assumes no responsibility for the use of this information, nor any infringement of patents or other rights of
third parties which may result from its use. No license is granted by implication or otherwise under any
patent, copyright, or other intellectual property right of F5. F5 reserves the right to change specifications at
any time without notice.
Trademarks
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard,
Internet Control Architecture, IP Application Switch, Packet Velocity, iRules, SYN Check, FirePass, and
Webifyer are registered trademarks or trademarks of F5 Networks, Inc. in the U.S. and certain other
countries. All other trademarks mentioned in this document are the property of their respective owners. F5
Networks' trademarks may not be used in connection with any product or service except as permitted in
writing by F5.
Export Regulation Notice
This product may include cryptographic software. Under the Export Administration Act, the United States
government may consider it a criminal offense to export this product from the United States.
Export Warning
This is a Class A product. In a domestic environment this product may cause radio interference in which
case the user may be required to take adequate measures.
FCC Compliance
This equipment generates, uses, and may emit radio frequency energy. The equipment has been type tested
and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC rules, which
are designed to provide reasonable protection against such radio frequency interference.
Operation of this equipment in a residential area may cause interference, in which case the user at his own
expense will be required to take whatever measures may be required to correct the interference.
Any modifications to this device, unless expressly approved by the manufacturer, can void the user's
authority to operate this equipment under part 15 of the FCC rules.
Canadian Regulatory Compliance
This class A digital apparatus complies with Canadian I CES-003.
Standards Compliance
The product conforms to ANSI/UL Std 1950 and Certified to CAN/CSA Std. C22.2 No. 950.
FirePass™ Server Administrator Guidei
ii
Table of Contents
1
Introducing the FirePass Server
The FirePass remote access solution ........................................................................................1-1
The FirePass server models ........................................................................................................1-1
The FirePass server features .......................................................................................................1-2
Overview of features ............................................................................................................1-2
FirePass server features .......................................................................................................1-3
About this guide ..............................................................................................................................1-4
Accessing a slave server’s configuration while connected to a master server ........7-8
Displaying statistics for a FirePass server cluster ..........................................................7-8
Index
viii
1
Introducing the FirePass Server
• The FirePass remote access solution
• The FirePass server models
• The FirePass server features
• About this guide
• Finding help and technical support resources
The FirePass remote access solution
The FirePass™ server is a network appliance providing remote users with
secure access to corporate networks, using any standard Web browser. The
FirePass server can be installed in a few hours and it requires no
modifications to corporate applications. No configuration or setup is
required at the user’s remote location. If the user’s Web browser can
connect to Web sites on the Internet, then that browser can connect to the
the FirePass server.
The FirePass server provides a web-based alternative to traditional
remote-access technologies such as modem pools, RAS servers, and
IPSec-layer Virtual Private Networks (VPNs). By leveraging the browser as
a standard “thin client,” FirePass server enables a corporation or
organization to extend secure remote access easily and cost-effectively to
anyone connected to the Internet with no special software or configuration
on the remote device. Also, no additions or changes are necessary to the
back-end resources being accessed. This approach eliminates the IPSec
VPN support burden and adds application functionality well beyond mere
connectivity.
Introducing the FirePass Server
The FirePass server provides full access to network and desktop resources,
including:
• File servers
•Email
• Intranet
• Terminal servers
• Legacy mainframe, AS/400, and Telnet applications
• Client/server applications
• All desktop PC applications
The FirePass server models
The FirePass server is available in two models:
◆
FirePass 1000:
• Supports up to 100 concurrent users
• 1U rackmount chassis
• Includes one 10/100 Ethernet port and supports an option for a second
10/100 Ethernet port
• 200 watt power supply
◆
FirePass 4000:
• Supports up to 1000 concurrent users
• 2U rackmount chassis
• Includes two 10/100 Ethernet ports
• 480 watt power supply
FirePass™ Server Administrator Guide1 - 1
Chapter 1
The FirePass server features
Overview of features
◆
Security
FirePass server was built from the ground up to adhere to the highest
standards of best security practices.
