StoneGate Administrators Guide v5-2
StoneGate Administrators Guide v5-2
StoneGate Administrators Guide v5-2
ADMINISTRATOR’S GUIDE
F I R EWA L L
I N T R U S I ON P R EV E N T I O N S Y S T E M
MANAGEMENT CENTER
V IR TUAL PRIVATE NETWORKS
Legal Information
End-User License Agreement
The use of the products described in these materials is subject to the then current end-user license agreement, which can be found at
the Stonesoft website:
www.stonesoft.com/en/support/eula.html
Replacement Service
The instructions for replacement service can be found at the Stonesoft website:
www.stonesoft.com/en/support/view_support_offering/return_material_authorization/
Hardware Warranty
The appliances described in these materials have a limited hardware warranty. The terms of the hardware warranty can be found at the
Stonesoft website:
www.stonesoft.com/en/support/view_support_offering/warranty_service/
Disclaimer
Although every precaution has been taken to prepare these materials, THESE MATERIALS ARE PROVIDED "AS-IS" and Stonesoft makes
no warranty to the correctness of information and assumes no responsibility for errors, omissions, or resulting damages from the use of
the information contained herein. All IP addresses in these materials were chosen at random and are used for illustrative purposes only.
Copyright © 2010 Stonesoft Corporation. All rights reserved. All specifications are subject to change.
Revision: SGAG_20101027
2
TABLE OF CONTENTS
Table of Contents 3
Sending Messages to Other Administrators . . 53 Default Arrangement of System Status View . 85
Adding Custom Commands to Element Menus . 53 System Summary. . . . . . . . . . . . . . . . . . . . . 86
Creating a Tools Profile . . . . . . . . . . . . . . . . . 53 Viewing System Status for a Selected
Attaching a Tools Profile to an Element. . . . . . 54 Element . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Info Panel . . . . . . . . . . . . . . . . . . . . . . . . . . 87
CHAPTER 4
Setting up the System . . . . . . . . . . . . . . . . . . . 55 Commands for Monitoring Components . . . . . 87
Monitoring Tools in the Main Menu . . . . . . . . 88
Getting Started with the Management Center . . 56
Reading Component Statuses. . . . . . . . . . . . 88
Getting Started with the Firewall . . . . . . . . . . . 56
Engine Hardware Malfunction Icons . . . . . . . . 89
Getting Started with the IPS . . . . . . . . . . . . . . 57
Replication Malfunction Icon . . . . . . . . . . . . . 89
CHAPTER 5
Element Status Colors . . . . . . . . . . . . . . . . . 89
Configuring System Communications . . . . . . . . 59
Node Status Colors . . . . . . . . . . . . . . . . . . . 90
Getting Started with System Communications. . 60 NetLink Status Colors . . . . . . . . . . . . . . . . . 90
Defining Locations . . . . . . . . . . . . . . . . . . . . . 61 VPN Status Colors . . . . . . . . . . . . . . . . . . . . 91
Defining Contact IP Addresses. . . . . . . . . . . . . 62 Connectivity Status Colors . . . . . . . . . . . . . . 91
Defining Engine Location . . . . . . . . . . . . . . . . 62 Creating Overviews. . . . . . . . . . . . . . . . . . . . . 92
Defining Contact Addresses for a Single Creating a New Overview . . . . . . . . . . . . . . . 93
Firewall or a Cluster Virtual IP Address . . . . . . 63
Adding a New System Summary Section to
Defining Contact Addresses for Node an Overview. . . . . . . . . . . . . . . . . . . . . . . . . 93
Dedicated IP Addresses . . . . . . . . . . . . . . . . 65
Adding a New Statistics Section to an
Defining Contact Addresses for an IPS Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Selecting Statistical Items . . . . . . . . . . . . . . 95
Defining Server Contact Addresses . . . . . . . . 67
Setting Thresholds for Monitored Items . . . . . 96
Defining a Contact Address for External
Security Gateway End-Point . . . . . . . . . . . . . . 68 Monitoring Open Connections and Blacklists . . 97
Selecting the Management Client Location . . . . 69 Checking Open Connections and Blacklists . . 97
Configuring Multi-Link System Communications. 70 Saving Blacklist and Connections Snapshots . 99
CHAPTER 6 Exporting Blacklist and Connections
Managing Elements . . . . . . . . . . . . . . . . . . . . . 71 Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . 100
Opening Blacklist and Connections
Using Categories . . . . . . . . . . . . . . . . . . . . . . 72 Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . 100
Configuration Overview . . . . . . . . . . . . . . . . . 72 Comparing Blacklist and Connections
Creating New Categories . . . . . . . . . . . . . . . . 72 Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . 101
Selecting Categories for Elements . . . . . . . . . 73 Monitoring Connections on a Map . . . . . . . . . . 103
Activating Categories . . . . . . . . . . . . . . . . . . 73 Defining a New Geolocation . . . . . . . . . . . . . 104
Filtering With Several Categories . . . . . . . . . . 74 Setting a Geolocation for an Element in the
System Status View . . . . . . . . . . . . . . . . . . . 105
Importing, Exporting and Restoring Elements . . 75
Monitoring Configurations and Policies . . . . . . 105
Exporting Elements. . . . . . . . . . . . . . . . . . . . 75
Monitoring Administrator Actions . . . . . . . . . . . 105
Importing Elements . . . . . . . . . . . . . . . . . . . 76
Monitoring Task Execution . . . . . . . . . . . . . . . 106
Restoring Elements from Policy Snapshots . . . . 78
Checking Maintenance Contract Information . . 107
Locking and Unlocking Elements . . . . . . . . . . . 79
Enabling Automatic Maintenance Contract
Deleting Elements . . . . . . . . . . . . . . . . . . . . . 79 Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Viewing Maintenance Contract Information. . . 107
M ONITORING Viewing Maintenance Contract Information for
SOHO Firewalls . . . . . . . . . . . . . . . . . . . . . . 108
CHAPTER 7 Fetching Maintenance Contract Information . . 108
Monitoring the System. . . . . . . . . . . . . . . . . . . 83
Checking When Internal Certificates or Internal
Getting Started with System Monitoring . . . . . . 84 CAs Expire . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Monitoring the System Status . . . . . . . . . . . . . 84
4 Table of Contents
CHAPTER 8 Changing the Time Zone for Log Browsing . . . 139
Monitoring Third-Party Devices . . . . . . . . . . . . 111 Changing Data Columns in the Log Entry
Getting Started with Third-Party Device Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Resolving Log Details to DNS Names or
Configuration Overview . . . . . . . . . . . . . . . . . 112 StoneGate Elements . . . . . . . . . . . . . . . . . . 140
Receiving Logs From External Devices . . . . . . . 113 Deactivating/Activating Log Entry Highlighting 141
Creating a Logging Profile Element . . . . . . . . . 114 Exporting Data from the Logs View . . . . . . . . . 141
Defining Ordered Field Logging Patterns . . . . . 115 Exporting Extracts of Log Data . . . . . . . . . . . 141
Defining Key-Value Pair Logging Patterns . . . . 116 Exporting IPS Traffic Recordings . . . . . . . . . . 142
Defining Field Resolvers . . . . . . . . . . . . . . . . 117 Attaching Logs to Incident Cases . . . . . . . . . 143
Defining a Field Resolver for Multiple Creating Rules From Logs . . . . . . . . . . . . . . . . 143
Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 CHAPTER 10
Defining a Field Resolver for Date and Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Getting Started with Reports. . . . . . . . . . . . . . 146
Validating a Logging Profile . . . . . . . . . . . . . . 118
Configuration Overview . . . . . . . . . . . . . . . . . 147
Monitoring the Status of Third-Party Devices . . . 119
Creating and Editing Report Designs . . . . . . . . 148
Importing MIBs. . . . . . . . . . . . . . . . . . . . . . . 120
Creating a New Report Design . . . . . . . . . . . 148
Creating a Probing Profile . . . . . . . . . . . . . . . 121
Adding Sections to a Report Design . . . . . . . 150
Activating Monitoring of a Third-Party Device . . . 123
Adding Items to a Report Section . . . . . . . . . 151
Configuring a Third-Party Device for Monitoring . 124
Generating and Viewing Reports . . . . . . . . . . . 151
Changing the Ports for Third-Party Device
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Generating a Report . . . . . . . . . . . . . . . . . . . 152
Activating/Deactivating Third-Party Status Defining the Report Task . . . . . . . . . . . . . . 153
Monitoring Alerts . . . . . . . . . . . . . . . . . . . . . . 125 Selecting Data Sources . . . . . . . . . . . . . . . 154
CHAPTER 9 Cancelling Ongoing Report Tasks . . . . . . . . . 155
Browsing Logged Data . . . . . . . . . . . . . . . . . . . 127 Viewing Reports. . . . . . . . . . . . . . . . . . . . . . 155
Getting Started with the Logs View. . . . . . . . . . 128 Exporting Reports . . . . . . . . . . . . . . . . . . . . . 156
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Exporting a Report as Tab-delimited Text File . 156
Opening the Logs View . . . . . . . . . . . . . . . . . 128 Exporting a Report as a PDF File . . . . . . . . . . 156
Default (Records) Arrangement, Panels, and Printing a Generated Report to PDF . . . . . . . 156
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 E-Mailing Reports. . . . . . . . . . . . . . . . . . . . . 157
Details Arrangement . . . . . . . . . . . . . . . . . . . 131 Creating a System Audit Report. . . . . . . . . . . . 157
Statistics Arrangement . . . . . . . . . . . . . . . . . 132
CHAPTER 11
Browsing Log Data . . . . . . . . . . . . . . . . . . . . . 133 Filtering Data . . . . . . . . . . . . . . . . . . . . . . . . . 159
Viewing Log Entry Details in the Side Panel . . 133 Getting Started with Filtering Data . . . . . . . . . . 160
Filtering Logs in the Logs View. . . . . . . . . . . . 134 Defining Filter Elements . . . . . . . . . . . . . . . . . 160
Specifying Filters for a Query . . . . . . . . . . . . 134 Basics of Constructing Data Filters . . . . . . . . 161
Viewing Logs From Specific Components . . . 136
Creating a Filter Element . . . . . . . . . . . . . . . 162
Viewing Logs From Specific Servers and
Archive Folders. . . . . . . . . . . . . . . . . . . . . . 136 Adding and Modifying Filtering Criteria in
Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Browsing Log Entries on a Timeline . . . . . . . . 137
Removing Filtering Criteria from Filters. . . . . . 164
Viewing Temporary Log Entries. . . . . . . . . . . . 137
Organizing Filter Elements . . . . . . . . . . . . . . . 164
Sorting Log Entries . . . . . . . . . . . . . . . . . . . . 138
Creating New Filter Tags . . . . . . . . . . . . . . . . 164
Checking WHOIS Records for IP Addresses in
Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Changing the Tag of a Filter. . . . . . . . . . . . . . 165
Changing How Data Entries Are Displayed . . . . 139 Applying Filters . . . . . . . . . . . . . . . . . . . . . . . 165
Increasing and Decreasing Text Size in Data
Entries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Table of Contents 5
CHAPTER 12 C ONTROLLING E NGINES
Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Getting Started with Diagrams . . . . . . . . . . . . . 168 CHAPTER 14
Configuration Overview . . . . . . . . . . . . . . . . . 168 Controlling Engine Operation. . . . . . . . . . . . . . 189
Creating Diagrams . . . . . . . . . . . . . . . . . . . . . 169 Commanding Engines Remotely . . . . . . . . . . . 190
Defining the Diagram Background . . . . . . . . . . 169 Turning Engines Online . . . . . . . . . . . . . . . . . 190
Adding Elements to Diagrams . . . . . . . . . . . . . 170 Turning Engines Offline . . . . . . . . . . . . . . . . . 191
Inserting New Elements Manually . . . . . . . . . 171 Setting Nodes to Standby . . . . . . . . . . . . . . . 191
Creating Diagrams from Configured Elements . 171 Rebooting Nodes . . . . . . . . . . . . . . . . . . . . . 191
Adding Text Comments to a Diagram . . . . . . . 172 Refreshing the Currently Installed Policy . . . . 192
Arranging Elements in Diagrams . . . . . . . . . . . 172 Commanding Engines Locally . . . . . . . . . . . . . 192
Connecting Elements in Diagrams . . . . . . . . . . 173 Setting Engine Options . . . . . . . . . . . . . . . . . . 192
Connecting Elements Automatically . . . . . . . . 173 Enabling/Disabling Engine Status Monitoring . 192
Connecting Elements Manually . . . . . . . . . . . 173 Enabling/Disabling Firewall/VPN Diagnostics . 193
Creating Links Between Diagrams . . . . . . . . . . 174 Disabling/Enabling User Database Replication 193
Specifying a Parent Diagram . . . . . . . . . . . . . 174 Enabling/Disabling Status Surveillance . . . . . 193
Creating Links from One Diagram to Another. . 174 Enabling/Disabling SSH Access to the Engine 194
Viewing Diagrams . . . . . . . . . . . . . . . . . . . . . . 175 Changing the Engine Password . . . . . . . . . . . 194
Adjusting the Element Details in Diagrams . . . 175 Changing NetLink State Manually . . . . . . . . . . 195
Collapsing and Expanding Groups of Elements Disabling/Enabling Cluster Nodes . . . . . . . . . . 195
in Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . 175 Disabling Nodes of a Cluster Temporarily . . . . 195
Zooming and Navigating Diagrams . . . . . . . . . 176 Re-Enabling Disabled Cluster Nodes . . . . . . . 196
Printing Diagrams . . . . . . . . . . . . . . . . . . . . . . 176 Editing Engine Configurations . . . . . . . . . . . . . 196
Exporting Diagrams as Images . . . . . . . . . . . . 176 CHAPTER 15
CHAPTER 13 Stopping Traffic Manually . . . . . . . . . . . . . . . . 197
Incident Cases . . . . . . . . . . . . . . . . . . . . . . . . . 177
Terminating Connections Manually. . . . . . . . . . 198
Getting Started with Incident Cases . . . . . . . . . 178 Blacklisting Connections Manually. . . . . . . . . . 198
Configuration Overview . . . . . . . . . . . . . . . . . 178 CHAPTER 16
Creating a New Incident Case . . . . . . . . . . . . . 179 Working on the Engine Command Line. . . . . . . 201
Setting an Incident Context . . . . . . . . . . . . . . . 179 Getting Started with the Engine Command Line 202
Attaching Data to Incident Cases . . . . . . . . . . . 180 Accessing the Engine Command Line . . . . . . . 202
Attaching Logs and Audit Entries to Incident Reconfiguring Basic Engine Settings . . . . . . . . 203
Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Creating Engine Scripts . . . . . . . . . . . . . . . . . 204
Attaching Policy Snapshots to Incident Cases . 181
Restoring a Previous Configuration Manually . . 205
Attaching Memos to Incident Cases . . . . . . . . 182
Attaching Files to Incident Cases . . . . . . . . . . 182 M ANAGEMENT C ENTER C ONFIGURATION
Adding Players to Incident Cases . . . . . . . . . . . 183
Adding Journal Entries to Incident Cases . . . . . 183 CHAPTER 17
Working With Existing Incident Cases . . . . . . . . 184 Automatic Updates and Engine Upgrades . . . . . 209
Opening an Incident Case for Editing . . . . . . . 184 Getting Started with Automatic Updates and
Changing the Priority of an Incident Case . . . . 184 Engine Upgrades . . . . . . . . . . . . . . . . . . . . . . 210
Changing the State of an Incident Case . . . . . 185 Configuring Automatic Updates and Engine
Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Checking Incident History . . . . . . . . . . . . . . . 185
6 Table of Contents
CHAPTER 18 Testing Alerts. . . . . . . . . . . . . . . . . . . . . . . . . 244
Administrator Accounts . . . . . . . . . . . . . . . . . . 213
CHAPTER 20
Getting Started with Administrator Accounts . . . 214 Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Configuration Overview. . . . . . . . . . . . . . . . . 214 Getting Started with Domains . . . . . . . . . . . . . 246
Defining Administrator Roles and Access Control Configuration Overview . . . . . . . . . . . . . . . . . 246
Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Creating Domains . . . . . . . . . . . . . . . . . . . . . 247
Defining Administrator Roles . . . . . . . . . . . . . 215
Defining a Domain Logo . . . . . . . . . . . . . . . . 248
Defining Access Control Lists . . . . . . . . . . . . 217
Logging in to a Domain . . . . . . . . . . . . . . . . . . 249
Defining Administrator Accounts . . . . . . . . . . . 218
Logging out of a Domain. . . . . . . . . . . . . . . . . 250
Creating a New Administrator Element . . . . . . 218
Deleting Domains . . . . . . . . . . . . . . . . . . . . . 250
Defining Administrator Permissions . . . . . . . . 219
Moving Elements Between Domains . . . . . . . . 250
Defining Rights for Restricted Administrator
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Using the Domain Overview . . . . . . . . . . . . . . 252
Restricting the Logs an Administrator Can CHAPTER 21
View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Setting up the Web Portal . . . . . . . . . . . . . . . . 255
Customizing Log Colors. . . . . . . . . . . . . . . . . . 222 Getting Started with Web Portal Access . . . . . . 256
Defining Password and Login Settings for Configuration Overview . . . . . . . . . . . . . . . . . 256
Administrators . . . . . . . . . . . . . . . . . . . . . . . . 223
Defining Web Portal Server Settings . . . . . . . . 257
Enabling Enforcement of Password Settings . . 224
Activating HTTPS on the Web Portal Server. . . . 258
Defining Password Policy Settings . . . . . . . . . 225
Allowing Web Portal Connections. . . . . . . . . . . 259
Changing Administrator Passwords . . . . . . . . . 226
Defining Web Portal User Accounts . . . . . . . . . 260
Authenticating Administrators Using RADIUS. . . 226
Granting Engines to a Web Portal User . . . . . 261
Deleting Administrator Accounts . . . . . . . . . . . 227
Selecting Policy Permissions for a Web Portal
CHAPTER 19 User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Alert Escalation . . . . . . . . . . . . . . . . . . . . . . . . 229
Selecting Log Browsing Permissions for a
Getting Started with Alert Escalation . . . . . . . . 230 Web Portal User. . . . . . . . . . . . . . . . . . . . . . 263
Configuration Overview . . . . . . . . . . . . . . . . . 230 Selecting Report Data Permissions for a Web
Portal User . . . . . . . . . . . . . . . . . . . . . . . . . 264
Creating Alerts . . . . . . . . . . . . . . . . . . . . . . . . 231
Customizing the Web Portal . . . . . . . . . . . . . . 264
Defining Custom Alerts . . . . . . . . . . . . . . . . . 231
Adding a New Web Portal Language. . . . . . . . 264
Defining What Triggers an Alert . . . . . . . . . . . 232
Importing a Web Portal Language File
Defining Alert Chains . . . . . . . . . . . . . . . . . . . 233 through the Management Client . . . . . . . . . 264
Defining Alert Channels. . . . . . . . . . . . . . . . . 233 Importing a Web Portal Language File
Creating New Alert Chains. . . . . . . . . . . . . . . 234 on the Command Line . . . . . . . . . . . . . . . . 265
Modifying Existing Alert Chains . . . . . . . . . . . 235 Enabling/Disabling a Web Portal Localization . 265
Editing Alert Chains . . . . . . . . . . . . . . . . . . . 235 Customizing the Look of the Web Portal. . . . . 266
Defining the Final Action of an Alert Chain . . . 237 Writing Announcements to Web Portal Users . . 266
Defining Alert Policies . . . . . . . . . . . . . . . . . . . 238 CHAPTER 22
Distributing Management Clients Through Web
Creating New Alert Policies . . . . . . . . . . . . . . 238 Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Modifying Existing Alert Policies . . . . . . . . . . . 239
Getting Started with Web Start Distribution . . . 270
Editing Alert Policy Rules . . . . . . . . . . . . . . . . 239
Configuration Overview . . . . . . . . . . . . . . . . . 270
Installing Alert Policies . . . . . . . . . . . . . . . . . . 240
Activating Web Start on Management Server . . 271
Acknowledging Alerts . . . . . . . . . . . . . . . . . . . 240
Distributing Web Start from External Servers . . 272
Acknowledging Individual Alerts . . . . . . . . . . . 241
Accessing the Web Start Clients . . . . . . . . . . . 273
Acknowledging All Active Alerts . . . . . . . . . . . 241
Using Custom Scripts for Alert Escalation. . . . . 242
Setting up a Dedicated Alert Server . . . . . . . . . 243
Table of Contents 7
CHAPTER 23 Changing the Management Platform . . . . . . . . 304
Log Server Configuration . . . . . . . . . . . . . . . . . 275 Changing IP Addressing . . . . . . . . . . . . . . . . . 304
Defining a Log Server . . . . . . . . . . . . . . . . . . . 276 Changing the Management Server’s IP
Defining a Log Server Element. . . . . . . . . . . . 276 Address . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Selecting Secondary Log Servers. . . . . . . . . . 277 Changing the Log Server’s IP Address . . . . . . 305
Certifying the Log Server . . . . . . . . . . . . . . . . 278 Changing IP Addresses of Combined
Management/Log Servers . . . . . . . . . . . . . . 306
Configuring an Alert Server . . . . . . . . . . . . . . 278
If Configuration Changes Prevent Managing the
Changing Log Server Configuration Parameters . 279 Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Exporting Log Data to Syslog . . . . . . . . . . . . . . 282
Defining General Syslog Settings . . . . . . . . . . 282 E NGINE E LEMENT C ONFIGURATION
Exporting Log Filters for Syslog Sending . . . . . 284
Configuring Syslog Filter Settings. . . . . . . . . . 285 CHAPTER 26
Creating a Rule Allowing Traffic to the Creating and Modifying Engine Elements . . . . . 311
Syslog Server . . . . . . . . . . . . . . . . . . . . . . . . 285 Getting Started with Engine Elements . . . . . . . 312
CHAPTER 24 Configuration Overview . . . . . . . . . . . . . . . . 312
Secondary SMC Server Configuration . . . . . . . . 287
Creating New Engine Elements . . . . . . . . . . . . 313
About Secondary SMC Servers . . . . . . . . . . . . 288
Creating a New Single Firewall Element . . . . . 313
Installing a Secondary Management Server . . . 288
Creating a New Firewall Cluster Element . . . . 314
Configuration Overview . . . . . . . . . . . . . . . . . 288
Creating One New SOHO Firewall Element . . . 315
Defining a Secondary Management Server Creating Multiple New SOHO Firewall Elements 316
Element . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Creating a New Analyzer Element . . . . . . . . . 318
Installing a License for a Secondary
Management Server . . . . . . . . . . . . . . . . . . . 290 Creating a New Single Sensor Element . . . . . 319
Creating Access Rules for a Secondary Creating a New Sensor Cluster Element. . . . . 320
Management Server . . . . . . . . . . . . . . . . . . . 291 Creating a New Combined Sensor-Analyzer
Installing Secondary Management Server Element . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Creating a New SSL VPN Gateway Element . . 322
Installing a Secondary Log Server . . . . . . . . . . 293 Duplicating an Existing Engine Element . . . . . 323
Configuration Overview . . . . . . . . . . . . . . . . . 293 Modifying Existing Engine Elements . . . . . . . . . 323
Creating a Secondary Log Server Element . . . 293 Modifying the Properties of One Engine
Installing a License for a Secondary Log Element . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Modifying Properties of Several Engines at
Setting a Log Server as a Secondary Log Once. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Converting a Single Firewall to a Firewall
Creating Access Rules for a Secondary Log Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Preparing for Conversion to a Firewall
Installing Secondary Log Server Software . . . . 296 Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Converting a Single Firewall Element to
Changing the Active Management Server . . . . . 297 a Firewall Cluster . . . . . . . . . . . . . . . . . . . . 326
Disabling and Enabling Automatic Database Activating the Clustered Configuration After
Replication. . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Conversion . . . . . . . . . . . . . . . . . . . . . . . . 329
Synchronizing Management Databases Converting a Single Sensor to a Sensor
Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Restoring a Backup Taken from a Different Adding a Node to a Firewall or Sensor
Management Server . . . . . . . . . . . . . . . . . . . . 299 Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
CHAPTER 25 Changing an Engine’s Control IP Address . . . . 331
Reconfiguring the Management Center . . . . . . . 301
Changing an Engine’s Control Address . . . . 331
Modifying a Management Server Element . . . . . 302 Changing a Firewall’s Control Address to
Changing the Management Database Password 303 a Different Network . . . . . . . . . . . . . . . . . . 332
Editing Single Firewall Properties. . . . . . . . . . . 333
8 Table of Contents
Editing Firewall Cluster Properties . . . . . . . . . . 334 Defining Wireless Settings for SOHO Firewalls 373
Editing SOHO Firewall Properties . . . . . . . . . . . 335 Defining Wireless Security Settings for
Editing Analyzer Properties . . . . . . . . . . . . . . . 336 SOHO Firewalls . . . . . . . . . . . . . . . . . . . . . 374
Defining Wireless Channel Settings for
Editing Single Sensor Properties . . . . . . . . . . . 337 SOHO Firewalls . . . . . . . . . . . . . . . . . . . . . 375
Editing Sensor Cluster Properties . . . . . . . . . . 338 Completing the SOHO Firewall Configuration . 376
Editing Combined Sensor-Analyzer Properties . . 339 Completing the “Create Multiple SOHO
About Engine Time Synchronization . . . . . . . . . 340 Firewalls” Wizard . . . . . . . . . . . . . . . . . . . . . 376
CHAPTER 27 Sensor and Analyzer Interface Configuration. . . 377
Network Interface Configuration . . . . . . . . . . . 341 Defining System Communication Interfaces for
Getting Started with Interface Configuration . . . 342 IPS Engines . . . . . . . . . . . . . . . . . . . . . . . . . 378
Configuration Overview . . . . . . . . . . . . . . . . . 342 Defining Traffic Inspection Interfaces for
Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Firewall Interface Configuration . . . . . . . . . . . . 343 Defining Logical Interfaces for Sensors . . . . 380
Defining Physical Interfaces for Firewall Defining Reset Interfaces for Sensors . . . . . 381
Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Defining Capture Interfaces for Sensors . . . 381
Adding VLAN Interfaces for Firewall Engines . . 346 Defining Inline Interfaces for Sensors . . . . . 383
Adding ADSL Interfaces for Single Firewalls . . 348 Adding VLAN Interfaces for Sensors . . . . . . 384
Configuring Advanced Interface Properties for Setting Interface Options for IPS Engines. . . . 385
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Configuring Manual ARP Settings . . . . . . . . . . 387
Configuring Single Firewall IP Addresses. . . . . 351
Activating the Internal DHCP Server on a Firewall
Adding an IPv4 Address for a Single Firewall . . 352 Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Configuring VRRP Settings for Single Firewalls 353 CHAPTER 28
Configuring PPPoE Settings for Single Firewalls 354 Connecting Engines to the StoneGate Management
Adding an IPv6 Address for a Single Firewall . . 355 Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Configuring Firewall Cluster IP Addresses . . . . 356 Getting Started with Connecting Engines to the
SMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Adding IPv4 Addresses for a Firewall Cluster. . 357
Configuration Overview . . . . . . . . . . . . . . . . 392
Defining Modem Interfaces for Single Firewalls 358
Changing/Removing the PIN Code of a Saving an Initial Configuration for Firewall or IPS
Modem Interface . . . . . . . . . . . . . . . . . . . . . 360 Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Setting Firewall Interface Options. . . . . . . . . . 361 Creating One-Time Passwords . . . . . . . . . . . . 393
About Using a Dynamic IP Address on a Saving Initial Configuration Details . . . . . . . . 394
Firewall Interface . . . . . . . . . . . . . . . . . . . . . 362 Saving an Initial Configuration for SOHO Firewall
Changing ISP Settings for ADSL Interface . . . . 363 Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
SOHO Firewall Interface Configuration . . . . . . . 364 Connecting SSL VPN Gateways to the SMC . . . 396
Selecting SOHO Firewall Interface Types . . . . . 364 CHAPTER 29
Configuring the Engine Tester . . . . . . . . . . . . . 397
Defining External Interfaces for SOHO
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Getting Started with the Engine Tester . . . . . . . 398
Defining Ethernet External Interface Configuration Overview . . . . . . . . . . . . . . . . . 398
Properties on SOHO Firewalls . . . . . . . . . . . 366
Specifying Global Engine Tester Settings . . . . . 399
Defining ADSL or PPPoE Interface
Properties on SOHO Firewalls . . . . . . . . . . . 367 Adding Engine Tests . . . . . . . . . . . . . . . . . . . . 400
Defining Advanced ADSL Settings for Configuring Additional Test-Specific Settings . 402
SOHO Firewalls . . . . . . . . . . . . . . . . . . . . . 368 Additional Settings for the External Test . . . 402
Defining Corporate Interfaces for SOHO Additional Settings for the File System
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Space Test . . . . . . . . . . . . . . . . . . . . . . . . 403
Defining Guest Interfaces for SOHO Firewalls . 372 Additional Settings for the Free Swap
Space Test . . . . . . . . . . . . . . . . . . . . . . . . 403
Additional Settings for the Link Status
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Additional Settings for the Multiping Test. . . 404
Table of Contents 9
Checking Configured Tests . . . . . . . . . . . . . . . 404 R OUTING
Removing Engine Tests . . . . . . . . . . . . . . . . . . 405
Disabling/Enabling Configured Engine Tests . . . 406 CHAPTER 34
Disabling/Enabling Individual Engine Tests . . . 406 Configuring Routing . . . . . . . . . . . . . . . . . . . . 439
Disabling/Enabling All Custom Engine Tests . . 406 Getting Started with Routing . . . . . . . . . . . . . . 440
CHAPTER 30 Configuration Overview . . . . . . . . . . . . . . . . . 440
Engine Permissions . . . . . . . . . . . . . . . . . . . . . 407 Adding Routes for Firewalls . . . . . . . . . . . . . . . 441
Getting Started with Engine Permissions . . . . . 408 Defining a Single-Link Route for a Firewall . . . 441
Configuration Overview . . . . . . . . . . . . . . . . . 408 Defining a Multi-Link Route for a Firewall . . . . 442
Defining an Engine’s Administrator Permissions 408 Creating NetLinks . . . . . . . . . . . . . . . . . . . 443
Selecting Permitted Policies for an Engine . . . . 409 Adding a Multi-Link Route . . . . . . . . . . . . . . 444
CHAPTER 31 Routing DHCP Messages . . . . . . . . . . . . . . . 445
Alias Translations for Engines . . . . . . . . . . . . . 411 Defining a DHCP Server . . . . . . . . . . . . . . . 446
Getting Started with Alias Translations . . . . . . . 412 Enabling DHCP Relay . . . . . . . . . . . . . . . . . 447
Defining Alias Translation Values . . . . . . . . . . . 412 Activating the DHCP Relay Sub-policy. . . . . . 447
Adding Alias Translation Values . . . . . . . . . . . 413 Routing Multicast Traffic . . . . . . . . . . . . . . . . 447
Removing Alias Translation Values . . . . . . . . . 413 Defining Static Multicast . . . . . . . . . . . . . . 448
Defining IGMP-Based Multicast Forwarding. . 449
CHAPTER 32
Advanced Engine Settings . . . . . . . . . . . . . . . . 415 Defining Policy Routing . . . . . . . . . . . . . . . . . 451
Adding Routes for IPS Components . . . . . . . . . 453
Getting Started with Advanced Engine Settings . 416
Removing Routes . . . . . . . . . . . . . . . . . . . . . . 454
Adjusting Firewall System Parameters . . . . . . . 416
Modifying Antispoofing for Firewalls . . . . . . . . . 454
Adjusting Firewall Traffic Handling Parameters. . 418
Deactivating Antispoofing for an IP Address/
Adjusting Firewall Clustering Options . . . . . . . . 419 Interface Pair . . . . . . . . . . . . . . . . . . . . . . . . 455
Adjusting General Clustering Options . . . . . . . 419 Activating Antispoofing for Routable IP
Tuning the Firewall Load Balancing Filter. . . . . 421 Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Manually Tuning the Load Balancing Filter . . 421 Checking Routes . . . . . . . . . . . . . . . . . . . . . . 456
Adding Load Balancing Filter Entries . . . . . . 422 CHAPTER 35
Adjusting Single Firewall’s Contact Policy . . . . . 423 Outbound Traffic Management . . . . . . . . . . . . 459
Configuring Anti-Virus Settings . . . . . . . . . . . . . 424 Getting Started with Outbound Traffic
Configuring Default SYN Flood Protection for a Management . . . . . . . . . . . . . . . . . . . . . . . . . 460
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Configuration Overview . . . . . . . . . . . . . . . . . 461
Configuring Log Handling Settings . . . . . . . . . . 426 Configuring Outbound Multi-Link Settings . . . . . 461
Adjusting Sensor-Analyzer Advanced Settings . . 427 Creating an Outbound Multi-Link Element. . . . 462
Adjusting Analyzer Advanced Settings. . . . . . . . 427 Selecting NetLinks for an Outbound Multi-Link 463
Adjusting Sensor Advanced Settings . . . . . . . . 428 Defining Destination Cache Settings . . . . . . . 464
Adjusting Sensor Clustering Options . . . . . . . 429 Creating Outbound Load Balancing NAT Rules . 465
Adjusting SOHO Firewall Management Monitoring And Testing Outbound Traffic
Connection. . . . . . . . . . . . . . . . . . . . . . . . . . . 430 Management . . . . . . . . . . . . . . . . . . . . . . . . . 466
CHAPTER 33 CHAPTER 36
Setting up SNMP for Engines. . . . . . . . . . . . . . 431 Inbound Traffic Management. . . . . . . . . . . . . . 467
Getting Started with SNMP Configuration . . . . . 432 Getting Started with Inbound Traffic
Configuring SNMP Version 1 or 2c . . . . . . . . . . 432 Management . . . . . . . . . . . . . . . . . . . . . . . . . 468
Configuring SNMP Version 3 . . . . . . . . . . . . . . 433 Configuration Overview . . . . . . . . . . . . . . . . . 469
Configuring What Triggers SNMP Traps . . . . . . . 434 Defining a Server Pool . . . . . . . . . . . . . . . . . . 469
Activating the SNMP Agent on Engines . . . . . . . 435 Creating a New Server Pool Element . . . . . . . 469
Defining Server Pools’ External Address(es) . . 470
10 Table of Contents
Adding Server Pool Members. . . . . . . . . . . . . 471 Moving the Policy Under a Different Template . . 506
Installing Monitoring Agents . . . . . . . . . . . . . . 472 Deleting Policies, Templates, and Sub-Policies . 507
Uninstalling Monitoring Agents. . . . . . . . . . . . . 473 CHAPTER 38
Configuring Monitoring Agents . . . . . . . . . . . . . 474 Editing Policies . . . . . . . . . . . . . . . . . . . . . . . . 509
Editing sgagent.local.conf . . . . . . . . . . . . . . . 474 Getting Started with Editing the Rules in
Editing sgagent.conf . . . . . . . . . . . . . . . . . . . 475 Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Editing the sgagent.conf Statement Section . 476 Using the Policy Editing View. . . . . . . . . . . . . . 511
Options in the sgagent.conf Statement Editing Rule Tables. . . . . . . . . . . . . . . . . . . . 512
Section . . . . . . . . . . . . . . . . . . . . . . . . . . . 477 Editing Rule Cells. . . . . . . . . . . . . . . . . . . . . 512
Monitoring Agent Statement Configuration Adding Comments in Policies . . . . . . . . . . . . 513
Examples. . . . . . . . . . . . . . . . . . . . . . . . . . 478 Reading Rule Identifiers . . . . . . . . . . . . . . . . 513
Editing the sgagent.conf Test Section . . . . . 480
Searching in Rules . . . . . . . . . . . . . . . . . . . . 514
Monitoring Agent Test Configuration
Examples. . . . . . . . . . . . . . . . . . . . . . . . . . 482 Finding Unused Rules in Firewall Policies (Hit
Counters) . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Editing Monitoring Agents’ Internal Tests . . . 483
Monitoring Agent Internal Test Examples . . . 485 Adding Insert Points in Policy Templates . . . . . 516
Enabling Monitoring Agents . . . . . . . . . . . . . . . 488 Editing Ethernet Rules . . . . . . . . . . . . . . . . . . 516
Entering the Server Pool’s IP Addresses on Your Defining Logging Options for Ethernet Rules. . 517
DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . 488 Defining a MAC Address for Ethernet Rules . . 518
Creating Access Rules for Inbound Load Editing Access Rules . . . . . . . . . . . . . . . . . . . 518
Balancing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Defining What Traffic an Access Rule
Configuring Dynamic DNS Updates. . . . . . . . . . 490 Matches . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Configuration Overview . . . . . . . . . . . . . . . . . 490 Defining What Action an Access Rule Takes . . 521
Improving DDNS Security. . . . . . . . . . . . . . . . 490 Defining Access Rule Action Options . . . . . . . 522
Defining an External DNS Server . . . . . . . . . . 491 Defining “Apply Blacklist” Action Options . . . 522
Defining the Dynamic DNS Update Information 492 Defining “Jump” Action Options . . . . . . . . . 522
Defining a Dynamic DNS Rule . . . . . . . . . . . . 493 Defining Firewall “Allow” Action Options. . . . 523
Defining Firewall “Continue” Action Options
Monitoring and Testing Monitoring Agents. . . . . 493 in Access Rules . . . . . . . . . . . . . . . . . . . . . 526
Defining Firewall “Use VPN” Action
T RAFFIC I NSPECTION P OLICIES Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Defining IPS “Allow” Action Options. . . . . . . 527
CHAPTER 37 Defining IPS “Continue” Action Options in
Creating and Managing Policy Elements . . . . . . 497 Access Rules. . . . . . . . . . . . . . . . . . . . . . . 527
Getting Started with Policies . . . . . . . . . . . . . . 498 Defining IPS “Discard” Action Options . . . . . 528
Defining IPS “Refuse” Action Options . . . . . 528
Configuration Overview . . . . . . . . . . . . . . . . . 498
Defining Access Rule Logging Options . . . . . . 528
Creating a New Template Policy or a Policy . . . . 499
Defining Access Rule Authentication Options . 530
Creating a New Sub-Policy . . . . . . . . . . . . . . . . 500
Editing Inspection Rules . . . . . . . . . . . . . . . . . 531
Creating a New Empty Sub-Policy . . . . . . . . . . 500
Modifying the Inspection Rules Tree . . . . . . . 531
Converting Existing Rules into a Sub-Policy . . . 500
Changing Inspection Rules Tree Settings . . . 532
Installing Policies . . . . . . . . . . . . . . . . . . . . . . 501
Defining Logging Options for Inspection
Tracking Policy Changes . . . . . . . . . . . . . . . . . 504 Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Checking the Currently Installed Policy . . . . . . 504 Adding Situations to the Rules Tree. . . . . . . 534
Previewing the Currently Installed Policy . . . . . 504 Removing Overrides From the Rules Tree. . . 535
Checking and Comparing Policy Versions . . . . 504 Adding Exceptions to Inspection Rules. . . . . . 535
Viewing Policy Snapshots . . . . . . . . . . . . . . 505 Defining What Traffic an Inspection
Comparing Two Policy Snapshots. . . . . . . . . 505 Exception Rule Matches . . . . . . . . . . . . . . . 536
Checking for Untransferred Configuration
Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Table of Contents 11
Defining What Action an Inspection Defining Network Elements . . . . . . . . . . . . . . 569
Exception Rule Takes . . . . . . . . . . . . . . . . . 537 Defining Router Elements . . . . . . . . . . . . . . . 570
Defining Firewall “Continue” Action Options
in Inspection Exceptions . . . . . . . . . . . . . . . 538 Using Feature-Specific Elements in Policies . . . 571
Defining Firewall “Permit” Action Options . . . 538 CHAPTER 40
Defining Firewall “Terminate” Action Defining Network Services. . . . . . . . . . . . . . . . 573
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 Getting Started with Services . . . . . . . . . . . . . 574
Defining IPS “Continue” Action Options in Configuration Overview . . . . . . . . . . . . . . . . . 574
Inspection Exceptions . . . . . . . . . . . . . . . . . 541
Defining IPS “Permit” Action Options in Defining Services . . . . . . . . . . . . . . . . . . . . . . 575
Inspection Exceptions . . . . . . . . . . . . . . . . . 541 Defining a New IP-Based Service . . . . . . . . . . 575
Defining IPS “Terminate” Action Options . . . 542 Defining a New Ethernet Service . . . . . . . . . . 577
Defining Logging Options for Inspection Grouping Services . . . . . . . . . . . . . . . . . . . . 578
Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . 543
Using Protocol Elements. . . . . . . . . . . . . . . . . 579
Editing NAT Rules . . . . . . . . . . . . . . . . . . . . . . 545
Defining Protocol Parameters . . . . . . . . . . . . . 579
Adding a NAT Rule . . . . . . . . . . . . . . . . . . . . 546
Defining DNS Protocol Parameters . . . . . . . . 580
Defining What Traffic a NAT Rule Matches. . . . 546
Defining FTP Protocol Parameters . . . . . . . . . 580
Overwriting the Source Address in Packets . . . 547
Defining GRE Protocol Parameters. . . . . . . . . 582
Defining Static Source Translation Options . . 548
Defining H323 Protocol Parameters. . . . . . . . 582
Defining Dynamic Source Translation
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Defining HTTP/HTTPS Protocol Parameters . . 583
Overwriting the Destination Address in Packets 550 Defining IPv4 Encapsulation Protocol
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 584
NAT Rule Examples. . . . . . . . . . . . . . . . . . . . 551
Defining IPv6 Encapsulation Protocol
Example of a Static Source Translation Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 585
Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Example of a Dynamic Source Translation Defining MSRPC Protocol Parameters . . . . . . 585
Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 Defining NetBIOS Protocol Parameters. . . . . . 586
Example of a Destination Translation Defining Oracle Protocol Parameters . . . . . . . 587
Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Defining Shell (RSH) Protocol Parameters . . . 588
Example of a Combined Source And
Destination Translation Rule . . . . . . . . . . . . 554 Defining SIP Protocol Parameters . . . . . . . . . 589
Limiting the Time when a Rule Is Active . . . . . . 555 Defining SMTP Protocol Parameters . . . . . . . 590
Validating Rules Automatically . . . . . . . . . . . . . 556 Defining SSH Protocol Parameters . . . . . . . . 590
Overriding Default Validation Options for Rules 557 Defining SunRPC Protocol Options. . . . . . . . . 591
Selecting Rule Validation Settings . . . . . . . . . 558 Defining TCP Proxy Protocol Parameters. . . . . 592
Viewing Policy Validation Issues. . . . . . . . . . . 558 Defining TFTP Protocol Parameters . . . . . . . . 593
Disabling a Validation Warning for a Rule . . . . 559 CHAPTER 41
Defining Situations . . . . . . . . . . . . . . . . . . . . . 595
Excluding Rules from Policy Validation . . . . . . 559
Adding Comments to Policies . . . . . . . . . . . . . 560 Getting Started With Situations . . . . . . . . . . . . 596
Changing Default Rules. . . . . . . . . . . . . . . . . . 560 Configuration Overview . . . . . . . . . . . . . . . . . 597
CHAPTER 39 Creating New Situation Elements . . . . . . . . . . 597
Defining IP Addresses . . . . . . . . . . . . . . . . . . . 561 Defining Context Options for Situations . . . . . . 599
Getting Started with Defining IP Addresses . . . . 562 Defining HTTP URL Filter Options. . . . . . . . . . 600
Defining IP Addresses as Elements . . . . . . . . . 563 Defining Port/Host Scan Detection Options . . 600
Defining Address Range Elements . . . . . . . . . 563 Defining Context Options for Correlation
Situations . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
Defining Alias Elements . . . . . . . . . . . . . . . . 564
Configuring Compress Contexts . . . . . . . . . . 603
Defining Expression Elements . . . . . . . . . . . . 565
Configuring Count Contexts. . . . . . . . . . . . . . 604
Defining Group Elements. . . . . . . . . . . . . . . . 567
Configuring Group Contexts . . . . . . . . . . . . . 604
Defining Host Elements. . . . . . . . . . . . . . . . . 568
Configuring Match Contexts . . . . . . . . . . . . . 605
12 Table of Contents
Configuring Sequence Contexts . . . . . . . . . . . 606 Defining User Accounts for Authentication . . . . 637
Defining Tags for Situations . . . . . . . . . . . . . . . 607 Defining User Groups . . . . . . . . . . . . . . . . . . 638
Creating a New Tag . . . . . . . . . . . . . . . . . . . . 607 Defining Users. . . . . . . . . . . . . . . . . . . . . . . 640
Adding Tags to One Situation at a Time . . . . . 607 Defining Authentication Rules . . . . . . . . . . . . . 642
Adding Tags to Several Situations at Once . . . 608 Managing User Information . . . . . . . . . . . . . . . 644
Removing Tags from Situations . . . . . . . . . . . 608 Adding/Removing Users From User Groups . . 644
Working With Vulnerabilities. . . . . . . . . . . . . . . 609 Importing and Exporting User Information . . . 644
Creating New Vulnerability Elements . . . . . . . 609 Importing Users from an LDIF File . . . . . . . . 644
Associating Vulnerabilities With Situations . . . 610 Exporting Users to an LDIF File . . . . . . . . . . 645
CHAPTER 42 Changing Users’ Passwords . . . . . . . . . . . . . 646
Defining User Responses . . . . . . . . . . . . . . . . . 611 Clearing Users’ Authentication Settings . . . . . 646
Getting Started with User Responses. . . . . . . . 612 Resetting the Firewalls’ Local User Database. 646
Configuration Overview . . . . . . . . . . . . . . . . . 612 Setting User Database Replication to Firewalls
on or off . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
Creating User Responses . . . . . . . . . . . . . . . . 612
Authenticating to a StoneGate Firewall. . . . . . . 647
Defining User Response Entries. . . . . . . . . . . . 613
Customizing the User Authentication Dialog . . . 648
CHAPTER 43
Monitoring and Testing User Authentication . . . 649
Quality of Service (QoS) . . . . . . . . . . . . . . . . . . 615
CHAPTER 45
Getting Started with QoS. . . . . . . . . . . . . . . . . 616 Filtering Web Addresses . . . . . . . . . . . . . . . . . 651
Configuration Overview . . . . . . . . . . . . . . . . . 617
Getting Started with Web Filtering . . . . . . . . . . 652
Creating QoS Classes . . . . . . . . . . . . . . . . . . . 617 Configuration Overview . . . . . . . . . . . . . . . . . 652
Defining QoS Policies . . . . . . . . . . . . . . . . . . . 618
Blacklisting/Whitelisting Web URLs Manually . . 653
Creating New QoS Policies . . . . . . . . . . . . . . 618
Creating Web Filtering Rules . . . . . . . . . . . . . . 654
Editing QoS Rules. . . . . . . . . . . . . . . . . . . . . 619
CHAPTER 46
Matching QoS Rules to Network Traffic . . . . . . . 620 Setting up HTTPS Inspection. . . . . . . . . . . . . . 655
Defining Interfaces’ Speed and QoS Policy . . . . 621
Getting Started with HTTPS Inspection. . . . . . . 656
CHAPTER 44
Configuration Overview . . . . . . . . . . . . . . . . . 657
Setting up User Authentication . . . . . . . . . . . . 623
Configuring Server Protection . . . . . . . . . . . . . 658
Getting Started with User Authentication . . . . . 624
Configuring Client Protection . . . . . . . . . . . . . . 659
Configuration Overview . . . . . . . . . . . . . . . . . 625
Creating Client Protection Certificate Authority
Integrating External LDAP Databases . . . . . . . . 626 Elements. . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Configuring Schema Files on External LDAP Importing a Private Key and Signing
Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627 Certificate for HTTPS Client Protection. . . . . . 660
Defining an Active Directory Server Element . . 627 Generating a Private Key and Signing
Configuring the Active Directory Server’s Certificate for HTTPS Client Protection. . . . . . 661
LDAP Settings . . . . . . . . . . . . . . . . . . . . . . 628 Exporting an HTTPS Client Protection
Configuring Active Directory Server’s Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Authentication Settings. . . . . . . . . . . . . . . . 629 Defining Trusted Certificate Authorities for HTTPS
Defining a Generic LDAP Server Element . . . . 629 Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Configuring the LDAP Server’s User Creating Trusted Certificate Authority Elements 663
Services . . . . . . . . . . . . . . . . . . . . . . . . . . 631 Importing a Trusted Certificate Authority
Adding Object Classes for the LDAP Certificate for HTTPS Inspection . . . . . . . . . . 663
Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632 Configuring Certificate Revocation List Checks
Defining LDAP Domains . . . . . . . . . . . . . . . . 633 for HTTPS Inspection . . . . . . . . . . . . . . . . . . 664
Integrating External Authentication Services . . . 634 Activating HTTPS Inspection on the Engine. . . . 665
Defining an Authentication Server . . . . . . . . . 635 Excluding Domains from HTTPS Inspection. . . . 666
Defining an Authentication Service. . . . . . . . . 637 Defining a Custom HTTPS Service . . . . . . . . . . 667
Table of Contents 13
Creating Access Rules for HTTPS Inspection . . . 668 Managing VPN Client Addresses in
Configuration 3 . . . . . . . . . . . . . . . . . . . . . . 701
CHAPTER 47
External Content Inspection. . . . . . . . . . . . . . . 669 Creating Gateway Elements for
Configuration 3 . . . . . . . . . . . . . . . . . . . . . . 702
Getting Started with External Content Inspection 670
Adding VPN Client Settings for
Configuration Overview . . . . . . . . . . . . . . . . . 670 Configuration 3 . . . . . . . . . . . . . . . . . . . . . . 703
Defining a Content Inspection Server Element . 671 Creating a VPN Element for Configuration 3 . . 705
Defining a Service for CIS Redirection . . . . . . . 672 Creating Users for VPN Configuration 3 . . . . . 706
Creating a Service for CIS Redirection . . . . . . 672 Creating Rules for VPN Configuration 3 . . . . . 707
Defining Protocol Parameters for CIS Configuration 4: Basic VPN Hub . . . . . . . . . . . 709
Redirection . . . . . . . . . . . . . . . . . . . . . . . . . 673 Creating Gateway Elements for VPN
Defining Access Rules for CIS Redirection . . . . 674 Configuration 4 . . . . . . . . . . . . . . . . . . . . . . 709
Defining NAT Rules for CIS Redirection . . . . . . . 675 Creating a VPN Element for VPN
Configuration 4 . . . . . . . . . . . . . . . . . . . . . . 710
CHAPTER 48
Blacklisting Traffic . . . . . . . . . . . . . . . . . . . . . 677 Defining Site Properties for VPN
Configuration 4 . . . . . . . . . . . . . . . . . . . . . . 711
Getting Started with Blacklisting . . . . . . . . . . . 678 Creating Rules for VPN Configuration 4 . . . . . 712
Configuration Overview . . . . . . . . . . . . . . . . . 679
CHAPTER 50
Enabling Blacklist Enforcement . . . . . . . . . . . . 680 Configuring IPsec VPNs . . . . . . . . . . . . . . . . . 715
Configuring Automatic Blacklisting . . . . . . . . . . 681 Getting Started With IPsec VPNs . . . . . . . . . . . 716
Defining Destination Interfaces for Automatic Configuration Overview . . . . . . . . . . . . . . . . . 717
Blacklisting . . . . . . . . . . . . . . . . . . . . . . . . . 681
Configuring IPsec VPNs . . . . . . . . . . . . . . . . 718
Defining Which Traffic is Blacklisted
Automatically . . . . . . . . . . . . . . . . . . . . . . . . 682 Defining Gateway Profiles . . . . . . . . . . . . . . . . 718
Adding a Rule for Blacklisting . . . . . . . . . . . 682 Defining a Custom Gateway Profile . . . . . . . . 718
Defining Blacklisting Rule Action Options . . . 683 Defining Security Gateways . . . . . . . . . . . . . . . 720
Blacklisting Traffic Manually. . . . . . . . . . . . . . . 684 Creating a New Security Gateway Element . . . 721
Defining End-Points for Internal Security
V IRTUAL P RIVATE N ETWORKS Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Defining End-Points for External Security
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . 724
CHAPTER 49
Basic VPN Configurations . . . . . . . . . . . . . . . . 687 Defining Trusted CAs for a Gateway . . . . . . . . 726
Getting Started With Basic VPN Configuration . . 688 Defining Gateway-Specific VPN Client Settings 727
Configuration 1: Basic VPN Between StoneGate Defining Sites for VPN Gateways . . . . . . . . . . . 729
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688 Disabling/Re-Enabling Automatic VPN Site
Creating Gateway Elements for Configuration 1 689 Management . . . . . . . . . . . . . . . . . . . . . . . . 730
Creating a VPN Element for Configuration 1 . . 690 Adjusting Automatic VPN Site Management . . 731
Creating Rules for VPN Configuration 1 . . . . . 691 Adding a New VPN Site. . . . . . . . . . . . . . . . . 731
Configuration 2: Basic VPN With a Partner Defining Protected Networks for VPN Sites. . . 732
Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Adjusting VPN-Specific Site Settings . . . . . . . 732
Creating an Internal Gateway Element for Disabling a VPN Site Temporarily in All VPNs . 733
Configuration 2. . . . . . . . . . . . . . . . . . . . . . . 693 Removing a VPN Site Permanently from All
Creating an External Gateway Element for VPNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Configuration 2. . . . . . . . . . . . . . . . . . . . . . . 694 Defining VPN Profiles . . . . . . . . . . . . . . . . . . . 734
Defining a Site for External Gateway in Creating a New VPN Profile . . . . . . . . . . . . . . 734
Configuration 2. . . . . . . . . . . . . . . . . . . . . . . 695
Modifying an Existing VPN Profile. . . . . . . . . . 735
Creating a VPN Profile for Configuration 2. . . . 696
Defining IKE (Phase 1) Settings for a VPN . . . 735
Creating a VPN Element for Configuration 2 . . 698
Defining IPsec (Phase 2) Settings for a VPN. . 737
Creating Rules for Configuration 2 . . . . . . . . . 700
Defining VPN Client Settings . . . . . . . . . . . . . 740
Configuration 3: Basic VPN for Remote Clients . 701
14 Table of Contents
Defining Trusted CAs for a VPN . . . . . . . . . . . 742 Forwarding All SOHO Corporate Traffic to the
Defining a VPN Element . . . . . . . . . . . . . . . . . 742 VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Creating a New VPN Element . . . . . . . . . . . . . 743 Routing Traffic Between VPN Tunnels . . . . . . . . 772
Modifying an Existing VPN Element . . . . . . . . 744 Renewing or Generating Pre-Shared Keys . . . . . 773
Defining VPN Topology . . . . . . . . . . . . . . . . . 744 Generating a New Pre-Shared Key
Automatically . . . . . . . . . . . . . . . . . . . . . . . . 773
Defining VPN Tunnel Settings. . . . . . . . . . . . . 746
Configuring Pre-Shared Keys Manually . . . . . . 774
Creating VPN Rules. . . . . . . . . . . . . . . . . . . . . 748
Advanced VPN Tuning . . . . . . . . . . . . . . . . . . . 774
Creating Basic VPN Rules for Gateway
Connections. . . . . . . . . . . . . . . . . . . . . . . . . 749 Defining a Custom Gateway Settings Element 774
Creating Basic Rules for VPN Client Adjusting General Gateway Settings . . . . . . 776
Connections. . . . . . . . . . . . . . . . . . . . . . . . . 750 Adjusting Negotiation Retry Settings . . . . . . 777
Creating Forwarding VPN Rules on Hub Adjusting Certificate Cache Settings . . . . . . 778
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . 751 Adjusting Anti-Clogging Settings . . . . . . . . . 778
Preventing Other Access Rules from Matching Assigning the Gateway Settings for a
VPN Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . 752 Firewall/VPN Engine . . . . . . . . . . . . . . . . . . . 779
Creating NAT Rules for VPN Traffic . . . . . . . . . 752 CHAPTER 53
Monitoring VPNs . . . . . . . . . . . . . . . . . . . . . . . 753 VPN Client Settings . . . . . . . . . . . . . . . . . . . . 781
CHAPTER 51 Getting Started With VPN Client Settings . . . . . 782
Managing VPN Certificates . . . . . . . . . . . . . . . 755 List of VPN Client Settings in the Management
Getting Started With VPN Certificates. . . . . . . . 756 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Configuration Overview . . . . . . . . . . . . . . . . . 756 Managing VPN Client IP Addresses . . . . . . . . . 785
Configuring NAT Pool for VPN Clients . . . . . . . 786
Defining a VPN Certificate Authority . . . . . . . . . 757
Configuring Virtual IP Addressing for VPN
Creating and Signing VPN Certificates . . . . . . . 759 Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Creating a VPN Certificate or Certificate Configuring the Gateway for Virtual IP
Request for an Internal Gateway . . . . . . . . . . 759 Address Clients . . . . . . . . . . . . . . . . . . . . . . 787
Signing External Certificate Requests Internally 761 Allowing DHCP Relay in the Policy . . . . . . . . . 789
Uploading VPN Certificates Manually . . . . . . . . 762 Exporting VPN Client Configuration to a File . . . 789
Renewing VPN Certificates . . . . . . . . . . . . . . . 763
Exporting the Certificate of VPN Gateway or VPN M AINTENANCE AND U PGRADES
CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Importing a VPN Gateway Certificate . . . . . . . . 765
CHAPTER 54
Checking When Gateway Certificates Expire . . . 765 Backing up and Restoring System
Checking When an Internal VPN CA Expires . . . 766 Configurations . . . . . . . . . . . . . . . . . . . . . . . . 793
CHAPTER 52 Getting Started with Backups . . . . . . . . . . . . . 794
Reconfiguring Existing VPNs . . . . . . . . . . . . . . 767 Configuration Overview . . . . . . . . . . . . . . . . . 794
Adding or Removing Tunnels Within a VPN . . . . 768 Creating Backups. . . . . . . . . . . . . . . . . . . . . . 795
Configuring NAT Settings for an Existing VPN . . 768 Storing Backup Files . . . . . . . . . . . . . . . . . . . 796
Activating NAT Traversal . . . . . . . . . . . . . . . . 768 Restoring Backups . . . . . . . . . . . . . . . . . . . . . 796
Translating Addresses of VPN Communications Restoring a Management Server Backup . . . . 797
Between Gateways . . . . . . . . . . . . . . . . . . . . 769
Restoring a Log Server Backup . . . . . . . . . . . 797
Translating Addresses in Traffic Inside a VPN
Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769 Recovering from a Hardware Failure . . . . . . . . . 798
Adding New Gateways to an Existing VPN . . . . . 770 CHAPTER 55
Managing Log Data . . . . . . . . . . . . . . . . . . . . . 799
Changing Gateway IP Addressing in an Existing
VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770 Getting Started with Log Data Management . . . 800
Giving VPN Access to Additional Hosts . . . . . . . 771 Configuration Overview . . . . . . . . . . . . . . . . . 800
Routing Internet Traffic Through VPNs. . . . . . . . 771 Defining When Logs Are Generated . . . . . . . . . 801
Archiving Log Data . . . . . . . . . . . . . . . . . . . . . 802
Table of Contents 15
Creating an Archive Log Task . . . . . . . . . . . . . 802 CHAPTER 58
Selecting Log Data for Archiving. . . . . . . . . . . 803 Upgrading the Management Center . . . . . . . . . 833
Selecting Operation Settings for Archiving Log Getting Started with Upgrading the SMC . . . . . 834
Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804 Configuration Overview . . . . . . . . . . . . . . . . . 835
Deleting Log Data . . . . . . . . . . . . . . . . . . . . . . 805 Obtaining the SMC Installation Files . . . . . . . . 835
Creating a Delete Log Task . . . . . . . . . . . . . . 805 Upgrading Management Center Servers . . . . . . 836
Selecting Data for Deleting Logs . . . . . . . . . . 806 Default Installation Directories for SMC . . . . . . 837
Selecting Operation Settings for Deleting Logs 806
CHAPTER 59
Pruning Log Data . . . . . . . . . . . . . . . . . . . . . 807 Upgrading the Engines . . . . . . . . . . . . . . . . . . 839
Disabling Pruning Filters . . . . . . . . . . . . . . . . 808 Getting Started with Upgrading Engines . . . . . . 840
Exporting Log Data . . . . . . . . . . . . . . . . . . . . . 809 Configuration Overview . . . . . . . . . . . . . . . . . 840
Creating an Export Log Task . . . . . . . . . . . . . 809
Obtaining Engine Upgrade Files . . . . . . . . . . . . 841
Selecting Data for Log Export . . . . . . . . . . . . 810
Upgrading Engines Remotely. . . . . . . . . . . . . . 841
Selecting Operation Settings for Log Export . . 811
CHAPTER 60
Viewing a History of Executed Log Tasks . . . . . 812 Manual Dynamic Updates. . . . . . . . . . . . . . . . . 845
CHAPTER 56
Getting Started with Manual Dynamic Updates . 846
Managing and Scheduling Tasks . . . . . . . . . . . . 813
Configuration Overview . . . . . . . . . . . . . . . . . 846
Getting Started with Tasks. . . . . . . . . . . . . . . . 814
Importing an Update Package . . . . . . . . . . . . . 846
Configuration Overview . . . . . . . . . . . . . . . . . 814
Activating an Update Package . . . . . . . . . . . . . 847
Task Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Creating New Task Definitions . . . . . . . . . . . . . 817
T ROUBLESHOOTING
Creating Backup Tasks . . . . . . . . . . . . . . . . . 817
Creating Policy Refresh Tasks . . . . . . . . . . . . 818 CHAPTER 61
Creating Policy Upload Tasks . . . . . . . . . . . . . 818 General Troubleshooting Tips. . . . . . . . . . . . . . 851
Creating Remote Upgrade Tasks . . . . . . . . . . 819 If Your Problem Is Not Listed. . . . . . . . . . . . . . 852
Creating SGInfo Tasks. . . . . . . . . . . . . . . . . . 820 Tools For Further Troubleshooting . . . . . . . . . . 852
Scheduling Tasks . . . . . . . . . . . . . . . . . . . . . . 820 CHAPTER 62
Starting Tasks Manually . . . . . . . . . . . . . . . . . 821 Troubleshooting Accounts and Passwords . . . . 853
Pausing the Scheduled Execution of a Task . . . 821 Forgotten Passwords . . . . . . . . . . . . . . . . . . . 854
Cancelling a Task Schedule . . . . . . . . . . . . . . . 821 User Account Changes Have no Effect . . . . . . . 854
Stopping Task Execution . . . . . . . . . . . . . . . . . 822 Creating an Emergency Administrator Account . 855
CHAPTER 57 CHAPTER 63
Managing Licenses. . . . . . . . . . . . . . . . . . . . . . 823 Troubleshooting Alerts, Errors, and Log
Getting Started with Licenses . . . . . . . . . . . . . 824 Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Generating New Licenses . . . . . . . . . . . . . . . . 826 Alert Log Messages . . . . . . . . . . . . . . . . . . . . 858
Upgrading Licenses Manually . . . . . . . . . . . . . 827 Certificate Authority Expired/Expiring Alerts . . 858
Changing License Binding Details . . . . . . . . . . 828 Certificate Expired/Expiring Alerts . . . . . . . . . 858
Installing Licenses . . . . . . . . . . . . . . . . . . . . . 828 “Log Spool Filling” . . . . . . . . . . . . . . . . . . . . 858
Installing a License for an Unlicensed “Status Surveillance: Inoperative Security
Component . . . . . . . . . . . . . . . . . . . . . . . . . 828 Engines” . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
Replacing the License of a Previously “System Alert”. . . . . . . . . . . . . . . . . . . . . . . 859
Licensed Component . . . . . . . . . . . . . . . . . . 829 “Test Failed” . . . . . . . . . . . . . . . . . . . . . . . . 859
Checking If All Components Are Licensed . . . . . 831 “Throughput Based License Exceeded” . . . . . 859
Checking License Validity and State . . . . . . . . . 831 Log Messages . . . . . . . . . . . . . . . . . . . . . . . . 860
Connection Closed/Reset by Client/Server . . 860
16 Table of Contents
“Connection Removed During Connection Problems Logging In with the Management
Setup”. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889
“Connection State Might Be Too Large” . . . . . 860 Problems with Layout and Views . . . . . . . . . . . 890
“Connection Timeout...” . . . . . . . . . . . . . . . . 861 Problems With Viewing Statistics. . . . . . . . . . . 890
“Incomplete Connection Closed” . . . . . . . . . . 862 Problems with Status Monitoring . . . . . . . . . . . 890
“NAT Balance: Remote Host Does Not Problems Installing Web Start on an External
Respond” . . . . . . . . . . . . . . . . . . . . . . . . . . 862 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891
“Not a Valid SYN packet” . . . . . . . . . . . . . . . 863 CHAPTER 69
“Requested NAT Cannot Be Done”. . . . . . . . . 864 Troubleshooting NAT . . . . . . . . . . . . . . . . . . . 893
Spoofed Packets . . . . . . . . . . . . . . . . . . . . . 864 Troubleshooting NAT Errors . . . . . . . . . . . . . . . 894
IPsec VPN Log Messages . . . . . . . . . . . . . . . 864 NAT Is Not Applied Correctly . . . . . . . . . . . . . . 894
Error Messages . . . . . . . . . . . . . . . . . . . . . . . 864 NAT Is Applied When it Should Not Be . . . . . . . 895
Command Failed/Connect Timed out . . . . . . . 864 CHAPTER 70
PKIX Validation Failed . . . . . . . . . . . . . . . . . . 865 Troubleshooting Policies . . . . . . . . . . . . . . . . . 897
Policy Installation Errors . . . . . . . . . . . . . . . . 865 Troubleshooting Firewall Policy Installation . . . . 898
Unexpected Error . . . . . . . . . . . . . . . . . . . . . 865 The Engine Performs a Roll-Back at Policy
Installation . . . . . . . . . . . . . . . . . . . . . . . . . 898
CHAPTER 64
Troubleshooting Certificates . . . . . . . . . . . . . . 867 The Management Server Contact to Nodes
Times Out . . . . . . . . . . . . . . . . . . . . . . . . . . 898
Understanding Certificate-Related Problems . . . 868
Policy Installation Fails for Some Other
Replacing Expired/Missing Certificates . . . . . . 870 Reason . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899
Renewing SMC Server Certificates. . . . . . . . . 870 Warning “Automatic Proxy ARP Option Is
Renewing Engine Certificates . . . . . . . . . . . . 871 Ignored” . . . . . . . . . . . . . . . . . . . . . . . . . . . 899
Dealing with Expiring Certificate Authorities . . . 872 Troubleshooting IPS Policy Installation . . . . . . . 900
CHAPTER 65
Troubleshooting Rules . . . . . . . . . . . . . . . . . . 900
Troubleshooting Engine Operation . . . . . . . . . . 875 Validating Rules . . . . . . . . . . . . . . . . . . . . . . 900
Node Does not Go or Stay Online. . . . . . . . . . . 876 Rule That Allows ANY Service Does Not
Allow All Traffic. . . . . . . . . . . . . . . . . . . . . . . 900
Error Commanding an Engine. . . . . . . . . . . . . . 876
Inspection Rules Produce False Positives. . . . 901
Errors with Heartbeat and Synchronization . . . . 877
How to Enable Passthrough for PPTP Traffic . . 901
Problems Contacting the Management Server. . 877
Traffic I Want to Allow Is Stopped by the
CHAPTER 66 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
Troubleshooting Licensing . . . . . . . . . . . . . . . . 879 Packets Are Dropped as Spoofed . . . . . . . . . 903
Troubleshooting Licensing . . . . . . . . . . . . . . . . 880 Unsupported Definitions in IPv6 Access Rules 903
License Is Shown as ‘Retained’ . . . . . . . . . . . . 880 CHAPTER 71
License Is Shown as ‘Unassigned’. . . . . . . . . . 881 Troubleshooting Reporting . . . . . . . . . . . . . . . 905
“Throughput Based License Exceeded” Alerts. . 881 Troubleshooting Reporting . . . . . . . . . . . . . . . 906
CHAPTER 67 No Report is Generated at All . . . . . . . . . . . . . 906
Troubleshooting Logging . . . . . . . . . . . . . . . . . 883 Empty Report Sections or Incomplete Data . . . 907
Problems With Viewing Logs . . . . . . . . . . . . . . 884 CHAPTER 72
Logs Are Filling up the Storage Space . . . . . . . 884 Troubleshooting Upgrades . . . . . . . . . . . . . . . . 909
Log Server Does not Run . . . . . . . . . . . . . . . . 885 Upgrade Fails Because of Running Services . . . 910
CHAPTER 68 “StoneGate will not be installed properly” . . . . 910
Troubleshooting the Management Client. . . . . . 887
CHAPTER 73
Cannot View Online Help: “Help File Not Found” 888 Troubleshooting VPNs. . . . . . . . . . . . . . . . . . . 911
Some Options Are Disabled. . . . . . . . . . . . . . . 888 Checking Automatic VPN Validation Results . . . 912
Slow Startup and Use . . . . . . . . . . . . . . . . . . . 889 Reading VPN-related Logs . . . . . . . . . . . . . . . . 912
VPN Certificate Issues . . . . . . . . . . . . . . . . . . 913
Table of Contents 17
Problems with Internal to External Gateway VPN 913 Exportable SSL VPN Log Entry Fields . . . . . . . 997
Problems Connecting With a StoneGate VPN Facility Field Values . . . . . . . . . . . . . . . . . . . . 997
Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914 Type Field Values . . . . . . . . . . . . . . . . . . . . . . 999
Action Field Values . . . . . . . . . . . . . . . . . . . . . 1000
A PPENDICES Event Field Values . . . . . . . . . . . . . . . . . . . . . 1000
IPsec VPN Log Messages . . . . . . . . . . . . . . . . 1005
APPENDIX A
Command Line Tools . . . . . . . . . . . . . . . . . . . . 917 VPN Notifications . . . . . . . . . . . . . . . . . . . . . 1005
VPN Errors. . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Management Center Commands . . . . . . . . . . . 918
VPN Error Codes . . . . . . . . . . . . . . . . . . . . . 1009
Engine Commands . . . . . . . . . . . . . . . . . . . . . 926
Audit Entry Types . . . . . . . . . . . . . . . . . . . . . . 1010
Server Pool Monitoring Agent Commands . . . . . 931
Syslog Entries . . . . . . . . . . . . . . . . . . . . . . . . 1014
APPENDIX B
Default Communication Ports. . . . . . . . . . . . . . 933 Log Fields Controlled by the Additional Payload
Option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
Management Center Ports. . . . . . . . . . . . . . . . 934 Connection States . . . . . . . . . . . . . . . . . . . . . 1016
Firewall/VPN Engine Ports . . . . . . . . . . . . . . . . 936
APPENDIX H
IPS Engine Ports. . . . . . . . . . . . . . . . . . . . . . . 940 Keyboard Shortcuts. . . . . . . . . . . . . . . . . . . . . 1019
APPENDIX C General Shortcuts . . . . . . . . . . . . . . . . . . . . . 1020
Predefined Aliases . . . . . . . . . . . . . . . . . . . . . . 943
Shortcuts for Browsing Logs and Alerts . . . . . . 1021
Pre-Defined User Aliases . . . . . . . . . . . . . . . . . 944 Other View-Specific Shortcuts . . . . . . . . . . . . . 1023
System Aliases. . . . . . . . . . . . . . . . . . . . . . . . 944 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
APPENDIX D
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Regular Expression Syntax . . . . . . . . . . . . . . . . 947
Syntax for StoneGate Regular Expressions . . . . 948
Special Character Sequences . . . . . . . . . . . . . 950
Pattern-Matching Modifiers . . . . . . . . . . . . . . . 951
Bit Variable Extensions . . . . . . . . . . . . . . . . . . 952
Variable Expression Evaluation . . . . . . . . . . . . 954
Stream Operations . . . . . . . . . . . . . . . . . . . . 956
Other Expressions . . . . . . . . . . . . . . . . . . . . 957
System Variables . . . . . . . . . . . . . . . . . . . . . . 958
Independent Subexpressions. . . . . . . . . . . . . . 959
Parallel Matching Groups. . . . . . . . . . . . . . . . . 960
APPENDIX E
SNMP Traps and MIBs . . . . . . . . . . . . . . . . . . . 961
APPENDIX F
Schema Updates for External LDAP Servers . . . 973
APPENDIX G
Log Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975
Log Entry Fields . . . . . . . . . . . . . . . . . . . . . . . 976
Non-exportable Log Entry Fields. . . . . . . . . . . 976
Exportable Alert Log Entry Fields . . . . . . . . . . 980
Exportable Alert Trace Log Entry Fields . . . . . . 980
Exportable Audit Log Entry Fields . . . . . . . . . . 981
Exportable Firewall Log Entry Fields . . . . . . . . 982
Exportable IPS Log Entry Fields . . . . . . . . . . . 984
Exportable IPS Recording Log Entry Fields . . . 996
18 Table of Contents
G ETTING S TARTED
In this section:
Using StoneGate Documentation - 21
What’s New? - 27
Managing Elements - 71
19
20
C H A P TE R 1
Welcome to the StoneGate™ product family by Stonesoft Corporation. This chapter describes
how to use this guide and related documentation. It also provides directions for obtaining
technical support and giving feedback on the documentation.
