Every effort was made to ensure that the information in this document
was complete and accurate at the time of release. However, information
is subject to change.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your
sales agreement to establish the terms of the limited warranty. In
addition, Avaya’s standard warranty language as well as information
regarding support for this product, while under warranty, is available
through the following website:
http://www.avaya.com/support
Preventing Toll Fraud
“Toll fraud” is the unauthorized use of your telecommunications system
by an unaut horized pa rty (for exam ple, a person who is not a corporate
employee, agent, subcontractor, or is not working on your company's
behalf). Be aware that there may be a risk of toll fraud associated with
your system and that, if toll fraud occurs, it can result in substantial
additional charges for your telecommunications services.
Avaya Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need
technical assistance or support, in the United States and Canada, call the
Technical Service Center's Toll Fraud Intervention Hotline at
1-800-643-2353.
Disclaimer
Avaya is not responsible for any modifications, additions or deletions to
the original published version of this documentation unless such
modifications, additions or deletions were performed by Avaya. Customer
and/or End User agree to indemnify and hold harmless Avaya. Avaya’s
agents, servants and employees against all claims, lawsuits, demands
and judgements arising out of, or in connection with, subsequent
modifications, additions or deletions to this documentation to the extent
made by the Customer or End User.
How to Get Help
For additional support telephone numbers, go to the Avaya Web site:
http://www.avaya.com/support/. If you are:
•Within the United States, click Escalation Manageme nt link.
Then click the appropriate link for the type of support you
need.
•Outside the United States, click Escalation Management link.
Then click International Services link that includes telephone
numbers for the International C ent ers of Excel lenc e.
Providing Telecommunications Security
Telecommunications security (of voice, data, and/or video
communications) is the prevention of any type of intrusion to (that is,
either unauthorized or malicio us access to or use of) your company's
telecommunications equ ipm ent by some part y.
Your company's “telecommunications equipment” includes both this
Avaya product and any other voice/data/video equipment that could be
accessed via this Avaya product (that is, “networked equipment”).
An “outside party” is anyone who is not a corporate employee, agent,
subcontractor, or is not working on your company's behalf. Whereas, a
“malicious party” is anyone (including someone who may be otherwise
authorized) who accesses your telecommunications equipment with
either malicious or mischievous intent.
Be aware that there may be a risk of unauthorized intrusions associated
with your system and/or its networked equipment. Also realize that, if
such an intrusion should occur, it could result in a variety of losses to
your company (including but not limited to, human/data privacy,
intellectual property, material assets, financial resources, labor costs,
and/or legal costs).
Responsibility for Your Company’s Telecommunications Security
The final responsibility for securing both this system and its networked
equipment rests with you - Avaya’s customer system administrator, your
telecommunications peers, and your managers. Base the fulfillment of
your responsibility on acquired knowledge and resources from a variety
of sources including but not limited to:
•Installation documents
•System administration documents
•Security documents
•Hardware-/software-based security tools
•Shared information between you and your peers
•Telecommunications secu ri ty expe rts
To prevent intrusions to your telecommunications equipment, you and
your peers should carefully program and configure:
•Your Avaya-provided telecommunications systems and their
interfaces
•Your Avaya-provided software applications, as well as their
underlying hardware/software platforms and interfaces
•Any other equipment networked to your Avaya products.
TCP/IP Facilities
Customers may ex perien ce dif fer ences i n prod uct p erforma nce, relia bili ty
and security depending upon network configurations/design and
topologies, even when the product performs as warranted.
Standards Compliance
Avaya Inc. is not responsible for any radio or television interference
caused by unauthorized modifications of this equipment or the
substitution or attachment of connec ting cab le s and equ ipme nt oth er
than those specified by Avaya Inc. The correction of interference caused
by such unauthorized modifications, substitution or attachment will be the
responsibility of the user. Pursuant to Part 15 of the Federal
Communications Commission (FCC) Rules, the user is cautioned that
changes or modifications not expressly approved by Avaya Inc. could
void the user’s authority to operate this equipment.
