The Enterasys Networks logo, Aurorean, Prescriptive Diagnostic Engine, RiverMaster, Intelligent Client Routing and
TollSaver, and TurboTunnel are trademarks of Enterasys Networks.
Microsoft, MS, and MS-DOS are registered trademarks and Windows, Windows 95, Windows 98, Windows NT,
Windows 2000 Professional, and Windows M illennium are trademarks of Microsoft Corporation in the USA and ot her
countries.
Virtual Network Computing is a trademark of AT&T Laboratories Cambridge.
Other trademarks and trade names us ed in this publication belong to their respective owners.
Aurorean Virtual Network software includes the following third-party components:
This guide describes how to use Version 3.1 of the RiverMaster management
application to set up and monitor Aurorean Virtual Network systems. While
written primarily to describe how to configure a Aurorean Virtual Netwo rk
solution for the first time, this guide also addresses how to track usa ge and
troubleshoot end-to-end VPN connectivity problems.
The guide is designed for network administrators who are responsible for
installing and ma naging local and wide area networking equipm ent. The
guide assumes you have experi ence working with LAN devices such as
firewalls, routers, hubs, and file servers.
instructions for installing the RiverMaster application on your
computer and starting the application for the first time.
About T his Guide
About T his Guide
About T his GuideAbout T his Guide
HChapter 2, The Guided Tour contains an overview of RiverMaster
operation, describes how to log into RiverMaster and check the status
of your Aurorean Virtual Network servers, and walks you through
the process of setting up an Aurorean Virtual Network for the first
time.
HChapter 3, Configuring a Aurorean Network Gatewaydescribes how to
configure network settin gs, such as IP addresses, name resolutio n
servers, tunnel prot ocols, and r outing p rotoc ols, using Ri verMast er or
Aurorean Policy Manager. The chapter describes how to back up the
database on the Aurorean Policy Server and details how to set up
site-to-site tunnels from one Aurorean Network Gateway to another.
It also details how to view and change alternate ANG address data.
HChapter 4, Setting Up Aurorean VN Services discusses how to: us e the
Authorization service to authenticate remote users, prepare the
Notification service to send E-mail in response to Aurorean Virtual
Network alarm, alert, or notification messages, and set trace levels for
system messages.
RiverMaster Administrator’s Guide
ix
About This Guide
HChapter 5, Controlling Remote Us er Dialing & Access describes how to
define Aurorean Network Gateway destinations, select ISPs from the
TollSaver database, configure POP packages and add corporate dialup phone numbers.
HChapter 6, Mana ging Users & Groups addresses how to create a user
database on a Aurorean Policy Server, assign policies that govern
user access to the network, and prepare a customized Aurorean
Client Software installation kit.
HChapter 7, Viewing Server Activity & Statistics shows you how to
examine and interpret message traffic between Aurorean Virtual
Network devices and monitor the performance of active tunn el
connections. Standard SNMP MIB-II and two private MIBs are now
available to monitor your Aurorean syst em s.
HChapter 8, Generating Reports describes how to download and view
customized reports that reve al Aurorean Virtual Network server
performance and remote user activity.
HAppendix A, Glossary contains definitions f or terms used throughout
this guide.
HAppendix B, Configuring the ANG with a Floppy Disk, describes a
procedure similar to the steps you would take to configure the ANG
by using the RiverMaster application. But this method allows an
administrator to centrally set up one or more gateways and distribute
that information on floppy disks to remote sites.
HAppendix C, License Agreement & Support describes the agreement that
governs the use and distribution of RiverMaster software and
provides information for contacting Enterasys Networks for technical
support.
x
RiverMaster Administrator’s Guide
Conventions Used in this Guide
The following conventions are used in this guide:
NOTENotes supply additional helpful information,
point you to where you can find more
information, or emphasize critical iss ues you
should consid er when performing an action.
CAUTIONCautions contain directions that can prevent you
from damaging the product or losing data.
WARNINGWarnings provide directions that you must
follow to avoid harming yourself.
BoldText in boldface indicates values you type using
the keyboard (for example, a:\setup). Default
settings may also appe ar in bold.
About This Guide
ItalicsText in italics indicates a variable, important new
SMALL CAPSText in small caps specifies keys to press on the
Courier fontText in this font denotes a file name or directory.
Related Documents
The following publications are also supplied with Aurorean VN systems:
HRiverMaster Quick Reference Card that contains shortcuts and tips for
installing and using th e RiverM aster application.
HQuick Setup cards that highlight the basic steps required to install
either a Aurorean Policy Server or Aurorean Network Gateway.
HAurorean Installation & Service Guide describes how to mount, connect,
power-up, and maintain an Aurorean Policy Server and Aurorean
Network Gateway.
term, or the title of a manual.
keyboard; a plus sign (+) between keys indicates
that you must press the keys simultaneously (for
example,
CTRL+ALT+DEL).
HANG-1000 User’s Guide details how to install and configure the small
office/home office Network Gateway.
Portable Document File (PDF) versions of these manuals are available on the
Aurorean System Software CD ROM. Using Adobe Acrobat Reader 3.0 (or
RiverMaster Administrator’s Guide
xi
About This Guide
later), you can view these manuals on-line or print additional copies. Acrobat
Reader can be downloaded from the Adobe web site (www.adobe.com).
xii
RiverMaster Administrator’s Guide
This chapter provides the system requirements and step-by-step instructions
for installing RiverMaster software on your computer. If you have not already
done so, Enterasys Networks recommends that you mount and connect your
Aurorean Policy Server and Aurore an Network Gateway before performing
these steps. Refer to the Aurorean Installation & Service Guide supplied with
each server for detailed installation instructions.
System Requirements
To run the RiverMaster application, your computer must meet the following
requirements.
1
Installing RiverMaster
Installing RiverMaster
Installing RiverMasterInstalling RiverMaster
Software
Software
SoftwareSoftware
Hardware Requirements
RiverMaster runs on a desktop or laptop computer equipped with:
HA 233 MHz processor or faster
H64 MB RAM minimum, 128 MB recommended
H80 MB free space on the computer’s hard drive
HCD ROM drive
HEthernet network interface
To best view the RiverMaster user interface, set your monitor to display
65536 co lors or better at 1024 x 768 resolution.
RiverMaster Administrator’s Guide
NOTE
1
Installing the Application
Software Requirements
The following operating systems, applications, and protocols should be
installed and configured before you install RiverMaster:
HWindows NT 4.0 Workstation upgraded with Service Pack 4 (SP4) or
later version or Windows 2000 Professional
HTCP/IP protocol
HTo use Aurorean Policy Manager: Internet Explorer 5 or Netscape 4
Installing the Application
Before installing RiverMaster, close any applications you have ru nning. Once
the installation is complete, you must restart the computer before you can use
RiverMaster to manage your Aurorean Virtual Network.
Chapter 1
Installing RiverMaster Software
NOTE
You must log into your Windows NT Workstation/2000 computer using
an account with administrator privileges before installing RiverMaster.
Without administrator privileges, some files may not install properly and
you may be prevented from using some RiverMaster features.
Upgrading a Previous Release
The following instructions assume you are installing RiverMaster on your
computer for the first time. Do not re-install RiverMaster over a previous
version. Remove the older version of RiverMaster as described in “Removing
RiverMaster Files” on page 9 and then install the new version as described in
the following section.
Installation Steps
To install RiverMaster on your computer, perform the following steps:
1
Insert the Aurorean 3.0 System Software CD into the CD ROM drive.
2
Open Windows Explorer, go to the RiverMaster directory on this CD
and run the
2RiverMaster Administrator’s Guide
SETUP.EXE
program.
Chapter 1
Installing RiverMaster Software
3
If a warning message appears stating that Microsoft ODBC is not
present on your computer, click OK to install Microsoft ODBC. If this
message does not appear, continue with the next step.
The Microsoft ODBC text driver must be installed on your computer
in order for RiverMaster to generate reports. RiverMaster Setup
automatically launches the Microsoft ODBC install program; follow
the instructions provided on the screen. When asked, choose the
Typical ODBC installation. After ODBC is installed, RiverMaster
Setup automatically resumes.
4
When the Welcome window appears, click Next to continue.
To halt the installation and exit the Setup program, click Cancel; this
option is also available on all Setup wi ndows that follow.
5
When the Software License Agreement window appears, carefully
read the agreement and click Yes to accept the terms.
Installing the Application
To install RiverMaster, you must accept the agreement. If you click
No to decline the agreement, the Setup program will close.
6
On the Choose Destination Location window, select where you want
RiverMaster files stored on the computer’s hard disk and click Next.
As a default, RiverMaster files are stored in C:\Program Files\
Indus River Networks\RiverMaster. To change the
destination folder, click Browse to select an existing folder or create a
new folder. To return to the previous window to change your
selections, click Back; this option is als o a v ailable on all Setup
windows that follow.
7
When the Select Program Folder window appears, assign a name to
the RiverMaster program folder and click Next.
As a default, the Setup program creates an Indus River Networks
folder that appears in the Programs menu. This folder contains
shortcut icons for the RiverMaster applica tion and a README file.
8
When the Start Copying Files window appears, click Next to continue
the installation or click Back to change your selections.
9
An Information window appears stating that to read the RiverMaster
documentation, you must install the Adobe Acrobat Reader program.
Click OK.
Acrobat Reader can be found in the 3rd Party Support Software
directory on this CD or at the Adobe Website (www.adobe.com).
RiverMaster Administrator’s Guide3
Installing the Application
10
11
When the reboot completes, RiverMaster is installed and ready to manage
your Aurorean Virtual Network.
If RiverMaster is running while you upgrade yo ur A urorean Policy
Server software, RiverMaster may become confused. To avoid this
situation, exit RiverMaster at the beginning the APS installation or exit
and restart RiverMaster after the process has completed.
Chapter 1
Installing RiverMaster Software
When the Setup Complete window appears, do one of the following:
–To view the README file immediately, leave the check box
checked and click Finish.
–To wait until later to view the README file, remove the check
from the check box and click Finish.
At the second Setup Complete window, choose Yes to restart your
computer and click Finish.
NOTE
Starting the A pplication for the First Time
When you start the RiverMaster application for the first time, you are asked
for the following information:
HThe IP address(es) you assigned to the Aurorean Policy Server(s)
during its installation.
HThe Aurorean VPN you assigned to your servers when they were
installed.
HA user name and password to log into RiverMaster (the defaults are
user netadmin and password netadmin).
NOTE
RiverMaster lets you invoke two RiverMaster session s f rom one
Windows NT/2000 computer to a pri mary and secondary Aurorean
system. This feature is especially useful when running AutoLink
Recovery™ (ALR), which employs automatic fail over to a backup
Aurorean Virtual Network system. If you wish to invoke two
RiverMaster sessions, you will be required to enter two IP addresses.
4RiverMaster Administrator’s Guide
Chapter 1
Installing RiverMaster Software
To start RiverMaster, perform the following steps:
1
On the main Windows NT/2000 desktop, double-click the
RiverMaster icon.
Alternatively, you can click the Start button, point to Programs, point
to Indus River Networks, and then click RiverMaster. In the
RiverMaster program group, click RiverMaster to launch the
application. After a few seconds , the Identify Your Aurorean
Environment window appears as shown in Figure 1.
Installing the Application
In the Aurorean VPN Name field, type a collective name that will be
2
shared by all Aurorean devices on your corporate network.
This name is set using the APS Quick Configuration wizard program;
refer to the Aurorean Installation & Service Gu ide for more information.
RiverMaster Administrator’s Guide5
Figure 1 First-Time Setup Information
Installing the Application
3
4
Chapter 1
Installing RiverMaster Software
Do one of the following:
–If you are configuring only one Aurorean Policy Server, enter the
IP address assigned to it in the Primary fields an d clic k OK. The
RiverMaster Login windo w will appear as shown in Figure 3
with the Aurorean VN Name, APS name and IP address
displayed as you specified earlier. Skip to Step 5.
