AXS GUARD HOW TO PERSONAL AXS ® USE THE GUARD Able NV – Dellingstraat 28b – 2800 Mechelen – Belgium tel: +32 15 50 44 00 fax: +32 15 50 44 09 [email protected] 1 Contents 1 2 3 4 5 Contents................................................................................... .........2 Copyrights and Conditions of Use......................................................3 About this document.......................................... ...............................3 Background.............................................................. .........................4 On the HQ aXs GUARD............................................................. ..........4 5.1 Overview................................................................. ....................4 5.2 Instructions................................................................................. .4 5.2.1 Enable Personal aXs GUARD Option..........................................4 5.2.2 Initializing the Certificate Authority........................................ ...5 5.2.3 Creating an SSL Server Certificate............................................6 5.2.4 Attaching a Certificate to the aXs GUARD SSL Server................7 5.2.5 Configuring the Personal aXs GUARD .......................................7 5.2.6 Creating an SSL Personal aXs GUARD Certificate....................12 5.2.7 Exporting the Certificate to the Personal aXs GUARD..............13 6 On the Personal aXs GUARD........................................................... ..14 6.1 Overview.............................................................. .....................14 6.2 Personal aXs GUARD Defaults.................................. ..................14 6.3 Administrator's Tool Access Levels.............................................14 6.4 Installation Instructions........................................................... ...15 7 Personal aXs GUARD Status........................................ .....................18 7.1 HQ aXs GUARD Administrator's Tool...........................................18 7.2 Personal aXs GUARD Administrator's Tool...................................19 8 Troubleshooting....................................................... ........................19 8.1 UDP port 1194......................................................... ..................19 8.2 No wireless AES encryption on Windows XP client......................19 8.3 Logging onto the HQ aXs GUARD ..............................................19 8.4 Logging onto the Personal aXs GUARD.......................................19 9 About Able............................................................................... ........20 10 About VASCO............................................................... ..................21 aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 2 of 21 12. July 2007 2007 Able NV 2 Copyrights and Conditions of Use Able Software and Documents contain proprietary and confidential information. Able may have or may be applying for patents, trademarks, copyrights or other intellectual property rights for Software and Documentation. aXs GUARD®, aXs GUARD à la Carte™ and UNI-box™ are trademarks of Able. Other company, brand or product names mentioned herein may be the trademarks or registered trademarks of their respective owners. Able Software and Documentation are provided “as is” without warranty or conditions of any kind, whether implied or statutory, including but not limited to implied warranties of marketability, merchantability or fitness for a particular purpose. Able has no liability under any circumstances for any loss, damage or expense incurred by you, your company or any third party arising from the use, or inability to use Able Software or Documentation, regardless of the cause of the loss, including negligence. This document is protected under US, European and international copyright law as an unpublished work of authorship. No part of it may be transferred, disclosed, reproduced or transmitted in any form or by any means, electronic, mechanical or otherwise, for any purpose, except as expressly permitted by Able in writing. All title, rights and interest in the aXs GUARD, updates and upgrades thereof, including software rights, copyrights, patent rights, trade secret rights, mask work rights, sui generis database rights and all other intellectual and industrial property rights, shall vest exclusively in Able or, pursuant to the terms of a separate license agreement, its licensors. No part of Able Products may be transferred, disclosed, reproduced or transmitted in any form or by any means, electronic, mechanical or otherwise, for any purpose, except as expressly permitted by Able in writing. Copyright © 2007 Able NV. All rights reserved. 