Product Safety Standards
This product complies with and conforms to the following international
Product Safety standards as applicable:
•Safety of Information T echnology Equipment, IEC 60950, 3rd
Edition including all relevant national deviations as listed in
Compliance with IEC for Electrical Equipment (IECEE)
CB-96A.
•Safety of Information Technology Equipment, CAN/
CSA-C22.2 No. 60950-00 / UL 60950, 3rd Edition
•Safety Requirements for Customer Equipment, ACA
Technical Standard (TS) 001 - 1997
•One or more of the following Mexican national standards, as
applicable: NOM 001 SCFI 1993, NOM SCFI 016 1993, NOM
019 SCFI 1998
Electromagnetic Compatibility (EMC) Standards
This product complies with and conforms to the following international
EMC standards and all relevant national deviations:
Limits and Methods of Measurement of Radio Interference of Information
Technology Equipment, CISPR 22: 199 7 and EN5 50 22: 199 8.
Such intrusions may be either to/through synchronous (time-multiplexed
and/or circuit-based) or asynchronous (character-, message-, or
packet- based) equipment or interfaces for reasons of:
•Utilization (of capabilities special to the accessed equipment)
•Theft (such as, of intellectual property, financial assets, or
toll-facility access)
•Eavesdropping (priv acy invasions to humans)
•Mischief (troubling, but apparently innocuous, tampering)
•Harm (such as harmful tampering, data loss or alteration,
regardless of motive or intent)
Information Technology Equipment – Immunity Characteristics – Limits
and Methods of Measurement, CISPR 24:1997 and EN55024:1998,
including:
•Electrostatic Discharge (ESD) IEC 61000-4-2
•Radiated Immunity IEC 61000-4-3
•Electrical Fast Transient IEC 61000-4-4
•Lightning Effects IEC 61000-4-5
•Conducted Immunity IEC 61000-4-6
•Mains Frequency Magnetic Field IEC 61000-4-8
•Voltage Dips and Variations IEC 61000-4-11
•Powerline Harmonics IEC 61000-3-2
•Voltage Fluctuations and Flicker IEC 61000-3-3
Federal Communications Commission Statement
Part 15:
Note: This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a
commercial environment. This equipment gener ates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in
a residential area is likely to cause harmful interference in which
case the user will be required to correct the interference at his own
expense.
Canadian Department of Communications (DOC) In terference
Information
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003
du Canada.
This equipment meets the applicable Industry Canada Terminal
Equipment Technical Specifications. This is confirmed by the registration
number. The abbreviation, IC, before the registration number signifies
that registration was performed based on a Declaration of Conformity
indicating that Industry Canada technical specifications were met. It does
not imply that Industry Canada approved the equipment.
DECLARATIONS OF CONFORMITY
United States FCC Part 68 Supplier’s Declaration of Conformity
(SDoC)
Avaya Inc. in the United States of America hereby certifies that the
equipment described in this document and bearing a TIA TSB-168 label
identification number complies with the FCC’s Rules and Regulations 47
CFR Part 68, and the Administrative Council on Terminal Attachments
(ACTA) adopted technical criteria.
Avaya further asserts that Avaya handset-equipped terminal equipment
described in this document complies with Paragraph 68.316 of the FCC
Rules and Regulations defining Hearing Aid Compatibility and is deemed
compatible with hearing aids.
Copies of SDoCs signed by the Responsible Party in the U. S. can be
obtained by contacting your local sales representative and are available
on the following Web site:
http://www.avaya.com/support
Japan
This is a Class A product based on the standard of the Voluntary Control
Council for Interference by Information Technology Equipment (VCCI). If
this equipment is used in a domestic environment, radio disturbance may
occur, in which case, the user may be required to take corrective actions.
China
BMSI (Chinese Warning Label)
Hardware, including technical data, is subject to U.S. export control laws,
including the U.S. Export Administration Act and its associated
regulations, and may be subject to export or import regulations in other
countrie s. Customer agrees to comply strictly with all such regulations
and acknowledges that it has the responsibility to obtain licenses to
export, re-export, or import hardware.
