These are the options to enable connectivity between Virtual Systems and a SecurID ACE/Server:
Note - You can configure authentication for more than one ACE/Server in private mode. Contact Check Point Support for more information. |
The SecurID ACE/Server sends a shared key (called a "node secret") to its peer ACE/Clients. This key is unique per IP address, and is sent when it connects to the ACE/Server for the first time.
Configure shared authentication so that all the Virtual Systems on the VSX Gateway use the same encryption key to authenticate to the remote SecurID/ACE server. Each VSX Cluster Member uses a different encryption key and node secret file.
The SecurID encryption key is stored in the sdconf.rec
file. When you generate the sdconf.rec
file, use the MIP (Member IP) address of a VSX Gateway interface that connects to the ACE/Server.
The first time that a Virtual System connects and attempts to authenticate to the ACE/Server, the server sends the node secret file (securid
) to that Virtual System. Copy the node to all the other Virtual Systems.
To generate an sdconf.rec
file:
sdconf.rec
file with the VSX Gateway MIP.For example, a VSX Cluster with three VSX Cluster Members and each VSX Cluster Member has five Virtual Systems. Generate three sdconf.rec
files, one for each VSX Cluster Member.
To configure shared authentication:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the MIP.# vsenv 0
/var/ace/sdopts.rec
file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec
file:CLIENT_IP=<
Member IP Address of VSX Gateway>
# vsenv <
VSID>
$VAR_ACE/sdopts.rec
file:# touch $VAR_ACE/sdopts.rec
sdopts.rec
file:CLIENT_IP=<
Member IP Address of VSX Gateway>
sdconf.rec
, to the applicable directory:/var/ace/
directory.$VAR_ACE
directory in the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def
file. See sk98339.no_hide_services_ports
parameter contains UDP port 5500.Sample parameter with Hide NAT disabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <5500, 17> };
To distribute the node secret to the Virtual Systems:
The ACE/Server sends the node secret file to the VSX Gateway.
securid
./var/ace/
directory.$VAR_ACE
directory in the context of Virtual Systems.securid
file to the applicable directory:/var/ace/
directory.$VAR_ACE
directory.Configure private authentication so that the active and standby Virtual Systems use the same encryption key and node secret file to authenticate to the remote SecurID ACE/Server.
The SecurID encryption key is stored in the sdconf.rec
file. When you generate the sdconf.rec
file, use the VIP (Virtual IP) address of the Virtual System interface that connects to the ACE/Server.
The first time that a VSX Gateway connects to the ACE/Server, the server sends the node secret file (securid
) to that VSX Gateway. Copy the node to all the other VSX Gateways.
To generate an sdconf.rec
file:
sdconf.rec
file with the Virtual System VIP address.Example:
A VSX Cluster with three Cluster Members. Each VSX Cluster Member has five Virtual Systems.
You need to generate five sdconf.rec
files - one for each Virtual System.
To configure private authentication:
The VSX Gateway General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the VIP address of that Virtual System:# vsenv 0
/var/ace/sdopts.rec
file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec
file:CLIENT_IP=<
Virtual System VIP Address>
# vsenv <
VSID>
$VAR_ACE/sdopts.rec
file:# touch $VAR_ACE/sdopts.rec
sdopts.rec
file:CLIENT_IP=<
Virtual System VIP Address>
sdconf.rec
, to the applicable directory:/var/ace/
directory.$VAR_ACE
directory in the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def
file. See sk98339.no_hide_services_ports
parameter does not contain UDP port 5500.Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };
To distribute the node secret to Virtual Systems in a VSX Cluster:
The ACE/Server sends the node secret file to the VSX Cluster.
securid
file to the same Virtual System on the other VSX Cluster Members./var/ace/
directory.$VAR_ACE
directory in the context of each Virtual System.