Print Download PDF Send Feedback

Previous

Next

Configuring Remote Access VPN

In This Section:

Remote Access VPN Workflow

Creating Remote Access VPN Certificates for Users

Creating and Configuring the Security Gateway

Defining User and Authentication Methods in LDAP

Enrolling User Certificates - ICA Management Tool

Using Certificates Using Third Party PKI

Enabling Hybrid Mode and Methods of Authentication

Configuring Authentication for NT groups and RADIUS Classes

Using a Pre-Shared Secret

Defining an LDAP User Group

Defining a User Group

Defining a VPN Community and its Participants

Defining Access Control Rules

Installing the Policy

Managing User Certificates

Modifying Encryption Properties for Remote Access VPN

Working with RSA Hard and Soft Tokens

This section includes procedures and explanations for configuring Remote Access VPN. For configuration specific to Endpoint Security VPN, Check Point Mobile for Windows, and SecuRemote, see the Remote Access Clients Administration Guide.

Remote Access VPN Workflow

This section shows the Remote Access VPN Workflow.

Start at the top, with Create Security Gateway and define Security Gateway properties, and trace a route down to Install policy. Sections following the chart detail step-by-step procedures for each phase.

Creating Remote Access VPN Certificates for Users

This section contains procedures for creating Remote VPN user certificates and sending them to end users.

There are two basic procedures for supplying remote access VPN certificates to users.

Enabling a User Certificate

To enable a user certificate:

  1. In SmartDashboard, click the Firewall tab.
  2. Go to the Users and Administrators tab.
  3. Create a new user or double-click an existing user.
  4. In the User Properties window, click the Encryption tab.
  5. In the Encryption pane, click Edit.
  6. In the IKE Phase 2 Properties window, click the Authentication tab and select Public key.
  7. Click OK to close this window.

Creating a P12 Certificate File

After creating a user certificate, you must then make this certificate available to remote access users. Use this procedure to create a p12 certificate.

To create a p12 certificate file for remote access VPN users:

  1. Create the user certificate.
  2. In the User Properties window, from the navigation tree click Certificates.
  3. In the Certificates page, click New.
  4. Select Certificate file (.p12).
  5. In the Certificate File (.P12) window, enter and confirm the certificate password.
  6. Optional: Enter descriptive text in the Comment field.
  7. Click OK and enter a path to save the p12 file.

    The new certificate shows in the Certificate. The status is set to Valid.

  8. Click OK.
  9. Send the .p12 file to the end user by secure email or other secure means.

Creating Certificate Registration Key

After creating a user certificate, you must then make this certificate available to remote access users. Use this procedure to create a certificate registration key that lets the user enroll the certificate for use with a device.

To create a certificate registration key:

  1. Create the user certificate.
  2. In the User Properties window, from the navigation tree click Certificates.
  3. In the Certificates pane, click New.
  4. Select Registration key for certificate enrollment.
  5. In the Registration Key for Certificate Enrollment window, select the number of days before the certificate expires.
  6. Click the email button to send the registration key to the user.
  7. Optional: Enter descriptive text in the Comment field.
  8. Click OK.

Instructions for End Users

Remote Access VPN users can use many different clients to connect to network resources. It is the administrator's responsibility to give appropriate instructions to end users to make sure that they successfully enroll the certificate.

The Creating Certificates section gives some general procedural guidelines that apply to many VPN clients. For detailed instructions, refer to the VPN client documentation.

Creating and Configuring the Security Gateway

  1. Create a Security Gateway network object.
  2. On the General Properties page, select VPN.
  3. Initialize a secure communication channel between the VPN module and the Security Management Server by clicking Communication
  4. On the Topology page, define the interfaces and the VPN domain.

    The ICA automatically creates a certificate for the Security Gateway.

Defining User and Authentication Methods in LDAP

  1. Obtain and install a license that enables the VPN module to retrieve information from an LDAP server.
  2. Create an LDAP account unit.
  3. Define users as LDAP users. A new network object for LDAP users is created on the Users tree. (The LDAP users also appear in the objects list window to the right.)

