Novell Access Manager 3.1 SP2 SSL VPN Server Guide
Legal Notices
Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverable for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
8Novell Access Manager 3.1 SP2 SSL VPN Server Guide
About This Guide
The Novell Access Manager SSL VPN uses encryption and other security mechanisms to ensure
that data cannot be intercepted and only authorized users have access to the network. Users can
access SSL VPN services from any Web browser.
Chapter 1, “ Overview of SSL VPN,” on page 11
Chapter 2, “Basic Configuration for SSL VPN,” on page 21
Chapter 3, “Configuring End-Point Security and Access Policies for SSL VPN,” on page 37
Chapter 4, “Configuring How Users Connect to SSL VPN,” on page 55
Chapter 5, “Clustering the High-Bandwidth SSL VPN Servers,” on page 67
Chapter 6, “Monitoring the SSL VPN Servers,” on page 79
Chapter 7, “Server Configuration Settings,” on page 93
Chapter 8, “Additional Configurations,” on page 99
Appendix A, “Troubleshooting SSL VPN Configuration,” on page 101
novdocx (en) 16 April 2010
Audience
This guide is intended for Access Manager administrators. It is assumed that you have knowledge of
evolving Internet protocols, such as:
Extensible Markup Language (XML)
Simple Object Access Protocol (SOAP)
Security Assertion Markup Language (SAML)
Public Key Infrastructure (PKI) digital signature concepts and Internet security
We want to hear your comments and suggestions about this guide and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to Documentation Feedback (http://www.novell.com/documentation/
feedback.html) at www.novell.com/documentation/feedback.html and enter your comments there.
Documentation Updates
For the most recent version of the Novell Access Manager SSL VPN Server Guide, visit the Novell
Access Manager Documentation Web site (http://www.novell.com/documentation/
novellaccessmanager).
About This Guide9
Additional Documentation
For information about the other Access Manager devices and features, see the following:
Novell Access Manager 3.1 SP2 SSL VPN User Guide
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
novdocx (en) 16 April 2010
10Novell Access Manager 3.1 SP2 SSL VPN Server Guide
1
Overview of SSL VPN
The Novell Access Manager SSL VPN uses Secure Sockets Layer (SSL) as the underlying security
protocol for network transmissions. It uses encryption and other security mechanisms to ensure that
data cannot be intercepted and only authorized users have access to the network. Users can access
SSL VPN services from any Web browser.
Section 1.1, “SSL VPN Features,” on page 11
Section 1.2, “Traditional and ESP-Enabled SSL VPNs,” on page 14
Section 1.3, “SSL VPN Client Modes,” on page 16
1.1 SSL VPN Features
Novell SSL VPN comes with a number of key features that make the product secure, easy to access,
and reliable.
novdocx (en) 16 April 2010
1
Browser-Based End User Access
Novell SSL VPN has browser-based end user access that does not require users to preinstall any
components on their machines. Users can access the SSL VPN services from any Web browser,
from their personal computer, laptop, or from an Internet kiosk.
When users access SSL VPN through the Web browser, they are prompted to authenticate. On
successful authentication, a Java applet or an ActiveX control is delivered to the client, depending
on the browser. This establishes a secure tunnel between the user’s machine and the SSL VPN
server.
Support on Linux, Macintosh, and Windows
The SSL VPN client is supported on Linux, Macintosh, and Windows environments. For a complete
list of operating software and browsers that are supported by SSL VPN, see “Client Machine
Requirements” in the Novell Access Manager 3.1 SP2 SSL VPN User Guide.
Support on 64-Bit Clients
Enterprise mode SSL VPN can be installed on 64-bit client configurations.
High-Bandwidth and Low-Bandwidth Versions
Novell SSL VPN comes in high-bandwidth and low-bandwidth versions. The default lowbandwidth SSL VPN server is restricted to 249 simultaneous user connections and a transfer rate of
90 Mbits per second because of export restrictions.
If the export law permits, you can install the high-bandwidth SSL VPN RPM to get the highbandwidth capabilities, because that version does not have connection and performance restrictions.
You can order the high-bandwidth SSL VPN key at no extra cost. It is essential to have the highbandwidth SSL VPN if you want to cluster the SSL VPN servers.
Overview of SSL VPN
11
For more information on how to order and install the high-bandwidth SSL VPN, and to upgrade the
high-bandwidth version to the latest build, see “Installing the Key for the High-Bandwidth
SSLVPN” in the Novell Access Manager 3.1 SP2 Installation Guide.
Traditional and ESP-Enabled Installation
You can install SSL VPN in two ways:
As an ESP-enabled SSL VPN, which is installed with the Identity Server and the
Administration Console.
As a Traditional SSL VPN, which is installed with the Identity Server, Administration Console,
and the Access Gateway.
For more information on these methods, see Section 1.2, “Traditional and ESP-Enabled SSL
VPNs,” on page 14.
Enterprise and Kiosk Modes for End User Access
The Novell SSL VPN uses both clientless and thin-client access methods. The clientless method is
called the Kiosk mode SSL VPN and the thin-client method is called the Enterprise mode SSL VPN.
novdocx (en) 16 April 2010
In Enterprise mode, all applications, including those on the desktop and the toolbar, are enabled for
SSL, regardless of whether they were opened before or after connecting to SSL VPN. In this mode,
a thin client is installed on the user’s workstation, and the IP Forwarding feature is enabled by
default. For more information on Enterprise mode, see Section 1.3.1, “Enterprise Mode,” on
page 17.