• Encryption—FirePass server offers several strengths of encryption,
depending on the capability of the browser in use and on the optional
security settings of the FirePass implementation. FirePass server
offers encryption keys up to 1024 bits.
• Authentication—FirePass server includes an internal user database for
password authentication, and it can use existing RADIUS, LDAP, and
Windows domain servers for authentication. Administrators can
require different authentication methods for different groups. If you
want to use two-factor authentication, FirePass server supports RSA
SecurID
built-in implementation of VASCO Digipass
• Access Control—FirePass server grants access to specific
applications to individuals or to groups of users. With FirePass
server’s access controls, you can restrict individuals and groups to
particular resources. For example, partners can be have restricted
access to an extranet server only, while sales staff can connect to
email, the company Intranet, and the CRM system.
®
token-based authentication, and also offers an optional,
®
.
◆
Availability
Unlike IPSec VPNs, Web-based remote access works over all ISP
connections and works from behind other firewalls. ISPs cannot detect
and block FirePass server conversations as they might with detected
IPSec traffic. Failover and clustering options provide high availability
and high capacity. FirePass servers can be clustered to support up to
10,000 concurrent connections on a single logical URL without
performance degradation.
◆
Ease of use, deployment, maintenance, and management
FirePass server installs in a few hours. Users are presented with an
intuitive, browser-based interface and they require minimal training after
a brief introduction. FirePass server can be upgraded in the field over the
Web. Automatic release update notifications prompt the FirePass server
administrator to download new versions when they become available.
Features and capacity can also be added over the Web.
1 - 2
FirePass server features
The following features are available on both FirePass server models.
◆
Standard Web browser support
FirePass server can be used with most standard browsers supporting
secure HTTP (also known as HTTPS). These include Internet Explorer®,
Netscape Navigator®, Opera®, and Mozilla®.
◆
WAN security
FirePass server supports common encryption technologies, including
RC4 and 3DES. It uses standard SSL encryption from the client browser
to the FirePass server.
◆
Authentication
FirePass server performs basic authentication using an internal database.
It also supports two-factor (token-based) authentication methods like
RSA SecurID® and VASCO Digipass.
FirePass server authenticates devices using signed digital certificates.
FirePass server can be integrated with LDAP directories and Windows
Domain Servers.
Introducing the FirePass Server
◆
Application access using standard Webifyers
FirePass server provides access to virtually all corporate and desktop
applications, including email, file, and Intranet access, client-server
application access, legacy host application access (mainframe, AS/400,
X-Windows, and Telnet), and Terminal Services/Citrix® application
access.
◆
Mobile device access
FirePass server provides email, file, and Intranet access from
mini-browsers on mobile devices. These include Internet-enabled (WAP
and iMode) telephones, PDAs (PalmOS® and Pocket PC), and RIM
Blackberries™.
◆
Administration
FirePass server provide a web–based Administrator Console. The
Console includes tools for installing and managing the FirePass server,
including user and group enrollment and management, clustering and
failover configuration, certificate generation and installation, and user
interface customization.
◆
Audit trail
FirePass server provides audit tools including full-session audit trails,
drill-down session queries, and customizable reports and queries.
◆
Client/Server application support
FirePass server offers a Client-Server Connector™ providing
application-specific tunnels for client-server applications like
Microsoft® Outlook®, ERP package applications, and custom TCP/IP
applications.
FirePass™ Server Administrator Guide1 - 3
FirePass server also provides a VPN Connector™ giving full network
access comparable to that offered by a traditional IPSec VPN connection.
Chapter 1
About this guide
◆
Desktop Access
FirePass server offers web–based access to authorized desktops with
support for remote control, lightweight email/file access, guest access,
and Web conferencing.
