Describes the OmniAccess SafeGuard Controller. The guide provides detailed
installation instructions and technical specifications for the OmniAccess
SafeGuard Controller.
■
OmniVista SafeGuard Manager Administration Guide
Describes how to manage the OmniAccess SafeGuard Controller using the
OmniVista SafeGuard Manager software.
■
ICS Dissolvable Agent for SafeGuard Administration Guide
Describes how to configure the Integrity Clientless Security (ICS) module of the
Alcatel-Lucent Network Admission Control (NAC).
Preface
Additional Resources
Alcatel-Lucent publishes documents for Alcatel-Lucent customers at:
www.Alcatel-Lucent.com
Guide Organization
Ta b le 2 briefly describes each chapter in this guide.
Table 2Guide Organization
Chapter or AppendixContents
Chapter 1, SafeGuard OS
Overview
Chapter 2, Accessing and
Managing the System
Provides an overview to the Alcatel-Lucent SafeGuard
OS, the basic feature overview, and how it supports the
Alcatel-Lucent SafeGuard product line. Also, describes
typical deployment models for SafeGuard devices; they
can be deployed in either a standard topology or in a
High Availability (HA) topology.
Describes connecting display devices, such as a
terminal, PC, or laptop computer, to the SafeGuard
device and logging in to the system.
Chapter 3, Working with
Configuration Files and
Upgrading Images
OmniAccess SafeGuard OS Administration Guide
Describes functions and commands related to
configuration files and upgrade processes.
17
Preface
Table 2Guide Organization (continued)
Chapter or AppendixContents
Chapter 4, Configuring
SafeGuard Controllers
Chapter 5, Setting Up
SafeGuard Switches
Chapter 6, Configuring
Authentication and Role
Derivation
Describes features specific to SafeGuard Controllers.
Describes numerous configurations specific to
SafeGuard switches, including:
■ setting up Virtual Local Area Networks (VLANs)
■ setting up IP unicast or multicast routing.
This chapter describes the commands used for
configuring authentication, including their names,
descriptions, prototypes, arguments, and argument
descriptions. SafeGuard OS supports two types of user
authentication: active and passive.
Describes the different types of user authentication
available in SafeGuard OS as well as applicable CLI
commands for implementing authentication.
Describes how to configure special authentication lists
used for circumventing the normal authentication
processes, as needed.
Explains the different types of user authentication
available in SafeGuard OS. It also explains how to
configure the SafeGuard device using the CLI to
achieve the maximum benefit in a deployment.
Describes how to configure IEEE 802.1x, port-based
authentication, on the SafeGuard Switch.
Chapter 7, Establishing a
Security Policy
Discusses the key concepts of policy, how to develop a
Policy workflow, and procedures for coding Policy
commands.
Chapter 8, VisualizationDescribes the concepts and procedures for configuring
the Visualization component.
Chapter 9, End Point
Validation
Chapter 10, Detecting
and Isolating Malware
Security Threats
Chapter 11,
Troubleshooting
Describes the concepts and procedures for configuring
End Point Validation (EPV) commands.
Provides an overview of the malware detection process
and provides procedures for coding the commands
used for detecting and remedying malware.
Describes the commands used for configuring logging,
including their names, descriptions, prototypes,
arguments, and argument descriptions.
18
OmniAccess SafeGuard OS Administration Guide
chapter
SafeGuard OS Overview
1
In this chapter:
■Alcatel-Lucent Solution and Product Overview
■Deployment Models
■Understanding Protection Modes
■SafeGuard OS Overall Feature Summary
Chapter 1: SafeGuard OS Overview
Alcatel-Lucent enables enterprises to secure their LANs with purpose-built devices based
on custom silicon. IT can control who is allowed onto the LAN, restrict what users can do
on the LAN, and prevent threats from disrupting network services or compromising
data.
Customers can embed security directly in their LAN infrastructure using Alcatel-
Lucent’s network device products: the SafeGuard Controller and SafeGuard Switch.
This chapter reviews Alcatel-Lucent’s devices and products which make up the complete
Alcatel-Lucent solution.