In Kiosk mode, only a limited set of applications are enabled for SSL VPN. In Kiosk mode,
applications that were opened before the SSL VPN connection was established are not enabled for
SSL. For more information on Kiosk mode, see Section 1.3.2, “Kiosk Mode,” on page 19.
As SSL VPN server administrators, you can decide which users can connect in Enterprise mode and
which users can connect in Kiosk mode, depending on the role of the user. Or you can let the client
select the mode in which the SSL VPN connection is made. For more information on how to do this,
see Chapter 4, “Configuring How Users Connect to SSL VPN,” on page 55. Enterprise mode is
root
available to a user who has the administrator right in a Windows workstation or a
privilege on Linux or Macintosh workstations. If the user does not have administrator rights or
user
root
user privileges for that workstation, the SSL VPN connection is made in Kiosk mode.
Customized Home and Exit Pages for End Users
The home page and the exit page of SSL VPN can be customized to suit the needs of different
customers. For more information, see Section 8.1, “Customizing the SSL VPN User Interface,” on
page 99.
Clustering SSL VPN Servers
The SSL VPN servers can be clustered to provide load balancing and fault tolerance, When you
form a cluster of SSL VPN servers, all members of a cluster should belong to only one type of SSL
VPN and they should all be running the high-bandwidth SSL VPN. For example, all the members of
a cluster should belong to either the ESP-enabled SSL VPN or the Traditional SSL VPN. For more
information on SSL VPN clustering, see Chapter 5, “Clustering the High-Bandwidth SSL VPN
Servers,” on page 67.
12Novell Access Manager 3.1 SP2 SSL VPN Server Guide
End-Point Security Checks
The Novell SSL VPN has a set of policies that can be configured to protect your network and
applications from clients that are using insufficient security restraints and also to restrict the traffic
based on the role of the client.
You can configure a client integrity check policy to run a check on the client workstations before
establishing a tunnel to SSL VPN server. This check ensures that the users have specified software
installed and running in their systems. Each client is associated with a security level, depending on
the assessment of the client integrity check and the relevant traffic policies that are assigned. For
more information on configuring end-point security, see Chapter 3, “Configuring End-Point
Security and Access Policies for SSL VPN,” on page 37.
Ability to Order Rules
If you have configured more than one rule for a user’s role, the rule that is placed first is applied
first. Novell SSL VPN allows you to change the order of rules by dragging and dropping them,
based on their priority. For more information on rule ordering in SSL VPN, see “Ordering Traffic
Policies” on page 49.
novdocx (en) 16 April 2010
Ability to Import and Export Policies
Novell SSL VPN allows you to export the existing configuration into an XML file through the
Administration Console. You can reimport this configuration later. This is a very useful feature
when you upgrade your servers from one version to another. For more information, see “Exporting
and Importing Traffic Policies” on page 50
Desktop Cleanup Feature
When a user accesses the protected resource from outside by using SSL VPN, it also means that the
sites that the user visited are stored in the browser history, or some sensitive information is stored in
the cache or cookies. This is a potential security threat if it is not properly dealt with. The Novell
SSL VPN client comes with the desktop cleanup feature, so the user has the option to delete all the
browser history, cache, cookies, and files from the system, before logging out of the SSL VPN
connection.
If the user uses Firefox to connect to SSL VPN, the browsing data that was stored after the SSL
VPN connection was made is deleted. In Internet Explorer, all the browser data is deleted, including
the data that was stored before the SSL VPN session was established.
Sandbox Feature
When you connect to SSL VPN in either Kiosk mode or Enterprise mode, a folder named VPNSANDBOX is created on your desktops You can manually copy files to this folder, including files
that you create or files that you download from your corporate network. This folder is automatically
deleted along with its contents when you logs out of the SSL VPN connection. This is a very useful
feature if you are browsing from an Internet connection and you do not want any sensitive
information to reach other persons. For more information on the sandbox feature of SSL VPN, see
“Using the Sandbox Feature” in the Novell Access Manager 3.1 SP2 SSL VPN User Guide.
Overview of SSL VPN13
Custom Login Policy
When custom login policy is configured, SSL VPN redirects the custom login requests to different
URLs based on the policy. This is a very useful feature if users want to access applications such as
those on the Citrix application servers. For more information on how to configure a custom login
policy, see Section 4.2.5, “Configuring a Custom Login Policy for SSL VPN,” on page 59.
1.2 Traditional and ESP-Enabled SSL VPNs
The Novell SSL VPN can be deployed as either an ESP-enabled SSL VPN or a Traditional SSL
VPN.
When SSL VPN is deployed without the Access Gateway, an Embedded Service Provider (ESP)
component is installed along with the SSL VPN server. This deployment requires the Identity Server
and the Administration server to also be installed. This type of deployment is called an ESP-enabled
Novell SSL VPN.