Acknowledgments:
This product includes software developed by the Apache Software
Foundation (http://www.apache.org).
Environmental Health and Safety:
!
WARNING:
Risk of explosion if battery is replaced by an incorrect type. Dispose of
used batt e ries accor ding to Avaya Environmental Health and Safet y
guidelines.
Documentation:
For the most current versions of documentation, go to the Avaya support
Web site: http://www.avaya.com/support/
All Avaya media servers and media gateways are compliant with FCC
Part 68, but many have been registered with the FCC before the SDoC
process was available. A list of all Avaya registered products may be
found at:
http://www.part68.org/
by conducting a search using “Avaya” as manufacturer.
European Union Declarations of Conformity
Avaya Inc. declares that the equipment specified in this document
bearing the “CE” (Conformité Europeénn e) mark conforms to the
European Union Radio and Telecommunications Terminal Equipment
Directive (1999/5/EC), including the Electromagnetic Compatibility
Directive (89/336/EEC) and Low Voltage Directive (73/23/EEC). This
equipment has been certified to meet CTR3 Basic Rate Interface (BRI)
and CTR4 Primary Rate Interface (PRI) and subsets thereof in CTR12
and CTR13, as applicable.
Copies of these Declarations of Conform ity (DoCs) can be obtai ne d by
contacting your local sales representative and are available on the
following Web site:
This Avaya VPNmanager® Configuration Guide is written for individuals who have an
understanding of how computer networks are installed, configured, and managed. It provi des
detailed information about using the Avaya VPNmanager solution to build small, medium, or
large scale Virtual Private Networks (VPNs).
VPNmanager is a Java-based software application that brings convenience, ease of use,
extended functionality, and platform independence to the management of VPNs.
What Products are Covered
Avaya’s solut ion i s a li ne of thr ee pr oduct s that ar e used for managi ng V ir tual Privat e Networks.
Each one, listed below, has been designed to meet the needs and requirements of either a
small, medium, or large network.
● VPNmanager Service Provider
● VPNmanager Enterprise
VPNmanager Overview
The VPNmanager application lets network managers def ine, configure, and manage Virtual
Private Networks (VPNs) from any location equipped with a computer running Window NT,
Window 2000, Windows 2003 Server, or Solaris.
Network managers can configure and check the status of Avaya security gateways and VPN
Service Units (VSU), add or remove remote sites and dial-in users to a VPN, configure user
authentication servers using LDAP directo ry servers or RADIUS servers, and monitor the state
of all security gateways, as well as the perfor man ce of private data transmissions using
Java-interface technology.
Issue 4 May 200515
Preface
Network-wide Visibility and Control
The logical VPNmanager representation of virtual private networks simplifies their installation
and control. From a single workstation, network managers can assign users anywhere on the
network to one or more logical Groups and integrate local and remote Groups into VPNs. The
VPNmanager software provides global-level, VPN-level, group-level, client-level and
equipment-level monitoring and control capabilities, and automates the task of managing
configurations across multiple security gateways and Avaya VPNremote® Clients. Extensive
alarm-reporting and statistics-gathering capabilities allow network managers to respond in real
time to hardware, network, and security p roblems, and t o plan the ef ficient growth and ev olution
of their networks.
Intranet and Extranet Support
The VPNmanager software makes it easy to extend intranet servi ces to remote sites and users
securely. In addition, the VPNmanager’s sophisticated import and export capabilities enable
network managers from different organizations to securely link with one another into private
wide-area “extranets.” Companies can quickly link and unlink to their suppliers, customers,
consultants, and other business associates with flexibility and speed unmatched by tr aditional
communications services.
