Enterasys Network Card User Manual

Aurorean™ Virtual Network
Aurorean™ Virtual Network
Aurorean™ Virtual NetworkAurorean™ Virtual Network
RiverMaster
RiverMaster
RiverMaster RiverMaster
Administrator
Administrators Guide
AdministratorAdministrator
Version 3.1
Version 3.1
s Guide
s Guides Guide
©2001 Enterasys Networks. Allrights reserved. This publication c ontains information that is the property of Enterasys Networks. No part of this publication may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent of Ent erasys Ne twork s. Information in this publication is subject to change without notice. Enterasys Networks assumes no responsibility for errors or omissions in this publication or for the use of this material.
Part Number: AVN-RMAG-R31 Released: March 2001 Printed in the USA. For more information on Enterasys Networks products, refer to the following table:
U.S. Off ice
Address 35 Industrial Way
Rochester, NH 03866 Phone 1-877-641-7400 Fax (603) 337-2211 Internet http://www.enterasys.com Sales 1-877-641-7400
www.enterasys.com
Support Call the Enterasy s GTAC at
1-800-872-8440 or email us at
support@enterasys.com
The Enterasys Networks logo, Aurorean, Prescriptive Diagnostic Engine, RiverMaster, Intelligent Client Routing and TollSaver, and TurboTunnel are trademarks of Enterasys Networks.
Microsoft, MS, and MS-DOS are registered trademarks and Windows, Windows 95, Windows 98, Windows NT, Windows 2000 Professional, and Windows M illennium are trademarks of Microsoft Corporation in the USA and ot her countries.
Virtual Network Computing is a trademark of AT&T Laboratories Cambridge. Other trademarks and trade names us ed in this publication belong to their respective owners. Aurorean Virtual Network software includes the following third-party components:
Gate Daemon software. © 1995 The Regents of the University of Michigan. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators.
A DES implementation written by Eric Young. © 1995-1997 Eric Young (eay@cryptsoft.com). All rights reserved. MD4 and MD5 implementation derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm and
MD5 Message-Digest Algorithm. © 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. ccp.c - PPP Compression Control Protocol. © 1994 The Australian National University.All rights reserved. chap.c - Cryptographic Handshake Authentication Protocol. © 1991 GregoryM.Christy. All rightsreserved. chap_ms.c - Microsoft MS-CHAP compatible implementation. © 1995 Eric Rosenquist, Strata Software Limited
(www.strataware.com). All rights reserved. fsm.c - {Link, IP} ControlProtocol Finite State Machine. © 1989 Carnegie MellonUniversity. All rights reserved. Routines to compress and uncompress TCP packets (fortransmission over low speed seriallines).
© 1989 Regents of the University of California. All rights reserved. Portions of Aurorean Client Software are copyrighted to ICE Engineering, In c. and licensed through a GNU public license. For
more information, including access to the source code, visit their Web site at www.ice.com.
ii
RiverMaster Administrator’s Guide
Table of Contents
Table of Contents
Table of ContentsTable of Contents
About T his Guide
Contents of the Guide ...........................................................................................................ix
Conventions Used in this Guide.......................................................................................... xi
Related Documents................................................................................................................ xi
Chapter 1 – Installing RiverMaster Softwa re
System Requirements..............................................................................................................1
Hardware Requirements..................................................................................................1
Software Requirements....................................................................................................2
Installing the Application.......................................................................................................2
Upgrading a Previous Release........................................................................................2
Installation Steps...............................................................................................................2
Starting the Application for the First Time...................................................................4
Removing RiverMaster Files..................................................................................................9
Chapter 2 – Getting Started with RiverMaster
RiverMaster Overview..........................................................................................................11
Logging into RiverMaster.....................................................................................................13
Checking Server Status .........................................................................................................15
Problem Summary & Users Logged In........................................................................ 1 5
Aurorean Network Gateway Statistics........................................................................16
Aurorean Policy Server Statistics .................................................................................17
Setting Up a Aurorean Virtual Network the First Time...................................................21
RiverMaster Administrators Guide
iii
Table of Contents
Chapter 3 – Configuring an ANG-3000/7000
Before You Begin ................................................................................................................... 26
Allocating IP/IPX Addresses to Remote Clients.......................................................27
Virtual Subnets for Site-to-Site and Remote Access Tunnel Servers.............. 30
Intelligent Client Routing .............................................................................................31
NAT Server......................................................................................................................33
Site-to-Site Tunnels ........................................................................................................ 34
AutoLink Recovery........................................................................................................ 35
General Aurorean Network Gateway Settings.................................................................37
Viewing Aurorean Alternate Address Information......................................................... 42
Tunnel Protocols............................................ ...... .................................................................. 43
Virtual Subnetting ................................................................................................................. 50
IP Subnetting .................................................................................................................. 50
IPX Virtual Networks .................................................................................................... 52
Routing ................................................................................................................................... 54
Setting Routing Protocol Parameters.......................................................................... 55
Setting RIP Properties ........................................................................................... 55
Setting OSPF Properties........................................................................................ 57
Routing Interfaces.......................................................................................................... 59
Adding or Removing a Routing Protocol for an Interface............................... 60
Configuring RIP for the Interface........................................................................ 62
Configuring OSPF on an Interface...................................................................... 64
Creating Static Routes........................................................................................... 65
Adding a Remote Server...................................................................................................... 68
Changing Server and Tunnel Properties.....................................................................71
iv
RiverMaster Administrators Guide
Chapter 4 – Setting Up Aurorean Services
Before You Begin....................................................................................................................75
Authorization Plug-in Options.....................................................................................76
RADIUS Authentication Servers.......................................................................... 76
Plug-in Planning..................................................................................................... 77
Threads..................................................................................................................... 77
Private/Public Keys for IPSec Authentication...........................................................78
Problem Notification......................................................................................................78
Trace Levels......................................................................................................................79
Adding an Authorization Plug-In.......................................................................................80
Table of Contents
Enterasys Authentication ..............................................................................................81
RADIUS Authorization..................................................................................................83
SecurID Authorization...................................................................................................87
Generating Private/Public Keys..........................................................................................91
Using the Notification Service to Send E-Mail..................................................................93
Creating a Mailing List...................................................................................................93
Adding an Address to a Mailing List ..........................................................................95
Setting Trace Levels ...............................................................................................................97
Backing Up the Database...................... ...... ...... ................................................... .................98
Chapter 5 – Controlling R emot e User Dialing & Access
Before You Begin..................................................................................................................101
TollSaver Database........................................................................................................102
Corporate Dial-Up Access...........................................................................................103
Problem Notification....................................................................................................104
Creating POP Packages.......................................................................................................105
Adding Corporate ISPs.......................................................................................................108
RiverMaster Administrators Guide
v
Table of Contents
Adding POPs for Corporate ISPs.......................................................................................114
Chapter 6 – Managing Users & Groups
Before You Begin ................................................................................................................. 120
Group Policies .............................................................................................................. 121
Aurorean Client Installation Kits...............................................................................122
Client Synchronization ................................................................................................124
Group Notices...............................................................................................................127
Creating a New Group .......................................................................................................127
Adding Users to a Group............................................................................................ 134
Modifying User & Group Information.....................................................................137
Removing Users & Groups......................................................................................... 138
Creating an Aurorean Client Installation Kit.................................................................. 139
Controlling Client Synchronization.................................................................................. 145
Viewing Group Policies...............................................................................................146
Building Core Data Files.............................................................................................147
Uploading Software Synchronization Files..............................................................149
Setting Up Group Notices..................................................................................................152
Chapter 7 – Viewing Server Activity & Statistics
Monitoring System Activity .............................................................................................. 157
Current Message Activity...........................................................................................157
Advanced Message Viewer ........................................................................................ 164
RiverMaster Options ................................................................................................... 170
Viewing Tunnel Activity .................................................................................................... 173
Using SNMP to Gather Statistics ......................................................................................176
vi
RiverMaster Administrators Guide
Chapter 8 – Generating Reports
Report Contents....................................................................................................................177
Server Anomaly Report ...............................................................................................177
Network Gateway Report............................................................................................179
Client Anomaly Report................................................................................................182
Client Report..................................................................................................................183
Accounting Report........................................................................................................187
Downloading, Viewing and Exporting Reports..............................................................190
Printing Reports............................................................................................................193
Exporting Reports.........................................................................................................194
Table of Contents
Exporting Reports to a Disk File ........................................................................ 194
Exporting Reports to a Microsoft Exchange Folder......................................... 203
Exporting Reports Using MAPI ......................................................................... 207
Appendix A – Glossary Appendix B – ANG-3000/7000 P reconfiguration Stored on a
Floppy Disk
Adding Remote Gateways..................................................................................................218
Configuring ANG IP Addresses........................................................................................220
Configuring Tunnel Protocols............................................................................................221
Configuring Virtual Subnets ..............................................................................................228
Configuring Routing Protocols..........................................................................................230
OSPF Properties.............................. ...... ...... ................................................... ...............232
RiverMaster Administrators Guide
vii
Table of Contents
Configuring Routing Interfaces ........................................................................................ 234
Configuring RIP for the Interface.............................................................................. 236
Configuring OSPF on an Interface ............................................................................ 238
Creating Static Routes................................................................................................. 239
Creating Remote Connections...........................................................................................242
Loading the Floppy Disk.................................................................................................... 247
Chapter 9 – License Agreement & Support
Enterasys Networks License Agreement......................................................................... 249
License Grant................................................................................................................ 249
Warranty........................................................................................................................250
Index
Infringement Indemnification.................................................................................... 251
Limitation of Liability.................................................................................................. 251
Termination................................................................................................................... 252
International Provisions.............................................................................................. 252
Applicable Law ............................................................................................................ 252
U. S. Government - Commercial Computer Software............................................253
Technical Support................................................................................................................ 254
Support from Authorized Resellers.......................................................................... 254
Support from Enterasys Networks............................................................................254
On-line Services ................................................................................................... 254
Phone Support...................................................................................................... 254
viii
RiverMaster Administrators Guide
This guide describes how to use Version 3.1 of the RiverMaster management application to set up and monitor Aurorean Virtual Network systems. While written primarily to describe how to configure a Aurorean Virtual Netwo rk solution for the first time, this guide also addresses how to track usa ge and troubleshoot end-to-end VPN connectivity problems.
The guide is designed for network administrators who are responsible for installing and ma naging local and wide area networking equipm ent. The guide assumes you have experi ence working with LAN devices such as firewalls, routers, hubs, and file servers.
Contents of the Guide
Information in this guide is arranged as follows:
H Chapter 1, Installing RiverMaster Software provides step-by-step
instructions for installing the RiverMaster application on your computer and starting the application for the first time.
About T his Guide
About T his Guide
About T his GuideAbout T his Guide
H Chapter 2, The Guided Tour contains an overview of RiverMaster
operation, describes how to log into RiverMaster and check the status of your Aurorean Virtual Network servers, and walks you through the process of setting up an Aurorean Virtual Network for the first time.
H Chapter 3, Configuring a Aurorean Network Gatewaydescribes how to
configure network settin gs, such as IP addresses, name resolutio n servers, tunnel prot ocols, and r outing p rotoc ols, using Ri verMast er or Aurorean Policy Manager. The chapter describes how to back up the database on the Aurorean Policy Server and details how to set up site-to-site tunnels from one Aurorean Network Gateway to another. It also details how to view and change alternate ANG address data.
H Chapter 4, Setting Up Aurorean VN Services discusses how to: us e the
Authorization service to authenticate remote users, prepare the Notification service to send E-mail in response to Aurorean Virtual Network alarm, alert, or notification messages, and set trace levels for system messages.
RiverMaster Administrators Guide
ix
About This Guide
H Chapter 5, Controlling Remote Us er Dialing & Access describes how to
define Aurorean Network Gateway destinations, select ISPs from the TollSaver database, configure POP packages and add corporate dial­up phone numbers.
H Chapter 6, Mana ging Users & Groups addresses how to create a user
database on a Aurorean Policy Server, assign policies that govern user access to the network, and prepare a customized Aurorean Client Software installation kit.
H Chapter 7, Viewing Server Activity & Statistics shows you how to
examine and interpret message traffic between Aurorean Virtual Network devices and monitor the performance of active tunn el connections. Standard SNMP MIB-II and two private MIBs are now available to monitor your Aurorean syst em s.
H Chapter 8, Generating Reports describes how to download and view
customized reports that reve al Aurorean Virtual Network server performance and remote user activity.
H Appendix A, Glossary contains definitions f or terms used throughout
this guide.
H Appendix B, Configuring the ANG with a Floppy Disk, describes a
procedure similar to the steps you would take to configure the ANG by using the RiverMaster application. But this method allows an administrator to centrally set up one or more gateways and distribute that information on floppy disks to remote sites.
H Appendix C, License Agreement & Support describes the agreement that
governs the use and distribution of RiverMaster software and provides information for contacting Enterasys Networks for technical support.
x
RiverMaster Administrators Guide
Conventions Used in this Guide
The following conventions are used in this guide:
NOTE Notes supply additional helpful information,
point you to where you can find more information, or emphasize critical iss ues you should consid er when performing an action.