Alcatel-Lucent Solution and Product Overview
Alcatel-Lucent’ solution and products are comprised of:
■SafeGuard device(s)
A SafeGuard device, such as a SafeGuard Controller and/or SafeGuard Switch, is a
network infrastructure device for inline policy enforcement. The hardware is
designed with custom security silicon consisting of multi-core processors and
custom traffic-processing programmable ASICs. The flexible architecture of these
devices is the backbone for the SafeGuard operating system (OS).
The SafeGuard Controller is available in two models:
— The OmniAccess 1000 SafeGuard supports up to 800 authenticated users
across four gigabit uplinks, with deep packet inspection at 4 Gbps, with
appropriate licensing.
— The OmniAccess 2400 SafeGuard supports up to 2000 authenticated users
across ten 1-Gb uplinks, with 10 Gbps of deep packet inspection, with
appropriate licensing.
The OAG4048X Switch includes 10/100/1000 Mbps ports and 10 Gbps ports. A
similar model, the OAG4048X-PoE, includes additional Power over Ethernet. As
an enterprise-class switch, it has the performance, resiliency, and software
features expected of a network switch connecting user machines into the core or
distribution layer of the LAN. It has dual-homed uplinks, Rapid-Spanning Tree
for fast failover, and hot-swappable power supplies and fans.
While user and application-based controls are available for both the SafeGuard
Controller and SafeGuard Switch devices, the SafeGuard Switch provides perport control. The SafeGuard Controller provides per-uplink control.
■SafeGuard OS
The operating system that runs on Alcatel-Lucent SafeGuard devices is the
SafeGuard OS. The SafeGuard OS drives the device, providing traffic usage
monitoring, access, and malware controls. The SafeGuard OS provides all of the
20
OmniAccess SafeGuard OS Administration Guide
Chapter 1: SafeGuard OS Overview
following capabilities in the same device, ensuring that there is no centralized
point of failure:
— Device Management – Administrators can set up, manage, and diagnose
problems for the device as a network device.
— Authentication – With Network Access Control (NAC) capabilities,
authentication and posture check is provided to control who can enter the
LAN. NAC leverages an organization’s existing authentication servers and
identity stores with flexibility to provide either passive or active
authentication using Active Directory, RADIUS, or Captive Portal web logon.
— End Point Validation (EPV) – As an optional component of NAC to validate
health or posture of end-user host machines, EPV policies use a temporary or
dissolvable client to check for out-of-date OS, anti-virus software, etc. Hosts
that are not in compliance with corporate security standards are redirected to
an appropriate site to download patches and fixes before accessing the
internet.
— Security Policy – Role-based provisioning learned from the authentication
component, the defined policy component allows the administrator to assign
ACLs (Access Control Lists) at Layer 4 and Layer 7 to individual users. This
capability is especially useful in the post admission separation of users
regardless of point of entry (for example, separation of employees, contractors
and business partners). While initiating policy enforcement on TCP
connections or groupings of UDP packets, a stateful deep packet inspection of
all flows is allowed.
— Threat Control – An essential part of LAN control, Alcatel-Lucent threat
control algorithms monitor application connection patters for signs of
malicious behavior. Because these algorithms do not rely on signatures, they
can detect zero-day malware. The threat detection algorithms are built with a
goal of preventing network meltdown by detecting the malicious activity in
the quickest amount of time with very low false-positive rates.
— Visualization – Collects information about users and applications and how
those users and applications impact the network. Visualization serves as the
conduit between other SafeGuard OS components and the Alcatel-Lucent
OmniVista SafeGuard Manager Command Center.
■OmniVista SafeGuard Manager Command Center
OmniVista SafeGuard Manager is a central command center that displays data
flow information collected from the SafeGuard OS visualization component. The
OmniVista SafeGuard Manager interface, a graphical user interface, provides at-aglance views of network usage and security violations, which enables the IT
administrator to properly define security policies—global access and malware
policies—relevant to the unique characteristics, trends, and usage patterns and
characteristics of users on the network.