When SSL VPN is deployed with the Access Gateway, it is called a Traditional Novell SSL VPN. In
this type of installation, SSL VPN is deployed with the Identity Server, Administration Console, and
the Linux Access Gateway components of Novell Access Manager.
novdocx (en) 16 April 2010
Section 1.2.1, “ESP-Enabled Novell SSL VPN,” on page 14
Section 1.2.2, “Traditional Novell SSL VPN,” on page 15
Section 1.2.3, “High-Bandwidth and Low-Bandwidth SSL VPNs,” on page 16
1.2.1 ESP-Enabled Novell SSL VPN
In an ESP-enabled Novell SSL VPN, the process involved in establishing a secure connection
between a client machine and the different components of Novell Access Manager is as follows:
1. The user specifies the following URL to access the SSL VPN server:
https://<www.sslvpn.novell.com>/sslvpn/login
<www.sslvpn.novell.com> is the DNS name of the SSL VPN server, and /sslvpn/login is the
path of the SSL VPN server.
2. The SSL VPN redirects the browser to the Identity Server for authentication.
3. After successful authentication, the Identity Server redirects the browser back to SSL VPN.
4. The Identity Server propagates the session information to the SSL VPN server through the
Embedded Service Provider.
5. The SSL VPN server injects the SSL VPN policy for that user into the SSL VPN servlet. The
SSL VPN servlet processes the parameters and sends the policy information back to the server.
6. The SSL VPN checks if the client machine has sufficient security restraints. For more
information on client integrity checks, see Section 3.1, “Configuring Policies to Check the
Integrity of the Client Machine,” on page 38.
7. When the user accesses the applications behind the protected network, the connection goes
through the secure tunnel formed with the SSL VPN server.
8. The browser stays open throughout the SSL VPN connection to allow the keep alive packets.
9. When the user clicks the logout button to close the SSL VPN session, all the client components
are automatically uninstalled from the workstation.
14Novell Access Manager 3.1 SP2 SSL VPN Server Guide
1.2.2 Traditional Novell SSL VPN
The following figure shows the Novell Access Manager components and the process involved in
establishing a secure connection between a client machine and traditional Novell SSL VPN server.
In this type of deployment, the Linux Access Gateway accelerates and protects the SSL VPN server.
Figure 1-1 Traditional Novell SSL VPN
Access
Gateway
6
2
DNS: www.ag.novell.com
www.ag.novell.com/sslvpn
novdocx (en) 16 April 2010
1
Browser
4
3
Identity
Server
5
7
External IP: 192.23.45.4
Internal IP: 10.0.0.4
SSL VPN
7
Application
1. The user specifies the following URL to access the SSL VPN server:
https://<www.ag.novell.com>:8443/sslvpn/login
<www.ag.novell.com> is the DNS name of the Access Gateway that accelerates the SSL VPN
server, and /sslvpn/login is the path of the SSL VPN server.
2. The Access Gateway redirects the user to the Identity Server for authentication, because the
URL is configured as a protected resource.
3. The Identity Server authenticates the user’s identity.
4. The Identity Server propagates the session information to the Access Gateway through the
Embedded Service Provider.
5. The Access Gateway injects the SSL VPN policy for that user into the SSL VPN servlet. The
SSL VPN servlet processes the parameters and sends the policy information back to the Access
Gateway.
6. The SSL VPN checks if the client machine has sufficient security restraints. For more
information on client integrity checks, see Chapter 3.1, “Configuring Policies to Check the
Integrity of the Client Machine,” on page 38.
Overview of SSL VPN15
7. One of the following actions takes place, depending on the mode of the SSL VPN connection:
In Enterprise mode, a tunnel interface is created and is bound with the tunnel IP address
assigned by the SSL VPN server. A secure tunnel is established between the client
machine and the SSL VPN server, and the routing table is updated with the protected
network configuration.
In Kiosk mode, a secure tunnel is established between the client machine and the SSL
VPN server, and the protected network configuration is pushed to the client.
8. When the user accesses the applications behind the protected network, the connection goes
through the secure tunnel formed with the SSL VPN server and not through the Access
Gateway.
9. The browser stays open throughout the SSL VPN connection to allow the keep alive packets to
go through the Access Gateway.
10. When the user clicks the logout button to close the SSL VPN session, all the client components
are automatically uninstalled from the workstation.
1.2.3 High-Bandwidth and Low-Bandwidth SSL VPNs
novdocx (en) 16 April 2010
Novell SSL VPN comes in high-bandwidth and low-bandwidth versions.
Low-Bandwidth Version: The default SSL VPN server is a low-bandwidth version. It is restricted
to 249 simultaneous user connections and a transfer rate of 90 Mbits per second because of export
restrictions.
High-Bandwidth Version: The high-bandwidth version does not have the connection and
performance restrictions. It is essential to have the high-bandwidth SSL VPN installed if you want
to cluster the SSL VPN servers.
If the export law permits, you can order the high-bandwidth SSL VPN RPM and get the highbandwidth capabilities at no extra cost. After the export controls have been satisfied, the order will
be fulfilled. You can install the high-bandwidth SSL VPN RPM on both the Traditional Novell SSL
VPN server and on the ESP-enabled Novell SSL VPN server.
Your regular Novell sales channel can determine if the export law allows you to order the highbandwidth version at no extra cost.