CAUTION Cautions contain directions that can prevent you
from damaging the product or losing data.
WARNING Warnings provide directions that you must
follow to avoid harming yourself.
Bold Text in boldface indicates values you type using
the keyboard (for example, a:\setup). Default settings may also appe ar in bold.
About This Guide
Italics Text in italics indicates a variable, important new
SMALL CAPS Text in small caps specifies keys to press on the
Courier font Text in this font denotes a file name or directory.
Related Documents
The following publications are also supplied with Aurorean VN systems:
H RiverMaster Quick Reference Card that contains shortcuts and tips for
installing and using th e RiverM aster application.
H Quick Setup cards that highlight the basic steps required to install
either a Aurorean Policy Server or Aurorean Network Gateway.
H Aurorean Installation & Service Guide describes how to mount, connect,
power-up, and maintain an Aurorean Policy Server and Aurorean Network Gateway.
term, or the title of a manual.
keyboard; a plus sign (+) between keys indicates that you must press the keys simultaneously (for example,
CTRL+ALT+DEL).
H ANG-1000 User’s Guide details how to install and configure the small
office/home office Network Gateway.
Portable Document File (PDF) versions of these manuals are available on the Aurorean System Software CD ROM. Using Adobe Acrobat Reader 3.0 (or
RiverMaster Administrators Guide
xi
About This Guide
later), you can view these manuals on-line or print additional copies. Acrobat Reader can be downloaded from the Adobe web site (www.adobe.com).
xii
RiverMaster Administrators Guide
This chapter provides the system requirements and step-by-step instructions for installing RiverMaster software on your computer. If you have not already done so, Enterasys Networks recommends that you mount and connect your Aurorean Policy Server and Aurore an Network Gateway before performing these steps. Refer to the Aurorean Installation & Service Guide supplied with each server for detailed installation instructions.
System Requirements
To run the RiverMaster application, your computer must meet the following requirements.
1
Installing RiverMaster
Installing RiverMaster
Installing RiverMasterInstalling RiverMaster
Software
Software
SoftwareSoftware
Hardware Requirements
RiverMaster runs on a desktop or laptop computer equipped with:
H A 233 MHz processor or faster H 64 MB RAM minimum, 128 MB recommended H 80 MB free space on the computer’s hard drive H CD ROM drive H Ethernet network interface
To best view the RiverMaster user interface, set your monitor to display 65536 co lors or better at 1024 x 768 resolution.
RiverMaster Administrators Guide
NOTE
1
Installing the Application
Software Requirements
The following operating systems, applications, and protocols should be installed and configured before you install RiverMaster:
H Windows NT 4.0 Workstation upgraded with Service Pack 4 (SP4) or
later version or Windows 2000 Professional
H TCP/IP protocol H To use Aurorean Policy Manager: Internet Explorer 5 or Netscape 4
Installing the Application
Before installing RiverMaster, close any applications you have ru nning. Once the installation is complete, you must restart the computer before you can use RiverMaster to manage your Aurorean Virtual Network.
Chapter 1
Installing RiverMaster Software
NOTE
You must log into your Windows NT Workstation/2000 computer using an account with administrator privileges before installing RiverMaster. Without administrator privileges, some files may not install properly and you may be prevented from using some RiverMaster features.
Upgrading a Previous Release
The following instructions assume you are installing RiverMaster on your computer for the first time. Do not re-install RiverMaster over a previous version. Remove the older version of RiverMaster as described in “Removing RiverMaster Files” on page 9 and then install the new version as described in the following section.
Installation Steps
To install RiverMaster on your computer, perform the following steps:
1
Insert the Aurorean 3.0 System Software CD into the CD ROM drive.
2
Open Windows Explorer, go to the RiverMaster directory on this CD and run the
2 RiverMaster Administrator’s Guide
SETUP.EXE
program.
Chapter 1
Installing RiverMaster Software
3
If a warning message appears stating that Microsoft ODBC is not present on your computer, click OK to install Microsoft ODBC. If this message does not appear, continue with the next step.
The Microsoft ODBC text driver must be installed on your computer in order for RiverMaster to generate reports. RiverMaster Setup automatically launches the Microsoft ODBC install program; follow the instructions provided on the screen. When asked, choose the Typical ODBC installation. After ODBC is installed, RiverMaster Setup automatically resumes.
4
When the Welcome window appears, click Next to continue.
To halt the installation and exit the Setup program, click Cancel; this option is also available on all Setup wi ndows that follow.
5
When the Software License Agreement window appears, carefully read the agreement and click Yes to accept the terms.
Installing the Application
To install RiverMaster, you must accept the agreement. If you click No to decline the agreement, the Setup program will close.
6
On the Choose Destination Location window, select where you want RiverMaster files stored on the computers hard disk and click Next.
As a default, RiverMaster files are stored in C:\Program Files\ Indus River Networks\RiverMaster. To change the
destination folder, click Browse to select an existing folder or create a new folder. To return to the previous window to change your selections, click Back; this option is als o a v ailable on all Setup windows that follow.
7
When the Select Program Folder window appears, assign a name to the RiverMaster program folder and click Next.
As a default, the Setup program creates an Indus River Networks folder that appears in the Programs menu. This folder contains shortcut icons for the RiverMaster applica tion and a README file.
8
When the Start Copying Files window appears, click Next to continue the installation or click Back to change your selections.
9
An Information window appears stating that to read the RiverMaster documentation, you must install the Adobe Acrobat Reader program. Click OK.
Acrobat Reader can be found in the 3rd Party Support Software directory on this CD or at the Adobe Website (www.adobe.com).
RiverMaster Administrators Guide 3
Installing the Application
10
11
When the reboot completes, RiverMaster is installed and ready to manage your Aurorean Virtual Network.
If RiverMaster is running while you upgrade yo ur A urorean Policy Server software, RiverMaster may become confused. To avoid this situation, exit RiverMaster at the beginning the APS installation or exit and restart RiverMaster after the process has completed.
Chapter 1
Installing RiverMaster Software
When the Setup Complete window appears, do one of the following:
To view the README file immediately, leave the check box
checked and click Finish.
To wait until later to view the README file, remove the check
from the check box and click Finish.
At the second Setup Complete window, choose Yes to restart your computer and click Finish.
NOTE
Starting the A pplication for the First Time
When you start the RiverMaster application for the first time, you are asked for the following information:
H The IP address(es) you assigned to the Aurorean Policy Server(s)
during its installation.
H The Aurorean VPN you assigned to your servers when they were
installed.
H A user name and password to log into RiverMaster (the defaults are
user netadmin and password netadmin).
NOTE
RiverMaster lets you invoke two RiverMaster session s f rom one Windows NT/2000 computer to a pri mary and secondary Aurorean system. This feature is especially useful when running AutoLink Recovery™ (ALR), which employs automatic fail over to a backup Aurorean Virtual Network system. If you wish to invoke two RiverMaster sessions, you will be required to enter two IP addresses.
4 RiverMaster Administrators Guide
Chapter 1
Installing RiverMaster Software
To start RiverMaster, perform the following steps:
1
On the main Windows NT/2000 desktop, double-click the RiverMaster icon.
Alternatively, you can click the Start button, point to Programs, point to Indus River Networks, and then click RiverMaster. In the RiverMaster program group, click RiverMaster to launch the application. After a few seconds , the Identify Your Aurorean Environment window appears as shown in Figure 1.
Installing the Application
In the Aurorean VPN Name field, type a collective name that will be
2
shared by all Aurorean devices on your corporate network.
This name is set using the APS Quick Configuration wizard program; refer to the Aurorean Installation & Service Gu ide for more information.
RiverMaster Administrators Guide 5
Figure 1 First-Time Setup Information
Installing the Application
3
4
Chapter 1
Installing RiverMaster Software
Do one of the following:
If you are configuring only one Aurorean Policy Server, enter the
IP address assigned to it in the Primary fields an d clic k OK. The RiverMaster Login windo w will appear as shown in Figure 3 with the Aurorean VN Name, APS name and IP address displayed as you specified earlier. Skip to Step 5.
If, in addition to configuring a Primary APS, you have installed a
backup APS to use with the Auto Link Recovery feature, supply this IP address i n the Alternate fi elds aft er entering an IP addr ess of the Primary APS in the fields provided. Click OK. The Select APS window will appear as shown in Figure 2.
This IP address is set using the Aurorean configuration wizard program; refer to the instructions supplied with this program for more information. RiverMaster needs this IP address to locate and synchronize with the Aurorean Policy Server.
If you entered both APS IP addresses, select the APS you want to log into and click OK.
The RiverMaster Login window appears as shown in Figure 3 with the Aurorean VPN name displayed as typed in the Identify your Aurorean Environment window.
Figure 2 Select APS Window
6 RiverMaster Administrators Guide
Chapter 1
Installing RiverMaster Software
5
T ype the default user name ( and click OK.
For example, the primary APS name and its IP address is displayed in the RiverMaster Login window in Figure 3. When the RiverMaster application starts, the main interface appears as shown in Figure 4.
netadmin
Installing the Application
) and password (
netadmin
)
Figure 3 RiverMaster Login Window
NOTE
To prevent unauthorized RiverMaster access, Enterasys Networks recommends that y ou immedi ately cr eat e a new administ rator acco unt in the Admin group and delete the default login account. Refer to Chapter 6 for instructions on adding and deleting user accounts.
When you start RiverMaster, the application immediately attempts to detect and communicate with the Aurorean Policy Server and Aurorean Network Gateway located within the same corporate network. Depending upon the amount of remote client activity occurring on the VPN, RiverMaster may need up to a minute to detect and synchronize with both servers.
CAUTION
If you want to configure a connection to a second APS after having already configured a connection to only one server, you must first delete the config.irx file in the C:\Program Files\Indus River Networks\RiverMaster directory on the RiverMaster PC. Then, when you click on the RiverMaster desktop icon, the Identify your Aurorean VN Environment window will appear as described on page 5.
RiverMaster Administrators Guide 7
Installing the Application
Using the Delivery service running on all Aurorean components, RiverMaster establishes a Delivery session with each server. The Aurorean Policy Server reports service status, memory/hard disk usage , and a summary of alarms, alerts, and problem notification messages. The Aurorean Network Gateway reports an aggregated total of bytes sent and received over all tunnels, as well as memory/hard disk usage.
When memory and disk usage appears, RiverMaster has detected and synchronized with the Aurorean Network Gateway
Chapter 1
Installing RiverMaster Software
Click here to close the application
Configuration pullout
Manage Users & Groups pullout
View System Activity pullout
When service status appears, RiverMaster has detected and synchronized with the Aurorean Policy Server
Figure 4 RiverMaster Main Interface
To learn more about the server status data displayed on the RiverMaster interface, refer to Chapter 2. To exit the RiverMaster application at any time, click the close (
X) button in the upper-right corner of the main interface.
NOTE
If you have used RiverMaster extensively to generate reports and view messages during a period of peak activity, the application may require a few moments to cl ose.
8 RiverMaster Administrators Guide
Chapter 1
Installing RiverMaster Software
Removing RiverMaster Files
RiverMaster can be uninstalled from your computer using the standard Add/Remove Programs tool provided with Windows. After RiverMaster files are removed from your computer, you should restart the computer to clean up any files that were in use during the uninstall.
To remove RiverMaster files from your computer, perform the fol lowing steps:
1
On your desktop computer, click the Start button, point to Settings, then click Control Panel.
2
Double-click on Add/Remove Programs to launch the utility.
3
On the Install/Uninstall tab page, select RiverMaster from the list of programs and click Add/Remove.
Removing RiverMaster Files
4
When the Confirm File Deletion window appears, click Yes to confirm that you want to remove RiverMaster.
Clicking Yes launches the UnInstallShield program, which manages the process of deleting RiverMaster files.
5
When Remove Shared File? windows appear for shared .DLL and .OCX files, click Yes To All and click Yes again to confirm your decision.
6
When the Remove Programs From Your Computer window appears with all items checked, click OK.
7
When a window appears indicating that RiverMaster has been removed, click OK to acknowledge the message but do not restart your computer.
Although the Add/Remove Programs utility removes most Aurorean VN files, you must manually delete the contents of the RiverMaster folder within the Indus River Networks folder on your hard drive. You should do this before restarting your computer.
8
Close the Add/Remove Programs control panel.
9
Open Windows Explorer by clicking the Start button, pointing to Programs, and then clicking Windows Explorer.
RiverMaster Administrators Guide 9
Removing RiverMaster Files
10
Locate the RiverMaster program folder.
The default location for this folder is C:\Program Files\ Indus River Networks.
11
Delete the RiverMaster folder.
12
Restart your computer.