OmniAccess SafeGuard OS Administration Guide
21
Chapter 1: SafeGuard OS Overview
OmniVista SafeGuard Manager compiles information based on user transactions,
presenting all of the activities and access violations tied to usernames. It provides
traffic views on a per-user and per-flow basis, allowing for detailed auditing,
reporting, and forensics. For example, OmniVista SafeGuard Manager could
display all users running Instant Messenger or detail every application, computer,
and file a particular user has touched.
OmniVista SafeGuard Manager also supports role-based provisioning, allowing
IT to define access controls for broad groups of users, such as employees,
contractors, and guests, or for smaller groups, such as the finance department.
OmniVista SafeGuard Manager gives IT flexible malware control, allowing traffic
to be stopped on a per-user or per-application basis if malware is detected.
Using the Alcatel-Lucent OmniVista SafeGuard Manager command center, IT is
provided with full LAN visibility, policy creation capabilities and distribution.
The SafeGuard product family provides the full set of capabilities needed to protect
enterprise assets.
Deployment Models
In terms of deployment, the SafeGuard Controller sits between access switches and the
distribution or core layer, aggregating uplinks from the wiring closets and enforcing
access policies on all traffic. As a transparent device, the Controller requires no changes to
network design or user behavior, simplifying deployment and IT’s cost of operations.
The Controller supports high availability and resiliency modes. Enterprises that have
dual-homed wiring closet switches can deploy two SafeGuard Controllers as peers—the
two platforms would share state and preserve user authentications in case of failover. The
Controller runs in fail pass-through mode following a failure, where all LAN traffic will
traverse the Controller untouched, or protect mode, where all traffic is stopped (based on
security policy settings).
While the Controller sits behind existing switches, which suits environments not
upgrading their switches, the SafeGuard Switch provides an integrated secure switch
ideal for customers in the midst of a switch upgrade or building a new LAN for
enterprises to secure the fabric of their LAN.
The integrated platform with both the SafeGuard Controller and SafeGuard Switch
reduces the number of platforms customers need to buy and manage, lowering capital
and operational costs. The SafeGuard Switch also provides per-port control, vs. the per-
uplink control in the SafeGuard Controller. While user- and application-based controls
are available in both SafeGuard platforms, the switch’s per-port control means worms are
contained to a single user rather than all users connected to one uplink port.
22
OmniAccess SafeGuard OS Administration Guide
CST_055
Internet
LAN Core
Data Center
Distribution Layer
OmniAccess
switch
OmniAccess
SafeGuard
10 Gigabit
uplinks
Remediation
servers
Active Directory
RADIUS servers
Alcatel-Lucent
OmniVista
SafeGuard
Manager
Access Layer
Transparent
Deployment
Chapter 1: SafeGuard OS Overview
Figure 1SafeGuard Controller and Switch in a Typical Deployment
With the preferred standard and typical deployment model, the SafeGuard Controller
device is a multi-port “bump-in-the-wire” device between the edge switch and the next
layer switch, whether that be the distribution layer or the core switch. The uplinks can
either be fiber or copper. A SafeGuard Switch is deployed like any other switch device,
but it can link directly to the distribution layer.
When deploying SafeGuard devices using this model, all SafeGuard OS features are
supported, including policy enforcement, captive portal, IP header validity, and malware
enforcement. Further, devices can be deployed without disrupting existing wiring closet
configurations. Figure 1 shows SafeGuard devices in the typical deployment model.
System recovery and high availability (HA) can be configured when deploying
SafeGuard Controllers. To, it requires an additional (redundant) SafeGuard Controller of
the same model, running the same software release, and configured with the same port
configuration.
In HA mode, the authentication state is propagated to the peer device before there is a
failure so that users do not have to re-authenticate. For example, end users do not need to
log in to the captive portal feature again if there is a system failure. Figure 2 shows this
type of deployment (for details on configuring high availability, see Configuring High
Ingress and egress data traffic is managed by SafeGuard devices based on the level of
protection mode set within the device. Based on the established protection mode—Pass-
thru mode, Monitor mode, or Protect mode. For details on setting protection modes, see
Changing the Protection Mode of Ports on page 95.