◆
High availability
FirePass servers can be configured to failover to hot standby servers.
◆
Scalability
FirePass server clusters support up to 10,000 users on a single logical
server.
This FirePass Administrator Guide provides information and step-by-step
instructions for installing and administering the FirePass™ 1000 and 4000
servers.
This guide is available as an Adobe Acrobat file (.pdf). (To install a free
version of Adobe Acrobat Reader, see http://www.adobe.com.)
Audience
This guide is for system and network administrators who install and
configure IT equipment and software. This guide assumes that
administrators have experience installing software and working with
network configurations.
1 - 4
Introducing the FirePass Server
Finding help and technical support resources
You can find additional technical documentation about the FirePass server
in the following locations:
◆
Release notes
Release notes containing the latest information for the current version of
FirePass server are available from the Administrative Console. Click the
Maintenance tab and then click the Online Update link. Release notes
include a list of new features and enhancements, a list of fixes, and a list
of known issues.
◆
Online help for FirePass features
You can find help online for virtually all screens on the Administrative
Console. Click the Help Page button in the upper right of the panel.
◆
Technical support through the World Wide Web
®
The F5
provides the latest technical notes, answers to frequently asked questions,
updates for the Administrator Kit (in PDF format), updates for the
release notes, and the Ask F5 natural language question and answer
engine.
Networks Technical Support web site, http://tech.f5.com,
Conventions used in this manual
Information that you type appears in a bold, monospace font. For example:
admin
A Tip suggests ways to make administration easier or faster. For example:
Tip
An easy way to enter a user agent string is to copy and paste the string from
the Logons report.
A Note or Important contains important information. For example:
Note
If you are powering up a server cluster, always power up the master server
first.
Important
If your superuser password is lost, con tact Technical Support.
A Warning describes actions that can cause data loss or problems. For
example:
FirePass™ Server Administrator Guide1 - 5
WARNING
Do not turn the FirePass server off by using the Power switch on the front
panel.
Chapter 1
1 - 6
2
Deploying the FirePass Server
• Overview of deploying the FirePass server
•Configuring a firewall to work with the FirePass
server
• Understanding name resolution issues for FirePass
servers with a private IP address
• Installing the FirePass server
• Testing network connectivity
• Using the Administrative Console to configure the
FirePass server
• Using the Maintenance Console
• What’s next?
Deploying the FirePass Server
Overview of deploying the FirePass server
This section contains an overview of the tasks for deploying the FirePass™
server.
Summary of tasks for installing and deploying the FirePass server
Table 2.1 provides a summary of the tasks for installing and deploying the
FirePass server.
TaskFor more information, see
Configure the firewalls at your site to allow traffic to and
from the FirePass server.
If the FirePass server has a private IP address, set up
name resolution for internal users and client software.
Install the FirePass server, and power it up. Using the
WAN port, create an isolated network to reach the
FirePass server using its factory default IP address.
Enter basic configuration information using either the
Administrative Console (recommended) or the
Maintenance Console (available as a backup).
Connect the FirePass server to the network. Test that the
FirePass server is accessible on the network, and test
DNS resolution of the FirePass server’s host name inside
and outside firewall.
After the FirePass server is up and running and the
network connections are working, use the Administrative
Console to finish configuring the server from a Web
browser.
(Recommended) Change the superuser password.Changing the superuser password, on page 2-18
Configure one or more authentication methods for
FirePass users. Then add groups and user accounts.
Configuring a firewall to work with the FirePass server, on
page 2-2
Understanding name resolution issues for FirePass
servers with a private IP address, on page 2-11
Installing the FirePass server, on page 2-12
Using the Administrative Console to configure the
FirePass server, on page 2-17
Testing network connectivity, on page 2-16
Using the Administrative Console to configure the
FirePass server, on page 2-17
Chapter 3, Setting Up FirePass Server Security
Configure the FirePass server’s Webifyers that you want
to make available to users. For example, configure the
SSL VPN Webifyer, if necessary.