Chapter 1
Installing RiverMaster Software
10 RiverMaster Administrators Guide
This chapter introduces the essential functions of RiverMaster, describes Aurorean Virtual Network system status information displayed on the main interface, and summarizes the steps required to use RiverMaster to configure your Aurorean Virtual Network for the first tim e .
RiverMaster Overview
When RiverMaster is installed on your PC, the computer becomes a “management sta tion” for the Aurorean Virtual Network, receiving dynamic updates from Aurorean Virtual Network systems and making immediate configuration changes. All data di splayed by RiverMaster is retrieved from databases residing on the Aurorean Policy Server or from incoming messages from either the Aurorean Policy Server or Aurorean Network Gateway; no data is stored locally on your PC ’s hard disk.
2
Getting Started with
Getting Started with
Getting Started withGetting Started with
RiverMaster
RiverMaster
RiverMasterRiverMaster
Figure 5 illustrates the interaction between the Aurorean Policy Server, Aurorean Network Gateway, and RiverMaster PC.
RiverMaster Administrators Guide 11
RiverMaster Overview
Chapter 2
Getting Started with RiverMaster
Aurorean
Policy
Server
• Updated configurations
• Requests for logs
• Curre
• Status of services
• Reports
Cus
ki
t
Aurorean
Network
• Backup configuration files
• Log files
n
t
c
onf
i
g
u
ra
t
ions
Us
R
e
r
e
&
q
g
u
e
ro
s
t
om A
b
u
i
ld
c
t
u
rore
o
mma
u
s
p
f
c
o
h
r
a
re
n
p
g
o
es
rt
a
s
n
Client
n
d
s
RiverMaster PC
N
• Tunnel statist
ati
c
fi
i
igur
ot
f
n
o
c
n
o
cs
i
s
e
g
n
a
h
of
c
n
o
ti
a
Gateway
Figure 5 Aurorean Virtual Network Communication Flow
Using the RiverMaster managemen t application you can:
H Quickly check a server’s operationa l status by determining if all
services are running, reviewing alarm and alert messages that have accumulated, and displaying current tunnel activity (the number of users logged in and the amount of data passing over all tunnels).
H Define “virtual subnets” to provide IP addresses to remote Aurorean
Client Software users and allow the Aurorean Network Gateway to properly route remote user packets through the corporate network.
H Select which Internet Service Providers (ISPs) your remote Aurorean
Client Software users can use from the extensive TollSaver database stored on the Aurorean Policy Server.
H Define user accounts on the Aurorean Policy Server to locally
authenticate remote users or install a “plug-in” to authenticate users against an external RADIUS or SecureID server.
12 RiverMaster Administrators Guide
Chapter 2
Getting Started with RiverMaster
H Organize users with groups and assign each group policies that
govern the features available in Aurorean Client Software.
H Create customized Aurorean Client Software installation kits to
distribute to your remote users that contains the Aurorean Client Software application, POP packages, group policies, and destination IP addresses.
Logging into RiverMaster
When you start the RiverMaster applicatio n, the RiverMaster Login window appears as shown in Figure 6 if you have configured a connection to one Aurorean Policy Server. If you have configured a connection to a second Aurorean Policy Server, the Select APS window will appear as shown in Figure 7.
Logging into RiverMaster
Version 3.0 of RiverMaster lets you start two R iverMaster sessions from one Windows NT/2000 computer to separate Aurorean Virtual Network systems. This feature is especially useful when running AutoLink Recovery, which employs automatic fail over to a backup Aurorean Virtual Network system.
To access RiverMaster, you must enter a user name and pass word that the Aurorean Policy Server can authorize from its internal database. The default login account is netadmin with the password netadmin.
Log into RiverMaster by typing a user name and password in the fields provided, and choosing the Aurorean VPN name associated with the Primary Aurorean Policy Server. Click OK.
RiverMaster Administrators Guide 13
Figure 6 RiverMaster Login Window
Logging into RiverMaster
To prevent unauthorized RiverMaster access, Enterasys Networks recommends that you immediately create a new administrator login account in the IRAdmin group and delete the default login account. Refer to Chapter 6 for more on adding and deleting user accounts.
If you have configured a connection to a second Aurorean Policy Server, the Select APS window appears as shown in Figure 7. Select the Aurorean Policy Server you want to manage and click OK . The RiverMaster Login window then appears as shown in Figure 6 a llowing you to log into the selected Aurorean Policy Server.
Chapter 2
Getting Started with RiverMaster
NOTE
CAUTION
If you want to configure a connection to a second Aurorean Policy Server after having already configured a connection to only one server, you must first delete the config.irx file in the C:\Program Files\Indus River Networks\RiverMaster directory on the RiverMaster computer. Then, when you click on the RiverMaster desktop icon, the Identify your Aurorean Environment window will appear as described in Chapter 1.
14 RiverMaster Administrators Guide
Figure 7 Select APS Window
Chapter 2
Getting Started with RiverMaster
Checking Server Status
RiverMaster’s main interface is designed to quickly show the Aurorean Virtua l Network’s “health” when you start the application. The health conditions are organized into three categories:
H Problem summary and users logged in H Aurorean Network Gateway statistics H Aurorean Policy Server statistics
Problem Summary & Users Logged In
As shown in Figure 8, counters at the top and bottom of the interface track both error conditions and successful tunnel lo gin attempts. The Problem Summary counters are updated whenever RiverMaster receives one of three types of mes s ag e s:
Checking Server Status
H Alarms notify you when a significant error occurs with a service
running on a Aurorean Virtual Network system or a general server problem that is preventing the server from operating normally.
H Alerts occur when an error count threshold has been crossed and an
alarm condition is imminent.
H Problem Notification messages typically indicate an error at the
Aurorean Network Gateway or a remote client connection problem which Aurorean Client Software’s Prescriber feature diagnosed and reported. Prescriber is a Aurorean Virtual Network feature which diagnoses why a tunnel connection failed and attempts to correct the problem.
RiverMaster Administrators Guide 15
Checking Server Status
Indicates current alarms, alerts, and informational messages that appear in the System Activity window (refer to Chapter 7 for more information)
Total number of remote users authenticated and connected to the corporate network via the Aurorean Network Gateway
Chapter 2
Getting Started with RiverMaster
Click here to view more details about logged in users
Figure 8 Aurorean Network Gateway Status Information
Aurorean Network Gateway Statistics
Figure 9 shows the statistics information R iverM aster displays for the Aurorean Network Gateway. The graph indicates total amount of bytes sent and received over all tunnels processed by the Aurorean Network Gateway; to view the traffic passing over a single tunnel, click the button at the top right corner of the graph.
16 RiverMaster Administrators Guide
Chapter 2
Getting Started with RiverMaster
Aggregated number of bytes received and sent over all tunnels processed by the Aurorean Network Gateway
Memory usage
Hard disk usage
Checking Server Status
Click here to view detailed statistics for individual tunnels (refer to Chapter 7 for details)
Figure 9 Aurorean Network Gateway Statistics
The memory and hard disk usage meters show how much system resources are being consumed supporting tunnel connections. You can use these values for capaci ty p l an ning to determine wh e n t h e nu mber of concurr ent tunnels is approaching the server’s limit.
Aurorean Policy Server Statistics
As shown in Figure 10, RiverMaster displays the current status of services running on the Aurorean Policy Server. Normally, all services should appear as “Running.” If one or more services appears as “Stopped,” then the Aurorean Policy Server may not function correctly. Table 1 briefly defines each service and describes what occurs when the service is stopped.
RiverMaster Administrators Guide 17
Checking Server Status
Status of services running or stopped on the Aurorean Policy Server
Memory usage
Chapter 2
Getting Started with RiverMaster
Hard disk usage
Figure 10 Aurorean Network Gateway Statistics
Table 1 Aurorean Policy Server Services
Service Function If Stopped...
Overlord Monitors the condition of all other
Auroreanservices and restarts a serviceif it fails to initialize properly or ceases to operate at any point. Overlord may also force a total server reboot if necessary.
Retrieval Retrieves statistics and messages from
both the Aurorean Network Gateway and Policy Server to generate activity and anomaly reports.
Delivery Carries messages between all Aurorean
Virtual Network components, including servers, Aurorean Client Softwareclients, and the RiverMaster management application. Delivery is a critical service that must be operational for Aurorean Virtual Network components to initialize properly and synchronize with one another.
The Aurorean Policy Server automatically reboots itself approximately 20 seconds after the Overlord service stops.
You cannot downloadand view reports using RiverMaster.
The Aurorean Policy Server cannot communicate with the RiverMaster application and remote users are unable to authenticate and establish a tunnel connection with the Aurorean Network Gateway. The Aurorean Policy Server automatically reboots itself approximately 3 minutes after the Delivery service stops.
18 RiverMaster Administrators Guide
Chapter 2
Getting Started with RiverMaster
Table 1 Aurorean Policy Server Services
Service Function If Stopped...
Checking Server Status
Notification Reports alarm, alert, and problem
notification messages using E-mail.
FTP Provides the mechanismfor transferring
files between Aurorean Virtual Network servers and RiverMaster. FTP also allows Aurorean Client Software computers to synchronize group policy settings, TollSaver POP phone numbers, Prescriber remedies, and Aurorean Client Software application executables.
Access Supports the exchange of database
informationstoredontheAuroreanPolicy Server to other Aurorean Virtual Network components, such as TollSaver data, logs, and server configuration files.
The Aurorean Policy Server and Network Gateway can operate normally but E-mail messages are no longer sent when alarms/alerts/problems occur.
Aurorean Client Software users can connect but cannot perform client synchronization. RiverMaster cannot download reports from the Aurorean Policy Server. RiverMaster cannot complete database transactions and queries.
The Aurorean Policy Server cannot acceptany configurationchangesfrom the RiverMaster application and remote users are unable to authenticate and establish a tunnel connection with the Aurorean Network Gateway. The Aurorean Policy Server automatically reboots approximately 3 minutes after this service stops.
RiverMaster Administrators Guide 19
Checking Server Status
Getting Started with RiverMaster
Table 1 Aurorean Policy Server Services
Service Function If Stopped...
Chapter 2
Log Maintains a running record of system
events and messages received by each Aurorean Virtual Network component. The RiverMaster application displays these logs and extracts information from them to produce daily reports.
Authentication Provides the mechanism for
authenticating remote users against user databases located on eitherthe Aurorean Policy Server or an external authentication server (such as a RADIUS device). Authentication also serves another security role, by enforcing a strict ring level hierarchy for Deliverymessages to prevent unauthorizedaccess to sensitive information.
The Aurorean Policy Server willaccept configuration changes and the Aurorean Network Gateway will accept tunnel connection attempts. However, the messages generated by these actions are not stored in a log file on the Aurorean Policy Server andcannot be viewed as they occur from the RiverMaster. Reports will also be inaccurate.
Configuration changes sent by the RiverMaster to the Aurorean Policy Server are rejected because the Aurorean Policy Server cannot authenticate them. Also, the Aurorean Network Gateway will not accept new tunnel connection attempts because the remote user cannot be authenticated. The Aurorean Policy Server reboots approximately 3 minutes after this service stops.
The memory and hard disk usage meters in the Aurorean Policy Server statistics area show how much server resources are being consumed to manage the Aurorean Virtual Network. High memory usage normally reflects a large number of authorization messages for both remote user authentication and server-to-server traffic; generating reports and Aurorean Client Software installation kits can also consume Aurorean Policy Server memory. High disk space usage is normally a result of many large log and report files accumulating on the hard disk.
NOTE
When 85% of the Aurorean Policy Server drive capacity is full, the server automatically begins deleting logs and reports older than 90 days. Log and report deletions are not configurable at th is t i me.
20 RiverMaster Administrators Guide
Chapter 2
Getting Started with RiverMaster
Setting Up a Aurorean Virtual Network the First Time
Setting Up a Aurorean Virtual Network the First Time
When you start RiverMaster for the first time, you need to perf orm several basic configuration steps to put your Aurorean Virtual Network into operation. These basic steps are outlined below, with references to the detailed instructions provided throughout this manual.
1
Enter the Aurorean VPN name for your Aurorean Virtual Network equipment and enter the IP address(es) of the Aurorean Policy Server(s).
You are prompted to enter these values the first time you start the RiverMaster application.
2
After you login with the default user name and password, set the authentication, encryption, and compression options used during tunnel connections.
These options are set separately for each tunnel protocol (PPTP or IPSec) as described in Chapter 3.
3
Allocate IP addresses for remote users to use when they tunnel into the corporate network.
You can assign a specific address to each remote user or allow users to dynamically draw addresses from a pool. Address pools are created by defining virtual subnets as described in Chapter 3.
4
Configure the Aurorean Network Gateway to route packets from remote users through the corporate network.
The Aurorean Network Gateway supports RIP, OSPF, and static routes to forward packets to their destination; to configure these routing protocols, refer to the instructions in Chapter 3.
5
Determine how remote Aurorean Client Software users will be authenticated.
To authenticate against a database residing on the Aurorean
Policy Server, you must use the Authorization service as described in Chapter 4.