21
Objectives and Audience
The StoneGate Administrator’s Guide is intended for the administrators of any StoneGate
installation in tasks that involve the StoneGate Management Center (SMC) and the various
components that the SMC controls. This guide describes step by step how to complete
StoneGate configuration and management tasks.
The guide continues from where the Installation Guide ends. The chapters in this guide are
organized according to StoneGate administrative tasks. Each chapter focuses on one area of
administration. As a general rule, the chapters proceed from basic configuration tasks to more
advanced topics. Although overviews are provided, the emphasis in this guide is more on
completing specific tasks than developing a deep understanding of how the system works
(consult the Reference Guides for more background information).
This guide explains features included in the software versions mentioned on page 1. If you are
using older versions of the software you will not be able to use all the features explained in this
manual and some features that are available may not work as explained.
To launch the Online Help system, press F1 on your keyboard in any Management Client window
or dialog.
Typographical Conventions
We use the following typographical conventions throughout the guide:
Note – Notes provide important information that may help you complete a task.
Tip – Tips provide information that is not essential, but makes working with the system easier.
Example Examples clarify points made in the adjacent text.
What’s Next?
The What’s Next lists at the ends of secions contain tasks that you must or may want to
perform after completing a procedure. If several of the procedures listed apply, pick the
first one; you will encounter a new What’s Next section when you are finished with the
first item.
Documentation Available
StoneGate technical documentation is divided into two main categories: product documentation
and support documentation.
Product Documentation
The table below lists the available product documentation. PDF guides are available on the
Management Center CD-ROM and at http://www.stonesoft.com/support/.
Guide Description
Explains the operation and features of StoneGate comprehensively.
Demonstrates the general workflow and provides example scenarios
Reference Guide
for each feature area. Available for StoneGate Management Center,
Firewall/VPN, and StoneGate IPS.
Documentation Available 23
Table 1.2 Product Documentation (Continued)
Guide Description
Instructions for physically installing and maintaining StoneGate
Appliance Installation Guide appliances (rack mounting, cabling, etc.). Available for all StoneGate
hardware appliances.
Support Documentation
The StoneGate support documentation provides additional and late-breaking technical
information. These technical documents support the StoneGate guide books, for example, by
giving further examples on specific configuration scenarios.
The latest StoneGate technical documentation is available on the Stonesoft website at http://
www.stonesoft.com/support/.
System Requirements
The certified platforms for running StoneGate engine software can be found at the product
pages at www.stonesoft.com/en/products_and_solutions/products/ (select the correct product
and click “Software Solutions” on the left).
The hardware and software requirements for the Management Center and version-specific
details for all software products can be found in the Release Notes included on the Management
Center CD-ROM and on the software download page at the Stonesoft website.
Contact Information
For street addresses, phone numbers, and general information about StoneGate and Stonesoft
Corporation, visit our website at http://www.stonesoft.com/.
Licensing Issues
You can view your current licenses at the License Center section of the Stonesoft website at
https://my.stonesoft.com/managelicense.do.
For license-related queries, e-mail order@stonesoft.com.
Technical Support
Stonesoft offers global technical support services for Stonesoft’s product families. For more
information on technical support, visit the Support section at the Stonesoft website at http://
www.stonesoft.com/support/.
Your Comments
We want to make our products fulfill your needs as well as possible. We are always pleased to
receive any suggestions you may have for improvements.
• To comment on software and hardware products, e-mail feedback@stonesoft.com.
• To comment on the documentation, e-mail documentation@stonesoft.com.
Other Queries
For queries regarding other matters, e-mail info@stonesoft.com.
Contact Information 25
26 Chapter 1 Using StoneGate Documentation
C H A P TE R 2
WHAT’S NEW?
This section lists major changes since the previous release. Most new or reworked features in
the software are listed here. Changes that do not significantly affect the way StoneGate is
configured are not listed. For a full list of changes in the software and detailed version-specific
information, consult the Release Notes.
27
Important Changes
The changes listed here either automatically change existing configurations or require you to
manually check the existing configurations in your system.
OCSP Support
Engines can now check IPsec VPN certificate validity using the OCSP protocol.
• For more details, see Defining a VPN Certificate Authority (page 757).
Statistics-Based Alerts
It is now possible to define a threshold for automatic tracking of monitored items in Overviews.
An alert is sent if the threshold is exceeded.
• For more details, see Setting Thresholds for Monitored Items (page 96).
Fingerprint Improvements
The regular expression syntax for context definitions in Situations has been enhanced to allow
more flexible variable definitions.
• For more details, see Regular Expression Syntax (page 947).
Web Filtering
IPS sensors now support manually entered URL lists and category-based web filtering. Category-
based filtering controls web access using general classifications of web content. For example,
you can prevent users from accessing game sites. Category-based web filtering is a separately
licensed feature.
• For more details, see Getting Started with Web Filtering (page 652).
The Inspection tab in Firewall and IPS Policies is now divided in two parts:
• At the top, the Exceptions panel contains the rule table, which is functionally unchanged.
• Below, the Rules panel contains a tree of inspection checks, the Rules tree.
• The Situations are organized in the Rules tree under a new type of categorization called
Situation Type. Situation Types otherwise work like Situation Tags, except that you can only
select one Situation Type for each Situation and that all Situations that have a Situation Type
are included in the Rules tree in all policies.
The Rules tree is the main configuration tool. It allows you to select an action (Allow or
Terminate) and the logging options per Situation or per Situation Type. Both the action and
logging options can be set to a default setting, which means that the setting is inherited from
the parent element and changed when the parent’s setting is changed, allowing you to quickly
change the settings for many Situations.
However, the Rules tree does not allow any other configurations than what is discussed above.
For example, IP addresses cannot be added to the main Rules. For more detailed control and for
some features (such as blacklisting) you must use the Exceptions rule table. Some additional
options, such as User Responses, can be set for the Rules tree in a Continue rule created as an
Exception. If you use Template Policies to delegate and restrict administrator editing rights, note
that the Rules tree can be edited freely in all policies regardless of the definitions in the higher-
level Template Policy. The Exceptions continue to follow the familiar old logic.
Although the Rules tree is now shown in all policies, the configurations in your existing IPS
policies remain unchanged. Your existing Inspection rules are shown in the Exceptions table.
The recommended new editing logic is to use the Rules tree whenever possible and only make
Exceptions when the Rules tree does not have all suitable options for your intended use. With
existing policies, most rules that do not need to apply to some specific Source, Destination, or
a Sensor’s Logical Interface are candidates to be removed and replaced by the Rules tree. If you
take the time to clean up the existing policies in this way, they will be easier to manage in the
future.
For more information, see Editing Inspection Rules (page 531).
Tip – See the IPS Reference Guide for background information on the new IPS rule configuration tools
and new information about the overall rule design considerations.
The sections listed below provide an introduction to the StoneGate Management Client.
35
Overview to the Management Client
Prerequisites: None
This section presents a general overview to the Management Client. For detailed information on
using these views, see the Related Tasks at the end of this section.
The Management Client offers several task-specific views. There are alternative ways to switch
between the different views:
• The main menu and the toolbar shortcuts are always available.
• Additional links are provided, for example, in the right-click menus of elements and in the
logs. You can also bookmark your most frequently visited views.
You have several options for opening a new view.
• Clicking replaces the current view with the new one.
• Ctrl-clicking opens the new view as a new tab.
• Shift-clicking opens the new view as a new window.
You can open a new empty tab in any view, by using the keyboard shortcut Ctrl+T. You can also
do it by clicking the plus icon on the right of the previous tab. From the list of views that opens,
select the view to be shown in the new tab.
The System Status View
Automatically
generated
connectivity
diagram for
the selected
element and
its peers.
Status of
monitored
system
elements.
Details of
the selected
element
Tree of relevant
element types.
There are separate configuration views for Firewall, IPS, VPN, Administration, and Monitoring
configuration tasks. These views can be opened both through the main menu and the shortcut
buttons in the toolbar. Additionally, there is a combined Configuration view that lists all
elements.
The Configuration views allow you to set up and modify all features of the system. The
configurations are stored as elements, which are shown in a tree structure. Elements are
created and modified through the right-click menus that open when you right-click a tree branch
or an element.
Overviews can contain information on the system’s status, bookmarks to views you use often
(such as logs filtered with specific criteria), and statistical charts on the system’s operation
(such as engine load) and the traffic flow. You can create several different overviews for different
purposes. Several default overviews are provided as templates.
Query panel
selects data
for display.
Related Tasks
Bookmarking Views (page 41)
Changing the Startup View (page 44)
Managing Elements (page 71)
Getting Started with System Monitoring (page 84)
Creating Overviews (page 92)
Getting Started with the Logs View (page 128)
You can select different panels and view options through the View menu. Some layout options
are specific to the currently active view, and some options are global.
You can drag and drop the panels to several preconfigured places within each specific view. The
layout is saved as your preference for further use, but you can reset it through the
ViewLayoutReset Layout option in the main menu.
• To resize a panel, drag by the outer edge of the panel as usual when resizing.
• To move a panel, drag by the title bar at the top like you would move a window (see illustration
below).
You can also bookmark alternative layouts to quickly return to a specific view and layout at any
later time, see Bookmarking Views.
Bookmark-related actions can be found through the Bookmark menu. Bookmarks can also be
added to the toolbar. Bookmarks can store many of the settings you have selected in views. For
example, you can bookmark a Logs view with particular filtering settings. Several windows and
tabs can be stored behind a single click when you combine bookmarks into Bookmark Folders.
Bookmarks in the default Shared Bookmarks folder are shown to all administrators that log in
to the same Management Server. Other bookmarks are private to the Management Clients of
individual administrators.
Managing Bookmarks
Bookmarks can be managed in the Administration Configuration view, under the Bookmarks
branch. There is a shortcut to this view: select BookmarkManage Bookmarksin the main
menu.
You can, for example, copy Bookmarks and Bookmark Folders from one group to another. All
actions are available through the right-click menu for the Bookmarks and Bookmark folders.
Bookmarking Views 41
Creating New Bookmarks
You can create a bookmark for the currently active tab and other window-level elements in the
configuration you select. Some view-specific options are also stored in bookmarks, such as the
currently active filter in the Logs view, or the type of elements that are listed in a Configuration
view at the time the bookmark is created.
Bookmarking is a main window action, so the properties dialogs for the various elements are
never included in the bookmark.
3. (Optional) Change the Name and add a Comment for your reference.
• The default name is taken from the bookmarked view’s title.
4. (Optional) For In Folder, click the Select button and select the folder where the Bookmark is
placed.
• The default Bookmarks creates the folder at the top level of the bookmarks tree.
• Select the Shared Bookmarks folder if you want other administrators to see this
Bookmark. All other folders are private to your Management Client.
• Select the Toolbar folder or one of its sub-folders to add the bookmark folder to the
toolbar. If the Toolbar folder is not available, activate the feature as explained in Adding
Bookmarks to the Toolbar (page 43).
5. (Optional) Deselect Window Layout if you prefer the bookmark not to change the layout of
the window when you open it, but use whichever layout the view had when you last used it.
6. Click OK.
Related Tasks
To further edit and organize the bookmarks, see Managing Bookmarks (page 41).
Bookmarks toolbar
Bookmarking Views 43
2. Click the default New Toolbar Folder item. The Create Toolbar Folder dialog opens.
3. Enter the name for the first folder to add to the toolbar and click OK. The first folder
appears in the toolbar and the Toolbar folder is added to the bookmark hierarchy, allowing
you to add, remove, and edit the bookmarks in the toolbar.
You can freely choose which view opens whenever you log in to the Management Client,
replacing the default System Status view.
Search
Search results
criteria
2. Enter the search criteria (name, IP address, comment, vulnerability reference, etc.) in the
Search for field.
• You can use wildcard symbols in your query (for example, win*, or 192.168*100).
• You can use the + symbol to require search criteria.
• You can use the - symbol to exclude search criteria.
Option Explanation
Limit by Type Restrict the search to one type of element.
Changed Search elements that were last changed between certain dates. You can type in the
Between dates or select them from a calendar.
Search Across Search within all configured administrative Domains. This options is only visible if
Domains Domain elements have been configured.
Select
options to
limit the
search
4. Click the Search button to launch the search. The search results are displayed.
Tip – If the element you searched for does not exist, you can right-click the empty search results and
create a new Host or Network that has the Name and/or IP address configured according to
your search terms.
Related Tasks
Searching for Element References (page 46)
Searching for Users (page 46)
Searching for Duplicate IP Addresses (page 47)
Using the DNS Search (page 48)
Searching for Unused Elements (page 49)
Option Explanation
UserID User’s login name.
Authentication
The authentication method configured for the user.
Service
The first date (yyyy-mm-dd) on which the user is allowed to log in through the
Activation Date
firewall.
Expiration Date The last date (yyyy-mm-dd) on which the user is allowed to log in through the firewall.
The number of days the user is allowed to log in through the firewall (from the
Expiration Delay
Activation Date to the Expiration Date).
Option Explanation
Contains The user information contains the value (for example, a name) that is searched for.
The Activation Date or Expiration Date of the user is the same or later than the date
Greater Than
entered for the search (yyyy-mm-dd).
The Activation Date or Expiration Date of the user is the same or earlier than the
Lesser Than
date entered for the search (yyyy-mm-dd).
Is Defined Returns all user accounts that have some value for the selected attribute.
7. (Depending on attribute selected) Enter the required value (for example, a name or date)
that you want to search for among the user information.
8. Click Search. A list of users that match the search criteria is displayed.
Option Explanation
Limit by Type Restrict the search to the type element that you select.
Restrict the search to elements changed between certain dates. Enter the date
Changed
information or click the button next to the date fields to select the dates from a
Between
calendar.
Search Across Make the search across all configured administrative Domains. This options is only
Domains visible if Domain elements have been configured.
5. Click the Search button to launch the search. The search results are displayed.
What’s Next?
If the search did not find an element, you can add it based on the search as explained
in Creating Host Elements Based on DNS Queries.
Option Explanation
Limit by Type Restrict the search to the type element that you select.
Restrict the search to elements changed between certain dates. Enter the date
Changed
information or click the button next to the date fields to select the dates from a
Between
calendar.
Search Across Make the search across all configured administrative Domains. This options is only
Domains visible if Domain elements have been configured.
5. Click the Search button to launch the search. A list of elements that are not used in any
configuration or within any elements is displayed and the number of the elements found is
shown at the bottom of the Search panel.
Type-Ahead Search allows you to quickly filter elements. You can use Type-Ahead Search in all
views in which element lists, tables, or trees are displayed.
When you start typing, the system immediately filters the display to the elements that include
what you typed in the element’s basic details, for example:
• Element name.
• IP address.
• Comment.
• TCP/UDP Port.
You can save lists of elements, logged data, reports, and statistics in PDF format or as HTML by
selecting FilePrint from the menu. Saving as PDF allows you to use a background template.
The specifics of PDF printing are described below.
Selected Prints only records that are currently selected in the Logs
Records Records view.
(Logs view Filtered
only) Records Prints all records that match the current Query.
from...
The administrator messaging feature allows you to communicate with other administrators who
are currently logged in to the Management Client. For example, you can inform administrators
about service breaks before upgrading the Management Center. Administrator messaging is
enabled by default.
What’s Next?
If you want to enable/disable administrator messaging, proceed to Enabling/Disabling
Administrator Messaging (page 52).
To send messages to administrators, proceed to Sending Messages to Other
Administrators (page 53).
You can add commands (for example, tracert, SSH, or ping) to an element’s right-click menu with
Tools Profiles. The commands are added in the Tools submenu.
What’s Next?
To define new commands, proceed to Creating a Tools Profile (page 53).
To reuse an existing Tools Profile without modifications, proceed to Attaching a Tools
Profile to an Element (page 54).
3. Enter the Name for the new Tools Profile. This is added as an item under the Tools
submenu of elements that the Tools Profile is attached to.
4. Click Add and select the operating system. A row is added to the table.
5. Double-click the Name cell, and enter the item that you want to add.
6. (Optional) Select Run in Console if you want the command to be run in a console
application, such as the command prompt in Windows or terminal in Linux.
7. Double-click the Command cell and enter the command or the full path to the application.
8. (Optional) Double-click the Parameters cell and enter the parameters for the command. In
addition to static parameters, the following two variables can be used:
• ${IP}: the primary IP address of the element that is right-clicked.
• ${NAME}: the name of the element that is right-clicked.
9. Click OK.
What’s Next?
Proceed to Attaching a Tools Profile to an Element.
The sections listed below provide an introduction to StoneGate and shortcuts to feature-
specific instructions.
55
Getting Started with the Management Center
Prerequisites: Management Center installation (covered in a separate Installation Guide)
This section is meant to help you get started after you have completed the Management Center
installation.
To familiarize yourself with the Management Client, see Overview to the Management Client
(page 36).
The basic administration tasks you must complete after installation include the following:
• Scheduling automatic backup tasks to keep safe the essential configuration information
stored on the Management Server as instructed in Backing up and Restoring System
Configurations (page 793).
• Setting up automated tasks to manage the gathered log data and prevent the Log Server
storage space from filling up with logs as instructed in Managing Log Data (page 799).
Additionally, we highly recommend that you set up the following features:
• Defining additional administrator accounts and delegating administrative tasks as instructed
in Administrator Accounts (page 213).
• Reviewing settings for automatic updates and making sure the feature works to ensure that
your system stays current. See Getting Started with Automatic Updates and Engine Upgrades
(page 210).
• Defining custom alerts and alert escalation policies as instructed in Alert Escalation
(page 229).
To efficiently manage the system, you must also familiarize yourself with the following basic
tasks:
• Monitoring the system operation as instructed in Monitoring the System (page 83) and
Browsing Logged Data (page 127).
This section is meant to help you get started after you have completed the installation, installed
a basic policy, and turned the firewalls online as instructed in the Installation Guide. If you have
also installed a new Management Center, first see Getting Started with the Management Center
(page 56).
Note – The configuration information is stored on the Management Server, and most
changes are transferred to the engines only when you install or refresh the firewall policy
after making the changes.
The basic administration tasks you must learn or complete next include the following:
• Reading and controlling the operating state of firewall engines as explained in Controlling
Engine Operation (page 189).
• Adjusting the automatic tester that monitors the operation of the firewall and the surrounding
network as explained in Configuring the Engine Tester (page 397).
• Developing your Firewall Policies further as instructed in Getting Started with Policies
(page 498).
This section is meant to help you get started after you have completed the installation, installed
a basic policy, and turned the IPS system online as instructed in the Installation Guide. If you
have also installed a new Management Center, first see Getting Started with the Management
Center (page 56).
Note – The configuration information is stored on the Management Server, and most
changes are transferred to the engines only when you install or refresh the IPS policy after
making the changes.
The basic administration tasks you must learn or complete next include the following:
• How to read and control the operating state of IPS engines as explained in Controlling Engine
Operation (page 189).
• Adjusting the automatic tester that monitors the operation of the IPS engines and the
surrounding network as explained in Configuring the Engine Tester (page 397).
After you have installed your first IPS policy, your next task is gathering information about the
events detected in your networks during a “tuning period” (see Browsing Logged Data
(page 127)). Once you have enough information on what kind of traffic—malicious and
harmless—can be seen in your network, you can modify your policies to improve the detection
accuracy and to get rid of false alarms. The most typical customization steps include:
• Creating your own policy or policy template as explained in Creating and Managing Policy
Elements (page 497).
• Modifying the Ethernet rules, Access rules, and Inspection rules as explained in Editing
Ethernet Rules (page 516), Editing Access Rules (page 518), and Editing Inspection Rules
(page 531).
• Creating your own custom Situations as explained in Defining Situations (page 595).
Also consult the product-specific Reference Guides, which contain background information that
helps you better understand the system and its features.
59
Getting Started with System Communications
Prerequisites: None
Intranet
Remote
Firewall
In the example scenario above, a Management Server and a Log Server manage StoneGate
components both at a company’s headquarters and in three branch offices.
What’s Next?
Proceed to Defining Locations to start defining contact addresses.
Proceed to Defining Contact IP Addresses (page 62) to add a new contact adress for an
existing Location.
Related Tasks
Defining IP Addresses (page 561)
Network Interface Configuration (page 341)
Selecting the Management Client Location (page 69)
Defining Locations
Prerequisites: None
If NAT (network address translation) is applied between communicating system components, the
components must be assigned different Locations in the configuration. You create the Locations
and add elements to them based on how your network is set up.
Example If a system has several Locations, but each component still has the same external IP address
no matter where the contact is made from, each element only needs a single contact
address: the Default contact address. When new system elements are added, they have to be
assigned a specific Location, but they only need a Default contact address.
Defining Locations 61
3. Right-click Locations and select New Location from the menu. The Location Properties
dialog opens.
4. Enter a Name and an optional fee-form Comment.
5. Browse to the type of elements you want to add to the Location in the Resources panel on
the left.
6. Select the element(s) you want to add to the Location and click Add. The selected elements
are added to the Content panel on the right.
7. Click OK.
What’s Next?
Continue by Defining Contact IP Addresses.
You can define contact addresses for Firewall elements (excluding SOHO firewalls), IPS
elements, and most types of Server elements. The contact addresses are defined directly in the
element properties. The contact addresses are based on Location elements.
You can also define a Default contact address that is used whenever no contact address is
defined for a certain Location.
What’s Next?
If you need to define a contact address for an engine, start by Defining Engine Location
(page 62).
If you need to define contact addresses for a server, proceed to Defining Server Contact
Addresses (page 67).
If you need to define a contact address for an external VPN gateway, see Defining a
Contact Address for External Security Gateway End-Point (page 68).
If you need to define a contact address for an internal VPN gateway, see Defining End-
Points for Internal Security Gateways (page 722).
4. In the tree view, expand the tree and double-click the Cluster Virtual IP Address (CVI), Node
Dedicated IP Address (NDI), or the IP address for which you want to define a contact
address. The IP Address Properties dialog opens.
• On clusters, the CVI contact address is used for VPNs and NDI contact addresses are
used for other system communications.
Proceed to one of the following depending on interface or engine type:
• Defining Contact Addresses for a Single Firewall or a Cluster Virtual IP Address (page 63)
• Defining Contact Addresses for Node Dedicated IP Addresses (page 65)
• Defining Contact Addresses for an IPS Engine (page 66)
2. If components from some Locations cannot use the Default contact address to connect to
the interface, click Exceptions to define Location-specific contact addresses. The
Exceptions dialog opens.
Illustration 5.5 Contact Addresses for Specific Locations - Single Firewall or Cluster Virtual IP Address
3. Click Add and select the Location. A new row is added to the table.
4. Click the Contact Address column and enter the IP address that the components belonging
to this Location must use when they contact the interface or select Dynamic if the interface
has a dynamic contact address.
Note – Elements that belong to the same Location element always use the primary IP
address (defined in the main Properties window of the element) when contacting each
other. All elements not specifically put in a certain Location are treated as if they belonged
to the same Location, the Default Location.
What’s Next?
If you want to define contact addresses for firewall cluster nodes, continue by Defining
Contact Addresses for Node Dedicated IP Addresses (page 65).
Otherwise, click OK to close the IP Address Properties dialog.
Illustration 5.6 Contact Addresses for Specific Locations - Node Dedicated IP Address
2. Enter the Default contact address at the top of the dialog. The Default contact address is
used by default whenever a component that belongs to another Location connects to this
interface.
3. If components from some Locations cannot use the Default contact address, click Add to
define Location-specific contact addresses. A new row is added to the table.
4. Click the Contact Address column and enter the IP address that the components belonging
to this Location must use when they contact the node.
Note – Elements that belong to the same Location element always use the primary IP
address (defined in the main Properties window of the element) when contacting each
other. All elements not specifically put in a certain Location are treated as if they belonged
to the same Location, the Default Location.
2. Enter the Default contact address at the top of the dialog. The Default contact address is
used by default whenever a component that belongs to another Location connects to this
interface.
3. If components from some Locations cannot use the Default contact address, click Add to
define Location-specific contact addresses. A new row is added to the table.
4. Click the Contact Address column and enter the IP address that the components belonging
to this Location must use when they contact the interface.
Note – Elements that belong to the same Location element always use the primary IP
address (defined in the main Properties window of the element) when contacting each
other. All elements not specifically put in a certain Location are treated as if they belonged
to the same Location, the Default Location.
6. Click Add and select a Location. A new row is added to the table.
Note – Elements that belong to the same Location element always use the primary IP
address (defined in the main Properties window of the element) when contacting each
other. All elements not specifically put in a certain Location are treated as if they belonged
to the same Default Location.
3. Enter the Default contact address or select Dynamic if the Default contact address is
dynamic.
• The Default contact address is used by default whenever a component that belongs to
another Location connects to this end-point.
5. Click Add and select a Location. A new row is added to the table.
6. Click the Contact Address column and enter the IP address that the components belonging
to this Location must use when they contact the end-point or select Dynamic if the end-
point has a dynamic contact address.
7. Click OK to close the Exceptions dialog.
8. Click OK to close the End-Point properties dialog.
If NAT is performed between the Management Client and a Log Server, you may need to change
the Location of the Management Client to be able to view the logs. Which Location you have to
choose depends on the system configuration. The “Default” selection is appropriate if the Log
Server is assigned a specific Location and the Log Server’s Default contact address is correct
for your current network connection.
If there are no suitable configurations available, you may need to add a new Location and define
a contact address for this specific Location in the Log Server’s properties.
Related Tasks
Defining Locations (page 61)
Defining Contact IP Addresses (page 62)
If a remotely managed firewall has Multi-Link, we recommend that you add a primary and a
secondary management interface for different ISP connections to ensure connectivity if one of
the firewall’s local ISP connections fails. Make sure you configure these addresses consistently
for the actual interface address on the firewall, for the external contact addresses (if
applicable), and in the NAT rules of the firewall that is protecting the SMC servers (as
necessary).
If a Management Server or Log Server is located behind Multi-Link in relation to components
that contact them, define a contact address for each network connection and make sure your
NAT rules translate from each external address to the correct internal address of the SMC
server.
Related Tasks
Setting Firewall Interface Options (page 361)
MANAGING ELEMENTS
There are certain tasks that are common to most elements. Some of these tasks are not
mandatory for defining an element, but are still helpful as you get your system up and
running.
71
Using Categories
Prerequisites: None
Categories allow you to filter only a subset of elements for viewing in the Management Center.
When you activate a Category filter, elements that do not belong to one of the selected
Categories are filtered out of your view.
Categories help you manage large networks by filtering the elements displayed to you. You can,
for example, create separate Categories for elements belonging to a firewall and to an IPS
configuration and select the correct category when you want to concentrate on configuring just
one of the products. You can freely select how to assign the Categories and quickly and flexibly
change which combinations of Categories are shown according to your tasks.
Configuration Overview
The general workflow for using Categories is as follows:
1. Create a new Category. See Creating New Categories (page 72).
2. Associate elements with the Category. See Selecting Categories for Elements (page 73).
3. Select the defined Category as the active Category Filter. See Activating Categories
(page 73).
4. Change the Category selection as needed in the toolbar list. See Activating Categories
(page 73).
What’s Next?
Selecting Categories for Elements
Related Tasks
Activating Categories (page 73)
Activating Categories
In most views, you can select Categories to restrict which elements are displayed. You can also
display the elements that do not belong to any Category by selecting the Not Categorized filter.
You can also select more than one Category at a time (see Filtering With Several Categories
(page 74)).
Note – The selected Category is applied in all views until you select a different Category or
deselect the Use Category Filter button.
To activate a Category
1. If the Category selection is not visible in the toolbar, select ViewLayoutCategory Filter
Toolbar from the menu. The Category selection appears in the toolbar.
Using Categories 73
Illustration 6.2 Category Filter Toolbar
Select a Category.
2. Select the Categories you want to add (shift-click or Ctrl-click to select multiple Categories)
and click Add. The selected Categories are added to the list of Selected Categories.
3. (Optional) If you want to view elements that do not have a Category (they belong to the Not
Categorized Category), select Show Not Categorized.
4. (Optional) If you want to view elements that are default elements in the system (they belong
to the System Category) select Show System Elements.
Related Tasks
Creating New Categories (page 72)
Activating Categories (page 73)
You can import and export most kinds of elements. This allows you to use the same elements in
a different system without having to create the elements again.
You can also import old versions of elements or deleted elements, by restoring them from a
Policy Snapshot.
What’s Next?
Exporting Elements (page 75)
Importing Elements (page 76)
Restoring Elements from Policy Snapshots (page 78)
Related Tasks
Importing Users from an LDIF File (page 644)
Exporting Users to an LDIF File (page 645)
Exporting Elements
This section explains how to export elements using the Management Client. For command line
exporting, see the command SgExport in Command Line Tools (page 917). For PDF or HTML
output, see Saving as PDF or HTML (page 50).
Note – The exported file is meant for importing elements into the database of a
Management Server. It is not meant to be viewed or edited in external applications.
Element type
2. Enter a file name for the export file, or click Browse to select the location where you want
to create the file.
3. Select the type of element(s) you want to export.
• You can export most but not all kinds of elements. The elements that you cannot export
are elements that contain particularly sensitive information (for example, administrator
accounts and certificates). To import an element that refers to an element that cannot be
exported, you must manually create before the import a corresponding element using the
same name as for the original referenced element. Otherwise, the import fails.
4. Add element(s) you want to export to the Content list on the right or remove elements you
do not want to export by selecting the elements and clicking Add or Remove.
5. When you have finished adding elements to the Content list, click Export. A new tab opens
to show the progress of the export.
Importing Elements
This section explains how to import elements using the Management Client. For command line
importing, see the command sgImport in Command Line Tools (page 917).
To import elements
1. Select FileImportImport Elements. The Import File dialog opens.
2. Select the file(s) you want to import and click Import. StoneGate automatically checks if
any elements in the file to be imported already exist in the system. A new tab opens.
3. If the file to be imported contains elements that already exist in the system, resolve the
element Conflicts by selecting the Action:
• Do Not Import: the element is not imported.
• Import: the element that already exists in the system is overwritten with the element in
the import file.
• Rename: the element in the import file is imported as a new element in the system and
renamed.
4. If the file to be imported contains New Elements, which do not conflict with the existing
elements, select the Action:
• Do Not Import: the element is not imported.
• Import: the element that already exists in the system is overwritten with the element in
the import file.
5. For Identical Elements that conflict with existing elements, but do not cause changes, the
Do Not Import option is automatically selected.
6. If there are no similar elements in the system or when you have selected the Action for
conflicting elements, click Continue to start the import.
This section explains how to restore elements from Policy Snapshots using the Management
Client. You can either restore all elements of a snapshot, or select the elements to be restored.
An administrator who is allowed to edit an element can lock the element and add a comment to
it to explain the reason for locking it. Locked elements are displayed with a lock symbol. A
locked element must be unlocked before it can be modified or deleted. Any administrator who is
allowed to edit the locked element can remove the lock. All custom elements for which History
data is provided in the Info panel can be locked. You cannot lock default system elements.
To lock an element
1. Right-click the element you want to lock in the Firewall, IPS, or Administration Configuration
view and select ToolsLock. The Lock Properties dialog opens.
2. Type a comment explaining the reason for locking the element in the Comment field.
3. Click OK. The element is now locked and a lock symbol is displayed on its icon.
To unlock an element
1. Right-click the element you want to unlock in the Firewall, IPS, or Administration
Configuration view and select ToolsUnlock.
2. Click Yes in the dialog that opens to confirm the deletion of the lock.
Deleting Elements
Prerequisites: None
An element can only be deleted by administrators who have sufficient privileges, and if the
element is not used in any configuration, for example, in a policy.
Caution – Deletion is permanent. There is no undo. To recover a deleted element, you must
either recreate it, or restore it from a previously created backup or XML export file that
contains the element.
To delete an element
1. Right-click the element and select Delete. A confirmation dialog opens.
• If the element you are trying to delete is currently used in any configuration, the
confirmation dialog also shows a list of all references to the element. Click Open
References to open a list of the elements in the Search view. To remove the references,
edit each element by right-clicking the element and selecting Edit.
• If you are deleting the account of an administrator who has modified elements in the
Management Center, you get a warning message. If you delete the administrator account,
all the history information on the changes the administrator has made is lost. If you do
not want to lose the history information, click Disable to disable the account.
2. Click Yes. The element is permanently deleted from the system.
Related Tasks
Searching for Element References (page 46)
Deleting Administrator Accounts (page 227)
Deleting Domains (page 250)
Reports - 145
Diagrams - 167
81
82
C H A P TE R 7
All StoneGate system components can be monitored through the StoneGate Management
Client.
83
Getting Started with System Monitoring
Prerequisites: None
There are several ways to monitor the system in the Management Client. You can:
• Monitor the status of individual components and view a summary of the system status. See
Monitoring the System Status (page 84).
• Create customizable charts of the system. See Creating Overviews (page 92).
• Monitor open connections and blacklisted connections. See Monitoring Open Connections
and Blacklists (page 97).
• View connection information on a map. See Monitoring Connections on a Map (page 103).
• Check which configurations and policies are currently applied in the system. See Monitoring
Configurations and Policies (page 105).
• Check which actions administrators take. See Monitoring Administrator Actions (page 105).
• Check the status of Tasks (for example, upgrade tasks). See Monitoring Task Execution
(page 106).
• Monitor the status of the StoneGate maintenance contract. Checking Maintenance Contract
Information (page 107).
• Monitor the status of internal certificates and internal certificate authorities. See Checking
When Internal Certificates or Internal CAs Expire (page 108).
Related Tasks
Getting Started with the Logs View (page 128)
Getting Started with Reports (page 146)
The Management Server automatically keeps track of the operation of the StoneGate
components that belong to the system. You can check the status of the system and the
individual components in the System Status view.
You can also monitor the status of third party devices in the Management Client. See Creating a
Probing Profile (page 121) for more information.
There are several ways to open the System Status view. For example:
• Select MonitoringSystem Status from the menu or click the corresponding toolbar icon.
• Right-click an element that is monitored (a Firewall/VPN or IPS engine element, a Geolocation
element, a Multi-Link element, Server element, or an SSL VPN Gateway element), and select
System Status from the menu that opens.
What’s Next?
For an overview of the System Status View, start in Default Arrangement of System
Status View.
System
Summary
To check the status of a component in the Status tree, expand the tree and place the mouse
pointer over any element shown to see its IP address and status as text in a tooltip.
Element status as a
connectivity diagram
Detailed
information for
selected element
Related Tasks
Reading Component Statuses (page 88)
Getting Started with the Logs View (page 128)
Creating Overviews (page 92)
Getting Started with Reports (page 146)
Monitoring Open Connections and Blacklists (page 97)
Using the Domain Overview (page 252)
Hardware
Icon Status Description
Exclamation mark
A pre-defined Alert level has been reached in hardware monitoring
on a red circle Alert (for example, the remaining file system capacity is less than 5%).
The system also generates an alert entry.
Element
Color Status Description
All of the nodes have an abnormal status, there is one or more nodes that
Red Alert have not sent expected status updates, or all nodes have been
commanded offline.
Unknown
Grey No policy has been installed on any of the nodes in the cluster.
status
Not
White An administrator has set all nodes not to be monitored.
monitored
Blue Node offline The node is offline and does not process traffic.
Timeout or unknown
Grey The Management Server does not know the status of the node.
status
White Not monitored An administrator has set the node not to be monitored.
Note – The status is probed and displayed only if Probing Settings are configured in the
NetLink elements and if the Outbound Multi-Link element is included in the engine’s
configuration (outbound balancing NAT rule is included in the policy).
White Not monitored An administrator has set the NetLink not to be monitored.
Some error has been detected, at least for some traffic, but the
Yellow Warning tunnels are usable in principle, and some other traffic may be
getting through.
The tunnels are valid, but there has not been traffic going through
Blue Idle
them in a while.
The VPN has no valid tunnels, because the VPN configuration is not
White Not configured
complete or does not allow any valid tunnels.
Timeout, The Management Server does not know the status of the connection. The
Grey
Unknown connection may or may not be working.
Customizable Overviews can contain information on the system’s status, shortcuts to views you
use often (such as logs filtered with specific criteria) and statistical charts on the system’s
operation (such as engine load), and the traffic flow.
You can create new Overviews on an empty template or start your customization based on one
of the default Overview templates in the system.
Overviews icon
View-specific toolbar
Note that you can set your favorite overview to open whenever you log in by setting it as your
startup view (see Changing the Startup View (page 44)).
What’s Next?
Creating a New Overview (page 93)
Related Tasks
Adding a New System Summary Section to an Overview (page 93)
Adding a New Statistics Section to an Overview (page 93)
What’s Next?
To add a summary of the system status to the Overview, see Adding a New System
Summary Section to an Overview (page 93).
To add statistics to the Overview, see Adding a New Statistics Section to an Overview
(page 93).
What’s Next?
If you want to add statistics to the overview, see Adding a New Statistics Section to an
Overview (page 93).
If you have finished working on your Overview, click the Save icon or select FileSave
as to save the modified Overview under a different name.
Creating Overviews 93
4. Define the basic Section properties as explained in the table below:
Option Explanation
Comment
A comment for your own reference.
(Optional)
Summary
Produces a table with all the values from items included in the report.
Table
Select the Diagram Type by clicking the appropriate diagram icon (Bar,
Pie, Curve, or Map).
The available diagram types depend on the type of statistics you
Diagram Type
selected.
The Summary Table type statistics are always displayed as a table, so
this option is disabled for that Diagram Type.
Top Limit
(Only if Statistics Type is Defines the (maximum) number of sources shown in the chart.
Progress or Top Rate)
5. Click Add to add an Item to the Overview. The Select Element dialog opens.
6. Select the items. See Selecting Statistical Items (page 95) for detailed information.
7. (Optional) Switch to the Senders tab and select which elements are shown in the Overview.
8. (Optional) Adjust the placement and size of the new section by dragging and dropping the
section or its edges. Note that resizing is based on preset grid positions and you must drag
the edge until it snaps to the next position on screen for the resize to work.
You can add further statistics sections in the same way.
What’s Next?
If you have finished working on your Overview, click the Save icon or select FileSave
as to save the modified Overview under a different name.
Option Explanation
Log Data Items that use log data.
Information
Items that use pre-counted statistical data. Data older than an
Source (Not Counter Statistics
hour is consolidated to an accuracy of one hour.
available in
Overviews) System Current
Items that collect information on the system’s operating state.
State
Items that count traffic volumes. These items do not have any
Traffic Volumes data to process unless your Access rules are set to include
Context accounting information in the log entries generated
Audit (Not
available in Items related to audit log data.
Overviews)
Creating Overviews 95
Table 7.7 Statistical Item Selection (Continued)
Option Explanation
Allows you to look for a specific item. Enter the name of the
Search item or a part of it to limit the selection of displayed items. You
can use wildcards (for example, *).
Item Available items that match the settings that you have selected.
What’s Next?
If you have finished working on your Overview, click the Save icon or select FileSave
as to save the modified Overview under a different name.
Firewalls keep track of allowed connections. You can monitor the open connections in the
Monitoring view. The firewalls and sensors also keep track of combinations of IP addresses,
ports, and protocols that are currently included on the blacklist of the firewall and sensor
engines. You can monitor the blacklisted connections in the Blacklist view.
You can monitor connections and blacklists in the following ways:
• You can view the currently open connections and the enforced blacklist entries. See Checking
Open Connections and Blacklists (page 97).
• You can save snapshots of currently open connections and blacklists. See Saving Blacklist
and Connections Snapshots (page 99).
• You can compare two connections or blacklist snapshots or the current status of connections
or blacklist entries with a connections or blacklist snapshot. See Comparing Blacklist and
Connections Snapshots (page 101).
Related Tasks
Saving Blacklist and Connections Snapshots (page 99)
Comparing Blacklist and Connections Snapshots (page 101)
Getting Started with Blacklisting (page 678)
Related Tasks
Exporting Blacklist and Connections Snapshots (page 100)
Opening Blacklist and Connections Snapshots (page 100)
Comparing Blacklist and Connections Snapshots (page 101)
To export snapshots
1. Select ConfigurationConfigurationMonitoring from the menu. The Monitoring view
opens.
2. Browse to the correct branch in the Monitoring tree.
3. Right-click a snapshot and select Export from the menu that opens.
4. Select the location for saving the snapshot and click Select.
Related Tasks
Comparing Blacklist and Connections Snapshots (page 101)
Related Tasks
Comparing Blacklist and Connections Snapshots (page 101)
Monitoring Open Connections and Blacklists (page 97)
To compare snapshots
1. Open the Blacklist view or the Connections view as explained in Monitoring Open
Connections and Blacklists (page 97).
2. Switch to the Snapshots tab in the Query panel.
3
4 Snapshot 1
5
Snapshot 2
Illustration 7.11 Example of Snapshot Comparison with Aggregated Entries - Aggregated by Service
(No icon) There are more than 100 entries that match the Aggregate by <column name>
selection in the snapshots. No further comparison can be done.
You can alternatively open a snapshot for comparison directly in the Monitoring view by right-
clicking the selected snapshot(s) and selecting Compare to Current or Compare from the menu
that opens. The more recent of the selected snapshots is used as the starting point for the
comparison.
Related Tasks
Monitoring Open Connections and Blacklists (page 97)
Browsing Log Data (page 133)
With Geolocations you can see on the world map where Hosts (for example, attackers) are
located and see how much traffic they create.
The location information for public IP addresses is displayed based on the internal Geolocation
database on the Management Server. The database is updated when the Management Server is
updated.
Geolocation maps are available in Reports, Statistics, Overviews, and in the System Status view
for monitoring the status of the Geolocation elements. In the System Status view Geolocations
are listed on the Status tree (System StatusGeolocations). A Geolocation is shown in the
Status tree only if the Geolocation has been set for any element.
With the Show in Google Maps option, it is possible to see the actual location from the map in
more detail in Google Maps. The Show in Google Maps option can be used in the Fields pane
of the Logs View, in Geolocation maps, and in the Whois result window.
You can also define Geolocations for your private networks. The internal IP addresses have to be
configured manually, because the public IP database does not know them. For instructions on
how to define a new Geolocation, see Defining a New Geolocation (page 104).
Related Tasks
Getting Started with System Monitoring (page 84)
The engines receive their configuration in a policy installation. You can monitor the policies and
configurations installed on the engines in the following ways:
• You can check which policy is currently being enforced and when it was last installed as
explained in Checking the Currently Installed Policy (page 504).
• You can quickly view the most recent version of the installed policy as explained in Previewing
the Currently Installed Policy (page 504).
• You can view the configurations that were transferred in each past policy installation and
compare them to each other or the current policy stored on the Management Server, as
explained in Checking and Comparing Policy Versions (page 504).
• You can quickly check if there are changes in the configurations on the Management Server
that have not been transferred yet as explained in Checking for Untransferred Configuration
Changes (page 506).
Related Tasks
Creating and Managing Policy Elements (page 497).
A record of administrator actions is maintained in the system. The records can only be viewed by
administrators who are allowed to view Audit logs. They can be browsed like any other logs in
the Logs view. Audit logs are not available for SOHO firewalls.
You can check the status of running tasks and executed tasks (for example, upgrade tasks and
system tasks) in the Tasks branch in the Administration view.
Running Created The Task process was created, but has not started running yet.
Task Started The Task has started running.
The Task stopped because it did not complete before the end of the time
Timeout
limit.
Related Tasks
Stopping Task Execution (page 822)
You can view maintenance contract and support level information for your licenses in the
Management Client by allowing your Management Server to contact Stonesoft servers. This
information is available for each license under the Licenses folder if the Management Server is
able to contact the Stonesoft servers. See:
• Enabling Automatic Maintenance Contract Checking (page 107)
• Viewing Maintenance Contract Information (page 107)
• Viewing Maintenance Contract Information for SOHO Firewalls (page 108)
• Fetching Maintenance Contract Information (page 108)
Related Tasks
Getting Started with Automatic Updates and Engine Upgrades (page 210)
Viewing Maintenance Contract Information for SOHO Firewalls (page 108)
You can check the status of internal certificates used in system communications and the status
of StoneGate’s Internal Certificate Authority that automatically signs the internal certificates.
The Internal Certificate Authority is valid for ten years. It is renewed automatically. StoneGate
does not accept certificates signed by an expired Internal Certificate Authority. All components
must receive new certificates signed by the new Internal Certificate Authority before the old
Internal Certificate Authority expires. By default, internal certificates are renewed automatically
for engines and internal gateways. For all other components, you must generate the certificates
manually. See Replacing Expired/Missing Certificates (page 870).
Related Tasks
Troubleshooting Certificates (page 867)
Checking When Gateway Certificates Expire (page 765)
Checking When an Internal VPN CA Expires (page 766)
The StoneGate Management Center can be configured to log and monitor other
manufacturers’ devices in much the same way as StoneGate system components are
monitored.
111
Getting Started with Third-Party Device Monitoring
Prerequisites: None
Configuration Overview
1. (Optional) Define syslog reception settings for each particular type of third-party device.
See Receiving Logs From External Devices (page 113).
2. (Optional) Define the status and statistics monitoring settings for each type of third-party
device. See Monitoring the Status of Third-Party Devices (page 119).
3. Activate monitoring by adding the monitoring settings in the properties of Host and Router
elements. See Activating Monitoring of a Third-Party Device (page 123).
4. Depending on features used, configure the third-party device for monitoring. See
Configuring a Third-Party Device for Monitoring (page 124).
Related Tasks
Changing the Ports for Third-Party Device Monitoring (page 124)
Activating/Deactivating Third-Party Status Monitoring Alerts (page 125)
You can set up most external devices to send their logs to other devices in the syslog format.
The Log Server can convert these incoming syslog entries to StoneGate log entries. To make the
You must define how the values are picked up from the syslog data and how those values are
inserted in a StoneGate log entry. This is done in a Logging Profile element. A Logging Profile
consists of one or more logging patterns which each parse and encode fields of one third-party
device log entry and map the values to log fields in one StoneGate log entry.
You can define the logging patterns in two alternative ways:
• As ordered fields, so that each received syslog entry is read and matched in sequence. If
incoming logs vary in structure, you must define a different patterns for each type of
structure. You can define several of these patterns in each Logging Profile.
• As key-value pairs, so that each received syslog entry is parsed by picking values based on
keywords you enter. You can define the keywords in any order, so with this method, a single
definition is enough even when logs vary in structure.
The key-value pairs are easier to configure, so it is the best option to use if the third-party device
formats the original syslog data (in relevant parts) as key-value pairs. The ordered fields method
can be used on all syslog data.
A basic match simply transfers a value the syslog entry to one StoneGate log field. This is
appropriate for most data, but in some cases more advanced operations may be necessary. You
can define Field Resolvers for the complex operations.
What’s Next?
Creating a Logging Profile Element (page 114).
Related Tasks
Defining Field Resolvers (page 117).
Changing the Ports for Third-Party Device Monitoring (page 124)
Some Logging Profile samples are available at http://stoneblog.stonesoft.com/stoneblog-
community/. You can import these as elements (FileImportImport Elements).
Section Description
Facility and priority information.
<PRI> Log Server automatically extracts the Facility value from the <PRI> section and encodes it in
the Syslog Facility field in StoneGate logs. You do not define this section.
A timestamp and the hostname or the IP address of the device. You can map this section
HEADER separately from the main part of the actual syslog message.
This section is optional in syslog messages, so all devices do not send this data.
MSG The syslog message. This is the data you map in the main part of the Logging Profile dialog.
What’s Next?
Defining Ordered Field Logging Patterns (page 115).
Defining Key-Value Pair Logging Patterns (page 116).
• Type or copy-paste any number of static characters that appear before and after the
values you want to pick up from the incoming syslog entries. Spaces are shown as black
What’s Next?
To test the Logging Profile, proceed to Validating a Logging Profile (page 118).
To activate the Logging Profile, see Activating Monitoring of a Third-Party Device
(page 123).
What’s Next?
To test the Logging Profile, proceed to Validating a Logging Profile (page 118).
To activate the Logging Profile, see Activating Monitoring of a Third-Party Device
(page 123).
What’s Next?
Defining a Field Resolver for Multiple Values (page 118).
Defining a Field Resolver for Date and Time (page 118).
3 4
3. Enter the name of the value on the third-party device in the Value cell.
4. Depending on the log field, enter or select the value you want to use for each of the
StoneGate log field(s) in your selection.
5. Define more keywords (more rows) as necessary.
6. When you are done, click OK. You can now insert the Field Resolver in your custom Logging
Profile.
Imported
data
Conversion
results
3. Click Validate. The Validation Results panel shows you the results. The first column in the
results shows which logging pattern matched each imported syslog entry.
4. When you have finished defining your Logging Profile Properties, click OK.
What’s Next?
To create a new Probing Profile, see Creating a Probing Profile (page 121).
To activate the Logging Profile, see Activating Monitoring of a Third-Party Device
(page 123).
The Log Server can actively probe the status of third-party components using one of several
alternative methods:
• SNMPv1.
• SNMPv2c.
• SNMPv3.
• Pings.
• TCP connection probes.
When one of the SNMP status probing methods is used, you can also set up statistics reception
for the device. Statistics reception relies on SNMPv1 traps sent by the third-party device.
StoneGate supports statistical monitoring of the following details:
• Amount of free and used memory.
• CPU load.
• Interface statistics.
Related Tasks
Changing the Ports for Third-Party Device Monitoring (page 124).
Importing MIBs
You can import third-party MIBs (management information bases) to support third-party SNMP
monitoring. The OIDs (object identifiers) allows resolving the SNMP traps when they appear in
log entries. If the OIDs are not resolved, they appear in the logs using a more difficult to read
dotted notation. Only SNMPv1 Trap Reception is supported.
To import a MIB
1. Select ConfigurationConfigurationMonitoring from the menu. The Monitoring
Configuration view opens.
2. Expand the Third Party Devices branch.
3. Right-click MIBs and select Import MIB. The Import MIB Files window opens.
4. Browse for the MIB file to import and click Import. A new view opens showing the progress
of the import.
5. (Optional) Click Close when the import is finished.
6. Browse to MIBsAll MIBs or MIBsBy Vendor in the Monitoring view to see the MIB you
imported.
7. To view the contents of the MIB, right-click it and select Properties. The MIB Browser
opens.
• The General tab shows the content of a MIB file “as is”.
• Switch to the OID Tree tab to view the objects that the MIB file defines: the object
identifiers, their OIDs in dot notation, and possibly a description of the object.
What’s Next?
Creating a Probing Profile (page 121)
Setting Explanation
Name The name of the probing profile.
Setting Explanation
Probing Method Defines the probing method to be used.
Defines the port to be probed (only visible when SNMP (default port 161) or TCP
Port
(default port 80) has been defined as the probing method).
SNMP Community Defines the SNMP community (only with SNMP and SNMPv2c probing methods.
5. Additionally, if SNMPv3 is selected as the probing method, the following additional SNMPv3-
specific security settings must be made:
Setting Explanation
Security Name Defines the default security name used for SNMPv3 requests.
Context Name Defines the default context name used for SNMPv3 requests.
Authentication Defines whether the authentication protocol used is MD5 or SHA. Enter the
Protocol password to be used to the Password field.
Defines the privacy protocol to be used (DES, AES, AES192, AES256, 3DES).
Privacy Protocol
Enter the password to be used in the Password field.
6. (Optional, together with SNMP/SNMPv2c/SNMPv3 probing only) Switch to the Statistics tab
and define the settings for statistics reception using SNMPv1 traps:
Setting Explanation
Activates statistics for the amount of used memory. Enter the OID of the third-
Memory Used
party device or click Select to pick the OID from a list of imported MIBs.
Activates statistics for the processor load. Enter the OID of the third-party device
CPU Usage
or click Select to pick the OID from a list of imported MIBs.
Interface
Activates interface statistics reception.
Statistics
Enter the IP address of the third-party device. Click Test to launch an SNMP query
and display the result in the panel below. Note that the actual statistics reception
IP Address
requires that the third-party device actively sends SNMP traps; the Log Server
does not automatically query the device for statistics.
What’s Next?
Activating Monitoring of a Third-Party Device (page 123)
3. Select the Log Server to which the logs from third-party device are sent.
4. (Optional) To receive status information, select the Status Monitoring option and select the
Probing Profile. See Creating a Probing Profile (page 121).