For more information on how to order and install the high-bandwidth SSL VPN, and to upgrade the
high-bandwidth version to the latest build, see “Installing the Key for the High-Bandwidth
SSLVPN” in the Novell Access Manager 3.1 SP2 Installation Guide.
1.3 SSL VPN Client Modes
Novell SSL VPN has two client modes, Enterprise mode and Kiosk mode. In Enterprise mode,
which is available for users who have administrative privileges, all applications are enabled for SSL
VPN. In Kiosk mode, only a limited set of applications are enabled for SSL VPN.
Enterprise mode is available to users who have the administrator right in a Windows workstation or
root
user privilege on Linux or Macintosh workstations. If a user does not have administrator
a
root
rights or
16Novell Access Manager 3.1 SP2 SSL VPN Server Guide
user privileges for that workstation, the SSL VPN connection is made in Kiosk mode.
For more information on the client platforms and setups tested by Novell, see the Access Manager
3.1 Support Pack 1 SSLVPN integration testing report (http://www.novell.com/support/
viewContent.do?externalId=7004342&sliceId=1).
Section 1.3.1, “Enterprise Mode,” on page 17
Section 1.3.2, “Kiosk Mode,” on page 19
1.3.1 Enterprise Mode
In Enterprise mode, all applications, including those on the desktop and the toolbar, are enabled for
SSL, regardless of whether they were opened before or after connecting to SSL VPN. In this
approach, a thin client is installed on the user’s workstation. In Enterprise mode, the IP Forwarding
feature is enabled by default.
Enterprise mode is recommended for devices that are managed by an organization, such as a laptop
provided by the organization for its employees. Enterprise mode supports the following:
Protocols such as TCP, UDP, ICMP, and NetBIOS.
Applications that open TCP connections on both sides, such as VoIP and FTP.
novdocx (en) 16 April 2010
Enterprise applications such as CRM and SAP*.
Applications such as Windows File Sharing systems, the Novell Client
TM
, and Novell
SecureLogin.
You can configure a user to connect only in Enterprise mode, depending on the role of the user. For
more information, see Section 4.2.1, “Configuring Users to Connect Only in Enterprise Mode or
Kiosk Mode,” on page 56.
NOTE: If you have configured a user to connect in Enterprise mode only and that user does not
meet the prerequisites, the SSL VPN connection fails with an appropriate error message if it is using
the applet-based Web browser, or a blank screen if an ActiveX-based Web browser is used.
“Prerequisites” on page 17
“User Scenarios” on page 17
Prerequisites
A user can access SSL VPN in Enterprise mode if any one of the following prererequisites is in
place:
The user is an administrator or a
root
user of the machine, or a Super user or an Administrator
user in Windows Vista user.
The user is a non-admin or a non-
root
user, or a standard user in Windows Vista.
root
user who knows the credentials of the administrator or
The SSL VPN client components are preinstalled on the user’s machine.
User Scenarios
Depending on which prerequisites are in place, users have different login scenarios.
“Scenario 1: The User Is the Admin or Root User of the Machine” on page 18
Overview of SSL VPN17
“Scenario 2: The User Is the Non-Admin or Non-Root User of Machine and Knows the Admin
or Root Credentials” on page 18
“Scenario 3: The User Is a Non-Admin or Non-Root User, but the Client Components Are
Preinstalled on the Machine” on page 19
Scenario 1: The User Is the Admin or Root User of the Machine
novdocx (en) 16 April 2010
When the user is an administrator or a
root
admin or
user and Enterprise mode is enabled by default after the user specifies credentials in
the Access Manager page. An admin or a
root
user of the machine, the tool identifies the user as the
root
user can connect to SSL VPN only in Enterprise
mode unless the system administrator configures the user to connect in Kiosk mode only. For more
information on how to configure users for Kiosk mode only, see Section 4.2.1, “Configuring Users
to Connect Only in Enterprise Mode or Kiosk Mode,” on page 56.
Scenario 2: The User Is the Non-Admin or Non-Root User of Machine and Knows the
Admin or Root Credentials
root
A non-admin or a nonadministrator or
root
user can access SSL VPN in Enterprise mode if the user knows the
user credentials. When a non-admin or a non-
root
user connects to SSL
VPN, the user is prompted to specify the credentials on the Access Manager page. The tool
root
identifies that the credentials supplied are those of the non-admin or a non-
user and displays
the following dialog box.
Figure 1-2 SSL VPN Dialog box
The user must specify the username and password of the administrator or the
machine in the dialog box, then click OK to enable Enterprise mode.
Enterprise mode is enabled by default in the subsequent sessions and the user is not prompted again
for the administrator or
18Novell Access Manager 3.1 SP2 SSL VPN Server Guide
root
username and password.
root
user of the
novdocx (en) 16 April 2010
Non-admin or non-
root
users who have connected to SSL VPN in Enterprise mode can connect to
SSL VPN in Kiosk mode on the same machine. For more information, see “Switching from
Enterprise Mode to Kiosk Mode” in the Novell Access Manager 3.1 SP2 SSL VPN User Guide.
NOTE: Users cannot switch from one mode to another if you have configured them to connect in
one mode only.