To authenticate against an external RADIUS server, you must
configure an authorization plug-in as described in Chapter 4.
To authenticate against an external SecurID server, you must
configure an authorization plug-in as described in Chapter 4.
RiverMaster Administrators Guide 21
Setting Up a Aurorean Virtual Network the First Time
6
Create mailing lists so that the Aurorean Policy Server sends you E-mail when alarm, alert, or notification messages are generated (optional).
E-mail messages are generated by the Notification service as described in Chapter 4.
7
Reboot the Aurorean Network Gateway to put the networking changes into effect.
8
Create POP packages of selected Internet Service Providers (ISPs) from the list of those available in the master TollSaver database as described in Chapter 5.
By limiting the ISPs available for use by remote users and grouping them in POP packages, you can minimize the size of the database of Point of Presence (POP) phone numbers distributed to your Aurorean Client Software users. In addition to POP phone numbers, you can add corporate direct dial phone numbers to this database.
Chapter 2
Getting Started with RiverMaster
9
Define groups for remote Aurorean Client Software users as described in Chapter 6.
For each group you can assign a range of IP addresses to allocate to Aurorean Client Software users when they connect (using the virtual subnets you defined in Step 3). You can als o gra nt po licies to each group that determine the Aurorean Client Software features and functions that can be used by members of that group.
10
Add user accounts to each group as described in Chapter 6.
If you plan to authenticate all remote users against an external RADIUS or SecurID server, you can skip this step. For each user account, you must enter a specific IP address or indicate that the Aurorean Network Gateway must allocate the user an address from the group’s virtual subnet.
11
Generate a customized Aurorean Client Software installation kit for distribution to members of each group as described in Chapter 6.
This installation kit contains the Aurorean Client Software application, group policy settings, destinations, and a TollSaver database with POP phone numbers for the ISPs assig ned to th e group.
22 RiverMaster Administrators Guide
Chapter 2
Getting Started with RiverMaster
Once remote users begin tunneling into the corporate network using Aurorean Client Software software, you can view this activity using the Tunnel Statistics window described in Chapter 7. You can also produce detailed daily usage reports as described in Chapter 8.
Authentication requests and other user activity messages are also displayed in the System Activity window described in Chapter 7. This window also displays alarm and alert messages that warn you when server errors occur.
Setting Up a Aurorean Virtual Network the First Time
RiverMaster Administrators Guide 23
3
Configuring an ANG-3000/7000
Configuring an ANG-3000/7000
Configuring an ANG-3000/7000Configuring an ANG-3000/7000
This chapter describes how to configure network settings for your local Aurorean Network Gateway (ANG-3000/7000). Local ANGs have an accompanying Aurorean Policy Server and are configured using RiverMaster . Remote ANGs are stand-alone systems configured by using the Web-based Aurorean Policy Manager utility. The ANG-1000 is configured using its Web­based configuration utility only. Network settings for the ANG fall into these categories:
H General settings such as the DNS, WINS and NAT servers that
remote clients require for name resolution or authentication.
H Tunnel protocol (PPTP or IPSec) parameters for authentication,
encryption, and compression.
H Virtual subnets containing pools of IP addresses or IPX network
numbers that are allocated to remote users when they tunnel into the corporate network.
H Routing protocol (static, RIP, and OSPF) settings for each ANG
Ethernet interface.
H Site-to-site tunnel parameters between two Aurorean Network
Gateways.
NOTE
The ANG-3000/7000 can also be configured using a floppy disk. Appendix B describes a procedure similar to configuring the ANG using the RiverMaster application. Using the floppy disk method allows an administrator to centrally configure one or more gateways and conveniently distribute that configuration data on floppy disks to remote sites.
RiverMaster Administrators Guide 25
Before You Begin
Select the Network Gateway from the list of servers
Chapter 3
Configuring an ANG-3000/7000
These functions are grouped on the Configurati on pullout as shown in Figure 11.
Click here to open the Configuration pullout
Click here to access the Network Gateway configuration windows
Before You Begin
Before performing the steps in this chapter, you should familiarize yourself with the following Aurorean Virtual Network concepts:
H Methods available for allocati ng IP addresses and IPX network
numbers to remote clients when they connect.
H Aurorean Virtual Network’s Intelli gent Client Routing feature. H Aurorean Virtual Network’s support for Network Address
Translation (NAT).
H Methodology of Site-to-Site tunnels.
Figure 11 Configuration Pullout
H Aurorean Virtual Networ k’s AutoLink Reco very feature.
26 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Allocating IP/IPX Addresses to Remote Clients
When remote clients tunnel into the corporate network, they must be able to access devices on the network just as if they were locally conn ected. To serve this need, the ANG acts as a router, forwarding packets between devices on the corporate network and remote clients. When remote clients tunnel into the ANG, they must be allocated IP addresses accessible to or on the local network.
NOTE
To access Novell NetWar e servers using IPX protocol, remote clients must receive an IPX network number. RiverMaster allows you to specify a single IPX network number that is shared by all remote clients when they connect. IPX usage is also controlled by a group policy; refer to Chapter 6 for more information on group policies.
Before You Begin
You can allocate IP addresses to Aurorean users in one of three ways:
H Assign a specific IP address to each remote client. This address is
saved as part of the client’s user name and password account information stored on the Aurorean Policy Server. Once the client authenticates, the address is allocated to the client for the duration of the connection. To receive an IP address in this manner, the remote client must authenticate against the Enterasys authoriz ation plug-in as described in Chapter 4.
H Authenticate remote clients against an external authentication server
(such as a RADIUS server) and have that server allocate IP addresses. To receive an IP address in this manner, the remote client must authenticate against a RADIUS plug-in as described in Ch apter 4.
H Define one or m ore virtual subnets that act as address pools. Virtual
subnets are linked to groups; when a member of a grou p connects, an address from within the virtual subnet is allocated to that user for the duration of the connection.
To support virtual subnets, the ANG must learn the topology of the corporate network and advertise to other devices that remote clients on the virtua l subnet are reachable. To do this, the ANG supports Routing Information Protocol (RIP) and Ope n Shortest Path First (OSPF) routing protocols. The ANG supports both RIP Version 1 and Version 2.
RiverMaster Administrators Guide 27
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Virtual subnets can use both legitimate IP addresses (unique addresses purchased and registered by your company) and non-routable address ranges reserved for private network use only. These reserved address ranges include:
H 10.0.0.0 to 10.255.255.254 on a Class A network H 172.16.0.0 to 172. 30.255.254 on a Class B n etwork. Although 1 72.31.0.0
to 172.31.255.254 is also a reserved range, you cannot define virtual subnets within this range because addresses in that range may be taken by the ANG for internal use.
H 192.168.0.0 to 192.1 68.255.254 on a Class C network
These addresses are not routable outside your corporate network. By using these addresses for remote clients, you can preserve the routable IP addresses for LAN devices.
NOTE
If you allocate addresses from one of these non-routable ranges and you want remote clients to be able to browse the Internet while connected, you must enable the Intelligent Client Routing described on page 31 or use network address translation.
There are several advantages to using virtual subnets over other IP address allocation techniques:
H The ANG can advertise the virtual subnets before remote clients
connect. Using the other techniques, the ANG would only create a host route when the client connected. Because routing protocols may take as lon g as 30 seconds per router to propagate a host route , the client may remain unreachable for a period of time.
H Creating individual host routes for each r emote client as they connect
may overload the network’s routers. Because ANG-5000s support 5000 tunnels (ANG-3000s support 500 tunnels), each router may become burdened with 5000 routes in its route table.Virtual subnets can be quickly and easily scaled up to accommodate large number of remote clients. You can modify the subnet mask for an existing virtual subnet to provide additional addresses or create entire new virtual subnets.
28 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Figure 12 shows a sample corpor ate network that employs two virtual subnets. Each virtual subnet provides up to 255 client IP addresses depending upon the subnet mask used. By assigning different virtual subnets to each group, you can control what devices members of the group can access once they are connected.
Before You Begin
Aurorean Remote Clients
INTERNET
Virtual Subnet #1
192.168.1.0
Server #1
Aurorean
Firewall
200.100.200.0
Network
Gateway
Virtual Subnet #2
192.168.2.0
Router
200.100.201.0
Server #2
Figure 12 Remote Client Virtual Subnet Usage
For example, because Server #1 resides on the same network segment as the ANG, all remote clients can access this se rve r regardless of the virtual subnet that provided their address. If you enable RIP or OSPF on the ANG Trusted interface, the router in this diagram will learn about b oth virtual subnets. However , if you enable only static routing on the ANG Trusted interface, you can limit access to the 200.100.201.0 subnet to users that receive address from Virtual Subnet #1. To accomplish this, you m ust create two static routes:
RiverMaster Administrators Guide 29
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
H Using RiverMaster, adding a static route for all addresses in the
Virtual Subnet #1 range with the routers IP address as the default gateway.
H On the router, create a static route to forward all packets addressed
with IP addresses in the Virtual Subnet #1 range to the IP address of the ANG Trusted interface.
With this arrangement, remote clients that receive addresses from Virtual Subnet #1 will be able to access Server #2. Without a static route, remote clients that receive addresses from Virtual Subnet #2 will be unable to access Server #2 or any other device on the 200.100.201.0 segment
Virtual Subnets for Site-to-Site and Remote Access Tunnel Servers
When you set up a site-to-site tunnel in co njunction with remote access service, we recommend creating separate groups and assigning separate virtual subnets for all your site -to -site and remote access users. This is necessary because RIP does not forward knowledge of a route over the interface from which it learned of that route. So if a remote client and a site-to­site tunnel obtain their virtual IP addresses from the same virtual subnet on the terminating ANG, then that remote access client will not be able to learn the routes that are known to the initiator of the site-to-site tunnel. This condition does not apply to a terminating ANG, though.
As shown in Figure 13, if ANG1 initiates a tun nel connection to ANG2, RIP will broadcast knowledge of ANG1s associated networks A, B and C to ANG2 just as it will propag ate knowledge of ANG2s assoc iated networks X, Y and Z to ANG1. Then, if the virtual subnet 10.10.10.0 is created on ANG2 for use by ANG1 site-to-site clients and is shared with remote Aurorean clients, the Aurorean users cannot access networks A,B, and C on ANG1 because they have no knowledge of those networks.
To remedy this situation, create virtual subnet 187.14.57.0 on ANG2 for Aurorean users. RIP will broadcast knowledge of this route to ANG2 enabling Aurorean users to dial into ANG1 as well as ANG2.
30 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Before You Begin
Network A
Network B
Network C
ANG1
10.10.10.2
Learned
Routes:
X, Y, Z
Aurorean
10.10.10.3
Site-to-Site Tunnel
Learned
Routes:
X, Y, Z
INTERNET
ANG2
Learned
Routes:
A, B, C
Virtual Subnet
10.10.10.0
Network X
Network Y
Network Z
Figure 13 Virtual Subnets for Site-to-Site and Remote Access Tunnels
For instructions on creating virtual subnet s fo r IP ad dress and IPX network number allocation, refer to Virtual Subnetting on pa ge 50.
Intelligent Client R outing
Enterasys Networks Intelligent Client Routing feature provides you with a measure of control over a Aurorean Client users access to the Internet. When enabled (this feature is enabled by default), Intelligent Client Routing allo ws remote clients to browse the Internet directly, out side of the tunnel. For example, if a remote client tries to browse the Internet while tunneled into the corporate network, packets bound for any destination within the Internet are sent down the tunnel into the ANG and then back out th e networks Internet gateway.
When Intelligent Client Routing is en abled, the ANG exports routes over the tunnel to the client. Based on this information, the client determines if the destination address can only be reached over the tunnel or can be reached directly on the Internet. Figure 14 contrasts how packets that are destined for an Internet server are routed with the Intelligent Client Routing feature enabled or disabled.
If you allocate a non-routable IP address to a remote client from a virtual subnet, you may need to enable Intelligent Client Routing to allow the remote client to browse the Internet.
RiverMaster Administrators Guide 31
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Packets that are addressed with non-routable addresses are typically blocked by firewalls and Internet gateways and will be dropped by any Internet router. The only exceptions to this rule are devices such as “proxy servers that perform a network address translation (NAT) to dynamically re-address packets as they leave the corporate network. If you do not have a NA T device, you can enable Intelligent Client Routing so that packets sent from the Aurorean Client computer to an Internet destination are addressed with the computers own IP address (not the non-routable address allocated from the virtual subnet).
Intelligent Client Routing DISABLED
INTERNET
Aurorean Client
Aurorean Client
Packets addressed to server on Internet
POP
The Tunnel
Internet
Server
Intelligent Client Routing ENABLED
INTERNET
The Tunnel
Internet
Server
Router Firewall
Router
Firewall
Aurorean
Network Gateway
Aurorean
Network Gateway
Figure 14 Aurorean Virtual Network’s Intelligent Client Routing Feature
32 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
NAT Server
RiverMasters NAT server feature provides support for security conscious administrators who want to conceal the physical IP address of their system (ANG or another Gateway) without affecting Aurorean service. By configuring a NAT Server with an alias IP address for the ANG (refer to page 41 for instructions), the real IP address of the ANG will remain hidden and any IP address received by the NAT Server will be translated to the real IP address of the destination for all incoming clients. This ensures that clients access the correct IP address and build a tunnel connection to the ANG without revealing physical addresses. The process is reversed for clients on the corporate LAN seeking to dial up remote destinations.
