advertisement
![WebAdmin Site Certificate. Novell Security Manager Powered by Astaro | Manualzz WebAdmin Site Certificate. Novell Security Manager Powered by Astaro | Manualzz](http://s1.manualzz.com/store/data/007137896_1-a17efecedb9e2e8f08b58a95e42a20ae-360x466.png)
Using Novell Security Manager
Authentication Methods: Select the authentication method in the selection field. In order to give you access to Novell Security Manager through the configurations tool WebAdmin after the installation, the authentication method Local Users has already been defined here and the respective
User hase been entered in the Allowed Users selection menu.
Further available authentication methods are NT/2000/XP Server,
RADIUS Database and LDAP Server.
Local Users are administered in the Definitions/Users menu.
Allowed Users: By default this is set to the user admin.
Local users are defined in the Definitions/Users menu.
Log Access Network Traffic: All connections to the WebAdmin configuration tool are logged to the Packet Filter Logs as Accept rule. The
Packet Filter Logs can be found in the Local Logs/Browse menu. By default, this function is disabled.
Enable this function by clicking on the Enable button (status light on green).
Block Password Guessing
This function can be used to limit the number of attempts to log in to the WebAdmin configuration tool. After a specific number of attempts, the access from this IP address will be denied for a given time span.
Configuring the Blocking Protection for Login Attempts:
1. In the System tab, open the WebAdmin Settings menu.
2. Make the following settings:
After failed Attempts: Select the maximum allowable number of attempts in the drop-down menu.
Block IP for Period: Enter the time span for the blocking protection in the entry field.
3. Save your changes by clicking Save.
Now, the blocking protection is enabled. The Never block Networks window, allows you to exclude networks or hosts from the blocking protection.
4.1.9. WebAdmin Site Certificate
Encryption systems are an important part of many modern security devices. They are used, for example, when transmitting confidential infor-
72
Using Novell Security Manager mation over Virtual Private Networks (in chapter 4.7 on page 220), in
User Authentication and Up2Date Service or, to securely administer
Novell Security Manager over the network.
Certificates and Certificate Authorities (CA) are an essential part of modern cryptographic protocols, and help close the gaps left open by other systems. Public Key Algorithms offer a particularly elegant form of encryption. They do, however, presuppose that the public keys of all communications partners are known.
At this point, a third, trusted party is used to ensure the validity of public keys. The third party issues certificates guaranteeing the authenticity of these keys: this third party is called a Certificate Authority (CA). A certificate is a record in a standardized format with the owner’s most important data - his name, and his public key - and is signed with the private key of the CA. The format for these certificates is defined in the
X.509 standard.
In a certificate, the CA certifies, with its own signature, that the public key belongs to the person (or entity) it says it does. As the certificate contains information such as the name of the owner, duration of validity, issuing authority, and the signature of the CA, it can be seen as a kind of digital passport.
The WebAdmin Site Certificate menu allows you to create two certificates: first a CA certificate, which will be installed in your browser, and second the server certificate (signed by the CA certificate) which the system uses to authenticate itself to your browser. These two certificates contain the company’s data and the system’s hostname.
Creating a Certificate for WebAdmin:
1. Under the System tab, open the WebAdmin Site Certificate menu.
2. In the Certificate Information menu, enter the appropriate information for your firm.
Country: Choose your country from the drop-down menu.
State: Choose the state or region where you are.
City: Enter the name of city.
Organization: Enter the company’s name.
Section: Enter the department.
E-Mail Address: Enter your e-mail address.
3. In the field Firewall Hostname, enter the host name or IP address of
Novell Security Manager you use to access WebAdmin.
73
advertisement
Related manuals
advertisement
Table of contents
- 9 Introduction to the Technology
- 15 Installation
- 16 System Requirements
- 18 Installation Instructions
- 18 Software Installation
- 22 Configuring Security Manager
- 27 WebAdmin
- 27 Info Box
- 27 Tab List
- 28 Menus
- 28 The Status Light
- 28 Selection Field
- 29 The Selection Table
- 30 Drop-down Menus
- 30 Lists
- 31 Online Help
- 31 Refresh
- 32 Using Novell Security Manager
- 34 Basic Settings (System)
- 34 Settings
- 38 Licensing
- 40 Up2Date Service
- 45 Backup
- 51 Remote Syslog Server
- 52 User Authentication
- 53 Novell eDirectory
- 55 RADIUS
- 58 SAM – NT/2000/XP
- 60 Active Directory/NT Domain Membership
- 62 LDAP Server
- 71 WebAdmin Settings
- 72 WebAdmin Site Certificate
- 74 High Availability
- 79 Shut down/Restart
- 80 Networks and Services (Definitions)
- 80 Networks
- 85 Services
- 88 Users
- 90 Time Events
- 92 Network Settings (Network)
- 92 Hostname/DynDNS
- 93 Interfaces
- 97 Standard Ethernet Interface
- 101 Additional Address on Ethernet Interface
- 103 Virtual LAN
- 107 PPPoE-DSL Connection
- 111 PPTPoE/PPPoA-DSL Connections
- 115 PPP over Serial Modem Line
- 119 Bridging
- 120 Routing
- 123 NAT/Masquerading
- 126 Masquerading
- 127 Load Balancing
- 128 DHCP Service
- 133 PPTP VPN Access
- 138 Accounting
- 139 Ping Check
- 140 Intrusion Protection
- 140 Settings
- 141 Rules
- 144 Portscan Detection
- 146 DoS/Flood Protection
- 150 Advanced
- 152 Packet Filter
- 152 Rules
- 163 Advanced
- 167 Application Gateways (Proxies)
- 174 Content Filter (Surf Protection)
- 196 Content Filter
- 199 Spam Protection
- 206 Content Filter
- 212 SOCKS
- 214 Ident
- 215 Proxy Content Manager
- 220 Virtual Private Networks (IPSec VPN)
- 226 Connections
- 232 Policies
- 235 Local Keys
- 237 Remote Keys
- 240 L2TP over IPSec
- 241 CA Management
- 244 Advanced
- 247 System Management (Reporting)
- 247 Administration
- 248 Virus
- 248 Hardware
- 249 Network
- 249 Packet Filter
- 249 Content Filter
- 250 PPTP/IPSec VPN
- 250 Intrusion Protection
- 250 HTTP Proxy Usage
- 250 Executive Report
- 251 Accounting
- 252 System Information
- 254 Remote Management (Remote Management)
- 254 Report Manager (RM)
- 257 Local Logs (Log Files)
- 257 Settings
- 260 Local Log File Query
- 261 Browse
- 264 Log Files
- 267 Error Codes
- 276 HTTP Proxy Messages
- 278 Online Help
- 279 Exiting Novell Security Manager
- 280 Glossary
- 285 Index