Install a new SSL certificate.Setting up certificates, on page 3-29
(Optional) If necessary, customize the appearance of the
user’s home panel, such as the logo and terms used for
logging in.
Table 2.1 Overview of FirePass Deployment Tasks
FirePass™ Server Administrator Guide2 - 1
Chapter 4, Configuring the FirePass Webifyers
Customizing the user’s home page, on page 5-31
Chapter 2
Configuring a firewall to work with the FirePass
server
The FirePass server enables remote access by communicating through
secure tunnels between remote users at untrusted or unprivileged hosts on
the Internet and your corporate LAN. This section describes the firewall
ports at your site that must be opened to allow traffic to and from the
FirePass server so that it can operate correctly.
The particular firewall ports that you must open at your site depend on
where you install the FirePass server relative to the firewalls, and which
network and application services the server must access. There are some
ports that must be open in all situations, such as ports 80 and 443 for HTTP
and HTTPS, on the external firewall between the FirePass server and remote
Web browsers. If the FirePass server is installed in a DMZ with an internal
firewall separating it from the corporate network, you also have to open
other ports as necessary to allow access to network services such as DNS,
and to use particular application services such as e-mail.
The illustration in Figure 2.1 shows the services and ports used by the
FirePass server.
.
Figure 2.1 Allowing traffic on firewall ports for a FirePass server
For more information on configuring the firewall ports, see the foll owin g
section and the tables on pages 2-6 through 2-10.
2 - 2
Overview of the firewall configuration process
During the process of firewall configuration, you might consider opening
the firewall ports in phases. In the initial phase, you could focus on opening
the ports that allow access to the FirePass server from both inside and
outside the firewall when you specify the server’s host name in a Web
browser. In this initial phase, you might also open the ports for SMTP so
that the FirePass server can send email messages to the FirePass
administrator. For this initial phase, the following ports need to be opened:
• Assuming there is a firewall between the Internet and the FirePass server,
the firewall must allow inbound traffic on ports 80 (HTTP) and 443
(SSH) as a base configuration with a destination address of the publicly
accessible FirePass address.
• The firewall must also allow the FirePass server access to network
services such as NTP, DNS, and SMTP (on ports 123, 53, and 25). The
network services might be located on an external network (Internet), or
on the internal corporate network. The location of the network services
and your particular deployment scenario determines which firewall’s
ports must be open, assuming there is a firewall between the FirePass
server and these services.
• If there is a firewall between the FirePass server and the corporate LAN,
the firewall must allow traffic on ports 80, 443, and 661.
Deploying the FirePass Server
To verify that the FirePass server has access to DNS and SMTP services
after you have opened the ports and installed the FirePass server, you can
use the instructions in Testing network connectivity, on page 2-16.
After you have verified that the FirePass server has access to DNS and
SMTP services and that you can access the server from a Web browser from
either side of the firewall, then you can open up the specific ports that are
necessary for your particular deployment. See the following tables in this
section that describe the ports and services. For example, if you are using
LDAP for authentication, you must open ports 389 and 636. Here are some
other examples of application services you might need to support:
• To support My Files, the FirePass server needs access to Windows file
servers using Microsoft Networking (ports 135, 137, 138, 139).
• To support My Email, the FirePass server needs access to POP/IMAP
and LDAP (ports 110, 143, 389, 636).
• To support Host Access, the FirePass server needs access to Telnet (port
23).
The services are sometimes hosted locally behind a firewall, and sometimes
hosted remotely. If the services are hosted remotely, the external firewall
must allow the FirePass server to make connections to those services on
specific TCP/IP ports.