Secure VPN Configuration
Several mechanisms are employed to insure sec uri ty when ma naging VPNs. I ndustry -st andard
Secure Socket Layer (SSL) technology is used to keep confi guration traffic between the
VPNmanager and VSUs private. In addition, X.509 certificates are used by both VSUs and the
VPNmanager console providing an authentication capability, thus allowing only authorized
administrators to configure VSUs. Once authenticated, administrators can configure, modify,
restart, or upgrade any securi ty gateway in the corporate network. Finally, sensitive
cryptographic keying informati on stored in the VPNmanager database is encrypted using a
password key to prevent compromising secure network traffic.
No Special Consoles Required
The VPNmanager software runs on host environment s that support the Java Virtual Machine
(see the VPNmanager README file for a current list of supported platforms). Expensive
management consoles and proprietary management interfaces are not needed. Regardless of
the host platform, the VPNmanager software presents the same appearance and user controls.
The VPNmanager software is designed specifically for securely defining, configuring,
monitoring, and upgrading VPNs. The VPNmanager software is required to configure and
modify VPNs. Secure traffic running between VSUs or between VSUs and VPNremote Clients
does not require an active VPNmanager . After c onfiguring the required VPNs, the VPNmanager
can be shutdown if desired, or used to monitor securi ty gateway activity. In addition, standard
MIBs available with the VSUs enable monitoring from standard SNMP management stations.
Using VPNmanager Help
The VPNmanager comes with a context-sensitive-Help system. Use the Help system for gett ing
information about a specific command in the VPNmanager graphical user interface (GUI).
Related Documentation
Related Documentation
Be sure to read the VPNos Configur ation Gui de. I t contains important information on the proper
procedure for setting up your VSUs, which is a prerequisite to setting up a Virtual Private
Network.
VPNremote Client software inst al lati on an d usage inf ormation is found in the VPNremote Cl ient Administrator’s Guide. This software allows the network administrator to pre-configure the
VPNremote client software for distribution to end users via the web, or on portable storage
media such as a CD or floppy disk.
You can download these documents from www.avaya.com. Click on Product Documentation,
select VPNand Security.
How This Book Is Organized
With this release of VPNmanager, the administrator’s guide was redesigned to present
information in the order that you use VPNmanager to configure a secure network.
Note:Depending on the VPNmanager version, some features described in this guide
may not apply.
Issue 4 May 200517
Preface
Chapter 1: Overview of implementation, provides an overview of how to use VPNmanger for
centralized administration of your VPN and security gateway. It includes a checklist for
implmeneting the network.
Chapter 2: Using VPNmanager
, explains how to log in to VPNmanager. It also explains how to
use the VPNmanager interface, including the VPNmanager main console and the configuration
console. The VPNmanager Preferences are described here.
Chapter 3: Setting up the network
, explains how to create a domain and creat e and configur e a
security gateway. This chapter explains how to configure the Device object, including mu ltiple
zones, NAT services, DNS, and Static Route.
Chapter 4: Configuring IP Groups
, describes how to configure IP Group Objects for Data
Terminal Equipment (DTE) such as computers, printers, and network servers as members of
your VPN.
Chapter 5: Configuring remote access users
, describes how to setup and maintain individual
remote access users in the VPN. This chapter includes Dyna-Policy configuration and
information about the Policies tab including Client IP configuration RADIUS/ACE services, and
client attributes
Chapter 6: Configuring user groups
, describes how to setup and maintain logical groups that
the individual VPN remote users reside.
Chapter 7: Configuring VPN objects
, explains VPN Objects as the method for linking VSUs,
remote terminals, and LAN terminals in a fully configured VPN.
Chapter 8: Establishing security
, describes the levels of Firewall policy management and De nial
of Service available, how to configure t he security gateway for Voice over IP and how to create
and map Quality of Service (Qos) rules.
Chapter 9: Using advanced features
, describes about using certificat es, configuring the
Directory Server, resilient tunnels, and high availability groups.
Chapter 10: Monitoring your network
, describes the monitoring and reporting features of the
VPNmanager software. This includes SNMP, Syslog Services, Reports, and Alarms. These
features allow virtual real-time monitoring of the VPN performance and specific security
gateways.