In Figure 15 below, the IP addresses r eceived at the NAT Server fo r Servers #1, #2 and the ANG are translated into the real IP addresses of the destination servers.
Before You Begin
INTERNET
NAT
Server
Server #1 Server #2
200.57.115.15 200.57.115.23 200.57.115.18
Aurorean
Policy
Server
PC
Aurorean Client
NAT Server Received IP Addresses
Server #1: 165.32.46.34 Server #2: 165.32.46.115 ANG: 165.32.46.98
Aurorean
Network
Gateway
PC
RiverMaster Administrators Guide 33
Figure 15 Aurorean Virtual Network’s NAT Server Feature
Before You Begin
Site-to-Site Tunnels
Chapter 3
Configuring an ANG-3000/7000
NOTE
Auroreans NAT Server implementation cannot be employed as a client NA T wher e, for example, it operates within a cable modem/ISP topology. Auroreans NAT Server implementation is server-centric.
Aurorean site-to-site tunnels optimize service between remote offices and their remotely linked corporate LANs. This conf iguration is similar to a remote access Aurorean connection in the sense that both configurations originate tunnels from an ANG and terminate the tunnel at a remote site. The site-to-site tunnel configuration differs from the typical ANG model in the sense that the remote server and tunnel must be configured with several network values which identify the remote server to the lo cal ANG. Figure 16 displays two site-to-site configurations of Regional Offices A and B connected to a local ANG and both remote offices connected together, as well as a remote access connection into Corporate Headquarters.
Aurorean Client
Aurorean Client
Corporate
Headquarters
Firewall
Server #1 Server #2
Remote access tunnel
INTERNET
Aurorean
Network Gateway
Aurorean
Policy
Server
Aurorean
Network
Gateway
Aurorean
Network
Gateway
Regional Office A
PC
Regional Office B
PC
Site-to-Site tunnel
PC
PC
34 RiverMaster Administrators Guide
Figure 16 Site-to-Site Configuration
Chapter 3
Configuring an ANG-3000/7000
When corporate networks are linked via one or more tunnels, users can utilize applications over these LA Ns simply by choosing a netwo rk ­supported program or by using Windows Explorer to find a destination server. Using Aurorean Client to dial up a remote connection is not required.
Remote Aurorean site-to-site connections are set up by first adding a remote ANG to an existing ANG configuration, then adding the tunnel itself. This is done by configuring a user on that server with the following values: an IP address or Fully Qualified Domain Name (FQDN) for the server , a user name and password, and a tunnel protocol (either IPSec or PPTP). These are all the values required to make the connection. We recommend that you enable Intelligent Client Routing on both Aurorean Virtual Network Network Gateways so clients accessing the tunnel remotely or locally can access clients on the far end of the network.
Before You Begin
NOTE
Enable at least on e r outing protocol ( RIP v 1, RIP v 2 or OS PF ) o n t he ANG. Refer to Chapter 3 for instructions.
Refer to Adding a Remote Server on page 68 to configure a site-to-site tunnel.
AutoLink Recovery
Auto LinkRecovery (ALR) extends the fault isol ati on and recovery capabilities of the Aurorean Client to include automatic fail-over to a backup Aurorean Virtual Network system in the event of a service outage or VPN hardware failure.
To support ALR, a second Aurorean V i rt ual Network sys t em AP S, ANG, and RiverMaster management application) is required. The secondary Aurorean V irtual Network system operates in parallel but independently of the primary Aurorean Virtual Network system. Each system must be located on the same corporate network, but can be physically situated at different sites, to support disaster recovery, as shown in Figure 17. For more detailed information, refer to Viewing Aurorean Alternate Address Information on page 42.
RiverMaster Administrators Guide 35
Before You Begin
Chapter 3
Configuring an ANG-3000/7000
Primary
Aurorean
System
Aurorean
Policy
Server
Aurorean
Network Gateway
Primary & Secondary
RiverMaster
INTERNET
Trusted network
Primary RM session
Secondary RM session
External
Authorization
Server
Aurorean Client
Network Gateway
Secondary
Aurorean
System
Aurorean
Aurorean
Policy
Server
Figure 17 Auto Link Recovery Architecture
If the primary Aurorean Virtual Network system fails or is unreachable due to Internet congestion, corporate ISP outage, or router malfunction, the secondary Aurorean Virtual Network system provides continued VPN service to remote users and branch offices.
From the standpoint of network topology, both Aurorean Virtual Network systems share the same Management domain name although they are physically discrete. Also, a RiverMaster manag ement application serving each Aurorean Virtual Network system is accessible at and operates from a single Windows NT/2000 computer. The Aurorean Virtual Network system pairs can handle authentication through a shared database if an external service such as RADIUS or SecurID is used. ALR also supports Enterasys authentication via the APS database although this requires that user information be manually replicated in each Aurorean Virtual Network system. For more detailed information, refer to the AutoLink Recovery Application Note.
36 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
General Aurorean Network Gateway Settings
General Aurorean Network Gateway Settings
General network settings for the ANG include:
H The current and possible future IP addresses for the server. H Enabling Aurorean Virtual Networks Intelligent Client Routing
feature which provides you with a measure of control over a Aurorean Clients access to the Internet.
H Addresses for the Domain Name System (DNS), Windows Internet
Name Service (WINS), and Network Address Translation (NAT) servers used by remote clients for name resolution.
To set general network settings for th e ANG, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on General to display the general network settings tab pages.
A sample General settings window appears as shown in Figure 18. The IP Address f ield is re ad-only and di splays an addr ess as signed to the ANG during installation. If the ANG is equipped with a single Ethernet interface, this field shows the address of the Trusted port. If the ANG is equipped with dual Ethernet interfaces, this field shows the address of the External port.
RiverMaster Administrators Guide 37
General Aurorean Network Gateway Settings
Chapter 3
Configuring an ANG-3000/7000
The Aurorean Network Gateway IP address is set when the servers are installed and displayed here as read-only
Click here to allow remote users to directly browse the Internet while they are tunneled into the corporate network
Figure 18 General Aurorean Network Gateway Settings
If you plan to change the Aurorean Network Gateways IP address in
5
the future, enter the new address in the Future IP Address field; otherwise, leave this field blank and continue with the next step.
When you build a custom Aurorean Client installatio n kit for your remote users (as described in Chapter 6), the ANGs IP address is saved as part of the kit. Aurorean Client needs this address to locate the ANG across the Internet and create a tunnel. If you enter an IP address in the Future IP Address field, the kit will contain both IP addresses that appear on this pullout. If Aurorean Client cannot locate a ANG by first using the standard IP address, it will automatically use the future IP address. If connecting to thi s ad d ress is unsuccessful, a user can enter an IP address in the Alternate Tunnel Server IP address field in Aurorean Client. Refer to the Aurorean Client Users Guide for more information.
38 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
6
To allow remote users to browse the Internet directly while they are tunneled into the corporate network, place a check next to Enable Intelligent Client Routing on the General page.
For more information on Auro rean Virtual Networks Intelligent Client Routing feature, refer to Intelligent Client Routing on page 31.
NOTE
The Reset button returns any altered values to their earlier setting.
7
Click the DNS tab.
The DNS server addresses tab page appears as shown in Figure 19.
General Aurorean Network Gateway Settings
Figure 19 DNS Server Addresses
Click here to open the Configuration pullout
RiverMaster Administrators Guide 39
General Aurorean Network Gateway Settings
8
In the Primary DNS and Secondary DNS fields, enter the IP addresses of DNS servers on your network.
You must identify a primary DNS server; the secondary DNS server is optional. The primary and secondar y labels indicate the search order (primary first and then secondary). Select DNS servers that can resolve the names of network devices that remote clients must access.
CAUTION
Not specifying a value for both primary and secondary DNS and WINS servers may cause connection problems on networks with Windows NT clients. To avoid this possibility, enter the IP address used on your primary DNS server in all DNS/WINS fields even if you do not have a secondary DNS or primary or secon d ary WINS server installed on your network.
Chapter 3
Configuring an ANG-3000/7000
9
Click the WINS tab.
The tab page for Windows Internet Name Service (WINS) server addresses appears as shown in Figure 19.
Click here to open the Configuration pullout
40 RiverMaster Administrators Guide
Figure 20 WINS Server Addresses
Chapter 3
Configuring an ANG-3000/7000
10
In the Primary WINS and Secondary WINS fields, enter the IP addresses of WINS servers on your network.
If your r emote clients us e standard Microsoft Dial-Up Networking (DUN) on the corporate network, you must complete these fields to enable browsing and communication with other devices in the Network Neighborhood.
11
Click the NAT tab.
The tab page for the Network Address Translation (NAT) server address appears as shown in Figure 21.
General Aurorean Network Gateway Settings
Click here to open the Configuration pullout
Figure 21 NAT Server Address
12
In the NAT field, enter the IP Address of the NAT server on your network.
The IP address you enter here is the address that Aurorean users will receive in the installation kit as their destination address - the alias external IP address of the ANG.
RiverMaster Administrators Guide 41
Viewing Aurorean Alternate Address Information
NOTE
You must configure an IP address on your NAT Server that correlates with the alias IP address you set here.
13
Click Apply to save your changes.
To return the parameters to their original settings without saving your changes, click Reset.
14
Do one of the following:
If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional ANG network settings.
If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional work is required.
Chapter 3
Configuring an ANG-3000/7000
Viewing Aurorean Alternate Address Information
The Aurorean Alternate Address Info window displays IP addresses of the alternate APS and ANG systems, as well as those of the primary system.
To invoke the display, perform the following steps:
1
Open the Configuration pullout.
2
Click the arrow on the Configure toolbar item at the top left edge of the pullout.
3
Choose Alt IP Addresses as shown in Figure 22.
The Aurorean Alternate Address Info window appears as shown in Figure 22.
4
View the ANG and APS Primary and Secondary (if previously configured) IP addresses.
NOTE
Primary addresses cannot be modified in this window.
42 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
T unnel Protocols
Click here to open the Alt Addresses window
Click here to select the Alt Address option
Click here to open the Configuration pullout
Figure 22 Aurorean Alternate Address Info Window
If you want to change either the ANG or APS Alternate IP address,
5
click Modify, enter a value and click Update.
Tunnel Protocols
The ANG supports two tunnel protocols:
H Point-to-Point Tunneling Protocol (PPTP) developed by Microsoft,
3Com and others that uses Point-to-Point (PPP) protocol and Generic Routing Encapsulation (GRE ) to route packets through the Internet.
H IP Security (IPSec) protocol developed by the Internet Engineering
Task Force (IETF) that adds security extensions for encryption and message authentication to IP protocol.
For each tunnel protocol, you can configure authentication, encryption, and compression parameters. To set tunnel protocol parameters, perform the following steps:
RiverMaster Administrators Guide 43
Tunnel Protocols
Configuring an ANG-3000/7000
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Tunnel Protocols to display PPTP and IPSec protocol tab pages.
The Tunnel Protocols window appears as shown in Figure 23.
Chapter 3
Click here to access the Gateway configuration windows
Click here to open the Configuration pullout
Figure 23 Tunnel Protocol General Settings
If you want to prevent remote clients from using one of the tunnel
5
protocols, select the protocol and click Remove.
By default, PPTP and IPSec are both enabled for client use. You normally control protocol usage on a per group basis by selecting the protocol when you assign group policies (refer to Chapter 6 for instructions). If you want to globally disable a protocol, you can remove it from this list. If you have removed a protocol and want to reinstall it, click Add once and when the high lighted tunnel protocol pops up, click Add again. You are not required to click Apply.
44 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
6
Click the Authentication tab.
Figure 24 shows the authentication parameters available for each tunnel protocol.
7
Do one of the following:
Choose IPSec from the Protocol pull down menu.
For PPTP, no additional work is required. Unlike IPSec, PPTP
T unnel Protocols
- Use the information in Table 2 to select the IPSec Signature Algorithm that determines how IPSec packets exchanged between the ANG and Aurorean users are signed and verified.
- Set the Key Lifetimes Time Period and Data Transferred value. The default values are 60 minutes for T ime Period and Disabled for Data Transferred. Refer to Table 2 to select the Ti me Per iod and Dat a Transferr ed va lues whi ch set ho w long the key lifetime should last in terms of time ela psed or kilobytes amassed .
- Click Apply.
does not authenticate individual packets; instead, PPTP relies on user authentication using MS-CHAP. After the remote user is authenticated, all PPTP packets are allowed access.