To allow access to the FirePass server from the Internet, you can create
either Network Address Translation (NAT) rules or port forwarding rules on
the firewall to forward inbound packets to the server. The advantage of
static NAT is that it does not require you to forward each individual port to
FirePass™ Server Administrator Guide2 - 3
Chapter 2
the FirePass server. To use static NAT, configure a rule that forwards all
allowable traffic from the public IP address to the private IP assigned to the
FirePass server. However, some firewalls only allow static NAT using a
public IP address other than its own public interface. In this case, you must
use port forwarding by setting up rules to forward the appropriate ports to
the private IP address assigned to the FirePass server.
Firewalls can be classified as stateful and non-stateful. Stateful firewalls
allow bi-directional communication (that is, they create a return rule for an
allowed service). Older firewalls, especially ones based on Linux IP chains,
are often non-stateful; they do not allow bi-directional communications. If
you have a stateful firewall (most newer commercial firewalls are stateful),
you only need to define rules for the actual traffic; the replies are
automatically allowed to pass. If you have a non-stateful firewall, you also
must define rules for traffic coming in and the replies with the ACK
(acknowledgement) bit set for those protocols.
For completeness, the following tables list the types of traffic (in pairs of
request and response) that must be allowed through the firewalls for each
category of FirePass server functionality.
All traffic associated with the FirePass server falls into in one of these
categories:
• Traffic between the remote user’s browser and the FirePass server. (See
About the traffic between a remote user’s browser and the FirePass
server, on page 2-5.)
• Traffic between the FirePass server and network services, such as LDAP,
RADIUS, and DNS. (See About the traffic between the FirePass server and network services, on page 2-6.)
• Traffic between the FirePass server and application services, such as file
servers, email servers, and the Intranet. (See About the traffic between FirePass server and application services, on page 2-7.)
• Traffic between the FirePass server and corporate LAN using My
Desktop. (See About the traffic between the FirePass server and the Desktop Agent, on page 2-9.)
2 - 4
Note
A particular type of traffic shown in the tables is only required if Required
appears in the Comment column for the traffic, or, as stated previously, if
you are enabling an application service that requires the port to be opened.
Deploying the FirePass Server
About the traffic between a remote user’s browser and the
FirePass server
To allow traffic between a remote user’s browser and the FirePass server,
you must open the firewall ports as shown in Table 2.2.
The FirePass bridge ports (10000-10100) are optional ports in the external
firewall that are used to distribute sessions to ensure that port 443 is open for
new requests. These ports are configurable, and can be set to any of the high
TCP/IP ports (1025 – 65535). If the number of concurrent My Desktop users
is low—less than 5 concurrent users on the FirePass 1000, or less than 20 on
the FirePass 4000—then there is no requirement to open the high TCP/IP
ports (1025 to 65535). The server uses the high ports if they are available,
otherwise it uses port 443.
During installation, or in case of severe malfunction, you may need to give
Technical Support access to your Maintenance Console using Secure Shell
(SSH). To allow this access while blocking routine SSH access, the FirePass
server provides temporary, encrypted keys, further protected by a
passphrase. For more information about providing SSH access to Technical
Support, see Providing SSH access for Technical Support, on page 5-31.
SourceDestination
Traffic TypeProtocol
HTTPTCPRemote
HTTP
(response)
HTTPSTCPRemote
HTTPS
(response)
FirePass
bridge
FirePass
bridge
Response
SSHTCPLocal LAN1025 to
TCPFirePass
TCPFirePass
TCPRemote
TCPFirePass
Browser
server
Browser
server
Browser
server
1025 to
65535
80Remote
1025 to
65535
443Remote
1025 to
65535
10000 to
10100
65535
FirePass
server
Browser
FirePass
server
Browser
FirePass
server
Remote
Browser
FirePass
server
Ack
bit
80Required
1025 to
65535
443Required
1025 to
65535
10000 to
10100
1025 to
65535
22Optional
yesRequired
yesRequired
yesOptional for
CommentAddressPortsAddressPorts
Optional for
My Desktop
My Desktop
SSH
(response)
TCPFirePass
Table 2.2 Traffic between a remote user’s browser and the FirePass server
FirePass™ Server Administrator Guide2 - 5
server
22Local LAN1025 to
65535
YesOptional
Chapter 2
About the traffic between the FirePass server and network
services
The FirePass server needs access to the network services listed in Table 2.3,
some of which are optional and depend on your particular configuration. If
the services are hosted across a firewall from the FirePass server, you must
open the firewall ports to allow the FirePass server to access these services.
