advertisement
Using the Security System
The new policy will appear in the IPSec Policies table.
4.7.3.
Local Keys
The Local Keys menu allows an administrator to manage local X.509 certificates, to define the local IPSec identifier, and to generate a local RSA key pair.
Local IPSec X.509 Key
In this window, you can define local keys for X.509 certificates provided you have already generated these certificates in the IPSec
VPN/CA Management menu. Chapter on page 309 describes the process of generating X.509 certificates.
Local Certificate: Select here the certificate for the X.509 authentication This menu only contains those certificates for which the associated private key is available.
Passphrase: In the entry field, enter the password used to secure the private key.
The Active Key will appear with its name in the Local IPSec X.509
Key window. If you choose a new local key, the old key will automatically be replaced.
The security system will use the ID and public/private key pair of the current Local X.509 Key to identify, authenticate, and encrypt
X.509 IPSec key exchanges.
301
Using the Security System
RSA Authentication
For the authentication via RSA each side of the connection requires a key pair consisting of a Public Key and a Private Key. The key pair is created in two steps in the Local IPSec RSA Key window: First, the Local IPSec Identifier is defined and then the key pair generated.
1In the Local IPSec RSA Key window, define a unique VPN
Identifier.
IPv4 Address: For static IP addresses.
Hostname: For VPN security gateways with dynamic addresses.
E-Mail Address: For mobile (road warrior) connections.
Save the settings by clicking Save.
299.
Generate a new RSA Key, by selecting the key length from the RSA Key Length drop-down menu.
Important Note:
The key length must be identical on both security systems.
Depending on the selected key length and the processor of the security solution, the generation of RSA keys can take several minutes.
300.
When you click Save, the system will begin generating a new
RSA key pair.
Then the active Public Key will be displayed in the Local Public RSA
Key window. The Public Key from this window will be exchanged with the respective end point, e.g. via e-mail.
The Public Key from the endpoint will be entered later into the
Remote Keys menu in the Public Key window. The Remote Keys menu is described in chapter on page 304.
302
Using the Security System
PSK Authentication
For authentication through Preshared Keys (PSK), in this menu no additional configuration for the local IPSec key is required!
During the key exchange using IKE Main Mode, only IPv4 Ad-
dresses are supported as IPSec identifiers. The IPSec identifier in the
IKE Main Mode is automatically encrypted with the PSK, and so PSK cannot be used for authentication. The IP addresses of IKE connections are automatically used as IPSec identifiers.
You generate the PSK Key in the IPSec VPN/Remote Keys menu.
It will automatically be used as the Local PSK Key as well.
303
advertisement
Related manuals
advertisement
Table of contents
- 10 1.Introduction to the Technology
- 17 2.Installation
- 18 2.1.System Requirements
- 21 2.2.Installation Instructions
- 21 2.2.1.Software Installation
- 26 2.2.2.Configuring the Security System
- 34 3.WebAdmin
- 35 3.1.Info Box
- 35 3.2.Tab List
- 36 3.3.1.The Status Light
- 36 3.3.2.Selection Field
- 37 3.3.3.The Selection Table
- 38 3.3.4.Drop-down Menus
- 40 3.4.Online Help
- 41 3.5.Refresh
- 42 4.Using the Security System
- 44 4.1.Basic Settings (System)
- 44 4.1.1.Settings
- 49 4.1.2.Licensing
- 53 4.1.3.Up2Date Service
- 60 4.1.4.Backup
- 67 4.1.5.SNMP
- 69 4.1.6.Remote Syslog Server
- 71 4.1.7.User Authentication
- 72 4.1.7.1.RADIUS
- 77 4.1.7.2.SAM – NT/2000/XP
- 79 4.1.7.3.Active Directory/NT Domain Membership
- 81 4.1.7.4.LDAP Server
- 97 4.1.8.WebAdmin Settings
- 100 4.1.9.WebAdmin Site Certificate
- 103 4.1.10.High Availability
- 110 4.1.11.Shut down/Restart
- 110 4.2.Networks and Services (Definitions)
- 111 4.2.1.Networks
- 118 4.2.2.Services
- 122 4.2.3.Users
- 126 4.3.Network Settings (Network)
- 126 4.3.1.Hostname/DynDNS
- 127 4.3.2.Interfaces
- 132 4.3.2.1.Standard Ethernet Interface
- 138 4.3.2.2.Additional Address on Ethernet Interface
- 140 4.3.2.3.Wireless LAN
- 150 4.3.2.4.Virtual LAN
- 155 4.3.2.5.PPPoE-DSL Connection
- 160 4.3.2.6.PPTPoE/PPPoA-DSL Connections
- 165 4.3.2.7.PPP over Serial Modem Line
- 171 4.3.3.Routing
- 173 4.3.4.NAT/Masquerading
- 173 4.3.4.1.NAT
- 177 4.3.4.2.Masquerading
- 178 4.3.4.3.Load Balancing
- 181 4.3.5.DHCP Server
- 185 4.3.6.PPTP VPN
- 191 4.3.7.Accounting
- 193 4.3.8.Ping Check
- 195 4.4.Intrusion Protection
- 195 4.4.1.Settings
- 197 4.4.2.Rules
- 202 4.4.3.Advanced
- 204 4.5.Packet Filter
- 204 4.5.1.Rules
- 216 4.5.2.ICMP
- 219 4.5.3.Advanced
- 225 4.6.Application Gateways (Proxies)
- 226 4.6.1.HTTP
- 234 4.6.1.1.Content Filter (Surf Protection)
- 248 4.6.3.SOCKS
- 250 4.6.4.POP
- 255 4.6.5.Ident
- 256 4.6.6.SMTP
- 265 4.6.6.1.Content Filter
- 270 4.6.6.2.Spam Protection
- 279 4.6.7.Proxy Content Manager
- 285 4.7.Virtual Private Networks (IPSec VPN)
- 293 4.7.1.Connections
- 302 4.7.2.Policies
- 306 4.7.3.Local Keys
- 309 4.7.4.Remote Keys
- 312 4.7.5.L2TP over IPSec
- 314 4.7.6.CA Management
- 319 4.7.7.Advanced
- 322 4.8.System Management (Reporting)
- 322 4.8.1.Administration
- 323 4.8.2.Virus
- 323 4.8.3.Hardware
- 324 4.8.4.Network
- 325 4.8.5.Packet Filter
- 325 4.8.6.Content Filter
- 326 4.8.7.PPTP/IPSec VPN
- 326 4.8.8.Intrusion Protection
- 326 4.8.10.HTTP Proxy Usage
- 326 4.8.11.Executive Report
- 327 4.8.12.Accounting
- 329 4.8.13.System Information
- 331 4.9.Remote Management (Remote Management)
- 331 4.9.1.Report Manager (RM)
- 336 4.10.Local Logs (Log Files)
- 336 4.10.1.Settings
- 340 4.10.2.Local Log File Query
- 341 4.10.3.Browse
- 345 4.10.3.1.Log Files
- 349 4.10.3.2.Error Codes
- 363 4.11.Online Help
- 364 4.12.Exiting the Security System
- 365 Glossary
- 372 Index
- 386 Notes