For more information see: LDAP and User Management in the R77 Security Management Server Administration Guide.

Enrolling User Certificates - ICA Management Tool

To use the ICA Management to enroll a user certificate:

  1. In SmartDashboard, click the Firewall tab.
  2. Go to the Users and Administrators tab.
  3. Create a new user or double-click an existing user.
  4. Double-click a user to open the property window.
  5. On the Encryption tab, click Edit.
  6. In the IKE phase 2 properties window Authentication tab, select Public Key.
  7. Enroll the user certificate using the ICA management tool. For more information, see the R77 Security Management Server Administration Guide.

Using Certificates Using Third Party PKI

Using third party PKI involves creating:

You can use a third-party OPSEC PKI certificate authority that supports the PKCS#12, CAPI or Entrust standards to issue certificates for Security Gateways and users. The Security Gateway must trust the CA and have a certificate issued by the CA.

For users managed on an LDAP server, the full distinguished name (DN) which appears on the certificate is the same as the user's name. But if the user is managed on the internal database, the user name and DN on the certificate will not match. For this reason, the user name in the internal database must be either the full DN which appears on the certificate or just the name which appears in the CN portion of the certificate. For example, if the DN which appears on the certificate is:

CN=John, OU=Finance, O=Widget Enterprises, C=US

The name of the user on the internal database must be either:

Note - The DN on the certificate must include the user's LDAP branch. Some PKI solutions do not include (by default) the whole branch information in the subject DN, for example the DN only includes the common name. This can be rectified in the CA configuration.

Configuring Third-Party PKI Certificates

To use a third-party PKI solution:

  1. On the User properties window, Encryption tab, click Edit... The IKE phase 2 properties window opens. On the Authentication tab, select Public key.
  2. Define the third party Certificate Authority as an object in SmartDashboard. See Enrolling with a Certificate Authority.
  3. Generate a certificate for your Security Gateway from the third party CA. For more information, see: Enrolling with a Certificate Authority.
  4. Generate a certificate for the remote user from the third party CA. (Refer to relevant third party documentation for details.) Transfer the certificate to the user.
  5. In Global Properties, Authentication window, add or disable suffix matching.

    For users with certificates, it is possible to specify that only certificates with a specified suffix in their DN are accepted. This feature is enabled by default, and is required only if:

    • Users are defined in the internal database, and
    • The user names are not the full DN.

All certificates DN's are checked against this suffix.

Note - If an hierarchy of Certificate Authorities is used, the chain certificate of the user must reach the same root CA that the Security Gateway trusts

Enabling Hybrid Mode and Methods of Authentication

Hybrid mode allows the Security Gateway and remote access client to use different methods of authentication.

To enable Hybrid Mode:

  1. Open the Global Properties window.
  2. From the navigation tree, click Remote Access >VPN Authentication.
  3. In the Support authentication methods section, click Support Legacy Authentication for SC (hybrid mode), L2TP (PAP), and Nokia clients (CRACK).
  4. Click OK.

Defining User Authentication Methods in Hybrid Mode

  1. On the User Properties window, Authentication tab, select an appropriate authentication scheme.
  2. Enter authentication credentials for the user.
  3. Give these credentials to the user.

Configuring Authentication for NT groups and RADIUS Classes

To enable this group authentication feature:

  1. Set the add_radius_groups property in objects.C to true.
  2. Define a generic* profile, with RADIUS as the authentication method.
  3. Create a rule in the Policy Rule Base whose "source" is this group of remote users that authenticate using NT Server or RADIUS.

Office Mode IP assignment file

This method also works for Office Mode. The group listed in the ipassignment.conf file points to the group that authenticates using NT group authentication or RADIUS classes.

Using a Pre-Shared Secret

When using pre-shared secrets, the remote user and Security Gateway authenticate each other by verifying that the other party knows the shared secret: the user's password.