Important
Configure your internal DNS server such that your FirePass server host
name resolves to the server’s local IP address. This is to ensure that traffic
from the same side of the firewall can reach the FirePass server. You can do
this on a WINS server or on a DNS server if the DNS server is hosted
locally. (See Understanding name resolution issues for FirePass servers with a private IP address, on page 2-11.)
SourceDestination
Traffic TypeProtocol
DNSTCPLocal LAN1025 to
DNS (response)TCPFirePass
server
NTPUDPLocal LAN1025 to
NTP (response)UDPFirePass
SSHTCPLocal LAN1025 to
SSH (response)TCPFirePass
SecurID
authentication
SecurID
authentication
(response)
TCPFirePass
TCPLocal LAN1645, 1646FirePass
server
server
server
65535
53Local LAN1025 to
65535
123Local LAN1025 to
65535
22Local LAN1025 to
1025 to
65535
FirePass
server
FirePass
server
FirePass
server
Local LAN1645,
server
53
65535
123
65535
22Optional
65535
1646
1025 to
65535
Ack
bit
Yes
YesOptional
YesOptional
CommentAddressPortsAddressPorts
Optional
LDAPTCPFirePass
LDAP (Response)TCPLocal LAN389, 636FirePass
Table 2.3 Traffic between FirePass server and network services
2 - 6
server
1025 to
65535
FirePass
server
server
389,
636
1025 to
65535
Required for
LDAP
authentication
YesRequired for
LDAP
authentication
Deploying the FirePass Server
Traffic TypeProtocol
RADIUSTCPFirePass
server
RADIUS
(response)
SMTP ServicesTCPFirePass
SMTP Services
(response)
TCPLocal LAN1645, 1646FirePass
server
TCPLocal LAN25FirePass
SourceDestination
1025 to
65535
1025 to
65535
Local LAN1645,
1646
1025 to
server
Local LAN25
server
65535
1025 to
65535
Ack
bit
YesRequired for
Yes
CommentAddressPortsAddressPorts
Required for
RADIUS
authentication
RADIUS
authentication
Table 2.3 Traffic between FirePass server and network services (Continued)
About the traffic between FirePass server and application services
To allow traffic between the FirePass server and application services on the
corporate LAN, you must open the firewall ports as shown in Table 2.4. The
application services include the following services, some of which are
optional and depend on your particular configuration:
• File servers
•Email servers
• Intranet
• Terminal servers
• Legacy mainframe and AS/400 applications
• Client/server applications
•SSL VPN
FirePass™ Server Administrator Guide2 - 7
A FirePass server that needs to use any of these application services must be
able to communicate with the local LAN on several ports. Most of these
ports are listed in Table 2.4 with the default port assignments. (Your
network may vary). Microsoft Networking requires four ports, two TCP/IP
ports and two UDP ports. Port 135 is the RPC port, port 139 is the NetBIOS
session, port 137 is the NetBIOS name service, and port 138 is the datagram.
These ports must be configured to allow users to use the My Files Webifyer
to view network file shares. A WINS server helps address resolution from
NetBIOS to TCP/IP to work properly.