Scenario 3: The User Is a Non-Admin or Non-Root User, but the Client Components Are
Preinstalled on the Machine
root
If a non-admin or a non-
user wants to install SSL VPN in Enterprise mode, you can preinstall
the SSL VPN client components on the user’s machine. For more information, see Section 4.1,
root
“Preinstalling the SSL VPN Client Components,” on page 55. When non-admin or non-
users
access the client components from a workstation that has the SSL VPN client components
root
preinstalled, the users are not prompted to enter the credentials of the admin user or
user.
The users are connected to SSL VPN in Enterprise mode after they specify their credentials on the
Access Manager login page.
1.3.2 Kiosk Mode
In Kiosk mode, only a limited set of applications are enabled for SSL VPN. A non-admin user, a
root
nonshe does not have administrator access. In Kiosk mode, applications that were opened before the
SSL VPN connection was established are not SSL-enabled.
user, or a standard user in Windows Vista can connect to SSL VPN in Kiosk mode if he or
Kiosk mode supports TCP and UDP applications only. This mode is better suited for machines that
are not managed by an organization, such as home computers and computers in Web browsing
kiosks.
You can configure a user to connect in Kiosk mode only. When you have done so, a user is
connected to SSL VPN in Kiosk mode after the user provides credentials in the Novell Access
Manager login page. For more information, see Section 4.2.1, “Configuring Users to Connect Only
in Enterprise Mode or Kiosk Mode,” on page 56.
If you have left the mode selection to the client and a user logs in to the SSL VPN client as a non-
root
admin or non-
user, the following dialog box is displayed:
Overview of SSL VPN19
Figure 1-3 SSL VPN Dialog Box
novdocx (en) 16 April 2010
The user can do one of the following to load the Kiosk mode:
Click Ignore to connect to SSL VPN in Kiosk mode for that particular session. The user is
root
prompted again to provide the administrator or the
username and password during the
next login.
Click Ignore Forever to connect to SSL VPN in Kiosk mode in the current session, as well as in
subsequent sessions.
A user who has clicked Ignore Forever can still switch to SSL VPN in Enterprise mode in the next
session. For more information, see “Switching from Kiosk Mode to Enterprise Mode” in the Novell
Access Manager 3.1 SP2 SSL VPN User Guide.
NOTE: When a non-admin user uses Internet Explorer to establish an SSL VPN connection, the
ActiveX download fails. This happens because ActiveX requires admin rights to download.This
issue might also occur if you have upgraded from an older version. If a user wants to access SSL
VPN with Internet Explorer, use the following URL:
https:<DNS-Name>/sslvpn/login?forcejre=true
For more information, see Section 4.2.4, “Configuring SSL VPN to Download the Java Applet on
Internet Explorer,” on page 59.
20Novell Access Manager 3.1 SP2 SSL VPN Server Guide
2
Basic Configuration for SSL VPN
SSL VPN servers are auto-imported into the Administration Console during installation.You can use
the SSL VPNs page in the Administration Console to view information about the current status of all
SSL VPN servers and to configure the SSL VPN servers.
Before you proceed with the SSL VPN configuration, you must do the following:
Install the SSL VPN server. For more information, see “Installing the SSL VPN Server” in the
Novell Access Manager 3.1 SP2 Installation Guide.
Install the Linux Access Gateway, if you want to accelerate SSL VPN by using the Linux
Access Gateway. For more information, see “Installing the Linux Access Gateway Appliance”
in the Novell Access Manager 3.1 SP2 Installation Guide.
Log in to the Administration Console as the admin user. For more information, see “Logging In
to the Administration Console” in the Novell Access Manager 3.1 SP2 Installation Guide.
Create an Identity Server configuration. For more information, see “Configuring an Identity
Server” in the Novell Access Manager 3.1 SP2 Identity Server Guide.
novdocx (en) 16 April 2010
2
If you have upgraded from SSL VPN 3.0 to SSL VPN 3.1, update the SSL VPN servers before
you proceed with any other configurations. For more information, see “Updating Configuration
Changes to the Upgraded Server” in the Novell Access Manager 3.1 SP2 Installation Guide.
This section has the following information:
Section 2.1, “Configuring Authentication for the ESP-Enabled Novell SSL VPN,” on page 21
Section 2.2, “Accelerating the Traditional Novell SSL VPN,” on page 23
Section 2.3, “Configuring the IP Address, Port, and Network Address Translation (NAT),” on
page 27
Section 2.4, “Configuring Route and Source NAT for Enterprise Mode,” on page 32
Section 2.5, “Configuring DNS Servers,” on page 33
Section 2.6, “Configuring Certificate Settings,” on page 35
2.1 Configuring Authentication for the ESPEnabled Novell SSL VPN
If you installed the ESP-enabled Novell SSL VPN, then an Embedded Service Provider component
was installed along with the SSL VPN server during the installation. You must now configure the
Embedded Service Provider in order to establish a trust relationship between the Identity Server and
the Embedded Service Provider.
NOTE: If you have installed the Traditional SSL VPN, refer to Section 2.2, “Accelerating the
Traditional Novell SSL VPN,” on page 23.
1 In the Administration Console, click Devices > SSL VPNs > Edit.
The Server configuration page is displayed.
