Every effort was made to ensure that the information in this document
was complete and accurate at the time of release. However, information
is subject to change.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your
sales agreement to establish the terms of the limited warranty. In
addition, Avaya’s standard warranty language as well as information
regarding support for this product, while under warranty, is available
through the following website:
http://www.avaya.com/support
Preventing Toll Fraud
“Toll fraud” is the unauthorized use of your telecommunications system
by an unaut horized pa rty (for exam ple, a person who is not a corporate
employee, agent, subcontractor, or is not working on your company's
behalf). Be aware that there may be a risk of toll fraud associated with
your system and that, if toll fraud occurs, it can result in substantial
additional charges for your telecommunications services.
Avaya Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need
technical assistance or support, in the United States and Canada, call the
Technical Service Center's Toll Fraud Intervention Hotline at
1-800-643-2353.
Disclaimer
Avaya is not responsible for any modifications, additions or deletions to
the original published version of this documentation unless such
modifications, additions or deletions were performed by Avaya. Customer
and/or End User agree to indemnify and hold harmless Avaya. Avaya’s
agents, servants and employees against all claims, lawsuits, demands
and judgements arising out of, or in connection with, subsequent
modifications, additions or deletions to this documentation to the extent
made by the Customer or End User.
How to Get Help
For additional support telephone numbers, go to the Avaya Web site:
http://www.avaya.com/support/. If you are:
•Within the United States, click Escalation Manageme nt link.
Then click the appropriate link for the type of support you
need.
•Outside the United States, click Escalation Management link.
Then click International Services link that includes telephone
numbers for the International C ent ers of Excel lenc e.
Providing Telecommunications Security
Telecommunications security (of voice, data, and/or video
communications) is the prevention of any type of intrusion to (that is,
either unauthorized or malicio us access to or use of) your company's
telecommunications equ ipm ent by some part y.
Your company's “telecommunications equipment” includes both this
Avaya product and any other voice/data/video equipment that could be
accessed via this Avaya product (that is, “networked equipment”).
An “outside party” is anyone who is not a corporate employee, agent,
subcontractor, or is not working on your company's behalf. Whereas, a
“malicious party” is anyone (including someone who may be otherwise
authorized) who accesses your telecommunications equipment with
either malicious or mischievous intent.
Be aware that there may be a risk of unauthorized intrusions associated
with your system and/or its networked equipment. Also realize that, if
such an intrusion should occur, it could result in a variety of losses to
your company (including but not limited to, human/data privacy,
intellectual property, material assets, financial resources, labor costs,
and/or legal costs).
Responsibility for Your Company’s Telecommunications Security
The final responsibility for securing both this system and its networked
equipment rests with you - Avaya’s customer system administrator, your
telecommunications peers, and your managers. Base the fulfillment of
your responsibility on acquired knowledge and resources from a variety
of sources including but not limited to:
•Installation documents
•System administration documents
•Security documents
•Hardware-/software-based security tools
•Shared information between you and your peers
•Telecommunications secu ri ty expe rts
To prevent intrusions to your telecommunications equipment, you and
your peers should carefully program and configure:
•Your Avaya-provided telecommunications systems and their
interfaces
•Your Avaya-provided software applications, as well as their
underlying hardware/software platforms and interfaces
•Any other equipment networked to your Avaya products.
TCP/IP Facilities
Customers may ex perien ce dif fer ences i n prod uct p erforma nce, relia bili ty
and security depending upon network configurations/design and
topologies, even when the product performs as warranted.
Standards Compliance
Avaya Inc. is not responsible for any radio or television interference
caused by unauthorized modifications of this equipment or the
substitution or attachment of connec ting cab le s and equ ipme nt oth er
than those specified by Avaya Inc. The correction of interference caused
by such unauthorized modifications, substitution or attachment will be the
responsibility of the user. Pursuant to Part 15 of the Federal
Communications Commission (FCC) Rules, the user is cautioned that
changes or modifications not expressly approved by Avaya Inc. could
void the user’s authority to operate this equipment.
Product Safety Standards
This product complies with and conforms to the following international
Product Safety standards as applicable:
•Safety of Information T echnology Equipment, IEC 60950, 3rd
Edition including all relevant national deviations as listed in
Compliance with IEC for Electrical Equipment (IECEE)
CB-96A.
•Safety of Information Technology Equipment, CAN/
CSA-C22.2 No. 60950-00 / UL 60950, 3rd Edition
•Safety Requirements for Customer Equipment, ACA
Technical Standard (TS) 001 - 1997
•One or more of the following Mexican national standards, as
applicable: NOM 001 SCFI 1993, NOM SCFI 016 1993, NOM
019 SCFI 1998
Electromagnetic Compatibility (EMC) Standards
This product complies with and conforms to the following international
EMC standards and all relevant national deviations:
Limits and Methods of Measurement of Radio Interference of Information
Technology Equipment, CISPR 22: 199 7 and EN5 50 22: 199 8.
Such intrusions may be either to/through synchronous (time-multiplexed
and/or circuit-based) or asynchronous (character-, message-, or
packet- based) equipment or interfaces for reasons of:
•Utilization (of capabilities special to the accessed equipment)
•Theft (such as, of intellectual property, financial assets, or
toll-facility access)
•Eavesdropping (priv acy invasions to humans)
•Mischief (troubling, but apparently innocuous, tampering)
•Harm (such as harmful tampering, data loss or alteration,
regardless of motive or intent)
Information Technology Equipment – Immunity Characteristics – Limits
and Methods of Measurement, CISPR 24:1997 and EN55024:1998,
including:
•Electrostatic Discharge (ESD) IEC 61000-4-2
•Radiated Immunity IEC 61000-4-3
•Electrical Fast Transient IEC 61000-4-4
•Lightning Effects IEC 61000-4-5
•Conducted Immunity IEC 61000-4-6
•Mains Frequency Magnetic Field IEC 61000-4-8
•Voltage Dips and Variations IEC 61000-4-11
•Powerline Harmonics IEC 61000-3-2
•Voltage Fluctuations and Flicker IEC 61000-3-3
Page 3
Federal Communications Commission Statement
Part 15:
Note: This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a
commercial environment. This equipment gener ates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in
a residential area is likely to cause harmful interference in which
case the user will be required to correct the interference at his own
expense.
Canadian Department of Communications (DOC) In terference
Information
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003
du Canada.
This equipment meets the applicable Industry Canada Terminal
Equipment Technical Specifications. This is confirmed by the registration
number. The abbreviation, IC, before the registration number signifies
that registration was performed based on a Declaration of Conformity
indicating that Industry Canada technical specifications were met. It does
not imply that Industry Canada approved the equipment.
DECLARATIONS OF CONFORMITY
United States FCC Part 68 Supplier’s Declaration of Conformity
(SDoC)
Avaya Inc. in the United States of America hereby certifies that the
equipment described in this document and bearing a TIA TSB-168 label
identification number complies with the FCC’s Rules and Regulations 47
CFR Part 68, and the Administrative Council on Terminal Attachments
(ACTA) adopted technical criteria.
Avaya further asserts that Avaya handset-equipped terminal equipment
described in this document complies with Paragraph 68.316 of the FCC
Rules and Regulations defining Hearing Aid Compatibility and is deemed
compatible with hearing aids.
Copies of SDoCs signed by the Responsible Party in the U. S. can be
obtained by contacting your local sales representative and are available
on the following Web site:
http://www.avaya.com/support
Japan
This is a Class A product based on the standard of the Voluntary Control
Council for Interference by Information Technology Equipment (VCCI). If
this equipment is used in a domestic environment, radio disturbance may
occur, in which case, the user may be required to take corrective actions.
China
BMSI (Chinese Warning Label)
Hardware, including technical data, is subject to U.S. export control laws,
including the U.S. Export Administration Act and its associated
regulations, and may be subject to export or import regulations in other
countrie s. Customer agrees to comply strictly with all such regulations
and acknowledges that it has the responsibility to obtain licenses to
export, re-export, or import hardware.
Acknowledgments:
This product includes software developed by the Apache Software
Foundation (http://www.apache.org).
Environmental Health and Safety:
!
WARNING:
Risk of explosion if battery is replaced by an incorrect type. Dispose of
used batt e ries accor ding to Avaya Environmental Health and Safet y
guidelines.
Documentation:
For the most current versions of documentation, go to the Avaya support
Web site: http://www.avaya.com/support/
All Avaya media servers and media gateways are compliant with FCC
Part 68, but many have been registered with the FCC before the SDoC
process was available. A list of all Avaya registered products may be
found at:
http://www.part68.org/
by conducting a search using “Avaya” as manufacturer.
European Union Declarations of Conformity
Avaya Inc. declares that the equipment specified in this document
bearing the “CE” (Conformité Europeénn e) mark conforms to the
European Union Radio and Telecommunications Terminal Equipment
Directive (1999/5/EC), including the Electromagnetic Compatibility
Directive (89/336/EEC) and Low Voltage Directive (73/23/EEC). This
equipment has been certified to meet CTR3 Basic Rate Interface (BRI)
and CTR4 Primary Rate Interface (PRI) and subsets thereof in CTR12
and CTR13, as applicable.
Copies of these Declarations of Conform ity (DoCs) can be obtai ne d by
contacting your local sales representative and are available on the
following Web site:
This Avaya VPNmanager® Configuration Guide is written for individuals who have an
understanding of how computer networks are installed, configured, and managed. It provi des
detailed information about using the Avaya VPNmanager solution to build small, medium, or
large scale Virtual Private Networks (VPNs).
VPNmanager is a Java-based software application that brings convenience, ease of use,
extended functionality, and platform independence to the management of VPNs.
What Products are Covered
Avaya’s solut ion i s a li ne of thr ee pr oduct s that ar e used for managi ng V ir tual Privat e Networks.
Each one, listed below, has been designed to meet the needs and requirements of either a
small, medium, or large network.
● VPNmanager Service Provider
● VPNmanager Enterprise
VPNmanager Overview
The VPNmanager application lets network managers def ine, configure, and manage Virtual
Private Networks (VPNs) from any location equipped with a computer running Window NT,
Window 2000, Windows 2003 Server, or Solaris.
Network managers can configure and check the status of Avaya security gateways and VPN
Service Units (VSU), add or remove remote sites and dial-in users to a VPN, configure user
authentication servers using LDAP directo ry servers or RADIUS servers, and monitor the state
of all security gateways, as well as the perfor man ce of private data transmissions using
Java-interface technology.
Issue 4 May 200515
Page 16
Preface
Network-wide Visibility and Control
The logical VPNmanager representation of virtual private networks simplifies their installation
and control. From a single workstation, network managers can assign users anywhere on the
network to one or more logical Groups and integrate local and remote Groups into VPNs. The
VPNmanager software provides global-level, VPN-level, group-level, client-level and
equipment-level monitoring and control capabilities, and automates the task of managing
configurations across multiple security gateways and Avaya VPNremote® Clients. Extensive
alarm-reporting and statistics-gathering capabilities allow network managers to respond in real
time to hardware, network, and security p roblems, and t o plan the ef ficient growth and ev olution
of their networks.
Intranet and Extranet Support
The VPNmanager software makes it easy to extend intranet servi ces to remote sites and users
securely. In addition, the VPNmanager’s sophisticated import and export capabilities enable
network managers from different organizations to securely link with one another into private
wide-area “extranets.” Companies can quickly link and unlink to their suppliers, customers,
consultants, and other business associates with flexibility and speed unmatched by tr aditional
communications services.
Secure VPN Configuration
Several mechanisms are employed to insure sec uri ty when ma naging VPNs. I ndustry -st andard
Secure Socket Layer (SSL) technology is used to keep confi guration traffic between the
VPNmanager and VSUs private. In addition, X.509 certificates are used by both VSUs and the
VPNmanager console providing an authentication capability, thus allowing only authorized
administrators to configure VSUs. Once authenticated, administrators can configure, modify,
restart, or upgrade any securi ty gateway in the corporate network. Finally, sensitive
cryptographic keying informati on stored in the VPNmanager database is encrypted using a
password key to prevent compromising secure network traffic.
No Special Consoles Required
The VPNmanager software runs on host environment s that support the Java Virtual Machine
(see the VPNmanager README file for a current list of supported platforms). Expensive
management consoles and proprietary management interfaces are not needed. Regardless of
the host platform, the VPNmanager software presents the same appearance and user controls.
The VPNmanager software is designed specifically for securely defining, configuring,
monitoring, and upgrading VPNs. The VPNmanager software is required to configure and
modify VPNs. Secure traffic running between VSUs or between VSUs and VPNremote Clients
does not require an active VPNmanager . After c onfiguring the required VPNs, the VPNmanager
can be shutdown if desired, or used to monitor securi ty gateway activity. In addition, standard
MIBs available with the VSUs enable monitoring from standard SNMP management stations.
Using VPNmanager Help
The VPNmanager comes with a context-sensitive-Help system. Use the Help system for gett ing
information about a specific command in the VPNmanager graphical user interface (GUI).
Related Documentation
Related Documentation
Be sure to read the VPNos Configur ation Gui de. I t contains important information on the proper
procedure for setting up your VSUs, which is a prerequisite to setting up a Virtual Private
Network.
VPNremote Client software inst al lati on an d usage inf ormation is found in the VPNremote Cl ient Administrator’s Guide. This software allows the network administrator to pre-configure the
VPNremote client software for distribution to end users via the web, or on portable storage
media such as a CD or floppy disk.
You can download these documents from www.avaya.com. Click on Product Documentation,
select VPNand Security.
How This Book Is Organized
With this release of VPNmanager, the administrator’s guide was redesigned to present
information in the order that you use VPNmanager to configure a secure network.
Note:Depending on the VPNmanager version, some features described in this guide
may not apply.
Issue 4 May 200517
Page 18
Preface
Chapter 1: Overview of implementation, provides an overview of how to use VPNmanger for
centralized administration of your VPN and security gateway. It includes a checklist for
implmeneting the network.
Chapter 2: Using VPNmanager
, explains how to log in to VPNmanager. It also explains how to
use the VPNmanager interface, including the VPNmanager main console and the configuration
console. The VPNmanager Preferences are described here.
Chapter 3: Setting up the network
, explains how to create a domain and creat e and configur e a
security gateway. This chapter explains how to configure the Device object, including mu ltiple
zones, NAT services, DNS, and Static Route.
Chapter 4: Configuring IP Groups
, describes how to configure IP Group Objects for Data
Terminal Equipment (DTE) such as computers, printers, and network servers as members of
your VPN.
Chapter 5: Configuring remote access users
, describes how to setup and maintain individual
remote access users in the VPN. This chapter includes Dyna-Policy configuration and
information about the Policies tab including Client IP configuration RADIUS/ACE services, and
client attributes
Chapter 6: Configuring user groups
, describes how to setup and maintain logical groups that
the individual VPN remote users reside.