–If, in addition to configuring a Primary APS, you have installed a
backup APS to use with the Auto Link Recovery feature, supply
this IP address i n the Alternate fi elds aft er entering an IP addr ess
of the Primary APS in the fields provided. Click OK. The Select
APS window will appear as shown in Figure 2.
This IP address is set using the Aurorean configuration wizard
program; refer to the instructions supplied with this program for
more information. RiverMaster needs this IP address to locate and
synchronize with the Aurorean Policy Server.
If you entered both APS IP addresses, select the APS you want to log
into and click OK.
The RiverMaster Login window appears as shown in Figure 3 with
the Aurorean VPN name displayed as typed in the Identify your
Aurorean Environment window.
Figure 2 Select APS Window
6RiverMaster Administrator’s Guide
Chapter 1
Installing RiverMaster Software
5
T ype the default user name (
and click OK.
For example, the primary APS name and its IP address is displayed in
the RiverMaster Login window in Figure 3. When the RiverMaster
application starts, the main interface appears as shown in Figure 4.
netadmin
Installing the Application
) and password (
netadmin
)
Figure 3 RiverMaster Login Window
NOTE
To prevent unauthorized RiverMaster access, Enterasys Networks
recommends that y ou immedi ately cr eat e a new administ rator acco unt in
the Admin group and delete the default login account. Refer to Chapter 6
for instructions on adding and deleting user accounts.
When you start RiverMaster, the application immediately attempts to detect
and communicate with the Aurorean Policy Server and Aurorean Network
Gateway located within the same corporate network. Depending upon the
amount of remote client activity occurring on the VPN, RiverMaster may
need up to a minute to detect and synchronize with both servers.
CAUTION
If you want to configure a connection to a second APS after having
already configured a connection to only one server, you must first delete
the config.irx file in theC:\Program Files\Indus RiverNetworks\RiverMaster directory on the RiverMaster PC. Then, when
you click on the RiverMaster desktop icon, the Identify your
Aurorean VN Environment window will appear as described on page 5.
RiverMaster Administrator’s Guide7
Installing the Application
Using the Delivery service running on all Aurorean components, RiverMaster
establishes a Delivery session with each server. The Aurorean Policy Server
reports service status, memory/hard disk usage , and a summary of alarms,
alerts, and problem notification messages. The Aurorean Network Gateway
reports an aggregated total of bytes sent and received over all tunnels, as well
as memory/hard disk usage.
When memory and disk usage
appears, RiverMaster has
detected and synchronized with
the Aurorean Network Gateway
Chapter 1
Installing RiverMaster Software
Click here to close
the application
Configuration pullout
Manage Users & Groups
pullout
View System Activity
pullout
When service status appears,
RiverMaster has detected
and synchronized with the
Aurorean Policy Server
Figure 4 RiverMaster Main Interface
To learn more about the server status data displayed on the RiverMaster
interface, refer to Chapter 2. To exit the RiverMaster application at any time,
click the close (
X) button in the upper-right corner of the main interface.
NOTE
If you have used RiverMaster extensively to generate reports and view
messages during a period of peak activity, the application may require a
few moments to cl ose.
8RiverMaster Administrator’s Guide
Chapter 1
Installing RiverMaster Software
Removing RiverMaster Files
RiverMaster can be uninstalled from your computer using the standard
Add/Remove Programs tool provided with Windows. After RiverMaster files
are removed from your computer, you should restart the computer to clean
up any files that were in use during the uninstall.
To remove RiverMaster files from your computer, perform the fol lowing
steps:
1
On your desktop computer, click the Start button, point to Settings,
then click Control Panel.
2
Double-click on Add/Remove Programs to launch the utility.
3
On the Install/Uninstall tab page, select RiverMaster from the list of
programs and click Add/Remove.
Removing RiverMaster Files
4
When the Confirm File Deletion window appears, click Yes to confirm
that you want to remove RiverMaster.
Clicking Yes launches the UnInstallShield program, which manages
the process of deleting RiverMaster files.
5
When Remove Shared File? windows appear for shared .DLL and
.OCX files, click Yes To All and click Yes again to confirm your
decision.
6
When the Remove Programs From Your Computer window appears
with all items checked, click OK.
7
When a window appears indicating that RiverMaster has been
removed, click OK to acknowledge the message but do not restart
your computer.
Although the Add/Remove Programs utility removes most Aurorean
VN files, you must manually delete the contents of the RiverMaster
folder within the Indus River Networks folder on your hard drive.
You should do this before restarting your computer.
8
Close the Add/Remove Programs control panel.
9
Open Windows Explorer by clicking the Start button, pointing to
Programs, and then clicking Windows Explorer.
RiverMaster Administrator’s Guide9
Removing RiverMaster Files
10
Locate the RiverMaster program folder.
The default location for this folder is C:\Program Files\
Indus River Networks.
11
Delete the RiverMaster folder.
12
Restart your computer.
Chapter 1
Installing RiverMaster Software
10RiverMaster Administrator’s Guide
This chapter introduces the essential functions of RiverMaster, describes
Aurorean Virtual Network system status information displayed on the main
interface, and summarizes the steps required to use RiverMaster to configure
your Aurorean Virtual Network for the first tim e .
RiverMaster Overview
When RiverMaster is installed on your PC, the computer becomes a
“management sta tion” for the Aurorean Virtual Network, receiving dynamic
updates from Aurorean Virtual Network systems and making immediate
configuration changes. All data di splayed by RiverMaster is retrieved from
databases residing on the Aurorean Policy Server or from incoming messages
from either the Aurorean Policy Server or Aurorean Network Gateway; no
data is stored locally on your PC ’s hard disk.
2
Getting Started with
Getting Started with
Getting Started withGetting Started with
RiverMaster
RiverMaster
RiverMasterRiverMaster
Figure 5 illustrates the interaction between the Aurorean Policy Server,
Aurorean Network Gateway, and RiverMaster PC.
RiverMaster Administrator’s Guide11
RiverMaster Overview
Chapter 2
Getting Started with RiverMaster
Aurorean
Policy
Server
• Updated configurations
• Requests for logs
• Curre
• Status of services
• Reports
•
Cus
ki
t
Aurorean
Network
• Backup configuration
files
• Log files
n
t
c
onf
i
g
u
ra
t
ions
•
Us
•
R
e
r
e
&
q
g
u
e
ro
s
t
om A
b
u
i
ld
c
t
u
rore
o
mma
u
s
p
f
c
o
h
r
a
re
n
p
g
o
es
rt
a
s
n
Client
n
d
s
RiverMaster PC
N
•
• Tunnel statist
ati
c
fi
i
igur
ot
f
n
o
c
n
o
cs
i
s
e
g
n
a
h
of
c
n
o
ti
a
Gateway
Figure 5 Aurorean Virtual Network Communication Flow
Using the RiverMaster managemen t application you can:
HQuickly check a server’s operationa l status by determining if all
services are running, reviewing alarm and alert messages that have
accumulated, and displaying current tunnel activity (the number of
users logged in and the amount of data passing over all tunnels).
HDefine “virtual subnets” to provide IP addresses to remote Aurorean
Client Software users and allow the Aurorean Network Gateway to
properly route remote user packets through the corporate network.
HSelect which Internet Service Providers (ISPs) your remote Aurorean
Client Software users can use from the extensive TollSaver database
stored on the Aurorean Policy Server.
HDefine user accounts on the Aurorean Policy Server to locally
authenticate remote users or install a “plug-in” to authenticate users
against an external RADIUS or SecureID server.
12RiverMaster Administrator’s Guide
Chapter 2
Getting Started with RiverMaster
HOrganize users with groups and assign each group policies that
govern the features available in Aurorean Client Software.
HCreate customized Aurorean Client Software installation kits to
distribute to your remote users that contains the Aurorean Client
Software application, POP packages, group policies, and destination
IP addresses.
Logging into RiverMaster
When you start the RiverMaster applicatio n, the RiverMaster Login window
appears as shown in Figure 6 if you have configured a connection to one
Aurorean Policy Server. If you have configured a connection to a second
Aurorean Policy Server, the Select APS window will appear as shown in
Figure 7.
Logging into RiverMaster
Version 3.0 of RiverMaster lets you start two R iverMaster sessions from one
Windows NT/2000 computer to separate Aurorean Virtual Network systems.
This feature is especially useful when running AutoLink Recovery, which
employs automatic fail over to a backup Aurorean Virtual Network system.
To access RiverMaster, you must enter a user name and pass word that the
Aurorean Policy Server can authorize from its internal database. The default
login account is netadmin with the password netadmin.
Log into RiverMaster by typing a user name and password in the fields
provided, and choosing the Aurorean VPN name associated with the Primary
Aurorean Policy Server. Click OK.
RiverMaster Administrator’s Guide13
Figure 6 RiverMaster Login Window
Logging into RiverMaster
To prevent unauthorized RiverMaster access, Enterasys Networks
recommends that you immediately create a new administrator login
account in the IRAdmin group and delete the default login account.
Refer to Chapter 6 for more on adding and deleting user accounts.
If you have configured a connection to a second Aurorean Policy Server, the
Select APS window appears as shown in Figure 7. Select the Aurorean Policy
Server you want to manage and click OK . The RiverMaster Login window
then appears as shown in Figure 6 a llowing you to log into the selected
Aurorean Policy Server.
Chapter 2
Getting Started with RiverMaster
NOTE
CAUTION
If you want to configure a connection to a second Aurorean Policy Server
after having already configured a connection to only one server, you must
first delete the config.irx file in the C:\Program Files\IndusRiver Networks\RiverMaster directory on the RiverMaster
computer. Then, when you click on the RiverMaster desktop icon, the
Identify your Aurorean Environment window will appear as described in
Chapter 1.
14RiverMaster Administrator’s Guide
Figure 7 Select APS Window
Chapter 2
Getting Started with RiverMaster
Checking Server Status
RiverMaster’s main interface is designed to quickly show the Aurorean
Virtua l Network’s “health” when you start the application. The health
conditions are organized into three categories:
HProblem summary and users logged in
HAurorean Network Gateway statistics
HAurorean Policy Server statistics
Problem Summary & Users Logged In
As shown in Figure 8, counters at the top and bottom of the interface track
both error conditions and successful tunnel lo gin attempts. The Problem
Summary counters are updated whenever RiverMaster receives one of three
types of mes s ag e s:
Checking Server Status
HAlarms notify you when a significant error occurs with a service
running on a Aurorean Virtual Network system or a general server
problem that is preventing the server from operating normally.
HAlerts occur when an error count threshold has been crossed and an
alarm condition is imminent.
HProblem Notification messages typically indicate an error at the
Aurorean Network Gateway or a remote client connection problem
which Aurorean Client Software’s Prescriber feature diagnosed and
reported. Prescriber is a Aurorean Virtual Network feature which
diagnoses why a tunnel connection failed and attempts to correct the
problem.
RiverMaster Administrator’s Guide15
Checking Server Status
Indicates current alarms,
alerts, and informational
messages that appear in
the System Activity window
(refer to Chapter 7 for more
information)
Total number of remote
users authenticated and
connected to the corporate
network via the Aurorean
Network Gateway
Chapter 2
Getting Started with RiverMaster
Click here to view
more details about
logged in users
Figure 8 Aurorean Network Gateway Status Information
Aurorean Network Gateway Statistics
Figure 9 shows the statistics information R iverM aster displays for the
Aurorean Network Gateway. The graph indicates total amount of bytes sent
and received over all tunnels processed by the Aurorean Network Gateway;
to view the traffic passing over a single tunnel, click the button at the top right
corner of the graph.
16RiverMaster Administrator’s Guide
Chapter 2
Getting Started with RiverMaster
Aggregated number of bytes
received and sent over all
tunnels processed by the
Aurorean Network Gateway
Memory usage
Hard disk usage
Checking Server Status
Click here to view
detailed statistics
for individual tunnels
(refer to Chapter 7
for details)
Figure 9 Aurorean Network Gateway Statistics
The memory and hard disk usage meters show how much system resources
are being consumed supporting tunnel connections. You can use these values
for capaci ty p l an ning to determine wh e n t h e nu mber of concurr ent tunnels is
approaching the server’s limit.