2 Select Authentication Configuration from the Basic Gateway Configuration section.
Basic Configuration for SSL VPN
21
novdocx (en) 16 April 2010
3 Fill in the following fields:
Identity Server Cluster: Specifies the Identity Server cluster that you want the SSL VPN to
trust for authentication. Select the configuration you have assigned to the Identity Server.
Authentication Contract: Specifies the type of contract, which determines the information a
user must supply for authentication. By default, you can select from the following
authentication contracts:
Any Contract: If the user has authenticated, this option allows any contract defined for
the Identity Server to be valid, or if the user has not authenticated, it prompts the user to
authenticate using the default contract assigned to the Identity Server configuration.
Name/Password - Basic: Specifies basic authentication over HTTP, using a standard
login pop-up provided by the Web browser.
Name/Password - Form: Specifies a form-based authentication over HTTP, using the
Access Manager login form.
Secure Name/Password - Basic: Specifies basic authentication over HTTPS, using a
standard login pop-up provided by the Web browser.
Secure Name/Password - Form: Specifies a form-based authentication over HTTPS,
using the Access Manager login form.
Embedded Service Provider Base URL: The application path for the Embedded Service
Provider. This URL has the following constituents:
Protocol: Specifies the communication protocol. Specify HTTPS in order to run securely
in SSL mode. Use HTTP only if you do not require security.
Domain: The DNS name used to access the SSL VPN server. Using an IP address is not
recommended.
Port: Specifies the port values for the protocol. The port is 80 or 8080 for HTTP or 443 or
8443 for HTTPS. If you want to use port 80 or 433, select the port here, then select the
Redirect Requests from Non-Secure Port to Secure Port option. Selecting 80 for HTTP
and 443 for HTTPS implies that the port needs to be translated.
22Novell Access Manager 3.1 SP2 SSL VPN Server Guide
Application: Specifies the SSL VPN server application path.
Redirect Requests from Non-Secure Port to Secure Port: Specify this option to redirect the
browsers to the secure port in order to establish an SSL connection. If this option is not
selected, browsers that connect to the non-secure port are denied service.
SSL VPN Certificate: Configure a certificate for SSL.This certificate is used when SSL VPN
communicates with the SSL VPN server.
You can click the icon to select the default test-connector certificate created for SSL VPN. The
subject name of this certificate should match the DNS name of the SSL VPN server. For more
information, see the Section 2.6, “Configuring Certificate Settings,” on page 35.
Embedded Service Provider Certificate: Configure a certificate for the Embedded Service
Provider to communicate with the Identity Server. You can click the icon to select a certificate.
Make sure that the subject name of this certificate matches the DNS name of the SSL VPN
server. For more information, see Section 2.6, “Configuring Certificate Settings,” on page 35.
NOTE: Before you proceed with the configuration, verify if SSL VPN certificates are
imported into the trust store. To verify, log in to the Administration Console, select Security > Trusted Roots, click the down arrow for the trusted root that you are interested in. Make sure
that two SSL VPN trust stores are displayed. If they do not exist, you must manually push the
certificates to the trust store.
novdocx (en) 16 April 2010
The following URLs are displayed when the Published DNS name is populated:
Login URL: Displays the URL that you need to use for logging users in to the protected
resources.
Logout URL: Displays the URL that you need to use for logging users out of protected
resources.
Metadata URL: Displays the location of the metadata.
Health Check URL: Displays the location of the health check.
4 Restart the Tomcat server when prompted.
5 To save your modifications, click OK, then click Update on the Configuration page.
6 Click Update on the Identity Server Configuration page.
7 (Optional) Proceed with Section 2.3, “Configuring the IP Address, Port, and Network Address
Translation (NAT),” on page 27, if you have not already configured the SSL VPN server
details.
2.2 Accelerating the Traditional Novell SSL VPN
NOTE: If you have installed the ESP-enabled Novell SSL VPN, skip this section and make sure
that you have completed Section 2.1, “Configuring Authentication for the ESP-Enabled Novell SSL
VPN,” on page 21.
If you have installed the traditional Novell SSL VPN, this is a mandatory configuration in order to
accelerate the SSL VPN server.
Section 2.2.1, “Configuring the Default Identity Injection Policy,” on page 24
Section 2.2.2, “Injecting the SSL VPN Header,” on page 24
Basic Configuration for SSL VPN23
2.2.1 Configuring the Default Identity Injection Policy
The SSL VPN server requires a user credential profile consisting of the following elements:
Username and password information
A proxy session cookie
The roles assigned to the current user for authentication information
Each element added to the custom header requires a name with an “X-” prefix. The name you enter
is specific to the application using the custom header, and might be case sensitive. You need to
obtain this information from the application before creating the custom header. The Access Gateway
injects these headers into the SSL VPN server.
The SSL VPN server requires the following three headers:
Authentication header containing the credential profile with a username and password
Custom header containing a proxy session cookie element named X-SSLVPN-PROXY-
SESSION-COOKIE
Custom header containing roles for current user element, named X-SSLVPN-ROLE
novdocx (en) 16 April 2010
You can configure Access Gateway to inject the client IP address as a custom header along with the
other three headers. This custom header should be named X-SSLVPN-CLIENTIP. This enables
logging of the client IP address for SSL VPN. This is an optional configuration and is not enabled by
default. If it is not enabled, the SSL VPN server reports it to the Audit server as a connection
accepted from
Unknown Host
.