Chapter 7: Configuring VPN objects
, explains VPN Objects as the method for linking VSUs,
remote terminals, and LAN terminals in a fully configured VPN.
Chapter 8: Establishing security
, describes the levels of Firewall policy management and De nial
of Service available, how to configure t he security gateway for Voice over IP and how to create
and map Quality of Service (Qos) rules.
Chapter 9: Using advanced features
, describes about using certificat es, configuring the
Directory Server, resilient tunnels, and high availability groups.
Chapter 10: Monitoring your network
, describes the monitoring and reporting features of the
VPNmanager software. This includes SNMP, Syslog Services, Reports, and Alarms. These
features allow virtual real-time monitoring of the VPN performance and specific security
gateways.
Chapter 11: Device management,
describes how to optimize the VPNmanager, check
connectivity, reset the device time, reboot, resetup a secur ity gateway and how to import a VPN.
Chapter 12: Upgrading firmware and licenses
, describes how to use the automatic upgrade
feature to upgrade the firmware for a secur it y gateway or for a group of secruity gateways, and
how to add new licenses to your security gateway.
Appendix A: Using SSL with Directory Server
, describes the benefit of using secure socke t layer
(SSL) with the Directory Server.
Appendix B: Firewall rules template
, describes the predefined firewall templates that are
Planning how your virtual private network should be configured is critical to the successful
deployment of a secure virtual private network.This chapter provides an overview of the major
features that you will configure.
Note:This chapter does not explai n how to set up a VPN or how to dete rmine what type
of security policies are required. You should understand about networking,
establishing firewall policies, and VPNs before implementing a VPN using
VPNmanager.
Components of the Avaya security solution
The Avaya security solution cons ists of the following:
● Avaya VPNmanager™
● Avaya™ SG security gateways and VPN Service Units (VSU)
Note:Beginning with VPNmanager 3.4, this configuration guide uses “security
gateway” to refer to both the security gateway and the VSU. The VPNmanager
application uses the word “Device” to refer to both of these components.
● Avaya VPNremote™ Client
Security gateways
The security gateways are desi gned to provide fi rewall coverage and VPN gateway functionali ty
for enterprises migrating towards conver ged network environments. The security gateway
performs cryptography, authentication, and filtering tasks at the boundary of the VPN.
After the security gateway is installed and configured, the secu rity gateway is transparent to
users who are logged into the VPN.
Issue 4 May 200521
Page 22
Overview of implementation
VPNremote Client software
VPNremote Client software is a communicati ons application t hat runs on remot e computers that
use dialup, DSL and cable connection supplied by Internet Service Providers (ISP), to connect
to the corporate VPN. When communicating with a VPN, the software seamlessly performs
authentication and cryptography tasks. To install and use the software, an account with an ISP
must first be created.
The software is install ed on the remote user’s computer and then Client Configuration
Download (CCD) can be used to configure the remote user’s Dyna-Policy™ for authentication
to a specific VPN.
When remote users log in, they connect to the ISP and type in their user authe ntication
information, if asked. Upon authent ication, an y traf fi c that use s the VPN is safel y encrypted as it
is transported through the public networks.
VPNmanager software
VPNmanager software lets network managers define, configure, manage VPN and firewall
policies, upgrade firmware, and manage remote user access policies from a central location.
The VPNmanager software combines two components, the VPNmanager Console and the
policy server.
● The VPNmanager console is a client that is used for configuring, managing, and
monitoring one or more VPNs. The consol e is a Java app licatio n that can be r un anywhere
and is used as a front-end to the policy server and the directory server.
● The policy server distri butes configurati on and security policies. The VPNmanager console
is a client that communicates with the policy server to retrieve security policies. The policy
server then communicates with the directory server.
The VPNmanager Console and the directory server can reside on separate, dedicated servers
within the network to provide better performance for updating and configuring large numbers of
security gateways. You can use either an existing Sun One Server or Microsoft Active Directory
Server to store the policies that are created.
VPNmanager software consists of different versions to meet the needs of various networks.
● VPNmanager Small Office. Use the small office version for managing up to fi ve security
gateways and unlimited VPNremote Clients.
● VPNmanager Enterprise. Use the VPNmanager Enterprise version for managing an
unlimited number of devices and VPNremote Clients.
● VPNmanager Service Provider. Use this version to manage an unlimited number of
devices and VPNremote Clients. The Service Provider also supports multiple VPN
domains, which meets the needs of ISPs.
● VPNmanager Enterprise Client. Use the Enterprise Client version for managing an
unlimited number of security gateways and VPNremote Clients.
● VPNmanager Service Provider Client. Use the Service Provider Client version to
manage an unlimited number of security gateways and VPNremote Clients. The Service
Provider also supports multiple VPN domains.
Overview of the VPN management hierarchy
With the VPNmanager software, you can configure and manage VPNs and firewalls from a
central location. By focusing on secur ity policy instead of individual device management,
administration of large-scale networks is simplified. Central management allows you to make
configuration updates automatica lly to al l af f ecte d security gateways. This dist ribut ed approach
also applies to firewall management.
The VPNmanager software is built on a policy-based architecture that allows the administrator
to start at a high-lev el with a VPN domain, then move down t he hierarchy to create user gr oups,
IP groups for protected resources, and security groups that define membe rship and policies of
the VPN.
Figure 1: Domain hierarchy
At the peak of the hierarchy is the VPN domain. A domain is as sig ned a name to ident ify i t from
other domains. Usually one domain is configured fo r an entire or ganizat ion. A domain is bui lt of
one or more VPNs.
Each VPN is built of users, user groups and IP groups. VPNs are assigned names. These
names can associate the VPN to a regional location or purpose.
Users are the individual remote ac cess user s who log in to the VPN thr ough a securit y gateway.
The VPNremote Client software is used to connect to the VPN services.
A User Group contains or organizes user accounts. These accounts are assigned to remote
VPN members who dial in to the network and run VPNremote Client software to access the
VPN.
Issue 4 May 200523
Page 24
Overview of implementation
An IP Group contains the IP addresses that belong to a specif ic LAN. Any device connected to
the LAN can use these addresses. A VPN can have many IP Groups so addresses can be
consolidated to meet the needs of an organization.
The security gateway is configured to provide VPN gateway functionally and firewall coverage.
VPNmanager security management includes creating domain-level firewall rules and
device-level firewall rules. VPNmanager provides multiple firewall templates that can be used
as a general rule set or as a starting point for creating a customized firewall template. You can
apply these templates at the domain level for al l security gateways, for a specific security
gateway (device-level), or for a defined device group.
Preparing to configure your network
Before you use VPNmanager to build your VPN and establish your VPN security policies, you
need to know how the VPN should be implemented. This section gives a overview of what
information you should know before you begin.
The following are functions or tasks that need to be addressed:
● How the security gateway will be configured for your network
● Which remote users will be configured on a security gateway
● What IP addresses to configure and group
● What type of security policies you want to implement
● What VPN services to use
● What advanced features, such as VoIP, Failover, or SNMP will be implemented
Security gateway
The security gateway is preconfigured with default settings for the media interface zones and
Network Address Tr anslation (NAT). You may need to change default configuration for your
specific network environment.
Up to six media interfaces can be configured with different zone interfaces. The number of
zones that can be configured depends on the security gateway model (Table 1
Ethernet1 are present in all models and are assigned to the public and the private zones. The
media interfaces that remain are unused and can be configu red as required.
). Ethernet0 and
● Public zone. Public zone provides connection to the Internet, usually by way of a wide
area network (WAN).
● Private zone. Private zone is used to provide connection to your private local area
● Public-backup zone. Public-backup zone is the backup interface to the primary public
interface for use when Failover is configured.
● Semiprivate zone. Semiprivate zone is used for media such as wireless LAN, where the
network is considered part of the protected network, but the media may be vulnerable to
attack. The semi-private zone provides the additional security measure of IPSec
encryption to prevent compromise to the network, for example, VPN over wireless
protection.
● DMZ zone. DMZ (Demilitarized zone) is used for an area in the company network that
needs to be accessible from the public networks, for example, email, FTP, and Web
servers, but the area is not considered p art of the internal private network. Serv ers in the
DMZ typically have publicly rout able IP addres ses or shou ld use adva nced NAT within the
security gateway.
● Management zone. Management zone is used to simplify network deployments, to
eliminate enterprise network dependencies on switches or routers. The management
network interface is usually used as an access poi nt for a dedicated VPNmanager
management station or as a dedicated interfac e for dumping log messages to a syslog
server.
Static routes are specified when more than one router exists on a network to which the security
gateway must forward either VPN traffic or non-VPN tr affic. You can build a static route table
with up to 32 network address/mask pair s.
IP groups
Data Terminal Equipment (DTE); such as computers, print ers, and network server s, are devices
that can be members of a VPN. To make these devices members, you create IP Group s. An IP
Group is composed of a set of hosts (workstati ons and servers) that are located behind a
common security gateway. The hosts are defined by their IP address and mask. VPNs are
made up of IP groups at multiple locations linked across a public IP network (Internet).
Assigning workstations and servers to different IP groups offers a powerful way to limit VPN
traffic to specifically designated users.
Remote users and user groups
VPNremote Client users who log in to the VPN through the security gateway must have their
user authentication configured on that security gateway.
If RADIUS is not used, you must configure the user name and the password for each remote
user . With RADIUS, you can configure a remote user as a default user. When a remote user is
configured as a default user, the user password is not required to log in. The user is
authenticated by a third-party authentication server, such as RADIUS.
You can also change the default Internet Key Exchange (IKE) identity, the split tunneling option
and the security option.
You can configure User Groups to setup and maintain logical groups of users.
VPN
A VPN object is the method used to link security gateways, remote terminals, and LAN
terminals in a fully configured virtual private network. Creating a VPN involves naming each
VPN, adding users and user groups, and adjusting the IKE and IPSec security protocols for
VPN traffic.
VPNmanager security policy management provides the following security features that can be
configured:
● Firewall rules
● Denial of Service (DoS) categories
● Quality of Service (QoS) rules
● Bandwidth management
In addition, encryption security options include Internet Key Exchange (IKE) with IPSecuirty
protocol (IPSec). It applies globally to the VPN.
Firewall policies
VPNmanager firewall policy management includes domain firewall rules, device firewall rules,
and firewall templates . The VPNmanager software provi des multiple firewall templates that can
be used as a general rule set or as a starting point for creating a customized firewall template.
You can apply these templates at the domain level for all security gateways, for a specific
gateway, or for a defined group. The integrated SMLI (Stateful Multi-Layer Inspection) Firewall
supports firewall rules criteria based on the following:
Preparing to configure your network
● Source/Destination IP address or range
● TCP/UDP/ICMP protocol
● Port or port ranges
● IP protocol
● Interface
● Direction
A set of common network services is provided, and custom network services or objects can be
easily defined for use in both firewall and QoS policies. Firewall rules can be individually
enabled to track state i nformation on TCP/UDP/ICMP packet flows and can be us er-configured
with advanced state timers. Logi n can also be enabl ed for each rule.
Note:Domain level rules and firewall templates are available for VPNos release 4.2
and later.
Denial of Service
The following Denial of Service (DOS) categories are enabled to protect the security gateway
from attack by hackers.
Issue 4 May 200527
Page 28
Overview of implementation
Ping of Death. - The ping of death sends packets with invalid lengths. When the receiving
system attempts to rebuil d the packets, the system crashes because the packet length exhausts
the available memory.
IP Spoofing. - This attack sends an IP p acket with an invalid IP addres s. If the system accepts
this IP address, the attacker appears to reside on the private side of the security gateway. The
attacker is actually on the public side, and bypasses the firewall rules of the private side.
Smurf Attack. - This attack floods the system with broadcast IP packet pings. If the flood is
large enough and long enough, the attacked host is unable to receive or distinguish real traffic.
Tear Drop. - This attack sends IP fragments to the system that the receiving system cannot
reassemble and the system can crash.
Flood Attack. - This attack floods the system with TCP connecti on requests, which exhausts
the memory and the processing resources of the firewall. Flood attacks also attack the UDP
ports. This attack attempts to flood the network by exhausting the available network bandwidth.
WinNuke Attack. - This attack attempts to completel y disable networking on computers that
are running Windows 95 or Windows NT. This attack can be swift and crippling because it uses
common Microsoft NetBIOS services.
QoS
VoIP
Buffer Overflow. - This attack overflows the internal buf fers o f the a ppli cati on by sendi ng mor e
traffic than the buffers can process.
Quality of Service (QoS) allows you to classify and prioritize traffic based on DHCP values and
TCP/IP services and networks. The bandwidt h available to a class of traffic can be allotted to a
specific percentage of the total upstream bandwidth. Confi guring QoS allows VoIP traffic to
receive a higher priority. If QoS is disabled, all traffic receives the same priority.
The security gateway can be configured to protect and enable the communication of VoIP
telephones either within a VPN or firewall. The security gateway can be configured to secure
Avaya Multivantage™ and IP Office™ VoIP solutions as follows:
● Secure site-to-site voice trunks such as between headquarters and branch offices or
between main offices and home offices using VPNs.
● Secure VoIP servers or endpoints (IP telephones) by providing perimeter security using
the V oIP aware firewall fi ltering that is able t o dynamically open and clos e all port s required
to pass VoIP communication between servers and endpoints
● Allow voice-secure communication wit h Avaya’s IP Softphone and IP Office Phone
Manager Pro using VPNremote Client
● Enable NAT traversal of H.323 VoIP traffic
● Optimize bandwidth for VoIP traffic using the security gateway’s Quality of Service (QoS)
policies
In order to successfully use VoIP it is important to thoroughly plan the implementation of the
feature. Avaya suggests that you read the Avaya IP Telephony Implementation Guide before
implementing VoIP.
Additional features
The following is a list of some of features that can be configured depending on your VPN
networking requirements.
NAT
Preparing to configure your network
Network Address Tr anslation (NAT) is an Internet standard that allows private (nonrout able)
networks to connect to public (routable) networks. To connect private networks and public
networks, address mapping is performed on a security gateway that i s located between the
private network and the public network.
You can set up three types of NAT mapping on the security gateway:
By default, NAT is enabled and the Share public address to reach the Internet feature is
selected. NAT affects only clear traffic.
SNMP
The VPNmanager uses the SNMP protocol to monitor the security gateway. The security
gateway includes a SNMP agent that supports MIB-II and a proprietary MIB. This agent is
read-only and cannot be used to configure the security gateway. The agent can send traps to a
list of trap agents that you configure. SNMPv1, SNMPv2c, or VNMPv3 can be selected.