Aurorean Policy Server Statistics
As shown in Figure 10, RiverMaster displays the current status of services
running on the Aurorean Policy Server. Normally, all services should appear
as “Running.” If one or more services appears as “Stopped,” then the
Aurorean Policy Server may not function correctly. Table 1 briefly defines
each service and describes what occurs when the service is stopped.
RiverMaster Administrator’s Guide17
Checking Server Status
Status of services running
or stopped on the
Aurorean Policy
Server
Memory usage
Chapter 2
Getting Started with RiverMaster
Hard disk usage
Figure 10 Aurorean Network Gateway Statistics
Table 1 Aurorean Policy Server Services
ServiceFunctionIf Stopped...
OverlordMonitors the condition of all other
Auroreanservices and restarts a serviceif
it fails to initialize properly or ceases to
operate at any point. Overlord may also
force a total server reboot if necessary.
RetrievalRetrieves statistics and messages from
both the Aurorean Network Gateway and
Policy Server to generate activity and
anomaly reports.
DeliveryCarries messages between all Aurorean
Virtual Network components, including
servers, Aurorean Client Softwareclients,
and the RiverMaster management
application. Delivery is a critical service
that must be operational for Aurorean
Virtual Network components to initialize
properly and synchronize with one
another.
The Aurorean Policy Server
automatically reboots itself
approximately 20 seconds after the
Overlord service stops.
You cannot downloadand view reports
using RiverMaster.
The Aurorean Policy Server cannot
communicate with the RiverMaster
application and remote users are
unable to authenticate and establish a
tunnel connection with the Aurorean
Network Gateway. The Aurorean
Policy Server automatically reboots
itself approximately 3 minutes after the
Delivery service stops.
18RiverMaster Administrator’s Guide
Chapter 2
Getting Started with RiverMaster
Table 1 Aurorean Policy Server Services
ServiceFunctionIf Stopped...
Checking Server Status
NotificationReports alarm, alert, and problem
notification messages using E-mail.
FTPProvides the mechanismfor transferring
files between Aurorean Virtual Network
servers and RiverMaster. FTP also allows
Aurorean Client Software computers to
synchronize group policy settings,
TollSaver POP phone numbers,
Prescriber remedies, and Aurorean Client
Software application executables.
AccessSupports the exchange of database
informationstoredontheAuroreanPolicy
Server to other Aurorean Virtual Network
components, such as TollSaver data,
logs, and server configuration files.
The Aurorean Policy Server and
Network Gateway can operate
normally but E-mail messages are no
longer sent when
alarms/alerts/problems occur.
Aurorean Client Software users can
connect but cannot perform client
synchronization. RiverMaster cannot
download reports from the Aurorean
Policy Server. RiverMaster cannot
complete database transactions and
queries.
The Aurorean Policy Server cannot
acceptany configurationchangesfrom
the RiverMaster application and
remote users are unable to
authenticate and establish a tunnel
connection with the Aurorean Network
Gateway. The Aurorean Policy Server
automatically reboots approximately 3
minutes after this service stops.
RiverMaster Administrator’s Guide19
Checking Server Status
Getting Started with RiverMaster
Table 1 Aurorean Policy Server Services
ServiceFunctionIf Stopped...
Chapter 2
LogMaintains a running record of system
events and messages received by each
Aurorean Virtual Network component.
The RiverMaster application displays
these logs and extracts information from
them to produce daily reports.
AuthenticationProvides the mechanism for
authenticating remote users against user
databases located on eitherthe Aurorean
Policy Server or an external
authentication server (such as a RADIUS
device). Authentication also serves
another security role, by enforcing a strict
ring level hierarchy for Deliverymessages
to prevent unauthorizedaccess to
sensitive information.
The Aurorean Policy Server willaccept
configuration changes and the
Aurorean Network Gateway will accept
tunnel connection attempts. However,
the messages generated by these
actions are not stored in a log file on
the Aurorean Policy Server andcannot
be viewed as they occur from the
RiverMaster. Reports will also be
inaccurate.
Configuration changes sent by the
RiverMaster to the Aurorean Policy
Server are rejected because the
Aurorean Policy Server cannot
authenticate them. Also, the Aurorean
Network Gateway will not accept new
tunnel connection attempts because
the remote user cannot be
authenticated. The Aurorean Policy
Server reboots approximately 3
minutes after this service stops.
The memory and hard disk usage meters in the Aurorean Policy Server
statistics area show how much server resources are being consumed to
manage the Aurorean Virtual Network. High memory usage normally reflects
a large number of authorization messages for both remote user authentication
and server-to-server traffic; generating reports and Aurorean Client Software
installation kits can also consume Aurorean Policy Server memory. High disk
space usage is normally a result of many large log and report files
accumulating on the hard disk.
NOTE
When 85% of the Aurorean Policy Server drive capacity is full, the server
automatically begins deleting logs and reports older than 90 days. Log
and report deletions are not configurable at th is t i me.
20RiverMaster Administrator’s Guide
Chapter 2
Getting Started with RiverMaster
Setting Up a Aurorean Virtual Network the First Time
Setting Up a Aurorean Virtual Network the First Time
When you start RiverMaster for the first time, you need to perf orm several
basic configuration steps to put your Aurorean Virtual Network into
operation. These basic steps are outlined below, with references to the
detailed instructions provided throughout this manual.
1
Enter the Aurorean VPN name for your Aurorean Virtual Network
equipment and enter the IP address(es) of the Aurorean Policy
Server(s).
You are prompted to enter these values the first time you start the
RiverMaster application.
2
After you login with the default user name and password, set the
authentication, encryption, and compression options used during
tunnel connections.
These options are set separately for each tunnel protocol (PPTP or
IPSec) as described in Chapter 3.
3
Allocate IP addresses for remote users to use when they tunnel into
the corporate network.
You can assign a specific address to each remote user or allow users
to dynamically draw addresses from a pool. Address pools are
created by defining virtual subnets as described in Chapter 3.
4
Configure the Aurorean Network Gateway to route packets from
remote users through the corporate network.
The Aurorean Network Gateway supports RIP, OSPF, and static
routes to forward packets to their destination; to configure these
routing protocols, refer to the instructions in Chapter 3.
5
Determine how remote Aurorean Client Software users will be
authenticated.
–To authenticate against a database residing on the Aurorean
Policy Server, you must use the Authorization service as
described in Chapter 4.
–To authenticate against an external RADIUS server, you must
configure an authorization plug-in as described in Chapter 4.
–To authenticate against an external SecurID server, you must
configure an authorization plug-in as described in Chapter 4.
RiverMaster Administrator’s Guide21
Setting Up a Aurorean Virtual Network the First Time
6
Create mailing lists so that the Aurorean Policy Server sends you
E-mail when alarm, alert, or notification messages are generated
(optional).
E-mail messages are generated by the Notification service as
described in Chapter 4.
7
Reboot the Aurorean Network Gateway to put the networking
changes into effect.
8
Create POP packages of selected Internet Service Providers (ISPs)
from the list of those available in the master TollSaver database as
described in Chapter 5.
By limiting the ISPs available for use by remote users and grouping
them in POP packages, you can minimize the size of the database of
Point of Presence (POP) phone numbers distributed to your Aurorean
Client Software users. In addition to POP phone numbers, you can
add corporate direct dial phone numbers to this database.
Chapter 2
Getting Started with RiverMaster
9
Define groups for remote Aurorean Client Software users as
described in Chapter 6.
For each group you can assign a range of IP addresses to allocate to
Aurorean Client Software users when they connect (using the virtual
subnets you defined in Step 3). You can als o gra nt po licies to each
group that determine the Aurorean Client Software features and
functions that can be used by members of that group.
10
Add user accounts to each group as described in Chapter 6.
If you plan to authenticate all remote users against an external
RADIUS or SecurID server, you can skip this step. For each user
account, you must enter a specific IP address or indicate that the
Aurorean Network Gateway must allocate the user an address from
the group’s virtual subnet.
11
Generate a customized Aurorean Client Software installation kit for
distribution to members of each group as described in Chapter 6.
This installation kit contains the Aurorean Client Software
application, group policy settings, destinations, and a TollSaver
database with POP phone numbers for the ISPs assig ned to th e
group.
22RiverMaster Administrator’s Guide
Chapter 2
Getting Started with RiverMaster
Once remote users begin tunneling into the corporate network using
Aurorean Client Software software, you can view this activity using the
Tunnel Statistics window described in Chapter 7. You can also produce
detailed daily usage reports as described in Chapter 8.
Authentication requests and other user activity messages are also displayed
in the System Activity window described in Chapter 7. This window also
displays alarm and alert messages that warn you when server errors occur.
Setting Up a Aurorean Virtual Network the First Time
RiverMaster Administrator’s Guide23
3
Configuring an ANG-3000/7000
Configuring an ANG-3000/7000
Configuring an ANG-3000/7000Configuring an ANG-3000/7000
This chapter describes how to configure network settings for your local
Aurorean Network Gateway (ANG-3000/7000). Local ANGs have an
accompanying Aurorean Policy Server and are configured using RiverMaster .
Remote ANGs are stand-alone systems configured by using the Web-based
Aurorean Policy Manager utility. The ANG-1000 is configured using its Webbased configuration utility only. Network settings for the ANG fall into these
categories:
HGeneral settings such as the DNS, WINS and NAT servers that
remote clients require for name resolution or authentication.
HTunnel protocol (PPTP or IPSec) parameters for authentication,
encryption, and compression.
HVirtual subnets containing pools of IP addresses or IPX network
numbers that are allocated to remote users when they tunnel into the
corporate network.
HRouting protocol (static, RIP, and OSPF) settings for each ANG
Ethernet interface.
HSite-to-site tunnel parameters between two Aurorean Network
Gateways.
NOTE
The ANG-3000/7000 can also be configured using a floppy disk.
Appendix B describes a procedure similar to configuring the ANG using
the RiverMaster application. Using the floppy disk method allows an
administrator to centrally configure one or more gateways and
conveniently distribute that configuration data on floppy disks to remote
sites.
RiverMaster Administrator’s Guide25
Before You Begin
Select the
Network
Gateway from
the list of
servers
Chapter 3
Configuring an ANG-3000/7000
These functions are grouped on the Configurati on pullout as shown in
Figure 11.
Click here to
open the
Configuration
pullout
Click here to
access the
Network
Gateway
configuration
windows
Before You Begin
Before performing the steps in this chapter, you should familiarize yourself
with the following Aurorean Virtual Network concepts:
HMethods available for allocati ng IP addresses and IPX network
numbers to remote clients when they connect.
HAurorean Virtual Network’s Intelli gent Client Routing feature.
HAurorean Virtual Network’s support for Network Address
Translation (NAT).
HMethodology of Site-to-Site tunnels.
Figure 11 Configuration Pullout
HAurorean Virtual Networ k’s AutoLink Reco very feature.
26RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
Allocating IP/IPX Addresses to Remote Clients
When remote clients tunnel into the corporate network, they must be able to
access devices on the network just as if they were locally conn ected. To serve
this need, the ANG acts as a router, forwarding packets between devices on
the corporate network and remote clients. When remote clients tunnel into
the ANG, they must be allocated IP addresses accessible to or on the local
network.
NOTE
To access Novell NetWar e servers using IPX protocol, remote clients must
receive an IPX network number. RiverMaster allows you to specify a
single IPX network number that is shared by all remote clients when they
connect. IPX usage is also controlled by a group policy; refer to Chapter 6
for more information on group policies.
Before You Begin
You can allocate IP addresses to Aurorean users in one of three ways:
HAssign a specific IP address to each remote client. This address is
saved as part of the client’s user name and password account
information stored on the Aurorean Policy Server. Once the client
authenticates, the address is allocated to the client for the duration of
the connection. To receive an IP address in this manner, the remote
client must authenticate against the Enterasys authoriz ation plug-in
as described in Chapter 4.
