

Seite 696

Default: 7000 bytesTCP Auto ClampingAutomatically clamp TCP MSS according to MTU of involved interfaces, in addition toTCPMSSMax.Default: EnabledTCP Z

Seite 697

TCP Option ALTCHKREQDetermines how cOS Core will handle alternate checksum request options. These options wereinitially intended to be used in negotia

Seite 698

TCP SYN/RSTThe TCP RST flag together with SYN; normally invalid (strip=strip RST).Default: DropLogTCP SYN/FINThe TCP FIN flag together with SYN; norma

Seite 699 - Chapter 11: High Availability

Default: DropLogTCP Sequence NumbersDetermines if the sequence number range occupied by a TCP segment will be compared to thereceive window announced

Seite 700

12.3. ICMP Level SettingsICMP Sends Per Sec LimitSpecifies the maximum number of ICMP messages cOS Core may generate per second. Thisincludes ping rep

Seite 701 - Licensing

2.2. Events and Logging2.2.1. OverviewThe ability to log and analyze system activities is an essential feature of cOS Core. Loggingenables not only mo

Seite 702 - 11.2. HA Mechanisms

12.4. State SettingsConnection ReplaceAllows new additions to the cOS Core connection list to replace the oldest connections if there isno available s

Seite 703 - HA with Anti-Virus and IDP

• LogAll – Logs all packets in the connection.Default: LogLog Connection UsageThis generates a log message for every packet that passes through a conn

Seite 704 - Dealing with Sync Failure

12.5. Connection Timeout SettingsThe settings in this section specify how long a connection can remain idle, that is to say with nodata being sent thr

Seite 705 - 11.3. Setting Up HA

Connection lifetime for IGMP in seconds.Default: 12Other Idle LifetimeSpecifies in seconds how long connections using an unknown protocol can remain i

Seite 706

12.6. Length Limit SettingsThis section contains information about the size limits imposed on the protocols directly under IPlevel, such as TCP, UDP a

Seite 707

Max AH LengthSpecifies in bytes the maximum size of an AH packet. AH, Authentication Header, is used by IPsecwhere only authentication is applied. Thi

Seite 708 - Installing a New Master Unit

Default: EnabledChapter 12: Advanced Settings736

Seite 709

12.7. Fragmentation SettingsIP is able to transport up to 65536 bytes of data. However, most media, such as Ethernet, cannotcarry such huge packets. T

Seite 710

number of samples, it is more likely to find mismatching duplicates. However, more comparisonsresult in higher CPU load.Default: Check8 – compare 8 ra

Seite 711 - Problem Diagnosis

of the packet. DuplicateFrags determines whether such a fragment should be logged. Note thatDuplicateFragData can also cause such fragments to be logg

Seite 712 - 11.4. HA Issues

• Emergency• Alert• Critical• Error• Warning• Notice• Info• DebugBy default, cOS Core sends all messages of level Info and above to any configured log

Seite 713

packet from arriving.Default: 20Reassembly Illegal LimitOnce a whole packet has been marked as illegal, cOS Core is able to retain this in memory for

Seite 714 - IPv6 Support

12.8. Local Fragment Reassembly SettingsMax ConcurrentMaximum number of concurrent local reassemblies.Default: 256Max SizeMaximum size of a locally re

Seite 715 - 11.5. Upgrading an HA Cluster

12.9. SSL SettingsSSL Processing PriorityThe maximum amount of CPU resources that SSL processing is allowed to use for opening newSSL connections. Thi

Seite 716 - HA going INACTIVE

Enable cipher TLS_RSA_EXPORT_WITH_NULL_SHA1 (no encryption, just message validation).Default: DisabledTLS RSA EXPORT NULL MD5Enable cipher TLS_RSA_EXP

Seite 717 - 11.6. Link Monitoring and HA

12.10. Miscellaneous SettingsUDP Source Port 0How to treat UDP packets with source port 0.Default: DropLogPort 0How to treat TCP/UDP packets with dest

Seite 718 - 11.7. HA Advanced Settings

value for some specific issues.If cOS Core is upgraded, Dynamic High Buffers should be enabled since the memoryrequirements of a new version may chang

Seite 719

be allocated, regardless of this setting. For more information about pipes and pipe users, seeSection 10.1, “Traffic Shaping”.Default: 512Chapter 12:

Seite 720 - Chapter 12: Advanced Settings

Chapter 12: Advanced Settings747

Seite 721

Appendix A: Update SubscriptionsOverviewA number of cOS Core features function by accessing the Clavister Service Provisioning Network(CSPN) which con

Seite 722

• Providing a log server has been configured, a log message will be sent which indicates thatsubscription renewal is required.Important: Renew subscri