● Static NAT. With static NAT, addresses from one network are permanently mapped to
addresses on another network.
● Port NAT. With port NA T, addresses from internal, nonroutable networks are t ransl ated to
one routable address in Port NAT.
● Port Redirection. With port redirection, addresses from a specific IP address and a
specific port are redirected to another IP address and port.
Issue 4 May 200529
Page 30
Overview of implementation
Syslog
The security gateway has a syslog messaging facility for logging system error messages. The
message can be automatically sent to a destination running a Syslog server.
Client IP address pooling
Access control devices (ACD), such as firewal ls, guard networks from unauthorized users.
Analyzing source addresses is one method ACDs use to decide which packets can enter a
network. The addresses that ISPs dynamically assign to VPNremote Client users is naturally
blocked because it is i mpossibl e to k now ahe ad of ti me whi ch addr ess is ass igne d. You need to
configure the VPNremote Cli ent IP add ress po ols f eature with th e source IP addres ses that can
be recognized by an ACD so that user access is not blocked.
SSL for Directory Server
As an added benefit, all communications with the direc tory server can be secured by SSL
(Secure Sockets Layer).
You can configure your VPN to run SSL at any time. However it is recommended that you
configure SSL before you put the VPN into service, so that the VPN services do not have to be
stopped.
Sequence to configure your VPN
The suggested order to set up your VPN is as follows. Refer to the chapters in this
VPNmanager Administrator’s Guide for details about how to create and configure these
features.
1. Create a VPN domain
2. Create the VPN
3. Create a security gateway
4. Configure needed static routes on the gateway
5. Create IP groups
6. Associate IP groups with the security gat eway
7. Associate IP groups with the VPN
8. Create new users
9. Associate users with VPNs
10. Create a VPNremote Client address pool on the gateway
With Avaya VPNmanager you can define, configure, and manage VPNs and firewall policies,
upgrade firmware, and manage remote user access policies. The VPNmanager graphical
interface is modularized by functions and tasks to make configuring a VPN fast and easy.
This chapter describes how to:
● Log in
● Navigate the VPNmanager Console interface
● Configure Preferences for the VPNmanager Console
● How to communicate with the security gateway
About VPNmanager administrators
When the VPNmanager software was i nst alled , during the policy ser ver l ogin c onfigur ation, yo u
configured the centralized management VPNmanager log in ID and password.
A VPNmanager administrator can also be set up as a SNMPv3 administrator.
In previous releases of VPNmanager the super user administrator was supported. Beginning
with VPNmanager 3.5, the super user administrator function has been expanded and in now
included in the role based management feature.
Role Based Management
This features allows network administrator’s to assign one or more management role(s).
Additionally, using role based access control (RBAC) in conjunction with corporate security
guidelines, the network administrat or can more effect ively and eff iciently manage the secur ity of
the corporate network.
Beginning with VPNmanager 3.5, the ro le based management f eature will suppor t three class es
of users as follows:
1. Super User
2. One super user is configurable. The super user has unlimited access control over all VPN
domains, and is the user configured from the policy server.
3. Only the super user can create VPN domains, create administrators, define RBACs for the
administrators, and change administrator passwords.
Issue 4 May 200533
Page 34
Using VPNmanager
4. Admin istrator with fu ll access
5. An administrator with full access can modify the configuration for VPN domains, change
their password, and be part of multiple VPN domains.
6. VPNmanager allows full-access administrator to modify objects and devices that are saved
by VPNmanager. RBAC full-access administrators can create or delete objects, update or
upgrade devices, and modify or import configuration.
7. Full-access administrators are not able to create new VPN domains, create new
administrators, or change other administrator’s passwords.
8. Administrator with read-only access
9. An administrator with read-only access can view the configuration for VPN domains,
change their password, and be part of multiple VPN domains.
10. Read-only administrators cannot create, modify, or delete objects. Additionall y, read-only
administrators cannot update or upgrade devices, modify or import configuration, reboot or
reset devices, import or apply lic enses, or change other administrator’s passwords.
To add an administrator
The Admin object is used to change the super user password and to create administrators.
1. Select Admin from the New Objects list. The New Admin dialog opens
2. Enter the administrator’s name and the admin directory password.
3. Click Apply and then click Close.
To configure an administrator to be an SNMPv3 admin
1. From the Configuration Console>AdminContents co l umn, select t h e ad m in to be
configured as an SNMPv3 admin. Select the SNMP tab to bring it to the front.
2. Check Enable.
3. For the Security Level, select either
● Authentication and Privacy
● Authentication and No Privacy
4. Based on the selection, the privacy settings are enable or disabled.
5. In the Authentication Protocol fiel d, select either the def ault, HMAC_SHA1or HMAC_MD5
and enter a password.
6. For the privacy settings, the only available value is DES_CBC. Enter the privacy password.
7. When finished, click Save. When you configure SNMPv3 for a device, the admin name is
listed.
You log in to the VPNmanager from your computer’s Start menu, Programs>Avaya>
VPNmanager>Console. You use the super user name and password that were configured
when the VPNmanager software was installed.
Figure 2: VPNmanager login screen
Log into the VPNmanager console
The first time you log in to the VPNmanager Console, you log in as the super user and add the
policy server address or the name associated with the address. See Add a policy server
page 35.
Administrators that the super user creates can log in.
To log in:
1. In the User Name field, type the administrator name, if it is not displayed.
2. Type the password that was configured when the VPNmanager software was installed.
3. The IP address or name of the policy server is listed in the Policy Servers list. Select the
Policy Server, if it is not highlighted and click Connect to log into the server.
Add a policy server
The policy server is installed during the installation of the VPNmanager Console. The policy
server distributes configuration and security policies. The VPNmanager console is a client that
communicates with the policy server to retrieve security policies. The policy server then
communicates with the directory server.
You add the policy server address the first time you login into the VPNmanager Console.
1. From the VPNmanager Login dialog, click Add.
2. Enter the name that identifies the Policy Server, if available. This is the “user fr iendly name”
on
Issue 4 May 200535
Page 36
Using VPNmanager
Note:
3. Enter the IP address of the Policy Server.
4. Enter the port. The default is 443.
5. Click OK. The name or address is displayed on the login screen
You can edit or delete the policy server information.
Open Domain
When you connect to the directory server, an Open Domain screen appears. A list of all
domains is displayed, with the last-selected domain highlighted.
Note:The Open Domain screen does not appear if you add a context and then click
Connect on the first logon dialog.
At this point, the main console display screen appears and the selected VPN appears in the
View VPN window.
Navigating the main window
The VPNmanager Console consists of the console main window, the Configuration Console
window and dialogs to configure and monitor domains, VPNs, and the security gateway and
network configurations related to them.
When you log in to VPNmanager for the fi rs t time, the main wi ndow is bl ank.The t itl e bar shows
No Domain Open. When you open a domain, the title bar shows the name of the domain that is
opened.
The main window includes a menu bar, a toolbar, the view VPN pane, and the alarms
monitoring pane.
The menu bar on the main VPNmanager screen includes the following commands File, Edit,
View, Tools, and Help.
File menu
The File menu includes the following commands:
● Domain. You can create a new domain, open, close, or delete an existing domain, and
select from a list of recent domains that wer e accessed.
When you select to create New, a dialog to create a new domain name is displayed. This
name is the unique name ass igned to an overall virtual private network. A VPN domain is a
collection of VPN devices that compose a VPN network. See This chapter describes the
following features that are configured for the domain and the security gateway on page 55.
When you select Delete a list of all available domains is displayed. You can delete just the
users within the domain, just the user groups within the domain, or all objects with the
domain.
Issue 4 May 200537
Page 38
Using VPNmanager
Note:
Note:When you delete VPNs that include groups associated with RADIUS-enabled
● New Object. When New Object is selected, a list of objects that can be created are
displayed. When you select one of these c ommands, ei t her a dial og or a wi zard is o pened
to configure the information. Table 2
● Logoff. Logoff closes the current director y server without exiting VPNmanager. The Login
screen appears immediately after you log off.
● Exit. Exit closes the VPNmanager console.
Figure 4: File Menu>New Object list
security gateways, the VPNremote Client configuration records should be
removed from the RADIUS database. See RADIUS/ACE Services
on page 124.
describes the new objects that can be configured.
Table 2: New object
ObjectsDescription
DeviceYou create a new security gateway within a domain and configure
the port interfaces
IPGroupYou configure new IP groups to ass ign workstations and servers.
UserFor each remote user, you configure the name and password for
authentication
VPNTo create a virtual private network, you give it a name and select a
key management method.
ServiceYou create services to specify different traffic types.
User GroupYou can set up logical groups in which the individual VPN users
Device GroupYou can group devices and assign users the those specific
devices.
QoSYou create a quality of servi ce (QOS) policy to classify and
prioritize traf fic based on a DSCP value and TCP/IP services and
networks.
AdminYou can configure VPNmanager administrators and assign
administrative roles.
FailoverYou can configure up to five IP address for tunnel end point s (TEP)
and properties for failover reconnection.
Converged
Network Analyzer
(CNA) Test Plug
Edit menu
From Edit, you can chose one of the following commands:
● Delete Object. Select an object from the VPN diagram and then select Edit>Delete
Object.
● Modify Object. Select an object form the VPN diagram and then select Edit>Modify
Object.
● Preferences. Edit>Preferences brings up a window with tabs to sel ect from. See
Preferences on page 48 for a description of the tabs and how to configure VPNmanager
preferences.
Vie w me nu
From View, you can select to view the Configuration, the Monitoring Screen, or the Report
Wizard.
You can configure the CNA test plug feature to monitor your
network in real-time to detect and diagnose converged-network
related issues.
2 of 2
● Configuration. Select View>Configuration to open the Configuration Console, or you
can click the Config ic on on th e t oolbar. From the Configuration console y ou can con figure
and modify the VPN network. See Configuration Console window on page 44
● Monitoring Screen. Select View>Monitoring Screen to open the Monitoring wizard for
.
the domain that is opened, or you can click the Monitor icon on the toolbar. The Monitor
wizard assists you in selecting the various VPN objects you wish to monitor. A number of
prebuilt MIB-II and VPNet Enterprise MIB parameter groups can be selected to monitor
desired VPN functions, or you can build a custom monito ring group from a comprehensive
Issue 4 May 200539
Page 40
Using VPNmanager
Note:
list of enterprise MIB objects. Examples of ready-to-use groups include an Attack log,
Traffic log, security gateway CPU usage, and throughput.You select a type of group to
monitor, or you can define a customer group to monitor. See Using Monitor on page 250
● Report Wizard. Select View>Report Wizard to open Reports, or you can click the
Reports icon on the toolbar. The wizard guides you through creating various reports
showing details of your network or an object in the network. See Report Wizard on
page 270.
Tools menu
From Tools, you can access the following commands.
● Update Devices. Update Devices is used to update the security gateway configuration
with the configuration currently in the Directory Server database.
● Show Trace Console. Trace Console is used to log some debugging information. This
information is used by Avaya support to di agnose and troubleshoot any problems that may
occur.
Help menu
.
From Help, you can access the VPNmanager Help, and About VPNmanager.
Note:Many of the VPNmanager screens display a “?” icon that, when selected, opens
Toolbar
The toolbar on the main VPNmanager screen contai ns buttons that are shortcuts for the t a sks
on the Menu bar and the Device Update button.
New ObjectThe New Object button is a shortcut to the File>New Object
command to create new objects within any of the categ ories listed
in Table 2
. When you select one of these commands, either a
dialog or a wizard is opened to configure the information.
ModifyThe Modify command is used to modify objects from the network
diagram view. To use Modify, first select the object to be modified
from the network diagram view in the monitor pane and then click
Modify.
DeleteDelete is used to delete objects from the network diagram view. To
use this Delete, first select the object to be deleted from the
network diagram view in the monitor pane and then click Delete.
ReportThe Report button is a shortcut to the View>Report Wizard
command that guides you through the steps to create a report
about your network.
ConfigThe Config button is a shortcut to the View>Configuration
command that opens the Configuration Console dialog . From this
dialog you can configure new objects, modify, and view existing
content and details about the domain.
MonitorThe Monitor button is a shortcut to the View>Monitor Screen
command,
to open the monitoring wizard for the domain that is
open.
Update DevicesUpdate Device is a shortcut to Tools>Update Devices used to
update the security gateway configuration with the configuration
currently in the Directory Server database.
Issue 4 May 200541
Page 42
Using VPNmanager
Note:
VPN view pane
The VPN view pane is empty until you define your VPN. As devices are config ured and added
to the VPN, they are displayed in the view pane. The VPN view pane automatically selects one
of three presentation types: network diagram view, tiled view, or tree view. The VPN view is
determined by the complexity of the VPN. When the VPN contains fewer than six security
gateways, a familiar network diagram view is presented. When more than five security
gateways exist, the view switche s to a til ed display i n a vertica lly scrol ling window. Alternately , a
third presentation sty le, the tree view , can also be selected to deal with complex VPNs.
In addition to displaying the individual security gateways in the VPN, a list of Remote Access
Users associated with each security gateway is also displayed pro viding a compre hensive VPN
overview at a glance. Double-clicking on an object au tomatically opens the configuration
console details window.
At the top of the VPN View pane is the VPN View sele ction bar.
VPN view selection toolbar. - The VPN View selection bar contains two elements, a list from
which the desired VPN is selected, and two radio buttons to select the view styles (Diagram or
Tree).
Note:If more than five security gateways are present in the VPN, only the tiled or tree
views are available.
All security gateways in the selected VPN selected are displayed, however, only one security
gateway can be in focus at any time. The security gat eway in focus is indi cated by a dashed line
around the box and a yellow background.
Remote clients associated with the VPN currently in focus are displayed in a two-column
scrolling list box. This list always appears at the top of the Tiled Vi ew pane. Clients are listed
alphabetically.
Status Icons. - The functional status of each security gateway in the VPN is indicated with an
icon on the security gateway graphic. A green dot wit h a checkmark in it means full func tionality,
while a red dot with an “x” indicates an alarm.
Network Diagram View
In this view, all security gateways, their IP address, associated IP Groups, and a li st of all
remote client users in the currently selected VPN are displayed in a circular pattern around the
Internet cloud which appears in the center. The security gateways are displayed graphically
along with a device status icon directly over the security gateway graphic.
When six or more security gateways are present in the selected VPN, the presentation
automatically switches from the diagram view to the tiled view.
Figure 7: VPNmanager, Tiled View
Tree View
An alternative presentation style to the diagram and tiled views, the tree view mimics the
Windows-style vertic al directory present ation. Its main benefit is that in large or complex VPNs,
sections can be collapsed to simplify the view . A [+] or [-] box is displayed to the lef t of an ent ry
indicating that the entry is collapsed or expanded.