HAuthenticate remote clients against an external authentication server
(such as a RADIUS server) and have that server allocate IP addresses.
To receive an IP address in this manner, the remote client must
authenticate against a RADIUS plug-in as described in Ch apter 4.
HDefine one or m ore virtual subnets that act as address pools. Virtual
subnets are linked to groups; when a member of a grou p connects, an
address from within the virtual subnet is allocated to that user for the
duration of the connection.
To support virtual subnets, the ANG must learn the topology of the corporate
network and advertise to other devices that remote clients on the virtua l
subnet are reachable. To do this, the ANG supports Routing Information
Protocol (RIP) and Ope n Shortest Path First (OSPF) routing protocols. The
ANG supports both RIP Version 1 and Version 2.
RiverMaster Administrator’s Guide27
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Virtual subnets can use both legitimate IP addresses (unique addresses
purchased and registered by your company) and non-routable address ranges
reserved for private network use only. These reserved address ranges include:
H10.0.0.0 to 10.255.255.254 on a Class A network
H172.16.0.0 to 172. 30.255.254 on a Class B n etwork. Although 1 72.31.0.0
to 172.31.255.254 is also a reserved range, you cannot define virtual
subnets within this range because addresses in that range may be
taken by the ANG for internal use.
H192.168.0.0 to 192.1 68.255.254 on a Class C network
These addresses are not routable outside your corporate network. By using
these addresses for remote clients, you can preserve the routable IP addresses
for LAN devices.
NOTE
If you allocate addresses from one of these non-routable ranges and you
want remote clients to be able to browse the Internet while connected,
you must enable the Intelligent Client Routing described on page 31 or
use network address translation.
There are several advantages to using virtual subnets over other IP address
allocation techniques:
HThe ANG can advertise the virtual subnets before remote clients
connect. Using the other techniques, the ANG would only create a
host route when the client connected. Because routing protocols may
take as lon g as 30 seconds per router to propagate a host route , the
client may remain unreachable for a period of time.
HCreating individual host routes for each r emote client as they connect
may overload the network’s routers. Because ANG-5000s support
5000 tunnels (ANG-3000s support 500 tunnels), each router may
become burdened with 5000 routes in its route table.Virtual subnets
can be quickly and easily scaled up to accommodate large number of
remote clients. You can modify the subnet mask for an existing
virtual subnet to provide additional addresses or create entire new
virtual subnets.
28RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
Figure 12 shows a sample corpor ate network that employs two virtual
subnets. Each virtual subnet provides up to 255 client IP addresses depending
upon the subnet mask used. By assigning different virtual subnets to each
group, you can control what devices members of the group can access once
they are connected.
Before You Begin
Aurorean Remote Clients
INTERNET
Virtual Subnet #1
192.168.1.0
Server #1
Aurorean
Firewall
200.100.200.0
Network
Gateway
Virtual Subnet #2
192.168.2.0
Router
200.100.201.0
Server #2
Figure 12 Remote Client Virtual Subnet Usage
For example, because Server #1 resides on the same network segment as the
ANG, all remote clients can access this se rve r regardless of the virtual subnet
that provided their address. If you enable RIP or OSPF on the ANG Trusted
interface, the router in this diagram will learn about b oth virtual subnets.
However , if you enable only static routing on the ANG Trusted interface, you
can limit access to the 200.100.201.0 subnet to users that receive address from
Virtual Subnet #1. To accomplish this, you m ust create two static routes:
RiverMaster Administrator’s Guide29
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
HUsing RiverMaster, adding a static route for all addresses in the
Virtual Subnet #1 range with the router’s IP address as the default
gateway.
HOn the router, create a static route to forward all packets addressed
with IP addresses in the Virtual Subnet #1 range to the IP address of
the ANG Trusted interface.
With this arrangement, remote clients that receive addresses from Virtual
Subnet #1 will be able to access Server #2. Without a static route, remote
clients that receive addresses from Virtual Subnet #2 will be unable to access
Server #2 or any other device on the 200.100.201.0 segment
Virtual Subnets for Site-to-Site and Remote Access Tunnel Servers
When you set up a site-to-site tunnel in co njunction with remote access
service, we recommend creating separate groups and assigning separate
virtual subnets for all your site -to -site and remote access users. This is
necessary because RIP does not forward knowledge of a route over the
interface from which it learned of that route. So if a remote client and a site-tosite tunnel obtain their virtual IP addresses from the same virtual subnet on
the terminating ANG, then that remote access client will not be able to learn
the routes that are known to the initiator of the site-to-site tunnel. This
condition does not apply to a terminating ANG, though.
As shown in Figure 13, if ANG1 initiates a tun nel connection to ANG2, RIP
will broadcast knowledge of ANG1’s associated networks A, B and C to
ANG2 just as it will propag ate knowledge of ANG2’s assoc iated networks X,
Y and Z to ANG1. Then, if the virtual subnet 10.10.10.0 is created on ANG2
for use by ANG1 site-to-site clients and is shared with remote Aurorean
clients, the Aurorean users cannot access networks A,B, and C on ANG1
because they have no knowledge of those networks.
To remedy this situation, create virtual subnet 187.14.57.0 on ANG2 for
Aurorean users. RIP will broadcast knowledge of this route to ANG2
enabling Aurorean users to dial into ANG1 as well as ANG2.
30RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
Before You Begin
Network A
Network B
Network C
ANG1
10.10.10.2
Learned
Routes:
X, Y, Z
Aurorean
10.10.10.3
Site-to-Site Tunnel
Learned
Routes:
X, Y, Z
INTERNET
ANG2
Learned
Routes:
A, B, C
Virtual Subnet
10.10.10.0
Network X
Network Y
Network Z
Figure 13 Virtual Subnets for Site-to-Site and Remote Access Tunnels
For instructions on creating virtual subnet s fo r IP ad dress and IPX network
number allocation, refer to “Virtual Subnetting” on pa ge 50.
Intelligent Client R outing
Enterasys Networks’ Intelligent Client Routing feature provides you with a
measure of control over a Aurorean Client user’s access to the Internet. When
enabled (this feature is enabled by default), Intelligent Client Routing allo ws
remote clients to browse the Internet directly, out side of the tunnel. For
example, if a remote client tries to browse the Internet while tunneled into the
corporate network, packets bound for any destination within the Internet are
sent down the tunnel into the ANG and then back out th e network’s Internet
gateway.
When Intelligent Client Routing is en abled, the ANG exports routes over the
tunnel to the client. Based on this information, the client determines if the
destination address can only be reached over the tunnel or can be reached
directly on the Internet. Figure 14 contrasts how packets that are destined for
an Internet server are routed with the Intelligent Client Routing feature
enabled or disabled.
If you allocate a non-routable IP address to a remote client from a virtual
subnet, you may need to enable Intelligent Client Routing to allow the remote
client to browse the Internet.
RiverMaster Administrator’s Guide31
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Packets that are addressed with non-routable addresses are typically blocked
by firewalls and Internet gateways and will be dropped by any Internet
router. The only exceptions to this rule are devices such as “proxy” servers
that perform a network address translation (NAT) to dynamically re-address
packets as they leave the corporate network. If you do not have a NA T device,
you can enable Intelligent Client Routing so that packets sent from the
Aurorean Client computer to an Internet destination are addressed with the
computer’s own IP address (not the non-routable address allocated from the
virtual subnet).
RiverMaster’s NAT server feature provides support for security conscious
administrators who want to conceal the physical IP address of their system
(ANG or another Gateway) without affecting Aurorean service. By
configuring a NAT Server with an alias IP address for the ANG (refer to
page 41 for instructions), the real IP address of the ANG will remain hidden
and any IP address received by the NAT Server will be translated to the real
IP address of the destination for all incoming clients. This ensures that clients
access the correct IP address and build a tunnel connection to the ANG
without revealing physical addresses. The process is reversed for clients on
the corporate LAN seeking to dial up remote destinations.
In Figure 15 below, the IP addresses r eceived at the NAT Server fo r Servers #1,
#2 and the ANG are translated into the real IP addresses of the destination
servers.
Before You Begin
INTERNET
NAT
Server
Server #1Server #2
200.57.115.15200.57.115.23200.57.115.18
Aurorean
Policy
Server
PC
Aurorean Client
NAT Server Received IP Addresses
Server #1: 165.32.46.34
Server #2: 165.32.46.115
ANG: 165.32.46.98
Aurorean
Network
Gateway
PC
RiverMaster Administrator’s Guide33
Figure 15 Aurorean Virtual Network’s NAT Server Feature
Before You Begin
Site-to-Site Tunnels
Chapter 3
Configuring an ANG-3000/7000
NOTE
Aurorean’s NAT Server implementation cannot be employed as a client
NA T wher e, for example, it operates within a cable modem/ISP topology.
Aurorean’s NAT Server implementation is server-centric.
Aurorean site-to-site tunnels optimize service between remote offices and
their remotely linked corporate LANs. This conf iguration is similar to a
remote access Aurorean connection in the sense that both configurations
originate tunnels from an ANG and terminate the tunnel at a remote site. The
site-to-site tunnel configuration differs from the typical ANG model in the
sense that the remote server and tunnel must be configured with several
network values which identify the remote server to the lo cal ANG. Figure 16
displays two site-to-site configurations of Regional Offices A and B connected
to a local ANG and both remote offices connected together, as well as a
remote access connection into Corporate Headquarters.
Aurorean Client
Aurorean Client
Corporate
Headquarters
Firewall
Server #1Server #2
Remote access tunnel
INTERNET
Aurorean
Network
Gateway
Aurorean
Policy
Server
Aurorean
Network
Gateway
Aurorean
Network
Gateway
Regional Office A
PC
Regional Office B
PC
Site-to-Site tunnel
PC
PC
34RiverMaster Administrator’s Guide
Figure 16 Site-to-Site Configuration
Chapter 3
Configuring an ANG-3000/7000
When corporate networks are linked via one or more tunnels, users can
utilize applications over these LA Ns simply by choosing a netwo rk supported program or by using Windows Explorer to find a destination
server. Using Aurorean Client to dial up a remote connection is not required.
Remote Aurorean site-to-site connections are set up by first adding a remote
ANG to an existing ANG configuration, then adding the tunnel itself. This is
done by configuring a user on that server with the following values: an IP
address or Fully Qualified Domain Name (FQDN) for the server , a user name
and password, and a tunnel protocol (either IPSec or PPTP). These are all the
values required to make the connection. We recommend that you enable
Intelligent Client Routing on both Aurorean Virtual Network Network
Gateways so clients accessing the tunnel remotely or locally can access clients
on the far end of the network.
Before You Begin
NOTE
Enable at least on e r outing protocol ( RIP v 1, RIP v 2 or OS PF ) o n t he ANG.
Refer to Chapter 3 for instructions.
Refer to “Adding a Remote Server” on page 68 to configure a site-to-site
tunnel.
AutoLink Recovery
Auto LinkRecovery (ALR) extends the fault isol ati on and recovery
capabilities of the Aurorean Client to include automatic fail-over to a backup
Aurorean Virtual Network system in the event of a service outage or VPN
hardware failure.
To support ALR, a second Aurorean V i rt ual Network sys t em AP S, ANG, and
RiverMaster management application) is required. The secondary Aurorean
V irtual Network system operates in parallel but independently of the primary
Aurorean Virtual Network system. Each system must be located on the same
corporate network, but can be physically situated at different sites, to support
disaster recovery, as shown in Figure 17. For more detailed information, refer
to “Viewing Aurorean Alternate Address Information” on page 42.
RiverMaster Administrator’s Guide35
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Primary
Aurorean
System
Aurorean
Policy
Server
Aurorean
Network Gateway
Primary & Secondary
RiverMaster
INTERNET
Trusted network
Primary RM session
Secondary RM session
External
Authorization
Server
Aurorean Client
Network Gateway
Secondary
Aurorean
System
Aurorean
Aurorean
Policy
Server
Figure 17 Auto Link Recovery Architecture
If the primary Aurorean Virtual Network system fails or is unreachable due to
Internet congestion, corporate ISP outage, or router malfunction, the
secondary Aurorean Virtual Network system provides continued VPN
service to remote users and branch offices.