Chapter 11: Device management,
describes how to optimize the VPNmanager, check
connectivity, reset the device time, reboot, resetup a secur ity gateway and how to import a VPN.
Chapter 12: Upgrading firmware and licenses
, describes how to use the automatic upgrade
feature to upgrade the firmware for a secur it y gateway or for a group of secruity gateways, and
how to add new licenses to your security gateway.
Appendix A: Using SSL with Directory Server
, describes the benefit of using secure socke t layer
(SSL) with the Directory Server.
Appendix B: Firewall rules template
, describes the predefined firewall templates that are
Planning how your virtual private network should be configured is critical to the successful
deployment of a secure virtual private network.This chapter provides an overview of the major
features that you will configure.
Note:This chapter does not explai n how to set up a VPN or how to dete rmine what type
of security policies are required. You should understand about networking,
establishing firewall policies, and VPNs before implementing a VPN using
VPNmanager.
Components of the Avaya security solution
The Avaya security solution cons ists of the following:
● Avaya VPNmanager™
● Avaya™ SG security gateways and VPN Service Units (VSU)
Note:Beginning with VPNmanager 3.4, this configuration guide uses “security
gateway” to refer to both the security gateway and the VSU. The VPNmanager
application uses the word “Device” to refer to both of these components.
● Avaya VPNremote™ Client
Security gateways
The security gateways are desi gned to provide fi rewall coverage and VPN gateway functionali ty
for enterprises migrating towards conver ged network environments. The security gateway
performs cryptography, authentication, and filtering tasks at the boundary of the VPN.
After the security gateway is installed and configured, the secu rity gateway is transparent to
users who are logged into the VPN.
Issue 4 May 200521
Overview of implementation
VPNremote Client software
VPNremote Client software is a communicati ons application t hat runs on remot e computers that
use dialup, DSL and cable connection supplied by Internet Service Providers (ISP), to connect
to the corporate VPN. When communicating with a VPN, the software seamlessly performs
authentication and cryptography tasks. To install and use the software, an account with an ISP
must first be created.
The software is install ed on the remote user’s computer and then Client Configuration
Download (CCD) can be used to configure the remote user’s Dyna-Policy™ for authentication
to a specific VPN.
When remote users log in, they connect to the ISP and type in their user authe ntication
information, if asked. Upon authent ication, an y traf fi c that use s the VPN is safel y encrypted as it
is transported through the public networks.
VPNmanager software
VPNmanager software lets network managers define, configure, manage VPN and firewall
policies, upgrade firmware, and manage remote user access policies from a central location.
The VPNmanager software combines two components, the VPNmanager Console and the
policy server.
● The VPNmanager console is a client that is used for configuring, managing, and
monitoring one or more VPNs. The consol e is a Java app licatio n that can be r un anywhere
and is used as a front-end to the policy server and the directory server.
● The policy server distri butes configurati on and security policies. The VPNmanager console
is a client that communicates with the policy server to retrieve security policies. The policy
server then communicates with the directory server.
The VPNmanager Console and the directory server can reside on separate, dedicated servers
within the network to provide better performance for updating and configuring large numbers of
security gateways. You can use either an existing Sun One Server or Microsoft Active Directory
Server to store the policies that are created.
VPNmanager software consists of different versions to meet the needs of various networks.
● VPNmanager Small Office. Use the small office version for managing up to fi ve security
gateways and unlimited VPNremote Clients.
● VPNmanager Enterprise. Use the VPNmanager Enterprise version for managing an
unlimited number of devices and VPNremote Clients.
● VPNmanager Service Provider. Use this version to manage an unlimited number of
devices and VPNremote Clients. The Service Provider also supports multiple VPN
domains, which meets the needs of ISPs.
● VPNmanager Enterprise Client. Use the Enterprise Client version for managing an
unlimited number of security gateways and VPNremote Clients.
● VPNmanager Service Provider Client. Use the Service Provider Client version to
manage an unlimited number of security gateways and VPNremote Clients. The Service
Provider also supports multiple VPN domains.