Issue 4 May 200543
Page 44
Using VPNmanager
Figure 8: VPNmanager, Tree View
Alarm monitoring pane
To the right of the VPN view pane is the alarm monitor pane. The alarm monitor pane contains
summary alarm information, including a time stamp, security gateway name, and alarm type.
Alarm information is presented in a vertically scrolling li st. A rotating red beacon appears at the
top of this screen when a critical alarm is recei ved. See Monitoring alarms
Configuration Console windo w
You select View>Configuration or click t he Config icon on the tool bar to open the Con figura ti on
Console window. From this window you configure and modify the VPN network configuration.
The Configuration Console window includes a menu bar, toolbars, contents pane and a details
pane.
The menu bar on the Configuration Console window includes the foll owing commands File,
Edit, View, Tools, and Help.
File menu
The File menu includes the following commands:
● New Object. You can create new objects within any of the categories listed in
Table 2: New object on page 38
● Save Changes. This command saves any changes made through the Configuration
Console.
● Discard changes. This command clears any changes you have made and reverts the
configuration to the last saved version.
● Close. This command closes the Configuration Console window.
Edit menu
The Edit menu includes the following commands:
● Delete Object. This command deletes the currentl y selected object.
● Preferences. Preferences provides access to global settings for both the machine on
which the VPNmanager resides and the domain currently in focus. See Preferences on
page 48.
.
Issue 4 May 200545
Page 46
Using VPNmanager
Vie w me nu
From the View menu, you can view the configured objects, and you can refresh the screen.
Tools menu
The Tools menu consists of functions used for normal VPN maintenance. These functions
include the following.
● Update Devices. To update the selected security gateway configuration, click Update
Devices. You select the security gateway to update. This will reconfigure all security
gateway parameters for the selected gateway and can take several minutes to complete.
This function is the same as the Update Devices button on the far right side of the toolbar
on the VPNmanager main screen. See Update Devices
● Upgrade Devices Firmware. This function is used to download new firmware to selected
devices. See Upgrading a security gateway’ s firmware on page 289
● Import VPN. A secure, inter-compan y extranet can be created by exporting a VPN
configuration to a file that is then imported by other VPNmanager installation s. See the
Importing and exporting VPN configurations to a device
on page 47.
.
on page 284.
● Export VPN. Export VPN can be used to export the VPN configuration which in turn can
be imported into other VPNmanager installations.
● Export RADIUS. This function is used to export VPN information to an existing RADIUS
database. This is primaril y for backwards compatibility, but also useful if you wish to
convert your existing VPN (using local security gateway-based user authentication) into a
dynamic VPN for future scal abilit y. It is, however, expected that LDAP will be the preferred
method of building dynamic VPNs.
● Policies Manager The Policies Manager displ ays a list from which speci fic policy ser vices
can be selected. Select a service and cl ick GO to start the Policy Manage r for the se lected
service.
The types of policies that can be configured depend on the firmware version of the security
gateway. Only policies that can be configured are displayed.
The toolbar includes the following shortcut buttons.
Update Devices
Table 4: Policy Services (continued)
● IKE Certificate Usage● Firewall*
● RADIUS/ACE● Client Attributes*
2 of 2
a. Policies that can be configured for security gateways with VPNos 4.x.
Beginning with VPNos 4.31, the Firewall configuration is no t part of
Policy Manager.
● New Object. You can select one of the icons in the toolbar below New Object and then
click New Object to launch t he appropriate configuration dialog, or you can click the arrow
tip next to New Object and select one of the object types to launch the appropriate
configuration dialog.
● Delete deletes the selected object.
Contents pane
The Contents pane display s a lis t of al l available members of the object type currently selected.
Details pane
The Details pane displays specific information about the selected object. Details are organized
into categories presented as tabs across the top of the screen.
Update Devices
Located in the upper right-hand corner of the VPNmanager Console window is the Update
Devices button. Use it whenever you make changes to your VPN.
To update the security gateway devices:
1. Make your changes to the VPN.
2. Click Update Devices to open the Update Devices dialog.
3. Select the security gateways to be updated.
4. Click OK to view the status of the update.
Issue 4 May 200547
Page 48
Using VPNmanager
5. If the Update Configuration dialog appears, do the f o llowing.
● In the User Name text box, type in the superuser name you configured through the
Console Quick Setup Menu when the device was being installed. If the device had a firmware upgrade from 3.x, type in root.
● In the Password text box, type in the Superuser password configured at the Console
Quick Setup Menu when the device was being installed. If the device had a firmware
upgrade from 3.x, and had an existing security gateway Console password, type in that
password. If the security gateway did not have an existing security gateway Console
password, type in password.
● Click OK.
6. The Update Devices dialog will tell you when the update is complet ed.
Preferences
Preferences provides access t o global s etting s for both t he machine on which the VPNmanager
resides and the domain currently in focus. Preferences is located in the Edit menu in the
VPNmanager Main Console.
When you select Preferences, a series of tabs are displayed. A short description of the tabs
follows:
General tab
The Preferences General tab is used to set how you want to save changes on the
VPNmanager . You can choose either “Save configuration changes automatically”, or “Alert me
before saving configuration changes”.
Save Configuration changes automatically - When this radio button is active, any changes
made to an object are automatically saved upon moving to another object.
Alert me before saving configuration changes - When this radio button is active, any
changes made to an objects triggers a Save prompt upon attempting to move to another object.
Dyna Policy Defaults (User)
The Dyna Policy Defaults (User) tab is used to define how the Dyna Policy configuration data
(VPN session parameters) are handled on the remote user’s computer. See Dyna-Policy
Defaults (User ) tab on page 107.
Dyna Policy Defaults (Global)
The Dyna Policy Defaults (Global) tab is used to define the Dyna Policy defaults for the
maximum number of login attempts a remote client can make before being locked out for a
predetermined time, in minutes. See Dyna-Policy Defaults (Global) tab on page 108
.
Issue 4 May 200549
Page 50
Using VPNmanager
Figure 11: Preferences, Dyna-Policy (Global) Tab
Dyna Policy Authentication
The Dyna Policy Authenticating tab offers a selection of how user authentication and Client
Configuration Download (CCD) are performed. Choices are Local (s ecurity gateway-based),
RADIUS, or LDAP. Whichever method selected is global (across the entire VPN). Selection is
made by clicking on the desired radio button.
The Advanced tab is u sed to eith er hide or display the LDAP dire ctory c ontext fi eld that appears
in a number of places throughout the VPNmanager Console. Users familiar with the LDAP
directory structure may prefer having this field displayed.
Figure 13: Preferences, Advanced Tab
Preferences
Remote Client
The Remote Client tab is used to establish a path (tunnel) to a secure DNS server to resolve
client DNS names (as opposed to using a public DNS server), and to set the remote client user
idle time-out period. See Remote Client tab on page 111
Figure 14: Preferences, Remote Client Tab
.
Issue 4 May 200551
Page 52
Using VPNmanager
Alarm/Monitoring
The Alarm/Monitoring tab is used to define high-level functions of the alarm console. See
Monitoring alarms
Figure 15: Preference, Alarm/Monitoring
on page 268.
Resolve IP Address to Device Name - Enable/Disable. When enabled, the IP address of the
alarming security gateway is translated into the security gateway name for display in the Alarm
Console. When disabled, only the alarming IP address is shown.
Functionally, all security gateways in all domains are scanned and a map file is created to cross
reference the security gateway IP addresses to their respective security gateway names.
Default is enabled.
Alarm When Device is Unreachable - Enable/Disable. When enabled, this function causes
the VPNmanager to continuously send SNMP packet s to all security gateways to ver ify that they
are running. If a security gateway fails to respond, an error message is displayed in the Alarm
Console.
TEP Policy
The Tunnel End Point (TEP) Policy tab lets you control the security policy applied to the traffic
that flows between the end points of a tunnel. The default i s off, that is, do not apply configured
VPN policies to TEP traffic. See TEP Policy
This chapter describes the following featur es that are configured for the domain and the security
gateway
● New VPN domain
● Security gateway including:
● Domain name system resolution
● Zone interfaces
● NAT policies
● Static route table
● Routing information protocol (RIP)
New VPN Domain
A domain can be created to meet the networking needs of an entire organization, or a domain
can be created to meet the needs of specific departments of an organization. Existing VPN
configurations can be imported into other domains creating interconnected domains.
When you log in to the VPNmanager Console the first time, you must create a domain. You
create a domain name and select firewall rules to be applied to the domain, see Chapter
8: Establishing security. After the domain is created , you can configure all the objects that are
contained in the domain.
To create a new domain:
1. From the VPNmanager Console main window menu, select File>Domain>New. The New
Domain dialog is displayed.
2. In the Name text box, type in a name for the domain.
Note:Names can be up to 255 characters and can use any characters, except a
comma (,).
Note:All VPN components must have unique names. To prevent naming conflicts :
● Check the names of existing VPNs to avoid duplication.
Issue 4 May 200555
Page 56
Setting up the network
Note:
● Use organization names (for example, “W orldWideSales_VPN” or
“ApplicationsEngineering_VPN”) si nce VPNs usually represent functional organizations
within a corporation.
Note:Once the domain name is created, you cannot change it.
3. In the Security text box, select the fir ewall template to be applied to this domain. For
detailed information regarding the security policies included in this template, see Chapter
8: Establishing security.
SelectLevel of security
HighThe high security template enforces
very strict security policies on the
traffic going to and from the security
gateway.
MediumThe medium security template
enforces strict security policies on
the traffic going to and from the
security gateway.
LowThe low security template enforces
security policies on the traffic going
to and from the security gateway.
VPN OnlyThe VPN only security template
enforces security policies on the
tunnel end points. This template
also gives a higher priority to VPN
traffic.
NoneFirewall rules are not enforced. All
traffic is permit ted into and out of the
network.
4. Click Apply to create the domain
The name of your new VPN domain appears in the title bar of the VPNmanager Console main
window . The domain is open and ready to be configured.
The New Object>Device function is used to create securi ty gateways and VPN Service Units
(VSU) in a VPN environment. The security gateway acts as the end- points of VPN tunnels.
Note:Beginning with VPNmanager 3.4, t his c onfigur ation gui de u ses the te rm “secu rity
gateway” to refer to both the security gateway and the VSU. The VPNmanager
application uses the term “Device” to refer to both of these components.
In order to configure a security gateway, the security gateway must have an I P address and can
be reached over the network. When you select New Object for the device, a setup wizard is
launched that allows you to configure the following security gateway functions:
● Name for the security gateway.
● IP address that is used to identify the security gateway to the VPNmanager console.
● SNMP community string. VPNmanager uses the SNMP protocol to monitor the security
gateways. See Using SNMP to monitor the device on page 245
Configuring a security gateway
.
● Whether the security gateway dynamically buil ds a routing table using RIP updates. See
Routing on page 81
● Static routes, if more than one router exists on a network to which the security gateway
.
forwards traffic .
Creating a new security gateway
Before you create and configure the security gateway, make sure that you understand how the
features work. Review the informatio n in this chapter and in Chapter 8: Establishing security
To create a new security gateway:
1. From the VPNmanager Console main window menu, select New Object>Device. The
Device Setup Wizard dialog is displayed.
2. In thePublic IP Configuration section, enter the following information.
● The name of the new device.
● The IP address of the new device. Select one of the following:
● Unknown, if the address is not known. The General tab can be used to configure this
address at a later time.
.
● IP Address, to enter the primary IP addr ess of the new security gateway. Optional,
add a secondary address if VPNmanager is located on the public network. If
VPNmanager is located on the private network the secondary address is required.
Issue 4 May 200557
Page 58
Setting up the network
Note:
● DNS Name, to enter the name of the Domain Name Service of the new security
gateway. See DNS tab on page 63
If the device is already in the net work , select th e Detect Devi ce chec kbox. The def ault
is selected.
3. In the Private IP Configuration section, enter the following information:
● The private IP address and private mask of the private ethernet port
● Select Use this address when directly communicating with this device, if the
VPNmanager is on the private side of the security gateway and needs to communicate
using the security gateway’s private IP address. Click Next.
Note:Entering a security gateway IP address fr om the VPNmanager Consol e does no t
change the security gateway’s address. The address and subnet mask of a
security gateway can only be changed with a computer connected directly to the
security gateway’s console interface. The address entered here is used to
identify the security gateway so VPNmanager Consol e can communi cate with it.
4. In the Authentication section, enter the superuser name and password.
.
5. If the Detect Device checkbox is select ed (def ault) , VPNmanager wi ll at tempt to contact the
device and retrieve the device details. Select the device from the drop down menu in the
Network Configuration screen.
6. If the Public Interface Uses a Dynamic (User VPN) IP Addr ess checkbox is selected, enter
the device serial number. Enter the Policy Server IP/DNS name and port where the Policy
Server is running.
7. In the Device Details section, when the Detect Device checkbox selected, VPNmanager
automatically detects the device and updates the device details.
8. If the Detect Device checkbox is not selected, select the device type from the drop-down
menu.
9. In the SNMP Configuration section, enter the following informat ion:
● Select the SNMP version
● Enter the SNMP community string name to which the new security gateway reports
SNMP information. The default is the public community string.
10. If an existing security gateway is being added to the VPN, enter the new community stri ng
name to which the security gateway is to send its SNMP informat ion.
11. In the Static Route area, click Configure Static Route to configure the static route
destination address. Select Add to ent er t he IP ad dress of t he Next Hop for the st atic rout e.
Up to 32 network address/mask pairs can be configur ed for the destination network. Click
Ok.
12. Click Next. Select either to Setup Now or to Setup Later. Set up later sends the
configuration information to the directory server, but not to the security gateway.
Using Device tabs to configure the security gateway
13. Click Finish to save the configuration information to the directory serve, to poll security
gateway, and to exit the Setup Wizard.
When you want to send configurations to one or more security gateway, click Update Devices
from the Configuration Console window or use the Action tab to send the configuration to the
security gateway.
Using Device tabs to configure the security gateway
After the security gateway is set up, the VPNmanager displays the tabs you can use to make
changes to the security gateway configurat ion.
This section describes the features to configure a basic device. See Establishing security and
Using advanced features for a description of the other tabs that can be configured.
The tabs displayed are dependent on the VPNos release for the device. Table 5
release.