5. (Optional) To receive logging information, select the Logs Reception option and select the
Logging Profile. See Receiving Logs From External Devices (page 113).
6. (Optional) Select SNMP Trap Reception if you want to receive SNMP traps from third-party
devices.
What’s Next?
Configuring a Third-Party Device for Monitoring (page 124).
Related Tasks
Monitoring the System (page 83)
Browsing Logged Data (page 127)
For any type of monitoring, make sure that the connections between the third-party component
and the Log Server are allowed through any possible traffic filtering in your network.
Ping and TCP status monitoring do not usually require additional configuration on the target
device.
SNMP-based polling usually requires that the target device is specifically configured to respond
to the Log Server’s SNMP queries.
Statistics sending (as SNMPv1 traps) must always be specifically configured on the third-party
device. For instructions on these tasks, consult the documentation of the third-party device.
If necessary, you can change the ports that the Log Server uses to listen for syslog and SNMP
transmissions as explained in Changing the Ports for Third-Party Device Monitoring (page 124).
You can optionally activate the status surveillance feature, which generates an alert if a
monitored component’s status remains unknown for 15 minutes.
You can view log, alert, and audit entries through the same unified tool. You can view data
from Management Center servers, all types of StoneGate engines, and from third-party
components that are configured to send data to the StoneGate Management Center.
127
Getting Started with the Logs View
Prerequisites: None
The Logs view displays all log, alert, and audit entries for the entire system. You can view any
types of entries from any number of components together or individually.
Overview
For an overview, start by Opening the Logs View as explained below and proceed in order
through introductions to the different arrangements. These include:
1. Default (Records) Arrangement, Panels, and Tools (page 128)
2. Details Arrangement (page 131)
3. Statistics Arrangement (page 132)
Query
panel
Toolbars
Log Fields
entry panel
table
Timeline Options
for
browsing
Note – If NAT is applied between your Management Client and a Log Server, you must
select the correct Location for your Management Client to be able to see the logs. See
Configuring System Communications (page 59) for more information.
References panel
Summary
panel
Event
Visualization Tasks
panel panel
Hex panel
Switch to Records
arrangement
The Details view has the following additional panels in addition to the panels available in both
the Records and Details views.
• The References panel (shown by default): Displays a list of StoneGate elements that
correspond to the details in the record and possibly additional information on related records
for some special records that are part of a larger event.
• Tasks panel: Shortcuts to configuration tasks that you can launch based on the displayed
entry (as in the Records arrangement in the right-click menu for entries).
Query
Chart area panel
Right-click
chart sections
for a menu.
Timeline
The Query panel contains more tabs in the Statistics arrangement. The additional tabs allow you
to control the statistical display. The data can also be filtered in the same way as in the other
Logs view arrangements.
You can also add statistical items to the Statistics view. To do this, click the Add button in the
Query tab, and select the new items in the Select Element dialog. Click Apply to update the view.
Shortcuts to show/
hide panels.
The chart area in the Statistics arrangement can contain a pie chart, a bar chart, a line chart, or
a map chart (based on an internal geolocation database). The available options depend on the
chart type that is selected:
What’s Next?
This concludes the overview tour. For more instructions on how to use the Logs
view, see Browsing Log Data. To see how you can customize the Logs view, see
Changing How Data Entries Are Displayed.
This section explains the basics of finding and browsing through data in the Logs view.
The Watchlist item allows you to create a customized list of fields for your own use. The
Watchlist is specific to each Management Client installation.
Note – The time selection refers to the entries’ creation timestamp (not the reception time
at the Log Server, which is also included in many entries). Internally, the system always
uses universal time (UTC). The times are displayed according to the time zone selected in
your Management Client’s status bar.
You can drag and drop any field from the log entries to the Filters tab to create a Filter, select
existing Filter elements, or add a new filtering criterion using the toolbar icon and typing in the
detail. You can then further modify and utilize the Filters you have created:
• Double-click a detail (such as IP address) to open the Filter Properties dialog, in which you
can change the detail manually by typing in a new value.
• Right-click a field in the log entry table or in the Fields panel and select Add Filter: <field
name> to add the item and its value as a new filter row.
• Right-click an item in the log entry table or in the Fields panel and select New Filter: <item
name> to define a value for the item and add it as a new filter row.
• You can add a new empty row by right-clicking a filter row or in the empty space and selecting
Add Row in addition to using the Add Row icon in the Query Panel’s toolbar.
• To use a Search Filter, i.e. to make a free word search, right-click the Query panel, select
NewNew Search Filter, and type your search string to the Filter Properties dialog.
• To remove a detail, right-click and select Remove <detail description>.
• To remove a whole row, right-click something other than a detail on the row you want to
remove and select Remove.
• Temporarily disable a filter row by right-clicking it and selecting Disable from the menu.
• You can save the current filtering criteria as a permanent Filter element by clicking the Save
button at the top of the Filter tab in the Query panel (see Illustration 9.11 above).
Remember to click Apply after you make any changes to re-filter the logs.
Related Tasks
For information on creating Filter elements, see Filtering Data (page 159).
To specify senders
1. Select the Senders tab in the Query panel.
2. Click the Select button (arrow) at the top of the Senders tab. The Select Element dialog
opens.
3. Select the element(s) you want to use as the sender(s) and click Select.
4. Click Apply. The log data is refreshed, and only logs from the selected sender(s) are
displayed.
To specify storage
1. Select the Storage tab in the Query panel.
2. In the server list, select the Log Servers and storage folders that you want to include.
3. Click Apply. The log data is refreshed and filtered according to the selected servers and
folders.
Related Tasks
Changing Log Server Configuration Parameters (page 279)
Archiving Log Data (page 802)
When you are browsing within a set time range, you Drag the arrowhead to browse. The
cannot accidentally browse out of the time range set arrow also indicates the selected
in the Query panel. Square brackets are shown at start position (from the beginning
each end to mark this. or the end of the time range).
Note – Under some operating conditions, a small portion of log entries may arrive in mixed
order. Because the Current events view attempts to maintain a logical flow of events, out-
of-sequence entries are not shown. You may see a notification message pop up if this
happens.
Note – The Current events view is always sorted according to entry creation time. Sorting
can only use stored data, so any temporary data visible in the Current events view is
permanently lost if you change sorting.
3. Use the Add and Remove buttons to include and exclude selected fields. The Columns to
Display list on the right shows your selections. See Log Entry Fields (page 976) for short
descriptions of all log fields.
4. Use the Up and Down buttons to organize selected fields on the Columns to Display list.
Fields at the top are shown at the left of the log record table.
5. Click OK.
Note – IP address and port resolving works by comparing the information in the logs to
internal and external information sources. If the information available is incorrect or
ambiguous, the result may not reflect the actual hosts and services involved in the
communications. For example, if a detail matches two StoneGate elements, the first
match is used for display even if the other element was used in the corresponding rule.
Related Tasks
Getting Started with Log Data Management (page 800)
You can use log entry details to generate new rules. To convert a log entry to a rule, the log entry
must be generated based on a rule (the entry contains a rule tag). Creating a rule this way
allows you to make quick exceptions to the current policy.
You can generate the following types of rules:
• A rule that allows a connection from an entry that logs stopped traffic.
• A rule that stops a connection from an entry that logs allowed traffic.
• A rule that changes the log level or stops the logging of matching connections.
Note – You cannot edit the rule in this dialog. Select the Add Rules and Edit the Policy
option to edit the rule.
What’s Next?
If you selected to refresh the policy, the policy installation dialog opens, see
Installing Policies (page 501) for more instructions.
If you selected to edit the policy, the policy opens for editing, see Using the
Policy Editing View (page 511) for more instructions.
REPORTS
You can process data from your StoneGate logs and engine statistics into easily digestible
diagrams, charts, and tables. The reports you generate are always based on a Report Design,
which can be one of the predefined designs, a modified version of it, or a custom design you
put together yourself.
145
Getting Started with Reports
Prerequisites: None
Reports allow you to gather together and visualize the data that interests you the most in an
easy-to-read format to provide an overview of what is happening in the network. Reports are
generated in the Monitoring view.
What You Can Do with Reports
You can use logs and statistical data in the active storage to generate graphs, charts, tables,
and geolocation maps. You can view the reports in the Management Client and in the Web
Portal.
To export your reports, you can:
• print the generated reports into PDF documents for convenient sharing and printing.
• save reports as tab-delimited text for further processing in a spreadsheet program or some
other tool.
You can also generate special System reports from data about system configuration and events
to help you provide auditing information in compliance with regulatory standards.
You can generate reports based on predefined Report Designs or Report Designs that you have
created yourself. You can use your own Style Template for the PDF creation to give the reports a
unified corporate look.
In addition to generating reports in the Reports Designer view, you can also create simple
reports in the Logs view (see Browsing Logged Data (page 127)).
Limitations
Only the data in the active storage of the Log Servers can be included in the reports. Archived
data cannot be used in reports.
If you want to generate a report based on an existing Report Design, proceed to Generating
and Viewing Reports (page 151).
Report Design
What’s Next?
If you want to create a new Report Design, proceed to Creating and Editing
Report Designs (page 148).
Report Designs determine how you want to process the data and how the results are displayed.
They can also determine which template is used for PDF exports and which charts appear on
them. You create a new Report Design in two steps: first you create a Report Design, and then
you add items to it.
Tip – Ready-made Report Designs serve as a useful guide for constructing your own Report Designs.
To see how the ready-made Report Designs are constructed, explore them in the Report
Designer.
Selected
Items
Report
Summary
Report
Section
Report/
Section/Item
Properties
What’s Next?
Creating a New Report Design
Note – The data is filtered from top down: first, the filter defined in the properties of the
Report Design is applied, then the filter defined for the report sections, and finally, the
filter defined for individual report items. When you start a report task, you have the option
to select a task-specific filter, which is applied before any of the other filters.
Option Explanation
Defines the default time frame for this report. This affects the dates offered by
default when creating a report using this design. The longer period you choose,
the more data is included in the report. The level of detail in the charts may have
Period
to be reduced in order to keep them legible by adjusting the time resolution. This
is done automatically, but you can also change it by hand. All report items are not
compatible with the shortest period length.
With these fields, you can include data from a previous period of the same length
Compare With
in your reports to make comparison easier.
The level of detail in the progress charts and tables. A small time resolution
increases the level of detail, but having too much detail may make the produced
Time Resolution
charts difficult to read. The time resolution and the available choices are
automatically adjusted when you change the Period.
Defines the number of days after which the reports generated by this Report
Design expire (are automatically deleted). If you select Never Expire, you must
Expiration
manually delete all the reports generated using this Report Design when you no
longer need them.
Allows you to filter the data included in log-based report items by the type of log
Log Type
(alert, audit log, firewall log, IPS log, SSL VPN log, third-party device log).
Style Template Select the Style Template to be used with the PDF printing of the new Report.
What’s Next?
Adding Sections to a Report Design (page 150)
Note – Avoid placing IP address-based top rate items under sections of the Progress
section type. Generating reports with such designs may produce “out of memory” and/or
“too many counters” error messages. If this happens, change the section type to Drill-down
Top Rate, or otherwise reduce the amount of data in the report.
What’s Next?
Adding Items to a Report Section
What’s Next?
To save the Report Design, select Save or Save as from the menu.
Reports are generated from the Report Designs that are displayed in the Reports tree of the
Monitoring Configuration view. There are several predefined Report Designs available.
What’s Next?
Generating a Report (page 152)
Related Tasks
Creating and Editing Report Designs (page 148)
3. Right-click a design and select Start. The Report Operation Properties dialog opens.
4. Select the Period Beginning and Period End for the report. Enter the date as indicated,
and enter the time using the 24-hour clock in the time of the workstation you are using to
run the Management Client.
• The 1 Day Period option (default) defines the previous day as the reporting period,
beginning at 00:00:00 that day and ending exactly 24 hours later.
5. (Optional) Enter the delay in minutes after the end date and time in the Start Earliest field.
• Report generation begins after the specified delay has passed. The delay is to ensure
that the system has all relevant data available.
• If the Period End date and time are in the future, the report is generated on the specified
date at the specified time once the Start Earliest delay had passed.
6. (Optional) If you want to restrict the data included in the report, select a filter.
7. (Shown only when logged into the Shared Domain) If you want to make a report containing
the information concerning all Domains, select Report over All Domains.
What’s Next?
If you want to select how often you want to repeat the report generation,
proceed to Defining the Report Task (page 153).
Related Tasks
Selecting Data Sources (page 154)
2. Select one or more outputs to be produced directly, or leave only Store Report selected to
view the report before deciding if you want to process it further:
• Text Export: The report is stored as a text file on the Management Server, in the
StoneGate home directory in folder <installation directory>/data/reports/
files/[Report Design name]/. The report is named according to the time range
chosen.
• PDF Export/HTML Export: The report is stored as a PDF file/HTML file on the
Management Server (same directory as above).
• Post Process: The report is generated according to options chosen and then a script is
launched, by default SgPostProcessReport.bat located on the Management Server in
the StoneGate home directory in folder <installation directory>/data/reports/
bin. See the Reference Guide for more information.
Note – The mail server (SMTP) for sending reports must be defined in the Management
Server’s properties. See Modifying a Management Server Element (page 302). This is a
separate setting from the one used for e-mailing alerts.
4. (For PDF exports only) Define the Page Setup settings by selecting a Style Template, Paper
Size and Orientation) when exporting the report to PDF format. For information on how to
create new Style Templates, see Adding Style Templates For PDF Output (page 51).
What’s Next?
If you want to select the Management and Log Servers from which data is used
to generate the report, proceed to Selecting Data Sources (page 154).
Otherwise, click OK to start generating the report. While the report is being
generated, the report task appears under the Stored Reports selection Today
in the right panel.
2. Select the Management Server(s) and Log Server(s) from which you want to include data in
the report.
• You can exclude a server from reporting by default, by selecting the Exclude from Log
Browsing, Statistics and Reporting option in the General tab of the server properties
dialog.
What’s Next?
Click OK to start generating the report. While the report is being generated,
the report task appears under the Stored Reports selection Today in the right
panel.
Viewing Reports
After you have generated a report, it is available for viewing in the Stored Reports tree. A report
may be automatically deleted after a certain number of days, according to the expiry setting
defined in the originating Report Design. If you want to keep a generated report permanently, we
recommend exporting the report, as instructed in Exporting Reports (page 156).
To view a report
1. Select ConfigurationConfigurationMonitoring from the menu. The Monitoring
Configuration view opens.
2. Select ReportsStored Reports. The created reports are placed under the branches by
their creation time (Today, Yesterday, Week, Month), and in one branch that lists all created
reports.
Tools
icon
3. (Optional) To display the reports created using a particular design, click the Tools icon and
select By Design.
4. Double-click the report you want to view. The contents of the report are shown.
5. (Optional) If you want to see the data of the report section in table format, right-click the
section and select Show Table. The table is added to the section.
After you have generated a report, you may want to share it or process the data further. There
are two ways to export a report: as a plain text (.txt) file, or as a PDF file. System Templates can
only be used when exporting to a PDF file.
What’s Next?
To export a previously generated report for further processing, proceed to
Exporting a Report as Tab-delimited Text File (page 156).
To export a previously generated report to a PDF file for viewing or printing,
proceed to Exporting a Report as a PDF File (page 156).
To send a report directly as e-mail, proceed to E-Mailing Reports (page 157).
What’s Next?
If you want to use the default template, proceed to Printing a Generated Report
to PDF (page 156).
E-Mailing Reports
Reports can be e-mailed directly as they are generated. You must define the mail server (SMTP)
in the Management Server’s properties before you can e-mail reports. See Modifying a
Management Server Element (page 302).
After defining the SMTP settings, simply enter the e-mail address in the report task to send the
selected output (such as PDF) out as an e-mail. To add several addresses, separate the
addresses with a comma.
The System Report contains information about the StoneGate system itself. It includes details
of Administrator and Web Client user activity and access settings, system configuration,
changes to the Firewall and IPS engines, and the configuration of the Management Server. The
System Report is intended to help you provide the required data for auditing in compliance with
regulations, such as the Payment Card Industry (PCI) Data Security Standard. The System
Report is generated, exported, and edited in the same way as other types of reports: the only
difference is the content of the report.
What’s Next?
To generate System reports, proceed to Generating and Viewing Reports
(page 151).
FILTERING DATA
Filters allow you to select data entries based on values they contain. Most frequently, you will
need filters when viewing logs, but filters can be also used for other tasks, such as exporting
logs and selecting data for reports.
159
Getting Started with Filtering Data
Prerequisites: None
What Filters Do
Filters can be used to select data entries for operations such as filtering log entries to view in
the Logs view or include in a particular statistical report. Filters allow you to efficiently manage
the large amounts of data that the system generates. Filters select entries by comparing values
defined in the Filter to each data entry included in the filtering operation. The operation can use
the filter to either include or exclude matching data.
How Filters Are Created
You can create filters in three basic ways:
• Based on criteria you define: you can create a new filter and define any combination of
filtering criteria in the Filter properties, constructing the filter completely yourself.
• Based on other Filters: you can duplicate a Filter or copy-paste parts of Filter element
contents to other Filter elements to create a variation of previously defined filtering criteria.
• Based on existing log entries: you can create temporary filters in the Logs view and save
them as permanent Filter elements. See Filtering Logs in the Logs View (page 134).
Parts of a Filter
Filters are constructed from the following parts (see Basics of Constructing Data Filters
(page 161) for more detailed information):
• The fields that you want to match in the data (for example, there are separate fields for
source IP address and port in logs). You can filter data according to any field.
• The values in those fields that you want to match (for example, the exact port number or IP
address you are interested in).
• Operations define the way in which the fields and values are matched to data entries
(especially if there are several fields included as the filtering criteria).
Related Tasks
Organizing Filter Elements (page 164)
Applying Filters (page 165)
Filters are stored as elements in the system and you can create and edit them in a similar way
as other elements. However, you can also create new Filters quickly in the Logs view by defining
log filtering criteria in the Filter tab of the Query Properties panel and saving the defined Query
as a Filter element. There are also some predefined Filters in the system.
What’s Next?
To create a filter from logs, see Filtering Logs in the Logs View (page 134).
To create a new Filter without using existing data as a basis, proceed to
Creating a Filter Element (page 162).
To define a Filter
1. Select ConfigurationConfigurationMonitoring from the menu. The Monitoring
Configuration view opens.
2. Expand the Other Elements branch.
3. Right-click Filters in the element tree and select NewFilter from the menu. The Filter
Properties window opens.
Shortcuts.
Fields lists all
possible fields
in data entries Filter
in several editing
alternative panel.
ways.
4. Enter a Name for the new Filter and an optional Comment for your reference.
5. (Optional) Select the setting for Undefined Value Policy. This setting defines how data
entries are matched when a field is included in the Filter, but is not present in the entry (for
example, if a Filter defines a range of destination ports, but the operation encounters a log
entry of traffic over a protocol that does not use ports, such as ICMP).
• False by comparison (default): If a field used in the Filter is missing from log data, the
comparison is false. The log data may still match the Filter, depending on the Filter’s
structure.
• False by filter: If the outermost operation in the Filter is undefined because of a field
missing from log data, the log data does not match the Filter.
• True by filter: If the outermost operation in the Filter is undefined because of a field
missing from log data, the log data matches the Filter.
• Undefined: If the outermost operation is undefined because of a field missing from log
data, the undefined result is passed to the software component that uses the Filter.
Whether the log data matches or not depends on the component that uses the Filter.
What’s Next?
Define the filtering criteria as explained in Adding and Modifying Filtering
Criteria in Filters.
Filters can be organized using Filter Tags. The Filter Tags you create are added as sub-branches
to the By Filter Tag branch of the filter listing. Adding Filter Tags to Filter elements you create
makes it easier to find Filters when you want to apply them to some operation. You can select
several Filter Tags for each Filter that you create as well as for any of the default filters that are
already in the system.
What’s Next?
Tag Filter elements with this Filter Tag. See Changing the Tag of a Filter
(page 165).
Applying Filters
Prerequisites: None
DIAGRAMS
167
Getting Started with Diagrams
Prerequisites: None
Diagrams allow you to generate a model of the elements you have already configured, or design
a model of your network and configure the StoneGate elements at the same time. You can also
use diagrams to view and monitor the status of the elements in your system.
What You Can Do with Diagrams
Diagrams allow you to:
• Maintain and understand the network structure.
• Monitor the status of your network graphically.
• Illustrate your network topology.
• Configure StoneGate and other network devices while designing your network.
• Store and print network topologies.
What Should I Know before I Begin
• There are three types of diagrams in StoneGate: Connectivity Diagrams that show the status
of the connections between elements that belong to the same configuration, VPN Diagrams
that show the status of VPN connections, and IP Diagrams that are diagrams of an IP
network.
• In addition to creating diagrams manually, you can create diagrams automatically from
elements that are monitored in the System Status view. The System Status view also
automatically displays a Connectivity Diagram or VPN Diagram to show the connectivity status
of an engine you select.
Configuration Overview
1. Create a new diagram (see Creating Diagrams (page 169)).
2. Define the diagram background color and image (see Defining the Diagram Background
(page 169)).
3. Insert elements to the diagrams either manually or automatically (see Adding Elements to
Diagrams (page 170)).
4. Customize the diagram layout (see Arranging Elements in Diagrams (page 172)).
5. Make manual or automatic connections between the elements in the diagram (see
Connecting Elements in Diagrams (page 173)).
6. Create relationships between diagrams (see Creating Links Between Diagrams
(page 174)).
Related Tasks
Viewing Diagrams (page 175).
Printing Diagrams (page 176).
Exporting Diagrams as Images (page 176).
What’s Next?
To define Background properties, proceed to Defining the Diagram Background.
Option Explanation
Color
The color of the background.
(Optional)
Watermark Select this option if you want the elements in the diagram to better stand out
(Optional) from the background image.
Width
(Only with Image The width of the background image as pixels/inch.
background)
Height
(Only with Image The height the background image as pixels/inch.
background)
4. Click OK.
What’s Next?
To continue defining a new diagram, proceed to Adding Elements to Diagrams
(page 170).
This section instructs you on how to add new elements to diagrams both manually and
automatically.
What’s Next?
If you want to insert new elements to Diagrams manually, proceed to Inserting New
Elements Manually (page 171).
If you want to create Diagrams from Configured Elements manually or automatically,
proceed to Creating Diagrams from Configured Elements (page 171).
Related Tasks
Adding Text Comments to a Diagram (page 172).
What’s Next?
To change the diagram layout, see Arranging Elements in Diagrams (page 172).
What’s Next?
To change the diagram layout, see Arranging Elements in Diagrams (page 172).
What’s Next?
To change the diagram layout, see Arranging Elements in Diagrams (page 172).
To move the elements, click the Hand Tool button in the toolbar and drag and drop the
elements to their places. In addition to moving individual elements by dragging and dropping,
you can also use the Hand Tool to move all the elements in a diagram.
Alternatively, you can change the layout of your diagram by selecting one of the automatic layout
options.
After you add elements to a diagram, you can connect the elements automatically or manually.
The automatic connections are based on the IP addresses of the elements or on the Routing
configuration.
To help you maintain the clarity of your diagrams, you can also use turning points. Turning points
are useful, for example, in complex diagrams where connections would otherwise cross each
other.
A turning point is created by clicking the Add Turning Point button in the toolbar, clicking in the
middle of the connection between the two elements and dragging the turning point to the
direction of your choice to create an angle.
Related Tasks
Creating Links Between Diagrams (page 174).
Related Tasks
Creating Links Between Diagrams (page 174)
You can specify a parent diagram to organize the diagrams into a hierarchy. You can also create
links between diagrams that share the same parent diagram.
What’s Next?
To select a parent diagram, see Specifying a Parent Diagram.
To create links between diagrams, see Creating Links from One Diagram to Another
(page 174).
What’s Next?
Creating Links from One Diagram to Another (page 174)
Note – You cannot create links between two diagrams that have different parent diagrams.
To collapse elements
1. Click the Select Components button (arrow button) and select two or more elements, or at
least one of the nodes belonging to an expanded cluster.
2. Click the Collapse Selected Component(s) button in the toolbar. If several elements were
selected, they are now shown as a single cloud with the tooltip Collapsed Area. Clustered
elements are collapsed into an appropriate cluster icon.
To expand elements
1. Select a clustered element or a group of collapsed elements by clicking its icon.
2. Click the Expand Selected Component(s) button in the toolbar. The individual nodes or
elements are displayed. The nodes are shown with a yellow sign containing a minus sign to
illustrate their association to an expanded cluster.
Printing Diagrams
Prerequisites: Creating Diagrams
To print a diagram
1. Open the diagram you want to print (see Viewing Diagrams (page 175)).
2. (Optional) Select FilePrint Preview. A preview opens.
3. (Optional) Select the print area by dragging the white box to the part of the diagram you
want to print.
4. (Optional) Adjust the print area size by dragging the border of the white box.
5. Click the Print button in the toolbar.
You can export the diagrams that you have created. You can save diagrams in various graphics
file formats or as a PDF document.
To export a diagram
1. Open the diagram you want to export (see Viewing Diagrams (page 175)).
2. Select FileExport. The Export dialog opens.
Note – To export the diagram as an image, select the Export item at the main level of the
File menu. Exporting through the Export sub-menu creates an XML export file.
3. Select the folder into which you want to save the diagram.
4. Enter a File name.
5. Select the format from the Files of Type list.
6. Click Export. The diagram is saved with the file name and format you specified.
INCIDENT CASES
When suspicious activity is detected, it is important to collect all the information about the
incident and act quickly. The Incident Cases element is a tool for investigating incidents of
suspicious activity.
177
Getting Started with Incident Cases
Prerequisites: None
Configuration Overview
Illustration 13.1 Elements in the Configuration of Incident Cases
1. Create an incident case. See Creating a New Incident Case (page 179).
2. Attach relevant Logs, Policy Snapshots, Memos and files to the incident case. See
Attaching Data to Incident Cases (page 180).
3. Add the network elements involved in the incident to the incident case. See Adding Players
to Incident Cases (page 183).
4. Add journal entries to the incident case. See Adding Journal Entries to Incident Cases
(page 183).
What’s Next?
To begin the configuration, proceed to Creating a New Incident Case (page 179).
What’s Next?
Attach Logs, Policy Snapshots, Memos, and files to the Incident Case as instructed in
Attaching Data to Incident Cases (page 180).
Add Players to the Incident Case as instructed in Adding Players to Incident Cases
(page 183).
Write Journal entries as instructed in Adding Journal Entries to Incident Cases
(page 183).
You can use the Data Collection tab to attach information that is needed to provide context for
investigating the incident.
The types of data that can be attached to an incident case are Logs, Policy Snapshots, Memos,
and Files.
What’s Next?
To attach Logs, see Attaching Logs and Audit Entries to Incident Cases (page 180).
To attach Policy Snapshots, see Attaching Policy Snapshots to Incident Cases
(page 181).
To write and attach Memos, see Attaching Memos to Incident Cases (page 182).
To attach other types of files, see Attaching Files to Incident Cases (page 182).
What’s Next?
To attach Policy Snapshots, see Attaching Policy Snapshots to Incident Cases
(page 181).
To write and attach Memos, see Attaching Memos to Incident Cases
(page 182).
To attach other types of files, see Attaching Files to Incident Cases
(page 182).
If you are finished working with data attachments, add players as instructed in
Adding Players to Incident Cases (page 183) or add journal entries as
instructed in Adding Journal Entries to Incident Cases (page 183).
What’s Next?
To write and attach Memos, see Attaching Memos to Incident Cases
(page 182).
To attach other types of files, see Attaching Files to Incident Cases
(page 182).
Otherwise, if you are finished working with data attachments, add players as
instructed in Adding Players to Incident Cases (page 183) or add journal
entries as instructed in Adding Journal Entries to Incident Cases (page 183).
To attach a memo
1. Select FileAttachMemo in the Data Collection tab. The Incident Memo Properties
dialog opens.
2. Give the memo a descriptive Name. This is used as the name of the data item in the
incident case.
3. Type or paste the text of the memo in the Text field.
4. Click OK. The memo is added to the Data Collection list.
What’s Next?
To attach other types of files, see Attaching Files to Incident Cases
(page 182).
Otherwise, if you are finished working with data attachments, add players as
instructed in Adding Players to Incident Cases (page 183) or add journal
entries as instructed in Adding Journal Entries to Incident Cases (page 183).
To attach a file
1. Select FileAttachFile in the Data Collection tab. The Open dialog opens.
2. Browse to the file you want to attach. Select the file and click Open. The file is added to the
Data Collection list.
What’s Next?
If you are finished working with data attachments, add players as instructed in
Adding Players to Incident Cases (page 183) or add journal entries as
instructed in Adding Journal Entries to Incident Cases (page 183).
A player is any element that was involved in the incident. The related players can be fetched
automatically when attaching logs or audit entries (see Attaching Logs and Audit Entries to
Incident Cases (page 180)), or you can add players manually. Alternatively, you can copy and
paste elements into the Player List tab of an incident case.
To add a player
1. Select FileNew Player in the Player List tab. The Player Properties dialog opens.
2. Give the player a unique Name. This name is used in the Player List.
3. Enter the IPv4 Address of the player or enter the DNS Name of the player and click
Resolve to resolve the DNS name to an IP address. Elements shows a list of player
elements.
4. (Optional) Add a Comment.
5. Click OK. The player is added to the Player list.
What’s Next?
If you are finished working with the player list, attach data as instructed in
Attaching Data to Incident Cases (page 180) or add journal entries as
instructed in Adding Journal Entries to Incident Cases (page 183).
The journal allows you to record your observations and comments about administrator actions
during the incident investigation. This is especially useful when more than one administrator is
investigating the same incident simultaneously. Journal entries are automatically marked with a
timestamp, and once a journal entry is added, it cannot be removed.
After you have created an incident case, you can edit the contents and properties of the incident
case as needed.
What’s Next?
To open an existing incident case, see Opening an Incident Case for Editing
(page 184).
To change the priority of the incident case, see Changing the Priority of an Incident
Case (page 184).
To change the state of the incident case, see Changing the State of an Incident Case
(page 185).
To check the incident history, see Checking Incident History (page 185).
What’s Next?
To change the state of the incident case, see Changing the State of an
Incident Case (page 185).
To check the incident history, see Checking Incident History (page 185).
What’s Next?
To check the incident history, see Checking Incident History (page 185).
187
188
C HAPT ER 14
This section explains the commands and options available for firewall and IPS engines, as
well as some common tasks related to changing their configuration.
189
Commanding Engines Remotely
Prerequisites: The engines must have a valid working configuration
You can control all engines remotely through the Management Client through the corresponding
element’s right-click menu. The commands available depend on the type of component. In a
cluster, the commands that affect the operating state of the engines can only be given to the
individual nodes one by one, not to the whole cluster.
You can also give commands and set options for more than one engine at a time by Shift- or Ctrl-
selecting the elements.
This subject is covered in the following topics:
• Turning Engines Online (page 190)
• Turning Engines Offline (page 191)
• Setting Nodes to Standby (page 191)
• Rebooting Nodes (page 191)
• Refreshing the Currently Installed Policy (page 192)
Note – You may also be able to give commands to nodes in the unknown state (grey icon),
but you will not see a change of status. Since the actual operating status is not available,
the node may already be online, in which case you will receive an error if you try to
command the node online.
Note – If the cluster is set to standby mode, only one node at a time can be online.
Commanding a standby node online switches the online node to standby. See Adjusting
Firewall Clustering Options (page 419).
Caution – When you turn a node offline, it stops processing traffic. On firewalls, traffic is
stopped unless there are other cluster nodes that can take over.
Rebooting Nodes
Caution – If you are rebooting a cluster, reboot the nodes one by one to avoid cuts in
service. If you command all nodes to reboot, the nodes will reboot all at once.
To reboot a node
1. Select MonitoringSystem Status from the menu.
2. Expand the tree until you see the individual engine nodes.
3. Right-click the node and select CommandsReboot. A confirmation dialog is displayed.
4. Click OK to confirm your command. You can monitor the rebooting process by following the
changes in the status of the element.
Note – In clusters, all nodes must be either operational or explicitly disabled for the policy
installation to succeed (see Disabling Nodes of a Cluster Temporarily (page 195)).
Related Tasks
Creating and Managing Policy Elements (page 497).
Under normal circumstances, you should control the engines remotely through the Management
Client. For abnormal situations, there are limited tools for giving some basic commands (such
as go online/offline) through the engine’s command line interface:
• The available tools are listed in Engine Commands (page 926).
• For information on how to access the engine command line, see Getting Started with the
Engine Command Line (page 202).
Note – Disable the diagnostics after troubleshooting to avoid overloading the Log Server
with log data.
To enable/disable diagnostics
1. Select MonitoringSystem Status from the menu.
2. Expand the tree until you see the top-level engine elements.
3. Right-click the Firewall/Firewall Cluster element on which you want to apply diagnostics and
select OptionsDiagnostics. The Diagnostics dialog opens.
• Click the top-level cluster icon, not the individual node(s) under the main icon.
4. Select/deselect the Diagnostic option at the top.
5. Select the diagnostic modes you want to apply to the selected Firewall/Firewall Cluster
when diagnostics are enabled.
6. Click OK. The changes are applied immediately.
What’s Next?
Make sure System Alerts are escalated so that notification is sent out if status
surveillance detects a failure. See Getting Started with Alert Escalation (page 230).
To change a NetLink’s state, it must be operational. NetLinks with grey (unknown) status cannot
be commanded.
Caution – If you re-introduce a disabled node that has a working configuration, the node
must receive the heartbeat traffic from other nodes and accept it (based on certificates),
or the node will consider itself the only available cluster member and go online. This may
prevent the whole cluster from processing traffic.
2. Double-click the cluster element. The properties dialog for the cluster opens.
3. In the Nodes table on the Cluster tab, deselect the Disabled option for the node(s) you
want to re-enable and click OK.
4. Refresh the security policy to ensure that all nodes have the same configuration.
• If the policy installation is unsuccessful, return the previously disabled node to the initial
configuration state, see Reconfiguring Basic Engine Settings (page 203).
5. (Optional) Right-click the node and select CommandsGo Online or CommandsStandby
to return the node to operation.
The Access rules mainly determine which traffic is stopped, but you can also terminate or
blacklist connections manually when you want the action to be temporary.
197
Terminating Connections Manually
Prerequisites: None
On firewalls, you can terminate any current connection, for example, to remove an inactive
connection that has not been properly closed. Terminating an open connection alone does not
prevent any new connection from opening again immediately or later on. This action is not
available for SOHO firewalls or IPS engines.
Related Tasks
Monitoring Open Connections and Blacklists (page 97)
You can blacklist traffic manually on both firewalls and sensors, for example, to temporarily
block a suspicious or disruptive source of communications while you conduct further
investigations. You can create blacklist entries in the Blacklist view, Connections view,
Monitoring view, and Logs view. The blacklist is not necessarily applied to all traffic; the Access
rules determine how the blacklist is used. This action is not available for SOHO firewalls.
Manual blacklisting from the Management Client requires the IPv4 Access rules to have an
Apply Blacklist rule with the Management Server as an Allowed Blacklister.
Note – If a connection is allowed by a rule placed above the blacklist rule in the Access
rules, the connection is allowed regardless of the blacklist entries. Check the logs to see
which connections are discarded based on blacklisting.
2. Select the Duration for how long this entry will be kept.
• If you leave the value as 0, the entry only cuts the current connections. Otherwise, the
entry is enforced for the specified period of time.
3. Select the Address to blacklist for Endpoint 1 and Endpoint 2.
• Any: Matches any IP address.
• Predefined: Matches the specific IP address you enter in the field to the right of the
Address type list.
4. Select the Port to blacklist for Endpoint 1 and Endpoint 2.
• Ignored: Matches any port.
• IPredefined TCP and Predefined UDP: Matches the specific source and destination ports
that you enter in the fields to the right of the Port type list.
5. (Optional) Change the Netmask for Endpoint 1 and Endpoint 2 to define the range of IP
addresses that are blacklisted.
• For example, the netmask 255.255.255.0 blacklists all the addresses in the same C-
class network.
• The default netmask 255.255.255.255 blacklists only the specific IP address you enter.
6. Select the Blacklist Executors that enforce the blacklist entry. The executors must be
configured to accept blacklist requests from the Management Server.
7. Click OK. The blacklist entry is sent to the executor and the traffic is blocked.
Related Tasks
Enabling Blacklist Enforcement (page 680)
Configuring Automatic Blacklisting (page 681)
Monitoring Open Connections and Blacklists (page 97)
Editing Access Rules (page 518)
This section includes instructions for using the engine command line.
201
Getting Started with the Engine Command Line
Prerequisites: None
Nearly all aspects of engine configuration are done through the Management Client, but some
engine settings and options must be defined and configured on the command line. Command
line tools allow you to define and configure these settings and options.
What You Can Do on the Engine Command Line
• Reconfigure the engine’s keyboard layout, time zone, network card settings, and network card
to Interface ID mapping.
• Create scripts that run when the engine changes its state.
• (Re-)establish contact between the engine and the Management Server.
• Manually revert to the previous configuration.
• Run various general and StoneGate-specific tools that assist in problem solving.
Limitations of the Engine Command Line
Changes made on the engine command line apply only to the node on which they were made. If
you want to apply the changes to other engines, such as all the nodes in a cluster, you must
make the same changes separately on the command line of each engine.
Some engine configuration options, such as network interface settings, cannot be changed
through an SSH console. To be able to change these settings, you must connect using a serial
cable or connect a display and keyboard directly to the engine machine.
The Management Server contact settings that are displayed in the engine configuration wizard
(sg-reconfigure) do not show the engine’s actual working configuration (transferred whenever the
engine’s policy is installed/refreshed), but instead display the values that were set when the
node was initialized.
What’s Next?
If you want to reconfigure the engine’s basic settings or re-establish the trust
relationship between the engine and the Management Server, proceed to Reconfiguring
Basic Engine Settings (page 203).
If you want to create engine scripts that run when the engine changes its state, proceed
to Creating Engine Scripts (page 204).
If you want to revert to the previous engine configuration, proceed to Restoring a
Previous Configuration Manually (page 205).
During the installation of the engine, the engine’s keyboard layout (for command line use), time
zone (for command line use), network card settings, and network card to Interface ID mapping
were defined. The sg-reconfigure command allows you to change these settings. The
procedure also allows you to re-establish a trust relationship between the engine and the
Management Server if the trust is lost. On engines that are fully configured, each operation can
be done individually without changing the other options.
Caution – Do not select the Switch to Initial Configuration option in the Prepare for
Management Contact screen unless you want to reset the engine to the post-installation
state (including a policy that allows communication only between the engine and the
Management Server).
• If you select Contact Management Server and enter a new one-time password, the
Management Server and the engine re-establish their trust relationship. Select this
option when you want to replace a missing or expired certificate or if contact to the
Note – If there is a firewall between a remote engine and the Management Server, you
must allow the connection in the firewall’s IPv4 Access rules. If there is a NAT device
between a remote engine and the Management Server, you must also configure NAT rules
for the connection. Otherwise, the remote engine cannot contact the Management Server.
Related Tasks
Engine Commands (page 926)
Engine scripts run when the engine changes its state. The following scripts can be created:
The script names and locations cannot be changed. If the scripts are not found, engine
operation continues as normal. If a script is found, it is executed and a log entry is created. To
stop this from happening, you must delete or move the script.
Note – If you want to use a script in a cluster, remember to create the script on all the
nodes in the cluster or copy the script to all of them, so that all the nodes function in the
same way when their state changes.
To create a script
1. Create a text file with the commands you want the engine to execute (the first line of the
script must be #!/bin/sh) in one of the following ways:
• Create and edit the script on the engine’s command line using the vi text editor.
• Create and edit the script on a different host and transfer the file to the engine, for
example, using SSH.
2. Save the script in the correct folder on the engine (see Table 16.1).
3. Make the file executable by typing the following command:
chmod a+x /data/<script name>
Related Tasks
Engine Commands (page 926)
If the engine loses management connectivity due to a faulty configuration, the previous
configuration can be restored manually through the command line.
Note – You must restore the configurations separately on each node of a cluster. All nodes
in a cluster must have the exact same configuration (as indicated by an identification code
that is generated at each policy installation).
Related Tasks
Engine Commands (page 926)
Domains - 245
207
208
C HAPT ER 17
You can configure automatic updates for dynamic update packages, remote upgrades for
engines, and new versions of licenses.
Getting Started with Automatic Updates and Engine Upgrades (page 210)
Configuring Automatic Updates and Engine Upgrades (page 210)
209
Getting Started with Automatic Updates and Engine
Upgrades
Prerequisites: None
Automatic update is available for dynamic update packages, remote upgrades for engines, and
licenses. On firewalls, Anti-virus signatures are always updated automatically when anti-virus is
active.
What Do Automatic Updates and Engine Upgrades Do?
The Management Server can automatically perform the following tasks:
• Check for new dynamic update packages and automatically download and install them
according to your selection.
• Check for new engine upgrade packages. Engine upgrades can be also automatically
downloaded, but they must always be installed manually.
• Upgrade the licenses.
• When automatic updates and engine upgrades are active, you can also view information on
the maintenance contract and support level of your licenses in the Management Client (see
Checking Maintenance Contract Information (page 107).
Limitations
• There are no automatic updates for the Management Center.
• New engine software versions may require an upgraded version of the Management Center.
Check the Release Notes for compatibility information before upgrading the engines.
• Upgrades and updates (both automatic or manual) require an active maintenance/support
contract with Stonesoft.
• If you select only to receive a notification when updates and upgrades are available, you must
manually download the updates engine upgrades.
What’s Next?
Proceed to Configuring Automatic Updates and Engine Upgrades.
The Management Server can periodically check the Stonesoft website for new dynamic update
packages, engine upgrades, and licenses. This feature is active by default.
There are several different options for how new available updates and upgrades are handled.
The automatic updates and engine upgrades require the Management Server to be able to
connect to the Stonesoft servers (at least to
https://update.stonesoft.com and https://smc.stonesoft.com) either directly (using HTTPS on
port 443) or through an HTTP proxy. Additionally, you must have a valid maintenance/support
contract with Stonesoft.
2. Select Enable sending proof of license codes to Stonesoft servers. This allows you to
select settings for dynamic updates and for engine and license upgrades. It also allows you
to view maintenance contract and support level information for your licenses in the
Management Client.
3. Configure the Dynamic Updates settings:
Setting Description
Do not check for updates You are not notified of new dynamic updates.
Notify me when updates You receive an alert when a new dynamic update becomes available.
become available You must manually download and activate the update.
Automatically download and StoneGate automatically downloads and activates the new dynamic
activate updates updates.
Note – Because update packages may change system elements, the policies may require
editing after update activation.
Setting Description
Do not check for engine upgrades You are not notified of new engine upgrades.
Notify me when engine upgrades You receive an alert when a new engine upgrade becomes
become available available. You must manually download and install the update.
6. (Optional) Switch to the Connection tab and select the Check Interval to define how often
the system checks for new updates.
7. (Optional) If the connection from the Management Server to the Stonesoft servers requires
a proxy server, select Use proxy server for HTTPS connection and enter the Proxy
Address and Proxy Port.
8. (Optional) If the proxy server requires user authentication, select Authenticate to the
proxy server and enter the User Name and Password.
9. Click OK.
Related Tasks
Checking Maintenance Contract Information (page 107)
Scheduling Tasks (page 820)
Getting Started with Licenses (page 824)
Getting Started with Upgrading the SMC (page 834)
Getting Started with Upgrading Engines (page 840)
Manual Dynamic Updates (page 845)
ADMINISTRATOR ACCOUNTS
The rights and privileges of StoneGate administrators are defined flexibly with administrator
accounts.
213
Getting Started with Administrator Accounts
Prerequisites: None
An administrator account specifies what kinds of actions the administrator can take (create new
elements, browse logs, etc.).
How Administrator Accounts Can Be Configured
• Sets of administrator privileges are defined as reusable lists.
• Each list of privileges is applied to a specific group of elements.
• Several different pairs of privileges and elements can be applied to a single administrator
account, for example, to give viewing access to some elements and editing access to other
elements.
• You can also create unrestricted accounts for “superusers” that can perform any action on
any element. Some maintenance tasks require an unrestricted account.
What Do I Need to Know Before I Begin
Management Client accounts are valid in the Web Portal as well, but actual user accounts are
created separately. See Defining Web Portal User Accounts (page 260).
Configuration Overview
1. (Optional) Define customized reusable lists of allowed tasks for accounts with restricted
permissions. See Defining Administrator Roles (page 215).
2. (Optional) Define customized reusable lists of elements for defining access rights for
restricted accounts. See Defining Access Control Lists (page 217).
3. Create administrator accounts for each administrator. See Defining Administrator
Accounts (page 218).
4. (Optional) Configure strength requirements and expiration intervals for administrator
passwords. See Defining Password and Login Settings for Administrators (page 223).
Caution – Do not use shared accounts. Using shared accounts makes auditing difficult and
may prevent timely discovery should there be a security breach.
You can use Administrator Roles and Access Control Lists in accounts that define restricted
administrator permissions. You can either use the predefined Administrator Roles and Access
Control Lists or create new ones.
What’s Next?
Defining Administrator Roles (page 215)
Defining Access Control Lists (page 217)
Caution – Any changes you make to an Administrator Role are applied immediately to
every administrator account that uses the role (possibly including yourself). Take special
care that the selection is correct before you apply changes to existing Administrator Roles
that are in use.
What’s Next?
If you want to define Access Control Lists for creating reusable groups for elements,
proceed to Defining Access Control Lists.
Otherwise, the new Administrator Role is now ready to be used when defining
administrator accounts. See Defining Administrator Accounts (page 218).
3. Give the Access Control List a unique Name and enter an optional free-form Comment for
your own reference.
4. Select the Firewall, IPS, SOHO Firewall, Firewall Policy, IPS Policy, or SSL VPN Gateway
element(s) you want to add to the Access Control List from Resources and click Add. The
selected element(s) are added to the Granted Elements list in the right panel.
5. Click OK.
What’s Next?
To define new administator accounts that use the new Access Control List, proceed to
Defining Administrator Accounts (page 218).
To assign the Access Control List to an existing restricted account, proceed to Defining
Rights for Restricted Administrator Accounts (page 220).
Related Tasks
Defining an Engine’s Administrator Permissions (page 408)
What’s Next?
Creating a New Administrator Element (page 218)
Note – We recommend that passwords be at least eight characters long and contain a
combination of numbers, letters, and special characters. Secure passwords are never
based on personal information such as names, birthdays, social ID numbers, phone
numbers, street names, registration plate numbers.
What’s Next?
Continue by Defining Administrator Permissions.
Related Tasks
Defining Password and Login Settings for Administrators (page 223)
Caution – Grant unrestricted permissions only to administrators who absolutely need them.
What’s Next?
If you selected Restricted permissions for this administrator, proceed to Defining
Rights for Restricted Administrator Accounts.
If you selected Unrestricted Permissions for this administrator and you want to limit
the log entries viewable by this account, proceed to Restricting the Logs an
Administrator Can View (page 222).
If you selected Unrestricted Permissions for this administrator and you want to adjust
the display colors of log entries individually for this account, proceed to Customizing Log
Colors (page 222).
Otherwise, click OK. The administrator account is ready for use.
Related Tasks
Defining an Engine’s Administrator Permissions (page 408)
2. Click Add Role. A new Administrator Role appears in the list above.
What’s Next?
If the administrator has the right to view logs, you can further restrict the logs the
administrator can view as explained in Restricting the Logs an Administrator Can View
(page 222).
If you want to adjust the display colors of log entries individually for this account,
proceed to Customizing Log Colors (page 222).
Otherwise, click OK. The administrator account is ready for use.
Related Tasks
Defining Administrator Roles and Access Control Lists (page 215)
Defining an Engine’s Administrator Permissions (page 408)
What’s Next?
If you want to adjust the display colors of log entries individually for this account,
proceed to Customizing Log Colors.
Otherwise, click OK. The administrator account is ready for use.
Related Tasks
Filtering Data (page 159)
By default, certain logs are shown with a colored background in the Logs view. The colors are
determined by Log Color Filters. You can customize the default log colors used by default in all
administrator accounts or define administrator-specific log colors in the Administrator element’s
properties. To use customized colors for logs, you must also create the Filter(s) that match
those logs. Only administrators with the right to manage administrator accounts can customize
log colors.
2. At the top, select the log type whose color filter(s) you want to modify:
• Log and Alert to modify colors for logs and alerts displayed in the Logs view.
• Connections to modify colors for currently open connections displayed in the Connections
view.
• Blacklist to modify colors for blacklist entries in the Blacklist view.
3. (Optional) To define a new filter, click Add and double-click the Filter cell in the new color
filter row to select the filter.
4. Double-click the Color cell of the filter whose color you want to modify. A palette of colors
opens.
5. Select a color from the palette or click More Colors to select a custom color. The selected
colors are assigned to the filters and they are used whenever logs match the filter.
6. Click OK.
You can define settings for password strength, password expiration, failed logins, and actions
related to temporary and long-term inactivity in the Administrator Password Policy. The
Administrator Password Policy is applied to all administrator accounts defined with Administrator
and Web Portal User elements. The Administrator Password Policy is not enforced by default.
Note – The Password Never Expires option in the Administrator or Web Portal User
element properties overrides the password expiration settings. If the option is selected, the
password expiration settings do not apply to the account.
What’s Next?
Begin the configuration by Enabling Enforcement of Password Settings (page 224).
Related Tasks
Defining Password Policy Settings (page 225)
What’s Next?
If you want to modify the current password policy settings, continue by Defining
Password Policy Settings (page 225).
Related Tasks
Enabling Enforcement of Password Settings (page 224)
If you have not configured administrator passwords to automatically expire, we recommend that
you change administrator passwords regularly. An administrator who has the right to manage
administrator accounts can change any other administrator’s password. All administrators can
change their own passwords once logged in to the Management Client or the StoneGate Web
Portal.
Related Tasks
Defining Password and Login Settings for Administrators (page 223)
You may authenticate administrator and Web Portal user logins against an external
authentication server that supports the RADIUS protocol. This allows logging in to the
Management Client or Web Portal using any authentication method supported by your RADIUS
server. You can enable RADIUS authentication on a per-administrator-basis.
StoneGate’s internal user database does not allow external authentication servers to query the
administrator account information, so you have to maintain accounts separately both in
StoneGate and in some external user database that the RADIUS server can access. The
administrator name must be the same in both user databases.
Caution – The security of the system requires that these communications remain
confidential. Whichever security method you choose, we recommend that the
communications between the Management Server and the RADIUS server are transferred
over secure networks only.
When you delete an administrator account, all references to the administrator are removed (for
example, from element modification history).
Note – There must be at least one account with unrestricted privileges in the system. It is
not possible to delete the last remaining unrestricted account.
If you delete an Administrator element that represents the account of an administrator who has
modified any elements in the Management Center, all the history of the changes the
administrator has made is lost. Instead of deleting the account permanently, you can disable
the account by right-clicking the correct Administrator element and selecting Disable. See
Deleting Elements (page 79) for general information on deleting elements.
ALERT ESCALATION
The alerting system can be configured to escalate the alerts generated so that notifications
are sent to the administrators through multiple channels.
229
Getting Started with Alert Escalation
Prerequisites: None
Alerts notify you in case something unexpected or suspicious happens. It is vital to the health of
the system that alerts do not go unnoticed.
What Alert Escalation Does
The alert escalation process starts when an alert is triggered by a system warning or error, or
because traffic matches a rule that is configured to trigger an alert. The Log Server can send out
different types of notifications to any number of administrators. Alert escalation stops when one
of the administrators acknowledges the triggering alert or when all configured alert notifications
have been sent.
Limitations
• SOHO firewalls do not send alerts.
• The alert escalation for the SSL VPN is configured in the SSL VPN Administrator interface.
• Only one e-mail recipient can be configured for each notification. To send an e-mail to several
people at the same time, you must configure an e-mail group on the mail server or configure
several notifications consecutively without delays.
• Test alerts cannot be sent with firewall or IPS engines as the sender, and they always have
default Severity and Situation information.
Configuration Overview
Illustration 19.1 Elements in the Configuration
(Custom) Alerts
Policies and Engines
1. (Optional) Create new Custom Alert elements to allow more fine-grained matching in the
Alert Policy. See Defining Custom Alerts (page 231).
2. Make sure that alerts are generated for all necessary events. See Defining What Triggers
an Alert (page 232).
3. Create lists of actions to take when an alert is escalated. See Defining Alert Chains
(page 233).
4. Define which alerts are matched against which Alert Chain. See Defining Alert Policies
(page 238).
What’s Next?
To create or modify a custom Alert element, proceed to Defining Custom Alerts.
To configure which events generate alerts, proceed to Defining What Triggers an Alert
(page 232).
To send a test alert, see Testing Alerts (page 244).
3. Give the alert definition a unique Name. This is the name displayed in the Logs view.
4. (Optional) Type a Message for the alert. This is also shown in logs.
What’s Next?
Use the custom Alert by Defining What Triggers an Alert.
What’s Next?
To define how administrators are notified of new alerts in the system, proceed to
Defining Alert Chains (page 233).
Alert Chains define which notification channels are used to send alert notifications to
administrators. Alert Chains are used in Alert Policies. The Alert Policy defines which Alert
Chains are triggered by which Alerts.
What’s Next?
If you want to send alerts through any channel other than as a notification in the
Management Client, and you have not defined Alert channels, start by Defining Alert
Channels.
Otherwise, start by Creating New Alert Chains (page 234) or Modifying Existing Alert
Chains (page 235).
What’s Next?
Continue by Creating New Alert Chains.
What’s Next?
Continue by defining the alert escalation chain as explained in Editing Alert Chains
(page 235).
Note – If you leave the Threshold to Block cell empty, there is no blocking threshold for the
alerts sent to the recipient.
5. (Mandatory for the Delay channel, optional for other channels) Enter the Delay, define a
pause (in minutes) before the next row of the alert chain is processed.
• The purpose of the delay is to give to the recipient of the notification time to acknowledge
the alert before the next notification is sent.
• If sending the notification through the selected channel fails, the delay entered here is
ignored. If you want to add delays that are always valid, add a row with Delay as the alert
channel and set the delay on that row.
What’s Next?
If you have not defined what happens when the end of the Alert Chain is reached,
proceed to Defining the Final Action of an Alert Chain (page 237).
If you have defined what happens when the end of the Alert Chain is reached, save the
finished Alert Chain. If it is not included in your Alert Policies yet, proceed as explained
in Defining Alert Policies (page 238).
Otherwise, reload the Alert Policies that use this Alert Chain (see Installing Alert
Policies (page 240)).
What’s Next?
If the Alert Chain is not included in your Alert Policies yet, proceed as explained in
Defining Alert Policies (page 238).
Otherwise, reload the Alert Policies that use this Alert Chain (see Installing Alert
Policies (page 240)).
Alert Policies determine the criteria for selecting which alerts generated by various sources are
escalated to which Alert Chains.
Firewalls, analyzers, and the SMC servers are possible sources for alerts. Sensors send their
alerts through analyzers and SOHO firewalls do not generate alert entries at all. If Domain
elements have been configured in the system, you can select a Domain as a Sender in an Alert
Policy in the Shared Domain. Additionally, alert events can be directed to different Alert Chains
depending on the time of the day or the (Custom) Alert element used in the triggering
configuration.
What’s Next?
Proceed to Creating New Alert Policies (page 238) or Modifying Existing Alert Policies
(page 239).
What’s Next?
Proceed by defining the alert policy rules as explained in Editing Alert Policy Rules
(page 239).
Note – If you have a backup Analyzer, remember to add both the primary and the backup
Analyzer as a Sender. The backup Analyzer is not included automatically.
4. (Optional) Specify the Alert and Situation that this rule matches.
5. (Optional) Double-click the Time cell and select the days and times when you want the rule
to be applied. Click OK.
• If you do not specify any validity time, the alert rule is always applicable.
• The time is entered as UTC (GMT) time. You must calculate yourself the effects of the
time difference to your local time. Also, take into account that UTC does not adjust to
daylight saving time (summer time).
6. (Optional) Double-click the Severity cell and specify the Severity value or the range of
Severity values that this rule matches.
• To define a single Severity value, select Severity and one of the Severity options.
• If you want the rule to match a range of Severities, select Severity Range and define the
range in the From and To lists.
7. Select which Alert Chain is processed when an alert event matches this rule.
What’s Next?
Activate the Alert Policy on your Log Server by Installing Alert Policies.
Changes made to alert policies take effect when you install the Alert Policy on a Log Server.
Acknowledging Alerts
Prerequisites: There must be at least one active alert in the system
Once your system starts generating alert entries they are sent to the Log Server. Alert entries
are displayed together with other types of log entries in the Logs view. Alert entries are marked
with an icon on their left side to help them stand out from the other log entries. Alerts that have
not yet been acknowledged are marked with an Unacknowledged Alert icon (a yellow triangle with
an exclamation mark and an asterisk).
Alert entries can be acknowledged in the Logs view and in the Web Portal. See the Web Portal
Online Help for more information about acknowledging alerts through the Web Portal. Once an
alert entry is acknowledged by an administrator, it is removed from the list of active alerts and
all Alert Chain processing for that alert entry is stopped. Alert entries can be acknowledged
individually, or you can acknowledge all the active alert entries at once.
Alert entries can be managed like other log entries. For instructions on using the log
management tools, see Getting Started with Log Data Management (page 800).
What’s Next?
Acknowledge alerts either by Acknowledging Individual Alerts (page 241) or by
Acknowledging All Active Alerts (page 241).
Note – When you acknowledge an alert entry, alert escalation stops for that alert entry and
no new notifications are sent out from the Log Server to administrators.
Note – When you acknowledge an alert entry, alert escalation stops for that alert entry and
no new notifications are sent out from the Log Server to administrators.
All custom scripts must be stored in the same root path, which is defined for each Log Server in
the Log Server element’s properties (see Defining Alert Channels (page 233)). If the Log Server
is installed in the default installation directory, the path is:
• In Windows: C:\Stonesoft\StoneGate\data\notification\.
• In Linux: /usr/local/stonegate/data/notification/.
There is an example notification script in this directory called notify.bat in Windows and
notify.sh in Linux that can be modified for your own use. On Linux, the sgadmin user needs
read, write, and execute permissions in the script’s directory.
The alert information is given to the script as command arguments as described in Table 19.1.
Argument
Content Description
Number
1 Alert ID Identifies the alert uniquely in the system.
4 Alert Date The date when the alert was originally generated.
Alert Short
7 The contents of the Comment field in the alert properties.
Description
8 Event ID IPS only: reference to the event ID that triggered the alert.
Situation
9 Long description of the situation that triggered the alert.
Description
When the alert script is executed, the output (stdout) is appended to the notify.out file in the
script’s directory. The error output (stderr) is appended to the notify.err file in the script’s
directory.
exit 0
What’s Next?
Alert scripts stored in the correct directory (as defined in the Log Server element’s
properties) can be called from Alert Chains by their name. See Editing Alert Chains
(page 235).
The Alert Server features are part of every Log Server installation. However, you can also
forward all alerts from one Log Server to another. You can, for example, use one Log Server just
for handling alerts and have all the other Log Servers send the alerts they generate and receive
to the Log Server dedicated to handling alerts.
As a result, Alert Chains and Alert Policies do not need to be managed for each server, which
may help in simplifying alert management. On the other hand, you must consider that a loss of
that one Log Server then can mean that no alerts are received from anywhere in the system.
You can test the correct functioning of alerting by sending a test alert. It is treated in the same
way as any other alert. The test alerts have the lowest possible severity value “Low” and they
have their own specific Situation. The sender is always an SMC server, so it is not possible to
test how alerts from other components are handled using the test alert.
Note – A test alert is escalated only if the Alert Policy rules match test alerts.
To test an alert
1. Select ConfigurationConfigurationAdministration. The Administration Configuration
view opens.
2. Browse to Alert ConfigurationAlerts.
3. Right-click the alert to be tested and select Test Alert. The Select Alert Server dialog
opens.
4. Select the server that will send the alert and click Select.
5. Check that the alert entry appears in the Logs view.
What’s Next?
Acknowledge the alert as explained in Acknowledging Alerts (page 240).
DOMAINS
Domain elements allow you restrict which elements are displayed to the administrators in the
Management Client and in the optional StoneGate Web Portal. They also allow you to define in
which administrative Domain(s) an administrator has permissions. Configuring Domains
requires a special license.
245
Getting Started with Domains
Prerequisites: None
Domain elements help you in managing large networks and in defining administrator
permissions.
How Domains Can Be Configured
• Domain elements allow you to group together elements that belong to specific configurations
(for example, elements that belong to a specific customer or site).
• You can use Domains to divide responsibilities between administrators, so that
administrators only have access to elements in specific Domains.
What Do I Need to Know Before I Begin
• You must have a special license to be able to configure Domain elements. The number of
Domains that you can create depends on the license.
• The predefined Shared Domain is meant for all the elements that do not belong to a particular
customer or site. All the system elements belong to the Shared Domain. If there is no
Domain license in StoneGate or no Domains have yet been configured, all the elements
belong to the Shared Domain.
• The elements in the Shared Domain are displayed to all administrators when they are logged
in to any Domain in the Management Client.
• Domains, Management Servers, Secondary Management Servers, Log Pruning Filters, and
Administrator accounts with unrestricted permissions are elements that automatically belong
to the Shared Domain. You can only create these elements in the Shared Domain, and you
cannot move them to any other Domain.
Configuration Overview
1. Generate and install your purchased license for Domains, see Generating New Licenses
(page 826).
2. Define the Domain element(s) in the Shared Domain. See Creating Domains (page 247).
• If you have already configured Domain elements, you must log in to the Shared Domain to
create more Domains. See Logging in to a Domain (page 249).
3. Log in to each Domain and define the elements that belong to them. See Logging in to a
Domain (page 249).
• If you want to move existing elements from one Domain to another, you must first log in to
the Domain in which the elements are and then move the elements to the correct
Domain. See Moving Elements Between Domains (page 250).
Caution – The elements in the Shared Domain are displayed to all the administrators when
they log in to any Domain in the Management Client. Make sure that each Domain-specific
element is assigned to the right Domain.
Your Domain license defines how many Domains you can create. Only an administrator who has
unrestricted permissions can create Domains.
To create a Domain
1. Select ConfigurationConfigurationAdministration from the menu. The Administration
Configuration view opens.
2. Expand the Other Elements branch.
3. Right-click Domains and select New Domain. The Domain Properties dialog opens.
4. Give the Domain a unique Name and enter an optional Comment with any information for
your own reference.
5. (Optional) Fill in the E-mail Address and Phone Number fields with information that you
want to be displayed in the Domain Overview.