Overview of the VPN management hierarchy
With the VPNmanager software, you can configure and manage VPNs and firewalls from a
central location. By focusing on secur ity policy instead of individual device management,
administration of large-scale networks is simplified. Central management allows you to make
configuration updates automatica lly to al l af f ecte d security gateways. This dist ribut ed approach
also applies to firewall management.
The VPNmanager software is built on a policy-based architecture that allows the administrator
to start at a high-lev el with a VPN domain, then move down t he hierarchy to create user gr oups,
IP groups for protected resources, and security groups that define membe rship and policies of
the VPN.
Figure 1: Domain hierarchy
At the peak of the hierarchy is the VPN domain. A domain is as sig ned a name to ident ify i t from
other domains. Usually one domain is configured fo r an entire or ganizat ion. A domain is bui lt of
one or more VPNs.
Each VPN is built of users, user groups and IP groups. VPNs are assigned names. These
names can associate the VPN to a regional location or purpose.
Users are the individual remote ac cess user s who log in to the VPN thr ough a securit y gateway.
The VPNremote Client software is used to connect to the VPN services.
A User Group contains or organizes user accounts. These accounts are assigned to remote
VPN members who dial in to the network and run VPNremote Client software to access the
VPN.
Issue 4 May 200523
Overview of implementation
An IP Group contains the IP addresses that belong to a specif ic LAN. Any device connected to
the LAN can use these addresses. A VPN can have many IP Groups so addresses can be
consolidated to meet the needs of an organization.
The security gateway is configured to provide VPN gateway functionally and firewall coverage.
VPNmanager security management includes creating domain-level firewall rules and
device-level firewall rules. VPNmanager provides multiple firewall templates that can be used
as a general rule set or as a starting point for creating a customized firewall template. You can
apply these templates at the domain level for al l security gateways, for a specific security
gateway (device-level), or for a defined device group.
Preparing to configure your network
Before you use VPNmanager to build your VPN and establish your VPN security policies, you
need to know how the VPN should be implemented. This section gives a overview of what
information you should know before you begin.
The following are functions or tasks that need to be addressed:
● How the security gateway will be configured for your network
● Which remote users will be configured on a security gateway
● What IP addresses to configure and group
● What type of security policies you want to implement
● What VPN services to use
● What advanced features, such as VoIP, Failover, or SNMP will be implemented
Security gateway
The security gateway is preconfigured with default settings for the media interface zones and
Network Address Tr anslation (NAT). You may need to change default configuration for your
specific network environment.
Up to six media interfaces can be configured with different zone interfaces. The number of
zones that can be configured depends on the security gateway model (Table 1
Ethernet1 are present in all models and are assigned to the public and the private zones. The
media interfaces that remain are unused and can be configu red as required.
). Ethernet0 and
● Public zone. Public zone provides connection to the Internet, usually by way of a wide
area network (WAN).
● Private zone. Private zone is used to provide connection to your private local area
● Public-backup zone. Public-backup zone is the backup interface to the primary public
interface for use when Failover is configured.
● Semiprivate zone. Semiprivate zone is used for media such as wireless LAN, where the
network is considered part of the protected network, but the media may be vulnerable to
attack. The semi-private zone provides the additional security measure of IPSec
encryption to prevent compromise to the network, for example, VPN over wireless
protection.
● DMZ zone. DMZ (Demilitarized zone) is used for an area in the company network that
needs to be accessible from the public networks, for example, email, FTP, and Web
servers, but the area is not considered p art of the internal private network. Serv ers in the
DMZ typically have publicly rout able IP addres ses or shou ld use adva nced NAT within the
security gateway.
● Management zone. Management zone is used to simplify network deployments, to
eliminate enterprise network dependencies on switches or routers. The management
network interface is usually used as an access poi nt for a dedicated VPNmanager
management station or as a dedicated interfac e for dumping log messages to a syslog
server.
Static routes are specified when more than one router exists on a network to which the security
gateway must forward either VPN traffic or non-VPN tr affic. You can build a static route table
with up to 32 network address/mask pair s.