When UsedSafeGuard ControllerSafeGuard Switch
First time set up
and cabling
Testing and
trials
Table 3Supported Protection Modes
Protection
Mode
Pass-thru
Mode
Monitor Mode
Acts as a transparent
bridge. All security
functionality is
bypassed.
Authentication, captive portal, visualization,
malware detection and protection and userbased policy checking is applied to all data
Acts as a standard L2/
L3 switch. All security
functionality is
bypassed.
traffic, but enforcement is ignored.
24
OmniAccess SafeGuard OS Administration Guide
Table 3Supported Protection Modes (continued)
Chapter 1: SafeGuard OS Overview
Protection
Mode
Protect Mode
When UsedSafeGuard ControllerSafeGuard Switch
Typical
Deployment
Authentication, captive portal, visualization,
malware detection and protection and userbased policy checking is applied to all data
traffic, and actively enforced.
OmniAccess SafeGuard OS Administration Guide
25
User/Machine Authentication
■ Authentication via 802.1X or
MAC address
■ Passive Active Directory
authentication snooping
■ Passive RADIUS
authentication snooping
■ Captive portal
authentication
■ Trusted DHCP serve
Role Derivation
■ RADIUS attributes
■ Active Directory attributes
■ Physical location
■ Combination of above
Role-Based Policy (Access
Control By)
■ User group
■ Application
■ Select application attributes
■ Destination port
■ Resource (e.g. servers)
Host Posture Check
■ Dissolvable agent
■ Scan for known threats, anti-
virus definition, service
packs, and custom registry
keys and files
Enforcement Actions
■ Allow
■ Deny
■ TCP reset
■ Mirroring, logging
Threat Detection/Mitigation
■ Zero-hour threat detection
■ No signature updates
necessary
■ Drops malformed packets
■ Block by: physical port, SRC
MAC, offending application
Visualization
■ Ties usernames to
applications and security
violations
■ Identifies applications and
application content
■ Reports application details
to centralized policy center
Centralized Visualization
■ Ties into Alcatel-Lucent
OmniVista SafeGuard
Manager Command Center
■ User and application usage
repository
■ Real-time alert dashboard
■ Fully drillable forensics
capability
■ Reporting and scheduler
■ Full policy and role-
derivation configuration GUI
Logging and Reporting
■ Direct syslog reporting
■ Detailed security log
messages
■ Formatted for SIEM
integration
■ Formatted syslog to multiple
destinations
Management and Control
■ Industry-standard
Command Line Interface
(CLI)
■ Managed by Alcatel-Lucent
OmniVista SafeGuard
Manager Command Center
■ SNMP v1/v2
■ Telnet
■ SSH
■ TFTP
■ Standard and privileged
access modes
Administrator Authentication
■ RADIUS authentication
Performance (Switch Only)
■ Switching capacity: 101
million pps
■ Secure Switching Rate: 10
Gbps
Protocols (Switch Only)
■ 802.1D Bridging
■ 802.1D Spanning Tree
■ 802.1Q/p VLAN Tagging and
Priority
■ 802.1w Rapid Spanning Tree
■ 802.1S MSTP
■ 802.1X Port-based
authentication
■ 802.3 10Base-T
■ 802.3u 100Base-T
■ 802.3z 1000Base-SX/T
■ 802.3ae 10 Gbps Ethernet
■ 802.3af Power-over-Ethernet
Layer 2 Features (Switch Only)
■ 4,096 VLANs
■ 16,000 MAC Addresses
■ Protocol VLAN (802.1v)
■ Port Security (MAC address
locking)
■ Mirror/monitor ports
■ IGMP v1/v2 snooping
Layer 3 Features (Switch Only)
■ Static routing
■ Additional L3 capabilities
due in future software
releases
Chapter 1: SafeGuard OS Overview
SafeGuard OS Overall Feature Summary
The following table summarizes SafeGuard OS features supported by SafeGuard devices.
