These are the options to enable connectivity between Virtual Systems and a SecurID ACE/Server:
|
Note - You can configure authentication for more than one ACE/Server in private mode. Contact Check Point Technical Support for more information. |
The SecurID ACE/Server sends a shared key (called a "node secret") to its peer ACE/Clients. This key is unique per IP address, and is sent when it connects to the ACE/Server for the first time.
Included Topics |
Configure shared authentication so that all the Virtual Systems on the VSX Gateway use the same encryption key to authenticate to the remote SecurID/ACE server. Each cluster member uses a different encryption key and node secret file.
The SecurID encryption key is stored in the sdconf.rec file. When you generate the sdconf.rec file, use the MIP (Member IP address) of a VSX Gateway interface that connects to the ACE/Server.
The first time that a Virtual System connects and attempts to authenticate to the ACE/Server, the server sends the node secret file (securid) to that Virtual System. Copy the node to all the other Virtual Systems.
To generate an sdconf.rec file:
sdconf.rec file with the VSX Gateway MIP.For example, a cluster with three VSX Gateways and each member has five Virtual Systems. Generate three sdconf.rec files, one for each cluster member.
To configure shared authentication:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec file that contains the MIP.# vsenv <vsid>
$VAR_ACE/sdopts.rec For VS0, create the file /var/ace/sdopts.rec
sdopts.rec file.CLIENT_IP=<MIP> <MIP> is the Member IP address of the VSX Gateway.
sdconf.rec, to $VAR_ACE.For VS0, copy the file to /var/ace.
On 61000/41000 Security Systems, copy the same encryption key file sdconf.rec to $FWDIR/conf in the context of that Virtual System.
table.def file.$FWDIR/lib/table.def %FWDIR%\lib\table.def no_hide_services_ports parameter contains UDP 5500. Sample parameter with Hide NAT disabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <5500, 17> };
To distribute the node secret to the Virtual Systems:
The ACE/Server sends the node secret file to the gateway.
securid./var/ace.$VAR_ACE.$FWDIR/conf in the context of each Virtual System.securid file to $VAR_ACE.For VS0, copy the file to /var/ace.
On 61000/41000 Security Systems, copy the securid file to $FWDIR/conf in the context of each Virtual System.
Configure private authentication so that the active and standby Virtual Systems use the same encryption key and node secret file to authenticate to the remote SecurID ACE/Server.
The SecurID encryption key is stored in the sdconf.rec file. When you generate the sdconf.rec file, use the VIP (Virtual IP address) of the Virtual System interface that connects to the ACE/Server.
The first time that a VSX Gateway connects to the ACE/Server, the server sends the node secret file (securid) to that VSX Gateway. Copy the node to all the other VSX Gateways.
To generate an sdconf.rec file:
sdconf.rec file with the Virtual System VIP.For example, a cluster with three VSX Gateways and each member has five Virtual Systems. Generate five sdconf.rec files, one for each Virtual System.
To configure private authentication:
The VSX Gateway General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec file that contains the VIP of that Virtual System.# vsenv <vsid> $VAR_ACE/sdopts.rec For VS0, create the file /var/ace/sdopts.rec
On 61000/41000 Security Systems, create the file $FWDIR/conf/sdopts.rec in the context of each Virtual System.
sdopts.rec file.CLIENT_IP=<VIP> <VIP> is the Virtual IP address of the Virtual System.
sdconf.rec, to $VAR_ACE. Each Virtual System on the VSX Gateway uses a different sdopts.rec file.
For VS0, copy the file to /var/ace.
On 61000/41000 Security Systems, copy the file to $FWDIR/conf/ in the context of each Virtual System.
For Multi-Domain Server, use the Domain Management Server that manages the Virtual System.
table.def file.$FWDIR/lib/table.def %FWDIR%\lib\table.def no_hide_services_ports parameter DOES NOT contain UDP 5500. Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };
To distribute the node secret to Virtual Systems in a VSX cluster:
The ACE/Server sends the node secret file to the gateway.
securid file to the same Virtual System on the other members./var/ace.$VAR_ACE.$FWDIR/conf/ in the context of each Virtual System.