From the standpoint of network topology, both Aurorean Virtual Network
systems share the same Management domain name although they are
physically discrete. Also, a RiverMaster manag ement application serving
each Aurorean Virtual Network system is accessible at and operates from a
single Windows NT/2000 computer. The Aurorean Virtual Network system
pairs can handle authentication through a shared database if an external
service such as RADIUS or SecurID is used. ALR also supports Enterasys
authentication via the APS database although this requires that user
information be manually replicated in each Aurorean Virtual Network
system. For more detailed information, refer to the AutoLink Recovery
Application Note.
36RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
General Aurorean Network Gateway Settings
General Aurorean Network Gateway Settings
General network settings for the ANG include:
HThe current and possible future IP addresses for the server.
HEnabling Aurorean Virtual Network’s Intelligent Client Routing
feature which provides you with a measure of control over a
Aurorean Client’s access to the Internet.
HAddresses for the Domain Name System (DNS), Windows Internet
Name Service (WINS), and Network Address Translation (NAT)
servers used by remote clients for name resolution.
To set general network settings for th e ANG, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on General to display the general network settings tab pages.
A sample General settings window appears as shown in Figure 18.
The IP Address f ield is re ad-only and di splays an addr ess as signed to
the ANG during installation. If the ANG is equipped with a single
Ethernet interface, this field shows the address of the Trusted port. If
the ANG is equipped with dual Ethernet interfaces, this field shows
the address of the External port.
RiverMaster Administrator’s Guide37
General Aurorean Network Gateway Settings
Chapter 3
Configuring an ANG-3000/7000
The Aurorean Network Gateway IP address is set when
the servers are installed and displayed here as read-only
Click here to allow
remote users to
directly browse the
Internet while they
are tunneled into the
corporate network
Figure 18 General Aurorean Network Gateway Settings
If you plan to change the Aurorean Network Gateway’s IP address in
5
the future, enter the new address in the Future IP Address field;
otherwise, leave this field blank and continue with the next step.
When you build a custom Aurorean Client installatio n kit for your
remote users (as described in Chapter 6), the ANG’s IP address is
saved as part of the kit. Aurorean Client needs this address to locate
the ANG across the Internet and create a tunnel. If you enter an IP
address in the Future IP Address field, the kit will contain both IP
addresses that appear on this pullout. If Aurorean Client cannot
locate a ANG by first using the standard IP address, it will
automatically use the future IP address. If connecting to thi s ad d ress
is unsuccessful, a user can enter an IP address in the Alternate Tunnel
Server IP address field in Aurorean Client. Refer to the Aurorean Client User’s Guide for more information.
38RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
6
To allow remote users to browse the Internet directly while they are
tunneled into the corporate network, place a check next to Enable
Intelligent Client Routing on the General page.
For more information on Auro rean Virtual Network’s Intelligent
Client Routing feature, refer to “Intelligent Client Routing” on
page 31.
NOTE
The Reset button returns any altered values to their earlier setting.
7
Click the DNS tab.
The DNS server addresses tab page appears as shown in Figure 19.
General Aurorean Network Gateway Settings
Figure 19 DNS Server Addresses
Click here to
open the
Configuration
pullout
RiverMaster Administrator’s Guide39
General Aurorean Network Gateway Settings
8
In the Primary DNS and Secondary DNS fields, enter the IP
addresses of DNS servers on your network.
You must identify a primary DNS server; the secondary DNS server
is optional. The primary and secondar y labels indicate the search
order (primary first and then secondary). Select DNS servers that can
resolve the names of network devices that remote clients must access.
CAUTION
Not specifying a value for both primary and secondary DNS and WINS
servers may cause connection problems on networks with Windows NT
clients. To avoid this possibility, enter the IP address used on your
primary DNS server in all DNS/WINS fields even if you do not have a
secondary DNS or primary or secon d ary WINS server installed on your
network.
Chapter 3
Configuring an ANG-3000/7000
9
Click the WINS tab.
The tab page for Windows Internet Name Service (WINS) server
addresses appears as shown in Figure 19.
Click here to
open the
Configuration
pullout
40RiverMaster Administrator’s Guide
Figure 20 WINS Server Addresses
Chapter 3
Configuring an ANG-3000/7000
10
In the Primary WINS and Secondary WINS fields, enter the IP
addresses of WINS servers on your network.
If your r emote clients us e standard Microsoft Dial-Up Networking
(DUN) on the corporate network, you must complete these fields to
enable browsing and communication with other devices in the
Network Neighborhood.
11
Click the NAT tab.
The tab page for the Network Address Translation (NAT) server
address appears as shown in Figure 21.
General Aurorean Network Gateway Settings
Click here to
open the
Configuration
pullout
Figure 21 NAT Server Address
12
In the NAT field, enter the IP Address of the NAT server on your
network.
The IP address you enter here is the address that Aurorean users will
receive in the installation kit as their destination address - the alias
external IP address of the ANG.
RiverMaster Administrator’s Guide41
Viewing Aurorean Alternate Address Information
NOTE
You must configure an IP address on your NAT Server that correlates
with the alias IP address you set here.
13
Click Apply to save your changes.
To return the parameters to their original settings without saving
your changes, click Reset.
14
Do one of the following:
–If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional
ANG network settings.
–If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional
work is required.
Chapter 3
Configuring an ANG-3000/7000
Viewing Aurorean Alternate Address Information
The Aurorean Alternate Address Info window displays IP addresses of the
alternate APS and ANG systems, as well as those of the primary system.
To invoke the display, perform the following steps:
1
Open the Configuration pullout.
2
Click the arrow on the Configure toolbar item at the top left edge of
the pullout.
3
Choose Alt IP Addresses as shown in Figure 22.
The Aurorean Alternate Address Info window appears as shown in
Figure 22.
4
View the ANG and APS Primary and Secondary (if previously
configured) IP addresses.
NOTE
Primary addresses cannot be modified in this window.
42RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
T unnel Protocols
Click here to
open the Alt
Addresses
window
Click here to select the Alt Address option
Click here to
open the
Configuration
pullout
Figure 22 Aurorean Alternate Address Info Window
If you want to change either the ANG or APS Alternate IP address,
5
click Modify, enter a value and click Update.
Tunnel Protocols
The ANG supports two tunnel protocols:
HPoint-to-Point Tunneling Protocol (PPTP) developed by Microsoft,
3Com and others that uses Point-to-Point (PPP) protocol and Generic
Routing Encapsulation (GRE ) to route packets through the Internet.
HIP Security (IPSec) protocol developed by the Internet Engineering
Task Force (IETF) that adds security extensions for encryption and
message authentication to IP protocol.
For each tunnel protocol, you can configure authentication, encryption, and
compression parameters. To set tunnel protocol parameters, perform the
following steps:
RiverMaster Administrator’s Guide43
Tunnel Protocols
Configuring an ANG-3000/7000
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Tunnel Protocols to display PPTP and IPSec protocol tab
pages.
The Tunnel Protocols window appears as shown in Figure 23.
Chapter 3
Click here to
access the
Gateway
configuration
windows
Click here to
open the
Configuration
pullout
Figure 23 Tunnel Protocol General Settings
If you want to prevent remote clients from using one of the tunnel
5
protocols, select the protocol and click Remove.
By default, PPTP and IPSec are both enabled for client use. You
normally control protocol usage on a per group basis by selecting the
protocol when you assign group policies (refer to Chapter 6 for
instructions). If you want to globally disable a protocol, you can
remove it from this list. If you have removed a protocol and want to
reinstall it, click Add once and when the high lighted tunnel protocol
pops up, click Add again. You are not required to click Apply.
44RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
6
Click the Authentication tab.
Figure 24 shows the authentication parameters available for each
tunnel protocol.
7
Do one of the following:
–Choose IPSec from the Protocol pull down menu.
–For PPTP, no additional work is required. Unlike IPSec, PPTP
T unnel Protocols
- Use the information in Table 2 to select the IPSec Signature
Algorithm that determines how IPSec packets exchanged
between the ANG and Aurorean users are signed and
verified.
- Set the Key Lifetimes Time Period and Data Transferred
value. The default values are 60 minutes for T ime Period and
Disabled for Data Transferred. Refer to Table 2 to select the
Ti me Per iod and Dat a Transferr ed va lues whi ch set ho w long
the key lifetime should last in terms of time ela psed or
kilobytes amassed .
- Click Apply.
does not authenticate individual packets; instead, PPTP relies on
user authentication using MS-CHAP. After the remote user is
authenticated, all PPTP packets are allowed access.
IPSec
Figure 24 Tunnel Protocol Authentication Settings
PPTP
RiverMaster Administrator’s Guide45
Tunnel Protocols
Chapter 3
Configuring an ANG-3000/7000
Table 2 IPSec Authentication Parameters
ParameterExplanation
NoneDisables the Signature Algorithm for IPSec packets; individual
packets are no longer signed and verified during transmission.
HMAC-SHAEnables hashing messageauthenticationcodes (HMAC) that are
generated using the SHA cryptographic hashing function. HMACSHA is generally regarded as stronger, more secure
cryptographic function than HMAC-MD5.
HMAC-MD5Enables hashing message authentication codes (HMAC) that are
generated using the Rivest MD5 message digest algorithm
hashing function. While not as strong cryptographically as
HMAC-SHA, HMAC-MD5 provides better performance.
Time PeriodInterval after which a new key is generated.
Data
Transferred
8
Click the Encryption tab.
9
Do one of the following:
Lifetime volume (in kilobytes) of the key after which a new key is
generated.
–To set IPSec encryption parameters, choose IPSec from the
Protocol menu. IPSec encryption parameters are shown in
Figure 25. Select the IPSec Encryption Algorithm that determines
how IPSec packets exchanged between the ANG and Aurorean
Client remote users are encrypted.
–To set PPTP encryption parameters, choose PPTP from the
Protocol menu. PPTP encryption parameters are shown in
Figure 25. Select the Microsoft Point-to-Point Encryption (MPPE)
algorithm that determines how PPTP packets exchanged between
the ANG and Aurorean remote users are encrypted.
46RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
T unnel Protocols
ARCFOUR is a public
domain algorithm
designed to work
with RC4
DES is a government
standard block cipher
that uses a 56-bit key.
Triple-DES uses three
keys to achieve the
equivalent of 112-bit
encryption.
IPSec
PPTP
Figure 25 Tunnel Protocol Encryption Settings
RiverMaster Administrator’s Guide47
Tunnel Protocols
Chapter 3
Configuring an ANG-3000/7000
Table 3 Encryption Parameters
Tunnel
Protocol
IPSecNoneDisables encryption on the tunnel; because this results
ParameterExplanation
in a less secure connection, this setting is not
recommended.
ARCFOUR 40 bitEnables a 40-bit key public domain algorithm that is
designed to work with Rivest Cipher 4 (RC4), a
stream-based cipher method that supports both 40-bit
and 128-bit keys. Using RC4, data packets can be
encrypted as they are received instead of in blocks.
ARCFOUR 128 bitEnables a 128-bit key version of ARCFOUR (described
above).
DESEnables Data Encryption Standard (DES), a block
cipher method that uses56-bit keys. Using DES, data is
encrypted in fixed-size blocks and packets are padded
to become a multiple of the block size.
Triple-DESEnables a version of DES (described above) that
employs a DES encryption with one key, a decryption
with a second key, and then another encryption with a
third key. The result is equivalent to DES with a 112-bit
key.
PPTPMPPE (40 bit)Enables 40-bit key Microsoft Point-to-Point Encryption
MPPE (128 bit)Enables 128-bit key MPPE on the tunnel. To support
10
Click the Compression tab.
48RiverMaster Administrator’s Guide
(MPPE) which generates a key based on a hash of the
user’s password and invokes RC4 encryption.This type
of encryption is supported by
Windows 95/98/NT/2000/ME computers without any
additional software.