To add this header to the SSL VPN policy:
1 In the Administration Console, click Devices > Access Gateways > Policies.
2 (Conditional) If you have not created the SSL VPN default policy, click Create SSL VPN
Default. Then click Apply Changes.
3 In the list of policies, click SSLVPN Default > 1.
4 In the Actions section, click New, then select Inject into Custom Header.
5 Fill in the following values:
Custom Header Name: Specify X-SSLVPN-CLIENTIP.
Va lu e: Select Client IP.
6 Click OK twice.
7 Click Apply Changes.
2.2.2 Injecting the SSL VPN Header
The example in this section explains how to accelerate SSL VPN server in a path-based multihoming configuration.
Before you begin, make sure you have already created a proxy service and an authentication
procedure. For more information on creating a proxy service and authentication procedure, see
“Configuring a Reverse Proxy” in the Novell Access Manager 3.1 SP2 Setup Guide.
1 In the Administration Console, click Devices > Access Gateways > Edit > [Name of Reverse
Proxy].
24Novell Access Manager 3.1 SP2 SSL VPN Server Guide
2 In the Proxy Service List section, click New.
novdocx (en) 16 April 2010
3 Fill in the following fields:
Proxy Service Name: Specify a name for the proxy service.
Multi-Homing Type: Specify the method for finding a second resource on the reverse proxy.
For this example configuration, Path-Based has been selected.
Published DNS Name: This field is populated by default with the published DNS name.
Path: Specify the path to the SSL VPN resource. This must be
/sslvpn
.
Web Server IP Address: Specify the public IP address of the SSL VPN server.
NOTE: If the SSL VPN server and the Linux Access Gateway are installed on the same
machine, you must configure the loopback IP address 127.0.0.1 as the Web Server IP address.
For more information on configuring the loopback IP address, see “Configuration Changes to
the SSL VPN Server Installed with the Access Gateway Appliance” in the Novell Access
Manager 3.1 SP2 Installation Guide.
Host Header: Select which hostname is forwarded to the Web server in the host header. If your
SSL VPN server has a DNS name, select Web Server Host Name.
Web Server Host Name: Specify the DNS name of the SSL VPN server.
4 Click OK.
5 To configure the default Identity Injection policy and protected resources, click the newly
added proxy service.
Basic Configuration for SSL VPN25
novdocx (en) 16 April 2010
6 In the Path List section, make sure the Path is /sslvpn.
7 In the Path List section, select the /sslvpn check box, then click Enable SSL VPN.
8 Fill in the following fields:
Policy Container: Select a policy container from the list.
Policy: Select Create SSL VPN Default Policy from the drop-down list. A policy pop-up
appears. Click Apply Changes in the pop-up, then click Close.
The default SSL VPN policy injects both the username and password in the authentication
header. If you do not want the password to be pushed to the authentication header, configure a
policy with a username and a string constant. For more information on configuring policies, see
“Creating Identity Injection Policies” in the Novell Access Manager 3.1 SP2 Policy Guide.
You can also configure the SSL VPN policy to inject the client IP address, so that the IP
address can then be included in log entries. For more information, see Section 2.2.1,
“Configuring the Default Identity Injection Policy,” on page 24.
Name: Select Create SSL VPN Default Protected Resource from the drop-down list.
9 Click OK to close the Enable SSL VPN pop-up.
26Novell Access Manager 3.1 SP2 SSL VPN Server Guide
10 Click the Web Servers tab.
11 Specify 8080 in the Connect Port field, then click OK.
12 In the Proxy Service List section, click the name of the parent proxy service of the newly
created SSL VPN proxy service. This host does not have a multi-homing value.
13 Select the Protected Resources tab.
14 Select SSLVPN_Default from Protected Resources List.
15 Select an authentication contract from the Authentication Procedure drop-down list.
The user is assigned the timeout value of the contract used for authentication, and not the
default timeout value.
16 In the URL Path List section, ensure that the URL is /sslvpn/*.
novdocx (en) 16 April 2010
IMPORTANT: Make sure that you configure the URL as given above. Any variation leads to
the failure of SSL VPN service.
17 Click Configuration Panel, then click OK.
18 On the Configuration page, click OK.
19 On the Access Gateways page, click Update.
20 To update the Identity Server, click Identity Servers > Update.
21 Click Close.
22 (Optional) If you have not already configured the SSL VPN server details, proceed with
Section 2.3, “Configuring the IP Address, Port, and Network Address Translation (NAT),” on
page 27.
2.3 Configuring the IP Address, Port, and
Network Address Translation (NAT)
The Gateway Configuration page displays the current configuration of the SSL VPN server, such as
the external IP address if the SSL VPN server is behind NAT, the listening IP address, TCP
encryption port, Connection Manager port, and the type of encryption used.
Basic Configuration for SSL VPN27
This section describes how to configure the IP addresses, port, subnet address and subnet mask, and
protocol for SSL VPN.