3 About this document This document describes how to configure a Personal aXs GUARD from the central aXs GUARD. Certain actions are required on both units and are explained in this “hands on” guide to help you get everything up-andrunning as quickly as possible. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 3 of 21 12. July 2007 2007 Able NV 4 Background The Personal aXs GUARD is connected securely to an aXs GUARD with a Secure Socket Layer (SSL) VPN connection. The aXs GUARD manages everything centrally for all connected Personal aXs GUARD units, from IP addresses and passwords to complex firewall settings. An SSL VPN connection is based on certificates. The creation of valid certificates is only possible through a certificate authority. aXs GUARD is therefore equipped with a certificate authority, which first needs to be configured. How to complete each of the necessary steps is explained in detail in the following sections. 5 5.1 On the HQ aXs GUARD Overview This section explains how to configure the aXs GUARD to allow connection and central management of Personal aXs GUARDs. 5.2 Instructions 5.2.1 Enable Personal aXs GUARD Option Under the System > Feature Activation menu (shown in the screen shot below) locate and switch on the option: • “Do you use the Personal aXs GUARD?” aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 4 of 21 12. July 2007 2007 Able NV 5.2.2 Initializing the Certificate Authority A CA allows you to create valid certificates for the SSL VPN connection between aXs GUARD and the Personal aXs GUARD. 1. Go to the Public Key Infrastructure > Certificate Authority screen. 2. Select a country, and enter the organization name and locality. This information will be included in all certificates created by the aXs GUARD CA. 3. Enter a unique name to identify the aXs GUARD CA, for example caaxsguard.yourdomain.be. 4. Enter an email address for any notifications regarding this certificate. 5. Enter a CA Passphrase. This phrase is needed to issue new certificates and therefore prevents unauthorized certificate issue from the CA. 6. Specify the number of days the CA, and all certificates issued since its initialization may remain valid. You need to reinitialize the CA and create new certificates once this date has passed. Warning: Remember the CA passphrase, as no certificates can be issued without it. Able cannot retrieve a lost passphrase. The only solution for a forgotten CA passphrase is to reinitialize the CA, which renders all previously issued certificates invalid. 7. Press the Initialize button and a confirmation of the CA initialization will appear. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 5 of 21 12. July 2007 2007 Able NV 5.2.3 Creating an SSL Server Certificate Both sides of an SSL VPN connection need a certificate; first we need to create a certificate for the aXs GUARD SSL server. 1. On the PKI > Certificates screen (see below), click on the Issue new certificate button. 2. Select Server for Certificate usage. 3. Enter a unique Hostname for the certificate, for example sslserver.yourdomain.be. 4. Enter the CA passphrase, to use the CA. 5. Click Sign (top right) to create the new server certificate. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 6 of 21 12. July 2007 2007 Able NV 5.2.4 Attaching a Certificate to the aXs GUARD SSL Server 1. Go to the VPN & RAS > Personal aXs GUARD > General screen. 2. Enable the Personal aXs GUARD connection. Disabling blocks all logon attempts from Personal aXs GUARDs. 3. Select the newly created server certificate. 4. The specified IP range will be used for creating the SSL tunnel between the aXs GUARD and the Personal aXs GUARDs. Check that this range is unused on your network and if necessary, change it to an unused one. Routing problems occur, if the range isn't unique. Note: Checking the Enabled option automatically allows SSL connection attempts from Personal aXs GUARDs by adding the int-sslvpn firewall rule to the stat-int static firewall policy. Deselecting this option removes this rule from the stat-int static firewall policy, so that all connections from Personal aXs GUARDs are rejected. 5.2.5 Configuring the Personal aXs GUARD Name & Enabling options Each Personal aXs GUARD used on the network needs to be configured in the central or Head Quarter (HQ) aXs GUARD. 1. Go to the VPN & RAS > Personal aXs GUARD > Client screen and click on the Add new button. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 7 of 21 12. July 2007 2007 Able NV Warning: Modifications made to the settings of a Personal aXs GUARD are only active on reboot of the Personal aXs GUARD or restart of the VPN tunnel (wait at least 10 seconds before reactivating). Doing a remote reboot of a Personal aXs GUARD is possible using the VPN & RAS > Status > Personal aXs GUARD screen. 