IPSec
Figure 24 Tunnel Protocol Authentication Settings
PPTP
RiverMaster Administrators Guide 45
Tunnel Protocols
Chapter 3
Configuring an ANG-3000/7000
Table 2 IPSec Authentication Parameters
Parameter Explanation
None Disables the Signature Algorithm for IPSec packets; individual
packets are no longer signed and verified during transmission.
HMAC-SHA Enables hashing messageauthenticationcodes (HMAC) that are
generated using the SHA cryptographic hashing function. HMAC­SHA is generally regarded as stronger, more secure cryptographic function than HMAC-MD5.
HMAC-MD5 Enables hashing message authentication codes (HMAC) that are
generated using the Rivest MD5 message digest algorithm hashing function. While not as strong cryptographically as
HMAC-SHA, HMAC-MD5 provides better performance. Time Period Interval after which a new key is generated. Data
Transferred
8
Click the Encryption tab.
9
Do one of the following:
Lifetime volume (in kilobytes) of the key after which a new key is
generated.
To set IPSec encryption parameters, choose IPSec from the
Protocol menu. IPSec encryption parameters are shown in Figure 25. Select the IPSec Encryption Algorithm that determines how IPSec packets exchanged between the ANG and Aurorean Client remote users are encrypted.
To set PPTP encryption parameters, choose PPTP from the
Protocol menu. PPTP encryption parameters are shown in Figure 25. Select the Microsoft Point-to-Point Encryption (MPPE) algorithm that determines how PPTP packets exchanged between the ANG and Aurorean remote users are encrypted.
46 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
T unnel Protocols
ARCFOUR is a public domain algorithm designed to work with RC4
DES is a government standard block cipher that uses a 56-bit key. Triple-DES uses three keys to achieve the equivalent of 112-bit encryption.
IPSec
PPTP
Figure 25 Tunnel Protocol Encryption Settings
RiverMaster Administrators Guide 47
Tunnel Protocols
Chapter 3
Configuring an ANG-3000/7000
Table 3 Encryption Parameters
Tunnel Protocol
IPSec None Disables encryption on the tunnel; because this results
Parameter Explanation
in a less secure connection, this setting is not recommended.
ARCFOUR 40 bit Enables a 40-bit key public domain algorithm that is
designed to work with Rivest Cipher 4 (RC4), a stream-based cipher method that supports both 40-bit and 128-bit keys. Using RC4, data packets can be encrypted as they are received instead of in blocks.
ARCFOUR 128 bit Enables a 128-bit key version of ARCFOUR (described
above).
DES Enables Data Encryption Standard (DES), a block
cipher method that uses56-bit keys. Using DES, data is encrypted in fixed-size blocks and packets are padded to become a multiple of the block size.
Triple-DES Enables a version of DES (described above) that
employs a DES encryption with one key, a decryption with a second key, and then another encryption with a third key. The result is equivalent to DES with a 112-bit key.
PPTP MPPE (40 bit) Enables 40-bit key Microsoft Point-to-Point Encryption
MPPE (128 bit) Enables 128-bit key MPPE on the tunnel. To support
10
Click the Compression tab.
48 RiverMaster Administrators Guide
(MPPE) which generates a key based on a hash of the users password and invokes RC4 encryption.This type of encryption is supported by Windows 95/98/NT/2000/ME computers without any additional software.
128-bit keys, the Aurorean computer must receive a 128-bit encryption upgrade available from Microsoft. This upgrade may not be available to users outside the U.S.
Chapter 3
Configuring an ANG-3000/7000
11
Enable or disable MPPC as required.
For both IPSec and PPTP protocols, Microsoft Point-to-Point Compression (MPPC) is currently the only compression technique supported by the ANG. By default MPPC compression is enabled for both protocols.
NOTE
Compression settings are applied automatically to both tunnel protocols. That is, disabling compressi on on IPSec also disables comp ression on PPTP.
T unnel Protocols
Click Apply to save your changes.
12
To return the parameters to their original settings without saving your changes, click Reset.
RiverMaster Administrators Guide 49
Figure 26 Tunnel Protocol Compression Settings
Virtual Subnetting
13
Do one of the following:
If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional ANG network settings.
If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional work is required.
Virtual Subnetting
Virtua l subnets fall into two categories:
H IP subnets that serve as IP address pools for allocation to remote
clients when they connect.
H An IPX network number that is shared by all remote clients when
they connect and use IPX protocol to access Novell NetWare servers.
Chapter 3
Configuring an ANG-3000/7000
IP Subnetting
To set up virtual subnets of IP addresses to allocate to remote users, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Subnetting to display IP and IPX subnet tab pages.
5
Click the IP Subnets tab if it is not already displayed.
A sample IP subnet window is sho wn in Figure 27.
50 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Click here to access the Gateway configuration windows
Virtual Subnetting
Click here to open the Configuration pullout
Figure 27 IP Subnet Configuration for Remote Clients
NOTE
Click Remove to delete any configured virtual subnets.
6
Click Add.
The Add An IP Virtual Subnet window appears as seen in Figure 28.
RiverMaster Administrators Guide 51
Figure 28 Adding An IP Virtual Subnet
Virtual Subnetting
Configuring an ANG-3000/7000
7
Enter the starting address of the subnet in the Address fields.
You can use actual IP addresses from your network or non-routable IP address ranges (such as 192.168.x.x for a Class C network).
8
Enter a subnet mask to define the subnet range in the Mask field.
9
Do one of the following:
Click Add to add the new virtual subnet. Click Cancel to close the window without saving your changes.
10
Repeat Step 6 through Step 9 for each virtual subnet you require.
11
Click Apply to save your changes.
To return the parameters to their original settings without saving your changes, click Reset.
Chapter 3
12
Do one of the following:
If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional ANG network settings.
If you are finished with the ANG network configuration and you
want to put the new network settings into effect, no additional work is required.
IPX Virtual Networks
To set up a single IPX network number to allocate to remote users, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Subnetting to display IP and IPX subnet tab pages.
5
Click the IP Virtual Networks tab if it is not already displayed.
A sample IPX virtual networks window is shown in Figure 29.
52 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Click here to access the Gateway configuration windows
Virtual Subnetting
Click here to open the Configuration pullout
Figure 29 IPX Subnet Confi guration for Remote Clients
In the IPX Virtual Network Number field, enter an IPX network
6
number to be used by all remote clients. This number must be unique.
The network number must be between 1 and 8 hexadecimal digits (1 to FFFFFFFD). This network number will be attached to all IPX frames received from remote clients.
NOTE
Zero (0) and FFFFFFFF addresses are invalid due to NetW are restrictions. FFFFFFFE is reserved for the default route.
7
Click Apply to save your changes.
To return the parameters to their original settings without saving your changes, click Reset.
RiverMaster Administrators Guide 53
Routing
Routing
Chapter 3
Configuring an ANG-3000/7000
8
Do one of the following:
If you ar e set ti ng up your Aurorean Vi r t u a l Net work for the first
time, continue with the next subsection to configure additional ANG network settings.
If no additional ANG network conf iguration is required and you
want to put the new network settings into effect, reset the ANG.
Configuring the routing behavior of the ANG con sists of two general steps:
H Setting parameters for the two routing protocols supported, RIP and
OSPF.
H Selecting routing protocols for each ANG Ethernet interface.
Click here to access the Gateway configuration windows
Click here to open the Configuration pullout
Figure 30 Aurorean Network Gateway Routing Configuration
54 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
Setting Routing Protocol Parameters
To access RIP and OSPF parameters for the ANG, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Routing to display the routing parameter tab pages.
5
Click on the Protocols tab to display protocol parameters for RIP and OSPF.
Routing
6
Do one of the following:
To set RIP paramete rs, choose RIP from the Ro uting Protocols
menu and click Properties; refer to the next section Setting RIP Properties for additional instructions.
T o set OSPF parameters, choose OSPF from the Routing Protocols
menu and click Properties; refer to Setting OSPF Properties on page 57 for additional instr u ctions.
Setting RIP Properties
To configure RIP properties for the ANG, perform the following steps:
1
Perform the steps in the previous section to access RIP properties.
The RIP Configuration window should appear as shown in Figure 31.
RiverMaster Administrators Guide 55
Routing
Chapter 3
Configuring an ANG-3000/7000
If this list is blank, the Aurorean Network Gateway accepts RIP updates from all routers on the subnet. You can limit the amount of updates that the Aurorean Network Gateway will accept by specifying individual routers in this list.
Figure 31 RIP Routing Protocol Configuration
2
To turn on RIP for IPX packets, click Enable under IPX RIP Enable; otherwise, continue with the next step.
3
Do one of the following:
To allow the ANG to accept RIP updates from all routers on the
same subnet, no further work is required. Skip to Step 6.
To configure “trusted individual routers to supply RIP updates
to the ANG, click Add and continue with the next step.
The Add A Trusted Gateway window appears as shown in Figure 32.
Figure 32 Adding A Trusted Gateway for RIP
4
In the Address field, type the address for the router that the ANG will accept updates from and click Add.
You can later modify this address or delete it using the Modify and Remove butt ons.
56 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
5
Repeat Step 3 and Step 4 for each gateway required.
6
Do one of the following:
Click Apply to save your changes. Click Cancel to close the window without saving your changes. Click Reset to return the RIP parameters to their default settings.
SettingOSPFProperties
Using the RiverMaster, you can define the following OSPF parameters:
H Area ID shared by the routers and the ANG. H Router ID that identifies the ANG to other devices in the OSPF area.
The default value for this address is the IP address assigned to the Trusted interface on the ANG.
H Authentication algorithm used to accept or reject routing table
updates from other routers.
Routing
To route packets for remote clients using OSPF, the ANG also uses a set of fixed operating parameters. Table 4 lists these fixed OSPF parameters, which use common default values and cannot be changed.
Table 4 Fixed OSPF Parameters
Parameter Meaning Fixed Value
Preference Determines how OSPF routes compete with
routes from other protocols (such as RIP) in the ANGs routing table. The route with the lowest preference value is selected.
Cost Used when exporting a non-OSPF route from
the ANGs routing table into OSPF as an autonomous s ystem (AS).
Type Indicates which type of autonomous systems
that routes exported from the ANGs routing table become.
150
1
Type 1 AS
AS Export Interval
RiverMaster Administrators Guide 57
Specifies how often autonomous system link advertisements are generated and exported.
Once per second
Routing
Chapter 3
Configuring an ANG-3000/7000
Table 4 Fixed OSPF Parameters
Parameter Meaning Fixed Value
AS Export Limit
Interface Priority
Specifies howmany autonomous systemsare generated and exported each time.
Determines the ANGs priority for becoming the designated router in the area.
100
0(the ANG cannot be the designated router)
To configure OSPF properties for the ANG, perform the following steps.
1
Perform the steps in Setting Routing Protocol Parameterson page 55 to access OSPF properties.
The OSPF Configuration window appears as shown in Figure 33.
T ype the area ID shared by the ANG and routers within the subnet in
2
theOSPFAreaIDfields.
3
T ype the IP address for the Trusted interface in the OSPF Router ID fields.
58 RiverMaster Administrators Guide
Figure 33 OSPF Routing Protocol Configuration
Chapter 3
Configuring an ANG-3000/7000
4
From the OSPF Authentication Algorithm menu, choose the authentication algorithm used by routers on your network.
If the routers on your network do not require passwords to accept OSPF updates, set the algorithm to None and continue with the next step.
5
Do one of the following:
Click Apply to save your changes. Click Cancel to close the window without saving your changes. Click Reset to the return the OSPF properties to their default
Routing Interfaces
The ANG is equipped with two Ethernet interfaces:
H The Trusted interface should be connected to a protected network
segment (one behind a firewall or router that offers protection against unauthorized access). Typically, you should enable a routing protocol (RIP, OSPF, or both) on the Trusted interface so that the ANG can advertise to other devices that its virtual subnets are reachable to the corporate network.
Routing
settings.
H The External interface can be connected to a network segment that
resides outside a firewall and offers unfiltered access to the Internet. You must create a static route between the External interface and the router that serves as the gateway to the Internet. You cannot enable RIP or OSPF on this interface.
RiverMaster Administrators Guide 59
Routing
Chapter 3
Configuring an ANG-3000/7000
Click here to open the Configuration pullout
Click here to access the Gateway configuration windows
Figure 34 Aurorean Network Gateway Routing Interfac e Configuration
Adding or Removing a Routing Protocol for an Interface
To add or remove a routing protocol from an interface, perform the following steps:
1
Open the Configuration pullout.
2
In the list of Aurorean devices, expand the tree list under Servers (click the + symbol).
3
Expand the tree list under the name of your ANG.
4
Click on Routing to display the routing parameter tab pages.
5
Click on the Interfaces tab to display the configuration for each ANG network interface.
60 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
6
Select the interface (Trusted or External) from the list under Network Interfaces.
The protocols already enabled for this interface appear in the Routing Protocols list.
7
Do one of the following:
To add a protocol to the trusted interface, click Add and continue To remove a protocol, select the protocol from the Routing
8
When the Add an Interface Routing Protocol window appears as shown in Figure 35, select a routing protocol and click Add.
