These are the options to enable connectivity between Virtual Systems and a SecurID ACE/Server:
Note - You can configure authentication for more than one ACE/Server in private mode. Contact Check Point Support for more information. |
The SecurID ACE/Server sends a shared key (called a "node secret") to its peer ACE/Clients. This key is unique per IP address, and is sent when it connects to the ACE/Server for the first time.
Configure shared authentication so that all the Virtual Systems on the VSX Gateway use the same encryption key to authenticate to the remote SecurID/ACE server. Each VSX Cluster Member uses a different encryption key and node secret file.
The SecurID encryption key is stored in the
file. When you generate the sdconf.rec
file, use the MIP (Member IP) address of a VSX Gateway interface that connects to the ACE/Server.sdconf.rec
The first time that a Virtual System connects and attempts to authenticate to the ACE/Server, the server sends the node secret file (
) to that Virtual System. Copy the node to all the other Virtual Systems.securid
To generate an
file:sdconf.rec
sdconf.rec
file with the VSX Gateway MIP.For example, a VSX Cluster with three VSX Cluster Members and each VSX Cluster Member has five Virtual Systems. Generate three
files, one for each VSX Cluster Member.sdconf.rec
To configure shared authentication:
The Virtual Systems General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the MIP.# vsenv 0
/var/ace/sdopts.rec
file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec
file:
Member IP Address of VSX GatewayCLIENT_IP=<
>
VSID# vsenv <
>
$FWDIR/conf/sdopts.rec
file:# g_all touch $FWDIR/conf/sdopts.rec
sdopts.rec
file:
Member IP Address of VSX GatewayCLIENT_IP=<
>
sdconf.rec
, to the applicable directory:/var/ace/
directory.$FWDIR/conf/
directoryin the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def
file. See sk98339.no_hide_services_ports
parameter contains UDP port 5500.Sample parameter with Hide NAT disabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17>, <5500, 17> };
To distribute the node secret to the Virtual Systems:
The ACE/Server sends the node secret file to the VSX Gateway.
securid
./var/ace/
directory.$VAR_ACE
directory in the context of Virtual Systems.securid
file to the applicable directory:/var/ace/
directory.$FWDIR/conf/
directory.Configure private authentication so that the active and standby Virtual Systems use the same encryption key and node secret file to authenticate to the remote SecurID ACE/Server.
The SecurID encryption key is stored in the
file. When you generate the sdconf.rec
file, use the VIP (Virtual IP) address of the Virtual System interface that connects to the ACE/Server.sdconf.rec
The first time that a VSX Gateway connects to the ACE/Server, the server sends the node secret file (
) to that VSX Gateway. Copy the node to all the other VSX Gateways.securid
To generate an
file:sdconf.rec
sdconf.rec
file with the Virtual System VIP address.Example:
A VSX Cluster with three Cluster Members. Each VSX Cluster Member has five Virtual Systems.
You need to generate five
files - one for each Virtual System.sdconf.rec
To configure private authentication:
The VSX Gateway General Properties window opens.
Do all of the previous steps for each Virtual System.
sdopts.rec
file that contains the the VIP address of that Virtual System:# vsenv 0
/var/ace/sdopts.rec
file:# touch /var/ace/sdopts.rec
/var/ace/sdopts.rec
file:
Virtual System VIP AddressCLIENT_IP=<
>
VSID# vsenv <
>
$FWDIR/conf/sdopts.rec
file:# g_all touch $FWDIR/conf/sdopts.rec
sdopts.rec
file:
Virtual System VIP AddressCLIENT_IP=<
>
sdconf.rec
, to the applicable directory:/var/ace/
directory.$FWDIR/conf/
directory in the context of each Virtual System.On Multi-Domain Server, work in the context of the Target Domain Management Server that manages the Virtual System.
table.def
file. See sk98339.no_hide_services_ports
parameter does not contain UDP port 5500.Sample parameter with Hide NAT enabled:
no_hide_services_ports = { <500, 17>, <259, 17>, <1701, 17>, <123, 17> };
To distribute the node secret to Virtual Systems in a VSX Cluster:
The ACE/Server sends the node secret file to the VSX Cluster.
securid
file to the same Virtual System on the other VSX Cluster Members./var/ace/
directory.$FWDIR/conf/
directory in the context of each Virtual System.