Table 5: Device tabs by release
T abAll VPNos
Releases
ActionsX
AdvancedX
Advanced
Action
ConnectivityX
Denial of
Service
Device
Users
DiagnosticsX
VPNos
4.0 and
earlier
X
VPNos
4.2 and
later
X
VPNos
4.3 and
later
VPNos
4.4 and
later
X
VPNos
4.5 and
later
lists the ta bs by
VPNos
4.6
Directory
Servers
DNSX
Failover
TEP
X
XX
1 of 2
Issue 4 May 200559
Page 60
Setting up the network
Table 5: Device tabs by release (continued)
T abAll VPNos
Releases
GeneralX
High
Availability
InterfacesX
MemoX
Network
Objects
PoliciesX
Private portX
Resilient
Tunnel
RoutingX
SNMPX
VPNos
4.0 and
earlier
X
X
VPNos
4.2 and
later
X
VPNos
4.3 and
later
VPNos
4.4 and
later
VPNos
4.5 and
later
VPNos
4.6
Stati c Rou teX
UpgradeX
VoIPX
General tab
The Device General tab, Figure 17, displays information specific to the security gateway
highlighted in the Contents list. From the General tab you can change the IP address
VPNmanager uses to communicate with the security gateway. All other information that is
displayed is view only.
Using Device tabs to configure the security gateway
Figure 17: Device General tab
Directory Name - The directory name is the location of the security gateway in the directory
tree structure.The security gateway name is unique within the VPN domain to which it is
assigned.
VPN Mode - The VPN mode can either be VPN Gateway or User VPN. In the VPN Gateway
mode, the security gateway is configured in a site-to-site VPN. The VPNmanager can manage
the device in the VPN Gateway mode. In the User VPN mode, t he security gateway connect s to
the head-end device to download the VPN policies through CCD. The VPNmanager cannot
manage the device in the User VPN mode.
IP Address/DNS Name - VPNmanager uses the address to communicate with the security
gateway. This address does not change the security gateway’s address. You change the
security gateway’s address and subnet mask from the security gateway console.
IP Default Route. - IP default route is the IP address to the gateway router on the wide area
network (WAN).
IP Mask. - This is the address mask for the security gateway.
MAC Address. - Security gateway MAC Address
Device Type. - This shows the model number for the device.
Device Firmware Version. - This is the version of firmware running on the device.
Certificate Name. - Name of the certificate issuer.
Issue 4 May 200561
Page 62
Setting up the network
Associated IP Groups area. - This area lists the names of the IP groups associated with this
security gateway. Y ou can se lect an I P group from the l ist and cl ick Go to go to the IP Group tab
to view the group information.
For VSUs running VPNos 4.0 or earlier, the following additional information is shown.
Export Type. - Export type indicates the level of encryption used.
Serial Number - A unique number assigned during manufacturing for each security gateway.
The serial number can be viewed from the security gateway and modified through the
VPNmanager . When replacing a security gateway in an existing VPN configuration, use the
serial number edit button in the VPNmanager to modify the repl acement security gateway’s
serial number. Modifying the security gateway’s serial number allows the flexibili ty to replace
devices while maintaining the configuration.
Flash V ersion. - Version of the currently executing NOS from one of two possible flash chips.
FIPS Mode. - Federal Information Processing St andards (FIPS) mode indicates if the security
gateway is running in the normal or FIPS Level 2 mode. It is recommended that this mode be
used only if an organization’s policy requires FIPS 140-1 Level 2 certification for cryptographic
devices.
The following are not supported in FIPS mode:
● SKIP VPNs
● VPNremote Clients
● Any algorithm other than DES or 3DES,
● Any authentication algorithm other than SHA-1.
RAS. - For VSU-100R only. This option is used when dial-in VPNremote users are going to
access a security gateway-100R. When ena bled, th is feature al lows the secu rity gateway -100R
to support remote clients using VPNremote remot e access client software as shipped from the
factory. The feature is either enabled or disabled.
Memo tab
The Memo tab is used to record notes about the security gateway, such as change history,
physical location, firmware version, etc. This information is stored only in the database and is
not downloaded to the security gateway.
To create a memo:
1. From the Contents column, select the security gateway you want to configure.
3. In the Memo text box, type in any information about the security gateway.
Note:
4. When finished, click Save.
DNS tab
Use the DNS tab to define where to forward the Domain Name Service (DNS) name resolution
requests from the IP devices on the private side of the secur ity gateway.
Figure 18: DNS tab
Using Device tabs to configure the security gateway
Configuring the DNS tab for security gateways at 4.3 or later
The security gateway includes a DNS name server, and accepts DNS queries from devices on
the private side. DHCP devices on the private side receive access to the DNS service
automatically. Non-DHCP devices must be manually configured to id enti fy t he securi ty gateway
as their DNS server. The security gateway server maintains a DNS database on all DHCP
clients on the private interface. Non-DHCP clients have no DNS identity.
Note:The security gateway performs DNS relay functionality only for the private zone.
To resolve DNS queries, the security gateway first consul ts its own database. If this is
unsuccessful, the query is forwarded th rough the public interface. If DNS Relay Configurat ion
domain entries exist, the security gateway tries to find the match of the DNS request domain
with the entries’ domains. If a match is found, the security gateway only forwards the query to
name servers associated with that domain. If no match occurs, the security gateway
sequentially forwards the query to the specified static DNS servers. If no static DNS servers
exist, queries go to Internet name servers. Note that once static DNS servers are added,
Internet root name servers are no longer referenced.
Issue 4 May 200563
Page 64
Setting up the network
Note:
When a DNS server is selected to send the DNS query, and no response is received within a
short time, another DNS server is selected by continuing the process as described in the
previous paragraph. But if the pr evious server replies to the DNS query, another DNS server is
not selected, regardless of whether response is positive or negative.
By default, when a DHCP client in the private zone sends requests for an IP address and the
private zone DHCP server is being used, the DHCP server on the private zone sends its
interface IP address as the DNS server in the DHCP response. In this way, all of the DNS
queries are automatically forwar ded to the security gateway
To add a DNS Relay
To set up DNS Relay Configuration and the static DNS servers. The maximum number of DNS
relay rules is 100. You cannot configure Dynamic DNS servers.
Note:The Delete, Move Up and Move Down buttons in the DNS Relay Configuration
area apply to the IP Address that is currently highlighted.
1. From the Configuration Console Contents column, select the security gateway to be
configured. Click the DNS tab to bring it to the front.
2. In the DNS Relay Configuration area, click Add.
3. Enter the Domain name and the Primary IP address of the DNS server. The secondary IP
address is optional.
Using Device tabs to configure the security gateway
To add a static DNS server
1. From the Configuration Console Contents column, select the security gateway to be
configured. Click the DNS tab to bring it to the front.
2. In the Static DNS Servers area, click Add. Enter the IP address of the DNS server and
enable the back-up link, if requir ed.
3. The backup link is the DNS server that is used when backup ethernet is in use. Only one of
the interfaces, either publi c or public-backup can be in use at the same time.
4. Click OK.
5. The maximum number of Static DNS servers is four.
Configuring the DNS tab for VSU at VPNos 4.2 or earlier
The VSU can resolve addressing for traffic using the Domain Name Service (DNS). However,
the security gateways must know the DNS Server IP addres s. Up to three server ad dresses can
be referenced by a security gateway. DNS servers can be edited or deleted.
To add a DNS server address
Use Add to enter the initial or backup DNS server(s). Enter the IP address of the DNS server in
the “Resolve DNS name with this address” field so that the tar geted security gateway can
register itself with the DNS server. Click Apply to add the new DNS server entry.
1. From the Contents column, select the VSU you want to confi gure.
2. Click the DNS tab to bring it to the front.
3. Click Add to open the Add DNS Rule dialog box.
4. Type the IP address.
5. Click Apply to add the IP address to the DNS servers list.
6. Click Close to return to the DNS tab, or Apply to add another address.
7. When finished, click Save.
8. When you want to send the configuration to one or more VSUs, click Update Devices.
To edit an existing server address:
1. From the Contents column, select the secur ity gateway you want to edit.
2. Click the DNS tab to bring it to the front.
3. From the Current DNS Servers list, select the address you want to change.
4. Click Edit to open the Add DNS Rule dialog box.
5. Change the IP address.
6. Click Apply to add the edited IP address to the DNS servers list. Th e Add DNS Rule dialog
box automatically closes.
Issue 4 May 200565
Page 66
Setting up the network
7. Click Close to return to the DNS tab. Clicking close ignores any changes made in the Add
DNS Rule dialog box.
8. Click Save to save the change.
9. When you want to send the configuration to one or more VSUs, click Update Devices.
To delete a DNS server address:
1. From the Contents column, select the security gateway you want to delete.
2. Click the DNS tab to bring it to the front.
3. From the Current DNS Servers list, select the address you want to delete.
4. Click Delete to remove the address.
5. Click Save to save the change.
6. When you want to send the configuration to one or more VSUs, click Update Devices.
Interfaces tab
For security gateways with VPNos 4.31 or later, the Interface tab is used to edit the
configuration of the media interfaces on a security gateway.
When you select the Interfaces tab, the screen displays the available media interfaces, with a
summary of their configuration and current status. Scroll to see all the information.
● The name of the media interface
● The zone that is assigned to the media interface
● The IP configuration mode
● The status. Status identifies if the physical link is up or down, and if the inter face is being
Using Device tabs to configure the security gateway
Figure 20: Interface tab
Config Media interfaces can be assigned to one of six dif fere nt network uses, ca lled zones. The
number of zones that can be configured depends on the security gateway model (Table 6
).
Ethernet0 and Ethernet1 are present in all models and are assigned to the public and the
private zones. The medi a inter faces t hat r emai n are unused and ca n be c onfigur ed as requi red.
The following section describes the six networ k zones.
Public. - The public network interface provides connection to the Internet, usually by way of a
wide area network (WAN). When VPNmanager is used, the security gateway must be
configured with a stati c IP address. Only one public zone is confi gured on the security gateway
and the configuration for this zone cannot be changed from VPNmanager.
Public-backup. - The public-backup networ k interface is used in conjunction with the Failover
function on some security gateway models, see Failover on page 226
to configure failover. If a
public-backup network interfa ce is conf igured, and the public primary network interf ace cannot
reach the Internet, the failover module deact ivates the public primary interface, acti vates the
public-backup interface, and then redirects all encrypted traffic to this link. Only one
public-backup zone can be configured on the security gateway.
Note:If the public zone and the public-backup zone are both configured , only one zone
can operate at a given time.
To have the interface automatically revert to public, you can configure the Idle Timer Settings.
When you enable the idle timer, if no VPN or other traffic flows through the public-backup in the
configured amount of time, t he p ublic primary i nterfa ce is automat ic ally rees ta bli shed. I f the i dle
timer is enabled, select Ignore Non-VPN Traffic if you do not want non-VPN traffic to reset the
idle timer. Only one public-backup zone can be configured on the security gat eway.
Using Device tabs to configure the security gateway
Note:
To set the amount of time delay to switch from a secondary interface to the primary interface
once the primary link has been detected, configure the Hold Down Timer. This delay provides
the necessary time for the primary interface to stabilize. The Hold Down Timer applies to
failover conditions occurring due to a link-level failure on the public primary interface only.
The Hold Down Ti me value is expressed i n seconds. The value r ange is 0 to 36 00 seconds. The
default value is 60 seconds.
Note:There is a scenario in which the switchover from the public backup interface to
the public interface will occur before the hol d down timer has expired. If the idle
timer is set to a value le ss than that of th e hold down timer, and the public primary
interface link becomes available while at roughl y the same time traffic ceases to
flow through the public backup interface, the switchover will occur when the idle
time expires rather than when the hold down timer expires.
Private. - The private network interface usually provides connection to your private local area
network (LAN) or your corporate LAN. The private network interface can be configured with
Static, DHCP Server or DHCP Relay.
Semi-private. - The semi-private network interface provides connection to a network whose
equipment can be made physically secure, but whose med ium is vulnerable to att ack, such as a
wireless network used within a corporation’s private network infrastructure). Traffic on the
semi-private interface is usually encrypted. Only one semi-private zone can be conf igured on
the security gateway.
DMZ. - The demilitarized zone (DMZ) network interface is usually used to provide Internet
users with access to some corporat e services without compromising the p ri vate network where
sensitive information is stored. A DMZ network contains resources such as Web servers, FTP
servers, and SMTP (e-mail) servers. Because DMZ network s are vul nerable to attack (that is
denial of service), corporations usually add additional securit y d evices such as intrusion
detection systems, virus scanners, and so on. Only one DMZ zone can be configured on the
device.
Management. - The management interface connection can be confi gured to simplify network
deployments, to eliminate ent erprise network dependencies on switches or routers. The
management network interface is usuall y used as an access poi nt for a dedicated VPNmanager
management station or as a dedicated interfac e for dumping log messages to a syslog server.
Issue 4 May 200569
Page 70
Setting up the network
Options for IP addressing for interface zones
You can configure each zone with different addressing options and the private port can be
configured as a DHCP server or DHCP relay used to obtain IP addresses from the DHCP
server (Table 7
Table 7: Type of IP addressing available by zone
Address assigned
StaticXXXXXX
DHCP ClientXX*X
PPPoEXX
Server modes
StaticXXXX
* The DHCP Client for the private zone is for SG5/5X/200 and VSU5/5X/500 bootcode only.
St atic addressing
Use static addressing if a dedicated IP address should be assigned to the public inter face of the
security gateway. To configure static addressing, complete the following information:
Field Description
IP AddressThe public IP address that is assigned
to the security gateway
Network MaskThe subnet mask
RouteThe IP address of the gateway router
to the Intern et
DHCP addressing
Use DHCP addressing if the gateway obtains its IP address dynamically from the internet
service provider (ISP). This can be confi gured for public-backup.
Using Device tabs to configure the security gateway
Note:
Point-to-Point Protocol Over Ethernet (PPPoE) Client
Use PPPoE Client addressin g as a conveni ent way to connect the public or publi c-backup zone
of the security gateway to the Internet, if your ISP supports PPPoE addressing. PPPoE Client
addressing requires user authentication. To configure PPPoE addressing, complete the
following information
FieldDescription
PPPoE User IDAccount user name which your ISP
assigns
PasswordAccount password
Note:Avoid resetting the securi ty gateway by power cycling the unit when PPPoE is
configured, as this method requires a proper shutdown in order to avoid a lockout
condition during reconnection. This lockout period can last for a few minutes
(time varies fro m IS P to IS P ) .
Local DHCP Server
The local DHCP server private port configuration is the default configuration to support the IP
devices that are connected to your LAN. In the local DHCP server mode, the protect ed devices
are automatically provided with an IP address, a default route, a domain name (the security
gateway), and WINS.
To configure the local DHCP server, complete the following information:
FieldDescription
IP AddressThe IP address assigned. The default IP address is
IP Range
From/To
Domain
Name
192.168.1.1 for the private inter face. If multiple interfaces on a
security gateway have DHCP server configured, their IP
addresses must be unique.