128-bit keys, the Aurorean computer must receive a
128-bit encryption upgrade available from Microsoft.
This upgrade may not be available to users outside the
U.S.
Chapter 3
Configuring an ANG-3000/7000
11
Enable or disable MPPC as required.
For both IPSec and PPTP protocols, Microsoft Point-to-Point
Compression (MPPC) is currently the only compression technique
supported by the ANG. By default MPPC compression is enabled for
both protocols.
NOTE
Compression settings are applied automatically to both tunnel protocols.
That is, disabling compressi on on IPSec also disables comp ression on
PPTP.
T unnel Protocols
Click Apply to save your changes.
12
To return the parameters to their original settings without saving
your changes, click Reset.
RiverMaster Administrator’s Guide49
Figure 26 Tunnel Protocol Compression Settings
Virtual Subnetting
13
Do one of the following:
–If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional
ANG network settings.
–If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional
work is required.
Virtual Subnetting
Virtua l subnets fall into two categories:
HIP subnets that serve as IP address pools for allocation to remote
clients when they connect.
HAn IPX network number that is shared by all remote clients when
they connect and use IPX protocol to access Novell NetWare servers.
Chapter 3
Configuring an ANG-3000/7000
IP Subnetting
To set up virtual subnets of IP addresses to allocate to remote users, perform
the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Subnetting to display IP and IPX subnet tab pages.
5
Click the IP Subnets tab if it is not already displayed.
A sample IP subnet window is sho wn in Figure 27.
50RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
Click here to
access the
Gateway
configuration
windows
Virtual Subnetting
Click here to
open the
Configuration
pullout
Figure 27 IP Subnet Configuration for Remote Clients
NOTE
Click Remove to delete any configured virtual subnets.
6
Click Add.
The Add An IP Virtual Subnet window appears as seen in Figure 28.
RiverMaster Administrator’s Guide51
Figure 28 Adding An IP Virtual Subnet
Virtual Subnetting
Configuring an ANG-3000/7000
7
Enter the starting address of the subnet in the Address fields.
You can use actual IP addresses from your network or non-routable
IP address ranges (such as 192.168.x.x for a Class C network).
8
Enter a subnet mask to define the subnet range in the Mask field.
9
Do one of the following:
–Click Add to add the new virtual subnet.
–Click Cancel to close the window without saving your changes.
10
Repeat Step 6 through Step 9 for each virtual subnet you require.
11
Click Apply to save your changes.
To return the parameters to their original settings without saving
your changes, click Reset.
Chapter 3
12
Do one of the following:
–If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional
ANG network settings.
–If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional
work is required.
IPX Virtual Networks
To set up a single IPX network number to allocate to remote users, perform
the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Subnetting to display IP and IPX subnet tab pages.
5
Click the IP Virtual Networks tab if it is not already displayed.
A sample IPX virtual networks window is shown in Figure 29.
52RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
Click here to
access the
Gateway
configuration
windows
Virtual Subnetting
Click here to
open the
Configuration
pullout
Figure 29 IPX Subnet Confi guration for Remote Clients
In the IPX Virtual Network Number field, enter an IPX network
6
number to be used by all remote clients. This number must be unique.
The network number must be between 1 and 8 hexadecimal digits (1
to FFFFFFFD). This network number will be attached to all IPX
frames received from remote clients.
NOTE
Zero (0) and FFFFFFFF addresses are invalid due to NetW are restrictions.
FFFFFFFE is reserved for the default route.
7
Click Apply to save your changes.
To return the parameters to their original settings without saving
your changes, click Reset.
RiverMaster Administrator’s Guide53
Routing
Routing
Chapter 3
Configuring an ANG-3000/7000
8
Do one of the following:
–If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional
ANG network settings.
–If no additional ANG network conf iguration is required and you
want to put the new network settings into effect, reset the ANG.
Configuring the routing behavior of the ANG con sists of two general steps:
HSetting parameters for the two routing protocols supported, RIP and
OSPF.
HSelecting routing protocols for each ANG Ethernet interface.
Click here to
access the
Gateway
configuration
windows
To access RIP and OSPF parameters for the ANG, perform the following
steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Routing to display the routing parameter tab pages.
5
Click on the Protocols tab to display protocol parameters for RIP and
OSPF.
Routing
6
Do one of the following:
–To set RIP paramete rs, choose RIP from the Ro uting Protocols
menu and click Properties; refer to the next section “Setting RIP
Properties” for additional instructions.
–T o set OSPF parameters, choose OSPF from the Routing Protocols
menu and click Properties; refer to “Setting OSPF Properties” on
page 57 for additional instr u ctions.
Setting RIP Properties
To configure RIP properties for the ANG, perform the following steps:
1
Perform the steps in the previous section to access RIP properties.
The RIP Configuration window should appear as shown in Figure 31.
RiverMaster Administrator’s Guide55
Routing
Chapter 3
Configuring an ANG-3000/7000
If this list is blank, the
Aurorean Network Gateway
accepts RIP updates from all
routers on the subnet. You
can limit the amount of
updates that the Aurorean
Network Gateway will accept
by specifying individual routers
in this list.
Figure 31 RIP Routing Protocol Configuration
2
To turn on RIP for IPX packets, click Enable under IPX RIP Enable;
otherwise, continue with the next step.
3
Do one of the following:
–To allow the ANG to accept RIP updates from all routers on the
same subnet, no further work is required. Skip to Step 6.
–To configure “trusted” individual routers to supply RIP updates
to the ANG, click Add and continue with the next step.
The Add A Trusted Gateway window appears as shown in Figure 32.
Figure 32 Adding A Trusted Gateway for RIP
4
In the Address field, type the address for the router that the ANG will
accept updates from and click Add.
You can later modify this address or delete it using the Modify and
Remove butt ons.
56RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
5
Repeat Step 3 and Step 4 for each gateway required.
6
Do one of the following:
–Click Apply to save your changes.
–Click Cancel to close the window without saving your changes.
–Click Reset to return the RIP parameters to their default settings.
SettingOSPFProperties
Using the RiverMaster, you can define the following OSPF parameters:
HArea ID shared by the routers and the ANG.
HRouter ID that identifies the ANG to other devices in the OSPF area.
The default value for this address is the IP address assigned to the
Trusted interface on the ANG.
HAuthentication algorithm used to accept or reject routing table
updates from other routers.
Routing
To route packets for remote clients using OSPF, the ANG also uses a set of
fixed operating parameters. Table 4 lists these fixed OSPF parameters, which
use common default values and cannot be changed.
Table 4 Fixed OSPF Parameters
ParameterMeaningFixed Value
PreferenceDetermines how OSPF routes compete with
routes from other protocols (such as RIP) in
the ANG’s routing table. The route with the
lowest preference value is selected.
CostUsed when exporting a non-OSPF route from
the ANG’s routing table into OSPF as an
autonomous s ystem (AS).
TypeIndicates which type of autonomous systems
that routes exported from the ANG’s routing
table become.
150
1
Type 1 AS
AS Export
Interval
RiverMaster Administrator’s Guide57
Specifies how often autonomous system link
advertisements are generated and exported.
Once per second
Routing
Chapter 3
Configuring an ANG-3000/7000
Table 4 Fixed OSPF Parameters
ParameterMeaningFixed Value
AS Export
Limit
Interface
Priority
Specifies howmany autonomous systemsare
generated and exported each time.
Determines the ANG’s priority for becoming
the designated router in the area.
100
0(the ANG cannot
be the designated
router)
To configure OSPF properties for the ANG, perform the following steps.
1
Perform the steps in “Setting Routing Protocol Parameters” on
page 55 to access OSPF properties.
The OSPF Configuration window appears as shown in Figure 33.
T ype the area ID shared by the ANG and routers within the subnet in
2
theOSPFAreaIDfields.
3
T ype the IP address for the Trusted interface in the OSPF Router ID
fields.
58RiverMaster Administrator’s Guide
Figure 33 OSPF Routing Protocol Configuration
Chapter 3
Configuring an ANG-3000/7000
4
From the OSPF Authentication Algorithm menu, choose the
authentication algorithm used by routers on your network.
If the routers on your network do not require passwords to accept
OSPF updates, set the algorithm to None and continue with the next
step.
5
Do one of the following:
–Click Apply to save your changes.
–Click Cancel to close the window without saving your changes.
–Click Reset to the return the OSPF properties to their default
Routing Interfaces
The ANG is equipped with two Ethernet interfaces:
HThe Trusted interface should be connected to a protected network
segment (one behind a firewall or router that offers protection against
unauthorized access). Typically, you should enable a routing protocol
(RIP, OSPF, or both) on the Trusted interface so that the ANG can
advertise to other devices that its virtual subnets are reachable to the
corporate network.
Routing
settings.
HThe External interface can be connected to a network segment that
resides outside a firewall and offers unfiltered access to the Internet.
You must create a static route between the External interface and the
router that serves as the gateway to the Internet. You cannot enable
RIP or OSPF on this interface.
RiverMaster Administrator’s Guide59
Routing
Chapter 3
Configuring an ANG-3000/7000
Click here to
open the
Configuration
pullout
Click here to
access the
Gateway
configuration
windows
Figure 34 Aurorean Network Gateway Routing Interfac e Configuration
Adding or Removing a Routing Protocol for an Interface
To add or remove a routing protocol from an interface, perform the following
steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Routing to display the routing parameter tab pages.
5
Click on the Interfaces tab to display the configuration for each ANG
network interface.
60RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
6
Select the interface (Trusted or External) from the list under Network
Interfaces.
The protocols already enabled for this interface appear in the Routing
Protocols list.
7
Do one of the following:
–To add a protocol to the trusted interface, click Add and continue
–To remove a protocol, select the protocol from the Routing
8
When the Add an Interface Routing Protocol window appears as
shown in Figure 35, select a routing protocol and click Add.
Routing
with the next step.
Protocols list and click Remove. Skip to Step 10.
Figure 35 Adding a Routing Protocol
NOTE
For the External interface, you can only add or remove static routing.
Because the External interface is optimized for tunnel protocols only, you
cannot use RIP or OSPF on this interface.
9
Do one of the following:
–If you are adding RIP to the interface, perform the steps in
“Configuring RIP for the Interface ” on page 62.
–If you are adding OSPF to the interface, perform the steps in
“Configuring OSPF on an Interface ” on page 64.
–If you are adding a static route to the interface, perform the steps
in “Creating Static Routes” on page 65.
10
Do one of the following:
–Click Apply to save the routing protocol configuration changes.
–Click Reset to the return the interface’s protocol configuration to
its original setting.
RiverMaster Administrator’s Guide61
Routing
Configuring an ANG-3000/7000
Configuring RIP for the Interface
To configure RIP on an interface, perform the following steps:
1
Add RIP as described in the previous section or select RIP from the
Routing Protocols list and click Properties.
The RIP Interface Configuration window appears as shown in
Figure 36.
These values are
used to authenticate
RIP updates from
routers on the network
Chapter 3
Figure 36 Routing Interfaces Configuration - RIP
Choose the version of RIP to use on this interface.
2
RIP Version 1 uses IP broadcast packets for periodic announcements
of reachable subnets. RIP Version 2 is an enhanced version of RIP that
uses IP multicast packets for announcements.
3
In the RIP Authentication fields, choose the algorithm used by routers
on your network.
If the routers on your network do not require passwords to accept
RIP updates, set the algorithm to None and skip to Step 7.
62RiverMaster Administrator’s Guide
Chapter 3
Configuring an ANG-3000/7000
NOTE
RIP update authentication is only supported by RIP Version 2. If the
routers on your network only support RIP Version 1, you cannot enter
values in the RIP Authentication fields. Refer to “Configuring RIP for the
Interface” on page 62 for instructions on selecting the version of RIP used
on your network.
4
T ype the RIP authentication password used by routers on your
network in the Password field.
RIP authentication passwords are used by routers to determine if
they should accept updated routing information sent f rom another
router. If your routers do not authenticate updates, leave this field
blank and skip to Step 2.