You can define in the Domain properties an announcement that is displayed to the users of the
optional StoneGate Web Portal. See Writing Announcements to Web Portal Users (page 266).
What’s Next?
If you want to define a logo for the Domain, continue by Defining a Domain Logo
(page 248).
Otherwise, click OK. The Domain is ready for use. If you want to move existing elements
to the Domain, see Moving Elements Between Domains (page 250). To create new
elements in the Domain, continue by Logging in to a Domain (page 249).
What’s Next?
Click OK. The Domain is ready for use. If you want to move existing elements to the
Domain, see Moving Elements Between Domains (page 250). To create new elements
in the Domain, continue by Logging in to a Domain (page 249).
If you only have permissions in a single Domain, you automatically log in to the Domain when
you log in to the Management Client. If you have permissions in more than one Domain, you
must log in to the correct Domain before managing elements that belong to the Domain. You
can be logged in to more than one Domain at the same time.
There are alternative ways to log in to a Domain:
• in the Management Client’s login dialog
• in the Domain Overview that opens automatically after Management Client login when you
have permissions in more than a single Domain
• in the Administration Configuration view
When you log in to a Domain, the Management Client displays by default the System Status
view that shows the status of the elements in the Domain.
if you have permissions in more than one Domain, you can log out of Domains without closing
the Management Client either in the Administration Configuration view or in the Domain
Overview. Logging out through the Domain Overview is particularly useful if you are logged in to
multiple Domains.
Related Tasks
Logging in to a Domain (page 249)
Deleting Domains
Prerequisites: Creating Domains
Only administrators who have unrestricted permissions can edit and delete Domains. You
cannot delete the predefined Shared Domain. If you delete a Domain, all the elements that
belong to the Domain are also deleted. If there are elements that you do not want to delete, you
must move them to another Domain before deleting the Domain (see Moving Elements Between
Domains (page 250)).
Most elements can be moved to a different Domain. However, some elements always belong to
the Shared Domain (predefined system elements, Domains, Management Servers, Secondary
Management Servers, Log Pruning Filters, and Administrator accounts with unrestricted
permissions) and you cannot move these elements from the Shared Domain.
Referred or
referring
elements
More
information
on references
What’s Next?
If you want to view or modify the moved elements, log in to the Domain where you
moved them. See Logging in to a Domain (page 249).
Related Tasks
Creating Domains (page 247)
The Domain Overview allows you to see at a glance if there are problems with some Domains
and their elements, so that you do not need the check their status separately for each Domain.
The Domain Overview is available only to administrators who have permissions in more than one
Domain. The information in the Domain Overview depends on the administrator’s rights. It only
shows information for those Domains in which the administrator has permissions. By default,
the Domain Overview shows the status of all Domains only to administrators who have
unrestricted permissions.
To open the Domain Overview in the Management Client, select Monitoring Domain Overview
from the menu. If Domain elements have been configured, the Domain Overview also
automatically opens when an administrator who has permissions in more than one Domain
logs in to the Management Client without specifying the Domain in the login dialog.
To log in to a
Domain, double-
click the Domain
information.
Related Tasks
Creating Domains (page 247)
Deleting Domains (page 250)
The Web Portal provides browser-based access to logs, reports, and policy snapshots for
specific authorized users. The Web Portal is provided by the Web Portal Server, which is an
optional component that you can purchase for your Management Center.
255
Getting Started with Web Portal Access
Prerequisites: Your must have licenses for running a Web Portal Server and creating Web Portal Users
Configuration Overview
1. Define a Web Portal Server element. See Defining Web Portal Server Settings (page 257).
2. If providing the Web Portal over HTTPS, generate a certificate for the server. See Activating
HTTPS on the Web Portal Server (page 258).
3. Allow the necessary connections in the Firewall Access rules. See Allowing Web Portal
Connections (page 259).
4. Install the Web Portal Server. See the Installation Guide for instructions.
• We recommend placing the Web Portal Server in a DMZ network if you offer access to
external users.
• You must generate and install a License for the Web Portal Server.
5. Create Web Portal User accounts for the end-users. See Defining Web Portal User
Accounts (page 260).
• The number of Web Portal users you can configure is limited by license. You must
generate and install a separate License file for the Web Portal Users.
• Management Client administrator accounts are also valid in the Web Portal.
6. (Optional) Make installation-specific changes to your portal. See Customizing the Web
Portal (page 264).
What’s Next?
To begin the configuration, proceed to Defining Web Portal Server Settings (page 257).
Related Tasks
Writing Announcements to Web Portal Users (page 266)
The Web Portal Server is a Web server that offers end-users access either through plain HTTP or
through the secure HTTPS protocol. The Web Portal Server fetches data from other Management
Center servers, filters it, and presents the resulting data to the users.
Caution – Always use HTTPS unless the connections are otherwise secured.
3. Enter a unique Name and the correct IP Address for the Web Portal Server.
4. Select the correct Location if necessary in your environment. See Getting Started with
System Communications (page 60).
5. Select the Log Server that is used as the Alert Server for sending the alerts generated by
this Web Portal Server.
6. Switch to the Web Portal tab and select Enable to activate the Web Portal.
7. (Optional) Enter the Host Name that the Web Portal uses.
8. (Optional) Change the (TCP) Port Number that the service listens. By default, the port 8080
is used.
Note – Make sure the listening port is not already in use on the server. For ports reserved
for StoneGate services, see Default Communication Ports (page 933).
What’s Next?
(Recommended) To encrypt the connections between the clients and the server,
continue by Activating HTTPS on the Web Portal Server.
To use plain HTTP that sends the information in cleartext, click OK and continue by
Allowing Web Portal Connections (page 259).
To protect the transported information from eavesdropping, you can encrypt the
communications by activating HTTPS on the Web Portal Server. If you secure the Web Portal
connections using HTTPS, the Web Portal Server requires a certificate. You can either self-sign
the certificate directly in the dialog or use an externally signed certificate:
• If you self-sign the certificate directly, Web browsers display a warning to the users and
require them to accept the certificate. The certificate is valid for one year. Renewing is done
by recreating the certificate in the same way as a new certificate is created (explained below).
• Alternatively, you can sign the certificate using an external certificate authority that the clients
already trust (such as one of the large commercial certificate authorities or a company-
internal certificate authority that all clients are configured to trust).
Certificates have a fixed validity time (from a certain date and time to a certain date and time).
Make sure the date, time, and timezone settings are correct on both the Management Server
and the Web Portal Server computers, as mismatches may prevent using the Web Portal. Clients
also check the certificate validity, but incorrect time settings on the client computers typically do
not prevent using the Web Portal. Instead, browsers usually display a warning that users can
dismiss.
What’s Next?
Modify the Access rules to allow Web Portal connections as instructed in Allowing Web
Portal Connections (page 259).
If the connections are routed through a firewall, you must modify the IPv4 Access rules in your
security policy to allow the connections from the Web Portal Server to the Management Server
and the Log Server, and the end-user connections to the Web Portal Server.
Management SG Control
Web Portal Server Allow
Server (8902-8913/TCP)
Note – Remember to adjust the NAT rules as well if it is necessary in your network setup.
End-users are defined using special Web Portal User accounts. Management Client
administrator accounts are also valid in the Web Portal to allow testing and other internal use.
If Domain elements have been configured, each Web Portal user account always belongs to a
specific Domain and only grants permissions to the Domain in which the Web Portal User
element is created.
3. Enter a unique Web Portal user Name. This is the username that the Web Portal user uses
to log in to the StoneGate Web Portal.
4. For Internal Authentication, configure the settings as follows:
• Type in a Password and confirm it in the field below, or click Generate Password to
generate a random 7-digit alphanumeric password.
• Select whether the account is Always Active or enter an Expiration Date.
Caution – We recommend that passwords be at least eight characters long and contain a
combination of numbers, letters, and special characters. Secure passwords are never
based on personal information such as names, birthdays, social ID numbers, phone
numbers, street names, or registration plate numbers.
What’s Next?
Continue by Granting Engines to a Web Portal User.
What’s Next?
Continue by Selecting Policy Permissions for a Web Portal User (page 262).
Related Tasks
Selecting Report Data Permissions for a Web Portal User (page 264)
Selecting Log Browsing Permissions for a Web Portal User (page 263)
What’s Next?
Continue by Selecting Log Browsing Permissions for a Web Portal User.
2. Define if the Web Portal user is allowed to view logs in the Web Portal:
• Deselect Show Logs from Granted Engines to deny the Web Portal user access to logs.
Proceed to Selecting Report Data Permissions for a Web Portal User (page 264).
• Otherwise, make sure that the option is selected.
3. (Optional) Click Select next to Log Filter Selection to define a Filter that is applied to the
log data before the data is displayed to the Web Portal user.
4. (Optional) Click Add next to Log Browsing Filters to select one or more Filter Type(s) that
define the groups of Filters that the Web Portal user can use when browsing log data in the
Web Portal.
What’s Next?
Continue by Selecting Report Data Permissions for a Web Portal User (page 264).
2. Define if the Web Portal user is allowed to view reports in the Web Portal.
• Deselect Show Reports to deny the Web Portal user access to reports.
• Otherwise, make sure that Show Reports is selected.
3. Click Add if you want to select the Reports Designs based on which the Web Portal user is
allowed to view reports. The Web Portal user is allowed to view all the reports that are
based on the granted Report Resigns (regardless of the Domain in which the reports were
created if Domain elements have been configured).
4. Click OK to save the Web Portal User element. The Web Portal user account is ready for
use.
Related Tasks
Reports (page 145)
You can display announcements to the administrators who log in to the StoneGate Web Portal.
This can be useful, for example, for service break notifications.
Note – If you leave out the protocol (HTTP:// or HTTPS:// part) from a URL, the protocol is
attached automatically based on the protocol the Web Portal Server is using. This may
prevent an otherwise valid link from working.
4. Click OK. The announcement is displayed on the home page of the Web Portal (Services
page) to affected users the next time they (re)load the page.
The announcement can be removed from the Web Portal by disabling the Display
Announcement to Web Portal Users option. The announcement you have entered is not
deleted, so you can later display the same announcement without typing it in again.
Related Tasks
Defining Web Portal User Accounts (page 260)
The Management Client can be distributed through Web Start. This eliminates the need for
each administrator to upgrade their client when the SMC is upgraded to a new version (the
version of the client must always match the version of the Management Server).
269
Getting Started with Web Start Distribution
Prerequisites: None
Configuration Overview
1. Enable Web Start access in one of the following ways depending where users will access
the Web Start login:
• Enable Web Start access on the Management Server as instructed in Activating Web Start
on Management Server (page 271)
• Configure Web Start access on a separate Web server or shared network drive as
instructed in Distributing Web Start from External Servers (page 272).
2. Test the Web Start distribution as instructed in Accessing the Web Start Clients
(page 273).
What’s Next?
If you want to use the Management Server as a Web Start server, proceed to Activating
Web Start on Management Server (page 271).
Otherwise, proceed to Distributing Web Start from External Servers (page 272).
When you install the Management Server, the files needed for distributing the Management
Clients are included in the installation. You can simply enable Web Start access to these files
on the Management Server. This activates a Web page that administrators can contact using a
Web Browser to launch the Management Client.
Note – Make sure the listening port is not in use on the server. For ports reserved for
StoneGate services, see Default Communication Ports (page 933).
6. (Optional) Enter the IP address to use in the Listen Only on Address field if the server has
several addresses and you want to restrict access to one address. Make sure the Host
Name you entered resolves to this address.
7. (Optional) Select Generate Server Logs if you want to log all file load events for further
analysis with external web statistics software.
8. Click OK.
If you leave the Host Name and Listen Only on Address fields empty, the users can access the
Web Start files at any addresses that the Management Server may have.
What’s Next?
Test the Web Start installation by following the instructions in Accessing the Web Start
Clients (page 273).
You can use Web Start even if you do not want to use the Management Server as a Web Start
server. In this case, you can place the Web Start package on any Web Server.
The Web Start package can also be placed on a shared network drive. There is a limitation to
this: the path to the network, including the drive letter, must be the same for all administrators
that use that particular version of the Web Start package.
Note – You must delete the existing files and install a new Web Start package according to
these instructions each time you upgrade the Management Center. Otherwise, any
administrators that use Web Start-installed Management Clients are not able to log in.
Caution – The Web Start installation creates an index.html file. Any existing index.html file
will be overwritten. We strongly recommend creating a new directory for the Web Start
files.
2. Copy all files and all directories from the Web Start directory on the installation CD-ROM to
the directory on the Web server or network drive where you want the Web Start files to be
served.
3. On the command line, change to the directory on your server where the Web Start files are
located.
4. Run the Web Start setup script and give the URL or the path of the directory on your server
where the Web Start files are located as the parameter:
• Windows: cscript webstart_setup.vbs <web start directory>
• Linux: ./webstart_setup.sh <web start directory>
5. If necessary, modify the configuration of the Web server to return the appropriate MIME
type for.jnlp files (application/x-java-jnlp-file). Consult the manual of your Web
server for instructions on how to configure the MIME type.
What’s Next?
Test the Web Start installation by following the instructions in Accessing the Web Start
Clients.
After the Web Start package is installed on a Web server or a network drive or the Management
Server has been enabled as a Web Start Server, the administrators can install the Management
Client using the Web Start package.
To be able to use the Web Start Management Client, there must be a current version of the Java
Runtime Environment (JRE) installed (the version required is shown on the example login page
provided).
Note – If Web Start access is required through the firewall, you must allow these
connections in your firewall’s policy. They are not allowed by default.
Related Tasks
See Administrator Accounts (page 213) for information on setting up user accounts for
Management Clients.
The sections below contain information on how to define Log Servers, how to change Log
Server configuration parameters, and how to export log data from a Log Server to an external
syslog server.
275
Defining a Log Server
Prerequisites: None
Usually, the StoneGate Log Server element is created during the Log Server installation.
However, a different Log Server element can also be defined manually. For more information on
defining a Log Server element during installation, see the StoneGate Management Center
Installation Guide or StoneGate IPS Installation Guide.
The Log Server installation always includes the Alert Server. You can let the Log Server function
in both roles, or you can forward all alerts from one Log Server to another, for example to use it
as a dedicated, central Alert Server (see Setting up a Dedicated Alert Server (page 243)).
Related Tasks
Defining a Log Server Element (page 276)
Certifying the Log Server (page 278)
Configuring an Alert Server (page 278)
Note – If you want to use a non-standard port for the Log Server, you must manually add
rules to allow communications using the new port from the firewall engines to the Log
Server even when using the Default template.
6. (Optional) If you want the Log Server to send its own alerts and forward all alerts it receives
to a different Log Server, select the Forward all Alerts to option and then select the correct
Log Server from the selection box.
7. (Optional) If you want to use additional commands with the new Log Server, select a Tools
Profile for adding the new commands.
8. (Optional) Select Exclude from Log Browsing, Statistics and Reporting if you do not want
the Log Server to gather statistical information for monitoring and you do not want its
logging data to be included in Reports. In most situations, it is better to leave this option
deselected (for more information about Reports, see Reports (page 145)).
Caution – Be very careful when excluding Log Servers from reporting. If you select this
setting for a Log Server that is in use, there is no warning that the generated reports are
missing parts of the log data.
9. Click OK.
What’s Next?
If you want to set one or several secondary Log Servers for the Log Server, select the
secondary Log Servers as described in Selecting Secondary Log Servers (page 277).
If you plan to use this Log Server for Alert Escalation, continue with the alert escalation
configuration as explained in Getting Started with Alert Escalation (page 230).
Otherwise, check that the Log Server is licensed and certified (see Generating New
Licenses (page 826) and Certifying the Log Server (page 278)).
Caution – If the log volumes are very high, make sure that the secondary Log Server can
handle the traffic load in fail-over situations.
Related Tasks
Getting Started with Alert Escalation (page 230)
To configure the Log Server in detail, you can edit the Log Server configuration file
LogServerConfiguration.txt as explained in this section. The file is located on the Log
Server machine in the folder <installation directory>/data/.
Normally, it is not necessary to configure the Log Server any more than it is possible through the
Log Server element in the Management Client. However, under special circumstances, you may
want more control over the way the Log Server behaves.
The threshold for minimum available disk space for audit logs. If
AUDIT_DISK_LIMIT the free disk space goes below this limit, the Log Server considers
the disk full and stops storing audit logs.
Directory used for storing the files exported by Log Data tasks. By
LOG_EXPORT_DIR
default, ${SG_ROOT_DIR}/data/export.
Log Server port that listens for connections from the StoneGate
LOG_FW_PORT Firewall/VPN and IPS engines (3020 by default). Changing this
value requires reinstalling the Log Server software.
Directory used for storing the logfile.txt that logs the task
LOG_LOGFILE_DIR
scheduler operations. By default, ${SG_ROOT_DIR}/data.
Maximum number of active alerts. If there are more alerts, they are
MAX_ACTIVE_ALERT_NB
automatically acknowledged (50000 by default).
The script used for starting the Log Server database. By default,
PHY_EXE
bin\\sgStartLogDatabase.bat or bin/sgStartLogDatabase.sh.
Log Server database port that the Log Server connects to (1314 by
PHY_PORT
default).
SYSLOG_EXPORT_FORMAT The file format used for syslog exporting. Either CSV or XML.
Defines how many of the defined filters a log event must match to
forward the event to the syslog server. The value “ALL” sends only
SYSLOG_FILTER_MATCH events that match all defined filters. The value “ONE” sends all
events that match any of the defined filters. The value “NONE”
sends only events that match none of the defined filters.
Defines how the defined filters are used for sending events to the
SYSLOG_FILTER_TYPE syslog server. The value “KEEP” sends all the matching events.
The value “DISCARD” sends only the events that do not match.
SYSLOG_PORT The target UDP port for sending syslog. The default port is 514.
The UDP port for receiving syslog. If this parameter has not been
defined, the default port (514 for Windows or 5514 for Linux) is
SYSLOG_RECEPTION_PORT used.
Note - In Linux the value of this parameter must always be set >
1024.
The TCP port for receiving syslog. If this parameter has not been
defined, the UDP default port (514 for Windows and 5514 for
SYSLOG_RECEPTION_TCP_PORT Linux) is used.
Note - In Linux the value of this parameter must be set > 1024.
The IP address of the syslog server used for sending log events to
SYSLOG_SERVER_ADDRESS
syslog using the UDP protocol.
SYSLOG_TCP_PORT The target TCP port for sending syslog. The default port is 514.
StoneGate Log Servers can be configured to send log data to external syslog servers. The log
data to be transmitted can be selected by using filters just as any other StoneGate log data.
Logs that are deleted by the Immediate Discard log pruning filters are not sent to a syslog
server. Discard Before Storing pruning does not affect syslog exports. Audit entries cannot be
exported to a syslog server.
What’s Next?
To configure the syslog settings of the Log Server, first adjust the Defining
General Syslog Settings.
What’s Next?
If you want to use filter the data sent to the syslog server, continue by Exporting Log
Filters for Syslog Sending.
If you do not want to use filters, continue by Creating a Rule Allowing Traffic to the
Syslog Server (page 285).
Note – If you cannot export the filter directly to these directories, export the filter (.flp file)
to another location and then copy the filter manually to the <installation directory>/
data/syslog/Firewall or <installation directory>/data/syslog/IPS directory.
What’s Next?
Continue by Configuring Syslog Filter Settings.
Note – If you do not use filters for the data to be sent, remove the SYSLOG_FILTER_TYPE=
and SYSLOG_FILTER_MATCH= parameters from the <installation directory>/data/
LogServerConfiguration.txt file.
What’s Next?
Continue by Creating a Rule Allowing Traffic to the Syslog Server.
You can install several secondary Management Servers and Log Servers to provide a standby
system for the StoneGate Management Center (SMC).
287
About Secondary SMC Servers
Prerequisites: Management Server high availability is a separately licensed feature
Although the firewall and IPS engines always work independently without the SMC according to
their installed configuration, configuration changes and system monitoring are not possible
without a Management Server and a Log Server. The Management Server in particular is a
critical component, since it is the only place where the full configuration information is stored.
Secondary Management Servers and Log Servers can be installed as backups that can be
activated if the active components fail. The high-availability (HA) solution includes automatic
replication of the configuration data stored on the Management Server. This way, manual
intervention is minimized, and the system can be fully managed and monitored without going
through a manual re-installation and backup restoration process.
What’s Next?
Installing a Secondary Management Server (page 288)
Installing a Secondary Log Server (page 293)
Related Tasks
Changing the Active Management Server (page 297)
Disabling and Enabling Automatic Database Replication (page 298)
Synchronizing Management Databases Manually (page 298)
To use a secondary Management Server, you must have a special Management Server license
that includes the high availability features. The license is a combined license for all
Management Servers and it must list the IP addresses of all Management Servers.
Up to five secondary Management Servers can automatically replicate the configuration data on
the primary Management Server. If the primary Management Server becomes unusable, you can
manually activate a secondary Management Server, which allows you to work normally.
Note – The secondary Management Servers are meant for backup and disaster recovery
purposes. Only one Management Server at a time can be used for configuring and
managing the system.
Configuration Overview
1. Create the element as explained in Defining a Secondary Management Server Element
(page 289).
2. License the servers as explained in Installing a License for a Secondary Management
Server (page 290).
3. Allow communications to the new server through firewalls as necessary as explained in
Creating Access Rules for a Secondary Management Server (page 291).
4. Install the software on the target server as explained in Installing Secondary Management
Server Software (page 291).
What’s Next?
Continue by Installing a License for a Secondary Management Server.
Related Tasks
Adding Custom Commands to Element Menus (page 53)
Writing Announcements to Web Portal Users (page 266)
What’s Next?
Continue by Creating Access Rules for a Secondary Management Server.
What’s Next?
After adding the Access rules, continue by Installing Secondary Management Server
Software.
Note – If the CD-ROM is not automatically mounted in Linux, mount the CD-ROM with
“mount /dev/cdrom /mnt/cdrom”.
2. Proceed according to instructions in the Installation Wizard until you are prompted to select
which components you want to install.
• If you also want to install a Log Server and a local Management Client on this computer,
leave the Typical selected and click Next.
• Otherwise, select Custom, select the components you want to install and click Next.
3. Select the IP address of the Management Server from the list or type it in.
• This must be the IP address defined for the corresponding Management Server element.
4. Type in the IP address of the Log Server for sending alerts.
5. Select Install as a Secondary Management Server for High Availability.
6. Click Next and follow the instructions to start the installation. A login prompt for
Replication opens.
7. Log in using an unrestricted administrator account. The Management Server Selection
dialog opens.
8. Select the correct Management Server from the list and click OK. The databases are
synchronized.
Note – If the synchronization fails for some reason (such as a network connection
problem), the secondary Management Server is not installed properly. Run the Installation
Wizard again when connectivity is restored. You can also follow the procedure for Restoring
a Backup Taken from a Different Management Server (page 299) to configure the server
as a valid backup server.
What’s Next?
The Secondary Management Server configuration is complete. You can view replication
information in the Info panel when you select the Management Server.
A secondary Log Server can be used to allow continued monitoring of the system if a Log Server
fails: alert escalation proceeds normally, new logs can be browsed, and the engine status and
statistics can be examined. However, the log data is not automatically replicated between the
primary and secondary Log Servers, so some log data is always unavailable during outages.
Any Log Server can be used both as a normal Log Server for some components and a secondary
Log Server for one or more other Log Servers. However, you must consider the load of the Log
Servers before you set up an actively used Log Server as a secondary Log Server, to avoid
overloading when a fail-over occurs.
You can set up secondary Log Servers with normal Log Server licenses. A separate license for
each Log Server is required, even if used only as a backup.
The following overview can be used to install a new Log Server that works as a backup for some
other Log Server. However, you can alternatively define any existing Log Servers to be used as
backups for some other Log Server just by completing Step 3 and refreshing the policies of
engines that send their data to the primary Log Server.
Configuration Overview
1. Add an element for the secondary Log Server as explained in Creating a Secondary Log
Server Element (page 293).
2. License the secondary Log Server as explained in Installing a License for a Secondary Log
Server (page 295).
3. Define the Log Server as a Secondary Log Server for some other Log Server as explained
in Setting a Log Server as a Secondary Log Server (page 295).
4. Make sure the communications between system components and the secondary Log
Server are allowed as explained in Creating Access Rules for a Secondary Log Server
(page 296).
5. Install the Log Server as explained in Installing Secondary Log Server Software
(page 296).
Note – If you want to use a non-standard port for the Log Server, you must manually add
rules to allow communications using the new port from the firewall engines to the Log
Server even when using the Default template.
7. (Optional) If you want the Log Server to send its own alerts and forward all alerts it receives
to a different Log Server, select Forward all Alerts to and then select the correct Log
Server.
8. (Optional) Select Exclude from Log Browsing, Statistics and Reporting if you do not want
the Log Server to gather statistical information for monitoring and reports.
What’s Next?
Continue by Installing a License for a Secondary Log Server (page 295).
Related Tasks
Adding Custom Commands to Element Menus (page 53)
What’s Next?
Continue by Setting a Log Server as a Secondary Log Server.
Caution – If the log volumes are very high, make sure that the secondary Log Server can
handle the traffic load in fail-over situations.
What’s Next?
Continue by Creating Access Rules for a Secondary Log Server (page 296).
What’s Next?
After adding the Access rules, continue the installation of a new secondary Log Server
in Installing Secondary Log Server Software (page 296).
Note – If the CD-ROM is not automatically mounted in Linux, mount the CD-ROM with
“mount /dev/cdrom /mnt/cdrom”.
2. Proceed according to instructions in the Installation Wizard until you are prompted to select
which components you want to install.
3. Select Custom, and select Log Server.
4. Finish the installation according to instructions in the Installation Wizard. You must certify
the Log Server either during or after the installation before the Log Server can connect to
the Management Server.
What’s Next?
The logs are not automatically copied between the Log Servers by default, since the
volumes can be quite large. You can set up separate scheduled or manually run Tasks if
you want to copy logs between the servers. You can use log filters to reduce the
volumes without losing the most important logs. See Getting Started with Log Data
Management (page 800).
Otherwise, the secondary Log Server installation is complete.
Only one Management Server at a time can be the active Management Server. The standby
Management Servers cannot be used for day-to-day configuration and monitoring of the system.
The standby Management Servers replicate the changes done on the active Management
Server once an hour (or whenever you command them to do so, see Synchronizing Management
Databases Manually (page 298)) so that they have the up-to-date configuration information
available.
When you need to switch to a different Management Server, you must manually change the
active Management Server. The engines continue to operate normally even when no
Management Server is reachable, so there is no interruption to any network services.
This feature is primarily meant for disaster recovery. We do not recommend switching the active
Management Server unnecessarily.
Caution – If the primary Management Server is down when you make the switch, but may
possibly recover, disconnect the previous primary Management Server from the network.
This avoids having two active Management Servers online at the same time. Set the
previous primary Management Server as a secondary Management Server and synchronize
the databases to return to normal operation.
By default, changes in the configuration information stored on the currently active Management
Server are automatically copied to all standby Management Servers. If you have a specific
reason to stop this replication, you can do so. You can also synchronize the information
manually as explained in Synchronizing Management Databases Manually (page 298).
You can synchronize the configuration information manually between all Management Servers
through the Management Client. This synchronization is always done from the currently active
Management Server to the standby Management Server(s).
Caution – Restoring a backup erases all configuration data stored on the Management
Server on which you perform the operation.
Related Tasks
Restoring Backups (page 796).
This section includes tasks related to configuring additional settings for Management
Servers, as well as changing your Management Center hardware platform or the IP addresses
used in system communications.
301
Modifying a Management Server Element
Prerequisites: None
The Management Server element is automatically created during the installation. Check and
modify the settings as necessary. You can rename the Management Server element freely, but
you cannot delete the Management Server that the SMC is connected to. To define secondary
Management Servers for high availability, see Installing a Secondary Management Server
(page 288).
To change the management database password that was automatically created during the
installation, see Changing the Management Database Password (page 303).
The Management Server contains a database for storing the configuration information. The
password for the database is automatically created during the installation of the Management
System. In some rare cases, you may need this password to complete an operation, in which
case you can simply change it.
2. Enter the password in the New Password and the Confirm New Password fields.
3. Click OK to confirm the change.
If you want to change the hardware or the operating system that the Management Server, Log
Server, or Web Portal Server components run on, you can follow the procedure below.
Changing IP Addressing
Prerequisites: None
The following instructions explain how you can change IP addresses without losing management
connectivity. When you change IP addressing, other connections between the different
components may be temporarily lost. You must make sure that the connections return to normal
after the IP address changes.
What’s Next?
If you want to change IP addresses and the Management Server and Log Server are on
the same machine, proceed to Changing IP Addresses of Combined Management/Log
Servers (page 306).
Otherwise, proceed to Changing the Management Server’s IP Address or Changing the
Log Server’s IP Address (page 305) depending on which component’s IP address you
want to change.
Note – If your firewall policies do not use the Default template, check that they allow all
the necessary connections.
Note – If your firewall policies do not use the Default template, check that they allow all
the necessary connections.
If an engine cannot connect to the Management Server because of changes in the system
configuration, you can restore the contact by generating a new initial configuration for the engine
(through the engine’s right-click menu) and then run the sg-reconfigure command on the
engine command line. If you also suspect that the engine’s configuration is out of date, also
select the option to return the engine to the initial configuration state. See instructions in
Reconfiguring Basic Engine Settings (page 203).
Caution – Returning the engine to the initial configuration state clears the engine’s
configuration. Only management communications are allowed and no traffic is allowed to
pass through the firewall.
309
310
C HAPT ER 26
Engine elements contain the configuration information that is directly related to the firewalls,
sensors, and analyzers, such as the interface definitions, cluster mode selection, tester
settings, and other such engine-specific options. This section explains how to create and
modify these elements and lists the tasks you can do in the engine element properties (in the
“Editing...” sections below).
311
Getting Started with Engine Elements
Prerequisites: None
Note – The engines are always configured through the StoneGate Management Center
(SMC). If you have no SMC installed, see the Management Center Installation Guide.
Configuration Overview
The overview below does not cover the StoneGate SSL VPN product. See Creating a New SSL
VPN Gateway Element (page 322). For information on configuring StoneGate SSL VPN, see the
SSL VPN Administrator’s Guide.
1. Install a license for the engine. See Getting Started with Licenses (page 824).
2. Create a new engine element and define the basic properties. See Creating New Engine
Elements (page 313).
3. Configure the engine’s interfaces. See Getting Started with Interface Configuration
(page 342).
4. (Not applicable to SOHO Firewalls) Configure the routing. See Getting Started with Routing
(page 440).
5. Generate the initial configuration for the engine and use it to establish a connection
between the engine and the Management Server. See Connecting Engines to the StoneGate
Management Center (page 391).
6. (Not applicable to SOHO Firewalls) Install a policy on the engine. See Installing Policies
(page 501).
Related Tasks
Editing Single Firewall Properties (page 333)
Editing Firewall Cluster Properties (page 334)
Editing SOHO Firewall Properties (page 335)
Editing Analyzer Properties (page 336)
Editing Single Sensor Properties (page 337)
Editing Sensor Cluster Properties (page 338)
Editing Combined Sensor-Analyzer Properties (page 339)
You can create a new engine element either by defining a blank new element or by duplicating
the properties of an existing element. Before you define a new engine element, make sure you
have a license for it. The element can be configured without a license, but you must have a
license to make the engine operational.
You can either create a new element as instructed in the sections listed below or you can copy
and modify an existing element as explained in Duplicating an Existing Engine Element
(page 323).
What’s Next?
Creating a New Single Firewall Element (page 313)
Creating a New Firewall Cluster Element (page 314)
Creating One New SOHO Firewall Element (page 315)
Creating Multiple New SOHO Firewall Elements (page 316)
Creating a New Analyzer Element (page 318)
Creating a New Single Sensor Element (page 319)
Creating a New Sensor Cluster Element (page 320)
Creating a New Combined Sensor-Analyzer Element (page 321)
Creating a New SSL VPN Gateway Element (page 322)
What’s Next?
Continue the configuration in Firewall Interface Configuration (page 343).
What’s Next?
Continue the configuration in Firewall Interface Configuration (page 343).
Caution – At least one of the NTP servers must be reachable at installation time or the
installation will fail.
What’s Next?
Continue the configuration in SOHO Firewall Interface Configuration (page 364).
4. Enter the Name Prefix. The system adds a number to this to generate unique names for
the individual SOHO Firewalls.
5. Enter the Global Corporate IP Range. This address space is used for generating the local
IP address space for the internal Corporate networks that the SOHO firewalls protect.
6. Enter the number of SOHO Firewall elements you want to create in the No. of SOHO
Firewalls field.
Caution – At least one of the NTP servers must be reachable at installation time or the
installation will fail.
Note – There is no data synchronization between the analyzers. Even if you define a
backup analyzer, do not take analyzers offline unnecessarily to ensure the best possible
traffic screening results.
7. Select the correct Location for this engine if there is a NAT device between system
components affecting this analyzer’s communications. See Defining Locations (page 61) for
more information.
What’s Next?
Continue the configuration in Sensor and Analyzer Interface Configuration (page 377).
What’s Next?
Continue the configuration in Sensor and Analyzer Interface Configuration (page 377).
What’s Next?
Continue the configuration in Sensor and Analyzer Interface Configuration (page 377).
What’s Next?
Continue the configuration in Sensor and Analyzer Interface Configuration (page 377).
Note – You cannot change any of the SSL VPN gateway’s settings in the Management
Client. The configuration in the Management Client is just for establishing contact between
the Management Center and the SSL VPN gateway.
What’s Next?
Continue by Connecting SSL VPN Gateways to the SMC (page 396).
Existing engine elements are shown, depending on their type, in the System Status view under
engine-specific branches. Firewall elements and SSL VPN Gateway elements are shown in the
Firewall Configuration view under the Firewalls and the Network ElementsSSL VPN Gateways
branches. IPS elements are shown in the IPS Configuration view under the IPS Engines branch.
You can modify the properties of an individual engine element or the common properties shared
by several engine elements. You can also convert a single firewall or sensor into a cluster.
Related Tasks
Modifying the Properties of One Engine Element (page 324).
Modifying Properties of Several Engines at Once (page 324).
Converting a Single Firewall to a Firewall Cluster (page 325).
Converting a Single Sensor to a Sensor Cluster (page 329)
Adding a Node to a Firewall or Sensor Cluster (page 330).
Changing an Engine’s Control IP Address (page 331)
Configuration Notes
Firewall clusters do not support integrated ADSL modems. To convert to a
ADSL interfaces cluster, you must switch to an external ADSL modem that the firewall
engines access through an Ethernet connection.
Internal DHCP Server on Clustered firewalls support an internal DHCP server starting from software
older engine versions version 5.2. Upgrade the engine as necessary before conversion.
Firewall clusters can only have IPv4 addresses on their interfaces and can
IPv6 addresses only process IPv4 traffic. Postpone the conversion to cluster until a
software version with improved IPv6 support for clusters is released.
Caution – If the engine has a working configuration, it will go online and process traffic
when you power it on to configure it for the cluster.
5. Connect the network cables to the new engine and power it on.
To run the element conversion tool and map the interface types
1. Right-click the Single Firewall element that you want to upgrade to a cluster and select
ConfigurationUpgrade to Cluster. An interface mapping dialog opens.
2. Click the Upgrade to column cell for each interface and select the IP address type(s) for the
interfaces.
• An NDI (Node Dedicated IP Address) is used for communications between the engine
itself and some other host in the network, such as the other nodes in the cluster, the
Management Server, hosts you ping from the engine’s command line, etc.
• A CVI (Cluster Virtual IP Address) is used for handling traffic that the cluster examines. If
other network devices point to the firewall’s IP address (as a default gateway or as a VPN
endpoint, for example), converting the IP address to a CVI will allow those external
configurations to remain unchanged.
• You can select both a CVI and an NDI to be created for the same physical interface. This
is the recommended working configuration for all interfaces, but may not be appropriate
for all interfaces at this stage, since you cannot select which role the current IP address
takes. Additional IP addresses are generated automatically to create the CVIs and NDIs.
• Each selection is validated and you may not be able to select a type if it is incompatible
with some feature. See Table 26.2 above for a summary of requirements.
3. Click OK. The Cluster Properties dialog for the new Firewall Cluster element opens.
4. In the cluster element properties, check and change the settings as needed. For help on
defining the interfaces, see Getting Started with Interface Configuration (page 342).
4a. Switch to the Interfaces tab.
4b. Add the necessary Physical interfaces and IP addresses that are needed in addition to
those used on the single firewall. Check that the IP addresses on all interfaces are
correct and change as necessary.
4c. Select Packet Dispatch as the CVI mode and enter the related unicast MAC address in
the properties of all Physical Interfaces that have CVI definitions.
4d. Click Options and select the correct interfaces for the different roles.
4e. If the internal DHCP server is used and configured to assign the firewall itself as the
default gateway for clients, make sure the default gateway IP address is a CVI (Physical
Interface properties, DHCP tab).
Caution – If you change the control IP address of the existing node in this process, the
connection between the engine and the SMC is lost. See Changing an Engine’s Control IP
Address (page 331) to change the control IP address without losing contact.
Note – If the connection with the Management Server is lost when you are trying to
change IP addressing, run the sg-reconfigure command on the engine command line to
return the engine to the initial configuration state and to re-establish initial contact
between the engine and the Management Server. See Connecting Engines to the
StoneGate Management Center (page 391).
Note – If the connection with the Management Server is lost when you are trying to
change IP addressing, run the sg-reconfigure command on the engine command line to
return the engine to the initial configuration state and to re-establish initial contact
between the engine and the Management Server. See Connecting Engines to the
StoneGate Management Center (page 391).
If you are creating a new Single Firewall, proceed as explained in Creating a New Single Firewall
Element (page 313).
Tab Tasks
For defining the basic properties, see Creating a New Single Firewall Element
(page 313).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
Single Node For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
(page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
Tester See Getting Started with the Engine Tester (page 398).
HTTPS Inspection See Activating HTTPS Inspection on the Engine (page 665).
See Adjusting Firewall System Parameters (page 416), and Adjusting Firewall
Advanced
Traffic Handling Parameters (page 418).
If you are creating a new Firewall Cluster, proceed as explained in Creating a New Firewall
Cluster Element (page 314).
Tab Tasks
For defining the basic properties, see Creating a New Firewall Cluster Element
(page 314).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
Cluster (page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
To add a node to the cluster, se Adding a Node to a Firewall or Sensor Cluster
(page 330).
Tester See Getting Started with the Engine Tester (page 398).
HTTPS Inspection See Activating HTTPS Inspection on the Engine (page 665).
See Adjusting Firewall System Parameters (page 416), and Adjusting Firewall
Advanced
Traffic Handling Parameters (page 418).
If you are creating a new SOHO Firewall, proceed as explained in Creating One New SOHO
Firewall Element (page 315) or Creating Multiple New SOHO Firewall Elements (page 316).
Tab Tasks
For defining the basic properties, see Creating One New SOHO Firewall Element
(page 315).
For information on defining Locations, see Configuring System Communications
General (page 59).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
For defining the properties of the External interface, see Defining External
External
Interfaces for SOHO Firewalls (page 366).
For defining the properties of the Corporate interface, see Defining Corporate
Corporate
Interfaces for SOHO Firewalls (page 370).
For defining the properties of the optional Guest interface(s), see Defining Guest
Guest
Interfaces for SOHO Firewalls (page 372).
See Defining Wireless Channel Settings for SOHO Firewalls (page 375).
Wireless Channel For additional wireless LAN settings, also see Defining Wireless Security Settings
for SOHO Firewalls (page 374).
Related Tasks
Adjusting SOHO Firewall Management Connection (page 430)
If you are creating a new Analyzer, proceed as explained in Creating a New Analyzer Element
(page 318).
Tab Tasks
For defining the basic properties, see Creating a New Analyzer Element
(page 318).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
Single Node For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
(page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
Tester See Getting Started with the Engine Tester (page 398).
To define to which Firewalls the Analyzer sends blacklist requests, see Defining
Blacklisting
Destination Interfaces for Automatic Blacklisting (page 681).
If you are creating a new Single Sensor, proceed as explained in Creating a New Single Sensor
Element (page 319).
Tab Tasks
For defining the basic properties, see Creating a New Single Sensor Element
(page 319).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
Single Node For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
(page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
Tester See Getting Started with the Engine Tester (page 398).
HTTPS Inspection See Activating HTTPS Inspection on the Engine (page 665).
If you are creating a new Sensor Cluster, proceed as explained in Creating a New Sensor Cluster
Element (page 320).
Tab Tasks
For defining the basic properties, see Creating a New Sensor Cluster Element
(page 320).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
Cluster (page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
To add a node to the cluster, see Adding a Node to a Firewall or Sensor Cluster
(page 330).
Tester See Getting Started with the Engine Tester (page 398).
HTTPS Inspection See Activating HTTPS Inspection on the Engine (page 665).
If you are creating a new Combined Sensor-Analyzer, proceed as explained in Creating a New
Combined Sensor-Analyzer Element (page 321)
Tab Tasks
For defining the basic properties, see Creating a New Combined Sensor-Analyzer
Element (page 321).
For defining Locations and Contact addresses, see Defining Engine Location
(page 62).
Single Node For selecting an SNMP Agent, see Activating the SNMP Agent on Engines
(page 435).
For selecting Categories, see Using Categories (page 72).
For defining a Tools Profile, see Adding Custom Commands to Element Menus
(page 53).
Tester See Getting Started with the Engine Tester (page 398).
HTTPS Inspection See Activating HTTPS Inspection on the Engine (page 665).
To define to which Firewalls the Analyzer sends blacklist requests, see Defining
Blacklisting
Destination Interfaces for Automatic Blacklisting (page 681).
Only SOHO firewalls contact NTP (Network Time Protocol) servers directly. Otherwise, engine
times are automatically synchronized to match the time of the Management Server. If you want
to use an NTP server to synchronize engine times, you must set the computer on which you
have installed the Management Server to synchronize its time with the NTP server. If the Log
Server runs on a different computer, set it to use the same NTP server.
If the Management Server, Log Server, and the engines do not have the same time, there may
be problems with logging and monitoring. Also, make sure that the computer you use for
Management Client access has the time and time zone set correctly to avoid time
synchronization problems when you view statistics or logs, generate reports, or schedule
automatic maintenance tasks.
The network interface configuration for all engines is stored on the Management Server in the
properties of Single Firewall, Firewall Cluster, SOHO Firewall, Sensor, Sensor Cluster, Analyzer,
and Sensor-Analyzer elements.
341
Getting Started with Interface Configuration
Prerequisites: Creating New Engine Elements / Modifying Existing Engine Elements
Configuration Overview
The interface configuration of engine components proceeds as follows:
1. Add the network interfaces you want to use on the engine.
2. Define the VLANs.
3. Define the IP address settings.
4. Configure additional related settings depending on the features you want to use.
What’s Next?
Firewall Interface Configuration (page 343)
Selecting SOHO Firewall Interface Types (page 364).
Sensor and Analyzer Interface Configuration (page 377).
Related Tasks
Configuring Manual ARP Settings (page 387)
Activating the Internal DHCP Server on a Firewall Interface (page 388)
The interface configuration for StoneGate Firewall/VPN consists of the following main steps:
1. Add the required number of network connections:
• Define Ethernet links as explained in Defining Physical Interfaces for Firewall Engines
(page 344).
• (Single Firewalls only) Define integrated ADSL modems as explained in Adding ADSL
Interfaces for Single Firewalls (page 348).
• (Single Firewalls only) Define integrated 3G modems as explained in Defining Modem
Interfaces for Single Firewalls (page 358).
2. (Physical Interfaces only) Add the required number of VLANs as explained in Adding VLAN
Interfaces for Firewall Engines (page 346).
3. (Not applicable to Modem interfaces) Configure the IP address settings as explained in
Configuring Single Firewall IP Addresses (page 351) or Configuring Firewall Cluster IP
Addresses (page 356).
4. Select the interfaces that are used for system communications as explained in Setting
Firewall Interface Options (page 361).
Related Tasks
SOHO Firewall Interface Configuration (page 364)
Configuring Manual ARP Settings (page 387)
Routing Multicast Traffic (page 447)
Options Explanation
The Interface ID automatically maps to a physical interface of
the same number during the initial configuration of the
Interface ID
engine, but the mapping can be changed as necessary
through the engine’s command line interface.
Second Interface ID
(Only if interface type is Aggregated The second interface in the aggregated link.
Link)
CVI Mode Unless you have a specific reason to use some other setting,
use the default Packet Dispatch setting. The Packet Dispatch
(Optional,
mode is the best choice in most environments. See the
Firewall Clusters only) Firewall/VPN Reference Guide for more information.
QoS Policy The QoS Policy for the link on the interface. For more
(Optional) information, see Getting Started with QoS (page 616).
What’s Next?
Adding VLAN Interfaces for Firewall Engines (page 346).
Configuring Single Firewall IP Addresses (page 351).
Configuring Firewall Cluster IP Addresses (page 356).
Related Tasks
Activating the Internal DHCP Server on a Firewall Interface (page 388)
For DHCP relay, see Routing DHCP Messages (page 445).
Configuring Advanced Interface Properties for Firewalls (page 349)
Option Explanation
Enter the VLAN ID (1-4094). The VLAN IDs you add must be the same as the VLAN
VLAN ID
IDs that are used in the switch at the other end of the VLAN trunk.
QoS Policy The QoS Policy for the link on the interface. For more information, see Getting Started
(Optional) with QoS (page 616).
The MTU (maximum transmission unit) size on the connected link. Either type in a
value between 400-65535 or select a common MTU value from the list.
MTU
The default value (also the maximum standard MTU in Ethernet) is 1500. Do not set
(Optional)
a value larger than the standard MTU unless you know that all the devices along the
communications path support it.
What’s Next?
Configuring Single Firewall IP Addresses (page 351).
Configuring Firewall Cluster IP Addresses (page 356).
Related Tasks
Activating the Internal DHCP Server on a Firewall Interface (page 388)
For DHCP relay, see Routing DHCP Messages (page 445)
Configuring Advanced Interface Properties for Firewalls (page 349).
Option Explanation
Select the number of the ADSL port on the appliance as the Interface ID. It
Interface ID automatically maps to the ADSL port on the engine’s ADSL card during the initial
configuration of the engine.
The MTU (maximum transmission unit) size on the connected link. Either type in a
value between 400-65535 or select a common MTU value from the list.
MTU
The default value (also the maximum standard MTU in Ethernet) is 1500. Do not set
(Optional)
a value larger than the standard MTU unless you know that all the devices along the
communications path support it.
What’s Next?
Configuring Single Firewall IP Addresses (page 351)
Related Tasks
Configuring Advanced Interface Properties for Firewalls (page 349).
4. Select Override Firewall’s Default Settings. The options for SYN Flood Protection and Log
Compression are enabled.
5. Define the SYN Flood Protection Mode
Option Explanation
The interface uses the SYN Flood Protection settings defined on the Advanced tab in
Default the firewall properties (see Configuring Default SYN Flood Protection for a Firewall
(page 425).
This is the recommended mode if you want to override the general SYN Flood
Protection settings defined in the firewall properties. The firewall automatically
Automatic
calculates the number of Allowed SYNs per Second and the Burst Size for the
interface based on the engine’s capacity and memory size.
Enter the desired values for Allowed SYNs per Second (the number of allowed SYN
packets per second) and Burst Size (the number of allowed SYNs before the firewall
starts limiting the SYN rate). We recommend that Burst Size be at least one tenth of
Custom
the Allowed SYNs per Second value. If Burst Size is too small, SYN Flood Protection
does not work. For example, if the value for Allowed SYNs per Second is 10000, the
Burst Size must be at least 1000.
Caution – The recommended values for the SYN Flood Settings depend on your network
environment. If the Custom settings are not carefully configured, the capacity of the
firewall engine may suffer or SYN Flood Protection may not work correctly.
Option Explanation
Log Rate The maximum number of entries per second. The default value for antispoofing
(Entries/s) entries is 100 entries/s. By default, Discard log entries are not compressed.
The maximum number of matching entries in a single burst. The default value for
Burst Size
antispoofing entries is 1000 entries. By default, Discard log entries are not
(Entries)
compressed.
• Do not enable Log Compression if you want all the antispoofing and Discard entries to be
logged as separate log entries (for example, for reporting purposes or for firewall
statistics).
• By default, each generated Antispoofing and Discard log entry is logged separately and
displayed as a separate entry in the Logs view. Log Compression settings allow you to
define the maximum number of separately logged entries. When the defined limit is
reached, a single antispoofing log entry or Discard log entry is logged. The single entry
contains information on the total number of the generated Antispoofing log entries or
Discard log entries. After this, the logging returns to normal and all the generated entries
are once more logged and displayed separately.
7. Click OK.
What’s Next?
Close the firewall’s Properties dialog and refresh the firewall’s policy to transfer the
configuration changes.
What’s Next?
To add an IPv4 address to a Physical Interface, VLAN interface, or an ADSL Interface,
proceed to Adding an IPv4 Address for a Single Firewall (page 352).
To add an IPv6 address to a Physical or VLAN Interface, proceed to Adding an IPv6
Address for a Single Firewall (page 355).
What’s Next?
To add IPv6 addresses to a Physical Interface or VLAN Interface, proceed to Adding an
IPv6 Address for a Single Firewall (page 355).
To define Modem Interfaces, proceed to Defining Modem Interfaces for Single Firewalls
(page 358).
If you are creating a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
Related Tasks
About Using a Dynamic IP Address on a Firewall Interface (page 362)
Configuring Manual ARP Settings (page 387)
Routing Multicast Traffic (page 447)
To set up VRRP
1. Click the VRRP Settings button in the IP Address properties. The VRRP Settings dialog
opens.
What’s Next?
To add further IP addresses on the same or a different interface, repeat the steps in
Adding an IPv4 Address for a Single Firewall (page 352) or Adding an IPv6 Address for a
Single Firewall (page 355).
To define Modem Interfaces, proceed to Defining Modem Interfaces for Single Firewalls
(page 358).
If you are adding a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
What’s Next?
To add further IP addresses on a different interface, repeat the steps in Adding an IPv4
Address for a Single Firewall (page 352).
To define Modem Interfaces, proceed to Defining Modem Interfaces for Single Firewalls
(page 358).
If you are configuring a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
What’s Next?
To define Modem Interfaces, proceed to Defining Modem Interfaces for Single Firewalls
(page 358).
If you are creating a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
Related Tasks
Configuring Manual ARP Settings (page 387)
Adding Routes for IPS Components (page 453)
Adding an IPv4 Address for a Single Firewall (page 352)
What’s Next?
Adding IPv4 Addresses for a Firewall Cluster (page 357)
3. Select the types of IP addresses that you want to add using the Cluster Virtual IP Address
and Node Dedicated IP Address options. By default, both are selected.
• If the interface does not receive or send traffic that the firewall examines, there is no
need to define a Cluster Virtual IP Address.
• We recommend that you add a Node Dedicated IP Address for each (sub)network that is
located behind the physical interface.
4. If you are adding a Cluster Virtual IP Address, enter the IPv4 Address that is used as the
Cluster Virtual IP Address.
5. If you are adding a Node Dedicated IP Address for the nodes, set the IPv4 Address for each
node by double-clicking the field.
6. Check the automatically filled-in Netmask and adjust it as necessary.
7. If necessary, define the contact address(es) for the Cluster Virtual IP Address (see Defining
Contact Addresses for a Single Firewall or a Cluster Virtual IP Address (page 63) for
detailed instructions):
• Enter the Default contact address or select Dynamic if the interface has a dynamic
default contact address. The default contact address is used by default whenever a
component that belongs to another Location connects to this interface.
• If components from some Locations cannot use the Default contact address, click
Exceptions to define Location-specific contact addresses.
8. If necessary, define the IP contact address for each node in the Node Dedicated IP Address
table by double-clicking the Contact Address cell. The Exceptions dialog opens (see
What’s Next?
If you are configuring a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
Related Tasks
Configuring Single Firewall IP Addresses (page 351)
Configuring Manual ARP Settings (page 387)
Routing Multicast Traffic (page 447)
3. Define the basic Modem Interface properties as explained in the table below.
Option Explanation
Modem
Select the Modem Number to represent the modem in the configuration.
Number
Select the DHCP Index. It is an arbitrary number of your choice that distinguishes
DHCP Index
different DHCP Interfaces from one another.
Enter the PIN code if it is needed for the modem’s SIM card.
PIN Code If the PIN code is included in the configuration and you change the 3G modem’s SIM
(Optional) card after configuring the firewall, you must change the PIN code as described in
Changing/Removing the PIN Code of a Modem Interface (page 360).
Phone Number
Enter the modem’s Phone Number if it differs from the default phone number.
(Optional)
4. Enter the rest of the information (Access Point Name, Username and Password, and
Service Name) according to the instructions that you have received from your service
provider.
What’s Next?
If you are configuring a new firewall, or if you want to change the roles the different
interfaces have in the configuration, proceed to Setting Firewall Interface Options
(page 361).
Otherwise, close the firewall’s Properties dialog and adjust the routing configuration as
necessary as explained in Adding Routes for Firewalls (page 441).
Related Tasks
Changing/Removing the PIN Code of a Modem Interface (page 360)
Configuring Manual ARP Settings (page 387)
Routing Multicast Traffic (page 447)
What’s Next?
Close the firewall’s Properties dialog and refresh the firewall’s policy to transfer the
configuration changes.
Related Tasks
Defining Modem Interfaces for Single Firewalls (page 358)
Option Explanation
Select the Primary Control Interface for Management Server contact. This
interface is used for communications with the Management Server
Control Interface
(Optional) Select a Backup Control Interface that is used if the Primary
interface is not available.
This option defines the IP address that the nodes use if they have to initiate
Default IP for Outgoing
connections (system communications, ping, etc.) through an interface that
Traffic
has no Node Dedicated IP Address. You must select an interface that has
(Firewall Clusters only) an IP address defined for all nodes.
4. Click OK.
What’s Next?
If this is a new firewall, close the Firewall Properties dialog. Configure the routing as
explained in Adding Routes for Firewalls (page 441), and initialize the engines as
explained in Saving an Initial Configuration for Firewall or IPS Engines (page 393).
Otherwise, close the firewall’s Properties dialog and refresh the firewall’s policy to
transfer the configuration changes.
Note – These Aliases are meant for use in the policies of the firewall that has the dynamic
IP address. They are translated to the values of the firewall the policy is installed on, so
they cannot be used in the policies of other components.
Note – If the ADSL Interface is not the management interface, you can change all the ISP
settings for the ADSL Interface directly through the Management Client.
What’s Next?
Close the firewall’s Properties dialog and refresh the firewall’s policy to transfer the
configuration changes.
In the interface configuration for SOHO firewalls, you select the intended use for each physical
interface, define the correct IP address settings per interface type, and optionally activate
wireless LAN for internal and/or visitor access. Only IPv4 addresses are supported on SOHO
Firewalls.
What’s Next?
If you are creating new SOHO firewalls, proceed to Selecting SOHO Firewall Interface
Types (page 364).
See the links below if you are editing a previously created element.
Related Tasks
Defining External Interfaces for SOHO Firewalls (page 366)
Defining Corporate Interfaces for SOHO Firewalls (page 370)
Defining Guest Interfaces for SOHO Firewalls (page 372)
Defining Wireless Settings for SOHO Firewalls (page 373)
2. Select the External interface using the radio button: either ADSL or one of the Ethernet
interfaces. You can have only one external interface: Multi-Link is not supported on SOHO
Firewalls.
• We recommend that you do not designate Interface 1 as External. The External interface
does not allows incoming connections, and the local Web-based administration interface
is accessed through this port. Access to this interface may sometimes help in
troubleshooting and correcting problems.
3. Click the Mode column to select the correct interface mode for the other interfaces.
• A Corporate interface is for internal protected hosts. You must have at least one
Corporate interface. Corporate interfaces allow connections to/from the VPN and local
traffic to/from the other Corporate interfaces. Direct Internet access (outgoing
connections only) can be enabled and disabled as required.
• A Guest interface provides direct Internet access (outgoing connections only). It is not
mandatory to define any Guest interfaces.
• You can also allow wireless access through a Corporate or Guest interface without
allocating a physical interface for this purpose on the appliance. In that case, do not
select the Corporate or Guest mode for any interface.
• You can also mark an interface as Disabled if you do not want to provide any access
through it.
What’s Next?
If you are creating one or more new SOHO Firewall elements, proceed to Defining
External Interfaces for SOHO Firewalls (page 366).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
What’s Next?
If your External interface is one of the Ethernet ports, proceed to Defining Ethernet
External Interface Properties on SOHO Firewalls (page 366).
If you External interface is the ADSL port or an Ethernet port that uses PPPoE, proceed
to Defining ADSL or PPPoE Interface Properties on SOHO Firewalls (page 367).
Illustration 27.13 SOHO Firewall Properties - External Tab with a Static IP Address
What’s Next?
If you are creating one or more new SOHO Firewall elements, continue by Defining
Corporate Interfaces for SOHO Firewalls (page 370).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
3. Click Select for Service Provider and select your service provider from the list.
• If your provider is not listed, first create a new ISP element through the New icon at the
top.
• Apart from the element name and country (which are only for your reference), you must
request the correct settings to use from your service provider.
4. (Optional) Enter the Username and Password for ADSL access if your ISP has provided
these. Use the Hide option to prevent the Password from being displayed in cleartext in the
SOHO firewall properties.
• If the details are required, but not available yet, you can amend this information later
when installing and initializing the SOHO appliance.
5. (Optional) Select the Static DNS settings:
• If the Static DNS option is disabled, the DNS requests are handled according to the local
network configuration.
• If you want to define the DNS servers yourself, select at least a primary DNS server. You
can optionally add a secondary DNS server according to your needs. If you have not
defined the External DNS Server element(s) required, you can create them through the
New icon in the Select Element dialog. Enter a Name and an IP Address for the External
DNS Server element(s).
• The DNS settings defined on the External tab are used by default for all the SOHO
interfaces (External, Corporate, and Guest interfaces). However, you can alternatively
define DNS settings separately for the Corporate interface on the Corporate tab.
What’s Next?
If you are creating one or more new SOHO Firewall elements, continue by Defining
Advanced ADSL Settings for SOHO Firewalls (page 368).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
Illustration 27.15 SOHO Firewall Properties - External Tab - Advanced ADSL Settings
Options Explanation
Password Authentication Protocol: if a password is
PAP
used, it is transferred in unencrypted form.
What’s Next?
If you are creating one or more new SOHO Firewall elements, continue by Defining
Corporate Interfaces for SOHO Firewalls (page 370).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
2. Enter the Local IP Address and Netmask of the SOHO Firewall in the Corporate network. If
you are creating multiple SOHO Firewalls using the wizard, you cannot enter the local IP
address information here, because these IP addresses are defined on the first screen of
the wizard (click Previous to view the information for the various SOHO Firewall elements).
3. (Optional) Click Select for SOHO Gateway Group and choose the correct SOHO Gateway
Group element. You can create a new element using the New button at the top of the dialog
if there is no suitable SOHO Gateway Group element (see Defining Security Gateways
(page 720) for more details).
4. Check the Pre-Shared Key used for the VPN.
• You can use the pre-shared key provided automatically in the Pre-Shared Key field,
manually enter a different pre-shared key, or click Generate to create a new pre-shared
key automatically.
• Enable/disable the Hide option to define if the Pre-Shared Key is displayed in cleartext in
the SOHO Firewall properties.
Caution – The pre-shared key must be long and random to provide a secure VPN. Change
the pre-shared key periodically (for example, monthly). Make sure that it is not possible for
outsiders to obtain the key.
What’s Next?
If you are creating one or more new SOHO Firewall elements that have a Guest interface
configured, proceed to Defining Guest Interfaces for SOHO Firewalls (page 372).
Otherwise, if you want to configure wireless access with the Corporate interface access
policy, proceed to Defining Wireless Security Settings for SOHO Firewalls (page 374).
Otherwise, if you are creating one or more new SOHO Firewall elements, proceed to
Completing the SOHO Firewall Configuration (page 376), or Completing the “Create
Multiple SOHO Firewalls” Wizard (page 376).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
2. Enter the Local IP Address of the SOHO firewall in the Guest network and the Netmask.
3. If you want the SOHO Firewall to act as a DHCP server for the Guest network, select DHCP
Service and fill in the address range for distributing IP addresses.
What’s Next?
If you want to set or change settings for wireless access, proceed to Defining Wireless
Security Settings for SOHO Firewalls (page 374).
Otherwise, if you are creating one or more new SOHO Firewall elements, proceed to
Completing the SOHO Firewall Configuration (page 376), or Completing the “Create
Multiple SOHO Firewalls” Wizard (page 376).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
What’s Next?
Start by Defining Wireless Security Settings for SOHO Firewalls (page 374).
Related Tasks
Defining Wireless Channel Settings for SOHO Firewalls (page 375)
Options Explanation
Enter the Wireless Network Name (SSID). This identifies the
Wireless Network Name (SSID) network to the end-users. Note that the name can be easily read by
anyone within range.
End-users (and anyone else in range) can see the Wireless Network
Enabled Name (SSID) in their list of available networks without further
action.
Wireless SSID The end-users have to type in the Wireless Network Name (SSID) to
Broadcast connect.
Disabled Even if you disable SSID broadcast, anyone within range can easily
discover your wireless network with detection tools widely available
on the Internet.
4. Select the Security Mode. When you select the security mode, the options particular for
that mode are enabled below. We recommend using one of the WPA security modes,
especially for Corporate access.
Option Explanation
Wireless traffic is not encrypted. Anyone within range can freely use this wireless
Disabled
network. We do not recommend using this setting.
Wireless traffic is encrypted with a 40-bit key using the WEP protocol. We do not
WEP 40 recommend using this setting, unless it is necessary to do so for compatibility
reasons.
Wireless traffic is encrypted with a 104-bit key using the WEP protocol. If you
WEP 104
cannot use WPA for compatibility reasons, we recommend you select this setting.
Wireless traffic is encrypted using the WPA or WPA2 protocol. Two modes are
WPA-PSK available for WPA. The WPA mode uses TKIP encryption and the WPA2 mode
uses AES Encryption. WPA2 is the more secure mode.
Same as above, but an external RADIUS server is used to authenticate the users.
WPA Enterprise This is the most secure option offered, and is recommended for Corporate
access if an external RADIUS service is available.
• For more information on the Security modes and their options, see the Firewall/VPN
Reference Guide.
What’s Next?
Continue by Defining Wireless Channel Settings for SOHO Firewalls (page 375).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
2. Select the Usage Area according to where your users will be. This affects how the signal is
transmitted and affects signal quality. Note that this is not a security measure and
selecting the Indoor option alone cannot prevent the signal from escaping outside.