The range of IP addresses that the DHCP server that runs on
the interface assigns to DHCP clients. The default DHCP
address range for the private interface is 192.168.1.32 to
192.168.1.127. Each security gateway on the VPN requires a
unique DHCP range. In addition, if multiple inter faces on a
security gateway have DHCP server configured, the DHCP
range on each also must be unique.
The domain assigned to the interface. This is only applica ble
to the private interface. The default for domain name is
“private.”
Issue 4 May 200571
Page 72
Setting up the network
Note:
Note:
FieldDescription
Primary
WINS
This is optional. Configure primary WINS when delivering
network configuration information to DHCP clients. The
security gateway will deliver the primary WINS server
information before the secondary WINS server information.
This order of delivery will ensure that DHCP clients will use
the WINS servers in the specified configuration order.
Secondary
WINS
This is optional. Configure secondary WINS when delivering
network configuration information to DHCP clients. The
security gateway will deliver the secondary WINS server
information after the pri m ary WINS server information. This
order of delivery will ensure that DHCP clients will use the
WINS servers in the specified configurati on order.
IP Device
Configuration
IP Telephony
Settings
This is configured to add support for additional IP devices to
the DHCP Server.
This is optional. Configure IP Telephony when IP telephones
are connected to the security gateway. See IP Telephony
Configuration below.
When DHCP server is configured, you can configure the IP Device and the IP Telephony
settings. Click IP Devices to display a list of all IP devices that the DHCP server currently
supports. The MAC address and IP address are listed, along with information that relates to IP
telephony devices
Note:Changing the DHCP Server IP address can result in losing current connectivity
with the security gateway.
IP telephone configuration - If you are using the security gateway with the Avaya Definity®
series of IP Telephones, you must configur e the TFTP ser ver I P, the TFTP f ile p at h, the Def init y
Clan IP and the Definity Clan port (See the Definity documentation for further informati on).
Non-Avaya IP telephones require at a minimum, the TFTP server IP address.
The following IP telephone DHCP options are supported:
● Option 150. Proprietary to Avaya IP telephones. This option is for the TFTP server IP
address.
● Option 176. Proprietary to Avaya IP telephones. Definity Clan IP address and port along
with optional TFTP server IP address (all four fields in the IP Telephony Configuration
section must contain entries).
● Option 66. The standard DHCP option for TFTP server.
Note:When you add an IP device, you must also configure the Device Account User.
This functionality allows the DHCP Relay agent to bi nd to the devi ce’s private and semi-private
interface zones and forward only DHCP request s from the network behind the device to the
DHCP server(s) on the public network. DHCP Relay server can reside on either the private,
semiprivate, public zones, or another remote network.
The DHCP Relay area on the Interface Configuration dialog is used to configure the security
gateway to support DHCP Relay functionality.
Note:DHCP relay and DHCP server services are mutually ex clusive. When the securit y
When the DHCP relay agent receives DHCP client requests from the private or semiprivate
interface zones, the DHCP server(s) crea tes new DHCP messages and forwards the messages
to the DHCP server(s) on the public, private, semiprivate zones, or remote networks. The
DHCP servers on the public network send DHCP off er messages that cont ai n the IP addres ses
to the DCHP relay agent. The agent broadcasts the DHCP offer messages to the DHCP clients.
If the DHCP server resides on the remote network, the DHCP server and the DHCP client s
must be part of the VPN so that the client can obtain the IP address from the DHCP server.
Using Device tabs to configure the security gateway
gateway acts as a DHCP relay, the security gateway cannot also be a DHCP
server at the same time.
Static
When you select Static, the security gateway is configured with a static IP address and Mask.
This is the default c onfigurati on. If Static is selected and the VPNmanager is on the private side,
then the IP address of the computer running VPNmanager should be statically or dynamically
configured through other DHCP server.
Changing network interfaces
From the VPNmanager Console Device Interfaces tab, you can modify the media settings,
change the IP information, add an IP device, and configure IP telephony settings. You can
configure any zone but Public.
To change the media interface configuration:
1. From the Configuration Console Contents column, select the security gateway to be
configured. Click the Interfaces tab to bring it to the front.
2. Click on the media interface that you want to modify. Click Edit. The Interface
Configuration dialog is displayed.
Issue 4 May 200573
Page 74
Setting up the network
Note:
Figure 21: Media interface configuration dialog
Note:The fields displayed in the screen are based on the type of zone selected.
3. The media option choices depend on the media type selected and the capabilities of the
underlying device hardware and driver. QoS
is used by the QoS module to restrict the
bandwidth of the interf ace to the up stream limit of the network. For example, to a llow QoS to
regulate maximum bandwidth of a 100 mbps to 25 mbps, enter 25 mbps.
4. In the IP Configuration area, make the required changes.
● From the Zone list, select the zone. Only the zones that apply to that media int erface are
displayed.
● From the IP Config Mode list, select the IP addressing mode. Depending on your
selection, complete the required information.
● If public-backup is selected, complete the Idle Timer Se tt in g s configuration if failover is
enabled.
5. Click Save when you finish.
To add an IP device to the security gateway:
1. From the Configuration Console Contents column, select the security gateway to be
configured. Click the Interface t ab t o bring i t to t he front pr operty, select the media interfac e
that is configured with privat e, DHCP Server. Cli ck Edit. The Media Interface Configuration
dialog is displayed.
2. Click IP Devices. The IP Device Configuration dialog is displayed.
3. Enter the following information
● The MAC address of the IP device. If the device is an Avaya IP telephone, the MAC
Using Device tabs to configure the security gateway
Note:
● The IP address. This IP address must be within the same subnet as the DHCP server.
Avaya recommends that you use an IP address for the device that falls into the DHCP
subnet, but not in the DHCP range.
4. Click Add, and then click OK.
To add an IP telephony device to the security gateway:
1. Click IP Telephony. The IP Telephony Settings dialog is displayed.
2. Enter the following information
● TFTP File Path Name. The TFTP file pat h name is u sed when t he TFTP fi le p a th is o ther
than the default path.
● Definity CLAN Port. The port number for the Definity server. The default port is 1719. The
port range is 1 to 65535.
● Option 66. The standard DHCP option for TFTP server.
● IP Telephony Domain. This is the domain name that the IP telephone device is assigned.
!
Important:
Important:When symbolic host names are included in the TFTP server or CLAN lists, the IP
telephone will append the IP Telephony Domain name (if ente red) to the list entry
in order to create a fully qual ified domain name (FQDN). You can, however , enter
host names using the FQDN form of <myhost>@<mydomain>.<toplevel
domain>, in which case you should leave the IP Telephone Domain name field
empty.
Also, be aware that the curren t version of IP telephone firmware will t runcate the TFTP
and CLAN lists to a maximum of 255 characters each. Thus, when using the FQDN
form of host name entries, it would be possible to exceed that limitation very quickly.
● TFTP Server . This is the server on which the latest version of the IP telephone firmware
is maintained for upgrade purposes. A maximum of five TFTP servers with IP addresses
or symbolic host names can be configured on security gateways running VPNos 4.6 and
higher.
● Definity CLAN List. The IP address of the Definity Clan server. A maximum of 20 CLAN
IP addresses or symbolic host names can be configured on security gateways running
VPNos 4.6 and higher.
3. Click OK, and then click Save.
Note:When you configure an IP telephone, secure tunnels are created for TFTP and
Definity Clan. However, if only VPN users are connected, the secure tunnels are
created on demand. That is, the secure tunnels are created only when traffic
exists on the associated tunnel.
Issue 4 May 200575
Page 76
Setting up the network
Note:
Private port tab
For SGs with VPNos 4.2 or VPNos 4.3, the Private Port tab is used to configure of the private IP
address. In addition, you can configur e the device to act as a DHCP server on the private port
or you can configure a DHCP relay.
Note:For SGs with VPNos 4.4 and higher, configure the private port address using the
Interfaces tab.
If a local DHCP server is configured, the security gateway assigns IP addresses to the
computers or the IP telephones t hat a re behind t he securi t y gateway. If your DHCP server is on
the public side, a DHCP relay can be configured to obta in I P addresses fr om this DHCP server.
If the DHCP server is unreachable, the relay can be made to fa ll back to the local DHCP server.
Figure 22: Private port tab with VPNos 4.2 or VPNos 4.3
If you plan to use t he secur ity gateway’ s p rivate por t local DHCP server c apabi lity to support the
IP devices connected to your LAN (default), be sure to complete the DHCP setup under the
local DHCP Server portion of the screen.
Local DHCP Server. - This portion of the screen i s used t o confi gure the secur ity gat eway as a
DHCP server on the private port. The IP Address range must be configured and should fall
within the range of the private IP Address subnet. The domain name is provided and the WINS
server can be configured.
When deploying the security gateway, you need a unique DHCP range for each security
gateway on the VPN.
Note:Changing the DHCP Server IP address may result in losing connectivity to the
Note:
security gateway, if the VPNmanager is on the private side of the security
gateway. Also all active DHCP clients may require renewal through an OS utility
(e.g., using winipcfg or ipconf ig in Windows), or rebooting.
Note:When changing the DHCP IP address range, execute an ipconfig release and
renew command.
IP Devices Configuration. - The table displays a list of all IP devices currently supported by
the DHCP server. The device MAC Address and IP Address are listed, along with information
relating to IP telephony devices, such as the Avaya Definity® IP telephone device information.
Adding an IP Device Configuration
This dialog is used to add IP devices to the vir tual DHCP serve r. The dialog contains a group of
fields for IP telephony confi gurati on when IP telep hones ar e connected to t he securi ty gateway.
Using Device tabs to configure the security gateway
Figure 23: IP Device Configuration with VPNos 4.2 or VPNos 4.3
IP Device MAC Address. - Enter the MAC address of the IP device. If the device is an Avaya
IP telephone, the MAC address can be found on the back of the phone.
IP Device IP Address. - This IP address must be within the same subnet as the DHCP server.
It is recommended that the IP device address fall in the DHCP subnet, but not in the DHCP
range. Also, each IP device should have an unique IP address.
IP Telephony Configuration. - This section is used to enter configuration information fo r an IP
telephone connected to the security gateway. This information is sent in response to the IP
telephone’s DHCP request (this information can also be configured locally in the IP telephone).
Issue 4 May 200577
Page 78
Setting up the network
Note:
The Avaya DEFINITY® series of IP telephones require entries for all four fields (refer to your
Definity documentation for further information). Non-A vaya IP telephones requi re at a minimum,
the TFTP server IP address.
Note:The following IP telephone DHCP options are supported:
● Option 150: Proprietar y to Avaya IP telephones. This option is for the TFTP server IP
address.
● Option 176: Proprietary to Avaya IP telephones. Definity Clan IP address and port
along with optional TFTP server IP address (all four fields in the IP telephony
Configuration section must cont ain entries).
● Option 66: Standard DHCP option for TFTP server.
TFTP Server IP. - This is the address of the TFTP server on which the latest version of the IP
Phone firmware is maintained for upgrade purposes.
TFTP File Path. - Used when the file path is other than the default path.
DEFINITY Clan IP. - The IP address of the DEFINITY Clan server.
DEFINITY Clan Port. - Port number for the DEFINITY server . Defau lt port 1719. Port ra nges 1
to 65535.
To add an IP Device:
1. From security gateway Objects, select the Private Port tab from the Properties p ane.
2. Select the Local DHCP Server radio button.
3. Click Add.
4. Enter the required information to complete the IP Device configuration.
5. Click OK.
6. Click Save.
DHCP Relay
Select DHCP Relay to configure the security gateway to support DHCP Relay funct ionality. This
functionality allows t he DHCP Relay agen t to bind t o t he de vice’ s pri vate port and f orwards only
DHCP requests from the network behind the device to the DHCP server( s) on the public
network.
The IP devices are supported in the case of DHCP relay. To configure the IP devices, from the
local DHCP Server configure the IP devices. Return to the DHCP Relay and save.
Using Device tabs to configure the security gateway
Note:
Note:
Note:When the security gateway is acting as a DHCP Relay, the security gateway
cannot be a DHCP server at the same time. DHCP Relay and DHCP Server
services are mutually exclusive.
When the DHCP Relay agent receives DHCP client requests from the private port, the DHCP
server(s) creates new DHCP messages and forwards the messages to the DHCP server( s) on
the public network. The DHCP server(s) on the public network sends DHCP of fer messages
that contain the IP addresses to the DCHP Relay agent. The agent broadcasts the DHCP offer
messages to the DHCP clients.
!
Important:
Important:The remote DHCP server(s) and the device’s private port IP addresses must be
part of the VPN in order for the DHCP Relay process to begin.
The Fallback to Local DHCP Server option allows the DHCP server to revert or fallback to the
Local DHCP Server if the DHCP Relay is not functioning.
Note:In order for the security gateway to support the DHCP Relay Fallback feature,
Local DHCP Server must be configured. IP Devices are not supported in Fallback
mode.
None
Select None to configure the security gateway without the Local DHCP Server configuration or
the DHCP Relay configuration. None is the default configuration. If None is selected and the
VPNmanager is on the private side of the security gateway, then the IP address of the computer
running VPNmanager should be statically or dynamically configured through other DHCP
servers.
Device users tab
The Device>Device Users tab displays the device account user configuration and the VPN
authentication profile ass oci ated wit h the device acc ount u ser. The device account user acts as
a proxy VPN user for all configured IP devices. You cannot delete the device account user.
Issue 4 May 200579
Page 80
Setting up the network
Figure 24: Device Users tab
To add a device account user:
1. From the Configuration Console Contents column, select the device to be configured. Click
the Device Users tab to bring it to the front.
2. Click on the Device Account User drop-down menu to select the user.
3. In the VPN Authentication Profile area, enter the following information:
● VSU/SG Address. Select the primary devi ce from the drop-down menu or en ter the DNS
name of the device.
● (Optional) Backup VSU/SG Address. Enter a backup device address to be used from
the drop-down menu.
● Port. Enter the number of the port to use. The default is 1443.
● Authentication. Select the authentication type to use, either Standard (CHAP) or
Rechallenge (PAP).
4. Click Save, to complete the configuration.
To use this configuration on another device, click the Clone To button. Select the device to
configure, click OK to clone the configu ration to the selected device.
Network Object tab
The Device>Network Object tab displ ays the hosts or networks that are located behind the
security gateway. The type of predefined network objects that are listed depends on the type of
zones that are configured for the security gateway.
By default, the network object includes the IP address and mask that have been configured for
the corresponding zone. Besides this address, you can add additional addresses.
Using Device tabs to configure the security gateway
Select a network object and click Add to configure additional IP addresses and mask.
Figure 25: Device Network Objects tab
Routing
Routing is specified when m ore than one router exists on a network to which the security
gateway must forward either VPN or non-VPN traffic.
