These are the options to enable connectivity between Virtual Systems and a SecurID ACE/Server:
Note - You can configure authentication for more than one ACE/Server in private mode. Contact Check Point Technical Support for more information. |
The SecurID ACE/Server sends a shared key (called a "node secret") to its peer ACE/Clients. This key is unique per IP address, and is sent when it connects to the ACE/Server for the first time.
Included Topics |
Configure shared authentication so that all the Virtual Systems on the VSX Gateway use the same encryption key to authenticate to the remote SecurID/ACE server. Each cluster member uses a different encryption key and node secret file.
The SecurID encryption key is stored in the sdconf.rec
file. When you generate the sdconf.rec
file, use the MIP (Member IP address) of a VSX Gateway interface that connects to the ACE/Server.
The first time that a Virtual System connects and attempts to authenticate to the ACE/Server, the server sends the node secret file (securid
) to that Virtual System. Copy the node to all the other Virtual Systems.
To generate an sdconf.rec
file:
sdconf.rec
file with the VSX Gateway MIP.For example, a cluster with three VSX Gateways and each member has five Virtual Systems. Generate three sdconf.rec
files, one for each cluster member.
To configure shared authentication:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the MIP.# vsenv <vsid>
$VAR_ACE/sdopts.rec
For VS0, create the file /var/ace/sdopts.rec
sdopts.rec
file.CLIENT_IP=<MIP>
<MIP>
is the Member IP address of the VSX Gateway.
sdconf.rec
, to $VAR_ACE
.For VS0, copy the file to /var/ace
.
On 61000/41000 Security Systems, copy the same encryption key file sdconf.rec
to $FWDIR/conf
in the context of that Virtual System.
table.def
file.$FWDIR/lib/table.def
%FWDIR%\lib\table.def
no_hide_services_ports
parameter contains UDP 5500. Sample parameter with Hide NAT disabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <5500, 17> };
To distribute the node secret to the Virtual Systems:
The ACE/Server sends the node secret file to the gateway.
securid
./var/ace
.$VAR_ACE
.$FWDIR/conf
in the context of each Virtual System.securid
file to $VAR_ACE
.For VS0, copy the file to /var/ace
.
On 61000/41000 Security Systems, copy the securid file to $FWDIR/conf
in the context of each Virtual System.
Configure private authentication so that the active and standby Virtual Systems use the same encryption key and node secret file to authenticate to the remote SecurID ACE/Server.
The SecurID encryption key is stored in the sdconf.rec
file. When you generate the sdconf.rec
file, use the VIP (Virtual IP address) of the Virtual System interface that connects to the ACE/Server.
The first time that a VSX Gateway connects to the ACE/Server, the server sends the node secret file (securid
) to that VSX Gateway. Copy the node to all the other VSX Gateways.
To generate an sdconf.rec
file:
sdconf.rec
file with the Virtual System VIP.For example, a cluster with three VSX Gateways and each member has five Virtual Systems. Generate five sdconf.rec
files, one for each Virtual System.
To configure private authentication:
The VSX Gateway General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the VIP of that Virtual System.# vsenv <vsid>
$VAR_ACE/sdopts.rec
For VS0, create the file /var/ace/sdopts.rec
On 61000/41000 Security Systems, create the file $FWDIR/conf/sdopts.rec
in the context of each Virtual System.
sdopts.rec
file.CLIENT_IP=<VIP>
<VIP>
is the Virtual IP address of the Virtual System.
sdconf.rec
, to $VAR_ACE
. Each Virtual System on the VSX Gateway uses a different sdopts.rec
file.
For VS0, copy the file to /var/ace
.
On 61000/41000 Security Systems, copy the file to $FWDIR/conf/
in the context of each Virtual System.
For Multi-Domain Server, use the Domain Management Server that manages the Virtual System.
table.def
file.$FWDIR/lib/table.def
%FWDIR%\lib\table.def
no_hide_services_ports
parameter DOES NOT contain UDP 5500. Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };
To distribute the node secret to Virtual Systems in a VSX cluster:
The ACE/Server sends the node secret file to the gateway.
securid
file to the same Virtual System on the other members./var/ace
.$VAR_ACE
.$FWDIR/conf/
in the context of each Virtual System.