3. Select the Channel. If there are other wireless access points nearby, use channels that are
as far apart as possible to avoid interference.
4. Select the Transmit Power for the signal. Selecting the correct transmit power may require
some experimentation on location. Setting the transmit power lower reduces the
possibilities for unauthorized access and eavesdropping and may alleviate issues of
interference between access points.
What’s Next?
If you are creating one or more new SOHO Firewall elements, proceed to Completing the
SOHO Firewall Configuration (page 376), or Completing the “Create Multiple SOHO
Firewalls” Wizard (page 376).
If you are finished editing the properties of a SOHO Firewall element that has been
created earlier, click OK. Remember to apply the configuration changes through the
engine’s right-click menu.
What’s Next?
If you want to offer VPN connectivity right after importing the configuration, configure the
VPN between a central site and the SOHO firewalls first. See Getting Started With IPsec
VPNs (page 716).
Otherwise, connect the SOHO firewall engine to the Management Server. See Saving an
Initial Configuration for SOHO Firewall Engines (page 395).
What’s Next?
If you want to offer VPN connectivity right after importing the configuration, configure the
VPN between a central site and the SOHO firewalls first. See Getting Started With IPsec
VPNs (page 716).
Otherwise, connect the SOHO firewall engines to the Management Server. See Saving
an Initial Configuration for SOHO Firewall Engines (page 395).
The interface configuration for StoneGate IPS consists of defining the required number of
Physical Interfaces, adding the required number of VLANs (if any), and adding IP addresses or a
traffic inspection role to the interface. IP addresses are required for interfaces that are used for
system communications. The interfaces that have a traffic inspection role work transparently in
the network and do not have IP addresses.
A Physical Interface element is used to activate a network port on the IPS engine. By default, the
numbering of the Physical Interfaces in the Management Client corresponds to the operating
system interface numbering on the engine (that is, Interface ID 0 is mapped to eth0, ID 1 to
eth1, etc.). However, the mapping is not fixed and you can change it through the engine
command line.
Before changing the sensor and analyzer interface configuration, we recommend making a
backup of the Management Server. See Creating Backups (page 795) for more information.
What’s Next?
Start by Defining System Communication Interfaces for IPS Engines (page 378).
Related Tasks
Defining Traffic Inspection Interfaces for Sensors (page 379)
Setting Interface Options for IPS Engines (page 385)
Configuring Manual ARP Settings (page 387)
3. Select an Interface ID. It automatically maps to a physical interface of the same number
during the initial configuration of the engine, but the mapping can be changed as necessary
through the engine’s command line interface.
4. (Not applicable to Analyzers) Select Normal Interface as the interface Type.
5. Click OK. The physical interface is added to the interface list.
6. (Not applicable to Analyzers) If the system communications must use a particular VLAN on
the directly connected network segment:
6a. Right-click the Physical Interface you just added and select NewVLAN Interface. The
VLAN Interface Properties dialog opens.
6b. Type in the correct VLAN ID (1-4094) and click OK.
7. Right-click the Physical Interface or VLAN you just added and select NewIPv4 Address or
NewIPv4 Address. The IP Address Properties dialog opens.
8. Double-click the IPv4 Address cell in the table and enter the IP address. Repeat for each
node if this is a Sensor Cluster element.
9. If necessary, define the contact address for the interface or for each node if this is a
Sensor cluster element by double-clicking the Contact Address cell. The Exceptions dialog
opens (see Defining Contact Addresses for an IPS Engine (page 66) for detailed
instructions).
• Enter the Default contact address at the top of the dialog. The Default contact address is
used by default whenever a component that belongs to another Location connects to this
interface.
• II components from some Locations cannot use the Default contact address, click Add to
define Location-specific contact addresses.
10.Click OK to close the IP Address Properties dialog.
What’s Next?
If you are defining a new Sensor element, proceed to Defining Traffic Inspection
Interfaces for Sensors (page 379).
If you are defining an Analyzer element or editing an existing Sensor element, proceed
to Setting Interface Options for IPS Engines (page 385).
What’s Next?
One Logical Interface (called Default) is in the system by default. If you want to create
both Capture and Inline Interfaces on the same sensor, you must add at least one more
Logical Interface: proceed to Defining Logical Interfaces for Sensors (page 380).
To define a Capture Interface, you must have a Reset interface for it, see Defining Reset
Interfaces for Sensors (page 381).
Defining Capture Interfaces for Sensors (page 381).
Defining Inline Interfaces for Sensors (page 383).
What’s Next?
Defining Reset Interfaces for Sensors (page 381).
Defining Capture Interfaces for Sensors (page 381).
Defining Inline Interfaces for Sensors (page 383).
What’s Next?
Set up the Capture Interfaces that use this Reset Interface as explained in Defining
Capture Interfaces for Sensors (page 381).
Option Explanation
Select an Interface ID. It automatically maps to a physical interface of the same
Interface ID number during the initial configuration of the engine, but the mapping can be
changed as necessary through the engine’s command line interface.
Reset Select the Reset Interface to specify the interface through which TCP connection
Interface resets are sent when Reset responses are used in your IPS policy. For more
(Optional) information, see Defining Reset Interfaces for Sensors (page 381).
Select the Logical Interface. For more information, see Defining Logical Interfaces
Logical for Sensors (page 380).
Interface You cannot use the same Logical Interface element for both Inline and Capture
Interfaces on the same Sensor.
Inspect
Unspecified Deselect this option to make the sensor ignore traffic from VLANs that are not
VLANs included in the sensor’s interface configuration. We recommend that you keep this
option selected if you do not have a specific reason to deselect it.
(Optional)
What’s Next?
Defining Inline Interfaces for Sensors (page 383).
Adding VLAN Interfaces for Sensors (page 384).
If you are creating a new element or you added IP addresses to an existing element,
proceed to Setting Interface Options for IPS Engines (page 385).
If you added a new Interface to an existing element, click OK and refresh the sensor’s
policy to activate the new interface configuration.
Note – Fail-open network cards have fixed pairs of ports. Take particular care to map these
ports correctly. Otherwise, the network cards do not correctly fail open when the sensor is
offline.
Option Explanation
Select an Interface ID. It automatically maps to a physical interface of the same
Interface ID number during the initial configuration of the engine, but the mapping can be
changed as necessary through the engine’s command line interface.
Second Select a Second Interface ID. It automatically maps to a physical interface during the
Interface ID initial configuration of the engine.
Select the Logical Interface. For more information, see Defining Logical Interfaces for
Logical Sensors (page 380).
Interface You cannot use the same Logical Interface element for both Inline and Capture
Interfaces on the same Sensor.
What’s Next?
Adding VLAN Interfaces for Sensors (page 384).
If you are creating a new element or you added IP addresses to an existing element,
proceed to Setting Interface Options for IPS Engines (page 385).
If you added a new Interface to an existing element, click OK and refresh the sensor’s
policy to activate the new interface configuration.
Caution – Do not add any manual VLAN definitions to an interface you want to use for
sending resets. Adding VLANs prevents selecting the interface as a Reset Interface and
also removes the Reset Interface from any existing selections. The sensor automatically
uses the correct VLAN when sending resets.
Note – The VLAN ID must be the same as the ID that is used in the switches that form the
VLAN trunk.
What’s Next?
If you are creating a new element or you added IP addresses to an existing element,
proceed to Setting Interface Options for IPS Engines.
Otherwise, the new Inline Interface definition is finished. Click OK and refresh the
sensor’s policy to activate the new interface configuration.
Option Explanation
Primary
Select the Primary Control Interface. Control Interfaces are used for
(Control communications with the Management Server.
Interface)
Backup
(Control Select a Backup Control Interface that is used if the Primary interface is not
Interface) available.
(Optional)
Select the Primary Heartbeat Interface for communications between the nodes in
Primary
the cluster. This must not be a VLAN Interface.
(Heartbeat
Interface) A dedicated network (without other traffic) is strongly recommended for security and
reliability of heartbeat communications.
(Sensor Clusters
only) In a two-node cluster, a crossover cable without additional intermediary devices is
recommended for the heartbeat link.
Backup
(Heartbeat Select a Backup Heartbeat Interface that is used if the Primary Heartbeat Interface
Interface) is unavailable. It is not mandatory to configure a backup interface for heartbeat
(Sensor Clusters traffic, but we strongly recommend it. If heartbeat traffic is not delivered, the cluster
only, may operate incorrectly.
optional)
Log/Analyzer On Sensors, this is for relaying information about the processed traffic to the
Communication Analyzer for further processing.
Source IP On Analyzers and Sensor-Analyzers, this is for relaying logs and alerts to the Log
Address Server.
4. Click OK.
What’s Next?
If you are creating a new element, configure the routing as explained in Adding Routes
for IPS Components (page 453), and connect the engine to the Management Server as
explained in Saving an Initial Configuration for Firewall or IPS Engines (page 393).
Otherwise, click OK and refresh the sensor’s policy to activate the new interface
configuration.
ARP entries are normally managed automatically based on the routing configuration. It is
unnecessary to add manual ARP entries unless there are ARP-related problems (such as
devices that do not respond to gratuitous ARP requests, or that impose a significant delay on
such operations). Only IPv4 addresses are supported in ARP entries.
You can define static and proxy ARP (Address Resolution Protocol) entries that are generated by
the firewall or IPS engines regardless of the policy installed on the nodes. Manually added ARP
entries can be edited or removed in the Properties dialog for the engine elements.
What’s Next?
Refresh the policy to transfer the new configuration to the engines.
Single Firewalls and Firewall Clusters have an integrated DHCP server that can be set up
independently on several Physical Interfaces and VLANs. When VLANs are configured, the DHCP
server must be set up separately for each VLAN. Only IPv4 addresses are supported. To use this
feature, the firewall interface must have at least one IPv4 address.
Note – You cannot use the internal DHCP server to provide IP addresses to the VPN client
Virtual Adapter.
10
5. Select DHCP Server as the DHCP Mode. The DHCP Server options appear.
6. Enter the beginning and the end addresses of the DHCP Address Range that the firewall
assigns to clients. On Firewall Clusters, the DHCP Address range is automatically divided
between the nodes.
Note – The DHCP address range must be in the same network space defined for the
Physical Interface. The DHCP must not contain the firewall’s NDI/CVI addresses or
broadcast IP addresses of networks behind the firewall.
7. (Optional) Enter the Primary DNS Server and Secondary DNS Server IP address that
clients use to resolve domain names.
8. (Optional) Enter the Primary WINS Server and Secondary WINS Server IP address that
clients use to resolve NetBIOS computer names.
9. Enter the IP address of the Default Gateway through which traffic from clients is routed.
Caution – Enter unique ranges for each node. Overlapping ranges can cause IP address
duplication.
11.Click OK and repeat the steps for all interfaces on which you want to enable the DHCP
server.
12.Allow the DHCP-related traffic in the firewall’s IPv4 Access rules:
• Allow DHCP broadcast messages. Use the BOOTPS (UDP) Service element.
• Allow messages from the DHCP address range defined in Step 6 to the IP address(es)
that the firewall uses towards the clients. Use the BOOTPS (UDP) Service element.
• Allow messages from the IP address(es) that the firewall uses towards the clients to the
DHCP address range defined in Step 6. Use the BOOTPC (UDP) Service element.
What’s Next?
Refresh the policy to transfer the new configuration to the engines.
Related Tasks
To relay clients’ DHCP messages to/from an external DHCP server, see Routing DHCP
Messages (page 445).
Editing Access Rules (page 518)
To maintain the security of your system, the engines establish an authenticated and
encrypted connection with Log Servers and Management Servers.
391
Getting Started with Connecting Engines to the SMC
Prerequisites: See Getting Started with Engine Elements
Configuration Overview
1. Save an initial configuration for the engine on the Management Server. This triggers the
creation of a one-time password that the engine can use to log in to the Management
Server.
2. Make the engine contact the Management Server.
• For Firewall/VPN or IPS engines, see Reconfiguring Basic Engine Settings (page 203).
• For SOHO Firewalls, see the Appliance Installation Guide delivered with the appliance.
• For SSL VPN gateways, see Connecting SSL VPN Gateways to the SMC (page 396).
3. (Not applicable to SSL VPN gateways) Install a policy on the engine to transfer the full
working configuration from the Management Server to the engine.
• For Firewall/VPN or IPS engines, see Installing Policies (page 501).
• For SOHO Firewalls, see the Appliance Installation Guide delivered with the appliance.
What’s Next?
Saving an Initial Configuration for Firewall or IPS Engines (page 393)
Saving an Initial Configuration for SOHO Firewall Engines (page 395)
Connecting SSL VPN Gateways to the SMC (page 396)
This operation allows you to establish a management connection for new engines for the first
time. It also allows you to reconnect previously configured engines that have lost the connection
due to a missing or expired certificate or because the internal certificate authority that signs the
engine certificates has been renewed and the engines have not yet received a new certificate
signed by the new internal certificate authority.
If you are installing a new engine or want to replace the engine’s previous working configuration,
this operation also allows you to save relevant parts of the configuration on a floppy disk or a
USB memory stick and import it during the firewall engine installation.
What’s Next?
Start by Creating One-Time Passwords.
Fingerprint of
Management Server’s
internal certificate
authority
One-time password for
each included node
Note – If there is a firewall between the engine and the Management Server, you must
allow the connection in the firewall’s IPv4 Access rules. If there is a NAT device between
the engine and the Management Server, you must also configure NAT rules for the
connection. Otherwise, the engine cannot contact the Management Server.
What’s Next?
If you want to manually enter details in the engine Configuration Wizard or if the engine
already has the correct configuration, take note of the one-time password and use it for
initial contact from the engine (you can copy the password through the right-click menu).
If you want to perform an automatic USB stick installation or import intial configuration
details into the engine Configuration Wizard, continue by Saving Initial Configuration
Details.
Caution – Because the initial configuration files include the one-time password for
establishing the trust relationship between the Management Server and the engine, the
information must be handled securely.
Caution – If you enable SSH, set the password for command line access after the initial
configuration either through the Management Client or by logging in to the command line.
When the password is not set, anyone with SSH access to the engine can set the
password.
2. (Optional) Select the Local Time Zone and the Keyboard Layout for use on the command
line. Note that the time zone setting is only for displaying the time on the local console; the
What’s Next?
Initialize the node: either power on the engine with a USB stick inserted or power on the
engine and import the configuration into the wizard. See Reconfiguring Basic Engine
Settings (page 203) for detailed instructions.
You must transfer the interface configuration of a SOHO Firewall element to the engine when you
have created a new SOHO firewall or edited the properties of an existing SOHO firewall.
Note – If there is a firewall between the SOHO Firewall and the Management Server, you
must allow the connection in the firewall’s IPv4 Access rules. If there is a NAT device
between the SOHO Firewall and the Management Server, you must also configure NAT
rules for the connection. Otherwise, the SOHO Firewall cannot contact the Management
Server.
6. Import the configuration file in the SOHO Firewall’s Web interface as instructed in the
Appliance Installation Guide delivered with the appliance.
Note – If there is a firewall between the SSL VPN gateway and the Management Server,
you must allow the connection in the firewall’s IPv4 Access rules. If there is a NAT device
between the SSL VPN gateway and the Management Server, you must also configure NAT
rules for the connection. Otherwise, the SSL VPN gateway cannot contact the Management
Server.
The SSL VPN gateway is now configured for monitoring through the Management Client and you
can view its status right away. However, you must configure the SSL VPN appliance separately to
send syslog messages to the Log Server to be able to view logs from the SSL VPN appliance.
The tester runs various checks on the engines and initiates responses based on the success
or failure of these tests.
397
Getting Started with the Engine Tester
Prerequisites: Creating New Engine Elements / Modifying Existing Engine Elements
The engines can be configured with periodical self-tests to ensure proper functioning of each
Firewall, Sensor, and Analyzer engine. SOHO Firewalls do not have a configurable tester.
What the Tester Does
The tester performs checks at certain intervals depending on the state of the engine (online/
offline). Depending on the result, the basic actions the tester can perform are turning the engine
online/offline and/or sending alerts and/or SNMP traps.
Limitations
The tester on the engines also runs internal system tests that cannot be edited or disabled.
These are meant for recognizing certain configuration problems and internal error conditions,
such as nodes in the cluster having different policies.
Configuration Overview
1. Configure the global tester settings that are common for all tests. See Specifying Global
Engine Tester Settings (page 399).
2. Configure the test entries (settings for running individual tests). See Adding Engine Tests
(page 400).
What’s Next?
Proceed to Specifying Global Engine Tester Settings (page 399).
Related Tasks
Removing Engine Tests (page 405)
Disabling/Enabling Configured Engine Tests (page 406)
The global settings of the tester have default values that you can override to meet your needs.
2. Switch to the Tester tab. The global settings of the tester and the currently configured test
entries are displayed.
3. (Optional) Adjust the Alert Interval to specify how long the system will wait before sending
a new alert when the same test keeps failing repeatedly.
• If the interval is too short, the alerts can potentially overload the system or the alert
recipient.
• The default value is 60 minutes.
4. (Optional) Configure Delay After values in seconds. This is the time the engine waits before
it resumes running the tests after the listed events. The delays prevent false test failures
that can occur due to variations in how quickly different processes and subsystems can
start and stop.
• Boot: the default is 30 seconds (maximum: 1800 s)
• Reconfiguration: the default is 5 seconds (maximum: 1800 s)
• Status Change: the default is 5 seconds (maximum: 1800 s)
5. (Optional) Select whether to activate or deactivate Auto Recovery. This determines if the
engine automatically goes back online when a previously failed test completes
successfully. Make sure to run the test in both online and offline states if you activate this
option.
6. (Optional) Select whether to activate or deactivate Boot Recovery. This determines whether
the engine automatically goes back online after a reboot (or events such as a power failure
or system crash) if all offline tests report a success.
What’s Next?
Configure the test entry settings as explained in Adding Engine Tests (page 400).
Some settings are nearly identical for all tests. These common settings are explained below.
Some tests have test-specific settings in addition to the common settings, which are explained
separately for each test (see listing below the steps).
The following tests are available:
• The External test runs a custom script stored on the engine. If the script returns the code
zero (0), the test is considered successful, otherwise the test is considered failed.
• The File System Space tests the free disk space on a hard disk partition.
• The Firewall Policy test (firewalls only) checks if a new policy is activated on the engine. It is
mainly intended for sending SNMP notifications.
• The Free Swap Space test checks the available swap space on the hard disk.
• The Link Status test checks whether a network port reports the link as up or down.
• The link of a Modem Interface (single firewalls only) is up if a modem reports that a call is
in progress.
• The link of an ADSL interface (single firewalls only) is up when the ADSL modem is
connected to a Digital Subscriber Line Access Multiplexer (DSLM), and the ADSL modem
reports that the connection is working.
• The status of Aggregated Links (firewalls only) depends on the link mode. An Aggregated
Link in High-Availability Mode is up if one of the interfaces that belong to the Aggregated
Link is up. An Aggregated Link in Load-Balancing Mode is up if both the interfaces that
belong to the Aggregated Link are up.
• The Multiping test sends out a series of ping requests to determine whether there is
connectivity through a network link. Only IPv4 addresses are supported as target addresses
for the Multiping test.
• The Inline Pair Link Speed test (inline sensors only) checks if the network settings (speed/
duplex) match on the two ports that form the inline pair and can force both ports to use the
same settings.
Test failures can be notified to administrators as Alerts or as SNMP traps (requires that SNMP
is configured as explained in Getting Started with SNMP Configuration (page 432)). Additionally,
a test can switch nodes offline/online based on the result.
3. Select the type of Test you want to configure (see the introduction above for more
information). The settings that apply to the selected test are activated.
Note – Do not select the File System Space or Free Swap Space tests for those StoneGate
appliances that use a flash card instead of a hard disk.
What’s Next?
If you are configuring an External test, configure Additional Settings for the External Test
(page 402).
If you are configuring a System Space test, configure Additional Settings for the File
System Space Test (page 403).
If you are configuring a Swap Space test, configure Additional Settings for the Free Swap
Space Test (page 403).
If you are configuring a Link Status test, configure Additional Settings for the Link Status
Test (page 403).
If you are configuring a Multiping test, configure Additional Settings for the Multiping
Test (page 404).
Otherwise, click OK and refresh the policy to transfer the new configuration to the
engine(s).
Note – The external script has to return an exit code of 0 (zero) if it succeeds. Any non-zero
return value is considered a failure.
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
Note – (Firewalls only) Only the first interface that belongs to an Aggregated Link is shown
in the list of interfaces. However, the Link Status test checks the status of both interfaces
in the Aggregated Link.
2. Click OK.
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
The test entries that you have configured with the tester are displayed in the Test Entries table
in the engine properties. You can deactivate, activate, and remove tests directly in the Test Entry
table.
S Standby
A Alert
What’s Next?
If you want to remove a test permanently, proceed to Removing Engine Tests
(page 405).
If you only want to activate or reactivate a test, proceed to Disabling/Enabling
Configured Engine Tests (page 406).
Otherwise, click OK to close the engine properties.
Removing a test permanently removes the test settings from the selected engine. If you want to
stop a test from running without removing it, see Disabling/Enabling Configured Engine Tests
(page 406).
To remove a test
1. Right-click the Firewall, Sensor, or Analyzer element and select Properties from the menu.
The Properties dialog for that element opens.
2. Switch to the Tester tab.
3. Select the test entry you want to remove in the Test Entries list.
4. Click the Remove button. The test is permanently removed from the selected engine.
5. Click OK.
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
All test entries that you configure are automatically activated and available to the tester after a
policy refresh or install. You can decide to disable any individual test in the Test Entries table or
all of the tests that are applied on a specified node.
What’s Next?
Disabling/Enabling Individual Engine Tests (page 406)
Disabling/Enabling All Custom Engine Tests (page 406)
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
What’s Next?
Refresh the policy to transfer the new configuration to the engine(s).
ENGINE PERMISSIONS
407
Getting Started with Engine Permissions
Prerequisites: Your administrator account must have editing privileges to the engine element
Configuration Overview
1. Define which administrators are allowed to edit and view the element. See Defining an
Engine’s Administrator Permissions (page 408).
2. Define which policies can be installed on the engine. See Selecting Permitted Policies for
an Engine (page 409).
You can either add an Access Control List or an individual Administrator-Administrator Role pair
as permitted on the engine. The rights that the Access Control List grants to the administrators
are defined in the properties of the administrator accounts (defined with Administrator
elements).
An administrator with a restricted account can refresh or upload a policy on an engine only if
both the engine and the policy have the administrator on the list of permitted administrators.
The engines may not accept all policies. This can be adjusted as explained in Selecting
Permitted Policies for an Engine (page 409).
Note – Changes to administrator permissions are immediately distributed and taken into
account in all related elements.
Related Tasks
Defining Administrator Roles and Access Control Lists (page 215)
By default, any policy can be installed on any component as long as the policy is of appropriate
type for the type of engine. To prevent accidental installations of the wrong policy, you can select
the allowed policy for each Firewall, Analyzer, Sensor, or Sensor-Analyzer in the corresponding
element’s properties. The policy selection is enforced regardless of the administrator privileges
that the installing administrator has.
Aliases can be used to represent other network elements in configurations. The value an Alias
takes in a configuration can be different on each engine where the Alias is used.
411
Getting Started with Alias Translations
Prerequisites: Creating New Engine Elements / Modifying Existing Engine Elements
What Aliases Do
You can use Alias elements in your policies to represent IP addresses. Aliases differ from Group
elements in that they do not represent all the elements at once. The Alias elements do not
contain any IP address information themselves. The values that the Aliases receive when they
are encountered in a policy depend on the translation value you set for each Alias in the engine
elements’ properties. This way, the same policy can be used on several engines, and the IP
address information is filled in correctly according to the translation values for each engine.
Alias elements are especially useful in policy templates and sub-policies.
What Do I Need to Know Before I Begin?
Aliases are configured for firewalls and sensors. The analyzer configuration is constructed
based on the translated values you configure for the sensors that send data to the analyzer.
There are some predefined Aliases provided by the system and you can also create new Aliases.
The names of the unmodifiable system Aliases start with two $$ symbols, whereas the user-
modifiable and user-created Aliases start with one $ symbol. For a listing of default Aliases
available in the system, see Predefined Aliases (page 943). The unmodifiable system Aliases
receive their translation values automatically based on the engine’s configuration. User-
modifiable default Aliases do not receive their translation values automatically.
What’s Next?
Defining Alias Translation Values
Alias translation values are set for each engine. You can edit the translation values through the
engine properties (as explained here) or in the properties of the Alias element itself.
What’s Next?
Adding Alias Translation Values (page 413)
Removing Alias Translation Values (page 413)
This section explains the settings on the Advanced tab in the properties of Firewall/VPN and
IPS engine elements, and how to adjust the management connection for SOHO Firewalls.
415
Getting Started with Advanced Engine Settings
Prerequisites: Creating New Engine Elements
“Advanced settings” cover various system parameters related to different features. These
parameters generally have default values that are appropriate for most installations without any
need for adjustments, or values that can be overridden in policies rule-by-rule when exceptions
are needed.
Caution – Improper adjustments to some of the advanced settings may seriously degrade
the performance of the system.
Related Tasks
Adjusting SOHO Firewall Management Connection (page 430)
The System Parameters section on a Firewall element’s Advanced Settings tab contain settings
that relate to how the single or clustered firewall behaves under certain conditions. The table
below explains the available settings.
With the option selected, the engine’s certificate for Does not renew VPN certificates.
system communications is automatically renewed Automatic certificate renewal for
Automated Node before it expires. Otherwise, the certificate must be internally signed VPN certificates is
Certificate renewed manually. set separately in the Internal
Renewal Each certificate for system communications is valid for Security Gateway element
three years. If the certificate expires, other properties. See Defining Security
components refuse to communicate with the engine. Gateways (page 720).
FIPS-Compatible Activates a mode that is compliant with the Federal See the Common Criteria User’s
Operating Mode Information Processing Standard FIPS 140-2. Guide for more information.
The Traffic Handling Parameters section on a Firewall element’s Advanced tab contain settings
that relate to how the single or clustered firewall treats certain traffic conditions. The table
below explains the available settings.
You can check and adjust some of the settings related to how the firewall cluster behaves and
exchanges information from node to node as explained in Adjusting General Clustering Options
(page 419).
If you are an advanced user, it is also possible to tune settings related to how the traffic load is
balanced between several online nodes as explained in Tuning the Firewall Load Balancing Filter
(page 421). However, we strongly discourage you from modifying the load balancing settings
unless Stonesoft’s technical support instructs you to make particular changes.
Caution – Setting the Heartbeat values too low may result in unnecessary heartbeat
failures. Setting the values too high may cause unnecessary service outages when a failure
occurs.
Note – We strongly recommend using Access rule options to disable state synchronization
for specific traffic rather than adjusting the State Sync settings for the cluster. See Defining
Access Rule Action Options (page 522) for more information.
7. (Optional) Adjust the Full Sync Interval and Incr Sync Interval to determine how frequently
the full synchronizations and incremental synchronizations are done. Do not set the values
much higher or lower than their defaults (5000 ms for full, 50 ms for incremental)
Caution – Adjusting the Sync Intervals has significant impact on the cluster’s performance.
Inappropriate settings seriously degrade the firewall’s performance.
What’s Next?
If your cluster is in load-balancing mode and you want to change settings related to how
traffic is balanced, see Tuning the Firewall Load Balancing Filter (page 421).
Otherwise, refresh the firewall’s policy to transfer the changes.
Caution – Do not manually tune the load balancing filter unless you are absolutely certain
it is necessary. Normally, there is no need to tune the load balancing filter, because
StoneGate generates all required entries automatically. Unnecessary tuning may adversely
affect the operation of the filter.
The load balancing filter of the firewall cluster can be tuned by adjusting some parameters and
filter entries. You can define the connections where packets are passed or blocked by the filter.
You can select certain connections to be passed on one node while they would be blocked on
another node. You can also configure the port numbers to be ignored in load balancing. The
filter entries are specified in the Filter Entries table. Only IPv4 addresses are supported in load
balancing filters.
What’s Next?
Manually Tuning the Load Balancing Filter
Caution – Enabling the “Load Balancing Filter Uses Ports” option is not compatible with
some features, such as client-to-gateway VPNs.
What’s Next?
If required, continue with the definition of filter entries in Adding Load Balancing Filter
Entries.
Otherwise, refresh the firewall’s policy to transfer the changes.
What’s Next?
Refresh the firewall’s policy to transfer the changes.
Communication between the Management Center and a single firewall can be reversed so that
the firewall opens a connection to the Management Server and maintains it open waiting for any
commands. This can be necessary if the firewall does not have a static IP address that the
Management Server can contact (dynamic IP address on the interface of intermediate dynamic
NAT) or if the Management Server’s connections are blocked because of a traffic filtering device
in between the components. The frequency of the contacts and the timeouts used are set in the
firewall's properties.
What’s Next?
Refresh the firewall’s policy to transfer the changes.
Related Tasks
For the option for changing the management contact direction, see Setting Firewall
Interface Options (page 361).
What’s Next?
If you have not yet defined which traffic is selected for anti-virus inspection, modify the
IPv4 Access rules in the Firewall Policy. Proceed to Editing Access Rules (page 518).
Otherwise, refresh the firewall’s policy to transfer the changes.
You can configure SYN Flood Protection to protect the firewall from SYN flood attacks.
The global SYN Flood Protection settings that you define in the firewall properties as explained
below are applied as default settings on all interfaces. You can also define SYN Flood Protection
and override the global settings in each interface’s properties (see Configuring Advanced
Interface Properties for Firewalls (page 349)).
Caution – The recommended values for the SYN Flood Settings depend on your network
environment. If the Custom settings are not carefully configured, the capacity of the
firewall engine may suffer or SYN Flood Protection may not work correctly.
5. Click OK.
What’s Next?
Refresh the firewall’s policy to transfer the changes.
Related Tasks
Configuring Log Handling Settings
Log Handling settings allow you to adjusts logging when the log spool on the engines fills up.
Logs are spooled locally when the Log Server is not available.
You can also configure Log Compression to save resources on the engine. This is useful in
situations in which the routing configuration generates a lot of antispoofing logs or the number
of Discard logs becomes high (for example, as a result of a SYN flood attack).
The general Log Compression settings you define in the firewall properties are applied as
default settings on all interfaces. You can also define Log Compression and override the global
settings in each interface’s properties (see Configuring Advanced Interface Properties for
Firewalls (page 349)).
What’s Next?
Refresh the firewall’s policy to transfer the changes.
The Advanced Settings for Sensor-Analyzers are a combination of the settings found in the
properties of Analyzer and Sensor elements. Follow the steps for those components in the
relevant parts.
The table below explains the available settings on the Advanced tab of Analyzer Properties.
Defines how quickly sensors switch over to the backup Sensors do store data locally if
analyzer if this analyzer fails to respond. The default the analyzer does not respond,
value is 120 seconds. and send it to the backup
Timeout for
Make sure the failover time is appropriate for your analyzer after the failover.
Failover to Backup
environment. Analyzers do not synchronize data However, as the traffic flows,
Analyzer
between each other, so a failover causes a momentary commands such as blacklisting
lapse in the event correlation process, and you do not traffic may then be triggered very
want failovers to occur unnecessarily. late.
The table below explains the available settings on the Advanced tab of Sensor and Sensor
Cluster Properties.
What’s Next?
Refresh the sensor’s policy to transfert the configuration changes.
By default, the connection between a SOHO firewall engine and the Management Server is
always open. The SOHO firewall reopens the connection immediately if the connection is cut.
Alternatively, you can choose to have the connection automatically closed after a period of
inactivity and have the SOHO firewall periodically check if the Management Server has any
pending commands for it.
If the connection is closed at the time commands are issued, the commands are left pending in
a queue on the Management Server. When the SOHO Firewall reconnects to the Management
Server the next time, the Management Server issues the pending commands. After the
commands are issued, the connection between the SOHO Firewall and the Management Server
is closed again.
What’s Next?
Apply the configuration change on the SOHO firewalls through their right-click menu.
SNMP is a standard protocol that different equipment can use to send network management
related information to each other. StoneGate engines can be set up to send out SNMP traps
to external equipment.
431
Getting Started with SNMP Configuration
Prerequisites: None
StoneGate firewall and IPS engines can send SNMP traps on system events such as when a
test fails (depending on their configuration), for example, to a central network monitoring
system. An SNMP Agent element is a reusable container for the settings according to which the
engines send SNMP trap messages to compatible external software. A single SNMP Agent can
be created once and used on multiple engines by selecting the correct SNMP Agent in the
engine’s properties.
What Do I Need To Know Before I Begin?
StoneGate’s SNMP agent supports SNMPv1 (RFC1157), SNMPv2c (RFCs 1901 and 3416), and
SNMPv3 (RFC 3414). Check the documentation of the receiving software for information on
which version to use.
The StoneGate MIBs are included on the Management Center CD-ROM. For more information on
the traps StoneGate sends, see SNMP Traps and MIBs (page 961)
Limitations
SNMP traps cannot be configured for SOHO firewalls.
What’s Next?
Configuring SNMP Version 1 or 2c
Configuring SNMP Version 3 (page 433)
If you want to use SNMPv3, configure the agent as explained in Configuring SNMP Version 3
(page 433). Otherwise, follow the directions below.
What’s Next?
Configuring What Triggers SNMP Traps (page 434)
What’s Next?
Configuring What Triggers SNMP Traps (page 434)
The trap parameters control where and how SNMP traps are sent. The Destinations field is
important. If it is left empty, no traps are sent, and the other trap parameters are ignored. If the
Destinations field has a value, the rest of the trap parameters must also have a value.
What’s Next?
Activating the SNMP Agent on Engines (page 435)
What’s Next?
If you want to create a Test Entry that sends a notice using the SNMP Agent, proceed to
Adding Engine Tests (page 400).
Otherwise, refresh the engine’s policy to transfer the changes. For more information on
the traps StoneGate sends, see SNMP Traps and MIBs (page 961).
437
438
C HAPT ER 34
CONFIGURING ROUTING
Routing and the related antispoofing configuration is done entirely in the Management Client.
For the most part, this information is automatically filled in according to the interfaces defined
for each engine.
439
Getting Started with Routing
Prerequisites: None
Configuration Overview
1. Add the default route. See Adding Routes for Firewalls (page 441) or Adding Routes for
IPS Components (page 453).
2. Add routes to networks that are not directly connected, but require a next-hop gateway.
See Adding Routes for Firewalls (page 441).
Related Tasks
To configure the firewall to relay DHCP messages, proceed to Routing DHCP Messages
(page 445).
To define a route for multicast traffic, proceed to Routing Multicast Traffic (page 447).
To define a route that sends connections to different destinations based on both source
and destination, proceed to Defining Policy Routing (page 451).
Firewalls route network traffic. You must add a default route and any routes through next-hop
gateways to networks that are not directly connected to the firewalls. On firewall clusters, the
routing information is configured simultaneously for all cluster nodes and all nodes always have
identical routing tables.
What’s Next?
To define only one route to the same destination or to define a single route for
interfaces that belong to an aggregated link, proceed to Defining a Single-Link Route for
a Firewall.
To define two or more alternative routes to the same destination, proceed to Defining a
Multi-Link Route for a Firewall (page 442).
Note – Placing the Any network element behind two different basic router elements does
not create true router redundancy and load balancing. Use NetLink elements instead. See
Defining a Multi-Link Route for a Firewall.
What’s Next?
Install the policy to transfer the changed configuration to the firewall.
What’s Next?
Creating NetLinks (page 443)
Note – Only NetLinks that are using in an Outbound Multi-Link element are probed. Status
monitoring is not available for NetLinks that are only used in Routing. See Getting Started
with Outbound Traffic Management (page 460) for more information about Outbound Multi-
Link configuration.
Setting Description
Enter an IP address and click Add. The IP addresses that are probed with ICMP echo
requests (ping) to determine if the link is up. Repeat this for each IP address you want
IP Address
to add. We recommend entering more than one address to avoid excluding the link in
case the host that is probed goes down.
Define how often the NetLink is probed when it is in Active/Standby mode. Leave the
setting for Standby Mode as 0 if you prefer not to test this link when it is on standby
Period
(this is meant to minimize costs for links that are charged based on use rather than at
a fixed rate).
Define how long the firewall waits before it considers the probe failed. Change the
Timeout
setting for Standby Mode to 0 if you prefer not to test this link when it is on standby.
10.(Optional) If you plan to use the ratio-based load balancing method, fill in the Input Speed
and Output Speed based on the real-life bandwidth this network connection provides.
These values are used to calculate how much traffic each link receives in relation to the
other links.
11.Click OK.
What’s Next?
Repeat these steps to add any other NetLinks to the Routing tree.
If you are finished adding NetLinks, define a route through the NetLinks as explained in
Adding a Multi-Link Route (page 444).
Note – The network interfaces for the NetLinks must have a Node Dedicated IP Address
defined for all nodes in clusters. Otherwise, the IP address of the interface marked as the
default IP address for outgoing connections is used, which may lead to incorrect load
balancing. See Configuring Firewall Cluster IP Addresses (page 356).
Caution – If you use Multi-Link with IGMP proxy multicast routing, make sure that you do
not create routing loops. If you add a NetLink to the upstream interface, do not add a
NetLink to any downstream interface.
What’s Next?
Repeat these steps for any additional NetLinks.
Otherwise, the Multi-link Routing configuration is complete.
Related Tasks
To use Multi-Link to balance outbound traffic, see Getting Started with Outbound Traffic
Management (page 460)
What’s Next?
If you have already configured the DHCP server that you want to use for relaying DHCP
messages, start by Enabling DHCP Relay (page 447).
Otherwise, start by Defining a DHCP Server.
Note – Only IPv4 addresses are supported for DHCP relay in the Management Center.
5. A Location and Contact Address is needed if there is a NAT device between a firewall and
the server, so that the firewall cannot connect directly to the IP address defined for the
interface. See Defining Locations (page 61) and Defining Contact IP Addresses (page 62)
for more information.
6. Click OK to apply the changes to the DHCP Server properties.
What’s Next?
Configure the firewall to relay DHCP messages as explained in Enabling DHCP Relay
(page 447).
Related Tasks
To use the DHCP server to assign virtual IP addresses to VPN clients, see Configuring the
Gateway for Virtual IP Address Clients (page 787).
What’s Next?
To allow DHCP relay in the Access rules, proceed to Activating the DHCP Relay Sub-
policy (page 447).
Note – The sub-policy contains rules for both local DHCP relay between internal networks
and the DHCP relay for VPN clients. If just one of these DHCP relay features is active, the
rules for the other feature are invalid and ignored when the policy is installed.
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
Related Tasks
To monitor the DHCP relay more closely during testing, you can activate DHCP relay
diagnostic logging on the firewall. See Enabling/Disabling Firewall/VPN Diagnostics
(page 193).
Note – In addition to configuring StoneGate, routers and other network devices must be
configured to allow IP multicasting along the path to the client machines.
What’s Next?
To define static IP multicast entries, continue by Defining Static Multicast (page 448).
To configure IGMP Proxy multicast routing, continue by Defining IGMP-Based Multicast
Forwarding (page 449).
Note – Make sure your IPv4 Access rules allow the static multicast traffic to pass through
the firewall (see Editing Access Rules (page 518)).
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
5. (Optional) Select the Upstream Interface and the IGMP Version for it.
• If the multicast servers and the hosts are in the local networks, or if you want to limit the
multicast to the local networks, it is not necessary to define the Upstream Interface. In
that case, leave Not Set selected for Upstream Interface.
• (Firewall Clusters only) You can only select as the Upstream Interface an interface that has
a Cluster Virtual IP Address (CVI). You cannot select a Heartbeat Interface as the
Upstream Interface.
• The default IGMP version is version 3. You may need to select another IGMP version, for
example, to troubleshoot multicast accessibility on hosts, or if some hosts use a lower
IGMP version.
6. Click Add to define Downstream Interfaces. A new entry appears in the table.
• The firewall periodically queries the downstream networks for hosts that want to join or
leave the multicast host group.
7. Click the Interface cell and select the Downstream Interface from the list.
• You can use the same Physical Interface, VLAN Interface, or (single firewalls only) Modem
Interface only once in the IGMP proxy configuration.
• (Firewall Clusters only) The interface that you select as a Downstream Interface must have
Node Dedicated IP Addresses (NDIs). It cannot be a Heartbeat Interface. It is
recommended that the Node Dedicated IP Addresses increase in the same order on each
node: for example, 192.168.1.10 and 192.168.2.10 for node A, and 192.168.1.11 and
192.168.2.11 for node B.
Note – The downstream interfaces must have the lowest IP addresses among all the IGMP
queriers in the local networks.
8. Click the IGMP Version cell and select the IGMP version for the downstream interface. The
default version is IGMP version 3. You may need to select another IGMP version, for
example, to troubleshoot multicast accessibility on hosts, or if some hosts use a lower
IGMP version.
9. Repeat from Step 6 to define more Downstream Interfaces.
Note – Make sure your IPv4 Access rules allow this traffic to pass through the firewall (see
Editing Access Rules (page 518)).
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
Note – Policy routing is only used if duplicate IP addresses are used in different networks.
To configure alternative routes to the same destination, use Multi-Link routing (see
Defining a Multi-Link Route for a Firewall (page 442)).
Policy routing entries are applied before the regular routes defined in the Routing tree (overriding
those configurations if matches are found), and they are processed exactly in the order
specified in the Policy Routing window; the first matching policy routing entry is applied to a
connection and any further entries are ignored.
Only IPv4 addresses are supported in policy routing.
3. Click the Policy Routing button. The Policy Routing dialog opens.
Setting Description
This is always something other than the default 0.0.0.0 that matches
Source IP Address any IP address (such configurations can be handled more easily with the
normal routing tools in the Routing view).
The IP address of the device to which packets that match the source/
Gateway IP Address
destination pair are forwarded.
6. Repeat from Step 4 to create any additional policy routing entries, then click OK. The Policy
Routing dialog closes.
7. Click OK. The Properties dialog closes.
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
Related Tasks
Policy routing entries are not automatically added to the Antispoofing view, so you may need
to update the antispoofing information manually. See Modifying Antispoofing for Firewalls
(page 454).
IPS components do not route traffic. Sensor interfaces that pick up traffic for inspection do not
need any manual routing configuration. You may need to define a default route if the
Management Center (Management Servers and Log Servers) and other system components are
not located on a directly connected network. Other routes may be needed in addition to the
default route if one or more system components are not directly connected and cannot be
reached through the default gateway. The IPS system communications include:
• management connections (all StoneGate IPS components)
• communication to Analyzer (Sensors only)
• communication to Log Server (all StoneGate IPS components)
• blacklisting commands to StoneGate firewalls and sensors (Analyzers only).
What’s Next?
Refresh the IPS policy on the Sensor to transfer the changed configuration.
Related Tasks
You may want to do a quick check with a few IP addresses to test your routing configuration.
See Checking Routes (page 456).
You can remove any element you have added to the routing tree yourself at any time. Elements
that are added automatically based on the IP addressing of the interfaces cannot be removed
while they are still in use. Use the Access rules to control access to/from such addresses (see
Editing Access Rules (page 518)).
Automatically added elements corresponding to a previous configuration are not automatically
removed when the IP address of an interface is changed to prevent any possible manual routing
definitions from being deleted accidentally. Instead, the elements that belong to the old
configuration are shown as invalid and you must remove the obsolete elements manually.
Removing elements from routing does not delete the elements from the system.
What’s Next?
If you want antispoofing to allow connections that would otherwise be dropped, see
Deactivating Antispoofing for an IP Address/Interface Pair (page 455).
If you want antispoofing to drop connections that it currently allows, see Activating
Antispoofing for Routable IP Addresses (page 456).
Note – Errors in the routing configuration (in StoneGate or in the surrounding network) can
cause legitimate packets to be incorrectly identified as coming from a spoofed IP address.
Always check that the routing is configured correctly before modifying antispoofing. For
example, routing loops generate log messages about spoofed packets, which cannot be
removed by any antispoofing changes.
By default, the firewall interprets the antispoofing tree by picking the most specific entry defined
in the view (for example, a definition of a single IP address is picked over a definition of a whole
network). In the default mode, if some IP address must be allowed access through two or more
different interfaces, the definition for each interface must be at the same level of detail for the
IP address in question.
Example If Interface A contains a Host element for 192.168.10.101 and Interface B contains a
Network element for 192.168.10.0/24, connections from 192.168.10.101 are considered by
default spoofed if they enter through Interface B, even though the address is included in the
Network element. The antispoofing configuration must be modified to allow the address also
from Interface B.
To configure antispoofing
1. Select ConfigurationAntispoofing from the menu. The Antispoofing view opens.
2. Select the correct Firewall element from the list above the Antispoofing tree.
3. Add the element that represents the IP addresses for which you want to create an
exception to the Antispoofing tree in one of the following ways:
• Drag and drop an existing element on top of the interface through which you want the
element’s IP address(es) to be available.
• Create a new element by right-clicking the Network element under the correct interface
and selecting New(type of element).
4. (Optional) If you want to allow all connections from a network through a specific interface,
right-click the network under the correct interface and select Absolute. All the IP addresses
that belong to that network are now allowed for the interface, although more specific
antispoofing definitions for some addresses in the network may be defined for other
interfaces.
Caution – Never mark the Any Network element as Absolute. Disabling antispoofing in this
way is a security risk. Resolve large-scale antispoofing conflicts with specific antispoofing
definitions or by changing routing.
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
Note – Disabling or removing elements in the Antispoofing view prevents access. The IP
addresses a disabled or removed element represents are considered spoofed addresses.
What’s Next?
Refresh the policies of all affected engines to transfer the changed configuration.
Checking Routes
Prerequisites: None
The Routing view includes a Route Query tool that you can use to check where packets with a
certain IP address are routed according to the current definitions. The tool helps you check that
the routing is correct and to quickly find a particular branch in the Routing tree.
Policy routing is not considered in this query. The route query uses the configuration that is
currently stored on the Management Server (shown in the Management Client). You must
refresh the policy of the affected engines after completing the configuration to transfer the
changed routing information.
4. Enter an IP address and click Query. The route is shown in the space below.
StoneGate firewall’s Multi-Link feature allows you to distribute outbound traffic between two or
more Internet connections to provide high availability and load balancing for outbound traffic.
459
Getting Started with Outbound Traffic Management
Prerequisites: See the Configuration Overview below
Network NetLink
Firewall
Policy
Outbound
Multi-Link
QoS Class
1. Configure routing with at least two NetLinks. See Defining a Multi-Link Route for a Firewall
(page 442).
2. If you want the firewall to select the NetLink based on the type of traffic, create QoS Classes
and assign them to traffic. See Getting Started with QoS (page 616).
3. Create an Outbound Multi-Link element to group your NetLinks and define traffic
management settings. See Configuring Outbound Multi-Link Settings (page 461).
4. In the Firewall Policy, create a NAT rule in for outbound load balancing. See To define NAT
rules for outbound load balancing (page 465).
Outbound Multi-Link elements are used for combining NetLinks and for setting options for the
high availability and load balancing features.
There are two methods for link selection. If link selection is based on Round Trip Time, engines
send a connection to all the links, and then select the link that delivers the response the
fastest. The link selection can also be based on a Ratio of the relative bandwidth of each
NetLink. You must configure the basic settings for these methods in the properties of each
NetLink (see Creating NetLinks (page 443)).
What’s Next?
Combine your NetLinks into Outbound Multi-Link element(s). Proceed to Creating an
Outbound Multi-Link Element (page 462).
What’s Next?
Continue by Selecting NetLinks for an Outbound Multi-Link (page 463).
2. Select a NetLink.
3. Select the Network element that represents the IP address space in the directly connected
external network of this network link.
4. In the Selected Range fields, specify the IP address range for dynamic source address
translation (NAT) for the internal source IP addresses on this NetLink. To define a single IP
address, enter the same address in both fields.
• Since Multi-Link works without external arrangements, the address translation is
necessary for correct routing of packets.
5. Select the Type:
• Active: traffic is routed through the NetLink according to the Method you specify in the
Outbound Multi-Link element properties.
• Standby: traffic is only routed through the NetLink if all primary (active) NetLinks become
unavailable.
6. (Optional) Select the QoS Classes for traffic handled by this NetLink and click Add. You can
use the QoS classes to assign the NetLink with or without activating the actual QoS
features. For more information, see Getting Started with QoS (page 616).
• You can select the same QoS class for several NetLinks to balance the traffic between the
NetLinks. If none of the NetLinks with the appropriate QoS class are available, or if the
traffic has not been assigned a QoS class, the traffic is distributed between the NetLinks
according to the Method you specify in the Outbound Multi-Link element properties.
• QoS classes are assigned based on ToS codes in network traffic or in the Access rules.
Traffic that has been assigned the selected QoS class uses this NetLink if the NetLink is
available.
7. Click OK. The Multi-Link Member dialog closes, and the NetLink is listed in the Multi-Link
Members list.
What’s Next?
If you want to define how information on NetLink performance is cached, continue by
Defining Destination Cache Settings (page 464).
Otherwise, proceed to Creating Outbound Load Balancing NAT Rules (page 465).
Related Tasks
Changing NetLink State Manually (page 195)
2. Deselect Default.
3. Enter the Timeout (in seconds) after which a new measurement of NetLink performance is
made. The default is 3600 seconds.
4. Enter the number of Maximum Retries for checking each NetLink. The default is 2.
5. Click OK.
What’s Next?
Continue by Creating Outbound Load Balancing NAT Rules (page 465).
To balance outbound connections between the NetLinks, you must define NAT rules using the
source NAT addressing defined in the Outbound Multi-Link element.
You can create several Outbound Multi-Link elements to balance different types of traffic
differently. If there is some traffic that you do not want to balance at all, you can direct traffic
through a specific NetLink with a normal NAT rule that translates the source using a particular
NetLink's address space and matches the desired connections before the balancing rule.
Note – Make sure that the IP address pool and port range are large enough to translate
the number of simultaneous connections that match this NAT rule.
What’s Next?
To follow up on how your Multi-Link configuration works, see Monitoring And Testing
Outbound Traffic Management (page 466).
To configure inbound traffic management, see Getting Started with Inbound Traffic
Management (page 468).
VPNs have independent link selection. To configure active and standby links (tunnels)
for VPNs, see Defining VPN Tunnel Settings (page 746).
The status of the different NetLinks can be monitored in the System Status view. See Getting
Started with System Monitoring (page 84). Status is displayed based on the results of status
probes to the Probing addresses configured in the NetLink elements.
You can test that the outbound traffic management configuration works as intended by
generating traffic and then disabling network connections, for example, by unplugging cables (in
a cluster, disable the same link on all active nodes to simulate ISP failure).
Note – By default, if you unplug a cable from a node in a cluster, the automatic engine
tester recognizes this as a malfunction and turns the node offline (unless it is the last node
that remains online). To override this automatic test, command all nodes to “Lock Online”
for the duration of the test.
Most connections that are currently open on the link that goes down are cut and must be
reopened by the communicating applications, since the external IP address used in the
communications changes to an address of the new link. Any type of traffic can switch to using a
different link completely transparently if it is transported through a Multi-Link VPN between two
StoneGate Firewall/VPN engines.
If the Ratio-based load-balancing method is used, a link is used until a failure is detected based
on the link status probes to the Probing addresses configured in the NetLink elements. With
the Round Trip Time method, new connections are directed to working links (since the link that
responds the fastest is chosen) even if probing is not configured or working.
Related Tasks
Getting Started with the Engine Tester (page 398).
Firewalls allow you to set up a server pool that distributes the load of incoming traffic between
a group of servers and/or allows controlling the NetLink use of incoming traffic in a Multi-Link
setup. This ensures that services remain available even when one or more servers or
NetLinks fail, and balances the load of incoming traffic more efficiently between a group of
servers.
467
Getting Started with Inbound Traffic Management
Prerequisites: None
1. Create Host elements for all servers you want to include in the server pool (unless already
defined).
2. Define a Server Pool element and define settings for server load sharing and inbound
traffic management (see Defining a Server Pool (page 469)).
3. Check that the IP addresses defined as the servers’ public, external addresses in the
Server Pool properties correspond to the entries for them in the DNS server (see Entering
the Server Pool’s IP Addresses on Your DNS Server (page 488)).
4. Modify your policy to include inbound traffic management (see Creating Access Rules for
Inbound Load Balancing (page 489)).
5. (Optional) If you want to use Server Pool Monitoring Agents, install, configure, and enable
them (see Installing Monitoring Agents (page 472)).
6. (Optional) If you want to send dynamic DNS (DDNS) updates to a DNS server when
NetLinks go down, configure the updates (see Configuring Dynamic DNS Updates
(page 490)).
The Server Pool element collects servers that provide a particular service into a single element
and defines the settings for handling the inbound traffic.
What’s Next?
Begin by Creating a New Server Pool Element.
What’s Next?
Continue by Defining Server Pools’ External Address(es).
Note – Make sure your NAT rules do not overlap with the NAT of the Server Pool.
2. Select the NetLink you want to use, or if you want to configure load sharing for the servers
but no traffic balancing between NetLinks, select Not Specified.
3. For the Network, select the Network element that is used for the Server Pool’s external
NATed address.
4. Define the external NATed destination IP Address for the Server Pool. This is the address
client machines contact when accessing the service that the server(s) in the pool offer.
Note – The IP address you enter here must be reserved for NAT and it must not be used by
any equipment in your network. Remember to update your DNS server with any changes in
IP addressing.
5. In Status, select Enabled to use the NetLink for the Server Pool.
6. (Recommended) Select Proxy ARP Entry Generation to automatically generate a proxy ARP
for the NATed address in the selected Network. Otherwise, you must define the ARP entry
manually in the Firewall element properties.
What’s Next?
Continue by Adding Server Pool Members.
Note – Consider the type of traffic when selecting the allocation method. Using the Host
setting (if the host’s IP address apparent to StoneGate can change) or the Connection
setting (in all cases) means that connections from the same source may be directed to
different servers. Depending on the services offered, this may deteriorate service quality.
4. Define the Monitoring mode for the availability of the servers in the Server Pool.
• Select Ping if you want StoneGate to monitor the availability of the servers by using
periodical ICMP echo request (ping) messages.
• Select Agent if you want to use the Server Pool Monitoring Agent feature. The default port
for the servers to listen on is UDP 7777, but you can select a different port in the Port
field.
What’s Next?
If you are using Monitoring Agents, continue to Installing Monitoring Agents (page 472).
Otherwise, continue to Entering the Server Pool’s IP Addresses on Your DNS Server
(page 488).
Server Pool Monitoring Agents are installed on the servers that form the pool to report about the
server’s health and load. The firewall uses the information to send traffic to the server that can
best handle the additional load and not send new connections to a server that is inoperative.
You must install the Server Pool Monitoring Agents onto all members of the Server Pool.
To install in Windows
1. Copy the ServerPool_Monitoring_Agent_Installer\Windows\ directory from the
StoneGate Management Center installation CD to the Server Pool member on which you
wish to have the Monitoring Agent installed.
2. Run the self extracting installation program sgagent.exe.
3. Repeat these steps on all Server Pool members.
What’s Next?
Proceed to Configuring Monitoring Agents (page 474).
To install in Linux
1. Copy the ServerPool_Monitoring_Agent_Installer/Linux/ directory from the
StoneGate Management Center installation CD to the Server Pool member on which you
wish to have the Monitoring Agent installed.
2. Go to the location where the directory was copied, and extract the SGFWagent package.
Then run the rpm command. For example, you can use the following commands. The name
of the .rpm file may vary depending on the version you are using.
cp SGFWagent.tar /var/spool/pkg
cd /var/spool/pkg
tar -xf SGFWagent.tar
rpm -i sgagent-4.0.0.build403-1.i386.rpm
What’s Next?
Proceed to Configuring Monitoring Agents (page 474).
cp SGFWagent.tar /var/spool/pkg
cd /var/spool/pkg
tar -xf SGFWagent.tar
pkgadd
What’s Next?
Proceed to Configuring Monitoring Agents (page 474).
The Monitoring Agents are configured in two files: sgagent.local.conf and sgagent.conf.
Both files are found in the following directory on each server:
• Solaris: /opt/sgagent/etc/
• Linux: /etc/stonegate/
• Windows: Program Files\Stonesoft\StoneGate Monitoring Agent\
The sgagent.local.conf file contains server-specific information, and is different for each
server. If you do not want to change the default values, there is no need to edit this file.
The sgagent.conf file contains information that refers to the entire Server Pool.
What’s Next?
To define settings specific to individual servers, proceed to Editing sgagent.local.conf
(page 474).
If you only want to configure global settings for all servers, proceed to Editing
sgagent.conf (page 475).
Editing sgagent.local.conf
The server-specific file sgagent.local.conf includes information to identify the Server Pool
member if default values are not used. If the file is not configured, the Monitoring Agent uses
the system host name as the default value to identify the member. If edited, this file must be
different on each Server Pool member.
Statement Description
Specifies hostname of the server. If no value is defined, the system host name
host hostname
is used.
set alias Defines the value of an alias that can be used as a variable in the global
value sgagent.conf configuration.
For example, to configure the member of the pool where sgagent.local.conf resides to use
server1 as its host name, and to set the alias hostip to 192.168.1.1:
host server1
set hostip 192.168.1.1
What’s Next?
Proceed to Editing sgagent.conf (page 475).
What’s Next?
Proceed to Editing the sgagent.conf Statement Section (page 476).
Statement Description
If you wish a statement to apply to certain Server Pool members only, the
statement must start with the begin host command followed by the name of
the Server Pool member.
The begin host command may be followed by actual server names or an
exclusion. In an exclusion, begin host is followed by not and the server name,
instead of just a server name. This indicates that the setting is to be applied to
begin host hostname all other servers except the one specified.
For example, the following statement would apply to all members in the pool
except server1:
begin host not server1
config settings
end
config
[port port_number]
[boot-delay time]
[alert-interval time]
[alert-script path]
[startup-script path] Defines the option in question. See Options in the sgagent.conf Statement
[overload-script path] Section (page 477) for more information about the options. If a statement
[listen IP_address applies to all members in the pool, you can enter the setting on a single line
[:port]] without using begin or end.
[load-index threshold
index_name
[index-parameter]]
[load-index-action
exclude threshold]
What’s Next?
Proceed to Options in the sgagent.conf Statement Section (page 477).
Option Description
port port_number Specifies the port that the Server Pool uses for communication with the engines.
All Server Pool members must use the same port number; the port setting cannot
start with the begin host command. The port number can be from 0-65535.
By default, the port is set to 7777. If you use another port instead of the default
port, you must modify the IPv4 Access rules to allow connections to the new port.
Defines how long the tester waits before starting the tests after the system has
been booted up or restarted to ensure that all necessary processes have
boot-delay time
completed their startup. Time is entered in the format [(hh:)mm:]ss. The default
is 30 seconds.
Defines how long the system waits before sending a new alert in response to a
alert-interval time test failure to prevent excessive alerts from being sent. Time is entered in the
format [(hh:)mm:]ss. The default is 1 hour.
Specifies the path to a custom alert script. You must use quotation marks if the
alert-script path path contains spaces. This is only needed when you want to use a custom alert
script. There is no default value.
Specifies the path to the custom script to be run when the Monitoring Agent
startup-script path
starts. You must use quotation marks if the path contains spaces.
Specifies the path to the custom script to be run if the load index exceeds the
overload-script path threshold value defined with the load-index statement. You must use
quotation marks if the path contains spaces.
Defines the method that is used to measure the load. We recommend using the
same method of measurement for all members of the Server Pool. If the load
load-index threshold measurement exceeds the defined threshold, a log message and an alert are
index_name generated.
[index-parameter] The index_name can be a complex expression combining multiple methods with
basic arithmetic operations (+ - * /), such as “index-name + index-name”. The
index_name options are explained in Table 36.4.
Excludes the server from handling traffic for the specified time (in seconds)
load-index-action when the threshold value of the load-index is reached. When the server has
exclude switched to the Excluded state, the server does not return to the normal state
[time] until the specified length of time has elapsed, even if the load of the server has
dropped to a normal level.
Option Description
Measures the average processor load level over the specified time period. The
processor-load time time is entered in the format [(hh:)mm:]ss. The returned value is a percentage
value from 0-100.
Measures the average processor time spent in the kernel mode over the specified
processor-kernel-load
time period. The time is entered in the format [(hh:)mm:]ss. The returned value is
time
a percentage value from 0-100.
Measures the average number of processes waiting in the execution queue due
to reserved resources over the specified number of minutes. The options for the
load-average-minutes
value of minutes are 1, 5, or 15. The returned value is the load average for the
specified time period multiplied by 100.
What’s Next?
To see some examples that illustrate the statement configuration explained so far,
proceed to Monitoring Agent Statement Configuration Examples.
To skip the examples and see how to configure the Test section, proceed to Editing the
sgagent.conf Test Section (page 480).
Because server1 is ignored in the previous statement, it would typically have its own statement
with different options, such as the one below:
What’s Next?
Proceed to Editing the sgagent.conf Test Section (page 480).
Parameter Description
Begins the test definition. Specifies the name of the test. The name
appears in the logs and alerts in the event of a failure, so it should be
descriptive to give the administrators enough information about what has
test name happened. The test name may be any string. You must use quotation
marks if the name contains spaces.
This parameter is required and has no default value.
Defines how often the test is executed. Time is entered in the format
interval time [(hh:)mm:]ss. The minimum interval is 3 seconds and the maximum is 1
day. If no interval is defined, the default is 60 seconds.
Parameter Description
Specifies how many times the script is executed after the test fails, and
the path to the script file. You must use quotation marks if the path
contains spaces.
There are two options for how many times to execute the script after the
test fails:
script [always|repeat]
repeat defines the number of failures after which the script is no longer
path
run. The counter is reset each time the server status changes, or the test
succeeds.
always runs the script without restrictions on the number of failures.
If no argument is given, the script is run only after the first failure by
default.
Determines how long the tester reruns a failed test to see if it succeeds on
the next attempt.
There are two options for specifying the time period:
always: there are no time limits on how long the tester waits for the test
to succeed again. The server state is changed from Excluded to OK when
recovery always|time the test succeeds.
time: If the test succeeds in the defined time period after a failure, the
server state is changed from Excluded to OK. Time is entered in the format
[(hh:)mm:]ss.
If no recovery options are specified, the test is never rerun after a failure,
and the server state remains Excluded.
Specifies which test script to use, and the options for running the test.
This parameter is required and has no default value.
There are two options for specifying the test script:
external: indicates that an external test is used. External tests can be
created by combining predefined tests with AND, OR, and NOT operators,
or you can write your own script. Note that external tests must return an
exit code of 0 (zero) to indicate success. Any non-zero return value is
command interpreted as a failure.
external|test_expression test_expression: specifies the internal test to run. For more
information about the internal tests, see Editing Monitoring Agents’
[retry]
Internal Tests (page 483).