Routing
with the next step. Protocols list and click Remove. Skip to Step 10.
Figure 35 Adding a Routing Protocol
NOTE
For the External interface, you can only add or remove static routing. Because the External interface is optimized for tunnel protocols only, you cannot use RIP or OSPF on this interface.
9
Do one of the following:
If you are adding RIP to the interface, perform the steps in
Configuring RIP for the Interface on page 62.
If you are adding OSPF to the interface, perform the steps in
Configuring OSPF on an Interface on page 64.
If you are adding a static route to the interface, perform the steps
in Creating Static Routes on page 65.
10
Do one of the following:
Click Apply to save the routing protocol configuration changes. Click Reset to the return the interfaces protocol configuration to
its original setting.
RiverMaster Administrators Guide 61
Routing
Configuring an ANG-3000/7000
Configuring RIP for the Interface
To configure RIP on an interface, perform the following steps:
1
Add RIP as described in the previous section or select RIP from the Routing Protocols list and click Properties.
The RIP Interface Configuration window appears as shown in Figure 36.
These values are used to authenticate RIP updates from routers on the network
Chapter 3
Figure 36 Routing Interfaces Configuration - RIP
Choose the version of RIP to use on this interface.
2
RIP Version 1 uses IP broadcast packets for periodic announcements of reachable subnets. RIP Version 2 is an enhanced version of RIP that uses IP multicast packets for announcements.
3
In the RIP Authentication fields, choose the algorithm used by routers on your network.
If the routers on your network do not require passwords to accept RIP updates, set the algorithm to None and skip to Step 7.
62 RiverMaster Administrators Guide
Chapter 3
Configuring an ANG-3000/7000
NOTE
RIP update authentication is only supported by RIP Version 2. If the routers on your network only support RIP Version 1, you cannot enter values in the RIP Authentication fields. Refer to Configuring RIP for the Interface on page 62 for instructions on selecting the version of RIP used on your network.
4
T ype the RIP authentication password used by routers on your network in the Password field.
RIP authentication passwords are used by routers to determine if they should accept updated routing information sent f rom another router. If your routers do not authenticate updates, leave this field blank and skip to Step 2.
Routing
5
T ype the same password in the Re-Type Password field exactly as you entered it in Step 4.
6
Set the RIP Route Importing/Exporting options as follows:
To allow the ANG interface to learn new routes, place a check
next to Enable Import. If you enabled the Intelligent Client Routing feature, you should turn on Enable Import to allow the ANG to pass known reachable addresses to the remote client.
To cause the ANG to advertise its known routes, place a check
next to Enable Export. This setting is required to allow the ANG to advertise the reachability of virtual subnets to other devices on the network.
7
Do one of the following:
Click Apply to save the RIP configuration changes. Click Cancel to close the window without saving your changes. Click Reset to the return the interfaces protocol configuration to
its original setting.
RiverMaster Administrators Guide 63
Routing
Configuring an ANG-3000/7000
ConfiguringOSPFonanInterface
To enable OSPF on an interface, perform the following steps:
1
Add OSPF as described in Adding or Removing a Routing Protocol for an Interfaceon page 60 or select OSPF from the Routing Protocols list and click Properties.
The OSPF Interface Configuration window appears as shown in Figure 37.
Chapter 3
Figure 37 Routing Interfaces Configuration - OSPF
2
T ype the OSPF password used by routers on your network in the Authentication Password field.
OSPF authentication passwords are used by routers to determine if they should accept updated routing information sent f rom another router. If your routers do not authenticate updates, leave this field blank.
NOTE
Passwords are limited to 8 characters or less
3 Type the same password in the Re-Type Authentication Password
field exactly as you entered it in Step 2.
64 RiverMaster Administrators Guide
Chapter 3 Routing
Configuring an ANG-3000/7000
4 Do one of the following:
Click Apply to save the OSPF parameter changes. Click Cancel to close the window without saving your changes. Click Reset to the return the interfaces protocol properties to
their default settings.
Creating Static Routes
To configure a static route between an ANG interface and another device, perform the following steps:
1 Open the Configuration pullout. 2 In the list of Aurorean devices, expand the tree list under Servers
(click the + symbol).
3 Expand the tree list under the name of your ANG. 4 Click on Routing to display the routing parameter tab pages. 5 Click on the Interface tab to display the routing protocol(s) selected
for each interface.
6 From the Interfaces menu, choose the ANG Ethernet interface to
configure (External or T rusted).
7 In the Routing Protocol Selection list, double click Static Routes and
click Add in the Static Route Configuration window.
The Static parameter tab page is displayed as shown in Figure 38.
RiverMaster Administrators Guide
65
Routing Chapter 3
Configuring an ANG-3000/7000
Figure 38 Static Routing Configuration
8 In the Gateway address fields, type the IP address of a gateway on
this subnet.
For External interfaces, enter the IP address of the router that provides access to the Internet.
9 In the Reachable Subnet fields, type a starting IP address and subnet
mask to define a subnet.
Packets received by the ANG are statically routed to the gateway you specified. To forward all packets to the gateway when there is no other reachable “next hop” address for a packet, enter an address of
0.0.0.0 and a subnet mask of 0.0.0.0.
CAUTION
Configuring a default static route (0.0.0.0/0.0.0.0) on the Trusted inte rface of the ANG disables Intelligent Client Routing. Refer to “Intelligent Client Routing on page 31 for more information.
66
RiverMaster Administrators Guide
Chapter 3 Routing
Configuring an ANG-3000/7000
10 Click Add.
The static route you configured appears in the Internal Static Routes display.
11 Do one of the following:
Click Apply to create the static route. Click Reset to the return the interfaces protocol properties to
their default settings.
Click Cancel to close the window without saving your changes.
RiverMaster Administrators Guide
67
Adding a Remote Server Chapter 3
Configuring an ANG-3000/7000
Adding a Remote Server
An ANG can be added at a remote location in a Site-to-Site configuration. This sect ion desc ribes ho w to set up an initiating Network Gateway to connect to a Local or terminating ANG/APS pair.
NOTE
Local ANGs use an accompanying APS; remote ANGs are stand-alone.
These instructions cannot be used to configure a stand-alone ANG connection to another stand-alone ANG (refer to Appendix B for more information).
To add a Remote Network Gateway, perform the followin g steps.
1 Open the Configuration pullout.
Click here to expand the tree list
Click here to add the Remote Gateway or Tunnel
Click here to select the created server or tunnel
2 In the list of Aurorean devices, expand the tree list under gateways
(click the + symbol).
3 Expand the tree list under Remote Servers.
The Tunnel Protocols window appears as shown in Figure 39.
Click here to open the Configuration pullout
Click here to access the Network Gateway configuration
68
Click here to display the configured properties of the selected device
Click
C
Click
Figure 39 Remote Server Display
C
RiverMaster Administrators Guide
Chapter 3 Adding a Remote Server
Configuring an ANG-3000/7000
4 Click Add Remote Server.
The Add Remote Server window appears a s shown in Figure 40.
Type the name of the Remote Server here
Click here to add the server
Click either the IP Address or FQDN button and enter a value in the adjacent field
5 Choose a name for the server in the Remote Server Name window. 6 Click either IP Address or FQDN (FullyQualified Domain Name). If
you choose IP Address, enter an IP address in the fields provided. If you choose FQDN, enter a value in the single field.
The FQDN is the name of the Remote Server as well as its domain. For example: server1.argus.com
7 Type a User Name and User Password and confirm the password in
the fields provided.
This User Name and Password must later be registered in the authentication database of the Remote (terminating) ANG by adding the user to a group (Refer to Chapter 6 for more information).
RiverMaster Administrators Guide
Figure 40 Add Remote Server Window
69
Adding a Remote Server Chapter 3
Configuring an ANG-3000/7000
8 Choose the tunneling protocol: IPSec or PPTP. 9 Click Add.
This action adds the remote ANG to the configuration on your Local ANG. A message will displa y stating you have successfully added the remote serv er.
10 Click Add Remote Tunnel orselect the Remote Server just added and
click Add Tunnel.
The Add Remote Tunnel window appears as shown in Figure 41.
Type the name of the Remote Tunnel here
Click here to add the tunnel
Choose the Remote Gateway name from this pull-down list
Figure 41 Add Remote Tunnel Window
11 Choose a name for the Remote T unnel in the provided field.
70
RiverMaster Administrators Guide
Chapter 3 Adding a Remote Server
Configuring an ANG-3000/7000
12 Click the arrow in the Remote Server Name field to bring up a pull-
down list and select the Remote Server you just added.
RiverMaster types the Server user name and password into the open fields. You may change these settings if necessary.
13 Select Enabled or Disabled in the Enabled State field.
If you select Enabled, the tunnel will be created immediately. Select Disabled if you want to delay enabling the tunnel until configuration is complete at the other end of the tunnel.
14 Click Add.
If the Enabled state was selected earlier, the tunnel becomes operational in a few moments.
NOTE
You can configure additional tunnels to the Remote Server just added by selecting the particular server in the Remote Tunnels displa y, clicking Properties, and clicking Add Tunnel in the Remote Server Properties window.
Changing Server and Tunnel Properties
The information configured for Site-to-Site servers and tunnels can be changed by clicking the Properties buttons on either display.
To change properties for the Remote Server, perform the following steps:
1 Select your Remote Server from the tree list under Remote Servers
and click Properties in the display.
2 When the Remote Server Properties window appears, change any
information and do one of the following:
Click Modify to reconfigure the Remote Server. Click Cancel to close the window without saving your changes. Click Delete to remove the Remote Server configuration.
RiverMaster Administrators Guide
71
Adding a Remote Server Chapter 3
Configuring an ANG-3000/7000
To change properties for the Remote Tunnel, perform the following steps:
1 Select your Remote Tunnel from the tree list under Remote Servers
and click Properties in the display.
The Remote Tun nel Properties window appears as shown in Figure 42.
Click here to update the tunnel
Click here to refresh the values for the Current state and Last try result attributes shown in the Tunnel Protocols window
2 Change any information. If the Remote Tunnel is enabled, select
Disabled in the Enabled State field and do one of the following:
Click Update to reconfigure the Remote Tunnel. Click Cancel to close the window without saving your changes. Click Delete to remove the Remote Tunnel configuration.
If you clicked Update, a window pops up asking if you want to save the modified tunnel. Click Yes or No.
72
Figure 42 Remote Tunnel Properties Window
RiverMaster Administrators Guide
Chapter 3 Adding a Remote Server
Configuring an ANG-3000/7000
3 Re-open the Remote T unnelProperties window and select Enabled in
the Enabled State field if you want to create the tunnel immediately with the reconfigured properties.
If you clicked Update, a window pops up again asking if you want to save the modified tunnel. Click Yes or No.
NOTE
Clicking Refresh displays the status for the Current State and Last Connection Result attributes of the tunnel.
RiverMaster Administrators Guide
73
Setting Up Aurorean Services
Setting Up Aurorean Services
Setting Up Aurorean ServicesSetting Up Aurorean Services
This chapter describes how to perform the following tasks:
H Add an Authorization service plug-in to allow Aurorean Virtual
Network systems to authenticate remote users against a local database on the Aurorean Policy Server, an external Remote Authentication Dial In User Service (RADIUS) server, or an RSA ACE/Server.
H Generate private/public encryption/decryption keys for use with the
IPSec protocol.
H Prepare the Notification server on the APS to send E-mail when
alarm, alert, or notification messages are generated.
4
H Adjust trace levels for Management and Tunnel server services to
generate a cont rolled stream of messages.
H Backup the Management Database to avoid operational down time.
Before You Begin
Before performing the steps in this chapter, you should familiarize yourself with the following Aurorean Virtual Network concepts:
H Authorization plug-in options H Private/public keys for IPSec authentication H Problem notification via E-mail H Trace levels
RiverMaster Administrators Guide
75
Before You Begin Chapter 4
Setting Up Aurorean Services
Authorization Plug- in Options
Within a Aurorean Virtual Network, the APS coordinates remote user authentication. Using an internal software service known as Auth entication and a series of “plug-ins”, the APS can authenticate remote users in three ways:
H Using the Enterasys Authentication plug-in, remote users are
authenticated against a database residing on the APSs hard drive.
H Using the RADIUS plug-in, the APS acts as a RADIUS client,
forwarding authentication requests from Aurorean users to a RADIUS server.
H Using the RSA Security SecurID plug-in, the APS acts a s a native
ACE/Client, forwarding authentication requests from Aurorean users directly to an ACE/Server. This plug-in supports the fail-over function of automatically con necting to a slave ACE/Server if the master fails.
RADIUS Authentication Servers
Aurorean Virtual Network systems support a wide range of RADIUS servers, including:
H Microsoft RADIUS H Funk Softwares Steel-Belted RADIUS H RSA Security ACE/Server that supports RADIUS extensions. This
allows remote users to not only authenticate against a centralized authentication database, but also to take advantage of the strong security offered by SecurID passcodes.