Seite 723

An SNMP2c Event Receiver can be defined to collect SNMP Trap log messages. These receiversare typically used to collect and respond to critical alerts

Seite 724 - 12.2. TCP Level Settings

Querying Server StatusTo get the status of the Clavister network servers use the command:Device:/> updatecenter -serversDeleting Local DatabasesSom

Seite 725

Appendix B: IDP Signature GroupsFor IDP scanning, the following signature groups are available for selection. There is a version ofeach group under th

Seite 726

Group Name Intrusion TypeFTP_DIRNAME Directory name attackFTP_FORMATSTRING Format string attackFTP_GENERAL FTP protocol and implementationFTP_LOGIN Lo

Seite 727

Group Name Intrusion TypeP2P_GENERAL General P2P toolsP2P_GNUTELLA Gnutella P2P toolPACKINGTOOLS_GENERAL General packing tools attackPBX_GENERAL PBXPO

Seite 728 - Allow TCP Reopen

Group Name Intrusion TypeSSL_GENERAL SSL protocol and implementationTCP_GENERAL TCP protocol and implementationTCP_PPTP Point-to-Point Tunneling Proto

Seite 729 - 12.3. ICMP Level Settings

Appendix C: Verified MIME filetypesSome cOS Core Application Layer Gateways (ALGs) have the optional ability to verify that thecontents of a downloade

Seite 730 - 12.4. State Settings

Filetype extension Applicationcmf Creative Music filecore/coredump Unix core dumpcpl Windows Control Panel Extension filedbm Database filedcx Graphics

Seite 731 - Max Connections

Filetype extension Applicationmmf Yamaha SMAF Synthetic Music Mobile Application Formatmng Multi-image Network Graphic Animationmod Ultratracker modul

Seite 732

Filetype extension Applicationso UNIX Shared Library filesof ReSOF archivesqw SQWEZ archive datasqz Squeeze It archive datastm Scream Tracker v2 Modul

Seite 733 - Other Idle Lifetime

Appendix D: The OSI FrameworkOverviewThe Open Systems Interconnection (OSI) model defines a framework for inter-computercommunications. It categorizes

Seite 734 - 12.6. Length Limit Settings

Feb 5 2000 09:45:23 gateway.ourcompany.com EFW: DROP:Subsequent text is dependent on the event that has occurred.In order to facilitate automated proc

Seite 735

Appendix E: Third Party Software LicensesThe cOS Core product makes use of a number of third party software modules which are subjectto the following

Seite 736 - Default: Enabled

to that copy.3. Object Code Incorporating Material from Library Header Files. The object code form of anApplication may incorporate material from a he

Seite 737 - 12.7. Fragmentation Settings

work.6. 6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundationmay publish revised and/or new versions of the GNU L

Seite 738 - Duplicate Fragments

royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of,publicly display, publicly perform, sublicense, and distribute t

Seite 739 - Reassembly Done Limit

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensorprovides the Work (and each Contributor provides its Con

Seite 740 - Reassembly Illegal Limit

Martin Wendt. Dual licensed under the MIT (see above) or GPL Version 2 licenses.flot by MITJavascript plotting library for jQuery. Released under the

Seite 741 - Large Buffers

Alphabetical IndexAaccess rules, 380accounting, 82advanced settings, 87and high availability, 86configuring, 84interim messages, 84limitations with NA

Seite 742 - 12.9. SSL Settings

HTTP, 538identity awareness agent, 553local user database, 522MAC address duplicate problem, 543rules, 535setup summary, 522source, 536SSH client key

Seite 743 - TLS RSA EXPORT NULL MD5

changing password, 58enabling password, 57line speed, 45password length, 57content filteringcategories, 455order of static and dynamic, 444phishing, 4

Seite 744 - 12.10. Miscellaneous Settings

evasion attack prevention, 473events, 73log message receivers, 74log messages, 73FFailed Fragment Reassembly setting, 738filetype download block/allow

Seite 745

RFC 5424 ComplianceBy default, cOS Core sends Syslog messages in a format that is suitable for most Syslog servers.However, some servers may require s

Seite 746 - Default: 512

IGMP, 326advanced settings, 337configuration, 332rules configuration, 335IGMP Before Rules setting, 338IGMP Idle Lifetime setting, 732IGMP Last Member

Seite 747

in routing rules, 275MTU size, 137neighbor discovery, 138ping command usage, 139proxy neighbor discovery, 138with high availability, 140ISP connection

Seite 748 - Subscription renewal

Max Other Length setting, 735Max Pipe Users setting, 745Max PPM (DHCP) setting, 370Max PPP Resends setting, 627Max Radius Contexts setting, 88Max Reas