IP groups
Data Terminal Equipment (DTE); such as computers, print ers, and network server s, are devices
that can be members of a VPN. To make these devices members, you create IP Group s. An IP
Group is composed of a set of hosts (workstati ons and servers) that are located behind a
common security gateway. The hosts are defined by their IP address and mask. VPNs are
made up of IP groups at multiple locations linked across a public IP network (Internet).
Assigning workstations and servers to different IP groups offers a powerful way to limit VPN
traffic to specifically designated users.
Remote users and user groups
VPNremote Client users who log in to the VPN through the security gateway must have their
user authentication configured on that security gateway.
If RADIUS is not used, you must configure the user name and the password for each remote
user . With RADIUS, you can configure a remote user as a default user. When a remote user is
configured as a default user, the user password is not required to log in. The user is
authenticated by a third-party authentication server, such as RADIUS.
You can also change the default Internet Key Exchange (IKE) identity, the split tunneling option
and the security option.
You can configure User Groups to setup and maintain logical groups of users.
VPN
A VPN object is the method used to link security gateways, remote terminals, and LAN
terminals in a fully configured virtual private network. Creating a VPN involves naming each
VPN, adding users and user groups, and adjusting the IKE and IPSec security protocols for
VPN traffic.
VPNmanager security policy management provides the following security features that can be
configured:
● Firewall rules
● Denial of Service (DoS) categories
● Quality of Service (QoS) rules
● Bandwidth management
In addition, encryption security options include Internet Key Exchange (IKE) with IPSecuirty
protocol (IPSec). It applies globally to the VPN.
Firewall policies
VPNmanager firewall policy management includes domain firewall rules, device firewall rules,
and firewall templates . The VPNmanager software provi des multiple firewall templates that can
be used as a general rule set or as a starting point for creating a customized firewall template.
You can apply these templates at the domain level for all security gateways, for a specific
gateway, or for a defined group. The integrated SMLI (Stateful Multi-Layer Inspection) Firewall
supports firewall rules criteria based on the following:
Preparing to configure your network
● Source/Destination IP address or range
● TCP/UDP/ICMP protocol
● Port or port ranges
● IP protocol
● Interface
● Direction
A set of common network services is provided, and custom network services or objects can be
easily defined for use in both firewall and QoS policies. Firewall rules can be individually
enabled to track state i nformation on TCP/UDP/ICMP packet flows and can be us er-configured
with advanced state timers. Logi n can also be enabl ed for each rule.
Note:Domain level rules and firewall templates are available for VPNos release 4.2
and later.
Denial of Service
The following Denial of Service (DOS) categories are enabled to protect the security gateway
from attack by hackers.
Issue 4 May 200527
Overview of implementation
Ping of Death. - The ping of death sends packets with invalid lengths. When the receiving
system attempts to rebuil d the packets, the system crashes because the packet length exhausts
the available memory.
IP Spoofing. - This attack sends an IP p acket with an invalid IP addres s. If the system accepts
this IP address, the attacker appears to reside on the private side of the security gateway. The
attacker is actually on the public side, and bypasses the firewall rules of the private side.
Smurf Attack. - This attack floods the system with broadcast IP packet pings. If the flood is
large enough and long enough, the attacked host is unable to receive or distinguish real traffic.
Tear Drop. - This attack sends IP fragments to the system that the receiving system cannot
reassemble and the system can crash.
Flood Attack. - This attack floods the system with TCP connecti on requests, which exhausts
the memory and the processing resources of the firewall. Flood attacks also attack the UDP
ports. This attack attempts to flood the network by exhausting the available network bandwidth.
WinNuke Attack. - This attack attempts to completel y disable networking on computers that
are running Windows 95 or Windows NT. This attack can be swift and crippling because it uses
common Microsoft NetBIOS services.
QoS
VoIP
Buffer Overflow. - This attack overflows the internal buf fers o f the a ppli cati on by sendi ng mor e
traffic than the buffers can process.