26
OmniAccess SafeGuard OS Administration Guide
chapter
Accessing and
2
Managing the System
In this chapter:
■Connecting to a SafeGuard Device Console
■Accessing the SafeGuard Device Command Line Interface
■Configuring Management Users
■Managing Out-of-Band Management Port
■Setting Up the System Time and Date (SNTP)
■Managing Device Information
■Managing Network Information
■Configuring the Network Protocol
■Configuring SNMP on the Device
■Configuring Domain Name Servers
■Resetting the Device
■Configuring Data Traffic Ports
■Configuring High Availability Support
Chapter 2: Accessing and Managing the System
This chapter describes the tasks associated with managing the SafeGuard Controller or
the SafeGuard Switch as a device in the network.
Connecting to a SafeGuard Device Console
SafeGuard devices can be managed using a PC or laptop computer connected to the
SafeGuard Controller or SafeGuard Switch.
To connect a SafeGuard device console:
1Using a null cable, connect a PC or laptop computer to the DCE port on the back
of the device.
2Launch a terminal emulation program and configure the settings as shown in
Ta b le 4 .
3The login prompt is displayed.
Table 4PC Terminal Emulator Settings
PC or LaptopSetting
Emulation typevt100
Bits per second9600
Data bits8
Parity bitsNone
Stop bits1
Flow controlNone
See the following sections for details on accessing the SafeGuard device command line
interface.
Accessing the SafeGuard Device Command Line
Interface
The first time that you log into a SafeGuard device, use the default ‘Admin’ as a
username (and no [null] password). Upon first logging into the command interface, you
are in Non-Privileged mode. To perform management and configuration functions, you
need to be in Privileged mode.
28
To access Privileged mode, use the
enable command in Non-Privileged mode.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
enable
This command has no parameters or variables.
For example:
(SafeGuardOS) #?
(SafeGuardOS) #enable
(SafeGuardOS) #
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #
See the following sections for more details on accessing SafeGuard devices:
■Using Telnet
■Using Secure Shell (SSH)
■Customizing and Working with the Command Line Interface Default Settings
Using Telnet
A SafeGuard device can be accessed via a Telnet session.
This section describes basic Telnet commands that may be useful when first accessing a
SafeGuard device via a Telnet session. See the following sections for more details:
■Enabling and Disabling Telnet
■Displaying the Current Telnet and Serial Port Connections
■Closing a Telnet or SSH Session
■Specifying the Maximum Number of Telnet Connections Allowed
■Setting the Telnet Connection Session Timeout
Enabling and Disabling Telnet
Telnet access is enabled by default. If Telnet has been disabled, use the ip telnet
command in Privileged Exec mode. To disable Telnet, use the
ip telnet
no ip telnet
no form of the command.
The commands have no parameters or variables.
Displaying the Current Telnet and Serial Port Connections
To display the current Telnet and serial port connections, use the show sessions
command in Privileged Exec mode.
OmniAccess SafeGuard OS Administration Guide
29
Chapter 2: Accessing and Managing the System
show sessions
An example of this output and explanation of the fields is described in Tracking an
Authenticated User Session on page 219.
Closing a Telnet or SSH Session
To close a Telnet or SSH session, use the disconnect command in Privileged Exec mode.
disconnect [sessionID | all]
Syntax DescriptionsessionIDDisconnects the session specified by the
allDisconnects all remote sessions.
The following example disconnects session ID 10:
session identifier. Use the show sessions
command to find the session ID.
(SafeGuardOS) # disconnect 10
(SafeGuardOS) #
Specifying the Maximum Number of Telnet Connections Allowed
To specify the maximum number of Telnet connection sessions that can be established,
use the ip telnet maxsessions command in Global Configuration mode. Use the
no
version of the command to restore the default value.
ip telnet maxsessions number
no ip telnet maxsessions
Syntax DescriptionnumberSets the number of Telnet sessions. Valid range
is from 1 to 5. The default value is 5.
The following example sets the number of Telnet sessions to 3:
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # ip telnet maxsessions 3
(SafeGuardOS) (config) #
Setting the Telnet Connection Session Timeout
30
To set the Telnet connection session timeout value (in minutes), use the ip telnet timeout
command in Global Configuration mode. Use the
no version of the command to restore
the default value.
ip telnet timeout timeout
OmniAccess SafeGuard OS Administration Guide
Loading...
+ 396 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.