Seite 749 - Database Console Commands

quick start guide, 578server, 619PPTP Before Rules setting, 627precedencesin pipes, 665pre-shared keys, 570, 593non-ascii character problem, 593Primar

Seite 750 - Deleting Local Databases

server load balancing, 687connection-rate algorithm, 688idle timeout setting, 689max slots setting, 689net size setting, 689round-robin algorithm, 688

Seite 751

threshold rules, 684Timeout setting, 745time servers, 231Time Sync Server Type setting, 234Time Zone setting, 234TLS ALG, 439advantages, 440cryptograp

Seite 752

DSCP forwarding, 170license limitations, 170port based, 169port based VLAN, 170trunk, 169VMware, 17IPsec AES acceleration, 616licensing, 125setup docu

Seite 753

Clavister ABSjögatan 6JSE-89160 ÖrnsköldsvikSWEDENPhone: +46-660-299200www.clavister.com

Seite 754

For backwards compatibility, cOS Core versions older than 8.90 support output to this logger butthe software itself is not included with the distribut

Seite 755

This specifies the log messages that will be affected by the exception. If the ID number of thelog message is not specified then all log messages for

Seite 756

10.1.8. Traffic Shaping Recommendations ... 67310.1.9. A Summary of Traffic Shaping ...

Seite 757

Note: SNMP Trap standardscOS Core sends SNMP Traps which are based on the SNMPv2c standard as defined byRFC1901, RFC1905 and RFC1906.Example 2.20. Sen

Seite 758

The delay in seconds between alarms when a continuous alarm is used. As discussed inSection 2.4.5, “Hardware Monitoring”, the log event messages gener

Seite 759 - Appendix D: The OSI Framework

2.3. RADIUS Accounting2.3.1. OverviewThe Central Database ApproachWithin a network environment containing large numbers of users, it is advantageous t

Seite 760

Parameters included in START messages sent by cOS Core are:• Type - Marks this AccountingRequest as signaling the beginning of the service (START).• I

Seite 761

• How Authenticated - How the user was authenticated. This is set to either RADIUS if the userwas authenticated via RADIUS, or LOCAL if the user was a

Seite 762

• The external RADIUS server itself must be correctly configured.Source IP SelectionBy default, the Source IP property will be set to Automatic and th

Seite 763

• Port: 1813• Retry Timeout: 2• Shared Secret: 231562514098273• Confirm Secret: 231562514098273• Routing Table: main3. Click OK2.3.5. RADIUS Accountin

Seite 764

Three Connection Attempts are MadeOnly after cOS Core has made three attempts to reach the server will it conclude that theaccounting server is unreac

Seite 765 - Open Source Code Requests

If this option is not enabled, cOS Core will shut down even though there may be RADIUSaccounting sessions that have not been correctly terminated. Thi

Seite 766 - Alphabetical Index

2.4. MonitoringThe real-time performance of cOS Core can be monitored in a number of ways. They are:• Using the real-time monitoring functionality in

Seite 767

List of Figures1.1. Packet Flow Schematic Part I ... 261.2. Packet Flow Schem

Seite 768

TCP SYN - Total number of TCP connections in the SYN phase.TCP FIN - Total number of TCP connections in the FIN phase.Other - Total number of other co

Seite 769

Frags received – The number of IP packet fragments received by this interface.Frag reass – The number of complete packets successfully reassembled fro

Seite 770

Per Rule StatisticsUsage – Number of used IPs in the pool.Usage (%) – Above value calculated as a percentage.Active Clients – Number of currently acti

Seite 771

Total Sessions Spam - Total number of URLs found to be Spam.Total Sessions Dropped - Total number of sessions dropped.SMTP ALG DNSBL Server Statistics

Seite 772

Misses – Number of requests not met.High Availability StatisticsInterface Queue – Size of the queue used for the sync interface.Queue Usage Packets –

Seite 773

The Link Monitor is a cOS Core feature that allows monitoring of the connectivity to one or moreIP addresses external to the Clavister Security Gatewa

Seite 774

reconfigure takes place and the slave will take over when it detects this inactivity. Ifreconfiguration with failover is desirable it is better to sel

Seite 775

reconfiguration or full restart. This means that an unreachablehost can be responsible for triggering an action once but nottwice.A group of three hos

Seite 776

• Addresses: my_host3. Click OK2.4.4. SNMP MonitoringOverviewSimple Network Management Protocol (SNMP) is a standardized protocol for management ofnet

Seite 777

• Network - The IP address or network from which SNMP requests will come.• Community - The community string which provides password security for the a

Verwandte Modelle: E7Web GUI | W3 | W5 Web GUI | X8 Web GUI |

Kommentare zu diesen Handbüchern

Keine Kommentare