Routing
5
T ype the same password in the Re-Type Password field exactly as
you entered it in Step 4.
6
Set the RIP Route Importing/Exporting options as follows:
–To allow the ANG interface to learn new routes, place a check
next to Enable Import. If you enabled the Intelligent Client
Routing feature, you should turn on Enable Import to allow the
ANG to pass known reachable addresses to the remote client.
–To cause the ANG to advertise its known routes, place a check
next to Enable Export. This setting is required to allow the ANG
to advertise the reachability of virtual subnets to other devices on
the network.
7
Do one of the following:
–Click Apply to save the RIP configuration changes.
–Click Cancel to close the window without saving your changes.
–Click Reset to the return the interface’s protocol configuration to
its original setting.
RiverMaster Administrator’s Guide63
Routing
Configuring an ANG-3000/7000
ConfiguringOSPFonanInterface
To enable OSPF on an interface, perform the following steps:
1
Add OSPF as described in “Adding or Removing a Routing Protocol
for an Interface” on page 60 or select OSPF from the Routing
Protocols list and click Properties.
The OSPF Interface Configuration window appears as shown in
Figure 37.
Chapter 3
Figure 37 Routing Interfaces Configuration - OSPF
2
T ype the OSPF password used by routers on your network in the
Authentication Password field.
OSPF authentication passwords are used by routers to determine if
they should accept updated routing information sent f rom another
router. If your routers do not authenticate updates, leave this field
blank.
NOTE
Passwords are limited to 8 characters or less
3Type the same password in the Re-Type Authentication Password
field exactly as you entered it in Step 2.
64RiverMaster Administrator’s Guide
Chapter 3Routing
Configuring an ANG-3000/7000
4Do one of the following:
–Click Apply to save the OSPF parameter changes.
–Click Cancel to close the window without saving your changes.
–Click Reset to the return the interface’s protocol properties to
their default settings.
Creating Static Routes
To configure a static route between an ANG interface and another device,
perform the following steps:
1Open the Configuration pullout.
2In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3Expand the tree list under the name of your ANG.
4Click on Routing to display the routing parameter tab pages.
5Click on the Interface tab to display the routing protocol(s) selected
for each interface.
6From the Interfaces menu, choose the ANG Ethernet interface to
configure (External or T rusted).
7In the Routing Protocol Selection list, double click Static Routes and
click Add in the Static Route Configuration window.
The Static parameter tab page is displayed as shown in Figure 38.
RiverMaster Administrator’s Guide
65
RoutingChapter 3
Configuring an ANG-3000/7000
Figure 38 Static Routing Configuration
8In the Gateway address fields, type the IP address of a gateway on
this subnet.
For External interfaces, enter the IP address of the router that
provides access to the Internet.
9In the Reachable Subnet fields, type a starting IP address and subnet
mask to define a subnet.
Packets received by the ANG are statically routed to the gateway you
specified. To forward all packets to the gateway when there is no
other reachable “next hop” address for a packet, enter an address of
0.0.0.0 and a subnet mask of 0.0.0.0.
CAUTION
Configuring a default static route (0.0.0.0/0.0.0.0) on the Trusted inte rface
of the ANG disables Intelligent Client Routing. Refer to “Intelligent
Client Routing” on page 31 for more information.
66
RiverMaster Administrator’s Guide
Chapter 3Routing
Configuring an ANG-3000/7000
10 Click Add.
The static route you configured appears in the Internal Static Routes
display.
11 Do one of the following:
–Click Apply to create the static route.
–Click Reset to the return the interface’s protocol properties to
their default settings.
–Click Cancel to close the window without saving your changes.
RiverMaster Administrator’s Guide
67
Adding a Remote ServerChapter 3
Configuring an ANG-3000/7000
Adding a Remote Server
An ANG can be added at a remote location in a Site-to-Site configuration.
This sect ion desc ribes ho w to set up an initiating Network Gateway to connect
to a Local or terminating ANG/APS pair.
NOTE
Local ANGs use an accompanying APS; remote ANGs are stand-alone.
These instructions cannot be used to configure a stand-alone ANG connection
to another stand-alone ANG (refer to Appendix B for more information).
To add a Remote Network Gateway, perform the followin g steps.
1Open the Configuration pullout.
Click here to
expand the
tree list
Click here to
add the Remote
Gateway or Tunnel
Click here to
select the
created server
or tunnel
2In the list of Aurorean devices, expand the tree list under gateways
(click the + symbol).
3Expand the tree list under Remote Servers.
The Tunnel Protocols window appears as shown in Figure 39.
Click here to
open the
Configuration
pullout
Click here to
access the
Network Gateway
configuration
68
Click here to display the configured properties of the selected device
Click
C
Click
Figure 39 Remote Server Display
C
RiverMaster Administrator’s Guide
Chapter 3Adding a Remote Server
Configuring an ANG-3000/7000
4Click Add Remote Server.
The Add Remote Server window appears a s shown in Figure 40.
Type the name of the Remote Server here
Click here to add
the server
Click either the
IP Address or
FQDN button and
enter a value in the
adjacent field
5Choose a name for the server in the Remote Server Name window.
6Click either IP Address or FQDN (FullyQualified Domain Name). If
you choose IP Address, enter an IP address in the fields provided. If
you choose FQDN, enter a value in the single field.
The FQDN is the name of the Remote Server as well as its domain.
For example: server1.argus.com
7Type a User Name and User Password and confirm the password in
the fields provided.
This User Name and Password must later be registered in the
authentication database of the Remote (terminating) ANG by adding
the user to a group (Refer to Chapter 6 for more information).
RiverMaster Administrator’s Guide
Figure 40 Add Remote Server Window
69
Adding a Remote ServerChapter 3
Configuring an ANG-3000/7000
8Choose the tunneling protocol: IPSec or PPTP.
9Click Add.
This action adds the remote ANG to the configuration on your Local
ANG. A message will displa y stating you have successfully added
the remote serv er.
10 Click Add Remote Tunnel orselect the Remote Server just added and
click Add Tunnel.
The Add Remote Tunnel window appears as shown in Figure 41.
Type the name of the Remote Tunnel here
Click here to add
the tunnel
Choose the Remote
Gateway name from
this pull-down list
Figure 41 Add Remote Tunnel Window
11 Choose a name for the Remote T unnel in the provided field.
70
RiverMaster Administrator’s Guide
Chapter 3Adding a Remote Server
Configuring an ANG-3000/7000
12 Click the arrow in the Remote Server Name field to bring up a pull-
down list and select the Remote Server you just added.
RiverMaster types the Server user name and password into the open
fields. You may change these settings if necessary.
13 Select Enabled or Disabled in the Enabled State field.
If you select Enabled, the tunnel will be created immediately. Select
Disabled if you want to delay enabling the tunnel until configuration
is complete at the other end of the tunnel.
14 Click Add.
If the Enabled state was selected earlier, the tunnel becomes
operational in a few moments.
NOTE
You can configure additional tunnels to the Remote Server just added by
selecting the particular server in the Remote Tunnels displa y, clicking
Properties, and clicking Add Tunnel in the Remote Server Properties
window.
Changing Server and Tunnel Properties
The information configured for Site-to-Site servers and tunnels can be
changed by clicking the Properties buttons on either display.
To change properties for the Remote Server, perform the following steps:
1Select your Remote Server from the tree list under Remote Servers
and click Properties in the display.
2When the Remote Server Properties window appears, change any
information and do one of the following:
–Click Modify to reconfigure the Remote Server.
–Click Cancel to close the window without saving your changes.
–Click Delete to remove the Remote Server configuration.
RiverMaster Administrator’s Guide
71
Adding a Remote ServerChapter 3
Configuring an ANG-3000/7000
To change properties for the Remote Tunnel, perform the following steps:
1Select your Remote Tunnel from the tree list under Remote Servers
and click Properties in the display.
The Remote Tun nel Properties window appears as shown in
Figure 42.
Click here to
update the
tunnel
Click here to refresh
the values for the
Current state and
Last try result
attributes shown in
the Tunnel Protocols
window
2Change any information. If the Remote Tunnel is enabled, select
Disabled in the Enabled State field and do one of the following:
–Click Update to reconfigure the Remote Tunnel.
–Click Cancel to close the window without saving your changes.
–Click Delete to remove the Remote Tunnel configuration.
If you clicked Update, a window pops up asking if you want to save
the modified tunnel. Click Yes or No.
72
Figure 42 Remote Tunnel Properties Window
RiverMaster Administrator’s Guide
Chapter 3Adding a Remote Server
Configuring an ANG-3000/7000
3Re-open the Remote T unnelProperties window and select Enabled in
the Enabled State field if you want to create the tunnel immediately
with the reconfigured properties.
If you clicked Update, a window pops up again asking if you want to
save the modified tunnel. Click Yes or No.
NOTE
Clicking Refresh displays the status for the Current State and Last
Connection Result attributes of the tunnel.
RiverMaster Administrator’s Guide
73
Setting Up Aurorean Services
Setting Up Aurorean Services
Setting Up Aurorean ServicesSetting Up Aurorean Services
This chapter describes how to perform the following tasks:
HAdd an Authorization service plug-in to allow Aurorean Virtual
Network systems to authenticate remote users against a local
database on the Aurorean Policy Server, an external Remote
Authentication Dial In User Service (RADIUS) server, or an RSA
ACE/Server.
HGenerate private/public encryption/decryption keys for use with the
IPSec protocol.
HPrepare the Notification server on the APS to send E-mail when
alarm, alert, or notification messages are generated.
4
HAdjust trace levels for Management and Tunnel server services to
generate a cont rolled stream of messages.
HBackup the Management Database to avoid operational down time.
Before You Begin
Before performing the steps in this chapter, you should familiarize yourself
with the following Aurorean Virtual Network concepts:
HAuthorization plug-in options
HPrivate/public keys for IPSec authentication
HProblem notification via E-mail
HTrace levels
RiverMaster Administrator’s Guide
75
Before You BeginChapter 4
Setting Up Aurorean Services
Authorization Plug- in Options
Within a Aurorean Virtual Network, the APS coordinates remote user
authentication. Using an internal software service known as Auth entication
and a series of “plug-ins”, the APS can authenticate remote users in three
ways:
HUsing the Enterasys Authentication plug-in, remote users are
authenticated against a database residing on the APS’s hard drive.
HUsing the RADIUS plug-in, the APS acts as a RADIUS client,
forwarding authentication requests from Aurorean users to a
RADIUS server.
HUsing the RSA Security SecurID plug-in, the APS acts a s a native
ACE/Client, forwarding authentication requests from Aurorean
users directly to an ACE/Server. This plug-in supports the fail-over
function of automatically con necting to a slave ACE/Server if the
master fails.
RADIUS Authentication Servers
Aurorean Virtual Network systems support a wide range of RADIUS servers,
including:
HMicrosoft RADIUS
HFunk Software’s Steel-Belted RADIUS
HRSA Security ACE/Server that supports RADIUS extensions. This
allows remote users to not only authenticate against a centralized
authentication database, but also to take advantage of the strong
security offered by SecurID passcodes.
HNovell’s BorderManager™ Authentication Servi c es (BMAS) running
on a RADIUS server. BMAS is an interface that links dial-in users to
the network through Novell Directory Services (NDS™). Support for
BorderManager is seamless and it requires no configuration on the
APS. Refer to BorderManager Enterprise Edition documentation for
more information.
76
RiverMaster Administrator’s Guide
Chapter 4Before You Begin
Setting Up Aurorean Services
NOTE
Enterasys Networks continually tests interoperability with other RADIUS
server vendors. Contact Enterasys Networks Customer Support for an
up-to-date list of approved RADIUS serv ers.
Plug-in Planning
You can add multiple plug-ins for RA DIUS or SecurID authentication.
Typically, you add one plug-in for each RADIUS or SecurID authentication
server on your network and preserve the Enterasys Authentication plug-in
for RiverMaster logins. One plug-in must be designated as the default
plug-in. When you set up your Aurorean Virtual Network for the first time,
the default plug-in is Enterasys Authentication.