2. Choose a unique (Distinguished) name for the Personal aXs GUARD. 3. Enable the remote LAN DHCP server and wireless settings, if needed. General Tab 1. If the VPN tunnel may not start when the Personal aXs GUARD reboots, deselect Start this VPN automatically. 2. Enter an administrator and user password. 3. Add a description and extra remarks, if needed. Network Tab 1. Click on the Network tab 2. Enter the Personal aXs GUARD secure LAN IP address and netmask. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 8 of 21 12. July 2007 2007 Able NV 3. By default the DNS servers of the HQ aXs GUARD are used whenever the VPN tunnel is connected; otherwise the ISP's DNS servers are used. In some cases, it is preferable to use another DNS server, for example the active directory DNS server. If so, select the Do not use the aXs GUARD DNS Servers option and enter the IP address(es) of the prefered DNS server(s). 4. Add all networks which should be routed through the VPN tunnel to the Routing towards following networks field. Otherwise, traffic towards these networks is routed to the Internet. Normally the secure LAN range of the HQ aXs GUARD should be added here too. DHCP Tab 1. Click the DHCP tab or skip this (DHCP) section, if the DHCP server has been disabled. 2. Add the DNS suffix used in your network; this will be used whenever an incomplete DNS query is used (e.g. “www” will be expanded to “www.mydomain.be”). 3. Enter the DHCP IP range and netmask. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 9 of 21 12. July 2007 2007 Able NV 4. Force the DHCP server to give certain clients in the Personal aXs GUARD secure LAN a specific IP address, by adding the Ethernet MAC address and preferred IP address in the MAC to IP mappings field. Wireless Tab 1. Click the Wireless tab or skip this (Wireless) section, if the wireless option has been disabled. 2. Enter in the SSID field a name for identifying the Personal aXs GUARD to wireless clients in the Personal aXs GUARD's secure LAN. 3. Select the appropriate wireless encryption for your network. Currently WPA PSK AES is the most secure, and therefore recommended. Warning: The Wireless Secret key for the WEP encryption must be 26 characters long, comprising characters 0-9 and/or A-F. 4. Choose a password (Wireless Secret Key) to protect access to the wireless network of the Personal aXs GUARD. Firewall Tab Click the Firewall tab. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 10 of 21 12. July 2007 2007 Able NV The Personal aXs GUARD firewall settings depend on the VPN tunnel state: When the VPN tunnel is not connected: • only ICMP packets and support connections from Able are allowed to connect to the Personal aXs GUARD; • everything is allowed from the secure LAN towards the Internet. When the VPN tunnel is connected: • ICMP packets and support connections from Able may connect to the Personal aXs GUARD; • The firewall settings as shown in the screen above are active. Warning: Unlike the VPN PPTP and VPN L2TP connections, the stat-sec firewall rights and user and group special VPN firewall policies do NOT apply for the Personal aXs GUARD. All access rights are administered in the Personal aXs GUARD settings, i.e. once access has been granted to the VPN tunnel at the Personal aXs GUARD side, everything is allowed. Access must therefore be controlled at the Personal aXs GUARD side as follows: • Access rights added in the Firewall Policies field provide access outside the Tunnel, i.e. directly to the Internet. • Access rights added in the Tunnel Firewall policies field provide access through the VPN tunnel. The same firewall policies as in the HQ aXs GUARD are available, although some restrictions are applied: • Firewall policies: only fwd- dynamic policies (i.e. dynamic policies with the rule type “Rules through the aXs GUARD”) are valid. These policies allow access to services on the Internet without using the VPN tunnel; • Tunnel Firewall policies: fwd- dynamic policies and sec- dynamic policies are valid. The fwd- policies grant access through the HQ aXs GUARD towards its secure LAN, DMZ zone and possibly the Internet. The sec- dynamic policies allow access to services running on the HQ aXs GUARD. • All other firewall dynamic policies are unusable for configuring the Personal aXs GUARD. Note: Incoming and outgoing devices specified in fwd- dynamic policies are unused on the Personal aXs GUARD. