These are the options to enable connectivity between Virtual Systems and a SecurID ACE/Server:
|
Note - You can configure authentication for more than one ACE/Server in private mode. Contact Check Point Support for more information. |
The SecurID ACE/Server sends a shared key (called a "node secret") to its peer ACE/Clients. This key is unique per IP address, and is sent when it connects to the ACE/Server for the first time.
Configure shared authentication so that all the Virtual Systems on the VSX Gateway use the same encryption key to authenticate to the remote SecurID/ACE server. Each VSX Cluster Member uses a different encryption key and node secret file.
The SecurID encryption key is stored in the sdconf.rec file. When you generate the sdconf.rec file, use the MIP (Member IP) address of a VSX Gateway interface that connects to the ACE/Server.
The first time that a Virtual System connects and attempts to authenticate to the ACE/Server, the server sends the node secret file (securid) to that Virtual System. Copy the node to all the other Virtual Systems.
To generate an sdconf.rec file:
sdconf.rec file with the VSX Gateway MIP.For example, a VSX Cluster with three VSX Cluster Members and each VSX Cluster Member has five Virtual Systems. Generate three sdconf.rec files, one for each VSX Cluster Member.
To configure shared authentication:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec file that contains the MIP.# vsenv 0
/var/ace/sdopts.rec file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec file:CLIENT_IP=<Member IP Address of VSX Gateway>
# vsenv <VSID>
$VAR_ACE/sdopts.rec file:# touch $VAR_ACE/sdopts.rec
sdopts.rec file:CLIENT_IP=<Member IP Address of VSX Gateway>
sdconf.rec, to the applicable directory:/var/ace/ directory.$VAR_ACE directory in the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def file. See sk98339.no_hide_services_ports parameter contains UDP port 5500.Sample parameter with Hide NAT disabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <5500, 17> };
To distribute the node secret to the Virtual Systems:
The ACE/Server sends the node secret file to the VSX Gateway.
securid./var/ace/ directory.$VAR_ACE directory in the context of Virtual Systems.securid file to the applicable directory:/var/ace/ directory.$VAR_ACE directory.Configure private authentication so that the active and standby Virtual Systems use the same encryption key and node secret file to authenticate to the remote SecurID ACE/Server.
The SecurID encryption key is stored in the sdconf.rec file. When you generate the sdconf.rec file, use the VIP (Virtual IP) address of the Virtual System interface that connects to the ACE/Server.
The first time that a VSX Gateway connects to the ACE/Server, the server sends the node secret file (securid) to that VSX Gateway. Copy the node to all the other VSX Gateways.
To generate an sdconf.rec file:
sdconf.rec file with the Virtual System VIP address.Example:
A VSX Cluster with three Cluster Members. Each VSX Cluster Member has five Virtual Systems.
You need to generate five sdconf.rec files - one for each Virtual System.
To configure private authentication:
The VSX Gateway General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec file that contains the VIP address of that Virtual System:# vsenv 0
/var/ace/sdopts.rec file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec file:CLIENT_IP=<Virtual System VIP Address>
# vsenv <VSID>
$VAR_ACE/sdopts.rec file:# touch $VAR_ACE/sdopts.rec
sdopts.rec file:CLIENT_IP=<Virtual System VIP Address>
sdconf.rec, to the applicable directory:/var/ace/ directory.$VAR_ACE directory in the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def file. See sk98339.no_hide_services_ports parameter does not contain UDP port 5500.Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };
To distribute the node secret to Virtual Systems in a VSX Cluster:
The ACE/Server sends the node secret file to the VSX Cluster.
securid file to the same Virtual System on the other VSX Cluster Members./var/ace/ directory.$VAR_ACE directory in the context of each Virtual System.