H Novells BorderManager™ Authentication Servi c es (BMAS) running
on a RADIUS server. BMAS is an interface that links dial-in users to the network through Novell Directory Services (NDS). Support for BorderManager is seamless and it requires no configuration on the APS. Refer to BorderManager Enterprise Edition documentation for more information.
76
RiverMaster Administrators Guide
Chapter 4 Before You Begin
Setting Up Aurorean Services
NOTE
Enterasys Networks continually tests interoperability with other RADIUS server vendors. Contact Enterasys Networks Customer Support for an up-to-date list of approved RADIUS serv ers.
Plug-in Planning
You can add multiple plug-ins for RA DIUS or SecurID authentication. Typically, you add one plug-in for each RADIUS or SecurID authentication server on your network and preserve the Enterasys Authentication plug-in for RiverMaster logins. One plug-in must be designated as the default plug-in. When you set up your Aurorean Virtual Network for the first time, the default plug-in is Enterasys Authentication.
When Aurorean users attempt to tunnel into the corporate network, they must present a VPN user name and password for authentication. If the Aurorean Client user presents a simple user name such as BSmith, the user is authenticated against the default plug-in. Aurorean users have the ability to override the default and select another plug-i n by ad ding an “@” symb ol and the identifier for the plug-in. For example, if you add a RADIUS plug-in with the identifier RADIUS1, a Aurorean Client user can select this plug-in by entering a VPN user name such as BSmith@RADIUS1.
Threads
You can accelerate the authentication of multiple users logging in at the same time by increasing the number of threads (logins in progress) the authenticating server will handle. This function is useful if you discover that users are exceeding the timeout value allowed for authentication and are not being connected because too many clients are dialing in simultaneously.
For instructions on customizing the Enterasys Authentication plug-in and adding RADIUS and SecurI D plug-ins, refer to Adding an Authorizat ion Plug-In on page 80.
RiverMaster Administrators Guide
77
Before You Begin Chapter 4
Setting Up Aurorean Services
Private/Public Keys for IPSec Authentication
Aurorean users who tunnel into your network using the IPSec protocol also require an El Gamal public key for authentication. The key is an embedded piece of data used to encrypt and decrypt packets exchanged between Aurorean Client and the Aurorean Network Gateway. A pair of keys , one private and one public, are generated and saved on the APS.
The public key is included in the Aurorean Client installation kit you build and distribute for your remote users (as described in Chapter 6). The exchange of keys is handled entirely by the Aurorean Client application; the user does not need to know or type the public key.
However , if the private key on the APS becomes compromised, you may need to regenerate the private/public key pair and distribute files with the new public key to your remote users. Without the current public key, IPSec users will be unable to tunnel into the netwo r k. For in structions on generating a new private/public key pair, refer to Generating Private/Public Keys on page 91.
Problem Notification
The Notification service that runs on both the Management and Tunnel servers generate messages when the server experiences operational difficulty. The events that trigger these messages fall into three categories:
H Alarms notify you when a significant error occurs with a service
running on a Aurorean Virtual Netw ork system or a general system problem that is preventing the server from operating normally.
H Alerts occur when an error count threshold has been crossed and an
alarm condition is imminent.
H A Problem Notification typically indicates a remote client connection
problem which Aurorean Clients Prescriber feature diagnosed.
These messages appear in the View System Activity pullout and advanced message viewer (as described in Chapter 7) and can also be retrieved from system reports (as described in Chapter 8). For immediate notification wh en one of these events occurs, the APS can send E-mail to one or more persons
78
RiverMaster Administrators Guide
Chapter 4 Before You Begin
Setting Up Aurorean Services
that you select. You must first define a mailing list and then add E-mail addresses for each recipient to this list. You can select which types of messages (alarms, alerts, or problem notifications) will be sent to each address.
For instructions on creating mailing lists for problem notificatio n, refer to Using the Notification Service to Send E-Mail” on page 93.
Trace Levels
The number of messages the Management and Tunnel servers report to RiverMaster can be set on a per se rvice basis. Because so many messages are routinely shared via control traffic between the servers and clients, if a limit were not set on their collection and display they could disrupt Aurorean Virtual Network service. But, having the option to occasionally read these messages can h elp tr oub les hoot se rvic e pr oble ms. R efer to Chap ter 7 for more detailed information on the types of messages displayed.
RiverMaster permits you to set low, medium or high trace levels for the ten available Enterasys services. These levels correspond to varying numbers of messages reported to RiverMaster, dependin g on the service you configure.
RiverMaster Administrators Guide
79
Adding an Authorization Plug-In Chapter 4
Setting Up Aurorean Services
For example, a low trace level set for the Tunnel Mana gement Service will produce messages similar to those in Figure 43.
Note Tunnel Trace messages sent by the tunnel server
Highlighted message here is detailed in description area below
See message text here
Click here for View System Activity pullout
Figure 43 Trace Messages Display
If you read the text for each Tunnel Trace message above, you can follow the chain of protocol messages which signify the communications that occur on a packet level when a client successfully makes a connection. Then, if a client connection subsequently fails, you could compare messages and troubleshoot the problem. For instructions on setting trace levels, refer to Setting Trace Levels on page 97.
Adding an Authorization Plug-In
The Enterasys Authentication plug- in is factory-installed by Enterasys Networks and made the default plug-in. This plug-in is used when you log into the RiverMaster application to ensure that you have administration privileges. To support SecurID and RADIUS authentication, you must add one or more SecurID or RADIUS plug-ins.
80
RiverMaster Administrators Guide
Chapter 4 Adding an Authorization Plug-In
Setting Up Aurorean Services
NOTE
Do not remove the Enterasys Authentication plug-in or convert it into a RADIUS or SecurID plug-in. Without a plug-in of this type, you will not be able to log into RiverMaster.
Enterasys Authentication
To modify the Enterasys Authentication plug-in, perform the following steps:
1 Open the Configuration pullout. 2 In the list of Aurorean devices, expand the tree list (by clicking the +
symbol) under the name of your APS, and expand it again under Auth Service.
Click here to add a new Authorization Plug-in or here to expand the tree list and select or create a plug-in
Click here to access the APS configuration windows
Figure 44 shows the Configuration pullout.
Click here to view Configure pull-down box options
Click here to open the Configuration pullout
Click here to configure the plug-in
RiverMaster Administrators Guide
Figure 44 Configure Authorization Plug-ins Window
81
Adding an Authorization Plug-In Chapter 4
Setting Up Aurorean Services
3 From the list of Plug-ins, select Enterasys Authentication. 4 Click Properties.
The Properties for Plug-in - Enterasys Authenticati on window will appear as shown in Figure 45.
Click here to update the plug-in
5 In the Identifier field, type a name that remote users will use to select
this plug-in.
Aurorean users can include this identifier as part of their VPN user names to override the default authorization plug- in. For example, if you enter Enterasys as the identifier for this plug-in, Aurorean users can specify a user name such as Bob@Enterasy s to ensure that they authenticate against the APS.
82
Figure 45 Enterasys Authentication Plug-in Window
RiverMaster Administrators Guide
Chapter 4 Adding an Authorization Plug-In
Setting Up Aurorean Services
6 Optionally, specify a value in the Num Threads field.
This function allows the specified number of users to simultaneously log in without delay. The range of threads that can be set is 1 to 100, with a default value set to 10.
7 If you want to make this plug-in the default authorization method,
check the Default Plug-In box.
8 Do one of the following:
Click Update to save your changes. Click Cancel to clear the fields without savin g the plug-in.
RADIUS Authorization
To configure the APS to forward authentication requests to a RADIUS server, perform the following steps:
1 Open the Configuration pullout. 2 Choose Authorization Plug-ins from the Configure pull-down box in
the top left corner of the pullout. Or, in the list of Aurorean Virtual Network devices, expand the tree list under the name of your APS (by clicking the + symbol), expand it again under Auth Service and click Make New Plug-in...
The Create New Plug-in window will appear as shown in Figure 46, but without default or configured values.
RiverMaster Administrators Guide
83
Adding an Authorization Plug-In Chapter 4
Setting Up Aurorean Services
Type plug-in name and identifier here
Click here to create the plug-in
Click here to enter RADIUS Plug-in values
84
Figure 46 Sample RADIUS Authorization Plug-In Settings
3 In the Name field, type in a name to describe the plug-in.
This name later appears in the plug-in tree list. For example, if you are adding a plug-in for a Steel-Belted RADIUS server, you can type Steel-Belted RADIUS as the name. If you plan to authen ticate against more than one RADIUS server, you can enter a specific server name in this field.
4 In the Identifier field, type a name that remote users will use to select
this plug-in.
Aurorean users can include this identifier as part of their VPN user names to override the default authorization plug- in. For example, if you enter RADIUS as the identifier for this plug-in, Aurorean users can specify a user name such as Bob@RADIUS to authenticate against the RADIUS server instead of the default plug-in.
RiverMaster Administrators Guide
Chapter 4 Adding an Authorization Plug-In
Setting Up Aurorean Services
5 Optionally, specify a value in the Num Threads field.
This function allows the specified number of users to simultaneously log in without delay. The range of threads that can be set is 1 to 100, with a default value set to 10.
NOTE
Do not set Num Threads to a 0 (zero) value for a RADIUS plug-in. This will cause user login problems. You may set the value to zero for the Enterasys Authentication plug -i n.
6 To make this plug-in the default authorization method, place a check
next to Default Plug-In.
7 ClickonRadiusPlug-In. 8 In the Server Address field, enter the IP address or DNS name of the
RADIUS server.
9 In the Shared Secret field, type the same shared secret password you
entered on the RADIUS server.
For more information on shared secrets, refer to t he documentation supplied with your RADIUS server.
10 Leave the Authentication Port and Accounting Port fields set to their
default values.
These values specify UDP port numbers and match industry standards for RADIUS.
RiverMaster Administrators Guide
85
Adding an Authorization Plug-In Chapter 4
Setting Up Aurorean Services
11 In the T imeout field, enter the number of seconds the APS should
wait before resending an authentication request.
If the RADIUS server fails to respond to an authentication request within the time specified, the APS automati cal ly resends the request. Depending upon the type of RADIUS server you use, set this field as follows:
Server Type Recommended Value
Steel-Belted RADIUS 10 seconds MS RADIUS 10 seconds SecurID over RADIUS 30 seconds
12 In the Retry field, enter the number of times the APS should resend
an authentication request.
For example, when this field is set to 2, the APS resends an authentication request twice before declaring the RADIUS server unreachable. Depending upon the type of RADIUS server you use, set this field as follows:
Server Type Recommended Value
Steel-Belted RADIUS 3 retries MS RADIUS 3 retries SecurID over RADIUS 1retry
13 If you were unable to create an Enterasys group on your RADIUS
server and need to reuse an existing group attribute, enter the attribute number in the Group Attrib. field.
Authentication messages passed between the APS and the RADIU S server must carry a group attribute. If the RADIUS server management application prevented you from creating an En terasys group attribute, you can take over a pre-defined attribute and use it for VPN authentication. For example, the standard attribute Login­LAT-Gr oup can be us ed by entering its n umber, 36, in this field. For a complete list of attribute numbers, refer to the IETF RFC 2138.
86
RiverMaster Administrators Guide
Chapter 4 Adding an Authorization Plug-In
Setting Up Aurorean Services
14 If you want the APS to apply an MD4 hash to the key returned by the
RADIUS server, place a check next to the Apply Hash field.
Place a check in this field only if all of the following statements are true: remote users will authenticate against a Steel-Belted RADIUS 2.1 or earlier server, the tunnel protocol negotiated for all connections by these users will be PPTP, and 128-bit encryption is enabled on the Aurorean Network Gateway.
15 Do one of the following:
Click Commit to save the new plug-in. Click Cancel to clear the fields without savin g the plug-in.
16 If you click Commit, you are prompted to re-type the Shared Secret. 17 Reboot the APS to enable the authorization changes.
SecurID Authorization
To configure the APS to forward authentication requests to a SecurID server, perform the following steps:
1 Open the Configuration pullout. 2 Choose Authorization Plug-ins from the Configure pull-down box in
the top left corner of the pullout. Or, in the list of Aurorean devices, expand the tree list under the name of your APS (by clicking the + symbol), expand it again under Auth Service and click Make New Plug-in ...
The Create New Plug-in window will appear as shown in Figure 47.
RiverMaster Administrators Guide
87
Adding an Authorization Plug-In Chapter 4
Setting Up Aurorean Services
Type plug-in name and identifier here
Click here to create the plug-in
Click here to enter SecurID Plug-in values
3 In the Name field, type in a name to describe the plug-in.
This name later appears in the plug- in tree list. For example, if yo u are adding a plug-in for a SecurID server, you can type SecurID as the name. If you plan to authenticate against more than one SecurID server, you can enter a specific server name in this field.
Figure 47 SecurID Plug-in Window
88
RiverMaster Administrators Guide
Loading...