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 11 of 21 12. July 2007 2007 Able NV Access rights can be restricted to a specific IP address or range of addresses by specification in the Source IP field. This allows strict administration of firewall access rights. Additionally an IP address can be assigned to a specific client PC on the secure LAN of the Personal aXs GUARD, based on the MAC address and the Personal aXs GUARD DHCP server (see the section on DHCP server settings above). Security Recommendations Depending on the setup of the Personal aXs GUARD secure LAN, firewall requirements may differ. The fwd-access-lan as a tunnel Firewall policy may be effective for setups where the Personal aXs GUARD secure LAN consists of only laptops and/or desktops controlled by the company (e.g. a Microsoft domain with restricted user access). However it is good practice to restrict access through the VPN tunnel and to the Internet, if other potentially dangerous client computers exist on the network. We recommend a setup which ensures that potentially dangerous or infected client computers connect directly to the Internet using an existing installation, while computers needing access to the HQ secure LAN are connected safely behind the Personal aXs GUARD. A protective option is to connect the Personal aXs GUARD Internet Interface to an existing secure LAN switch, and connect client computers which need access to the HQ secure LAN in the secure LAN of the Personal aXs GUARD. This setup supports physically separate HQ and remote secure LANs. 5.2.6 Creating an SSL Personal aXs GUARD Certificate Certificates are needed for both ends of an SSL VPN connection. This section describes how to create the Personal aXs GUARD certificate. 1. On the PKI > Certificates screen (see below), click on the Issue new certificate button. 2. 3. Select Personal aXs GUARD in the Certificate Usage field. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 12 of 21 12. July 2007 2007 Able NV 4. Select the name of the newly created Personal aXs GUARD in the Personal aXs GUARD field. 5. Specify the number of days the certificate will be valid. 6. Enter the CA passphrase to allow use of the CA. 7. Click on Sign (top right) to create the certificate. 5.2.7 Exporting the Certificate to the Personal aXs GUARD 1. On the PKI > Certificates screen (see below), click on the Export icon in the row for the Personal aXs GUARD certificate. A screen for entering a password appears. 2. The Personal aXs GUARD certificate and some extra information need to be password protected during transport. Enter and confirm a password to be used. When importing the certificate into the Personal aXs GUARD tool, the password needs to be entered. 3. Click on Export (top right) to save the certificate (PKCS12 file with “.p12” extension) on a portable medium for transporting to the Personal aXs GUARD. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 13 of 21 12. July 2007 2007 Able NV 6 On the Personal aXs GUARD 6.1 Overview The following steps instruct on how to configure the Personal aXs GUARD to conect with the HQ aXs GUARD using a secure SSL VPN connection. You will need the Personal aXs GUARD certificate (explained in the previous section) and the password for these steps. 6.2 Personal aXs GUARD Defaults Central aXs GUARD settings for the Personal aXs GUARD are only operational after successful VPN connection to the HQ aXs GUARD. Before this point, defaults are active: • secure LAN IP address: 192.168.1.1 • net mask : 255.255.255.0 • DHCP server enabled • admin password: admin • user password: user Access the Personal aXs GUARD administrator's tool using the following URL: http://192.168.1.1 Warning : It is not recommended to use the reset button at the back of the Personal aXs GUARD as it can cause hardware failure. 6.3 Administrator's Tool Access Levels Two logon accounts exist. The admin account allows full access to all settings. With the user account, local settings cannot be modified. A user account can only reboot the Personal aXs GUARD and disconnect or start up the VPN tunnel. This allows administrators to control whether homeworkers can disconnect or reconnect VPN tunnels (through assignment of user access to homeworkers). Homeworkers may also be assigned no access to the administrator's tool, if preferred. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 14 of 21 12. July 2007 2007 Able NV 6.4 Installation Instructions 1. Configure your network interface to use the DHCP server of the Personal aXs GUARD. 2. Check that the Personal aXs GUARD is reachable by pinging its IP address (open the command prompt by clicking on Start, select the run command and enter ping 192.168.1.1; this should result in a number of replies.) 3. Open a browser and enter the following URL: http://192.168.1.1 Note: Check that no proxy server is configured in your browser; if one is configured, the Personal aXs GUARD tool may not be accessible. 