To enable the use of pre-shared secrets:

  1. In Policy > Global Properties > Remote Access > VPN — Basic, select Pre-Shared Secret (For SecuRemote / SecureClient users)
  2. Deselect Hybrid Mode.
  3. For each user, go to the Encryption tab of the User Properties window, select IKE and click Edit... to display the IKE Phase 2 Properties window.
  4. In the Authentication tab, enable Password (Pre-Shared Secret) and enter the pre-shared secret into the Password (Pre-shared secret) and Confirm Password fields.
  5. Inform the user of the password "out-of-band".

Defining an LDAP User Group

For more about LDAP User Groups, see Managing User Accounts in the R77 Security Management Server Administration Guide.

Defining a User Group

In SmartDashboard, create a group for remote access users. Add the appropriate users to this group.

Defining a VPN Community and its Participants

  1. On the VPN Communities tree, double-click Remote_Access_Community. The Remote Access Community Properties window opens.
  2. On the Participating Security Gateways page, Add... Security Gateways participating in the Remote Access Community.
  3. On the Participating User Groups page, Add... the group that contains the remote access users.

Defining Access Control Rules

Access control is a layer of security not connected with VPN. The existence of a remote access community does not mean that members of that community have free automatic access to the network. Appropriate rules need to be created in the Security Policy Rule Base blocking or allowing specific services.

  1. Create a rule in the Security Policy Rule Base that deals with remote access connections.
  2. Double-click the entry in the VPN column. The VPN Match Conditions window opens.
  3. Select Only connections encrypted in specific VPN Communities.
  4. Click Add... to include a specific community in this Security Policy Rule.
  5. Define services and actions. For example, to allow remote access users to access the organization's SMTP server, called SMTP_SRV, create the following rule:

Source

Destination

VPN

Service

Action

Track

Any

SMTP_SRV

Remote_Access_Community

SMTP

Accept

Log

Installing the Policy

Install the policy and instruct the users to create or update the site topology.

Managing User Certificates

Managing user certificates involves:

Tracing the status of the user's certificate

The status of a user's certificate can be traced at any time in the Certificates tab of the user's Properties window. The status is shown in the Certificate state field. If the certificate has not been generated by the user by the date specified in the Pending until field, the registration key is deleted.

If the user is defined in LDAP, then tracing is performed by the ICA management tool.

Automatically renewing a certificate

ICA certificates for users can be automatically renewed a number of days before they expire. The client initiates a certificate renewal operation with the CA before the expiration date is reached. If successful, the client receives an updated certificate.

To configure automatic certificate renewal:

  1. From Menu, click Global Properties.
  2. From the navigation tree, click Remote Access > Certificates.
  3. Click Renew users internal CA certificates
  4. Enter the number of days to Start the renewal process.

    This is the number of days before the certificate for the user expires and the client renews the certificate.

  5. Click OK and publish the changes.
  6. Install the Access Control Policy.
  7. Tell the users to update the topology of the site.

Revoking certificates

The way in which certificates are revoked depends on whether they are managed internally or externally, using LDAP.

When a user is deleted, their certificate is automatically revoked. Certificates can be disabled or revoked at any time.

If the certificate is already active or was not completed by the user, you can revoke it by clicking Revoke in the Certificates tab of the User Properties window.

If users are managed in LDAP, certificates are revoked using the ICA management tool.

Tracing the Status of User's Certificate

The status of a user's certificate can be traced at any time in the Certificates tab of the user's Properties window. The status is shown in the Certificate state field. If the certificate has not been generated by the user by the date specified in the Pending until field, the registration key is deleted.

If the user is defined in LDAP, then tracing is performed by the ICA management tool.

Automatically Renewing a Users' Certificate

ICA certificates for users can be automatically renewed a number of days before they expire. The client initiates a certificate renewal operation with the CA before the expiration date is reached. If successful, the client receives an updated certificates.