Chapter 2
SourceDestination
Traffic TypeProtocol
HTTPTCPLocal LAN1025 to 65535FirePass
server
HTTP
(response)
HTTPSTCPLocal LAN1025 to 65535FirePass
HTTPS
(response)
IMAPTCPFirePass
IMAP
(Response)
POPTCPFirePass
POP
(Response)
TCPFirePass
server
TCPFirePass
server
server
TCPLocal LAN143FirePass
server
TCPLocal LAN110FirePass
80Local LAN1025 to
server
443Local LAN1025 to
1025 to 65535Local LAN143Required for
server
1025 to 65535Local LAN110Required for
server
Ack
bit
80Required
YesRequired
65535
443
Yes
65535
1025 to
65535
1025 to
65535
YesRequired for
YesRequired for
CommentAddressPortsAddressPorts
email
email
email
email
Microsoft
Networking
Microsoft
Networking
(Response)
Microsoft
Networking
Microsoft
Networking
(Response)
Telnet/3270TCPFirePass
Telnet/3270
(Response)
Client/Server
applications
TCPFirePass
server
TCPLocal LAN135, 139FirePass
UDPFirePass
server
UDPLocal LAN137, 138FirePass
server
TCPLocal LAN23FirePass
TCPFirePass
server
1025 to 65535Local LAN135, 139Required for
server
1025 to 65535Local LAN137, 138Required for
server
1025 to 65535Local LAN23Required for
server
1025 to 65535Local LANUser-defin
Table 2.4 Traffic between FirePass server and application services
1025 to
65535
1025 to
65535
1025 to
65535
ed TCP
File services
YesRequired for
File services
File services
YesRequired for
File services
Host Access
YesRequired for
Host Access
Required for
each App
tunnel
2 - 8
Deploying the FirePass Server
Traffic TypeProtocol
Client/Server
applications
(response)
SSL VPN
Connector
SSL VPN
Connector
(response)
TCPLocal LANUser-defined
TCP
UDP
ICMP
TCP
UDP
ICMP
SourceDestination
TCP
FirePass
server
Local LANAny ports as
1025 to 65535Local LANAny ports
needed
FirePass
server
FirePass
server
1025 to
65535
as needed
1025 to
65535
Ack
bit
YesRequired for
YesRequired for
CommentAddressPortsAddressPorts
each App
tunnel
Required for
SSL VPN as
needed
SSL VPN as
needed
Table 2.4 Traffic between FirePass server and application services (Continued)
About the traffic between the FirePass server and the Desktop
Agent
To allow traffic from the FirePass server to the corporate LAN using the My
Desktop feature, you must open firewall ports as shown in Table 2.5.
The FirePass client on the desktop computer on the local LAN uses ports 80
and 81 to initiate communications with the FirePass server during My
Desktop sessions. The FirePass server “wakes” the client on port 661, then
communicates with it on port 443. The client then initiates a new connection
on port 81 back to the FirePass server.
Host Activation Protocol (HAP) is a registered port (661) which allows the
FirePass server to initiate a session with the FirePass Desktop Agent. The
FirePass server communicates with the Agent on port 443.
Note
The port numbers in the following table are default values which you can
change. For more information, see Configuring the My Desktop Webifyer,
on page 4-31.
FirePass™ Server Administrator Guide2 - 9
Chapter 2
SourceDestination
Traffic TypeProtocol
HTTPTCPLocal LAN1025 to 65535FirePass
server
HTTP
(response)
Host Activation
Protocol (HAP)
Host Activation
Protocol (HAP)
(response)
HTTPSTCPFirePass
HTTPS
(response)
TCPFirePass
server
TCPFirePass
server
TCPLocal LAN661FirePass
server
TCPLocal LAN443FirePass
80, 81Local LAN1025 to
1025 to 65535Local LAN661Required for My
server
1025 to 65535Local LAN443
server
80, 81Required for My
65535
1025 to
65535
1025 to
65535
Table 2.5 Traffic between FirePass server and corporate LAN using My Desktop
Ack
bit
YesRequired for My
YesRequired for My
Yes
CommentAddressPortsAddressPorts
Desktop
Desktop
Desktop
Desktop
2 - 10
Loading...
+ 152 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.