[timeout]
The other options are used as follows:
[path]
retry: specifies how many times the script is run before the test is
[parameters] considered failed.
timeout: specifies how long (in milliseconds) the tester waits for the test
result.
path: specifies the path to the external test script. You must use
quotation marks if the path contains spaces. The path is required for
external tests, and is not used for internal tests.
parameters: specifies any possible parameters that a specific test
may need.
Related Tasks
Enabling Monitoring Agents (page 488)
test “multiple_services”
interval 10:00
action alert
command external 3 1000 /usr/lib/server/test.sh 192.168.1.1
What’s Next?
Proceed to Editing Monitoring Agents’ Internal Tests (page 483).
Related Tasks
Enabling Monitoring Agents (page 488)
Note – Some of the internal tests may not work on a VMware platform.
Test Description
Checks the available swap space. If the current amount of free swap
swapfree limit
space drops below the limit (given in kilobytes), the test fails.
Test Description
Checks whether the TCP port answers a TCP query with the expected
response. The test fails if the port does not answer, or the answer
differs from the expected response.
Note that the Telnet protocol executes handshake procedures before
beginning the connection. If you use portanswer to test a Telnet
service, test the handshake procedure, not the Telnet prompt.
portanswer retry retry specifies how many attempts are made before the test is
timeout considered failed.
query timeout specifies how long the tester waits after sending a query to
response the port. The timeout is entered in milliseconds. If no response is
port received within the time period, the test fails.
[ip_address] query specifies the TCP query to send. You must use quotation
marks if the query contains spaces. If no query parameter is
specified, nothing is sent to the port.
response specifies the expected response to the TCP query. You
must use quotation marks if the response contains spaces.
port specifies the port to which the query is sent.
ip_address is the IP address to which the query is sent.
Checks whether the server answers an HTTP request for the specified
URL with the expected file. The test fails if the server does not
answer the HTTP request, or if the reply does not contain the contents
httpanswer retry of the specified file.
timeout port specifies the port to which the request is sent.
URL retry specifies how many attempts are made before the test is
considered failed.
file
timeout specifies how long the tester waits after sending a query to
port
the port. The timeout is entered in milliseconds. If no response is
[ip_address] received within the time period, the test fails.
ip_address is the IP address to which the requst is sent. If no
ip_address is specified, the tester sends the query to the localhost
address by default.
Checks that the specified interface is up. The test fails if the
specified network interface does not exist or is down. In Windows,
networkinterface-up interface
this test behaves similarly to the networkinterface-
linkstatus test described next.
networkinterface-linkstatus Checks the link-layer status of the specified interface. The test
interface fails if the specified network interface is not linked.
Checks whether a file exists on the server(s). The test fails if the file
file-exists path
is not found at the specified path.
test process_count
interval 60
host server2
action alert
command prosesscount 2500
test ip-listening
interval 30
host server2
action exclude
command iplistening 192.168.1.1
test port-listening
interval 30
host server2 server3
action exclude
command portlistening 80
test http_answering
interval 30
action exclude
command httpanswer 4 3500 /www.example.com/index.html /web/file.html 80
test etc0_up
interval 45
action alert
command networkinterface-up eth0
What’s Next?
Proceed to Enabling Monitoring Agents (page 488).
Caution – Do not enable the Monitoring Agents before you configure them (see Configuring
Monitoring Agents (page 474)).
Note – Remember to modify the corresponding IPv4 Access rules to allow connections to
the new port.
4. Click OK.
What’s Next?
If you are using static DNS entries, continue by Entering the Server Pool’s IP Addresses
on Your DNS Server (page 488).
Otherwise, continue in Creating Access Rules for Inbound Load Balancing (page 489).
When using static DNS entries (recommended), you must ensure that the IP addresses for your
servers, as specified in the Server Pool properties, are properly entered into your DNS server’s
records.
If the servers have multiple IP addresses, make sure these are all defined on the DNS server to
ensure operation as intended.
Consult the documentation of your DNS server software for instructions on how to enter the IP
addresses.
What’s Next?
Continue the configuration by Creating Access Rules for Inbound Load Balancing
(page 489).
The IPv4 Access rules specify which traffic is directed to the server pool.
Note the following:
• The Server Pool does automatic NAT from the external addresses you configured in the Server
Pool element to the addresses of the included servers, so make sure there are no
overlapping NAT rules in the policy. You can add a NAT rule that disables further NAT for
matching connections (empty NAT cell), if necessary.
• If you want to balance traffic that arrives through a VPN using a Server Pool, NAT must be
enabled in the properties of the VPN element (NAT is disabled by default for traffic that uses
a VPN).
• You must create a separate rule for each Server Pool.
• If the same Server Pool provides more than one service, you must create a separate rule for
each Service.
• You must enable Connection Tracking for the rule that directs traffic to the Server Pool. The
Server Pool uses NAT, which does not work without Connection Tracking.
3. Set the Action to Allow and enable Connection Tracking in the Action Options.
Example The following example rules direct traffic from outside networks to the HTTP Server Pool and
to the HTTPS Server Pool.
What’s Next?
If you are using Dynamic DNS entries, continue the configuration by Defining a Dynamic
DNS Rule (page 493).
If you are using static DNS entries, the configuration is complete. Save and Install the
Firewall Policy to transfer the changes.
StoneGate supports the Dynamic DNS protocol and is capable of sending DDNS updates to a
specified DNS server. If a network connection specified by a NetLink element fails, the dynamic
DNS updates notify the DNS, which then removes the corresponding IP address from its
records.
To configure DDNS updates, you must have already defined the necessary NetLinks and the
Server Pool element. To use DDNS updates, you must set up a DDNS-capable DNS server in
your network. The DNS server must be configured as the primary DNS server for the domain.
Using dynamic DNS updates is a security risk. Before you start using dynamic DNS updates,
read the section Improving DDNS Security.
Configuration Overview
1. Implementing DDNS may be a security risk. Read the information in Improving DDNS
Security (page 490) before proceeding with the configuration.
2. To enable monitoring of the status of your NetLinks, you must add probe IP addresses in
the NetLinks’ properties as instructed in Creating NetLinks (page 443).
3. Define the DNS Server element (Defining an External DNS Server (page 491)).
4. Modify the Server Pool element to include information on how the DNS server is updated
(see Defining the Dynamic DNS Update Information (page 492)).
5. Modify the active policy to allow DDNS updates (see Defining a Dynamic DNS Rule
(page 493)).
Caution – Although StoneGate supports dynamic DNS updates, the protocol itself poses a
security risk because there is no access control. If you must use dynamic DNS updates, do
so only after very careful research, planning, and testing.
This section presents some basic steps you can take to improve the security of dynamic DNS
updates:
• Always place the DNS server(s) behind the firewall for protection from IP spoofing.
• Use BIND or an equivalent DNS server that allows you to define which hosts are allowed to
send dynamic updates.
• Always consider using static DNS entries instead, as DDNS is not necessarily needed with
inbound load balancing. Obviously, in that case the DNS entries are not removed
automatically from the DNS server if an ISP fails, but these problems can sometimes be
solved otherwise: for example, some Web browsers can automatically try other IP addresses
if one address does not respond.
What’s Next?
To start using DDNS with inbound traffic management, continue to Defining an External
DNS Server (page 491).
What’s Next?
Continue the DDNS configuration by Defining the Dynamic DNS Update Information
(page 492).
Related Tasks
Adding Custom Commands to Element Menus (page 53)
What’s Next?
Continue by Defining a Dynamic DNS Rule (page 493).
You can test and monitor the Server Pool Monitoring Agents on the command line. The
monitoring tool allows you to query the agents locally or remotely to check their status. The
Monitoring Agent command line tools are described in Server Pool Monitoring Agent Commands
(page 931).
495
496
C HAPT ER 37
Policy elements are containers for the rules that determine how traffic is filtered and
inspected.
497
Getting Started with Policies
Prerequisites: None
Configuration Overview
1. (Optional) Create a custom template as explained in Creating a New Template Policy or a
Policy (page 499) and add the rules and insert points.
2. Create a custom policy as explained in Creating a New Template Policy or a Policy
(page 499) and add the rules.
3. (Optional) Create sub-policies according to need as explained in Creating a New Sub-Policy
(page 500) and add the IPv4 Access rules.
Related Tasks
Installing Policies (page 501)
Tracking Policy Changes (page 504)
Moving the Policy Under a Different Template (page 506)
Deleting Policies, Templates, and Sub-Policies (page 507)
Getting Started with Editing the Rules in Policies (page 510)
All new Policies are based on a Template Policy. The template rules are inherited to lower levels
in the policy hierarchy.
On firewalls, you must always build the policy hierarchy on top of the ready-made Default
Template Policy or a copy of it. The Default Template Policy contains the necessary entries to
allow the engine’s own system communications.
We highly recommend that you base your IPS policy hierarchy on one of the ready-made
templates, the IPS System Template or the IPS Strict Template.
What’s Next?
Adding Insert Points in Policy Templates (page 516)
Related Tasks
Getting Started with Editing the Rules in Policies (page 510)
A Sub-Policy is a set of IPv4 Access rules that you can reuse in different places and in several
Firewall or IPS Policies.
The main goal of Sub-Policies is to make a significant portion of the traffic bypass the whole
sub-policy. To achieve this benefit, rules in a sub-policy should have at least some identical
matching criteria (source, destination, service, source VPN, and/or user authentication details)
that can be used to select only a portion of the traffic for the sub-policy checks.
Sub-policies can also be used to organize the policies and to delegate administrator privileges:
you can restrict specific administrators to edit/add/remove rules within a limited section of IPv4
Access rules (which is more restrictive than giving access to a template or policy).
There are two ways to create Sub-Policies: you can either create a Sub-Policy and add Access
Rules to it manually or select Access rules in a policy and convert them into a Sub-Policy.
What’s Next?
To start from scratch, proceed to Creating a New Empty Sub-Policy (page 500).
To use existing rules, proceed to Converting Existing Rules into a Sub-Policy (page 500).
What’s Next?
Add the rules. See Editing Access Rules (page 518).
Related Tasks
Getting Started with Editing the Rules in Policies (page 510)
Installing Policies
Prerequisites: The policy you want to install must be allowed in the engine’s configuration
Changes to an engine’s rules and most other configurations (routing etc.) are activated in a
policy installation. Only Policy elements can be installed; Template Policy and Sub-Policy rules
are installed as part of the main Policy. A policy snapshot is automatically created each time you
install or refresh a policy for both your and the system’s reference.
You can initiate a policy installation through the Policy element or through the engine element.
The procedure below explains the first method.
To install a policy
1. Select ConfigurationConfigurationFirewall or ConfigurationConfigurationIPS
from the menu. The Firewall Configuration or IPS Configuration view opens with the Policies
branch selected in the tree view.
2. Right-click the policy you want to install and select Install Policy from the menu. The Task
Properties dialog opens.
3. Select the engine(s) on which you want to install the same policy and click Add. You can
install the same policy on several engines in one operation.
• The system tracks the policies installed on engines and pre-fills the Target when possible.
• It is not possible to select Analyzer elements. The analyzer’s policy is refreshed
automatically when a policy is installed on the sensor.
4. (Optional) Leave Keep Previous Configuration Definitions selected to allow established
connections to continue using existing configurations (such as NAT rules) until they finish.
• If the previous configurations are erased, connections that use them are cut.
• All previously established connections that are not allowed by the newly installed policy
are always dropped regardless of this setting.
5. (Optional) Leave Validate Policy before Upload selected to validate the rules in the policy.
See Validating Rules Automatically (page 556) for more information on the related settings.
Note – You cannot validate the policy if you are installing the policy on several engines.
List of engines
Detailed
progress for
selected engine
Issues found in
policy validation;
warnings and
errors during
policy installation
8. If validation issues are found, read the Issues tab in the Info panel and take action:
• Double-click an issue to view the corresponding configuration or click Continue.
• For more information, including steps to disable warnings, see Viewing Policy Validation
Issues (page 558).
9. Monitor the installation and make sure it is successful. With multiple engines, the progress
is indicated through colored icons on the left (click the icon to view the details):
• Yellow: ongoing installation.
• Blue: waiting for the installation(s) on other component(s) to finish.
• Red: failure
• Green: success
Related Tasks
Tracking Policy Changes (page 504)
Selecting Permitted Policies for an Engine (page 409)
Date format is
year-month-day
Note – The policy on the Management Server may be different from the actual currently
installed policy if the policy has been modified after it was installed.
Note – The policy snapshot is only stored when the policy is successfully installed. No
snapshot is stored if the policy upload fails.
What’s Next?
Viewing Policy Snapshots (page 505)
Comparing Two Policy Snapshots (page 505)
3. If elements are shown, select the ones whose policies you want to refresh (all elements are
selected by default).
4. Click Refresh. The policy upload for the selected elements begins.
You can switch the template of a firewall or IPS policy. For example, if you created policy A based
on template X, you can later reparent policy A to inherit rules from template Y.
To delete a template, there must be no policies that are based on that template. The deletion is
not allowed until you either delete the policies or switch them to use a different template. See
Moving the Policy Under a Different Template (page 506).
To delete a sub-policy, there must be no policies that have Jump rules to the sub-policy. The
deletion is not allowed until you edit or remove the Jump rules in the policies.
See Deleting Elements (page 79) for general information on deleting elements.
EDITING POLICIES
The rules in Firewall and IPS Policies allow you to control how the engines inspect and filter
network traffic and how NAT (network address translation) is applied on the firewalls.
509
Getting Started with Editing the Rules in Policies
Prerequisites: Creating a New Template Policy or a Policy
What Rules Do
Rules are instructions to the engines for handling traffic. There are four main types of rules.
• Ethernet rules (IPS only) filter traffic based on MAC addresses and low-level network
protocols. These rules can be used to segment a network.
• Access rules filter traffic based on IP addresses and IP-based protocols. These rules control
access to resources. There are separate Access rules for IPv4 and IPv6 traffic.
• Inspection rules filter traffic based on patterns in any of the information that is transferred.
These rules log complex traffic usage patterns and find network attacks, network worms, or
other worrying or unwanted traffic like the use of peer-to-peer file transfer applications.
• NAT rules (firewall only) change source and/or destination IP addresses in traffic that is
allowed to pass through the firewall. NAT (network address translation) can hide the network
structure and allows several computers to use the same IP address on the Internet.
The engines process the rules one type at a time in the order listed above. IPv4 and IPv6 traffic
on the IPS may be matched to both IPv4 and IPv6 Access rules in any order if traffic is tunneled
(for example, IPv6 tunneled in IPv4 or IPv4 tunneled in IPv6), possibly several times.
Basic Rule Design Considerations
Rule tables are read from top down, so the order of the rules is just as important as their
contents. Make sure that the rules advance logically from specific rules at the top toward more
general rules at the bottom whenever the matching criteria in rules overlap.
Example A rule that denies access to your server from a particular network must be placed above a
more general rule that allows access to that server from any source address.
Any two rules that have completely overlapping matching criteria are redundant and should be
merged. Automatic rule validation can be used to find such mistakes.
When rules are matched to traffic, each rule is compared to the traffic one by one until a match
is found. What happens when the end of the rule table is reached without any matches varies by
the component and the type of rules.
Limitations
Current IPv6 support on firewalls is limited. IPv6 is supported on single firewalls only. NAT, deep
packet inspection, and antivirus are supported for IPv4 traffic only.
What’s Next?
Using the Policy Editing View (page 511)
Related Tasks
Editing Ethernet Rules (page 516)
Editing Access Rules (page 518)
Editing Inspection Rules (page 531)
Editing NAT Rules (page 545)
Validating Rules Automatically (page 556)
Changing Default Rules (page 560)
You can open a policy for editing through the right-click menu for the policy or through the
preview mode. Only one administrator at a time can edit a policy, so be sure to save your
changes and close the policy editing view when you are finished.
Legend: 1 - Policy toolbar. 2 - Rule table. 3 - Search tool. 4 - Change history for selected rule.
Legend: 1 - Rule table for detailed exceptions to the main Rules tree. 2 - The main Rules tree.
Illustration 38.5 Right-Click Menu for the Action Cell in a Firewall Access Rule
Related Tasks
Searching in Rules (page 514)
Finding Unused Rules in Firewall Policies (Hit Counters) (page 515)
Adding Insert Points in Policy Templates (page 516)
Editing Ethernet Rules (page 516)
Editing Access Rules (page 518)
Editing Inspection Rules (page 531)
Editing NAT Rules (page 545)
Validating Rules Automatically (page 556)
Related Tasks
Finding Unused Rules in Firewall Policies (Hit Counters) (page 515)
3. Click the Tools icon in the policy-specific toolbar and select Rule Counters. The Rule
Counter Analysis dialog opens.
4. Select the Period for which you want to check the rule matches; either one of the pre-set
relative periods or Custom if you want to define the Period in detail.
5. (Optional) To exclude Log Servers from this operation or to include archived data, switch to
the Storage tab and change the selection. Make sure you include the Log Servers and
folders that contain data for the target engine and the period you selected.
6. Click OK to display the rule hits. The Hit information is displayed until you close the view.
• The Hit cell in each rule is filled in with the number of connections that matched the rule
during the chosen period.
• If there is no statistical information about the rule with your selected criteria, the Hit cell
shows “N/A” (for example, for rules added after the period you are analyzing).
Related Tasks
Validating Rules Automatically (page 556)
Insert Points mark the positions where rules can be added. When you edit a Template Policy, you
must add at least one new yellow Insert Point on all tabs in all templates if you want the
inheriting Policy or Policy Template to be editable on each tab. Green Insert Points are inherited
insert points from the previous level, and they are not inherited further down in the hierarchy.
They only show you where the higher-level template allows you to add rules and disappear as
soon as you add a rule or a new (yellow) insert point in that position.
Ethernet rules are used by IPS sensors. These rules define whether Ethernet traffic is allowed to
continue or whether the traffic is denied immediately. Inline interfaces of IPS sensors can
directly stop any traffic when the Discard action is used.
If you are using one of the default IPS templates as the basis for your policies, the Ethernet
rules direct all IPv4 and IPv6 traffic to the Inspection rules for further inspection, and let ARP,
RARP, and STP traffic through. You can use the first Insert Point in the template to make
exceptions to this behavior for certain MAC addresses and/or Logical Interfaces. We
recommend that you insert any other changes at the second insert point.
Make sure that your Ethernet rules direct IP traffic for inspection against Access rules (by
applying the default IPv4 and IPv6 Services to traffic). When traffic does not match any Ethernet
rule, the traffic is let through without further inspection.
Caution – Ethernet rules are matched to each packet, and if logging is active for a rule, a
new log entry is produced for each matching packet. Excessive logging can saturate the
logging features, so do not activate any logging for Ethernet rules that match sizeable
portions of your network traffic.
Options Explanation
A match creates no entry in the log. This is the recommended
None
setting for most Ethernet rules.
Log Level Each matching packet creates a log entry that is stored on the Log
Stored
Server.
Alert Each matching packet triggers the alert you add to the Alert field.
Options Explanation
If Log Level is set to Alert, defines the Alert that is sent. Selecting
Alert different Alerts for different types of rules allows more fine-grained
alert escalation policies.
If Log Level is set to Alert, allows you to override the severity defined
Severity
in the Alert element.
Access rules filter traffic by defining matching criteria and an action that is applied to packets
that match all criteria defined in the rule. Access rules are used by firewalls and sensors:
• In Firewall policies, the Access rules are the most important part. The criteria you define in
the Access rules determines which connections are allowed to pass. By default, Firewall
Access rules stop traffic that you do not specifically allow.
• In IPS policies, Access rules can be used to optionally filter out some traffic and to exclude
some traffic from further inspection (which is the more important part of IPS policies). Only
traffic on Inline interfaces can be filtered with Access rules. Sensors allow all traffic that you
do not specifically deny. If the policy is based on one of the default IPS templates, all allowed
traffic is inspected against the Inspection rules by default.
Cell Explanation
If your Sensor has more than one Logical Interface defined, you can optionally add
Logical interface elements in this cell to select which rules apply to which Logical
Interfaces (network segments). The rules in the default templates match any
Logical Interface
Logical Interface.
(IPS only)
For more information, see Defining Traffic Inspection Interfaces for Sensors
(page 379).
Matches any Logical Interface by default.
Source Match the rule to one or more IP addresses. Any elements in the Network Elements
category can be inserted into these cells. If you have both IPv4 and IPv6 networks,
the elements must have the correct type of IP address for the type of rule or the
element is ignored.
Destination
For more information, see Getting Started with Defining IP Addresses (page 562).
Does not match anything by default (whole rule is ignored).
Match the rule to a network protocol and (if applicable) a TCP or UDP port or port
range.
Service
For more information, see Getting Started with Services (page 574).
Does not match anything by default (whole rule is ignored).
Cell Explanation
If defined, the rule matches the specific authenticated users or user groups you add
as elements to this cell. If the connection source is not currently authenticated or
Users
the authenticated user is not included in this rule, the rule does not match and the
(Firewall only, matching continues to the next rule. It is not possible to set this cell to ANY.
IPv4 only, If you fill in this cell, you must also fill in the Authentication cell.
Optional) For more information, see Getting Started with User Authentication (page 624).
Matches both authenticated and unauthenticated users by default (cell is empty).
Double-click to limit the rule’s validity to a specific time period. During the specified
time period, the rule matches. Outside the specified time period, the rule does not
Time
match and the matching continues to the next rule.
(Optional)
The time is entered in the UTC time zone.
For more information, see Limiting the Time when a Rule Is Active (page 555).
Matches the rule based on whether the traffic is received through a VPN. Double-
click to specify that the rule matches only VPN traffic, only non-VPN traffic, only
Source VPN traffic from a specific VPN, or only VPN client traffic (configured in any VPN). This
(Firewall only, allows you, for example, to restrict the services VPN client users can access
IPv4 only, remotely when the IP addresses assigned to their laptops are the same both over
the VPN and when connecting from within the local internal network.
Optional)
For more information, see Creating VPN Rules (page 748).
Matches all traffic by default (cell is empty).
The options specified in a rule with this action are stored in memory
while the matching process for the packet continues. The specified
options are applied to any other rule that the same packet matches
if the rules have no rule-specific definitions for the same options.
Continue Yes
Further options for traffic handling are available in the Action
Options. See Defining Firewall “Allow” Action Options (page 523) or
Defining IPS “Allow” Action Options (page 527).
For more information, see the Firewall/VPN Reference Guide.
To set the Action options for the Apply Blacklist action in IPv4 Access rules
1. Right-click the Action cell in an IPv4 Access rule and select Apply Blacklist.
2. Double-click the Action cell. The action-specific options dialog opens.
Set the options as explained in the table that follows.
Option Explanation
Blacklist entries are accepted from all StoneGate Management
Allowed Any Servers and analyzers defined in the system (sensors’ blacklisting
blacklisters for commands are relayed through analyzers).
the rule Blacklist entries are only accepted from the components you specify
Restricted
(and from the engine command line).
Standard If you select specific connection tracking options in a Jump rule, the
Connection
connection options you select here are used for all rules in the Sub-Policy
Tracking
tracking regardless of the settings in those rules.
(Firewall Only) options See Defining Firewall “Allow” Action Options (page 523).
To set the Action options for the Allow action in firewall Access rules
1. Right-click the Action cell in a firewall Access rule and select Allow.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the tables that follow.
Option Explanation
Select the option to activate the Connection Tracking settings and override any
Override Collected Connection Tracking options set in a preceding Continue rule that matches the
Values Set with same connections.
“Continue” Rules Deep inspection and antivirus cannot be set using a Continue action, so those
options are not affected and can be activated without selecting the override.
Option Explanation
Disables connection tracking. The firewall operates as a simple packet filter,
allowing packets based on their source, destination, and port used. You must
add separate Access rules that explicitly allow the reply packets. NAT cannot be
Off applied to traffic allowed without connection tracking.
Turn off logging in the rule if you disable connection tracking. When connection
tracking is off, a log entry is generated for each packet and this may considerably
stress the firewall, network connections, and the Log Server.
Inspects traffic that matches this rule against the Inspection rules of this policy.
Deep Inspection To use this option, the Service in the rule must include one of the protocols
(IPv4 Only) supported for deep inspection on the firewall (HTTP, HTTPS, IMAP, POP3, SIP,
SMTP, or SNMP).
Option Explanation
TCP traffic is handled as in the Normal mode or Strict mode depending on
Default whether Strict Connection Tracking has been enabled in the firewall
properties. ICMP and UDP traffic is handled as in the Normal mode.
The firewall drops ICMP error messages related to connections that are
not currently active in connection tracking (unless explicitly allowed by a
rule in the policy). A valid, complete TCP handshake is required for TCP
Normal traffic. The firewall checks the traffic direction and the port parameters of
UDP traffic. If the Service cell in the rule contains a Service that uses a
Protocol Agent, the firewall also validates TCP and UDP traffic on the
Connection application layer. If a protocol violation occurs, the connection is dropped.
Tracking Allows only TCP traffic that strictly adheres to the TCP standard as defined
Mode in RFC 793. The firewall also checks the sequence numbers of the
packets in pre-connection establishment states and for RST and FIN
Strict packets, and drops packets that are out of sequence. If the Service cell in
the rule contains a Service that uses a Protocol Agent, the firewall also
validates the traffic on the application layer. If a protocol violation occurs,
the connection is dropped.
Option Explanation
Disables the synchronization of connection information between firewall
Do not synchronize cluster nodes. This reduces the traffic volume on the active heartbeat
connections interface, but it also prevents transparent failover of connections to other
nodes. This option is supported starting from Firewall/VPN version 5.2.1.
The timeout (in seconds) after which inactive connections are closed. This
timeout concerns only idle connections. Connections are not cut because
of timeouts while the hosts are still communicating.
This setting overrides the default idle timeouts set in the Firewall
properties.
Idle Timeout
Caution! Do not set long timeouts for many connections. Each connection
that is kept active consumes resources on the firewall. Setting excessive
timeouts for a large number of connections may lead to serious
performance problems. Generally, the idle timeout should not be more
than a few minutes at most.
Allows entering the Minimum and Maximum value for the MSS in bytes.
Headers are not included in the MSS value; MSS concerns only the
payload portion of the packet. In most cases, network equipment prefer to
send packets at the Ethernet-standard MTU (maximum transmission unit)
size of 1500 (including both payload and headers).
Maximum value: If a TCP packet has an MSS value larger than the
maximum, the firewall overwrites the packet’s MSS with the maximum
value you set here. Setting the maximum MSS size may be necessary to
prevent fragmentation. Typically, the value you enter is lower than the
Enforce TCP MSS standard Ethernet MTU (1500), with consideration for the packet headers
that are added to the MSS.
Minimum value: If a TCP packet has an MSS value smaller than the
minimum you set here, the packet is dropped. The smaller the data
content is, the less efficient the communications get due to the fixed-size
headers. Limiting the minimum size may help alleviate certain types of
network attacks. Typically, the minimum value you enter is smaller than
the standard minimum MSS (536).
If a TCP packet does not include a MSS value, the firewall does not add
the MSS value to the packet, but enforces the minimum MSS.
Concurrent connection Settings for DoS (denial of service) attack protection. Allows you to set a
limit per source IP maximum limit for the number of total open connections from/to a single
IP address at any one time. You can select between Discard (silent drop)
and Refuse (with ICMP error message) as the Action that is applied to new
connections if the limit is reached.
Concurrent connection These limits are enforced by rules that have their Action set to Allow,
limit per destination IP Continue, or Use IPsec VPN (all actions Apply/Enforce/Forward included).
Be careful to apply the concurrent connection limits correctly for the types
of communication that this rule handles to avoid cutting off connections
unnecessarily.
To set the Action options for the Continue action in firewall Access rules
1. Right-click the Action cell in a firewall Access rule and select Continue.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the table in Defining Firewall “Allow” Action Options
(page 523).
To set the Action options for the Use VPN action in firewall Access rules
1. Right-click the Action cell in a firewall Access rule and select Use IPsec VPN. The action-
specific options dialog opens.
2. Set the options as explained in the table that follows.
Options Explanation
Incoming connections: The traffic is allowed if it arrives through the specified VPN.
Otherwise, the rule does not match and the matching process continues to the
Apply next rule.
Outgoing connections: The traffic is sent through the specified VPN. If the
connection is not allowed in the VPN configuration, it is discarded.
VPN traffic: The engine forwards the traffic from one VPN to another. If the traffic is
not allowed in the VPN configuration, it is discarded. For more information, see
Forward Routing Traffic Between VPN Tunnels (page 772).
Other traffic: The traffic is sent through the specified VPN. If the traffic is not
allowed in the VPN configuration, it is discarded.
The Selected
The action is applied to a specific VPN.
IPsec VPN
$ Client-to-
Gateway IPsec The action is applied to IPsec VPN client traffic in any VPN.
VPNs
3. (Optional) Switch to the Connection Tracking tab and set the options as explained in
Defining Firewall “Allow” Action Options (page 523).
To set the Action options for the Allow action in IPS Access rules
1. Right-click the Action cell in an IPS Access rule and select Allow.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the table below.
To set the Action options for the Continue action in IPS Access rules
1. Right-click the Action cell in an IPS Access rule and select Continue.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the table below.
Override Collected Select the option to activate the settings on this tab and override
Values Set with any options set in a preceding Continue rule that matches the
“Continue” Rules same connections.
Response Defines which automatic response is shown to the user when an
HTTP connection is refused or blacklisted. For more information
User Response
about User Responses, see Getting Started with User
Responses (page 612).
Option Explanation
Select the option to activate the settings and override any
Override Collected Values Set with
options set in a preceding Continue rule that matches the same
“Continue” Rules
connections.
Option Explanation
Select the option to activate the settings and override any
Override Collected Values Set with
options set in a preceding Continue rule that matches the same
“Continue” Rules
connections.
Note – Log pruning may override the logging options by deleting any number of generated
log entries when they are received at the Log Server.
Option Explanation
Select the option to activate the settings and override any
Override Collected Values Set with
options set in a preceding Continue rule that matches the
“Continue” Rules
same connections.
A match to this rule triggers the alert you add to the Alert
Alert
field.
Option Explanation
Require The users are required to authenticate themselves. The request
Authentication is sent to the appropriate authentication service and evaluated.
Inspection rules activate checks for specific traffic patterns and define what action the system
takes when a match is found. Inspection rules examine the packet payload throughout whole
connections, and take action at the point when something threatening is discovered. Inspection
rules are applied to those connections that are selected for deep inspection in the Access rules.
The default IPS templates direct all IP traffic to deep inspection.
The IPS policy contains rules both for the sensor and for the analyzer to which the sensor sends
its event data. Sensors examine IPv4 and IPv6 traffic against criteria defined in Situation
elements. Analyzers process the sensor-detected events using Correlation Situation criteria.
Firewalls work similarly to sensors, but do not send their findings to analyzers, so no event
correlation is available. On firewalls, deep inspection is available for IPv4 connections that are
carried over the HTTP, HTTPS, IMAP, POP3, SIP, SMTP, or SNMP protocols.
What’s Next?
Changing Inspection Rules Tree Settings (page 532)
Related Tasks
Defining Logging Options for Inspection Rules (page 533)
Adding Situations to the Rules Tree (page 534)
Removing Overrides From the Rules Tree (page 535)
In lists of options, the default setting is also labeled, for example, “Permit (default)”.
Regardless of the settings in the Rules tree in a higher-level template, it is still possible to
change any Rules tree values in the inheriting policy. To add template rules that cannot be
modified in the inheriting Policies, add the rules as Exceptions.
Option Explanation
The definition is ignored. If the included Situations are not referred in the Exceptions
either, the traffic patterns contained in those Situations are not transferred to the
Do Not Inspect
engines and therefore not matched to network traffic. This reduces the engine
workload. This action is only available at the top level of the tree.
The connections are still allowed to continue even when an included pattern is found
in traffic. This Action is useful if you want to log or record connections without
Permit
stopping them. The inspection continues, so other Situations can still match the
same connection and carry out a different action.
Option Explanation
None A match creates no entry in the log.
Transient Generates a log entry that is displayed in the Current Events mode in the Logs view
(Firewall only) (if someone is viewing it at the moment) but is not stored.
Stored A match creates a log entry that is stored on the Log Server.
Generates a log entry that is shown in the Logs view, saved for further use, and
Essential
handled as high-priority if the log transfer from the engines to the Log Server is
(Firewall only) interrupted.
Triggers an alert. By default, the Default Alert is generated, but you can select a
Alert
different Alert through the Logging Options item.
Logging Allows you to set up traffic recording and select a custom Alert. See Defining Logging
Options Options for Inspection Rules (page 533).
Related Tasks
Adding Situations to the Rules Tree (page 534)
Removing Overrides From the Rules Tree (page 535)
Adding Exceptions to Inspection Rules (page 535)
Option Explanation
Override default value Activates the settings below and sets the Rule to override mode.
Option Explanation
Does not generate any entry in the log. If this option is selected,
None
the Recording options are not available.
Generates a log entry that is shown in the Logs view, saved for
Essential
further use, and handled as high-priority if the log transfer from
(Firewall only) the engines to the Log Server is interrupted.
Additional Stores packet payload extracted from the traffic. The collected
Recording Payload payload provides information for some of the additional log fields
(Sensors and listed in Log Fields Controlled by the Additional Payload Option
Firewalls) (page 1015) depending on the type of traffic.
Record Records the traffic up to the limit you set in the Record Length
(Sensors Only) field. This allows storing more data than the Excerpt option.
Record Length
Sets the length of the recording for the Record option in bytes.
(IPS Only)
Note – Storing or viewing the packets’ payload may be illegal in some jurisdictions due to
laws related to the privacy of communications.
Related Tasks
Creating New Situation Elements (page 597)
Cell Explanation
The traffic patterns that you want the rule to match. The Situation cell accepts
Situation, Situation Type, Tag, and Vulnerability elements.
Situation Types, Tags, and Vulnerabilities are shown as branches in the Situations
tree. Under the branches, you can view the individual Situations. Each Situation is
Situation usually listed more than once because there are alternative ways to categorize the
Situations. The Situation Types form the Rules tree on the Inspection tab, and the
Situation Type tree contains each Situation only once.
Correlation Situations are used by IPS analyzers only. Sensors and firewalls do not
correlate, so they ignore all Correlation Situations.
Matches the rule to only Situations with the specified Severity value(s). For
example, if your rule is general and matches a wide range of Situations, you may
Severity
want to create two similar rules: one for less severe Situations and one for more
Severe situations. Useful in rules that contain Tags in the Situation cell.
If your Sensor has more than one Logical Interface defined, you can optionally add
Logical Interface elements in this cell to select which rules apply to which Logical
Interfaces (network segments). The rules in the default templates match any
Logical Interface Logical Interface.
(IPS only)
For more information, see Defining Traffic Inspection Interfaces for Sensors
(page 379).
Matches any Logical Interface by default.
Source Matches the rule to one or more IP addresses. Any elements in the Network
Elements category can be inserted into these cells. Both IPv4 and IPv6 addresses
are valid in these cells.
Destination For more information, see Getting Started with Defining IP Addresses (page 562).
Does not match anything by default (whole rule is ignored).
You can optionally restrict the scope of Inspection rules by using the
communications protocol as a matching criteria. The communications protocol
Protocol
information is attached to connections in the Access rules (Service cell). Useful in
rules that contain Tags in the Situation cell.
Cell Explanation
Limits the rule’s validity to the specified time period. During the specified time
period, the rule matches. Outside the specified time period, the rule does not
Time
match and the matching continues to the next rule.
(Optional)
The time is entered in UTC. For more information, see Limiting the Time when a
Rule Is Active (page 555).
Action Explanation
The included Situations are disabled for the matching connections and the
inspection continues. The Situations included in the Permit rule are ignored if they
are included in further rules. Other Situations can still match the same connection
Permit and carry out a different action.
Further options for traffic handling are available in the Action Options. See Defining
Firewall “Permit” Action Options (page 538) and Defining IPS “Permit” Action
Options in Inspection Exceptions (page 541).
The options specified in a rule with this action are stored in memory while the
matching process continues. The specified options are applied to any other rule
that the same traffic matches if the rules have no rule-specific definitions for the
same options.
All settings in the Options cell and the settings for the Terminate action in the Action
Continue cell can be set using Continue rules for further Exceptions and the Rules tree.
However, the Rules tree ignores any logging options set with Continue rules, since
the tree has a separate inheritance system for those options.
Further options for traffic handling are available in the Action Options. See Defining
Firewall “Continue” Action Options in Inspection Exceptions (page 538) and
Defining IPS “Continue” Action Options in Inspection Exceptions (page 541).
Action Explanation
On firewalls, stops the connection.
On sensors, stops the connection if that is possible in the physical configuration -
only traffic that flows through an Inline interface pair can be stopped directly. Traffic
that is picked up through a Capture interface can be terminated by closing the
connection through a Reset interface. When this action is triggered, the matching
traffic is not inspected any further. Sensors have a passive termination mode for
testing purposes in which the connections are not stopped, but create an easily
distinguishable log entry instead. This mode can be set for the whole sensor or in
Terminate
the options of Exceptions.
Analyzers cannot directly stop a connection, and your actions are restricted to
blacklisting the traffic on a StoneGate firewall or sensor, and/or sending an alert.
The Terminate action triggers a policy installation warning and is converted to an
Alert if used with Correlation Situations (the Analyzer-specific definitions).
Further options for traffic handling are available in the Action Options. See Defining
Firewall “Terminate” Action Options (page 539) and Defining IPS “Terminate” Action
Options (page 542).
To set the Action options for the Continue action in Firewall Exception rules
1. Right-click the Action cell in a firewall Exception rule and select Continue.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in Defining Firewall “Permit” Action Options (page 538) and
Defining Firewall “Terminate” Action Options (page 539).
To set the Action options for the Permit action in Firewall Exception rules
1. Right-click the Action cell in a firewall Exception rule and select Permit.
2. Double-click the Action cell. The action-specific options dialog opens.
Override
collected Select the option to activate the settings on this tab and override
values set with any options set in a preceding Continue rule that matches the
“Continue” same connections.
rules
To set the Action options for the Terminate action in Firewall Inspection Exceptions
1. Right-click the Action cell in a firewall Exception rule and select Terminate.
2. Double-click the Action cell. The action-specific options dialog opens.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Sends an This option is only used if the Terminate options are set to notify
‘ICMP communicating parties with a TCP Reset.
destination When you select Yes, the engine sends an ICMP notification to
Reset action unreachable’ communicating parties when non-TCP traffic is terminated.
message if not When you select No, no notification is sent for non-TCP traffic.
a TCP Whether a notification is useful depends on the communicating
connection application.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Option Explanation
Define which automatic response is sent to the user when an
HTTP connection is terminated due to a Situation match.
Response options are always specific to the Situation used.
When the rule matches Situation “Anti-Virus_Virus-Found” you
can define a response for “Virus found (Firewall)”.
User Response When you match the special URL filtering Situations, you can
define a response for “URL not allowed”.
When you match other HTTP Situations, you can define a
response for “Connection terminated by inspection rule”.
For more information, see Getting Started with User Responses
(page 612).
To set the Action options for the Continue action in IPS Exceptions
1. Right-click the Action cell in an IPS Exception rule and select Continue.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in Defining IPS “Permit” Action Options in Inspection
Exceptions (page 541) and Defining IPS “Terminate” Action Options (page 542).
To set the Action options for the Permit action in IPS Exceptions
1. Right-click the Action cell in an IPS Exception rule and select Permit.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the table that follows.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
To set the Action options for the Terminate action in IPS Exceptions
1. Right-click the Action cell in an IPS Exception rule and select Terminate.
2. Double-click the Action cell. The action-specific options dialog opens.
3. Set the options as explained in the tables that follow.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Sends an This option is only used if the Terminate options are set to notify
‘ICMP communicating parties with a TCP Reset.
destination When you select Yes, the sensor sends an ICMP notification to
Reset action unreachable’ communicating parties when non-TCP traffic is terminated.
message if not When you select No, no notification is sent for non-TCP traffic.
a TCP Whether a notification is beneficial depends on the
connection communicating application.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Option Explanation
Select the option to activate the settings on this tab and override
Override collected values set with
any options set in a preceding Continue rule that matches the
“Continue” rules
same connections.
Option Explanation
Override default value Activates the settings below and sets the Rule to override mode.
Option Explanation
Does not generate any entry in the log. If this option is selected,
None
the Recording options are not available.
Generates a log entry that is shown in the Logs view, saved for
Essential
further use, and handled as high-priority if the log transfer from
(Firewall only) the firewalls to the Log Server is interrupted.
Additional Stores packet payload extracted from the traffic. The collected
Recording Payload payload provides information for some of the additional log fields
(Sensors and listed in Log Fields Controlled by the Additional Payload Option
Firewalls) (page 1015) depending on the type of traffic.
Record Records the traffic up to the limit you set in the Record Length
(Sensors Only) field. This allows storing more data than the Excerpt option.
Record Length
Sets the length of the recording for the Record option in bytes.
(Sensors Only)
Note – Storing or viewing the packets’ payload may be illegal in some jurisdictions due to
laws related to the privacy of communications.
Firewalls can perform NAT (network address translation) for IPv4 addresses. NAT replaces the
source and/or destination IP addresses in packets with IP addresses of your choice. NAT rules
are matched to allowed connections after Access rule matching. NAT is applied before a routing
decision is made, so the address translation may affect how the traffic is routed.
Available NAT Operations
You can define the following types of NAT:
• Static source NAT, typically used for translating the internal (“real”) IP address of an internal
host to a different IP address in the external network.
• Static destination NAT, typically used for translating the public IP address of an internal host
to the private IP address, so that the host (server) can receive new connections from external
hosts. Allows IP address or port translation (PAT), or both.
• A combination of both of the above if you want to translate both the Source and Destination
address in the same connection, for example, to allow internal hosts to access your
organization’s public servers using the public IP addresses of both the client and the server.
• Dynamic source NAT, typically used to translate the internal IP addresses of several internal
hosts to one or a few external IP addresses to hide the internal network structure from
outsiders and to avoid acquiring a separate public IP address for each of the hosts.
• Dynamic destination NAT can be configured for IPv4 traffic as part of the Server Pool feature
(not in NAT rules). See Inbound Traffic Management (page 467).
Guidelines
General guidelines for adding NAT rules:
• NAT rules only apply to connections that are handled statefully (Connection Tracking option is
left selected in the Access rule that allows the connection).
• NAT rules are applied to whole connections; reverse NAT for reply packets is automatic, so
you do not need to define rules for replies within a connection.
• The NAT rules are matched to connections with the same type of matching criteria as other
types of rules. The first matching NAT rule is applied and any other NAT rules are ignored.
• To prevent a NAT rule from matching some connections, create a NAT rule for those
connections that specifies no translation and place it above the rule that matches.
• By default, NAT rules are ignored for traffic that enters or leaves a VPN tunnel. To match such
traffic to NAT rules, enable NAT in the Gateway element’s properties.
• Routing decisions are made after NAT, so keep in mind that translating the destination
address may affect how the traffic is routed. If not included in existing definitions, you may
need to add the translated addresses in the Routing view.
• If you install the firewall policy with the Keep Previous Configuration Definitions option
selected, previous NAT rules are also be kept until all currently open connections that use
those rules are closed. In some cases, the old and the new rules may conflict, preventing
policy installation until the option is deactivated.
For more background information, consult the StoneGate Firewall/VPN Reference Guide.
Related Tasks
NAT Rule Examples (page 551)
Cell Explanation
Defines the addresses that you want to translate in source address translation
rules. A single continuous address space is required for static source IP address
translation. ANY is invalid as a static address translation definition. Any
combination of IP addresses is valid in dynamic source address translation.
Source
Only used for rule matching in Destination address translation rules, so any
combination of IP addresses (including ANY) is valid in that role.
Elements must contain IPv4 addresses to be valid in NAT rules.
Does not match anything by default (whole rule is ignored).
Defines the addresses that you want to translate in destination address translation
rules. A single continuous address space is required for destination IP address
translation. ANY is invalid as an address translation definition.
Destination Only used for rule matching in Source address translation rules, so any combination
of IP addresses (including ANY) is valid in that role.
Elements must contain IPv4 addresses to be valid in NAT rules.
Does not match anything by default (whole rule is ignored).
Cell Explanation
Defines the TCP or UDP port(s) that you want to translate for destination port
translation. A single continuous port range is required for destination port
translation. ANY is invalid as a port translation definition.
Only used for rule matching in IP address translation rules, so any combination of
ports (including ANY) is valid in that role.
Service
Protocols with complex connection models (such as FTP) require dynamic address
allocation. To apply NAT to such protocols, use a Service that contains the correct
Protocol Agent. The Protocol Agent translates the port or address information that is
sent as packet payload between the client and the server (on the application layer).
Does not match anything by default (whole rule is ignored).
If the policy is shared by several firewalls, you can add Firewall element(s) in this
Used On
cell to restrict the NAT rule’s validity to selected firewall(s).
(Optional)
By default, matches on all firewalls that receive the rule (cell is empty).
3. If you selected an address translation operation, configure the additional options according
to the type of operation:
• Defining Static Source Translation Options (page 548).
• Defining Dynamic Source Translation Options (page 549).
Option Explanation
The IP addresses you want to change with this address translation. These are
Original defined in the Source cell of the NAT rule and shown here for your reference
only; it is not possible to edit the Original addresses here.
The IP addresses you want the address translation to write in the packets. The
Translated address space must have exactly the same number of IP addresses
as there are in the Original address space, since each original address has a
Translated fixed pair in the translated address space.
Click Select to use an existing network element to define the IP address(es).
Click Address to manually type in the IP address or (sub)network you want to
use for the address translation.
Option Explanation
The IP address pool of IP address(es) that are used for the translation. The
minimum size for the pool is one IP address. The number of IP addresses
required depends on how many ports you allow the address translation to use
and how many concurrent connections are handled by dynamic address
translation at peak times. If the IP address/port pairs run out, new connections
cannot be opened before existing connections are closed.
The IP addresses used for NAT must not be in use in the network, as this will
IP Address Pool create an IP address conflict. However, the firewall’s own IP address (CVI on
clusters) can be used for address translation if there are no free IP addresses
available (make sure that your selected port range does not overlap with
communications ports that the firewall uses on this address).
Click Select to use an existing network element to define the IP address(es). To
use Multi-Link features for this traffic, select an Outbound Multi-Link element.
Click Address to manually type in the IP address or (sub)network you want to
use for the address translation.
The start of the port range for source IP address translation. The default is the
First Port to Use
beginning of the “free” high port range, 1024.
The end of the port range for source IP address translation. The default is the
Last Port to Use
highest possible port 65535.
Option Explanation
Select if you want to translate destination IP addresses. If you do
Translate Destination
not select this option, IP addresses are not translated, so packets
(Optional) are sent onwards with the destination address intact.
Option Explanation
Allows the firewall to answer address queries regarding the
translated address(es). For this to work, the original IP address of
all hosts whose IP address is translated must be included in the
address definitions (for example, a Network element) under the
Automatic Proxy ARP (IPv4 only) correct interface in the Routing view.
This option is required in most cases, but it must not be active for
IP addresses that are used by any equipment in the directly
connected networks.
The port(s) you want to change with this address translation. These
are defined in the Service element in the Service cell of the NAT rule
Original
and shown here for your reference only; it is not possible to edit the
Original port(s) here.
IP ports The port or port range you want the address translation to write in
the packets. If you enter a port range, it must have exactly the
Translated same number of ports as there are in the Original ports, since each
original port has a fixed pair in the translated address space (for
example, 1-1023 could be translated to 50001-51023).
192.168.1.0/24 213.28.200.140
In static address translation using whole networks, each original source IP address has a static
translated pair. For example here, the host 192.168.1.6 is always translated to 193.25.25.6
and host 192.168.1.11 is always translated to 193.25.25.11.
192.168.1.0/24 Any
In dynamic address translation, several source IP addresses are translated using a smaller pool
of translated addresses with the help of port translation. Each client connection uses a different
port on an IP addresses that is shared between several different connections. Since each client
reserves a port, the maximum number of simultaneous connections for a dynamic NAT
operation can be calculated by multiplying the number of IP addresses by the number of ports in
the range. Every port and IP address pair must be free from any other use (duplicate
connections cannot successfully cross the firewall).
ANY 192.168.1.201
192.168.1.0/24 192.168.1.201
The NAT settings on each tab are not any different than when you apply only source translation
or only destination translation to matching connections. The key is that both definitions must be
defined in the same NAT rule, because none of the other NAT rules are considered after the first
match is found.
You can specify whether Access rules and inspection Exception rules are effective during certain
days or times of day only. If you do not specify when a rule is active (the Time cell is left empty),
the rule is always active.
Note – The time is entered in UTC, so you must calculate which UTC day and time
corresponds to the time that you want to set. Also remember that UTC does not adjust for
Daylight Saving Time (summer time).
6. Click OK.
You can automatically validate the rules in a policy at any time when you view or edit a policy in
the Policy Editing view. You can also validate the policy when you install or refresh the policy on
an engine. In both cases, you can also select which issues are checked in the policy.
To validate a policy
1. Start the policy validation in one of the following ways:
• If the policy is open in the Policy Editing view, click the Tools icon in the policy toolbar and
select Validate. The Validate Policy dialog opens.
• If you are installing or refreshing a policy and the Task Properties dialog is open, make
sure that the Validate Policy before Upload option is selected and click Select Settings.
2. (Optional; available in the Policy Editing view) Select the Target engine on which you want to
install the policy to get more accurate results.
• The Target engine selection is used to resolve Alias elements when a policy is validated.
• If no Target engine is selected, all the issues related to the engine configuration cannot
be checked (for example, parts of the VPN configuration).
3. (Optional) Modify the Validation Settings (the types of issues that are checked). All checks
are not performed by default. See Selecting Rule Validation Settings (page 558).
Related Tasks
Finding Unused Rules in Firewall Policies (Hit Counters) (page 515)
3. Modify the Validation Settings (the types of issues that are checked). See Selecting Rule
Validation Settings (page 558).
4. Click OK.
The selected Validation Settings are now applied to this rule when you next validate the policy. A
green check mark is added to the rule’s ID cell in the rule table to indicate that the Validation
Settings of the rule are different from the Validation Settings of the whole policy.
Option Explanation
General Checks Finds combinations of general settings that are not valid.
Routing Definitions
Checks routing definitions.
Check (IPS only)
Configuration
NAT and Routing
Definitions Checks the NAT and routing definitions.
(Firewall only)
VPN Definitions
Checks the VPN configurations in the rule.
(Firewall only)
Duplicate Rules Checks if there are any identical rules in the policy.
Analyze Rules
Unreachable Rules Finds rules that are in a position in which they can never match.
Related Tasks
Validating Rules Automatically (page 556)
Descriptions
of found issue
What’s Next?
Fix the issues that are indicated.
Related Tasks
Disabling a Validation Warning for a Rule (page 559).
Excluding Rules from Policy Validation (page 559).
Overriding Default Validation Options for Rules (page 557).
You can add two types of comments in firewall and IPS policies:
• The Comment cell in each rule allows you to write rule-specific comments, for example, to
record why the rule was added. Double-click the cell to edit the comment text.
• In rule tables, you can insert comment rules between rules through the right-click menu of
rules. The rules between comments are converted into collapsible sections under the
comment rules to visually structure the policy. Double-click the row to edit the comment text.
You can set each comment rule’s color through the Colors submenu in the comment rules’
right-click menu.
The maximum length of both types of comments is 249 characters.
In most cases, templates and policies are inherited from the default templates in the system.
However, it is not possible to modify these system elements. If you must modify the default
templates, you can create a copy.
Version upgrades and dynamic updates may require changes to the default template rules.
These changes are not applied to any copies of the templates. You must manually modify the
copies to ensure that the system communications continue to be allowed (firewalls) and all
necessary inspection continues to be performed (IPS).
DEFINING IP ADDRESSES
IP addresses are defined as elements in the system to allow reuse of the same definitions in
any number of configurations for any types of components in the system. Any element that
represents at least one IP address is a Network Element and can be used to define IP
addresses in policies (with some restrictions).
561
Getting Started with Defining IP Addresses
Prerequisites: None
The elements that you can use for defining IP addresses are called Network Elements (not to be
confused with the Network element, which defines an IP network). Each element can be inserted
in several places in the Access, Inspection, and NAT rules (as source and destination of traffic)
and in many other places where you need to define IP addresses, for example, in routing and log
filtering.
There are elements in the system whose only role is to define an IP address. But also elements
created for configuring a feature in the system can also be used in policies (with some
limitations) if they represent an IP address.
To access network elements, select ConfigurationConfigurationFirewall or
ConfigurationConfigurationIPS from the menu and expand the
Network Elements branch of the element tree.
To create/modify elements:
• Click the New icon in a view that is currently displaying Network Elements.
• Right-click the Network Elements category or a sub-category in a tree view and select New
from the menu that opens.
• To create a copy of an existing element, right-click it and select NewDuplicate.
• To modify an existing element, right-click an element where it appears and select Properties.
Note that default system elements cannot be edited.
What’s Next?
The primary tools for defining IP addresses are elements that only exist to represent
one or more IP addresses. These are explained in Defining IP Addresses as Elements
(page 563).
Many elements that are configured as parts of some feature can also be used to
represent IP addresses. The special issues related to these elements are discussed in
Using Feature-Specific Elements in Policies (page 571).
Different types of elements allow you to flexibly define any set of IP addresses:
• Address Ranges allow you to define any continuous range of IP addresses. See Defining
Address Range Elements (page 563).
• Aliases represent a variable value in policies. The IP address value is filled in based on the
engine on which the policy is installed. Aliases make using the same policy on several
engines practical. See Defining Alias Elements (page 564).
• Expressions allow you to define any set of IP addresses in a single element. They are
especially well suited for excluding some IP addresses from otherwise continuous ranges.
See Defining Expression Elements (page 565).
• Hosts represent a single device in the network. Each Host can represent one or more
individual IP addresses in policies. See Defining Host Elements (page 568).
• Networks represent complete network segments. See Defining Network Elements (page 569).
• Routers represent a gateway device in the network and are primarily meant for configuring
routing. Each Router can represent one or more IP addresses in policies. See Defining Router
Elements (page 570).
Some elements that are primarily meant for configuring a certain feature also define an IP
address. Such elements can be used in policies, but there are some additional considerations.
See Using Feature-Specific Elements in Policies (page 571).
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
Either two valid IPv4 addresses or two valid IPv6 addresses. You must enter the
IP Range same type of address in both fields. The address value on the left (start of range)
must be lower than the address value on the right (end of range).
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
The value that is used when the policy is installed on a component that does not
have a more specific value for the Alias.
Default Value
If there is no default value, falling back to the default translation returns an empty
(Optional)
value. If the Alias is the only element in the rule cell, the rule is invalid and ignored
when the policy is installed (a warning is displayed if this happens).
Component- The values that the Alias is replaced with when used in the policies of the
Specific components listed.
Values If there is no specific translation value for a component, the default value is used
(Optional) instead.
Selected
Create and select element.
elements here.
The Add button
adds this
Logical element to the
Operators. expression.
The expression.
Logical Operators in Expressions are resolved in the following order (however, items inside
parentheses are evaluated before any items outside parentheses are considered):
1. Negations.
2. Intersections.
3. Unions.
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Adds the item in the top right panel into the expression at the bottom at the cursor
Add
location.
If the selected item in the right panel is an Expression element, the button switches
Expand/
the view between showing the element and showing the expression defined in the
Compact
element.
Union. Includes all IP addresses defined in both elements that the union combines.
Intersection. Includes only those IP addresses that the two elements that the
intersection combines have in common.
Negation. Includes all IP addresses except those that are defined in the element that
~
follows the negation.
( Parentheses group parts of the expression together. Items inside parenthesis are
) evaluated before they are compared to items outside the parenthesis.
Example Expression defining any other network but one internal network (172.16.2.0/24): “[negation]
net-172.16.2.0/24”.
Example Expression for selecting Hosts in the Network 172.17.1.0/24 from a Group element which
contains Hosts from many different networks: “net-172.17.1.0/24 [intersection] Intranet
Hosts Group”.
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Resources Select elements that you want to add to the Group in this panel.
Use for Status When selected, adds the Group to the System Status tree if the Group contains
Monitoring elements that can be monitored.
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
IPv4 Address
(Optional*) Single valid IPv4 or IPv6 address. You can enter either one or both addresses.
IPv6 Address (*Either an IPv4 or IPv6 address is mandatory.)
(Optional*)
If the device has additional IP addresses, you can enter them here instead of creating
Secondary IP
additional elements for the other IP addresses. The secondary IP addresses are valid
Addresses
in policies and in routing and antispoofing. You can add several IPv4 and IPv6
(Optional) addresses (one by one).
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Tools Profile Allows you to add commands to the element’s right-click menu. See Adding Custom
(Optional) Commands to Element Menus (page 53).
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Property Description
Select the Log Server that monitors this device (third-party monitoring). You must
Log Server select a Log Server to activate the other options. See Getting Started with Third-Party
Device Monitoring (page 112).
Activates the Status Monitoring for this device. You must also select the Probing
Status Profile that contains the definitions for the monitoring. When you select this option,
Monitoring the element is added to the tree in the System Status view. See Creating a Probing
Profile (page 121).
Activates Log Reception from this device. You must also select the Logging Profile
Logs
that contains the definitions for converting the syslog entries to StoneGate log
Reception
entries. See Receiving Logs From External Devices (page 113).
Activates SNMP trap reception from this device. The data that the device sends must
SNMP Trap
be formatted according to the MIB definitions currently active in the system. See
Reception
Importing MIBs (page 120).
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
IPv4 Address
and
IPv4 Netmask
A valid IPv4 address and netmask and/or a valid IPv6 address and prefix length. You
(Optional*) can enter either one or both addresses.
IPv6 Address (*Either an IPv4 address and netmask or an IPv6 address and prefix length are
and mandatory.)
Prefix Length
(Optional*)
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Broadcast and Includes the broadcast address and the network address in the definition. This
Network option is only used in the Source and Destination cells in rules. In other uses, the
Addresses broadcast and network addresses are always included in the definition regardless of
Included this option.
Note – If the interface towards the next-hop gateway has a dynamic IP address, a special
Gateway (DHCP Assigned) element must be added directly through the right-click menu of
the automatically added Network (DHCP assigned) element in the Routing view. The
Gateway (DHCP Assigned) element is not valid in policies; use a corresponding Alias
element instead, see Predefined Aliases (page 943).
Property Description
The element’s name in the Management Center. Used, for example, to resolve IP
Name
addresses to names in the logs.
IPv4 Address
(Optional*) A valid IPv4 address and/or a valid IPv6 address. You can enter either one or both
IPv6 Address addresses. (*Either an IPv4 address or an IPv6 address is mandatory.)
(Optional*)
If the device has additional IP addresses, you can enter them here instead of creating
Secondary IP
additional elements for the other IP addresses. The secondary IP addresses are valid
Addresses
in policies and in routing and antispoofing. You can add several IPv4 addresses (one
(Optional) by one).
Category Categories allow you to flexibly filter your Management Client view. See Using
(Optional) Categories (page 72).
Tools Profile Allows you to add commands to the element’s right-click menu. See Adding Custom
(Optional) Commands to Element Menus (page 53).
Comment Free-form comment for your reference. The comment is displayed in the element’s
(Optional) Properties dialog and in the Info view.
Property Description
Select the Log Server that monitors this device (third-party monitoring). You must
Log Server select a Log Server to activate the other options. See Getting Started with Third-Party
Device Monitoring (page 112).
Activates the Status Monitoring for this device. You must also select the Probing
Status Profile that contains the definitions for the monitoring. When you select this option,
Monitoring the element is added to the tree in the System Status view. See Creating a Probing
Profile (page 121).
Property Description
Activates Log Reception from this device. You must also select the Logging Profile
Logs
that contains the definitions for converting the syslog entries to StoneGate log
Reception
entries. See Receiving Logs From External Devices (page 113).
Activates SNMP trap reception from this device. The data that the device sends must
SNMP Trap
be formatted according to the MIB definitions currently active in the system. See
Reception
Importing MIBs (page 120).
Related Tasks
Configuring Routing (page 439)
Many elements are created as part of configuring a particular feature. When such elements
define an IP address for a device, the element can also be used to represent the IP address in
policies. However, there are some special issues that may have to be considered depending on
the element type.
Tip – To view the actual IP addresses that the element adds to a policy, insert the element in a rule
and activate the “network details” mode through the Tools icon in the view-specific toolbar.
System Components
Using elements that represent StoneGate system components as a source or destination IP
address in policies may produce unexpected results. Be careful especially when you use engine
elements as source or destination IP addresses in policies:
• Firewall, SOHO Firewall, Sensor, Sensor Cluster, Analyzer, and Sensor-Analyzer: These
elements represent all static IP addresses defined for all interfaces. Create separate Host
elements to represent individual IP addresses.
• Firewall Cluster: Represent all CVI IP addresses of all interfaces, but not the NDI addresses.
Create separate Host elements to represent individual CVI addresses and NDI addresses.
• Firewalls with dynamic IP addresses: The Firewall element does not represent any of the
dynamic IP addresses. There are default Aliases that can be used to represent the firewall’s
own dynamic IP addresses in the firewall’s own policy. Fixed IP address definitions are needed
for the dynamically assigned IP addresses when they need to be defined in the policies of any
other components.
• SSL VPN Gateway: the element represents the single IP address that is the source address
for centralized monitoring and logging information.
• Management Center servers: represent the single primary IP address defined for the
element.
• Contact addresses are not considered when the element is used in a policy. Consider which
IP address has to be added to the rule and create separate Host elements for the contact
addresses as necessary.
Related Tasks
Creating an Outbound Multi-Link Element (page 462)
Defining a Server Pool (page 469)
The Service elements match traffic based on protocol or port and set options for advanced
inspection of traffic. Services are used in both firewall and IPS policies.
573
Getting Started with Services
Prerequisites: None
What Services Do
Service elements specify a network protocol, as well as source and/or destination ports for TCP
and UDP traffic.
• Services can be used to match rules to traffic in Ethernet rules (Ethernet Services), Access
rules, and NAT rules.
• Services can refer to Protocol elements, which activate further inspection checks and
advanced traffic handling. Some Protocols have additional options that you can set in the
Service element’s properties.
What Do I Need to Know Before I Begin?
Most of the time, you can use the default Services already available in the system for standard
protocols and ports. However, you may need to occasionally create a new Service:
• If none of the default Services match the type of traffic you want to allow, for example, if
some TCP or UDP service in your network uses a non-standard port.