The Routing tab shows the VPN traffic default routes, including the IP address of the hop and
the IP address of the network mask pairs for this hop. You can add, modify, and delete routes.
Figure 26: The routing tab for a security gateway object
The IP Address Next Hop is a list that displays the IP address of the next hop routers (from the
security gateway in focus).
Issue 4 May 200581
Page 82
Setting up the network
Note:
The Network/Mask Pairs for this Hop list indicates the st ati c route desti nati on address. You can
build a static route table with up to 32 network address/mask paris. This limit allows for any
combination ranging from a single rou ter with 32 net work add ress/mask pairs to 32 routers with
a single address/mask pairs.
To build a routing table using the default gateway:
1. From the Configuration Console Contents column, select the security gateway you want to
configure.
2. Click the Routing tab to bring it to the front.
3. In the Default Gateway area, select the Enable box to enable the default gateway.
4. Enter the IP Address for the default gateway.
5. In the Use This Gateway For area, select one of the following:
● Decrypted Traffic
● Non-VPN Traffic
6. Select the Enable VPN Traffic Auto Forwarding box to disable traffic auto forwarding.
If an SG receives a VPN packet that is not destined for the prot ected network, the SG will
automatically forward this p acket to the conf igured remote TEP. By defaul t, the Enable VPN Traffic Auto Forwarding box is selected, or checked.
To disable the automatic forwarding of packets, the Enable VPN Traffic Auto Forwar ding
box should be un-checked.
When the VPN traffic auto forwarding is disabled, the SG will divert the packets to the
private interface. By redir ecting the packets to the priv ate interface the packets can be
monitored by Intrusion Detection Systems software before sending the packets to the
remote TEP on the private network.
Before disabling VPN traffic auto forwarding, confirm that a VTDR or static route is
configured on the private int erface. If a VTDR is not configured on the private interface, the
redirected packet will not be sent back t o the SG to be forwarded to the remote TEP.
7. In the Static Routes area, click Add to start the Static Route Configuration Wizard.
Note:Configure S tatic Route for security gateways VPNos 4.4 and below.
8. In the IP Address of Next Hop field, type in t he address of the next router that leads t o your
other LANs.
9. Click Add to List to put the router’s address into the IP Address of Next Hop list box.
10. Click Next to move to the Add Network/Mask Ranges for this Next Hop Address options.
11. In the Network field, type in the network address for the LAN that is beyond the next hop
router.
12. In the Mask text boxes, t ype in the subnet mask for the network address.
Using Device tabs to configure the security gateway
Note:
13. Click Add to List to put the address/mask pair into the Current Network/Mask Pairs for this
Hop list box, which also associates the pair with the IP address of the next hop router.
14. Click Finished to return to the Static Route tab .
15. Click Save.
16. When you want to send the configuration to one or more security gateways, click Update
Devices.
Default Gateway for VPN Traffic (VPNos 3.X)
The default gateway for VPN traffi c policy allows the administrator to specify a gateway that is
used for either decry pted traf fic, encr ypted traf fic, or both. Beginning with VPNos 4.5, the default
gateway for VPN traffic policy all ows the administrator to specify a gateway that is used for
decrypted traffic only.
This configuration is commonly appli ed to a VSU in the following topology:
Figure 27: Common Default Gateway for VPN Traffic topology
Figure 27 shows the default gateway of the VSU as R1, the Internet gateway. The VSU is
configured to protect several LANs on the other side of R
, the router on the private side of the
2
VSU.
In this topology, the administrator configures R
as the default gateway of the VSU and R2 as
1
the Default Gateway for VPN T raffic with the decrypted box checked. Using this configuration
and checking the decrypted traffic box, all decrypted VPN traffic would be forwarded to R
all encrypted traffic would be forwarded to R
. In this application, the Default Gateway for VPN
1
and
2
Traffic removes the need for a configured static route on the VSU for each prot ected LAN.
Note:Configured static routes take precedence over the Default Gateway for VPN
Traffic.
Issue 4 May 200583
Page 84
Setting up the network
Note:
If the security gateway is in a network with many routers (gateways) to other TCP/IP networks,
there can be more than one possible p a th to a spec if ic rout er. In that case, routers are probably
building routing tables fr om the information exc hanged by a routing protoco l. Security gateways
can use such protocols to dynamically build a routing table.
To build a RIP table:
1. From the Configuration Console Contents column, select the security gateway you want to
configure.
2. Click the Routing tab to bring it to the front.
3. Configure the Listen/Learn and Advertise options that apply to your configuration.
● Routes. Select if you want the securi ty gateway to d ynamically bui ld a routi ng tabl e using
RIP updates.
● Site to site tunnels. If select ed, the sec urity gateway broadca st s VPN routing i nfo rmation
from its private port. The i n formation tells listeners to send packets to this security
gateway if the destinations are to remote members of the VPN. The security gateway
encrypts the packets then sends them to remote members.
● VPNremote and user VPN tunnels. If selected, the securit y gateway broadcasts routing
information about remote client address pool s. This information tells listeners to send
packets to the security gateway if the address is a mapped address. The security
gateway translates the mapped address
Note:Select VPNremote and user VPN tunnels if Client IP address pools are created.
For additional information, see Client IP address pool configuration on page 120
4. Click the Advanced button to configure the RIP advanced setti ngs.
5. In the Aging Intervalr text box, ent er the time, in seconds, that the r oute will t ransit ion from
active to idle. The aging interval is between active and idle, and is configurable from 5 to
86400 seconds.
6. In the Initial Metric text box, enter the metric value for initial route traffic flow.
When the VPN route is added to the route table and before traffic begins to flow, the initial
value is applied to the route. Set the initial value higher than the idle metric value, ye t lower
than the active metric value.
7. In the Active Metric text box, enter the metric value for active route traffic flow.
As traffic flows through the route, the route transitions from init ial to active.
8. In the Inactive Metric text box, enter the metric value for inactive route traffic flow.
9. Click OK to exit the RIP Advanced Settings window.
10. Click Save.
11. When you want to send the configuration to one or more VSUs, click Update Devices.
Network Address Tr anslation (NAT) is an Internet standard that allows private (nonrout able)
networks to connect to public (routable) networks. To connect private networks and public
networks, address mapping is performed on a security gateway that i s located between the
private network and the public network.
Note:Beginning with the VPNmanager 3.2 and the VPNos 4.2 releases, the
VPNremote Client 4.1 is supported behind a NAT device (DSL or Broadband
Router).
About NAT types for VPNos 4.31
Beginning with VPNos 4.31, you can set the following three ty pes of NAT mapping on the
security gateway:
● Static NA T. With Static NAT, addresses from one network are permanen tly mapped to
addresses on another network. One private IP address can be translated to one public IP
address. Static NAT is bidirectional, that is, for outgoing packets, Static NAT translates the
source IP address of the packets. For incoming packets, Static NAT translates the
destination address of the packets. You must specify both the original address and the
translated address to configure Static NAT.
Using Device tabs to configure the security gateway
● Port NAT. With Port NAT, addresses from internal, nonroutable networks are translated to
one routable address in Port NAT. Port numbers, in the case of TCP/UDP packets and
sequence numbers and IDs in the case of ICMP packets, are used to create unique
channels. Port NAT is unidirectional. That is, Port NAT translates only outgoing packets
and not incoming, but it does translate the replies. On the way out, the source address of
the packet is translated. For the replies, the destination address is translated back. You
can choose from predefined network object s or user-defined network objects, or you can
specify the IP address and the Mask for the original address. You must specify the IP
address and the port ranges for the translated address. The port ranges must be in a
range from 5000 to 65535.
Note:When using Port NAT, the ESP trailer must be configured in the VPN IPSec
parameters.
● Port Redirection. With port redirection, addresses from a specific address and a specific
port are redirected to another address and port. Port redi rection translates the destination
address of an incoming packet and the source address of the reply. You must specify the
from address, the to address, and the port number.
By default, NAT is enabled, and the Share public address to reach the internet feature is
selected. NAT affects only clear traffic.
Issue 4 May 200585
Page 86
Setting up the network
Note:
Note:
Note:
Note:If your network contains any nonroutable addresses, Avaya recommends that
you enable the Share public address to reach the in ternet feature. Any firewall
rules that are in use can block translated t raffic.
Priority of NA T types
NAT is a rule-based policy, where the priority is based on the NAT type and then the order in
which the NAT types appear in the NAT list. NAT types have the following priority :
1. Redirection
2. Static NAT
3. Port NAT
Configuring NA T (VPNos 4.3 1)
Note:Y ou should unders tand how NAT works before trying to configure NA T for VPNos.
This guide does not explain how NAT works.
The NAT screen displays the following information for each rule. Scroll to see all the
information.
● The type of rule. The types are static , port, or redirection.
● The zone to which the NAT rule applies.
● The protocol. Protocols are TCP, UDP, TCP/UDP, or ANY.
● The Original IP address/mask.
● The Translation IP address.
● The Start port.
● The End port.
● The status of the rule. Status is enabled or not enabled.
You can add, modify, and delete NAT rules. You can construct a series of rules, and enable or
disable each rule as necessary.
A rule can be moved up or down to change the priority. See Priority of NAT types on page 86
Enable NAT. - NAT is enabled when this box is checked.
NAT List. - Note that this is a rule-based policy, where the priority of the rule is the order in
which they appear in the NAT List.
Note:For VSUs with firmware version VPNos 4.x, Dynamic mapping cannot be
Using Device tabs to configure the security gateway
Note:
To add a NAT rule (VPNos 4.31)
1. From the Configuration Console Contents column , select the Policy tab to bring it to the
front. Select NAT from the list.
2. Click GO. The NAT Rules dialog is displayed and the selected device’s name should be
visible in the Object Names list.
3. From the Type list, select either static, port, or redirection. See Policies tab, NAT
services on page 85.
Note:The screen displays only the f ields that must be confi gured accordi ng to the z one
and the translation type that you select.
4. In the Original area, complete the available or active areas:
● Option. Select from the list of pr edefined network obj ects and user def ined network object s
or select Specified.
● IP Address. Type the original/from address
● Mask. T ype the mask
● Port. Type the from TCP/UDP port number. This port number can be from 1 to 65535.
5. In the Translation area, complete the areas that are not grayed out
● Option. Select from the list.
● IP Address, Type the translated/to address
● Start Port. Type in the Start port. This port number can be from 5000 to 65535
● End Port. Type in the End port. This port number can be from 5000 to 65535
6. To enable this NAT rule, select Enable Rule.
7. Click Save. Close the Policy Manager dialog.
8. From the Configuration Console, click Update Device to send the configured information
to the security gateway.
To edit a NAT rule
1. From the Configuration Console Contents column, select the rule that you want to modify.
Click Edit. The Edit NAT Rule dialog displays.
2. Change the information, following the steps in To add a NAT rule (VPNos 4.31)
3. Click OK and then click Save.
section.
To delete a NAT rule
1. From the Configuration Console Contents column, select the rule that you want to delete.
Click Delete. An information box appears to verify the deletion.
2. Click OK, and then click Save.
Issue 4 May 200587
Page 88
Setting up the network
About NAT types for VPNos 3.X
For VPNos 3.X, you can set the following types of NAT mapping on the VSU.
● Static Mappi ng – Addre sses fro m one networ k are per manently mapped t o addr esses on
another network. Static mapping works when traffic is initiated either inside or outside of
the private network.
● Dynamic Mapping – Addresses from one network are temporarily mapped to an address
from another network. When traff ic i s initiated from a client on the private network, its
address is temporarily mapped to an address selected from a pool of public addresses.
When the client traffic is idle for a specified period of time, the mapped address is returned
to the pool of available addres ses. When all public addresses have been assigned, no other
private clients can initiate traffic until a public address becomes available.
Dynamic mapping works only for connections in itiated from the private network.
● Port Mapping – This option is similar to dynamic mapping except that only one public IP
address is required. The security gateway maps every packet from the private network to
the public IP address and a source port sele cted from a predefined ran ge of TCP and UDP
port numbers. When traffic is init ia ted from a client on the private networ k it is dynamically
mapped to the public IP address and an available port number.
When the client traffic is idle for a specified period of time, the port number is ret urned to the
pool of available port numbers. When all port numbers have been allocated, no other
private clients can initi ate traffic until a port number becomes available.
Port mapping works only for connections initiated fro m the priv ate network. In additi on, port
mapping works only for TCP and UDP traffic.
NAT applications
Network administrators may choose to use the NAT mechanism for any of the following
reasons:
● Allow access to the Internet from private networks. Networks which are assigned
private addresses, such as 10.0.0.0 (RFC 1918), or addresses that have not been
registered must be mapped to public addresses to allow users access to the Internet.
● Provide support for more host s with fewer public addre sses. Address mapping a llows
network administrators to increase the number of hosts that can access the Internet
without needing additional register ed network addresses.
● Hide host addresses for security reasons. Network administrators may choose to use
address mapping to hide actual host addresses from the publi c.
● Set up VPNs that include overlapping private addresses. Address mapping allows
network administrators to set up VPNs between two si tes that use the same private
network addresses. For example, both sites may be using 10.0.0.0 private network
addresses.
Using Device tabs to configure the security gateway
● Provide support for multi-gateway network configurations. Address mapping can be
used to ensure that request and r eply packet s enter and exit the networ k through the same
security gateway.
Accessing the Internet from private networks
Figure 28 shows an example of using NAT to allow hosts on a private non-routable or
non-registered network to access the Int ernet.
Figure 28: Access the Internet from private Networks
The above example can be used for the following three applications descr ibed in the previous
section, NAT applications
● Allow access to the Internet from private n etworks
● Provide support for more hosts with fewer public addresses
● Hide host addresses for security reasons
:
This configuration allows up to 254 private addresses from the 10.0.0.0/8 network to be
dynamically mapped to public addresses from the N
1.N2.N3.0/24 network.
Each NAT mapping is assigned to an interface. The rules for applying addres s translations to a
packet entering or leaving an interface are:
● When a packet is routed out on an interface (away from the security gateway), the source
address of the packet is modified.
● Conversely, when a packet comes in on an interface (toward the security gateway), the
destination address of the packet is modified.
Issue 4 May 200589
Page 90
Setting up the network
In the example shown in Figure 28, when client 10.1.2.101 initially sends a packet to a host on
the public network, the security gateway dynamically maps the client’s pri vate address
10.1.2.101 to a public address selected from the N
is going out the public interface, the securit y gateway changes the packet’s source address
10.1.2.101 to its assigned public address N
1.N2.N3.0/24 address pool. Since the packet
1.N2.N3.X.
When the public host receives the packet, it sends a reply to N
routed into the securi ty gateway through the public interface, the security gateway changes the
packet’s destination address back to the client’ s private address 10.1.2.101 before sending the
packet back to the client.