Quality of Service (QoS) allows you to classify and prioritize traffic based on DHCP values and
TCP/IP services and networks. The bandwidt h available to a class of traffic can be allotted to a
specific percentage of the total upstream bandwidth. Confi guring QoS allows VoIP traffic to
receive a higher priority. If QoS is disabled, all traffic receives the same priority.
The security gateway can be configured to protect and enable the communication of VoIP
telephones either within a VPN or firewall. The security gateway can be configured to secure
Avaya Multivantage™ and IP Office™ VoIP solutions as follows:
● Secure site-to-site voice trunks such as between headquarters and branch offices or
between main offices and home offices using VPNs.
● Secure VoIP servers or endpoints (IP telephones) by providing perimeter security using
the V oIP aware firewall fi ltering that is able t o dynamically open and clos e all port s required
to pass VoIP communication between servers and endpoints
● Allow voice-secure communication wit h Avaya’s IP Softphone and IP Office Phone
Manager Pro using VPNremote Client
● Enable NAT traversal of H.323 VoIP traffic
● Optimize bandwidth for VoIP traffic using the security gateway’s Quality of Service (QoS)
policies
In order to successfully use VoIP it is important to thoroughly plan the implementation of the
feature. Avaya suggests that you read the Avaya IP Telephony Implementation Guide before
implementing VoIP.
Additional features
The following is a list of some of features that can be configured depending on your VPN
networking requirements.
NAT
Preparing to configure your network
Network Address Tr anslation (NAT) is an Internet standard that allows private (nonrout able)
networks to connect to public (routable) networks. To connect private networks and public
networks, address mapping is performed on a security gateway that i s located between the
private network and the public network.
You can set up three types of NAT mapping on the security gateway:
By default, NAT is enabled and the Share public address to reach the Internet feature is
selected. NAT affects only clear traffic.
SNMP
The VPNmanager uses the SNMP protocol to monitor the security gateway. The security
gateway includes a SNMP agent that supports MIB-II and a proprietary MIB. This agent is
read-only and cannot be used to configure the security gateway. The agent can send traps to a
list of trap agents that you configure. SNMPv1, SNMPv2c, or VNMPv3 can be selected.
● Static NAT. With static NAT, addresses from one network are permanently mapped to
addresses on another network.
● Port NAT. With port NA T, addresses from internal, nonroutable networks are t ransl ated to
one routable address in Port NAT.
● Port Redirection. With port redirection, addresses from a specific IP address and a
specific port are redirected to another IP address and port.
Issue 4 May 200529
Overview of implementation
Syslog
The security gateway has a syslog messaging facility for logging system error messages. The
message can be automatically sent to a destination running a Syslog server.
Client IP address pooling
Access control devices (ACD), such as firewal ls, guard networks from unauthorized users.
Analyzing source addresses is one method ACDs use to decide which packets can enter a
network. The addresses that ISPs dynamically assign to VPNremote Client users is naturally
blocked because it is i mpossibl e to k now ahe ad of ti me whi ch addr ess is ass igne d. You need to
configure the VPNremote Cli ent IP add ress po ols f eature with th e source IP addres ses that can
be recognized by an ACD so that user access is not blocked.
SSL for Directory Server
As an added benefit, all communications with the direc tory server can be secured by SSL
(Secure Sockets Layer).
You can configure your VPN to run SSL at any time. However it is recommended that you
configure SSL before you put the VPN into service, so that the VPN services do not have to be
stopped.
Sequence to configure your VPN
The suggested order to set up your VPN is as follows. Refer to the chapters in this
VPNmanager Administrator’s Guide for details about how to create and configure these
features.
1. Create a VPN domain
2. Create the VPN
3. Create a security gateway
4. Configure needed static routes on the gateway
5. Create IP groups
6. Associate IP groups with the security gat eway
7. Associate IP groups with the VPN
8. Create new users
9. Associate users with VPNs
10. Create a VPNremote Client address pool on the gateway