• If you want to set options for advanced traffic handling, for example, firewall Access rules for
CIS (content inspection server) redirection, firewall/sensor Access rules that disallow the use
of either the active or passive FTP connection mode, or firewall access and NAT rules for
protocols that assign ports dynamically inside the packet payload.
Configuration Overview
Illustration 40.1 Elements in the Services Configuration
Protocol (default Service Group
elements only)
Service
1. Create a new Service that matches the correct protocol number and port number (if
applicable), see Defining Services (page 575).
2. (Optional) Select one of the default Protocol elements if you want the traffic to be
inspected further or if you want to use a Protocol Agent. See Using Protocol Elements
(page 579) and Defining Protocol Parameters (page 579).
3. (Optional) Add the Service to a Service Group to make it easier to insert several related
Services into configurations, see Grouping Services (page 578).
There are predefined Service elements in the system that correspond to reserved and
commonly used protocols and ports. In addition to these, you may need to add your own
customized Service elements to the system for any non-standard ports in use or if you want to
define options for advanced traffic handling (Protocol Agents).
What’s Next?
To define a Service for Access, Inspection, or NAT rules, see Defining a New IP-Based
Service.
To define a Service for Ethernet rules, see Defining a New Ethernet Service (page 577).
4. Give the new Service a unique Name and write an optional Comment.
5. Identify the traffic that this Service element matches depending on the Service type as
explained in the table below (IANA assigns the protocol codes; visit www.iana.org for a list):
The ICMP code that the traffic uses. If the Code field is empty, the
ICMP Code Service matches traffic regardless of the ICMP code. If you enter
(Optional) 0 as the code, the Service matches only packets that contain no
ICMP code.
Allow UDP
Allows the RPC message when transported over UDP.
(Optional)
What’s Next?
Some Protocols have more options that you can set on the Protocol Parameters tab,
see Using Protocol Elements (page 579).
Otherwise, click OK to create the new Service element.
Related Tasks
Grouping Services (page 578).
Defining What Traffic an Access Rule Matches (page 519).
Defining What Traffic a NAT Rule Matches (page 546)
Caution – Match any IP traffic you allow in Ethernet rules to the default IPv4 and IPv6
Services. These Services match the traffic using the correct Protocol element. Only IP
traffic matched to the correct Protocol element is inspected further against the Access
rules. Non-IP traffic is never inspected any further.
Raw IPX
(none) Matches IPX (internetwork packet exchange) traffic.
(Novell)
Vendor The OUI (organizational unique identifier) that the traffic uses.
SNAP
Type The type that the traffic uses.
6. Click OK.
What’s Next?
To group similar Ethernet Services together, see Grouping Services.
Related Tasks
Editing Ethernet Rules (page 516)
Grouping Services
Grouping several Services into Service Group elements simplifies your policies, since you can
insert the Group instead of several individual Service elements. You can group both default
system Services as well as your custom-made elements.
Protocol elements can be inserted directly in Inspection rule exceptions. In Access rules, the
Protocol elements are always contained in a Service element, which can then be inserted into
the Service cell in rules. Some Protocols add options that you can adjust to custom Service
elements that you create. You cannot add or modify the Protocol elements directly.
All Protocol Elements identify traffic as being of a certain network protocol. A Protocol element
in Access rules identifies the protocol for inspection against Inspection rules. In Inspection
rules, the Protocol can be used to limit the scope of exception rules according to the Protocol
(as identified in the Access rules) in rules that otherwise match a large number of Protocols.
Additionally, the Protocols may activate some additional software modules on the engines. This
depends on the type of the Protocol element:
• Protocol Tag: a Protocol element that does not activate additional modules.
• Protocol Agent: a Protocol element that activates an additional module on the engines to
provide advanced application layer features.
Some Protocol elements have additional parameters. See Defining Protocol Parameters.
Option Explanation
When set to On, the sensor terminates DDNS update messages.
Deny DDNS updates When set to Off, the sensor allows DDNS update messages to
pass.
When set to On, the sensor terminates traffic that is not actually
using the DNS protocol.
Enforce DNS protocol usage
When set to Off, the sensor allows traffic to pass even if the
traffic is not actually DNS-related.
3. Click OK.
Option Explanation
Server is allowed to open data connections to the client
Allow active Yes
(according to information exchanged in the control connection).
mode
No Server-initiated data connections are forbidden.
If commands that do not comply with the RFC 959 FTP standard
Strict
Control data are used, the connection is dropped.
inspection
The Protocol Agent tries to identify information for opening the
mode
data connection even if the communications do not strictly follow
(Firewall only) Loose
the FTP standards. Sometimes needed with non-standard FTP
configurations.
Highest allowed source port for Enter a port value to limit the range of allowed source ports of
active data connection data connection on the server.
(Firewall only) Value 0 for the lowest port means that the server always uses the
Lowest allowed source port for port number immediately preceding the destination port.
active data connection If the server uses a standard port, both the lowest and highest
(Firewall only) port number must be 0.
4. Click OK.
Option Explanation
Rematches the encapsulated payload inside the tunneling packet
Apply Tunnel On until the maximum rematch count defined in the Sensor
Rematch Properties is reached
4. Click OK.
Note – T.120 connections, used for instance for file transfer and whiteboard drawing, are
not allowed by the H.323 Protocol Agent. To allow T.120, use the H.323 Service Group or
the T.120 Service element.
Option Explanation
The Protocol Agent monitors the H.323 connection and allows the
Allow related On
related connections in Access and NAT rules.
connections
Off Disables the Protocol Agent.
Allow special Allows H.323 clients to open a special logical channel for audio
Yes
logical and video without NAT.
channels
through (No No Special logical channels are not allowed.
NAT)
4. Click OK.
Option Explanation
Logging of The URLs of sites that users access are included in generated log
Yes
Accessed entries.
URLs No URLs are not included in generated log entries.
Option Explanation
Selects the Content Inspection Server (CIS) to which the
Redirect Connections to CIS
connections are redirected. See Getting Started with External
(Firewall Only) Content Inspection (page 670).
Option Explanation
Specifies the HTTPS Inspection Exceptions according to which
traffic is decrypted and inspected or allowed to pass without
HTTPS Inspection Exceptions
decryption. See Getting Started with HTTPS Inspection
(page 656).
The URLs of sites that users access are included in generated log
Logging of Yes entries. With HTTPS traffic, requires that the traffic is decrypted
Accessed (see Getting Started with HTTPS Inspection (page 656)).
URLs
No URLs are not included in generated log entries.
4. Click OK.
Option Explanation
Rematches the encapsulated IPv4 payload inside the IPv6
Apply Tunnel On tunneling packet until the maximum rematch count defined in the
Rematch Sensor Properties is reached
For information only. Shows the Ethernet frame type used for
Next Ethernet Type
examining the encapsulated packet.
4. Click OK.
Option Explanation
Rematches the encapsulated IPv6 payload inside the IPv4
Apply Tunnel On tunneling packet until the maximum rematch count defined in the
Rematch Sensor Properties is reached
For information only. Shows the Ethernet frame type used for
Next Ethernet Type
examining the encapsulated packet.
4. Click OK.
Option Explanation
Allow MS Allows remote administration of the Microsoft Exchange server
Yes
Exchange through the Exchange System Attendant service.
Remote
administration No Prevents remote administration.
service
Allow related On Allows responses sent by the end-point mapper (EPM) service.
connections Off Disables the Protocol Agent.
Allow Allows message types that are not supported by the Protocol
Yes
unsupported Agent to bypass the control connection.
MS RPC
message Allows only supported message types (bind, bind ack, request,
No
types and response).
3. Click OK.
Option Explanation
Make If inserted in a NAT rule, the addresses relayed in the NetBIOS
On
corresponding communications are translated according to the NAT rule.
NAT
modifications Only the IP addresses in packet headers are translated if inserted
Off
to payload in a NAT rule.
4. Click OK.
Caution – The Oracle Protocol Agent is meant for cases in which TCP port 1521 is used
only for negotiating the port number for Oracle database connections, and the port number
for the actual connection is assigned dynamically. It must not be used in any other cases.
This Protocol Agent handles Oracle Transparent Network Substrate (TNS) protocol-based
SQL*Net, Net7, and Net8 connections. It is meant only for non-SSL connections where the port
number is assigned dynamically. If TCP port 1521 is used for the actual database connection,
do not use a Service that contains this Protocol element, because this may consume excessive
resources on the firewall and lead to performance problems (instead, use a Service that
matches TCP port 1521 without any Protocol element).
If you plan to use NAT for Oracle connections, you must configure the Oracle listener so that the
listener tells the client its original non-NATed IP address. This, and the Protocol Agent itself, is
necessary only if the database is located on a different computer than the Oracle listener. The
Oracle Protocol Agent does not modify payload data because the database service connections
could go through a different route than the listener connection.
Option Explanation
Allows database connection based on information in the listener
Allow related On
connection.
connections
Off Disables the Protocol Agent.
Max. length allowed for one TNS Enter the maximum amount of TCP payload data that each Oracle
packet TNS packet is allowed to carry.
Set checksum Resets the header and packet checksums to zero when the
Yes
to zero for Protocol Agent modifies the packet payload data.
modified TNS
packets No Checksums remain even when the packet is changed.
4. Click OK.
Option Explanation
Standard error (stderr) stream is allowed through the firewall as a
Allow Related On
response to an RSH command.
Connections
Off Protocol Agent is disabled.
4. Click OK.
Note – Connections used for file transfer and whiteboard drawing are not allowed by the
SIP Protocol Agent. Allow them in a different rule as necessary.
Option Explanation
4. Click OK.
Option Explanation
Selects the Content Inspection Server (CIS) to which the
Redirect Connections to CIS connections are redirected. See Getting Started with External
Content Inspection (page 670).
3. Click OK.
Option Explanation
Bytes allowed from client before Amount of data that the client is allowed to send to the server
Server ID before the server sends its own identification string.
Bytes allowed from server before Amount of data that the server can send to the client before the
Client ID client sends its own identification string.
Bytes allowed from server before Amount of data that the server can send to the client before the
Server ID server sends its own identification string.
Option Explanation
Validates the SSH transfers according to the parameters defined
Make protocol On
in this dialog.
validation
Off Protocol Agent is disabled.
3. Click OK.
Note – The Protocol Agent is meant only for Portmapper connections. Allow other RPC
services using Service elements without the Protocol Agent.
The Portmapper Protocol Agents collect information about RPC services by interpreting the GET
PORT and DUMP PORTS requests and their respective answers. All information it collects is
stored in the Portmapper cache.
When the packet filter needs to evaluate RPC matches, it consults the Portmapper cache to
check if the destination of the packet has the appropriate service defined in the rule. If the
cache does not have the requested information available, the packet under evaluation is not let
through and a query is sent to the destination host for RPC information. The information
received is stored in cache.
When a security policy contains a rule referring to RPC program number, it is essential to pay
attention to the structure of the security policy. We recommend you to follow these precautions
with the RPC protocol:
• Attach Portmapper Protocol Agent only to Portmapper connections passing through the
firewall.
• Allow the firewall engine to send RPC queries as explained below.
• Optimize the structure of your security policy (see www.stonesoft.com/support/ and search
for document number 1313 of type FAQ under “StoneGate Technical Documentation” for
more information).
RPC queries are sent from the firewall to TCP port 111 of the external host. You can use either
the sunrpc services configured for TCP and UPD, or the Portmapper combined service with both
sunrpc services. We recommend you to insert the following rule that allows connections to allow
such connection without the Protocol Agent above any other Portmapper rules:
Option Explanation
Learn RPC Yes Protocol Agent is enabled.
program
number to port
mapping for
future RPC No Protocol Agent is disabled.
service
matches
3. Click OK.
Option Explanation
Timeout in seconds for aborting a connection counted from when
the connection closing is initiated by one of the communicating
Abort on close parties. The connection is aborted by sending TCP Reset packets
to the unresponsive endpoint. Setting this value to 0 disables
this timeout (connections are left open).
Option Explanation
Timeout in seconds for closing a connection after the latest
Idle Timeout transmission. Setting this value to 0 disables this timeout
(connections are left open).
3. Click OK.
Option Explanation
Yes Allows file transfer from server to client (downloads)
Allow ‘read’
No Downloads are not allowed.
Option Explanation
Names of transferred files and their paths are included in
Log filenames Yes
generated log entries.
and paths
No File and path information is not available in logs.
3. Click OK.
DEFINING SITUATIONS
Situations are the central element in the Inspection rules in Firewall and IPS policies.
Situations define the patterns that recognize interesting events in the traffic.
595
Getting Started With Situations
Prerequisites: None
Tags
Situation Type
Vulnerability
The predefined Situation elements in your system are updated through dynamic update
packages that you should frequently activate in your system (automatically or manually). You can
create new Situation elements in addition to the predefined ones to fine-tune the patterns that
the IPS looks for in the traffic. You can create a Situation element for sensors and firewalls or a
Correlation Situation for Analyzers.
Note – Creating custom Situations requires that you have a basic understanding of the
protocols involved and a clear picture of the patterns of traffic that you want to look for.
4. Give the Situation a unique Name and, optionally write a Comment to describe the element
for your reference.
• With the exception of whitelisted URLS in URL Filtering, Situations are identified in the
system only by the element name. Creating multiple Situations that match the same
pattern can make the policy difficult to read and manage.
• The comment is only shown in the element properties and in the Info panel.
5. (Optional) Click Select and select the Situation Type with which to associate this Situation.
You can only select on Situation Type for each Situation. The Situation Type specifies the
branch of the Rules tree under which the Situation is included.
6. Use the Description field to describe the traffic pattern that the Situation represents. This
description is shown, for example, in log entries.
7. Select a Severity for the Situation. The Severity is shown in the logs and can be used in
Alert Policies as a criteria for alert escalation.
8. (Optional) Select how the Attacker and VIctim are determined when the Situation matches.
This information is used for blacklisting and in log entries.
• None does not define the Attacker and VIctim information, so blacklisting entries cannot
be created using the Attacker and Victim options.
• IP Source and IP Destination are the IP addresses of the (last) packet that triggers the
Situation. Since the packet can be a request or a reply, make sure to select the option
correctly based on the pattern that the situation detects to avoid reversed labeling.
• Connection Source and Connection Destination IP addresses depend on which host
opened the connection and provide a constant point of reference to the client and server
in the communications.
What’s Next?
Depending on the type of Situation element, proceed to Defining Context Options for
Situations (page 599) or Defining Context Options for Correlation Situations (page 602).
The Context information gives the Situation the information on which kind of patterns you want it
to match in the traffic, for example that you want to look for a certain character sequence in an
HTTP stream from the client to the server.
The Context gives you a set of options or a field for entering a regular expression that you can
use to define the pattern you want to look for in the traffic (see Regular Expression Syntax
(page 947)).
Note – With the exception of whitelisted URLS in URL Filtering, Situations are identified in
the system only by the element name. Avoid matching the same pattern in different
Situation elements. Situations with duplicate patterns can make the policy difficult to read
and manage.
These instructions are for Firewall and Sensor Situations. For Analyzer Situations, see Defining
Context Options for Correlation Situations (page 602).
What’s Next?
To fill in HTTP URL Filter options, see Defining HTTP URL Filter Options
(page 600).
To fill in scan detection options, see Defining Port/Host Scan Detection
Options (page 600).
For many Contexts, you must type in a regular expression, see Regular
Expression Syntax (page 947).
In other cases, open the Properties dialog for the Context element for more
information. When you have configured the necessary context information,
proceed to Adding Tags to One Situation at a Time.
Related Tasks
Defining Context Options for Correlation Situations (page 602)
Note – To be able to filter HTTPS URLs, you must first decrypt the traffic (see Getting
Started with HTTPS Inspection (page 656)).
What’s Next?
Adding Tags to One Situation at a Time (page 607)
Parameter Description
Port scan is reported if any of the thresholds is exceeded within
Port scan start period (seconds)
this time limit.
Parameter Description
Defines how many TCP connections that proceed normally
Maximum normal TCP
according to the protocol definitions are allowed before action is
connections
taken.
Maximum allowed open TCP Number of SYN+ACK replies that are allowed during the tracking
ports before action is taken.
Maximum unreplied TCP Number of unreplied TCP connections that are allowed during the
connections tracking before action is taken.
Maximum allowed closed TCP Number of RST replies that are allowed during the tracking before
ports action is taken.
Maximum TCP segments with no Number of TCP segments with no SYN or ACK flag that are allowed
SYN or ACK before action is taken.
Maximum UDP packet Number of UDP destinations that are allowed per host during the
destinations tracking before action is taken.
Maximum bidirectional UDP Number of bidirectional UDP transfers that are allowed per host
transfers during the tracking before action is taken.
Maximum allowed closed UDP Number of ICMP Port Unreachable replies that are allowed per host
ports during the tracking before action is taken.
Maximum ICMP requests per Number of ICMP request destinations that are allowed per host
host during the tracking before action is taken.
Maximum unreplied ICMP Number of ICMP request destinations that have not replied during
request destinations the tracking that are allowed per host before action is taken.
Maximum ICMP Echo Request Number of ICMP Echo Request (ping) destinations that are allowed
destinations per host during the tracking before action is taken.
Maximum ICMP Timestamp Number of ICMP Timestamp Request destinations that are allowed
Request destinations per host during the tracking before action is taken.
Maximum ICMP Netmask Number of ICMP Netmask Request destinations that are allowed
Request destinations per host during the tracking before action is taken.
Parameter Description
Number of ICMP Netmask Request destinations that have not
Maximum unreplied ICMP
replied during the tracking that are allowed per host before action
Netmask Requests
is taken.
What’s Next?
Adding Tags to One Situation at a Time (page 607)
Correlation Situations are used by Analyzers to conduct further analysis to events detected by
Sensors. Correlation Situations do not handle traffic directly, but they analyze the events
generated by sensors (matches to Situations found in traffic).
Related Tasks
If you would like to set options for a Firewall or Sensor Situation instead, see Defining
Context Options for Situations (page 599).
Caution – Be careful when defining the Compress Context options. You must make sure
that all event data you compress are truly parts of the same event, or you risk losing
valuable event information.
Caution – Be careful when using the Early or Very Early Locations, because the
compression may then affect the other types of correlation tasks. Using Early and Very
Early can improve performance if the Analyzer load is constantly high.
What’s Next?
Proceed to Adding Tags to One Situation at a Time (page 607).
What’s Next?
Proceed to Adding Tags to One Situation at a Time (page 607).
What’s Next?
Proceed to Adding Tags to One Situation at a Time (page 607).
What’s Next?
Proceed to Adding Tags to One Situation at a Time (page 607).
What’s Next?
Proceed to Adding Tags to One Situation at a Time (page 607).
What’s Next?
To use this Tag to organize Situations, continue to Adding Tags to One Situation at a
Time (page 607) or Adding Tags to Several Situations at Once (page 608).
5. Select the type of Tag you want to add from the submenu and select the Tags you want to
attach to the Situation(s) in the Add dialog that opens.
Vulnerabilities provide a short description of the event that has matched and a reference to
external vulnerability information (CVE/BID/MS/TA). When a Situation element refers to a
Vulnerability, the vulnerability information is included in the log entries when the Situation
matches traffic. You can also use the vulnerability codes in the element search to find Situation
and Vulnerability elements in the system that refer to the code.
Vulnerability information is included in dynamic update packages, so Situations provided by
Stonesoft are already linked to a Vulnerability when appropriate. You can associate Situations
with an existing Vulnerability or add a custom Vulnerability element.
Related Tasks
Creating New Vulnerability Elements (page 609)
Associating Vulnerabilities With Situations (page 610).
The User Response element allows you to send a customized reply to the user instead of just
ending the connection when an HTTP connection is refused, terminated, or blacklisted. User
Responses can be used in IPS Access Rules, and in Firewall and IPS Inspection rules.
611
Getting Started with User Responses
Prerequisites: None
Configuration Overview
1. Create a User Response element as explained in Creating User Responses (page 612).
2. Define the responses that are sent to the users when a connection is not allowed to
continue. See Defining User Response Entries (page 613).
3. Use the User Response element in the Access rules and Inspection rules as required.
See Editing Access Rules (page 518) and Editing Inspection Rules (page 531).
What’s Next?
Customize the responses that are sent to the users. Proceed to Defining User
Response Entries (page 613).
You can define a different User Response entry for each of the following cases in which an HTTP
or HTTPS connection is not allowed to continue:
• Connection blacklisted: the connection was discarded according to a rule with the Apply
Blacklist action. See Getting Started with Blacklisting (page 678) for more information.
• Connection refused by Access rule: the connection was dropped according to an Access
rule with the Refuse action.
• Connection terminated by inspection rule: the connection was terminated according to an
Inspection rule with the Terminate action.
• URL not allowed: the connection was terminated by one of the special URL filtering
situations. See Getting Started with Web Filtering (page 652) for more information.
• Virus found (Firewall): the firewall’s anti-virus feature found a virus in the web page. See
Configuring Anti-Virus Settings (page 424) for more information.
2. Click Edit for the entry you want to change. The User Response Entry Properties dialog
opens.
What’s Next?
Select the User Response element in the Action options of Access rules and
Inspection rules as required. See Editing Access Rules (page 518) and Editing
Inspection Rules (page 531).
The Quality of Service (QoS) features allow you to manage bandwidth and prioritize
connections on the firewall. QoS features are available on firewalls.
615
Getting Started with QoS
Prerequisites: None
QoS (Quality of Service) allows you to manage the available network bandwidth and ensure that
important network services are given priority over less important traffic.
What QoS Does
The firewall QoS features help you in the following ways:
• You can set up a Guarantee for minimum bandwidth for a type of traffic that must always be
allowed through quickly.
• You can set up a Limit for maximum bandwidth for a type of traffic that must never use more
than a certain share of the available bandwidth.
• You can set a Priority value for the traffic. Higher priority traffic is sent forward to its
destination before lower priority traffic if the firewall needs to queue packets due to
congestion.
• You can also create QoS rules that read or write the priorities in DiffServ Code Point (DSCP)
type of service (ToS) fields, so that StoneGate obeys the priorities set by other network
equipment and other equipment know the priorities set in StoneGate.
Limitations
QoS features have the following notable limitations:
• QoS is available on firewalls’ Physical interfaces, VLAN interfaces, and ADSL interfaces only.
QoS is not available on Modem interfaces.
• It is not possible to apply a bandwidth guarantee to incoming Internet traffic on your Internet
link. By the time the firewall sees the traffic, the bandwidth has already been used. If you
want guaranteed bandwidth for a specific portion of your incoming Internet traffic, contact
your ISP and ask if they can enforce this guarantee for you.
• If you want to create QoS rules for both incoming and outgoing traffic, you must assign a QoS
policy to at least two interfaces. Incoming traffic is processed according to the firewall policy
and then the QoS policy is applied to the allowed traffic on the outgoing interface.
What Do I Need to Know Before I Begin?
Make clear to yourself at which point the QoS rules are applied:
• Any priorities, limits, and guarantees are applied and DSCP codes are written to outgoing
packets on the interface that the traffic uses to exit the firewall according to the QoS policy
and interface speed defined for that interface.
• For packets that enter the firewall, the QoS policy on that interface is only used for reading
DSCP codes and matching them to QoS Classes for further use. This is the only QoS
operation that is done on the interface that the traffic uses to enter the firewall.
Example If a new packet enters the firewall through interface A and leaves the firewall through
interface B, any priorities, guarantees, and limits are configured and applied on interface B.
The priorities, guarantees, and limits configured on interface A are ignored for packets in this
direction. If the packet contains a DSCP code when entering the firewall, the DSCP code is
read and matched to a StoneGate QoS Class on interface A, but if a new DSCP codes is
(over)written in the packet, the new code is written on interface B.
QoS Class
Firewall Policy
1. Create a QoS Class element for each type of traffic that you want to handle differently on
any single network interface. See Creating QoS Classes (page 617).
2. Create one or more QoS Policies to define how each type of traffic is handled on the
interfaces. See Defining QoS Policies (page 618).
3. Assign QoS Classes to different types of traffic in your Access rules. See Matching QoS
Rules to Network Traffic (page 620).
4. Define the speed of each interface and the QoS Policy each interface uses. See Defining
Interfaces’ Speed and QoS Policy (page 621).
What’s Next?
To create your custom QoS scheme, proceed to Creating QoS Classes (page 617).
If the default QoS Policy is sufficient for you, proceed to Matching QoS Rules to Network
Traffic (page 620).
QoS classes link QoS rules to Access rules in firewall policies. They can also be used in
Outbound Multi-Link elements to adjust the load balancing of different types of connections.
You must create one QoS Class for each rule you plan to add in any single QoS Policy, as the
QoS policy cannot contain any overlapping rules.
There is a default QoS Policy and three QoS Classes in the system that can be used as such to
set priorities for high, normal, and low priority traffic without any bandwidth guarantees or limits.
Tip – You can also create new QoS Classes from within the QoS Policy in a similar manner as
described below.
QoS policies determine the rules that the firewall follows when it decides which traffic is given
priority and how the available bandwidth is divided. One QoS policy can be assigned for each
physical or VLAN interface. You can assign the same QoS policy to several interfaces. To be able
to use the same policy on interfaces with different speeds, enter bandwidth limits and
guarantees as percentages of the total available bandwidth.
Most definitions in the QoS Policy are only applied when the traffic needs to be queued, so it is
applied on each interface to packets that exit the firewall. The exception to this is mapping
DSCP codes present in traffic to QoS Classes in StoneGate, which is done to packets entering
the firewall.
What’s Next?
Fill in the policy by Editing QoS Rules (page 619).
What’s Next?
If you added new QoS rules, insert the corresponding QoS Classes into the firewall
Access rules as explained in Matching QoS Rules to Network Traffic.
If the necessary QoS Classes are already in the firewall Access rules, but you have not
defined the QoS Policy and interface speed for all physical or VLAN interfaces, proceed
to Defining Interfaces’ Speed and QoS Policy (page 621).
Otherwise, you are done. Refresh the firewall’s policy to transfer the changes.
The QoS rules are linked to different types of traffic using the QoS classes. QoS Classes are
matched to traffic in the firewall Access rules with following actions:
• Rules with the Allow action to set a QoS class for traffic matching that rule.
• Rules with the Continue action to set a QoS class for all subsequent matching rules that
have no specific QoS class defined.
• Rules with the Use VPN action to set a QoS class for VPN traffic. Incoming VPN traffic may
also match a normal Allow rule after decryption. Note that QoS is not applied to encapsulated
traffic. For outgoing traffic, encryption is done before the QoS Policy is checked. For incoming
traffic, decryption is done after the QoS Policy is checked.
However, if you want to read and use DSCP markers set by other devices, the QoS Class is
assigned using the QoS Policy.
Note – If traffic is assigned a QoS Class using a DSCP Match rule, the same traffic must
not match any Access rule that assigns a different QoS Class to the same traffic. Such
Access rules override the QoS Class set using a DSCP Match.
What’s Next?
If you have just created a new QoS policy, define the interface speeds and select this
QoS policy for the relevant interfaces. See Defining Interfaces’ Speed and QoS Policy
(page 621).
Otherwise, you are done. Refresh the firewall’s policy to transfer the changes.
Related Tasks
Editing Access Rules (page 518)
To implement your QoS rules, define which QoS Policy each physical or VLAN interface uses. If
you want to enforce bandwidth limits and guarantees in your policy, also define the bandwidth
that each interface provides. Each physical or VLAN interface has separate QoS settings:
• DSCP read operations are done on the interface that the packets use to enter the firewall.
• All other QoS operations are done on the interface that the packets use to exit the firewall.
Example Traffic from the internal network to the Internet (uploads) match the QoS Policy of the
interface that connects to your ISP. Traffic from the Internet to an internal network
(downloads) matches the QoS Policy of the interface that connects to your internal router.
If you want to use any QoS-related settings on an interface, you must also define the throughput
for the interface.
To set the bandwidth and QoS policy for a physical or VLAN interface
1. Double-click a Firewall element. The properties dialog for that firewall opens.
2. Switch to the Interfaces tab.
3. Double-click a physical or VLAN interface. The properties dialog for that interface opens.
• If there are VLANs on a physical interface, the settings are only available in the properties
of each VLAN.
4. Set the QoS Policy that this interface uses.
5. Enter the Throughput in kilobits per second.
• You can also use the shorthands M or G to enter the value in megabits or gigabits
respectively (for example, 3M for a 3 megabit throughput).
• In a Multi-Link configuration with more than one ISP link behind a single physical firewall
interface, enter the total bandwidth of all active ISP links (NetLinks) on the same
interface.
Caution – Make sure you set the Throughput correctly. When the throughput is set, the
firewall always scales the total amount of traffic to the Interface speed you defined. This is
regardless of whether you have set any bandwidth limits or guarantees for any traffic.
6. Click OK. Repeat as necessary for other interfaces. Interfaces with QoS in use are marked
with Q in the Interfaces table’s Mode column.
7. Click OK to close the firewall properties
What’s Next?
The configuration is now finished. Refresh the firewall’s policy to transfer the changes.
You can implement user authentication to control which resources different end-users can
access. Authentication can be used as an additional access requirement in IPv4 Access rules
in Firewall policies. IPS components do not perform user authentication. Both internal and
external user storages and user authentication servers can be used.
623
Getting Started with User Authentication
Prerequisites: None
Authentication means requiring users proof of their identity before giving access to a network
resource. Authentication is mandatory with client-to-gateway VPNs. You can require
authentication for any non-VPN connections as well.
What User Authentication Does
With user authentication, you can:
• Maintain separation of internal networks with different security levels in cases where the
confidentiality of the information that is accessed does not need to be strictly enforced (for
example, as an additional access control measure for applications that exchange the
information securely).
• Allow secure and confidential access from any location to any internal resources for users
with VPN clients.
Limitations
• Users are automatically prompted to authenticate if they have the StoneGate IPsec VPN client
installed. Non-VPN authentication does not support automatic authentication prompts.
• Authentication without establishing a client-to-gateway VPN uses Telnet, which transfers
usernames and passwords in cleartext. A one-time password scheme is required for a secure
solution, and this requires setting up an external authentication server. After the users
authenticate, their communications are also transferred as cleartext in this case.
• The internal LDAP user database does not allow external authentication servers to query user
information. An external user database is always required if you want to use external
authentication servers with StoneGate.
• The internal LDAP database limits the length of the User and User Group DN (distinguished
name) to a maximum of 254 characters. Check the restrictions of external LDAP servers from
the external server’s documentation.
• If there are administrative Domains configured, the internal user database is always in the
Shared Domain and the user accounts stored in the internal database are also always in the
Shared Domain. If you want to limit the visibility of end-user accounts, you must configure
external LDAP database(s) separately for each Domain.
• User authentication is only possible with IPv4 addresses. All elements used in User
Authentication must have an IPv4 address. User Authentication can only be configured in the
IPv4 Access rules.
What Do I Need to Know Before I Begin?
Authentication requires a user database that stores the user information and an authentication
service that inspects credentials and grants or denies the access.
StoneGate has an internal user database and internal authentication methods. Alternatively, you
can use external LDAP user databases and/or external RADIUS or TACACS+ compatible
authentication servers such as IAS, RSA Authentication Manager (SecurID), or StoneGate SSL
VPN appliances.
See the Firewall/VPN Reference Guide for more information on the different configuration
options.
Authentication User
Server
Authentication Service
Related Tasks
Authenticating to a StoneGate Firewall (page 647).
You can use an external LDAP database to store user group and user information instead of or
in addition to the internal user database. Additionally, an external LDAP server can be used to
perform simple password authentication for externally stored user accounts.
The Management Server and the firewall engines both have an integrated LDAP client that can
query the external user directory. To take full advantage of user authentication features, you
should configure access to the LDAP database for both the Management Server and the firewall.
Configuring access to the external LDAP directory for both the firewall and the Management
Server allows the following:
• There is no need to manually duplicate user account information. User and User Group
elements are automatically added to the SMC from the LDAP database.
• Externally stored user accounts are shown in the Management Client and can be used to
create different rules for different users.
• In most cases, users can be also added, removed, and modified through the Management
Client.
• Internal authentication methods can be used to authenticate externally stored users.
Configuring external LDAP access for the firewall engines only without configuring access for the
Management Server allows the following:
• You can authenticate externally stored users against an external authentication service. In
this case, internal authentication methods are not available for externally stored users.
• A single element (User element named *external*) is used to represent all externally stored
users in the firewall’s policy, so it is not possible to create different rules for different
externally stored users.
You can view user information and use it for authentication against an external authentication
service just by allowing the StoneGate components to connect to the LDAP database. To be able
to authenticate users with an LDAP password or to be able to modify information in the LDAP
directory through the Management Client, you must add parameters for StoneGate on the LDAP
server by configuring schema files.
What’s Next?
To use all LDAP-related features, proceed to Configuring Schema Files on External LDAP
Servers (page 627).
To configure view-only access to the user information and/or use the LDAP database
with some external authentication service only, proceed to Defining a Generic LDAP
Server Element (page 629).
What’s Next?
If your external user database is strored on a Microsoft Active Directory Server, continue
by Defining an Active Directory Server Element (page 627).
For other types of LDAP servers, see Defining an Active Directory Server Element
(page 627) or Defining a Generic LDAP Server Element (page 629).
What’s Next?
Continue by configuring the LDAP settings as instructed in Configuring the Active
Directory Server’s LDAP Settings.
Related Tasks
Adding Custom Commands to Element Menus (page 53)
Note – The Default firewall template allows the engines to connect to the default port. If
you change to a custom port, you must add a new Access Rule to allow the traffic.
9. (Recommended, requires Firewall version 5.1 or higher) Select LDAP StartTLS to enable
Transport Layer Security (TLS) for connections to the server.
What’s Next?
Continue by Configuring Active Directory Server’s Authentication Settings (page 629).
What’s Next?
Continue by Defining LDAP Domains (page 633).
Related Tasks
For more information on configuring IAS, consult Microsoft’s documentation at
http://technet.microsoft.com/en-us/library/cc783725%28WS.10%29.aspx.
For more information on configuring NPS, consult Microsoft’s documentation at
http://technet.microsoft.com/en-us/library/cc753394%28WS.10%29.aspx.
4. Enter a unique Name and IP Address for the server. Only IPv4 addresses are supported.
5. A Location and Contact Address are needed if NAT is applied between a firewall or
Management Server and the IAS/NPS, so that the firewall and Management Server cannot
connect directly to the IP address defined for the interface. For more information, see
Defining Locations (page 61) and Defining Contact IP Addresses (page 62).
6. (Optional) Define the LDAP on Port number if you want to override the default port (TCP
port 389).
Note – The Default firewall template allows the engines to connect to the default port. If
you change to a custom port, you must add a new Access Rule to allow the traffic.
7. (Recommended, requires Firewall version 5.1 or higher) Select LDAP StartTLS to enable
Transport Layer Security (TLS) for connections to the LDAP server.
8. Use the Timeout field to define for how long StoneGate components wait for the server to
reply. The default is 10 seconds.
9. (Optional) Switch to the Secondary IP addresses tab and add one or more secondary IP
addresses for the server. These are included when used in rules in policies, but StoneGate
components never use the addresses when initiating contact with the server.
What’s Next?
Continue by Configuring the LDAP Server’s User Services.
2. In Base DN, enter the LDAP tree under which the authenticating users’ accounts are
stored.
Example (DNS-based tree)
dc=example,dc=com
Example (“O-based” tree used, for example, in Novell eDirectory)
ou=astronauts,o=goverment,st=Florida,c=US
3. In the Bind User ID field, define the Distinguished Name of the User ID that the firewalls
and Management Servers use to connect to the LDAP server.
Example (DNS-based tree)
uid=StoneGate,ou=Administrators,dc=example,dc=com
Example (“O-based” tree used, for example, in Novell eDirectory)
uid=StoneGate,ou=Administrators,ou=astronauts,o=goverment,st=Florida,c=US
4. In Bind Password, enter the password for the user account you defined in the previous
step. Deselect Hide if you want to view the password in this dialog.
5. If necessary, change the name that the server uses for the UserID Attribute. By default,
the attribute is set to cn (common name).
6. If necessary, change the name that the server uses for the Group Member Attribute. By
default, the attribute is set to member.
7. If the users are identified by their e-mail address in certificate authentication, enter the
name of the attribute for storing the users’ e-mail address in the Email Attribute field.
What’s Next?
If you do not want to add object classes, click OK and you are done.
Otherwise, continue in Adding Object Classes for the LDAP Server.
2. Enter the name of the object class and click Add. The object class appears in the list.
3. Repeat the previous steps to add more object classes.
4. Click OK.
What’s Next?
To integrate the Management Server with the LDAP server, continue by Defining LDAP
Domains (page 633).
If you want to skip Management Server integration, continue by Integrating External
Authentication Services (page 634) or (if you already have the external authentication
configured) by Defining User Accounts for Authentication (page 637).
What’s Next?
If you plan to use an external authentication service (Active Directory Server or some
other RADIUS or TACACS+ capable server) proceed to Integrating External
Authentication Services (page 634).
If you plan to use StoneGate’s internal authentication services, continue the
configuration by Defining User Accounts for Authentication (page 637).
External authentication servers are integrated with the help of Authentication Server and
Authentication Service elements. The Authentication Server elements define the settings
necessary for connecting to an external authentication server. The Authentication Service
elements define an authentication method, and can include several Authentication Servers that
support the method and can be used as backups to each other.
What’s Next?
If you are using a previously defined Active Directory Server with IAS settings and user
accounts correctly configured, continue by Defining Authentication Rules (page 642).
If you want to configure a new Active Directory Server element or reconfigure an existing
element’s IAS settings, continue by Defining an Active Directory Server Element
(page 627).
Otherwise, start by Defining an Authentication Server (page 635).
4. Specify a unique Name and the IP Address for the server in the fields provided. Only IPv4
addresses are supported.
5. A Location and Contact Address are needed if there is a NAT device between a firewall and
the authentication server (used for authentication), so that the firewall cannot connect
Note – The Default firewall template allows the engines to connect to the default port. If
you change to a custom port, you must add a new Access Rule to allow the traffic.
7. Enter the secret key (for communication with the authentication server) in the Shared
Secret field. Deselect Hide if you want to view the password in this dialog.
8. Use the Number of Retries field to define the number of times firewalls try to connect to
the server in case connecting fails.
9. Define the Timeout for how long firewalls wait for the server’s reply. The default is 15
seconds.
10.(TACACS+ servers, optional) Select the Clear Text Replies option to make the firewall
accept replies that are not encrypted from the authentication server.
11.(Optional) Switch to the Secondary IP Addresses tab and define additional IP addresses.
These are used in rules and routing, but firewalls always use only the main IP address when
they contact the authentication server. Only IPv4 addresses are supported.
12.Click OK.
13.Configure the external authentication server to accept connections from your StoneGate
firewall engines:
• Take special care to ensure that the shared secret is entered identically in StoneGate and
on the external server.
• The identity that the firewall announces to the server is equal to the IP address of the
interface that has been selected as the value for the Identity for Authentication
Requests option in the properties of the Firewall element’s Interface Options.
Note – The IP address used as the identity is a “name” only. The interface and IP address
used for the authentication-related connections is selected based on the firewall’s routing
information just like for any other connection.
The connections to the authentication server are allowed in the Default firewall policy template.
Make sure your IPv4 Access and NAT rules are configured correctly for these connections.
What’s Next?
To use the Authentication Server for User Authentication, continue by Defining an
Authentication Service (page 637).
If you want to use the server for authenticating administrators’ Management Client
logins, see Authenticating Administrators Using RADIUS (page 226).
Related Tasks
Setting up User Authentication (page 623)
Adding Custom Commands to Element Menus (page 53)
For information on integrating StoneGate with RSA SecurID authentication, see
http://www.rsa.com/rsasecured/product.aspx?id=1850.
Note – If you select more than one Authentication Server, all selected servers must provide
an identical service (the exact same credentials must be valid on all included servers).
What’s Next?
Assign the new Authentication Service to users (required even if the user information is
not available to StoneGate). See Defining User Accounts for Authentication.
The User Group and User elements define the user account information for end-users. They can
be inserted in IPv4 Access rules to add a requirement for authentication as a condition of
matching rules to the end-users’ connections.
Options for Adding User Accounts
If you are using the Management Server’s internal user database:
• If you have existing user accounts stored in another StoneGate user database, you can
export/import the information between the databases (see Importing and Exporting User
Information (page 644)).
• Otherwise, create the User Groups and Users individually.
If you are using an external user database:
What’s Next?
If you want to create User Groups for organizing the individual users, see Defining User
Groups.
If you do not need new User Groups or your user database is not integrated with
StoneGate, you can proceed directly to Defining Users (page 640).
4. Right-click the parent group below the LDAP Domain (this is called “stonegate” for the
internal database) and choose NewUser Group from the menu. The User Group
Properties dialog opens.
8. Click Add to select the one or more Authentication Services in the Select Element dialog
that opens.
• If you select several Authentication Services for the User Group, you can further restrict
the Authentication Services allowed in the User element properties and in each Access
rule that requires authentication.
9. Click OK.
What’s Next?
Continue by Defining Users (page 640).
Note – Although you cannot edit User Group memberships in the User element properties,
the user can belong to several User Groups. After creating the User element, drag and drop
it to other User Groups to add more group memberships.
Caution – Use strong passwords that are at least eight characters long and that contain
numbers, letters, and special characters. Do not base passwords on personal information
such as names, birthdays, ID numbers, phone numbers, street names, registration plate
numbers, relatives’ names, not even if spelled backwards or partially.
• To use Pre-Shared Key Method authentication with third-party VPN clients, type in and
confirm the pre-shared key.
9. Click OK.
What’s Next?
Insert User Groups or individual User elements in IPv4 Access rules to enforce user
authentication. See Defining Authentication Rules (page 642).
Related Tasks
Integrating External Authentication Services (page 634)
User authentication involves two types of connections: the connection that users make to
authenticate and the subsequent connections that users launch to access services. In Firewall
IPv4 Access rules, the Users cell and the Authentication cell are used as matching criteria for
accessing a particular service and for setting options for the authentication. Connections from
users that have not successfully authenticated or whose authentication has expired do not
match the rules with an authentication requirement (the connection matching continues to rules
further down in the policy). The authentication part in a rule is configured in the same way
regardless of whether VPN encryption is involved.
For information on how to create VPN Client rules, see Creating Basic Rules for VPN Client
Connections (page 750).
Note – If you allow more than one Authentication Service for any one user, the credentials
supplied by the user must be identical in all cases.
• Even when the Authentication cell is set to ANY, only the Authentication Services allowed
for the Users included in the rule are valid (as defined in the LDAP Domain, User Group,
and/or the individual User element).
6. Double-click the Authentication cell. The Authentication Parameters dialog opens.
What’s Next?
See Authenticating to a StoneGate Firewall (page 647) for an explanation on what the
users need to do to authenticate in non-VPN authentication.
See Customizing the User Authentication Dialog (page 648) if you want to change the
text that the users see when they authenticate themselves using Telnet.
Related Tasks
Importing Elements (page 76)
3. Right-click the correct user group under InternalDomain and select ToolsExport
StoneGate Users from the menu.The Export File Browser dialog opens.
4. Select the correct location, type in the filename, and click Export. A new tab opens showing
the progress of the export.
5. When the export is finished, check the messages for any warnings before you close the tab.
Related Tasks
Exporting Elements (page 75)
Caution – If you want to prevent users from authenticating, follow the instructions in
Clearing Users’ Authentication Settings (page 646) instead of turning off the replication.
Turning off the replication prevents any new users you add after the operation from
authenticating, but may not prevent existing users from doing so.
Users can authenticate either using the StoneGate IPsec VPN client or by connecting to the
StoneGate gateway using a standard Telnet client. If the users are authenticating for VPN
access, they must authenticate using the IPsec VPN client; the Telnet option is not valid for that
case. See the StoneGate IPsec VPN Client User’s Guide for information on how to authenticate
using the StoneGate IPsec VPN client.
Caution – When using Telnet, the username and password are transported as cleartext,
readable to anyone who can intercept the transmission. Use a one-time password scheme
to reduce the risk of unauthorized access.
The message shown to users connecting with a Telnet client can be customized, see
Customizing the User Authentication Dialog (page 648).
Anyone who is allowed to connect to the firewall with a Telnet client on port 2543 (TCP) is
greeted with an authentication message. If you use a customized top-level template, make sure
that access to this port is allowed from all desired source addresses. Only IPv4 addresses are
supported as source addresses.
Note – The Default firewall template policy allows access from any source to port 2543 on
the firewall. The Access rules that use the authentication requirement as one access
criteria must always also have specific Source and Destination definitions that limit access.
By default, the authentication dialog states “StoneGate firewall <IP address>”. The IP address
shown is the IP address of the interface that has the option Identity for Authentication
Requests set. You can replace the message by creating a simple text file on the firewall node as
explained below. You can also create a single text file and then transfer it (for example, by using
a USB memory stick, SSH etc.) to all firewall nodes that handle user authentication if you have
many such nodes (see the directions below for information on the file contents and location).
Related Tasks
Changing Default Rules (page 560)
Successful and failed user authentication attempts as well as StoneGate’s own connections to
external authentication servers can be followed in the logs and you can create reports based on
this data. There is no separate viewer for checking the currently active authenticated users.
If there are problems with integration with external components, you can activate more detailed
diagnostics logging for Authentication. See Enabling/Disabling Firewall/VPN Diagnostics
(page 193).
Web filtering allows you to filter web access based on categories of content and/or lists of
individual websites. Web filtering is supported on Firewall/VPN engines that are licensed for
deep packet inspection and on IPS sensors. Category-based web filtering is a separately
licensed feature.
651
Getting Started with Web Filtering
Prerequisites: None
Configuration Overview
Illustration 45.1 Elements in the Configuration
1. (For category-based filtering) Make sure that the engine and the network are set up so that
the engine can fetch the lists of URLs directly from the BrightCloud servers.
• Make sure that DNS server(s) are defined on the Advanced tab in the engine’s
properties. See Getting Started with Advanced Engine Settings (page 416).
• Make sure that the engines have access to the DNS server (UDP port 53, Service
element “DNS (UDP)”), and to the BrightCloud servers (TCP port 2316, Service element
“BrightCloud update”). The Default firewall policy template allows these connections from
the firewall engine on which the policy is installed, but not from other components.
2. (Optional) Create User Responses to notify users about matches that are found. See
Getting Started with User Responses (page 612).
3. (Optional when using category-based filtering) Define lists of individual URLs that you want
to filter. See Blacklisting/Whitelisting Web URLs Manually (page 653).
4. Add Inspection rules. See Creating Web Filtering Rules (page 654).
HTTP URL Filtering Situations allow you to define lists of URLs that blacklist (block) access to
the specified URLs. When used in combination with category-based web filtering, these types of
lists can additionally be used to whitelist (allow) individual URLs that are included in an
otherwise blocked category. URL whitelisting only affects URL-based filtering. It does not exclude
the traffic from other inspection checks.
Note – To be able to filter HTTPS URLs, you must decrypt the traffic. See Getting Started
with HTTPS Inspection (page 656).
What’s Next?
Creating Web Filtering Rules (page 654)
Firewalls do not deep inspect traffic by default, so make sure there is an Access rule that
matches HTTP traffic and has the Deep Inspection option selected in the Action options.
The actual URL filtering is configured in the Inspection rules. Category-based filtering Situations
are listed in the Rules tree under Web Filtering. The categories are updated through dynamic
update packages.
Add your whitelist in the Exceptions table in a rule that is set to use the Permit action. Your
manual URL lists can be found under SituationsCustom Situations. The whitelist must be in
the Exceptions table to be able to override category-based filtering settings in the Rules tree
(which is the purpose of whitelisting).
Blacklists can be included as an Exception or added to the Rules tree (by selecting a Situation
Type for the Situation).
You may also want to include a User Response in the rule to display warnings or notes in the
users’ browsers when Web Filtering prevents access. See Editing Inspection Rules (page 531)
and Getting Started with User Responses (page 612) for more information.
What’s Next?
Refresh the policy of the firewall or sensor to activate the configuration.
The HTTPS Inspection feature allows you to decrypt HTTPS connections so that they can be
inspected for malicious traffic. HTTPS Inspection is available on firewalls and sensors.
655
Getting Started with HTTPS Inspection
Prerequisites: None
Access Rules
1. If you want to configure server protection, create Server Protection Credentials elements.
See Configuring Server Protection (page 658).
2. If you want to configure client protection, create Client Protection Certificate Authority
elements. See Configuring Client Protection (page 659).
3. (Optional) Define custom Trusted Certificate Authority elements in addition to the default
system elements. See Defining Trusted Certificate Authorities for HTTPS Inspection
(page 662).
4. Activate client protection and/or server protection in the properties of the firewall or
sensor. See Activating HTTPS Inspection on the Engine (page 665).
5. (Optional) Define an HTTPS Inspection Exceptions element to exclude certain domains
from decryption and inspection. See Excluding Domains from HTTPS Inspection
(page 666).
6. Create a custom HTTPS Service that enables HTTPS inspection. See Defining a Custom
HTTPS Service (page 667).
7. Create Access rules to select traffic for HTTPS inspection. See Creating Access Rules for
HTTPS Inspection (page 668).
What’s Next?
If you want to configure server protection, proceed to Configuring Server Protection
(page 658).
Otherwise, proceed to Configuring Client Protection (page 659).
The Server Protection Credentials element stores the private key and certificate of an internal
HTTPS server. The private key and certificate allow the firewall or sensor to decrypt HTTPS traffic
for which the internal server is the destination so that it can be inspected. The certificate and
the associated private key must be compatible with OpenSSL and be in PEM format. Make sure
that the server’s private key and certificate are accessible from the computer where you use the
Management Client.
What’s Next?
If you want to inspect connections between internal clients and external HTTPS servers,
proceed to Configuring Client Protection (page 659).
Otherwise, proceed to Activating HTTPS Inspection on the Engine (page 665).
When an internal client makes a connection to an external HTTPS server, the engine generates
a substitute certificate that allows it to establish a secure connection with the internal client.
The engine adds a Netscape Certificate Comment to the Extensions in the substitute certificate
to indicate that the certificate is a dynamically created certificate for StoneGate SSL/TLS deep
inspection. The Client Protection Certificate Authority element contains the credentials the
engine uses to sign the substitute certificate it generates. If the engine does not use a signing
certificate that is already trusted by users’ web browsers when it signs the substitute
certificates it generates, users receive warnings about invalid certificates. To avoid these
warnings, you must either import a signing certificate that is already trusted, or configure users’
web browsers to trust the engine’s signing certificate.
Note – Traffic that uses HTTPS may be protected by laws related to the privacy of
communications. Decrypting and inspecting this traffic may be illegal in some jurisdictions.
Note – All fields except the Name and Validity time on the General tab are greyed out. The
greyed out fields are always filled in automatically based on information contained in the
certificate you generate or import, and you cannot change them.
To import a private key and signing certificate for HTTPS client protection
1. Switch to the Certificate tab.
2. Click the Import button for the Private Key field and browse to the private key.
3. Click the Import button for the Certificate field and browse to the certificate.
If users’ web browsers are not already configured to trust the certificate authority whose signing
certificate you imported here, you must add it to the list of certificate authorities that are
trusted by users’ web browsers when you are finished configuring HTTPS Inspection in
StoneGate.
What’s Next?
Proceed to Activating HTTPS Inspection on the Engine (page 665).
To generate a private key and signing certificate for HTTPS client protection
1. Switch to the Certificate tab.
What’s Next?
Export the engine’s signing certificate so that it can be added to the list of certificate
authorities that are trusted by users’ web browsers. Proceed to Exporting an HTTPS
Client Protection Certificate (page 662).
2. Click the Export for the Certificate field and browse to the location where you want to save
the file.
When you are finished configuring HTTPS Inspection in StoneGate, add the exported certificate
to the list of certificate authorities that are trusted by users’ web browsers.
What’s Next?
Proceed to Activating HTTPS Inspection on the Engine (page 665).
Trusted Certificate Authority elements represent the certificates that identify certificate
authorities. There are default Trusted Certificate Authority elements for many major certificate
authorities. When a client in the protected network connects to an HTTPS server, the engine
checks whether the certificate authority that signed the server’s certificate is one of the Trusted
Certificate Authorities. If the certificate was signed by one of the Trusted Certificate Authorities,
the engine makes a substitute certificate that matches the server's certificate and signs it with
the Client Protection Certificate Authority signing certificate. If the server’s certificate is not
signed by a Trusted Certificate Authority, the engine makes a new self-signed certificate, and
users receive a warning that the issuer of the certificate is not trusted. In both cases, client
protection continues to function normally.
If you are using client protection and users need to connect to domains whose certificates are
not signed by one of the default Trusted Certificate Authorities, you can define a Trusted
Certificate Authority element to represent it. When you define a CA as trusted, all certificates
signed by that CA are considered valid until their expiration date.
Note – All fields except the Name on the General tab are greyed out. The greyed out fields
are always filled in automatically based on information contained in the certificate you
import and you cannot change them.
What’s Next?
If you want to configure certificate revocation list (CRL) checks for this certificate
authority, proceed to Configuring Certificate Revocation List Checks for HTTPS
Inspection (page 664).
Otherwise, click OK to close the Trusted Certificate Authority Properties dialog and
proceed to Activating HTTPS Inspection on the Engine (page 665).
What’s Next?
Proceed to Activating HTTPS Inspection on the Engine (page 665).
Depending on the elements you select in the engine properties, you can activate the capability
for client protection alone, server protection alone, or client and server protection together.
5. (For client protection) Click Select and select the Client Protection Certificate Authority
element.
6. (For server protection) Select the Server Protection Credentials element(s) and click Add.
The selected elements are added to the list.
7. Click OK to close the engine properties dialog.
What’s Next?
If you want to exclude certain domains from HTTPS decryption and inspection, proceed
to Excluding Domains from HTTPS Inspection (page 666).
Otherwise, proceed to Defining a Custom HTTPS Service (page 667).
The HTTPS Inspection Exceptions element is a list of domains that are excluded from decryption
and inspection. Traffic to and from the specified domains is matched against the Access and
Inspection rules as encrypted HTTPS traffic.
Caution – The domain name or NetBIOS name must exactly match the DNSName or
IPAddress fields in the Subject Alternative Name or Common Name in the certificate of the
server you want to exclude from decryption. Otherwise, the domain is not excluded from
decryption and inspection.
6. Repeat these steps for any additional domains, then click OK.
What’s Next?
Create a custom HTTPS Service that enables HTTPS inspection and select the HTTPS
Inspection Exceptions in the Protocol Parameters. Proceed to Defining a Custom HTTPS
Service (page 667).
By default, HTTPS Inspection is not enabled in the HTTPS Service. To enable HTTPS Inspection,
you must create a custom HTTPS Service. You can optionally also specify the HTTPS Inspection
Exceptions to exclude domains from decryption and inspection.
6. (Optional) Click the Select button for the HTTPS Inspection Exceptions field and select the
HTTPS Inspection Exceptions element in the dialog that opens.
7. Select Yes for HTTPS Decryption and Inspection.
8. Click OK.
What’s Next?
Use the custom HTTPS Service in an Access rule to select HTTPS traffic for inspection.
Proceed to Creating Access Rules for HTTPS Inspection (page 668).
To select HTTPS traffic for inspection, you must create Access rules that use the custom HTTPS
Service that you have created. You must select Deep Inspection in the Action options of the
Firewall Access rules to enable inspection of matching traffic. Deep Inspection is enabled by
default in the IPS Access rules. Traffic that matches the Access rules for HTTPS inspection is
decrypted and matched against HTTP Situations in the Inspection rules in the same way as
unencrypted HTTP traffic. Any traffic that is allowed to continue by an Inspection rule is re-
encrypted and sent to its destination.
2. (Server Protection) Add a rule with the following properties to select traffic to internal
servers for inspection:
What’s Next?
Define Inspection rules to match the decrypted traffic against HTTP Situations. Proceed
to Editing Inspection Rules (page 531).
Otherwise, if you are finished editing the policy, save and install the policy to start using
the new configuration.
Related Tasks
Editing Access Rules (page 518)
Content inspection, such as virus scanning or URL filtering, can be done by integrating an
external content inspection server (CIS) in the traffic inspection process. Any single or
clustered firewalls can be configured to forward traffic to an external CIS.
669
Getting Started with External Content Inspection
Prerequisites: Install and configure the CIS server before you configure CIS redirection in StoneGate
You can redirect traffic to an external content inspection server (CIS), such as a virus scanning
server, for content screening before the traffic continues to its final destination.
What CIS Redirection does
Connections arriving at the firewall can be redirected (using NAT) to a content inspection server
that works as a proxy. The content inspection server filters out unwanted traffic before
inspected traffic is forwarded through the firewall toward its original destination (possibly with a
second NAT operation).
Limitations
• Only the FTP, HTTP, and SMTP Protocol Agents can be used for redirecting traffic to a content
inspection server.
• You can apply either external content inspection (CIS redirection) or internal content
inspection (HTTPS inspection, Web Filtering, internal virus scanning, deep inspection) on
traffic. It is not possible to use both forms of content inspection simultaneously on the same
connection.
• Only IPv4 addresses are supported in CIS redirection.
Configuration Overview
Illustration 47.1 Elements in the Configuration
CIS Server
1. Define the CIS Server element to define the IP address and services the server inspects.
See Defining a Content Inspection Server Element (page 671).
2. Create a custom Service element that includes the CIS Server. See Defining a Service for
CIS Redirection (page 672).
3. Define the Access rules that select traffic for CIS redirection. See Defining Access Rules
for CIS Redirection (page 674).
4. Define the NAT rules for CIS redirection. See Defining NAT Rules for CIS Redirection
(page 675).
The CIS Server element defines the IP address and the ports for the service(s) on the server.
8. Select the protocol to be inspected and enter the Port Number that the server uses for the
service.
9. Click OK.
What’s Next?
Continue the configuration by Defining a Service for CIS Redirection (page 672).
What’s Next?
Continue the configuration by Defining Protocol Parameters for CIS Redirection
(page 673).
Note – NAT is mandatory for CIS redirection to forward the traffic to the CIS server. Your
NAT rules must not contain overlapping definitions.
What’s Next?
Continue the configuration in Defining Access Rules for CIS Redirection (page 674).
Typically, two IPv4 Access rules are needed when the traffic to and from the CIS server goes
through the firewall. One rule redirects the matching traffic to the CIS server and another rule
allows the forward connection from the CIS server to the actual destination.
4. Add a new rule that allows forward connections from the CIS server to the actual
destination. This rule is not needed if the forward connection does not go through the
firewall.
Table 47.2 Access Rule for Forwarding Traffic From CIS Server
What’s Next?
Continue the configuration in Defining NAT Rules for CIS Redirection (page 675).
The address translation defined in your custom Service for CIS redirection must not overlap with
NAT rules. The NAT rules outlined here ensure that no duplicate NAT is applied and define the
NAT applied when connections return from the external server.
2. If NAT is needed for the forward connection from the CIS server to the actual destination,
add a second NAT rule:
What’s Next?
If your CIS server is ready to inspect the traffic, save and install the policy to
start using the new configuration.
Related Tasks
Editing NAT Rules (page 545)
BLACKLISTING TRAFFIC
Blacklists contain entries for blocking traffic temporarily based on traffic patterns that the IPS
system detects or on administrator input. Both firewalls and inline sensors can use a blacklist
for blocking traffic.
677
Getting Started with Blacklisting
Prerequisites: None
Blacklisting is a response that temporarily bans some traffic on a firewall or inline sensor.
What Blacklisting Does
Blacklisting adds the ability to temporarily stop traffic:
• without editing and installing policies
• based on events detected by analyzers
• on a different engine than the one that detects an event
• on multiple engines with a single administrator action or a single detected event.
Example If an inspection rule detects a serious attack against a single host in your internal network,
you may want the rule to blacklist connections from that host to any other host in your
internal networks. However, potential benefits have to be weighed against the potential risk of
legitimate communications being blocked in the process (especially if the attacker uses
spoofed IP addresses).
Blacklist entries can be generated automatically based on Inspection rules (Exceptions) on
analyzers and sensors, and manually in the Management Client. Analyzers (automatic
blacklisting) and the Management Server (manual blacklisting) relay the requests to firewalls
and inline sensors that use them as defined in their policies.
Limitations of Blacklisting
• Only IPv4 addresses can be blacklisted.
• Firewalls do not generate blacklist entries. Firewalls can only receive blacklist entries.
What Should I Know Before I Begin?
By default, the blacklist is not enforced at all. To enforce the blacklist, you must define the
point(s) at which the blacklist is checked in the IPv4 Access rules. If a connection is allowed by
a rule placed above the blacklist rule, the connection is allowed regardless of the blacklist
entries. In effect, that traffic is whitelisted.
Automatic blacklisting can have unintended consequences that could disrupt business-critical
traffic. Legitimate traffic can be incorrectly identified as malicious if the pattern for detecting
malicious traffic is inaccurate. If an attacker uses spoofed IP addresses, a legitimate IP address
may be blacklisted instead of the attacker’s actual IP address, causing a self-inflicted denial of
service (DoS). Use automatic blacklisting with careful consideration.
Interface
Firewall
1
2
Firewall Access
rules
Analyzer
A Firewall or inline sensor can be configured using the IPv4 Access rules to select which traffic
is inspected against the blacklist. By default, the blacklist is not enforced at all. To enforce the
blacklist, you define the point(s) at which the blacklist is checked in the IPv4 Access rules. Only
traffic that matches such a rule is checked against the blacklist entries. If the traffic checked
against the blacklist does not match any of the blacklist entries, the next rule in the policy is
checked as usual.
You can have several Apply Blacklist rules with different matching criteria at different points in
the policy.
Example A template can apply the blacklist above an insert point to some types of connections and
then below the insert point to all connections. Rules added to the insert point in a policy can
then ‘whitelist’ some, but not all types of traffic.
What’s Next?
If you want to configure dynamic blacklisting based on events detected by your
StoneGate IPS, see Configuring Automatic Blacklisting (page 681).
Otherwise, you may want to test the blacklisting by Blacklisting Traffic Manually
(page 684).
Related Tasks
Editing Access Rules (page 518)
Sensors and analyzers trigger blacklisting based on the Blacklist Scope options in the IPS
Inspection rule exceptions. The analyzer forwards all blacklist entries for the detected events
(including those triggered by sensors) to a StoneGate firewall or inline sensor. The firewall or
sensor enforces the blacklisting according to its policy. Only IPv4 addresses and elements that
contain IPv4 addresses can be blacklisted.
The Default firewall template, the IPS System Template, and the IPS Strict Template contain a
rule that allows the blacklisting connections to the firewall or sensor that is the request
recipient. If your policy is not based on an unmodified default template, or if there are other
firewalls or inline sensors in the communications path, make sure the IPv4 Access rules allow
the blacklisting connections.