The public address assigned to the client’s private address remains in effect until the client
traffic is idle for a user-defined period of time. When this idle period is reached, the mapped
address is returned to the pool of available addresses. When all public addresses have been
assigned, no other private clients can initiate a connection to the public network until a public
address becomes available.
One limitation for dynamic mapping is that communication with remote hosts on the public
network can only be init iated fro m client s on t he private network. I f communicat ion initi ated from
either the public or private side is required, static address mapping must be used. Static
address mapping permanently maps private addresses to their corresponding public
addresses, thereby allowing communication between clients and hosts to be initiated from
either the private or public networ k.
Setting up VPN with overlapping private addresses
Figure 29 shows an example of using NAT to set up VPNs between two site s that use the s ame
private network addresses whil e still al lowing pri vate network con nections to the Inter net. Three
NAT rules are applied to each security gateway: one on the private interface, one on the public
interface, and one on the VPN tunnel. A DNS entry is also required for each host that can be
reached through the tunnel.
1.N2.N3.X. The reply packet is
The tunnel-mode VPN, named Sales_VPN, provides a secure connection between the
SF_Sales_Group and LA_Sales_Group over the public network. Since both sites are using the
same private network addresses, NAT mapping must be performed on packets entering and
leaving the Sales_VPN tunnel. This is required to ensure that unique host addresses are used
on each side of the tunnel.
Communication between a member of the SF_ Sales_Group and the server i n LA_Sales_Group
starts with a DNS lookup of the LA_Sales_Group server addr ess which in this example returns
a destination address of 10.0.88.20. The SF_VSU proxy ARPs for 10.0.88.20 by sending its
own MAC address in response to an ARP request.
When the packet sent from 10.1.1.17 to 10.0.88. 20 enters SF_VSU
through the private int erface, it s desti nation ad dress is chan ged f rom 10.0.8 8.20 to 172.16. 1. 20
by applying the NAT rule assigned to the security gateway’s private interfac e.
The SF_VSU performs a VPN lookup and determines that the packet
needs to be tunneled to the LA_VSU. Since the packet is leaving the SF_VSU through the
Sales_VPN tunnel, the SF_VSU applies the tunnel NAT rule to the packet’s source address
Using Device tabs to configure the security gateway
changing it from 10.1.1.17 to 172.16.0.17. At this point, the packet’s source and destination
addresses are: 172.16.0.17 -> 172.16.1.20.
The packet is then tunneled across the publi c network to LA_VSU. Since the packet enters
LA_VSU through a tunnel, the NAT rule on the tunnel interf ace is applied t o the packet c hanging
its destination address from 172.16.1.20 to 10.1.2.20, which is the IP address of the
LA_Sales_Group server. Before the packet is sent out of the private interface, the NAT rule on
the private interface changes the packet’s source address from 172.16.0.17 to 10.0.89.17.
Figure 29: Setting Up a VPN with Overlapping private Addresses
When a reply packet is sent from the LA_Sales_Group server to the LA_VSU, the private
interface NAT rule changes the packet’s destination address from 10.0.89.17 to 172.16.0.17
and the tunnel NAT rule changes the packet’s source address from 10.1.2.20 to 172.16.1.20
before tunneling the packet across the public network to the SF_VSU. At this point, the reply
packet’s source and destination addresses are: 172.16.1.20 -> 172.16.0.17.
Issue 4 May 200591
Page 92
Setting up the network
When the SF_VSU receives the reply packet through the tunnel, the tunnel NAT rule changes
the packet’s destination address from 172.16.0.17 to 10.1.1.17 and the private interface NAT
rule changes the packet’s source address from 172.16.1.20 to 10.0.88.20 before the packet is
sent out to the SF_Sales_Group client through the private interface.
The NAT rule applied to the public interface on each of the VSUs allows clients on the private
networks to access the Internet by mapping their private addresses to public address as
described in the previous section Accessing the Internet from private networks
Using NAT to support multiple gateway configurations
Figure 30 shows an example of using NAT to ensure that all replies to packets entering the
network through a security gateway exit the network through the same security gateway. The
NAT rule applied to the security gateway-B private interface dynamically maps the source IP
address of packets sent ou t the private interface of the security gateway-B to one of 16
addresses assigned to the security gateway-B address po ol. Note that the IP address 0.0.0.0/0
matches any packet entering or leaving the security gateway through the designated interface.
When a packet is initially sent from Host A to Host B through the VPN tunnel, security
gateway-B dynamically maps the packet source address (X1.X2.X3.11) to an IP address
selected from the address pool (Y
As a result, reply packets destined for Host A are sent to Y
ARPs for Y
1.Y2.Y3.X by sending its own MAC address in response to an ARP request from Host
B. When security gateway-B receives a reply packet on the private interface, it changes the
packet’s destination address (Y
sending the reply to Host A through the VPN tunnel.
1.Y2.Y3.X) before sending the packet out the pr ivate inter face.
1.Y2.Y3.X. security gateway-B proxy
1.Y2.Y3.X) back to the original address (X1.X2.X3.11) before
.
A possible alternative to configuring a NAT rule on the private interface of security gateway-B
shown in Using NAT to Support Multiple Gateways
which sends packets destined for the X
Using Device tabs to configure the security gateway
Figure 30: Using NAT to Support Multiple Gateways
Interface for VPNos 4.2
The following three interface choices are available for devices with VPNos 4.2:
● Public – Primarily used to allow client s on a private network to access hosts on the
Internet and for transport mode VPNs.
● Private – Used to support multiple gateways.
Issue 4 May 200593
Page 94
Setting up the network
Note:
● Tunnel – This is a special interface used to support t unneling between overlapping pr ivate
networks while still allowing connections to the Internet.
Group - If you select “Use existing groups,” the original address and masks are replaced with
the Group selection list.
Original - The IP address of the original address and Network/Mask Pair.
Translated - Enter the translated address and mask or port range in the Translat ed fields.
Note:The appropriate fields to use for this translation are enabled based on the
Translation Type selected earlier.
Choose where the translation should be inserted in the list on the main Network Translation
pane
Add NAT Rule (VPNos 4.2 or earlier)
This function is used to add a new NAT rule to the list.
Translation Type - Choices are Static, Dynamic, and Port.
Translation will be applied on - Choices are public Interface, private Interface, and Tunnel
Interface.
Original
Network/Mask - When the Network/Mask Pair selection is made, the IP address of the original
address and Network/Mask Pair must be entered.
Translation - Enter the Translated Address (and port i f the T ranslated Type is set to port). Enter
the Translated Mask.
Locate This Translation Rule - Beginning of List, End of List, After Selected Item.
Add this translation rule without enabling it - Checking this box allows you to construct a
series of rules before actually enabling them.
Memo - This area allows you to record notes about this NAT rule in the space provided.
To configure a NAT rule:
1. From the Configuration Console>Device Contents pane, select the Policy tab to br ing it
to the front. Select NAT from the list. Click GO. The NAT Rules dialog is displayed.
2. Click the Add to open the Add NAT Rule dialog box.
Using Device tabs to configure the security gateway
3. From the Translation Type list, select a translation type.
4. From the Translation will be applied on list, select which interface needs the NAT rule.
5. In the Original Address and Original Mask text boxes, type in the original address and
mask.
6. Do one of the following.
● In the Translated Address and T ranslated Mask text boxes, type in the translated
address and mask.
● If the Translation Type is port, type in the Port Range in the enabled boxes.
7. From the Locate This Translation Rule options, do one of the following.
● Select Beginning of List to put t he new rule a t the begi nni ng of the NAT Rule list shown
in the Policy Manager for NAT window.
● Select End of List to put t he new rule at th e end of the NAT Rule list shown in the Policy
Manager for NAT window.
● Select Af ter Sel ected Item to put the new rule after a s pecific rul e that was sele cted from
the NAT Rule list shown in the Policy Manager for NAT window.
8. If you want, in the Memo text box type in a comment about this rule.
9. If you want to create this rule without making it active, select the Add this translation rule without enabling it check box.
10. Click OK to return to the Policy Manager for NAT window.
11. If you configured a dynamic NAT rule, do the following.
● From the NAT Rule list, select your new rule to highlight it.
● In the Translated Address will age out in text box, t ype in the number of minutes of
undetected traffic that must pass before the assigned translation address is returned to
the pool of available addresses.
12. If necessary, use the Move Down and Move Up buttons to rearrange the position of the
new rule in the NAT list.
13. Click Save.
14. Close the Policy Manager dialog box.
15. From the Configuration Console, click Update Devices to end configured information to
the security gateway.
Tunnel NAT rules
Tunnel NAT rules are applied to VPN traffic before encapsulation and encryption. During VPN
setup, tunnel NAT rules are applied.
Issue 4 May 200595
Page 96
Setting up the network
Note:
Note:
Note:
To add a tunnel NAT rule:
1. From the Configuration Console>Device Contents pane, select the Policy tab to br ing it
to the front. Select NAT from the list. Click GO. The NAT Rules dialog is displayed.
2. Click the Add to open the Add NAT Rule dialog box.
3. Select the tunnel zone for the NAT rule. The Media Interface field displays the media that
corresponds to the zone that you select.
4. From the Type list, select either static or port.
Note:Redirection NAT rule cannot be applied to the tunnel zone.
5. In the Original area, complete the available or active areas:
● Option. From the list, select a pair of configured VPN local members IP address and
subnet mask.
Note:If the security gateway is configured in VPN gateway mode, it must have VPNs
configured in order to populate the list of configured VPN local members ip
addresses and subnet masks. If the security gateway is conf igured in user VPN
mode, only the private zone subnet is displayed i n the available list.
6. In the Translation area, Enter the translation IP addr ess.
Note:If Static NAT is selected, the subnet mask is automatically populated and is the
An IP Group is composed of a set of hosts (workstat ions and ser vers ) that are lo cated behin d a
common security gateway. The hosts are defined by their IP address and mask. The security
gateway must exist prior to creating IP Groups.
Virtual private networks (VPNs) are ma de up of IP Groups at multiple locations linked across a
public IP network. Assigning workstations and servers to differe n t IP Groups offers a powerful
way to limit VPN traffic to specifically designated users.
About IP Groups
Data Terminal Equipment (DTE), such as computers, printer s, and network servers , are devices
that can be members of a VPN. T wo methods are used for creating members. One involves
User Objects, which is described in Configuring remote access users
creating members that are remote and have to dial into the VPN. The other method i nvolves IP Group Objects (or IP Groups), which is reserved for DTEs that are connected to a LAN.
, but is reserved fo r
An IP Group contains an IP address and IP mask. An IP Group can be configured with many of
these address/mask pairs. The address/mask pair is used to create an address space (range).
Pairs are used for identifying a range of addresses used in a LAN. Therefor e, a DTE that has an
address within the range of the pair, belongs to a specific IP Group.
IP Groups can be created and edited at anytime. However, since IP Groups are associated with
a security gateway, it’s recommended that IP Groups are defined af ter the security gateways is
created and configured.
Creating a New IP Group
To create a new IP Group:
1. From the VPNmanager Console main window, click New Object and select IP Group. The
New IP Group dialog is displayed.
2. In the Name text box, type in a name for your new IP Group. Any characters can be used,
except a comma [,], forward slash [/], and backward slash [\].
3. A good practice is to incorporate identifiers in a name so they can be easily managed. For
example, a LAN used by an accounting department i n San Francisco that is made into an I P
Group can be named SFAccounting LAN. Using this scheme clearly identifies who are the
members of an IP Group.
4. Click Apply, then click Close to go to th e Configuration Console window.
Issue 4 May 200597
Page 98
Configuring IP Groups
Note:
5. Your new IP Group appears in the Contents column.
6. Click Save.
After an IP Group is created, use the General and Memo tabs to record notes about the IP
group.
New IP Group
The New IP Group screen is displayed when New>IP Group is selected, or when no IP Groups
currently exist.
Note:If the Hide directory context field box is unchecked (in the Advanced tab of the
Preferences drop-down menu), the Context field is displayed (default = off). This
field is used to define where the object is located in the LDAP directory tree.
All VPN components must have unique names. To prevent naming conflicts:
l Add the suffix “group” to the group name.
l Check the names of existing groups to avoid dupl ication.
l Use department or work group references for group names (for example,
“Chicago_Sales_Group” or “Seatt le_Engineering_Group”) since groups usual ly represent
one or more host devices belonging to employees in a corporate network.
IP Group - General tab
The General tab is used to manage your IP Gr oups. In add itio n to di splayi ng a list of all existi ng
IP Groups, it also provides a means of adding new IP Groups and linking the IP Group to a
specific device.
One or more address/mask pairs can be created, and the group can be assoc iated with a
specific security gateway. Your new group can even be associated with a security gateway
belonging to an extranet, a VPN outside your domain and belonging to another organization,
such as suppliers, banks, or customers.This tab includes the following information.
Members IP Network/Mask Pairs and Ranges. - This list shows the IP address and Mask
Pairs for all the security gateways currently in the IP Group.
Associate this group with. - Associating a group with a security gateway means that the
hosts corresponding to the IP address/mask pair entered are on a network that is behind or
protected by the selected securi ty gateway. The list contains the names of all security gateways
in the VPNmanager database, a choice of None, and a choice of Extranet device.
Extranet device. - You can create a group associated with a security gateway that is not
managed by your company’s VPNmanager. You do this to create “extranets” or VPNs between
partner companies. In an extranet, each company network uses VPN components that are
managed separately by their respective system administrators.
If you are creating an extranet, choose Extranet device as the group’s associated security
gateway. Doing this enables the “ Extranet IP Addr ess” entry field. The IP address of our par tner
company’s security gateway is entered here.
The IKE Identifier box is also activated when Extranet devi ces selected.
Zones. - This is the zone that is used. The default is public. For Avaya SG203 and SG208
security gateways, if the semi-private zone is configured, it can be selected.
Issue 4 May 200599
Page 100
Configuring IP Groups
IKE Identifier. - Extranet security gateway using IKE key management can be based on the
following IKE Identifier types:
● IP Address
● DNS Name
● Directory Name
● Email Name
When one of the above is selected, an appropriate field appears in which the information is
entered.
Add IP Group member
The Add IP Group Member dialog appears when Add is clicked. New member can be add ed to
the current IP Group list.
Depending on the release of VPNos, two options are avai lable in th is pane: IP Network address
and Mask, or IP Range. For the IP Range, enter the starting and ending IP addresses.
Table 8: Deriving the Group Mask
To specify a
contiguous range of
Start from an IP address that meets
these specifications:
And use this mask:
this many addresses:
1###.###.###.### (any IP address)255.255.255.255
2###.###.###.n (n = multiple of 2); e.g.,