4. Enter the admin username and admin as the password. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 15 of 21 12. July 2007 2007 Able NV 5. Select the Settings screen. 6. Select the type of Internet connection and enter the settings supplied by your ISP. 7. Enter the public IP address of the HQ aXs GUARD (the Personal aXs GUARD needs this to make contact with HQ aXs GUARD). aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 16 of 21 12. July 2007 2007 Able NV 8. Enter the password specified when creating and exporting the certificate from the HQ aXs GUARD. 9. Click the Browse button and select the certificate exported from the HQ aXs GUARD. 10. Click on update. 11. Go to the Home screen and click Now to reboot the Personal aXs GUARD. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 17 of 21 12. July 2007 2007 Able NV Warning: The DMZ LED at the front of the Personal aXs GUARD indicates booting status. Wait until the LED is unlit before proceeding. 12. The Personal aXs GUARD will now connect to the HQ aXs GUARD to retrieve the configurations. 7 7.1 Personal aXs GUARD Status HQ aXs GUARD Administrator's Tool The VPN & RAS > Status > Personal aXs GUARD screen in the HQ aXs GUARD administrator's tool provides an overview of all Personal aXs GUARDs currently connected. It is also possible to remotely reboot a Personal aXs GUARD from this screen. This is useful when modifications to the Personal aXs GUARD's settings need to be activated immediately. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 18 of 21 12. July 2007 2007 Able NV 7.2 Personal aXs GUARD Administrator's Tool Several status screens are available in the Personal aXs GUARD administrator's tool, for example DHCP, VPN, WAN, LAN etc. 8 8.1 Troubleshooting UDP port 1194 Make sure that UDP port 1194 towards the Internet interface of the aXs GUARD is open from the Internet and that the Personal aXs GUARD can connect to the Internet using UDP port 1194. This is needed to allow the SSL tunnel setup. 8.2 No wireless AES encryption on Windows XP client A special Microsoft Windows XP update package is available, which supports AES encryption. For more information visit: http://support.microsoft.com/?id=893357 8.3 Logging onto the HQ aXs GUARD Go to the VPN & RAS > Logs >Personal aXs GUARD and select the current log file (or use the Live log viewer). Verify that packets from the Personal aXs GUARD arrive at the HQ aXs GUARD. Text lines with the public IP address of the Personal aXs GUARD should be visible. 8.4 Logging onto the Personal aXs GUARD The Personal aXs GUARD has limited disk space. Therefore only the last 20 logs are stored. You can view them in the Personal aXs GUARD administrator's tool under Logging. aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 19 of 21 12. July 2007 2007 Able NV 9 About Able Able NV, a Belgian company based in Mechelen, designs, develops and markets aXs GUARD. Able developed aXs GUARD to meet ever-growing Internet risks with a dynamic security and communications product. Since October 2006 Able is integrated in the VASCO group. aXs GUARD is a total (All-in-1) solution to meet all your Internet communication and security needs, and comprises hardware, software and support. Customers design their own aXs GUARD à la Carte, paying only for the modules they need today, making it an affordable solution to SMEs and large organizations alike. Since the first aXs GUARD prototype in 1996, 97% of Able clients have remained loyal aXs GUARD users. The long term reliability of this dynamic solution has won their trust. While aXs GUARD protects their Internet communications, they can focus on business. aXs GUARD is distributed worldwide through a network of dealers based in the Benelux, England, Portugal, Scandinavia and the Middle East. Able NV Dellingstraat 28b 2800 Mechelen Belgium Tel +32 15 50 44 00 Fax +32 15 50 44 09 www.able.be www.axsguard.com [email protected] aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 20 of 21 12. July 2007 2007 Able NV 10 About VASCO VASCO is the number one supplier of strong authentication and esignature solutions and services. VASCO has established itself as the worlds leading software company specialized in Internet Security, with a customer base of over 4,800 companies in more than 100 countries, including close to 750 international financial institutions. VASCO s prime markets are the financial sector, enterprise security, e-commerce and e-government. VASCO Belgium (Brussels) Koningin Astridlaan 164 B-1780 Wemmel phone: +32 2 609 97 00 phone: +32.2.609.97.00 www.vasco.com [email protected] aXs GUARD How to use Personal aXs GUARD AG-70-MNTE-Personal_aXs_GUARD_howto20.odt Page 21 of 21 12. July 2007 2007 Able NV
© Copyright 2026 Paperzz