Section 2.3.1, “Configuring the SSL VPN Gateway behind NAT or L4,” on page 28
Section 2.3.2, “Configuring the SSL VPN Gateway without NAT or an L4 Switch,” on page 30
2.3.1 Configuring the SSL VPN Gateway behind NAT or L4
To configure SSL VPN behind NAT or by using an L4 switch:
1 In the Administration Console, click Devices > SSL VPNs > Edit.
The Server configuration page is displayed.
2 Select Basic Configuration from the Gateway Configuration section.
novdocx (en) 16 April 2010
3 Specify the following NAT/L4 configuration as follows:
Behind NAT/L4: Select the check box to specify that the SSL VPN Gateway is behind NAT.
28Novell Access Manager 3.1 SP2 SSL VPN Server Guide
Public IP Address: This field is enabled when the Behind NAT check box is selected. Specify
the public IP address (that is, the address exposed to the Internet user) that translates into the
SSL VPN Gateway IP address. This is the IP address where the external user on the Internet
must be able to access the SSL VPN server.
Port: Specify a port number for Kiosk mode as well as for Enterprise mode when the SSL
VPN server is behind an L4 switch or a behind NAT.
Protocol: Specify a protocol for Kiosk mode as well as for Enterprise mode, when the SSL
VPN server is behind an L4 switch or behind NAT. The protocol is TCP for Kiosk mode and
UDP for Enterprise mode.
4 Specify the device-specific configuration as follows:
Cluster Member: Select the cluster member from a list of IP addresses.
Listening IP Address: Specify the IP address that the SSL VPN listens on.
Port: Specify a port number for Kiosk mode as well as for Enterprise mode when the SSL
VPN server is behind an L4 switch or behind NAT. Make sure that the port you specify here is
free.
Protocol: Specify a protocol for Kiosk mode as well as for Enterprise mode, when the SSL
VPN server is behind an L4 switch or behind NAT. The protocol is TCP for Kiosk mode, but it
can either be TCP or UDP for Enterprise mode.
novdocx (en) 16 April 2010
5 Specify the following information to configure the assigned IP address pool for Enterprise
mode:
Subnet Address: Specify the IP address of the subnet pool where SSL VPN assigns the IP
address to each client in Enterprise mode. For this assigned IP address pool to work properly,
you must configure the routing table and source NAT. For more information, see Section 2.4,
“Configuring Route and Source NAT for Enterprise Mode,” on page 32.
Subnet Mask: Specify the subnet mask for Enterprise mode.
The values specified in the Subnet Address and Subnet Mask fields determine the IP addresses
that are assigned to the clients. Make sure that the assigned IP address and the IP address of the
client do not match.
NOTE: IP pooling is not applicable for Kiosk mode. In Enterprise mode, if you have only one
SSL VPN server installed, then you can configure only one IP pool. However, if you have
multiple SSL VPN servers in a cluster, then each SSL VPN server must have separately defined
IP pools.
6 Specify the other configuration as follows:
Cluster Communications Port: Specify the port that is used for communication between the
cluster members.
Identity Provider Address: Specify the IP addresses or the DNS name of the Identity Server
if you are configuring SSL VPN for the full tunneling mode. For more information on full
tunneling, see Section 3.4, “Configuring Full Tunneling,” on page 50.
Access Gateway Address: Specify the IP address or DNS name of the Access Gateway if your
server is accelerated by the Access Gateway and if you are configuring SSL VPN for the full
tunneling mode. This field is not present if you have installed the ESP-enabled SSL VPN. For
more information on full tunneling, see Section 3.4, “Configuring Full Tunneling,” on page 50.
Basic Configuration for SSL VPN29
Inactivity Timeout (Minutes): You can configure the time in minutes. If no data exchange
takes place during the stipulated time, the connection is closed so that the resources are freed to
allow additional incoming connections. The inactivity timeout period can be one minute to
1800 minutes. The default inactive timeout period is 30 minutes.
Encryption: Select the type of encryption. It can be either AES128 or AES 256.
Enterprise Mode Compression: Specify if you want to enable compression in Enterprise
mode in order to reduce the time taken to establish connection.
Authentication Hardenings: This option is applicable to Enterprise mode clients only. When
this option is enabled, it provides protection against active attacks by using a keyed Hash
Message Authentication Code (HMAC) cryptographic hash such as SHA1 to sign and verify
packets. When this option is enabled, a packet is examined by a stateless filter and dropped if
the HMAC signature does not match.
To enabl e Authentication Hardening, select On. To manually regenerate the key click Re-generate. This option uses random number generation to regenerate the key.
Server Debug Level: Set this option to On if you want to get more debug information from the
server. This option is set to Off by default.
Client Debug Level: Set this option to On if you want to get more debug information from the
client.This option is set to Off by default.
novdocx (en) 16 April 2010
7 To save your modifications, click OK, then click Update on the Configuration page.
2.3.2 Configuring the SSL VPN Gateway without NAT or an L4
Switch
1 In the Administration Console, click Devices > SSL VPNs > Edit.
The Server configuration page is displayed.
2 Select Basic Configuration from the Gateway Configuration section.
30Novell Access Manager 3.1 SP2 SSL VPN Server Guide
Loading...
+ 80 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.