To configure automatic certificate renewal:

  1. Select Policy > Global Properties > Remote Access > Certificates.
  2. Select Renew users internal CA certificates and specify a time period. The time period is the number of days before the user's certificate is about to expire in which the client will attempt to renew the certificate.
  3. Install the Security Policy.
  4. Instruct the user to update the site's topology.

Revoking Certificates

The way in which certificates are revoked depends on whether they are managed internally or externally, using LDAP.

For Internally Managed Users

When a user is deleted, their certificate is automatically revoked. Certificates can be disabled or revoked at any time.

If you initiated a certificate generation that was not completed by the user, you can disable the pending certificate by clicking Disable in the Certificates tab of the User Properties window.

If the certificate is already active, you can revoke it by clicking Revoke in the Certificates tab of the User Properties window.

For Users Managed in LDAP

If users are managed in LDAP, certificates are revoked using the ICA management tool.

Modifying Encryption Properties for Remote Access VPN

The encryption properties of the users participating in a Remote Access community are set by default. If you must modify the encryption algorithm, the data integrity method and/or the Diffie-Hellman group, you can either do this globally for all users or configure the properties per user.

To modify the user encryption properties globally:

  1. Select Policy > Global Properties > Remote Access > VPN - (IKE Phase 1).
  2. Configure the appropriate settings:
    • Support encryption algorithms - Select the encryption algorithms that will be supported with remote hosts.
    • Use encryption algorithms - Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more than one encryption algorithm to use, the algorithm selected in this field will be used.
    • Support Data Integrity - Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    • Use Data Integrity - The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    • Support Diffie-Hellman groups - Select the Diffie-Hellman groups that will be supported with remote hosts.
    • Use Diffie-Hellman group - SecureClient users utilize the Diffie-Hellman group selected in this field.

    To enforce the global encryption properties for some users while being able to modify them for specific users go to Policy > Global Properties > Remote Access > VPN - (IPsec Phase 2):

  3. Set the required properties in the window and disable Enforce Encryption Algorithm and Data Integrity on all users.
  4. In the Encryption tab of the User Properties window select IKE and click Edit.

    The IKE Phase 2 Properties window is displayed.

  5. Select the Encryption tab.
  6. If you want the encryption and data integrity algorithms of the user to be taken from the Global Properties definitions, select Defined in the Remote Access VPN page of the Global Properties window. If you want to customize the algorithms for this user, select Defined below and select the appropriate encryption and data integrity algorithms.

Working with RSA Hard and Soft Tokens

If you use SecurID for authentication, you must manage the users on RSA's ACE management server. ACE manages the database of RSA users and their assigned hard or soft tokens. The client contacts the site's Security Gateway. The Security Gateway contacts the ACE Server for user authentication information. This means:

SecurID Authentication Devices

Several versions of SecurID devices are available. The older format is a small device that displays a numeric code, called a tokencode, and time bars. The token code changes every sixty seconds, and provides the basis for authentication. To authenticate, the user must add to the beginning of the tokencode a special password called a PIN number. The time bar indicates how much time is left before the next tokencode is generated. The remote user is requested to enter both the PIN number and tokencode into the client connection window.

The newer format resembles a credit card, and displays the tokencode, time bars and a numeric pad for typing in the PIN number. These type of device mixes the tokencode with the entered PIN number to create a Passcode. The client requests only the passcode.

SoftID operates the same as the passcode device but consists only of software that sits on the desktop.

The Advanced view displays the tokencode and passcode with COPY buttons, allowing the user to cut and paste between softID and the client:

SoftID and SecureClient

For remote users to successfully use RSA's softID:

  1. The administrator creates the remote users on the Ace Server
  2. "Out-of-band", the administrator distributes the SDTID token file (or several tokens) to the remote users.
  3. The remote user imports the tokens.
  4. The following userc.c property on SecureClient must be set in the OPTIONS section:

    support_rsa_soft_tokens (true)

    When users login, they must enter the Token Serial Number and PIN.