When Aurorean users attempt to tunnel into the corporate network, they
must present a VPN user name and password for authentication. If the
Aurorean Client user presents a simple user name such as BSmith, the user is
authenticated against the default plug-in. Aurorean users have the ability to
override the default and select another plug-i n by ad ding an “@” symb ol and
the identifier for the plug-in. For example, if you add a RADIUS plug-in with
the identifier RADIUS1, a Aurorean Client user can select this plug-in by
entering a VPN user name such as BSmith@RADIUS1.
Threads
You can accelerate the authentication of multiple users logging in at the same
time by increasing the number of threads (logins in progress) the
authenticating server will handle. This function is useful if you discover that
users are exceeding the timeout value allowed for authentication and are not
being connected because too many clients are dialing in simultaneously.
For instructions on customizing the Enterasys Authentication plug-in and
adding RADIUS and SecurI D plug-ins, refer to “Adding an Authorizat ion
Plug-In” on page 80.
RiverMaster Administrator’s Guide
77
Before You BeginChapter 4
Setting Up Aurorean Services
Private/Public Keys for IPSec Authentication
Aurorean users who tunnel into your network using the IPSec protocol also
require an El Gamal public key for authentication. The key is an embedded
piece of data used to encrypt and decrypt packets exchanged between
Aurorean Client and the Aurorean Network Gateway. A pair of keys , one
private and one public, are generated and saved on the APS.
The public key is included in the Aurorean Client installation kit you build
and distribute for your remote users (as described in Chapter 6). The
exchange of keys is handled entirely by the Aurorean Client application; the
user does not need to know or type the public key.
However , if the private key on the APS becomes compromised, you may need
to regenerate the private/public key pair and distribute files with the new
public key to your remote users. Without the current public key, IPSec users
will be unable to tunnel into the netwo r k. For in structions on generating a
new private/public key pair, refer to “Generating Private/Public Keys” on
page 91.
Problem Notification
The Notification service that runs on both the Management and Tunnel
servers generate messages when the server experiences operational difficulty.
The events that trigger these messages fall into three categories:
HAlarms notify you when a significant error occurs with a service
running on a Aurorean Virtual Netw ork system or a general system
problem that is preventing the server from operating normally.
HAlerts occur when an error count threshold has been crossed and an
alarm condition is imminent.
HA Problem Notification typically indicates a remote client connection
problem which Aurorean Client’s Prescriber feature diagnosed.
These messages appear in the View System Activity pullout and advanced
message viewer (as described in Chapter 7) and can also be retrieved from
system reports (as described in Chapter 8). For immediate notification wh en
one of these events occurs, the APS can send E-mail to one or more persons
78
RiverMaster Administrator’s Guide
Chapter 4Before You Begin
Setting Up Aurorean Services
that you select. You must first define a mailing list and then add E-mail
addresses for each recipient to this list. You can select which types of
messages (alarms, alerts, or problem notifications) will be sent to each
address.
For instructions on creating mailing lists for problem notificatio n, refer to
“Using the Notification Service to Send E-Mail” on page 93.
Trace Levels
The number of messages the Management and Tunnel servers report to
RiverMaster can be set on a per se rvice basis. Because so many messages are
routinely shared via control traffic between the servers and clients, if a limit
were not set on their collection and display they could disrupt Aurorean
Virtual Network service. But, having the option to occasionally read these
messages can h elp tr oub les hoot se rvic e pr oble ms. R efer to Chap ter 7 for more
detailed information on the types of messages displayed.
RiverMaster permits you to set low, medium or high trace levels for the ten
available Enterasys services. These levels correspond to varying numbers of
messages reported to RiverMaster, dependin g on the service you configure.
RiverMaster Administrator’s Guide
79
Adding an Authorization Plug-InChapter 4
Setting Up Aurorean Services
For example, a low trace level set for the Tunnel Mana gement Service will
produce messages similar to those in Figure 43.
Note Tunnel Trace
messages sent by
the tunnel server
Highlighted message
here is detailed in
description area
below
See message text
here
Click here
for View
System
Activity
pullout
Figure 43 Trace Messages Display
If you read the text for each Tunnel Trace message above, you can follow the
chain of protocol messages which signify the communications that occur on a
packet level when a client successfully makes a connection. Then, if a client
connection subsequently fails, you could compare messages and troubleshoot
the problem. For instructions on setting trace levels, refer to “Setting Trace
Levels” on page 97.
Adding an Authorization Plug-In
The Enterasys Authentication plug- in is factory-installed by Enterasys
Networks and made the default plug-in. This plug-in is used when you log
into the RiverMaster application to ensure that you have administration
privileges. To support SecurID and RADIUS authentication, you must add
one or more SecurID or RADIUS plug-ins.
80
RiverMaster Administrator’s Guide
Chapter 4Adding an Authorization Plug-In
Setting Up Aurorean Services
NOTE
Do not remove the Enterasys Authentication plug-in or convert it into
a RADIUS or SecurID plug-in. Without a plug-in of this type, you will
not be able to log into RiverMaster.
Enterasys Authentication
To modify the Enterasys Authentication plug-in, perform the following steps:
1Open the Configuration pullout.
2In the list of Aurorean devices, expand the tree list (by clicking the +
symbol) under the name of your APS, and expand it again under Auth
Service.
Click here to add
a new Authorization
Plug-in or
here to expand the
tree list and select
or create a plug-in
Click here to access
the APS
configuration
windows
Figure 44 shows the Configuration pullout.
Click here to view Configure pull-down box options
Click here to
open the
Configuration
pullout
Click here to configure the plug-in
RiverMaster Administrator’s Guide
Figure 44 Configure Authorization Plug-ins Window
81
Adding an Authorization Plug-InChapter 4
Setting Up Aurorean Services
3From the list of Plug-ins, select Enterasys Authentication.
4Click Properties.
The Properties for Plug-in - Enterasys Authenticati on window will
appear as shown in Figure 45.
Click here to
update the
plug-in
5In the Identifier field, type a name that remote users will use to select
this plug-in.
Aurorean users can include this identifier as part of their VPN user
names to override the default authorization plug- in. For example, if
you enter Enterasys as the identifier for this plug-in, Aurorean users
can specify a user name such as Bob@Enterasy s to ensure that they
authenticate against the APS.
82
Figure 45 Enterasys Authentication Plug-in Window
RiverMaster Administrator’s Guide
Chapter 4Adding an Authorization Plug-In
Setting Up Aurorean Services
6Optionally, specify a value in the Num Threads field.
This function allows the specified number of users to simultaneously
log in without delay. The range of threads that can be set is 1 to 100,
with a default value set to 10.
7If you want to make this plug-in the default authorization method,
check the Default Plug-In box.
8Do one of the following:
–Click Update to save your changes.
–Click Cancel to clear the fields without savin g the plug-in.
RADIUS Authorization
To configure the APS to forward authentication requests to a RADIUS server,
perform the following steps:
1Open the Configuration pullout.
2Choose Authorization Plug-ins from the Configure pull-down box in
the top left corner of the pullout. Or, in the list of Aurorean Virtual
Network devices, expand the tree list under the name of your APS (by
clicking the + symbol), expand it again under Auth Service and click
Make New Plug-in...
The Create New Plug-in window will appear as shown in Figure 46,
but without default or configured values.
3In the Name field, type in a name to describe the plug-in.
This name later appears in the plug-in tree list. For example, if you
are adding a plug-in for a Steel-Belted RADIUS server, you can type
Steel-Belted RADIUS as the name. If you plan to authen ticate
against more than one RADIUS server, you can enter a specific server
name in this field.
4In the Identifier field, type a name that remote users will use to select
this plug-in.
Aurorean users can include this identifier as part of their VPN user
names to override the default authorization plug- in. For example, if
you enter RADIUS as the identifier for this plug-in, Aurorean users
can specify a user name such as Bob@RADIUS to authenticate
against the RADIUS server instead of the default plug-in.
RiverMaster Administrator’s Guide
Chapter 4Adding an Authorization Plug-In
Setting Up Aurorean Services
5Optionally, specify a value in the Num Threads field.
This function allows the specified number of users to simultaneously
log in without delay. The range of threads that can be set is 1 to 100,
with a default value set to 10.
NOTE
Do not set Num Threads to a 0 (zero) value for a RADIUS plug-in. This
will cause user login problems. You may set the value to zero for the
Enterasys Authentication plug -i n.
6To make this plug-in the default authorization method, place a check
next to Default Plug-In.
7ClickonRadiusPlug-In.
8In the Server Address field, enter the IP address or DNS name of the
RADIUS server.
9In the Shared Secret field, type the same shared secret password you
entered on the RADIUS server.
For more information on shared secrets, refer to t he documentation
supplied with your RADIUS server.
10 Leave the Authentication Port and Accounting Port fields set to their
default values.
These values specify UDP port numbers and match industry
standards for RADIUS.
RiverMaster Administrator’s Guide
85
Adding an Authorization Plug-InChapter 4
Setting Up Aurorean Services
11 In the T imeout field, enter the number of seconds the APS should
wait before resending an authentication request.
If the RADIUS server fails to respond to an authentication request
within the time specified, the APS automati cal ly resends the request.
Depending upon the type of RADIUS server you use, set this field as
follows:
Server TypeRecommended Value
Steel-Belted RADIUS10 seconds
MS RADIUS10 seconds
SecurID over RADIUS30 seconds
12 In the Retry field, enter the number of times the APS should resend
an authentication request.
For example, when this field is set to 2, the APS resends an
authentication request twice before declaring the RADIUS server
unreachable. Depending upon the type of RADIUS server you use,
set this field as follows:
Server TypeRecommended Value
Steel-Belted RADIUS3 retries
MS RADIUS3 retries
SecurID over RADIUS1retry
13 If you were unable to create an Enterasys group on your RADIUS
server and need to reuse an existing group attribute, enter the
attribute number in the Group Attrib. field.
Authentication messages passed between the APS and the RADIU S
server must carry a group attribute. If the RADIUS server
management application prevented you from creating an En terasys
group attribute, you can take over a pre-defined attribute and use it
for VPN authentication. For example, the standard attribute LoginLAT-Gr oup can be us ed by entering its n umber, 36, in this field. For a
complete list of attribute numbers, refer to the IETF RFC 2138.
86
RiverMaster Administrator’s Guide
Chapter 4Adding an Authorization Plug-In
Setting Up Aurorean Services
14 If you want the APS to apply an MD4 hash to the key returned by the
RADIUS server, place a check next to the Apply Hash field.
Place a check in this field only if all of the following statements are
true: remote users will authenticate against a Steel-Belted RADIUS 2.1
or earlier server, the tunnel protocol negotiated for all connections by
these users will be PPTP, and 128-bit encryption is enabled on the
Aurorean Network Gateway.
15 Do one of the following:
–Click Commit to save the new plug-in.
–Click Cancel to clear the fields without savin g the plug-in.
16 If you click Commit, you are prompted to re-type the Shared Secret.
17 Reboot the APS to enable the authorization changes.
SecurID Authorization
To configure the APS to forward authentication requests to a SecurID server,
perform the following steps:
1Open the Configuration pullout.
2Choose Authorization Plug-ins from the Configure pull-down box in
the top left corner of the pullout. Or, in the list of Aurorean devices,
expand the tree list under the name of your APS (by clicking the +
symbol), expand it again under Auth Service and click Make New
Plug-in ...
The Create New Plug-in window will appear as shown in Figure 47.
RiverMaster Administrator’s Guide
87
Adding an Authorization Plug-InChapter 4
Setting Up Aurorean Services
Type plug-in name
and identifier here
Click here to
create the
plug-in
Click here to enter
SecurID Plug-in
values
3In the Name field, type in a name to describe the plug-in.
This name later appears in the plug- in tree list. For example, if yo u
are adding a plug-in for a SecurID server, you can type SecurID as
the name. If you plan to authenticate against more than one SecurID
server, you can enter a specific server name in this field.
Figure 47 SecurID Plug-in Window
88
RiverMaster Administrator’s Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.