What’s Next?
Start by Defining Destination Interfaces for Automatic Blacklisting.
3. Click the correct engine in the Security Engine Blacklist Interfaces list on the left. The
network interfaces of the engine are displayed.
4. (Optional) Select the network interface you want to use for the blacklisting connection and
click Add. The selected interface is added to the list on the right. If you do not to select the
interface, the system decides the interface based on the routing information. If there is no
explicit route, a best guess is made and a warning is shown at policy installation.
5. Repeat the steps for each firewall or inline sensor to which you want this analyzer to be
able to send blacklist entries.
6. Click OK when you are done.
What’s Next?
To define which events trigger a blacklist entry, proceed to Defining Which Traffic is
Blacklisted Automatically.
What’s Next?
Proceed to Defining Blacklisting Rule Action Options (page 683).
Related Tasks
Blacklisting Connections Manually (page 198)
Monitoring Open Connections and Blacklists (page 97)
You can blacklist traffic manually by creating blacklist entries in the Blacklist view, Connections
view, Monitoring view, and Logs view. Manual blacklisting requires that IPv4 Access rules have
an Apply Blacklist rule with the Management Server as an Allowed Blacklister. See Blacklisting
Connections Manually (page 198).
Related Tasks
Monitoring Open Connections and Blacklists (page 97)
685
686
C HAPT ER 49
The basic VPN configurations outline specific examples for common VPN configuration
scenarios as a quick-start alternative to the complete configuration instructions in Configuring
IPsec VPNs (page 715).
687
Getting Started With Basic VPN Configuration
Prerequisites: None
The basic VPN configurations provide instructions for creating some common types of VPNs. You
may use these examples when setting up your own VPNs and then extend the configuration with
other features as necessary once you have the basic scenario configured and working.
Alternatively, you can follow the complete workflow for creating any type of VPN in Configuring
IPsec VPNs (page 715).
The following basic configurations are explained in this section:
• Configuration 1 is for creating a VPN between two or more StoneGate firewalls that are
managed through the same Management Server. A default set of VPN settings are used to
simplify the configuration. See Configuration 1: Basic VPN Between StoneGate Gateways
(page 688).
• Configuration 2 is for creating a VPN between a StoneGate firewall and an IPsec compatible
VPN gateway that is not managed through the same StoneGate Management server. A
customized set of VPN settings is created, as this is typically mandatory. A pre-shared key is
used for authentication. See Configuration 2: Basic VPN With a Partner Gateway (page 692).
• Configuration 3 is for creating a VPN between a StoneGate firewall and StoneGate VPN
Clients installed on individual computers. A default set of VPN settings are used to simplify
the configuration. See Configuration 3: Basic VPN for Remote Clients (page 701).
• Configuration 4 is for creating a VPN in which several remote sites connect to a hub gateway,
which then forwards connections to the other remote gateways as necessary. A default set of
VPN settings are used to simplify the configuration. See Configuration 4: Basic VPN Hub
(page 709).
This basic configuration scenario walks you through creating a secure VPN connection through
the Internet between two or more StoneGate firewall/VPN engines that are managed through the
same Management Center. This example VPN requires that all the firewalls have a fixed IP
address (not DHCP- or PPPoE-assigned).
The address spaces protected by the different Gateways must not overlap within any single VPN.
If you use the same IP addresses at the different locations, you must apply NAT to the
communications and define the Sites using the translated IP addresses (the addresses that are
actually used inside the VPN tunnels).
This scenario uses the default VPN-A Suite VPN Profile that contains the VPN settings specified
for the VPN-A cryptographic suite in RFC 4308. The profile uses pre-shared keys for
authentication.
What’s Next?
This scenario has three parts. Start the configuration in Creating Gateway Elements for
Configuration 1 (page 689).
5. If you plan to use NAT to translate the IP addresses of the hosts that make connections
through this VPN, switch to the Sites tab and drag and drop the network(s) for the NAT
address space on top of the (top-level) automatic Site element on the right.
• The Sites must include only internal networks. Interfaces with the Any Network element
are therefore not included by default and you must not add them in this type of VPN.
6. Click OK to close the Internal Security Gateway Properties.
What’s Next?
When you have at least two Gateways configured, proceed to Creating a VPN Element
for Configuration 1 (page 690).
Note – Be careful that you do not accidentally drop Gateways on top of other Gateways.
This creates a hub topology where the top-level Gateway forwards connections from other
components to the lower-level Gateway.
Caution – If you continue to use this VPN, change the pre-shared key periodically (for
example, monthly) to ensure continued confidentiality of your data. See Renewing or
Generating Pre-Shared Keys (page 773). Alternatively, you can switch to certificate-based
authentication by creating a custom VPN profile.
Refresh the policies of all firewalls involved in the VPN to activate the new configuration. The
VPN is established when some traffic matches the Access rules.
What’s Next?
If NAT is required for this VPN, add the NAT rules as well. See Creating NAT Rules for
VPN Traffic (page 752).
Related Tasks
Monitoring VPNs (page 753)
Troubleshooting VPNs (page 911)
This basic configuration scenario walks you through creating a secure VPN connection through
the Internet between one StoneGate firewall/VPN engine under your management and one
external VPN gateway that is not managed through the same Management Center. To be able to
configure this example VPN, your local firewall must have a fixed IP address (not DHCP- or
PPPoE-assigned).
The address spaces protected by the different Gateways must not overlap within any single VPN.
If you use the same IP addresses at the different locations, you must apply NAT to the
communications and define the Sites using the translated IP addresses (the addresses that are
actually used inside the VPN tunnels).
You can create VPNs with IPsec compliant gateway devices from many different manufacturers.
This allows you to create VPNs with partner organizations that use a VPN solution other than
StoneGate. The authentication and encryption options to use must be decided beforehand in co-
operation with the administrator of the other gateway. See the VPN Configuration chapter in the
StoneGate Reference Guide for listings of the supported options for StoneGate.
What’s Next?
This scenario has six parts. Start the configuration in Creating an Internal Gateway
Element for Configuration 2.
7. (Optional) Select the internal networks that you want to exclude from the VPN by disabling
the interface they are under in the automatic site. Disabled interfaces are greyed-out.
• If you want to include some individual network that is under an otherwise disabled
interface, drag and drop it from under the disabled interface onto the Site element to copy
the element to the higher level. Note that the copied definition is not updated
automatically.
• The Sites must include only internal networks. Interfaces with the Any Network element
are therefore not included by default and you must not add them in this type of VPN.
8. If you plan to use NAT to translate the IP addresses of the hosts that make connections
through this VPN, drag and drop the network(s) for the NAT address space on top of the
(top-level) automatic Site element on the right.Click OK to close the Gateway properties.
Note – Make sure that the ID Type and ID Value match the identity configured on the
external gateway device. If the device has a static IP address, make sure that the device is
configured to use it as its identity in this VPN (the most common default configuration) or
change the StoneGate configuration as outlined above.
Leave the properties dialog open and continue to the next section.
2. Select the Cipher Algorithm (encryption method) that matches the settings of the external
gateway device. We recommend that you limit the selection to as few choices as possible.1
• Do not select DES unless you are required to do so. DES is no longer considered secure,
since it is relatively easy to break DES encryption with modern computers.
• 3DES (Triple-DES) has a relatively high overhead compared to other protocols with a
comparable level of security and is therefore not a good choice when high throughput is
required.
3. Select the Message Digest Algorithm (integrity checking method) that matches the
settings of the external gateway device.
2. Select the Cipher Algorithm (encryption method) that matches the settings of the external
gateway device.2
• Do not select the Null option. This option disables encryption, allowing anyone to view the
data in transit.
• Do not select the DES option unless you are required to do so. DES is no longer
considered secure, since it is relatively easy to break DES encryption with modern
computers.
• 3DES (Triple-DES) has a relatively high overhead compared to other protocols with a
comparable level of security and is therefore not a good choice when high throughput is
required.
3. Select the Message Digest Algorithm (integrity checking method) that matches the
settings of the external gateway device.
9. Double-click the Key cell for the tunnel displayed in the Gateway<->Gateway panel. The
Preshared Key dialog opens.
10.To match the pre-shared key between the two gateways:
• To use the key that is automatically generated in StoneGate, click Export and transfer the
key in the resulting text file securely to the external gateway.
• To use a different key, replace the displayed key with the one that you have agreed on with
the administrator of the external gateway device.
Caution – The pre-shared key must be long and random to provide a secure VPN. Change
the pre-shared key periodically (for example, monthly).
Caution – If you continue to use this VPN, change the pre-shared key periodically (for
example, monthly) to ensure continued confidentiality of your data. See Renewing or
Generating Pre-Shared Keys (page 773). Alternatively, you can switch to certificate-based
authentication by creating a custom VPN profile.
Refresh the policies of all firewalls involved in the VPN to activate the new configuration. The
VPN is established when some traffic matches the Access rules created here.
What’s Next?
If NAT is required for this VPN, add the NAT rules as well. See Creating NAT Rules for
VPN Traffic (page 752).
Related Tasks
Monitoring VPNs (page 753)
Troubleshooting VPNs (page 911).
This basic configuration scenario walks you through creating a secure VPN connection through
the Internet between a StoneGate firewall/VPN engine and any number of IPsec VPN Clients that
support the settings selected. To ensure compatibility, we recommend using StoneGate IPsec
VPN Clients. To be able to configure any client-to-gateway VPN, the firewall must have a fixed IP
address (not DHCP- or PPPoE-assigned).
Depending on the desired configuration, you can add VPN client access to an existing gateway-
to-gateway VPN as well, but in this example scenario, a separate VPN is created for VPN clients
since this approach works in all cases.
This scenario assumes that automatic Site management is used in the VPN without any need
for modifications in this VPN (or in other VPNs where the same Gateway is used).
In this scenario, the VPN settings are defined in a copy of the default VPN-A Suite VPN Profile
that contains the VPN settings specified for the VPN-A cryptographic suite in RFC 4308.
What’s Next?
This scenario has six parts. Start the configuration in Managing VPN Client Addresses
in Configuration 3.
4. Select Translated IP address (using NAT Pool) and enter the IP Range of addresses and
the Port Range you wish to use for translating VPN client traffic.
• The VPN clients use these IP addresses when they connect to services in your internal
network. Make sure these IP addresses are not used elsewhere in your network.
• The translation is dynamic, so the number of IP addresses you enter does not need to
correspond to the number of clients connecting. Typically, each connection a VPN client
user opens to a resource reserves one port from whichever IP address has unreserved
ports within the configured range.
• The reverse NAT for the reply packets is done automatically.
5. Click OK to both open dialogs.
7. Click OK.
5. Make sure that Negotiation Mode is set to Main. This helps ensure that the usernames
and passwords of the VPN Client users remain confidential.
6. Switch to the VPN Client tab.
4. Enter the user Name the end-user uses to authenticate to the VPN.
5. (Optional) Type the real name of the user in the Comment field.
6. Switch to the Authentication tab.
7. Click Add in the Authentication Service section. The Select Element dialog opens.
8. Select User Password and click Select. This default element allows user password
authentication against the internal LDAP database.
9. Enter the same password in the Password and Confirm Password fields in the User
properties. Make a note of the password so that you can communicate it to the user.
• The pre-shared key method is meant for third-party VPN clients. It is not supported by
StoneGate clients and it is not valid for this VPN.
10.Click OK. The information is added in the Management Server’s internal LDAP user
database.
Add additional users in the same way.
What’s Next?
Make sure that your NAT rules do not apply a second NAT operation to the VPN clients’
IP addresses (defined the NAT Pool for VPN clients in Managing VPN Client Addresses in
Configuration 3 (page 701)), see Editing NAT Rules (page 545).
Install and configure the VPN clients as instructed in the VPN client’s documentation.
Note that many settings that affect how the client behaves are configured through the
Management Center. To further explore the available options you can define for VPN
Clients in the Management Center, see Getting Started With VPN Client Settings
(page 782). The clients download a configuration file from each gateway they connect
to.
After testing the basic connectivity, you may want to change the IP address allocation
method to use the Virtual Adapter to allow queries from the clients to your
organization’s internal DNS servers, see Configuring Virtual IP Addressing for VPN
Clients (page 787).
Related Tasks
Monitoring VPNs (page 753).
Getting Started with User Authentication (page 624).
Troubleshooting VPNs (page 911).
In a VPN hub configuration, a gateway is configured to forward VPN traffic between different VPN
tunnels. The gateway that does this forwarding is called a hub gateway. The gateways that
contact each other through a hub are called spoke gateways.
The hub gateway must be set up specifically as a hub. The hub configuration is reflected in the
topology, the Site definitions, and the VPN rules. The spoke gateways do not require any hub-
specific configuration. Following this example configuration, VPN tunnels are established from
all spoke gateways to the hub gateway, and all networks of all gateways are configured as
reachable through the hub (but actual connections are allowed only as defined in the Firewall
Access rules).
This basic configuration scenario explains a configuration in which all connections are defined
within the same VPN element, which is usually simpler to set up and maintain than forwarding
traffic between VPN tunnels defined in different VPN elements. In this scenario, all Gateways are
Internal Gateways (StoneGate firewall/VPN engines controlled by the same Management
Server). SOHO Gateway Groups and External Gateways can be added to this configuration even
though their creation is not covered in detail in this workflow. SOHO Gateway Groups can only be
added as spokes.
What’s Next?
This scenario has four parts. Start the configuration in Creating Gateway Elements for
VPN Configuration 4.
Hub Gateway
Spoke Gateways
7. Drag and drop the other Gateways on top of the hub Gateway so that the Gateways are
added as branches (spokes) under the hub Gateway as in the illustration above. These can
include any other Internal or External Gateways.
8. Save the VPN, but do not close the VPN editing view yet. This intermediate save is required
to store the changes in the database for the next operation.
3. Add all networks protected by the spoke gateways to the Site contents (the panel on the
right).
• After you do this, the Site should contain all remote IP addresses that are used in spoke-
to-hub traffic that is forwarded from the hub to other spokes.
• The Site should not contain the hub gateway’s local networks. These are defined using
the automatic Site management features in this example.
4. Switch to the Site References tab.
5. Select Enable for this VPN element and deselect it for all other VPNs. Note that the Site is
still shown in all VPNs, but is greyed-out (disabled) and not included in the configuration.
6. Select Hub as the Mode. This activates VPN hub-related features for the Gateway.
Caution – If you continue to use this VPN, change the pre-shared key periodically (for
example, monthly) to ensure continued confidentiality of your data. See Renewing or
Generating Pre-Shared Keys (page 773). Alternatively, you can switch to certificate-based
authentication by creating a custom VPN profile.
Refresh the policies of all firewalls involved in the VPN to activate the new configuration. The
VPN is established when traffic matches the Access rules.
What’s Next?
If NAT is required for this VPN, add the NAT rules as well. See Creating NAT Rules for
VPN Traffic (page 752).
IPsec (Internet Protocol Security) VPNs (Virtual Private Networks) allow creating secure,
private connections through networks that are not otherwise secure.
715
Getting Started With IPsec VPNs
Prerequisites: If you want to allow access to VPN clients: Getting Started with User Authentication
VPNs in StoneGate Firewall/VPN are implemented according to the IPsec standard (an
extension of the IP protocol). For more background information on IPsec and the VPN
configuration in StoneGate, see the Reference Guide. For information about the StoneGate SSL
VPN product, see the StoneGate SSL VPN Administrator’s Guide.
What VPNs Do
A virtual private network (VPN) extends a secured private network over public networks by
encrypting connections so that they can be transported over insecure links without
compromising confidential data. For this purpose, the devices that create the VPN check the
identity of the other parties by the way of authentication. A VPN also includes integrity checking
to ensure the communications are not tampered with.
What Do I Need to Know Before I Begin?
In StoneGate, you can create two main types of VPNs:
• You can create a VPN between two or more gateway devices that provide VPN access to
several hosts in their internal networks. We call this a gateway-to-gateway VPN.
• You can create a VPN between a gateway device at a site and a VPN client running on an
individual computer, like a laptop of a travelling user or a desktop PC at a home office. We call
this a client-to-gateway VPN. The recommended option is to use the StoneGate VPN Client
(available on Windows). Third-party IPsec-compatible VPN clients can also be used.
Note – VPN clients that are a part of a vendor-specific VPN gateway solution are generally
incompatible with gateways from other vendors.
Limitations
• Version-specific limitations in supported features for different StoneGate Firewall/VPN
versions are listed in the Release Notes for the versions you are using. The Management
Center automatically prevents the use of unsupported settings based on engine version.
• All VPNs you configure for VPN clients must be valid for StoneGate VPN clients even if you use
only third-party VPN client software.
• If your Firewall/VPN engine installation is specifically configured in a restricted operating
mode to comply with regulatory requirements, some VPN options are unavailable to you.
Proceed as explained in the Configuration Overview or follow one of the Basic VPN
Configurations (page 687) to quickly create some types of basic VPNs.
Ga rofi
VP
N
P
te le
wa
Pr
of
y
ile
Ga etti
Fi
Ga
VP
Fi olic
re
re y
N
S
te ngs
te
P
wa
wa
wa
wa
ll
ll
y
y
Si
te
The Gateway Settings element shown above is not part of the workflow below because the
default settings should be used in most cases (see Advanced VPN Tuning (page 774) for more
information). Otherwise, the following workflow covers all VPN configurations:
1. (Optional) If you are configuring a VPN with an external device, you may want to create a new
Gateway Profile specific to the device, see Defining Gateway Profiles (page 718).
2. Add the necessary number of gateway elements to represent the physical VPN devices,
see Defining Security Gateways (page 720). These define the VPN end-points (gateway IP
addresses) and the Sites (see the next point). Only one element per device is needed in
the system, even if there are many VPNs.
3. Configure the Gateway’s Sites. These define the IP addresses that can be made routable
through VPNs, see Defining Sites for VPN Gateways (page 729). The Sites can be
adjusted in different VPNs that the Gateway establishes.
4. (Optional) If the existing VPN Profiles do not have suitable settings for your new VPN,
create a new one as explained in Defining VPN Profiles (page 734). This defines the IPsec
settings (authentication, encryption, and integrity checking).
5. Create a new VPN element as explained in Defining a VPN Element (page 742). This
defines the topology (which gateways create tunnels with each other).
6. Create certificates, if necessary. See Getting Started With VPN Certificates (page 756).
7. Add the IPv4 Access rules and, if necessary, the IPv4 NAT rules for VPN traffic. See
Creating VPN Rules (page 748). This also activates the VPN on the engines.
What’s Next?
Start from Configuring IPsec VPNs (page 718).
What’s Next?
If you are configuring a VPN with an external gateway, you may want to create a new
Gateway Profile if the existing profiles are not suitable in this case, see Defining
Gateway Profiles (page 718).
Otherwise, begin the configuration in Defining Security Gateways (page 720).
Related Tasks
Configuration Overview (page 717)
Getting Started With VPN Client Settings (page 782)
Internal Gateways always use a default profile that is assigned according to the currently
installed software version and cannot be changed manually. Gateway profiles can be used with
external gateways to set certificate-related options (used with some gateways that do not
support some operations) and to restrict the options to a supported set to prevent configuration
errors. If you do not see a need to utilize these settings, you can use the unrestricted Default
(all capabilities) profile.
What’s Next?
To add or modify a custom Gateway Profile, continue in Defining a Custom Gateway
Profile (page 718).
To configure a VPN using the existing Gateway profiles, continue in Defining Security
Gateways (page 720).
Setting Description
Select this to indicate whether the Gateways using the profile are
capable of forwarding gateway-to-gateway VPN traffic to other
Relay Gateway-to-Gateway Traffic gateway-to-gateway VPNs. This reduces the number of tunnels
created by default for VPNs involving this Gateway when you define
forwarding from one VPN to another in the VPN element.
This option is shown only because the setting is used in the default
Relay Client-to-Gateway Traffic profiles for different versions of StoneGate Firewall/VPN. This
setting is not relevant to custom configurations.
Setting Description
Selecting this option prevents StoneGate from processing certificate
request payloads in IKE messages with Gateways that use this profile.
Ignore Certificate Requests
Gateways use certificate requests to ask the other gateway to forward
its certificates or related information.
Selecting this option makes StoneGate send the full certificate chain
Send Full Certificate Chains (from the node’s certificate to the root Certificate Authority certificate)
in IKE messages with Gateways that use this profile.
7. Switch to the IKE Capabilities tab and select the options that the device supports for IKE
phase 1.
8. Switch to the IPsec Capabilities tab and select the options that the device supports for IKE
phase 2.
What’s Next?
Continue the configuration by Defining Security Gateways (page 720).
The physical devices that establish the VPN are represented by Security Gateway elements in
the configuration. The following types of Gateway elements can be configured:
All StoneGate and third-party VPN clients are represented by the default
IPSec Client Gateway
IPsec Client Gateway element.
What’s Next?
If you do not already have any Gateway elements, start by Creating a New Security
Gateway Element (page 721).
To edit internal Gateway IP address related settings, see Defining End-Points for Internal
Security Gateways (page 722).
To edit external Gateway IP address related settings, see Defining End-Points for
External Security Gateways (page 724).
To change certificate acceptance settings, see Defining Trusted CAs for a Gateway
(page 726).
To configure settings for VPN clients that connect to a gateway, see Defining Gateway-
Specific VPN Client Settings (page 727).
Click Select and choose the Gateway Profile that contains information on the
External Gateway
capabilities of the external Gateway.
Continue the configuration in the correct section according to the type of Gateway:
What’s Next?
Defining End-Points for Internal Security Gateways (page 722)
Defining End-Points for External Security Gateways (page 724)
There is no additional configuration for SOHO Gateway Groups. Continue by Defining
VPN Profiles (page 734).
2. (Optional) Change the selection of IPv4 address(es) that you want to use as end-points in
VPNs. Typically, these are IP address(es) that belong to interface(s) towards the Internet,
which are selected by default (based on the firewall’s default routing table).
• Only IPv4 addresses can be used for end-points.
• On clustered firewalls, these are CVIs.
• If you have more than one Internet connection, select an IP address from each ISP to
make Multi-Link load balancing and failover possible for VPNs.
3. Double-click the end-point that you selected for this Gateway. The Internal End-Point
Properties dialog opens.
Option Description
Select this option if you if you want to allow encapsulating the IPsec
communications in standard NAT-T UDP packets in gateway-to-gateway VPNs when
Use NAT-T
the gateways detect that a NAT operation is applied to the communications. If
both gateways do not support this option, the option is ignored.
Select this option to force NAT-T even when the gateways do not detect a NAT
Use force NAT-T operation being applied to the communications. If both gateways do not support
this option, the VPN fails to establish.
• The gateway always allows VPN clients to use NAT-T regardless of these settings.
• NAT-T always uses the standard UDP port 4500.
What’s Next?
If you want to use certificate authentication and you want to limit which of the
Certificate Authorities you define in the system this Gateway considers trusted,
continue in Defining Trusted CAs for a Gateway (page 726).
If you plan to allow VPN Clients to establish VPNs with this Gateway, continue in
Defining Gateway-Specific VPN Client Settings (page 727).
Otherwise, continue in Defining Sites for VPN Gateways (page 729).
Option Description
Select this option if you if you want to allow encapsulating the IPsec communications
in standard NAT-T UDP packets in gateway-to-gateway VPNs when the gateways detect
Use NAT-T
that a NAT operation is applied to the communications. If both gateways do not
support this option, the option is ignored.
Select this option to force NAT-T even when the gateways do not detect a NAT
Use force NAT-T operation being applied to the communications. If both gateways do not support this
option, the VPN fails to establish.
8. If necessary, change the default Contact Address and/or add Exceptions for the
Location(s) of other Gateway(s) involved in the VPN.
• The Contact Address must be defined if the IP address for contacting this Gateway is
different from the IP address the Gateway actually has on its interface (for example,
because of NAT).
• For more information on Locations and Contact Addresses, see Getting Started with
System Communications (page 60).
Example An external gateway is behind a NAT device. The real address is defined as the End-Point
address, because the IP address is also used as the Phase 1 ID inside the encrypted traffic.
Contact must be made using the translated address, so it is defined as a Contact Address.
9. In the Phase-1 settings, select the ID Type for your preferred option.
• The ID identifies the Gateways during the IKE phase 1 negotiations.
• The Distinguished Name type is only valid in certificate-based authentication.
• The IP Address type is not valid for end-points with a dynamic IP address. IP address may
not work as an ID if the address is translated using NAT.
10.Enter an ID Value of the correct type. The value for the IP Address type is filled in
automatically according to the IP address you defined for this end-point.
• Make sure that the ID Value matches the identity configured on the external gateway
device.
What’s Next?
If you want to use certificate authentication and you want to limit which of the
Certificate Authorities you define in the system this Gateway considers trusted,
continue in Defining Trusted CAs for a Gateway (page 726).
Otherwise, continue in Defining Sites for VPN Gateways (page 729).
Option Description
The gateway accepts any valid CA that is configured in your system, unless
Trust All Defined
restricted in the VPN element.
Restricts the trusted CAs and activate the controls below and select Enabled
Trust Only Selected
for the CAs that the Gateway needs to trust.
What’s Next?
If you are creating an Internal Security Gateway and you plan to use VPN Clients to
establish VPNs with this Gateway, continue in Defining Gateway-Specific VPN Client
Settings (page 727).
Otherwise, continue in Defining Sites for VPN Gateways (page 729).
Note – The Virtual Adapter IP addresses must be assigned by an external DHCP server. It
is not possible to set up the IP addresses in the VPN client or in the Gateway configuration.
It is not possible to use the internal DHCP server on single firewalls to assign the IP
addresses for Virtual Adapters.
To configure the VPN client settings (for StoneGate IPsec VPN clients)
1. Switch to the VPN Client tab in the Gateway properties.
2. Select Virtual IP Address (using Virtual adapter). The other options in the dialog are
enabled.
3. Configure the settings as explained in the table below:
Setting Configuration
Select this option to make the firewall/VPN engine respond to ARP requests for
Use Proxy ARP the virtual IP address range. Click IPv4 Address Ranges to select the address
range to define the scope for this option (all virtual IP addresses).
Restrict Virtual (Optional) Select this option and click IPv4 Address Ranges to select the
Address Ranges addresses that the DHCP server is allowed to assign.
Select this option to define DHCP settings for the VPN clients. Click the DHCP
Use DHCP Servers button and select the correct external DHCP Server that assigns the IP
addresses.
Firewall Advanced Deselect Translated IP Addresses (using NAT Pool) if the option is selected.
Settings This disables the NAT Pool feature on the firewall.
(Optional) Select the Backup Gateways that StoneGate IPsec VPN client version
5.1 and higher use if this gateway is unavailable and organise them in the order
you want them to be contacted. This removes the need for the user to launch new
Backup Gateway connections to different gateways manually.
Each switchover launches a prompt that allows the user to confirm the switchover.
If the backup gateway’s certificate authority is not trusted, the user can manually
approve the certificate fingerprint and continue.
What’s Next?
Continue the configuration by Defining Sites for VPN Gateways (page 729).
You must define Sites for all Internal and External Gateways. The Site element defines the
internal IP addresses that send or receive traffic through the VPN:
• Connections are only allowed to use the VPN if the source and destination IP addresses are
included in the Sites of the Gateways involved. Other traffic is rejected.
• If you activate NAT for tunneled traffic, you must add the translated addresses in the Site
definitions to make those IP addresses valid to be used in the VPN tunnel.
• The addresses must be unique at each end of a VPN tunnel. Use NAT to create unique
address spaces if the addresses overlap.
• If you use a Gateway in several VPNs, only complete Site elements can be included or
excluded on a VPN-to-VPN basis. All addresses in a Site are always included and excluded
together.
• For internal Gateways, an automatic Site element is available and enabled by default. The IP
address definitions of the automatic Site are created and updated based on routing
definitions. However, NAT addresses must always be added manually.
What’s Next?
To turn automatic Site management off or on for an internal gateway, see Disabling/Re-
Enabling Automatic VPN Site Management (page 730)
To continue with the automatic SIte (Internal Gateways) configuration, proceed as
explained in Adjusting Automatic VPN Site Management (page 731).
To define the IP addresses for an external security gateway element, see Defining
Protected Networks for VPN Sites (page 732).
Related Tasks
Adding a New VPN Site (page 731).
Disabling a VPN Site Temporarily in All VPNs (page 733)
What’s Next?
To define Sites manually, continue by Adding a New VPN Site (page 731).
What’s Next?
If you plan to translate the IP addresses of the local hosts that communicate through
the VPN, add the addresses used in NAT in the Gateway’s Site definition and mark the
Sites that contain the original addresses as private (see Adjusting VPN-Specific Site
Settings (page 732)).
To continue configuring a new VPN without defining further settings for the Site, add all
necessary Site and Gateway elements, then either configure a new set of IPsec settings
as explained in Defining VPN Profiles (page 734) or configure the VPN with an existing
set of settings as explained in Defining a VPN Element (page 742).
What’s Next?
Continue the configuration in Defining Protected Networks for VPN Sites.
Note – Site definitions are applied globally to every VPN in which the Gateway is used,
unless you specifically adjust this in the VPN-specific Site settings.
What’s Next?
Continue the Site configuration by Adjusting VPN-Specific Site Settings (page 732).
What’s Next?
Add all necessary Site and Gateway elements, then either configure a new set of IPsec
settings as explained in Defining VPN Profiles (page 734) or configure the VPN with
existing settings as explained in Defining a VPN Element (page 742).
What’s Next?
There must be at least one enabled site. To add a new Site, see Adding a New VPN Site
(page 731).
To continue without modifying the SItes, proceed as explained in the What’s Next
section in Defining Protected Networks for VPN Sites (page 732).
Related Tasks
Adjusting VPN-Specific Site Settings (page 732)
Defining VPN Topology (page 744)
Each VPN refers to a VPN Profile. The VPN profile is the main point of configuration for IPsec
VPN integrity checking, authentication, and encryption settings. The VPN Profile also contains
some settings for VPN clients.
Several VPNs can use the same VPN Profile. There are predefined profiles in the system, which
are mostly useful for VPNs between internal Gateways. Client-to-gateway VPNs generally require
a custom profile.
What’s Next?
To create a new VPN profile, continue in Creating a New VPN Profile (page 734).
To modify an existing custom-made profile, continue in Modifying an Existing VPN Profile
(page 735).
If you want to use an existing VPN Profile without editing it, continue in Defining a VPN
Element (page 742).
What’s Next?
Continue by Defining IKE (Phase 1) Settings for a VPN (page 735).
What’s Next?
Defining IKE (Phase 1) Settings for a VPN (page 735)
Defining IPsec (Phase 2) Settings for a VPN (page 737)
Defining VPN Client Settings (page 740)
Defining Trusted CAs for a VPN (page 742)
2. Select the Cipher Algorithm(s) (encryption method) to use in the VPN. We recommend that
you limit the selection to as few choices as possible, preferably only one. If you make
multiple choices, multiple proposals are sent in IKE negotiations.1
• Choose the method(s) according to your company’s requirements and the algorithms
supported by the gateways. Consider the sensitivity of the transferred information and
any regulations that you may have to follow.
• Do not select the DES option unless you are required to do so. DES is no longer
considered secure, since it is relatively easy to break DES encryption with modern
computers.
• 3DES (Triple-DES) has a relatively high overhead compared to other protocols with a
comparable level of security and is therefore not a good choice when high throughput is
required.
3. Select the Message Digest Algorithm(s) (integrity checking method) to use in the VPN. We
recommend that you select just one of these options if you have no specific reason to
select more.
4. Select the Diffie-Hellman Group (for key exchange) to use in the VPN. We recommend that
you select either 2 (1024 bits) or 5 (1536 bits). Group 1 is not a secure option in all
configurations.
5. Select the Authentication Method:
• DSS Signatures and RSS Signatures use certificates for authentication and require that
each Gateway has a valid certificate.
• Pre-Shared Key requires that you periodically change the pre-shared keys for each tunnel
in the VPN elements to be secure.
Note – The authentication method you select here is used for gateway-to-gateway VPNs.
Client-to-gateway VPNs have separate settings on the VPN Client tab.
Mode Description
Main negotiation mode (recommended) protects the identity information of the Gateways
Main so that malicious parties cannot gain information on the Gateway’s identity by launching
IKE negotiations with the gateway.
Aggressive negotiation mode skips some steps that are included in the main mode,
resulting in somewhat quicker negotiations. For security reasons, we recommend that you
do not use the aggressive negotiation mode if you use pre-shared keys for authentication.
Aggressive
You must select Aggressive mode for VPNs that involve a gateway with a dynamic IP
address. In this case, we recommend you use certificates for authentication rather than
pre-shared keys
What’s Next?
Continue by Defining IPsec (Phase 2) Settings for a VPN (page 737).
What’s Next?
If this Profile is used for client-to-gateway VPNs, continue in Defining VPN Client Settings
(page 740).
If you use certificates for authentication and you want to restrict trusted certificate
authorities at the VPN level, continue in Defining Trusted CAs for a VPN (page 742).
Otherwise, click OK and continue in Defining a VPN Element (page 742).
Caution – The pre-shared key option requires aggressive mode IKE negotiations in the
client-to-gateway VPN. In aggressive mode, user information is not protected, so we
recommend you take precautions such as not using the same username for the users as
they have when they access other services in your internal network.
6. Select the Security Association Granularity for VPN traffic. The StoneGate IPsec VPN
Client supports only the SA per Net option.
Option Description
Creates a security association (SA) for each network from which connections are
SA per Net made through the VPN. This setting reduces the overhead when there are a large
number of hosts making connections through the VPN.
Creates a SA for each host that makes connections through the VPN. This
setting may provide more even load balancing in clusters than the Per Net
SA per Host setting if there are many clients connecting from the same network, but
increases the overhead significantly if there are connections from many IP
addresses.
Select this option together with SA per Net to support both StoneGate IPsec
Allow SA to Any
VPN Clients and any third-party VPN clients that only support SAs negotiated per
Network
Host.
7. (Optional) Activate any combination of basic Local Security Checks for StoneGate IPsec
VPN Client version 5.0 and above.
• Activating these options does not affect older versions of StoneGate IPsec VPN Clients or
third-party VPN clients; their connections are allowed as usual.
• The selected types of external security software must be operational as reported by the
Windows Security Center on the client computer; otherwise the connection attempt will
fail. The check is performed after the user has successfully authenticated.
• All client security checks are for on/off status of the external security software only; the
checks do not include the update status of virus definitions or if any Windows updates
have actually been installed.
• If the security check fails, the IPsec VPN Client notifies the user on which checks have
failed in a balloon message in the Windows Task Bar.
What’s Next?
Continue by Defining a VPN Element.
The VPN element collects together a set of other VPN-related elements to define settings for a
particular VPN instance. The main configuration for the VPN consists of defining which Gateways
are in the VPN and which of the Gateways form tunnels with each other. This is also where you
can enter and renew pre-shared keys if you use them for authentication in this VPN.
Consider the following when creating new VPN elements:
• Check whether you can utilize an existing VPN element instead. Most settings can be set
individually for each gateway-to-gateway pair even within a single VPN. The VPN Profile, pre-
shared key, and Multi-Link settings can all be selected separately for each VPN tunnel. Site
definitions are the only major exception to this rule; each Gateway’s Sites are fixed within
each VPN element.
• There must not be duplicate tunnels (two tunnels between the same two end-points) in the
configuration of any firewall/VPN engine. Duplicate tunnels cause a policy installation failure.
The easiest way to avoid duplicate tunnels is to define all VPNs between your internal
gateways in the same VPN element.
What’s Next?
To add a new VPN to the system, see Creating a New VPN Element (page 743).
To modify the contents of an existing predefined or custom VPN element, see Modifying
an Existing VPN Element (page 744).
3. Enter the Name and optionally a Comment for the VPN element.
4. Select the VPN Profile that you want to use as the default profile within this VPN. By
default, this profile is used for all tunnels, but you can override the selection for individual
tunnels.
5. (Optional) Select Apply NAT Rules to Traffic That Uses This VPN if you want the NAT rules
in the FIrewall/VPN engine’s policy to apply to traffic that it sends into or receives from the
VPN, or if you want to use the NAT Pool feature to translate VPN Client connections.
• The option affects the traffic that is transported inside the tunnels.
• This option does not affect the tunnel negotiations or the encrypted packets between
gateways. These communications are always matched to NAT rules.
What’s Next?
Continue by Defining VPN Topology (page 744).
Note – Each end-point-to-end-point tunnel can only exist in one active VPN. If you use the
same two Gateway elements in more than one VPN, make sure the topology does not
create duplicate tunnels and/or disable any duplicates of existing tunnels on the Tunnels
tab.
2. Drag and drop the Gateways you want to include in this VPN into either of the two panels for
the VPN topology.
• If you add a Gateway under Central Gateways, the Gateway can establish a VPN with any
other Gateway in the VPN and the Tunnels tab is populated with tunnels between the
endpoints of the Gateway you add and the endpoints of all other Gateways in the VPN.
• If you add a Gateway under Satellite Gateways, the Gateway can establish a VPN only
with Central Gateways in this VPN and the Tunnels tab is populated with tunnels between
the endpoints of the Gateway you add and the endpoints of the Central Gateway(s).
• The Issues panel alerts you to any incompatible or missing settings you must correct.
Note – Be careful to not unintentionally drop Gateways on top of other Gateways. This
indicates a forwarding relationship on a hub gateway (see the next step below).
3. (Optional) If you want to forward some connections from one VPN tunnel into another
through a hub gateway, drag and drop a Gateway on top of another Gateway. The gateway is
added under the other gateway at the same level as the Sites.
• Full support for this feature requires that the hub gateway is running firewall/VPN version
5.0 or higher.
• See Configuration 4: Basic VPN Hub (page 709) for a VPN hub configuration example.
• The Gateway used as a hub requires a special Site configuration, see Defining Protected
Networks for VPN Sites (page 732) and Adjusting VPN-Specific Site Settings (page 732).
Example In a setup in which VPN client users can connect to networks behind both Gateway A and
Gateway B when they connect to Gateway A, you would drop Gateway B on top of Gateway A
in the Central Gateways list and add the Client Gateway to Satellite Gateways.
4. (Optional) To allow VPN client access within this VPN, drag and drop the default IPsec
Client Gateway element to Satellite Gateways or Central Gateways.
What’s Next?
Continue by Defining VPN Tunnel Settings.
Note – Multi-Link is not supported with SOHO firewall/VPN gateways. You can select the
tunnel that is used and avoid seeing reminders about this at policy installation by disabling
the redundant tunnels.
This is also where you can view the proxy identities (a summary of addresses and settings that
have been configured for individual tunnels), which you may want to check especially when there
are complex setups involving external components (such as a VPN hub configuration).
Before modifying a VPN element that is used in active VPNs, we recommend making a backup of
the Management Server as instructed in Creating Backups (page 795).
Caution – The pre-shared key must be long and random to provide a secure VPN. Change
the pre-shared key periodically (for example, monthly). Make sure that it is not possible for
outsiders to obtain the key while you transfer it to other devices.
4. (Optional) Change the VPN Profile used at the tunnel level to override the profile selected
for the VPN element:
• If you change a profile for a tunnel on the Gateway<->Gateway list, both IKE (Phase 1)
and IPsec (Phase 2) settings are overridden from what is default for the VPN.
• If you change a profile for a tunnel on the End-Point<->End-Point list, only the IPsec
(Phase 2) settings are overridden from what is selected for the main tunnel on the
Gateway level.
5. (Optional, does not apply to SOHO firewalls) If you have multiple tunnels between two
Gateways (Multi-Link configuration), you can select whether End-Point<->End-Point tunnels
use the Active mode (used at all times) or the Standby mode (used only when all Active-
mode tunnels are unusable).
• Select a tunnel on the Gateway<->Gateway list and click the Mode column for tunnels
that appear on the End-Point<->End-Point list to select the correct mode for the tunnels.
• When there are more than one alternative tunnels in Active mode between two Gateways,
the VPN traffic is load-balanced between the available tunnels.
6. (Optional) Review the IP addresses and settings used in the individual tunnels by right-
clicking the tunnels on the End-Point<->End-Point list and selecting View Proxy Identities.
This is especially useful in complex configurations that involve external components to
check the IP address details and other settings that must match with the external
configuration.
7. After making all changes, check the Validity column for all tunnels.
• If a tunnel has a warning icon in the Validity column, right-click the tunnel and select View
Issues. You must resolve all problems indicated in the messages shown.
• If all tunnels are shown as valid, the VPN is correctly configured, although the
Management Server cannot check all possible problems at this point, so additional
issues can be shown at policy installation. Any validation and issues that are shown for
external gateways are based only on the definitions that have been entered manually into
the related elements.
What’s Next?
If you need to add a trusted certificate authority or certificates that are not generated
automatically, proceed to Getting Started With VPN Certificates (page 756) before
adding VPN rules.
Otherwise, continue by Creating VPN Rules (page 748).
The firewall IPv4 Access rules define which traffic is sent to the VPN and which traffic is allowed
out of the VPN. These checks are made in addition to the enforcement of the Site definitions of
the Gateways, which define the allowed source and destination addresses for each VPN.
There are three options for the Use IPsec VPN rule action, which all behave identically for
connections that originate in the local protected network, but which each have a special
meaning for connections coming in from external sources.
• Apply VPN and Enforce VPN both direct traffic from protected local networks into the VPN
tunnel and allow traffic that arrives through a VPN. However:
• Enforce VPN drops any non-VPN traffic from external networks to the local netork if it
matches the rule.
• Apply VPN does not match non-VPN traffic from outside networks into the protected
networks; matching continues from the next rule.
• Forward: Directs traffic from protected local networks or from a VPN tunnel into a VPN tunnel.
Useful for forwarding connections from one VPN tunnel into another (VPN hub configuration)
or connections from local networks to currently connected VPN client computers.
There is also a matching cell for Source VPN in firewall IPv4 Access rules. The cell can be used
to match traffic based on whether the traffic is coming from a VPN tunnel. When the Source VPN
cell is set to match VPNs, the rule only matches traffic from the selected VPNs. The cell can
also be set to only match non-VPN traffic. Access rules that do not have any Source VPN
definition can match any traffic, including traffic that is received through a VPN. However, the
Access rules must contain at least one rule that refers to the VPN (in the Action or Source VPN
cell) for any of the VPN’s settings to be included in the engine’s local configuration.
Note – We recommend that you activate logging for the VPN rules for initial testing even if
you do not plan to log the connections that use the VPN later on. VPN negotiations
between the gateways are always logged.
Table 50.1 Basic Rule for Allowing Incoming VPN Traffic from a Single VPN
2. (Optional) Define the following types of rules when you want to match the rule based on
whether traffic is using a VPN:
Table 50.2 Rule for Allowing Incoming VPN Traffic from Any Number of Different VPNs
Note – If Access rules send traffic into a VPN, but the source and/or destination IP
address(es) are not included in the Site definitions, the traffic is dropped. This
configuration error is shown as the message “tunnel selection failed” in the logs.
Table 50.4 Rule for Allowing DHCP Queries from VPN Clients
Note – The DHCP server must be external to the firewall. The single firewalls’ internal
DHCP server cannot be used to assign addresses to the Virtual Adapters.
2. Insert the following type(s) of rule(s) to allow incoming connections from VPNs with VPN
clients.
Table 50.5 Rule for Allowing Incoming Traffic from VPN Clients
• When a specific VPN and specific Authentication Service(s) are used somewhere in the
installed policy (such as in a rule similar to the one above), the corresponding
configurations are activated on the firewall. But note that all other rules are also matched
to the VPN client user’s connections.
• Any users known to the system who can authenticate using the specified authentication
method can connect with a VPN client. Any such connected users can then access
resources if there is a matching rule that allows connections without specific Users
defined. You can also use the Source VPN cell to prevent unwanted matches in Access
rules.
• When filled in, User and Authentication cells are equal to Source, Destination, and
Service as rule matching criteria; matching continues from the next rule if the defined
User and Authentication Service do not match the connection that is being examined. You
• To use the VPN, the connecting hosts’ IP addresses must be included in the gateway’s
Site definition. See Defining Sites for VPN Gateways (page 729).
• Remember to also add a NAT rule for this traffic direction if NAT is used inside this VPN’s
tunnels. See Creating NAT Rules for VPN Traffic (page 752).
To create rules for forwarding VPN traffic from one tunnel to another
Insert the following type of rule:
Table 50.8 Rule for Allowing Traffic Except if it Arrives through VPNs
Note – For the traffic to be allowed into the VPN, the destination IP address must be part
of the Site definition of the hub Gateway. When you forward Internet traffic, the hub’s Site
must usually include the Any Network element. This Site may interfere with other VPN
configurations, so you should generally disable it in other VPNs. See Defining Protected
Networks for VPN Sites (page 732).
Table 50.9 Rule for Allowing Traffic Except if it Arrives through VPNs
What’s Next?
For detailed instructions on creating NAT rules, see Editing NAT Rules (page 545).
Monitoring VPNs
Prerequisites: Defining Security Gateways, Defining a VPN Element, Creating VPN Rules
You can monitor the current status of the VPN in the System Status view. The overall status of
the VPN elements and the tunnels they contain is shown in the tree of monitored elements. See
Reading Component Statuses (page 88) for more information on the colors used.
Logging for VPNs is separate for the tunnels and the traffic that uses the tunnels:
• VPN negotiations are always logged (regardless of the logging options in Access rules) as
informational messages. For information on these messages, see Reading VPN-related Logs
(page 912) and IPsec VPN Log Messages (page 1005).
• More detailed logging is available when you activate IPsec diagnostic logging for the firewall/
VPN engine for troubleshooting purposes. See Enabling/Disabling Firewall/VPN Diagnostics
(page 193).
• The traffic using the VPN tunnels is logged according to the logging options you set for the
rule that allows the traffic in or out of the VPN. See Defining Access Rule Logging Options
(page 528).
• The System Status view provides shortcuts to logs filtered for the specific VPN or Security
Gateway(s) referenced in the log event.
• Right-click a VPN in the Status tree or connectivity diagram and select
MonitoringLogs by VPN.
• Right-click a Security Gateway in the Status tree or connectivity diagram and select
MonitoringLogs by Security Gateway.
• Right-click the connection between two Security Gateways in the connectivity
diagram and select MonitoringLogs by Security Gateways to view logs of traffic
between the two Security Gateways.
Log pruning filters that have been activated in your system may delete some (or even all) of the
generated messages.
755
Getting Started With VPN Certificates
Prerequisites: (To certify internal Gateways) Defining Security Gateways
Configuration Overview
1. (Optional) If you plan to use certificates that are signed by some external certificate
authority (CA), define the CA in the system. See Defining a VPN Certificate Authority
(page 757).
2. To use an externally-signed certificate, DSA certificate, or if automatic certificate
management is disabled, start by Creating a VPN Certificate or Certificate Request for an
Internal Gateway (page 759).
3. (For externally signed certificates) When the certificate is signed, import it as explained in
Importing a VPN Gateway Certificate (page 765).
4. Select a certificate-based Authentication Method on the IKE (Phase 1) tab of the VPN
Profile for VPNs. See Defining IKE (Phase 1) Settings for a VPN (page 735).
For a certificate to be valid, a mutually trusted Certificate Authority (CA) must sign the
certificate. Only the internal VPN CA of your system is configured as a trusted VPN CA in VPNs
by default. You must define additional CAs in the following cases:
• If you create a VPN with an external gateway and you do not want to use the internal VPN CA
to create a certificate for the external gateway. The external gateway must also be configured
to trust the issuer of the certificate of your internal gateway.
• If you want to use a certificate signed by an external CA on an internal VPN gateway or on a
VPN client.
You can configure the CA as trusted by importing its root certificate or a valid certificate signed
by the CA. The certificates must be X.509 certificates in PEM format (Base64 encoding). It may
be possible to convert between formats using, for example, OpenSSL or the certificate tools
included in Windows.
The CAs you add can be either private (for self-signed certificates) or public (commercial
certificate issuers). When you define a CA as trusted, all certificates signed by that CA are
considered as valid until their expiration date (or until the CA’s certificate expires). Optionally,
you can also set up StoneGate to check the certificate revocation status from certificate
revocation lists (CRLs) or through the OCSP protocol. The CA may cancel a certificate, for
example, because it is compromised.
Note – All fields but the Name on the General tab are greyed out. The greyed out fields are
always filled in automatically based on information contained in the certificate you import
and you cannot change them (information is shown when you close and reopen the
element after importing the information).
6. (Optional) If you want the firewall/VPN engines to check the revocation status of certificates
signed by this CA, switch to the Validation tab and select the options as follows:
• Select the Check Validity on Certificate-Specified CRLs option to activate CRLs for
certificate status checking.
• Select the Check Validity on Certificate-Specified OCSP Servers option to activate
OCSP certificate status checking.
7. (Optional) To define more CRL servers to check in addition to those defined in the
certificates, click the corresponding Add button and select:
• LDAP Server Element to choose an existing element
• Manual LDAP Server Address to type in the address in a dialog that opens.
Example ldap://example.com:389
8. (Optional) To define more OCSP servers to check in addition to those defined in the
certificates, click the corresponding Add button and type in an address in the dialog that
opens.
Example http://ocsp.example.com
Caution – When certificate checking is defined, all certificates signed by the CA are
considered as invalid if the validity check cannot be performed (for example, due to
incorrectly entered address or connectivity problems).
9. Click OK. If you see an invalid certificate error, the certificate you imported may be in an
unsupported format. Try converting the certificate to an X.509 certificate in PEM format
(Base64 encoding) using OpenSSL or the certificate tools included in Windows.
If you use the Default policy template, both LDAP (port 389) and HTTP (port 80) connections
from the engine are allowed. If your firewall or server configuration differs from these standard
definitions, edit the firewall policy to allow the necessary connections from the engines.
What’s Next?
By default, all Gateways trust all configured VPN certificate authorities in all VPNs. The
trust relationships can be changed at the gateway level (Defining Trusted CAs for a
Gateway (page 726)) and in the VPN Profiles (Defining Trusted CAs for a VPN
(page 742)).
To obtain a certificate from an external certificate authority, first create a certificate
request as explained in Creating a VPN Certificate or Certificate Request for an Internal
Gateway (page 759) and then import the signed certificate as explained in Importing a
VPN Gateway Certificate (page 765).
What’s Next?
When you receive the signed certificate, import it as explained in Importing a VPN
Gateway Certificate (page 765).
Caution – The internal CA does not support certificate revocation lists, so it is not possible
to cancel an internally signed certificate before it expires.
2. In the VPN-specific toolbar, click the Tools icon and select Sign VPN Client Certificate. The
Sign VPN Client Certificate dialog opens. Despite its name, the same dialog works for all
X.509 certificate requests in PEM format and is not limited to VPN client certificate request
signing.
3. If the internal VPN Certificate Authority is in the process of being renewed and there are
temporarily two valid internal VPN Certificate Authorities, select the internal VPN Certificate
Authority for signing the certificate request from the list at the top of the dialog.
4. Either browse to the certificate request file on your local workstation or copy-paste the
content of the certificate request into the dialog (with the “begin certificate request”
header and “end certificate request” footer).
5. Click Sign. The certificate is signed and the dialog switches to show information on the new
certificate. Note the expiration information on the Certificate tab.
6. On the General tab, click Export to save the certificate for transfer to the device that needs
it.
7. Click OK.
In most cases, certificates are transferred to the engines automatically. However, if there are
problems with missing VPN certificates on the Gateways, you can transfer them to the engines
manually.
Related Tasks
Troubleshooting Certificates (page 867)
For security reasons, certificates have an expiry date, after which the certificate must be
replaced with a new one. The process is partially automatic when internally-signed certificates
are used, and the necessary steps are explained in this section. To create a new externally-
signed certificate, see Creating a VPN Certificate or Certificate Request for an Internal Gateway
(page 759).
The certificates issued by the internal VPN Certificate Authority are valid for three years. If
automatic RSA certificate management is activated for an internal security gateway, RSA
certificates issued by the internal VPN Certificate Authority are renewed automatically without
your intervention as long as the certificate-related files are intact (including the private key
stored on the engines).
The internal VPN Certificate Authority itself is valid for ten years. A new internal VPN Certificate
Authority is automatically created six months before the internal VPN Certificate Authority’s
expiration date. New certificates signed by the new internal VPN Certificate Authority are
automatically created for internal gateways. If certificates are used to authenticate IPsec VPN
client users and the certificates have been signed by the expiring VPN Certificate Authority, you
must manually create new certificates for the IPsec VPN clients. You must also create new
certificates manually for any other external components that have certificates signed by the
internal VPN Certificate Authority.
Note – When you renew the VPN certificate, StoneGate IPsec VPN client users will receive
a notification about the certificate fingerprint change. Notify your users before you renew
the certificate, if possible.
In addition to certificate requests, you can also export signed gateway certificates and the
certificates of VPN Certificate Authorities. This is not usually necessary, but can be done as
needed.
If the system has created a new internal VPN Certificate Authority, you must export the
certificate of the new internal VPN Certificate Authority and import the certificate on external
gateways that use certificates signed by the internal VPN Certificate Authority or communicate
with gateways that use certificates signed by the internal VPN Certificate Authority. If the
external gateway itself uses a certificate signed by the internal VPN Certificate Authority, you
must also create a new certificate for the external gateway (see Renewing VPN Certificates
(page 763).
Certificates that are created when the internal VPN Certificate Authority signs an external
certificate request must be exported at the time of signing and are not stored for exporting at a
later time.
This procedure allows you to import a certificate signed by an external certificate issuer for an
internal VPN Gateway when the certificate request has been created internally. For security
reasons, it is not possible to import externally generated private keys.
Note – All CAs that issue certificates for your VPNs must be configured in the system (see
Defining a VPN Certificate Authority (page 757)) and be included as trusted both at the
Gateway and VPN Profile levels.
By default, RSA certificates issued by the internal VPN Certificate Authority to internal VPN
Gateways are renewed automatically. In other cases, the certificates expire according to the
information written in the certificate when it was generated. StoneGate never accepts an expired
certificate.
The Management Server includes a dedicated internal VPN CA for signing VPN certificates, the
“Internal IPsec CA”. The internal VPN CA is valid for ten years. A new internal VPN CA is
automatically created six months before the internal VPN CA’s expiration date. You can check
the expiration date and status of the internal VPN CA.
Related Tasks
Understanding Certificate-Related Problems (page 868)
Dealing with Expiring Certificate Authorities (page 872)
Checking When Gateway Certificates Expire (page 765)
The topics below provide additional instructions for some common configuration and tuning
tasks for existing VPNs.
767
Adding or Removing Tunnels Within a VPN
Prerequisites: You must have a VPN configured
The number of tunnels generated for a VPN is determined by how the Gateway elements are
listed in the Overall Topology tab of the VPN element and the number of end-points there are
active in each Gateway element.
• Each central Gateway forms a tunnel with each central and satellite Gateway in the VPN. No
other Gateway<->Gateway tunnels are created. See Defining VPN Topology (page 744) for
detailed instructions. Tunnels are not generated between end-points that cannot connect to
each other, for example, tunnels are not generated between two end-points if they both have
a dynamic IP address.
• Tunnel generation can be prevented if a Gateway is added under a different Gateway instead
of directly at the main level in the central Gateways list. This configuration implies that the
Gateway at the main level forwards connections to the Gateway(s) below it in the hierarchy.
For the forwarding to work, it must be explicitly configured in the central gateway’s IPv4
Access rules (in a rule with the Use VPNForward action).
• Endpoint<->Endpoint tunnels are created between all endpoints defined in the properties of
any two Gateways that form a Gateway<->Gateway tunnel. See Defining End-Points for Internal
Security Gateways (page 722) or Defining End-Points for External Security Gateways
(page 724).
Before changing the tunnels that are used in active VPNs, we recommend making a backup of
the Management Server as instructed in Creating Backups (page 795). After changing the
topology of the VPN, always check that all new or changed Tunnels are valid on the Tunnels tab.
Related Tasks
Defining Security Gateways (page 720)
Adding New Gateways to an Existing VPN (page 770)
If you have a VPN that is already configured, you can add new Gateways as needed following the
general configuration workflow outlined here:
1. Create a Gateway element to represent the physical gateway device in VPNs if the element
does not exist already, see Defining Security Gateways (page 720). Once created, the
same element can be used in any number of VPNs.
2. If the VPN uses Certificates for authentication, you may need to create a new VPN
certificate for the Gateway (see Getting Started With VPN Certificates (page 756)). The
same certificate can be used in any number of VPNs, providing it fulfills the following
criteria:
• The certificate must match the type of certificate selected for the VPN in the VPN Profile.
• The certificate must be issued by a certificate authority that the other Gateways trust.
3. Edit the VPN element to add the Gateway on the Overall Topology tab, see Defining VPN
Topology (page 744).
4. Check and adjust the Tunnels between the new Gateway and the existing Gateways, see
Defining VPN Tunnel Settings (page 746).
5. Refresh the policies of all Firewall/VPN engines that are involved in the tunnel.
For internal Gateways, the VPN endpoint addresses are determined by the IP addresses you
have defined for the interfaces in the Firewall element. On clusters, only CVI addresses are used
as VPN endpoints.
• If you change the IP address of some interface of a firewall, the corresponding VPN endpoint
IP address also changes automatically and the existing tunnels in the VPN element are
preserved.
• If continuous connectivity is required, define the old and new IP address as two separate
interfaces, select both as endpoints in the VPN, and refresh the policies of all affected
firewall/VPN engines. In this configuration, either of the IP addresses can be used; Multi-Link
VPN automatically selects the end-point that works.
• If you add and remove interfaces, you may need to select and deselect endpoints manually
and then check the tunnel configuration in the VPN element. See Defining End-Points for
Internal Security Gateways (page 722)and Defining VPN Tunnel Settings (page 746).
Note – If the Gateway’s identity in the VPN is tied to its IP address, you must update the
configurations of all gateways in the VPN even if the IP address is NATed and therefore not
directly used for contact. For internal Gateways, this is done by refreshing the engine’s
policy after making changes. For external Gateways, change the information in the
configuration of that gateway device.
For external Gateways, the VPN endpoint addresses are always entered manually. Change the IP
address configured in StoneGate and refresh the policies of all affected firewall/VPN engines.
If you want to give access through the VPN to hosts with IP addresses that are not already
configured for your VPN, proceed according to this general workflow:
1. Make sure the IP addresses (possibly the translated IP addresses if NAT is enabled in this
VPN) are included in one of the Sites of the correct Gateway. If the IP addresses must not
be included in other VPNs where the same Gateway element is used, add them to a
separate Site and disable the SIte in other VPNs. See Adding a New VPN Site (page 731).
2. If there are external Gateways involved, make sure any IP addresses you add to the Site
definition in StoneGate are also added to the configuration of the external gateway device,
so that it routes the traffic through the VPN.
3. Check that the IPv4 Access rules of all Gateways involved specify that this traffic is sent/
allowed through the VPN, and if NAT is enabled in the VPN, check also the NAT rules. See
Creating Basic VPN Rules for Gateway Connections (page 749) and Creating NAT Rules for
VPN Traffic (page 752).
It is possible to force all traffic from VPN clients or clients in protected networks to be routed
through the VPN so that the traffic can be inspected and sanitized centrally. The configuration
requires the following settings:
1. Enable NAT for tunneled traffic in the VPN element’s properties. See Modifying an Existing
VPN Element (page 744).
2. Change the mode of all of the central Gateway’s Sites in this VPN to Private and replace
them with a Site that contains the Any Network element. Disable the Any Network Site in
other VPNs. See Defining Sites for VPN Gateways (page 729).
3. Reconfigure the policy:
• Create Access rules, see Creating Forwarding VPN Rules on Hub Gateways (page 751).
• Create NAT rules that translate any private IP addresses to public addresses for the
Internet. See Creating NAT Rules for VPN Traffic (page 752).
4. Redirect the traffic from external components to the central gateway as necessary:
• For StoneGate Firewall/VPN Gateways, add an Access rule that sends the desired traffic
to the VPN, see Creating Basic VPN Rules for Gateway Connections (page 749).
• For SOHO firewalls: Disallow direct Internet access for the Corporate clients, see
Forwarding All SOHO Corporate Traffic to the VPN (page 772).
5. (VPN Clients only) Configure the Virtual Adapter as explained in Configuring Virtual IP
Addressing for VPN Clients (page 787).
What’s Next?
Apply the configuration on the SOHO firewalls to transfer the changes.
Related Tasks
Defining Corporate Interfaces for SOHO Firewalls (page 370)
It is possible to redirect traffic from one VPN tunnel to some other VPN tunnel through a hub
gateway. This is especially useful for VPN client users who need access to resources at different
locations, because the users do not have to separately connect to different gateways according
to the services they want to use.
See Getting Started With IPsec VPNs (page 716) if you need more instructions for creating and
editing VPNs and the elements involved.
See Configuration 4: Basic VPN Hub (page 709) for a step-by-step configuration example.
Note – Duplicate tunnels are not allowed. There must not be gateway-to-gateway
connections between the hub and the other gateways in other active VPNs.
2. Add a new Site under the hub Gateway that contains all relayed IP addresses that you want
to make reachable through the hub (IP addresses behind the spoke Gateways) and set the
Mode of the Site to Hub in this VPN (disable this Site in other VPNs, if configured). If VPN
client traffic is forwarded, add also the virtual IP address space used for the VPN clients in
a Site under the hub Gateway (if the IP address space is not already included).
3. Add IPv4 Access rules that forward the traffic between tunnels as instructed in Creating
Forwarding VPN Rules on Hub Gateways (page 751).
4. Refresh the policies of all Gateways, starting from the hub gateway.
Optionally, all traffic (including Internet traffic) can be routed through the hub Gateway (see
Routing Internet Traffic Through VPNs (page 771)).
Renew or generate VPN pre-shared keys according to one of the two sets of instructions below.
Caution – Make sure that outsiders cannot obtain the key while you transfer it to other
devices. The key must remain secret to be an effective security measure.
Caution – The pre-shared key must be long and random to provide a secure VPN.
The Gateway Settings element defines performance-related VPN options for the Firewall/VPN
engines. These settings are used internally and there is no need to match them exactly with
settings of other gateways in VPNs.
The Gateway Settings elements are stored under the Other ElementsProfilesGateway
Settings branch in the VPN Configuration view.
What’s Next?
If you want to change any of the Gateway settings, proceed to Defining a Custom
Gateway Settings Element (page 774).
What’s Next?
Adjusting General Gateway Settings (page 776)
Adjusting Negotiation Retry Settings (page 777)
Adjusting Certificate Cache Settings (page 778)
Adjusting Anti-Clogging Settings (page 778)
Parameters Description
Define the Max Length of Encryption Key (in bits).
A longer encryption key is always more secure than a
shorter one, since it produces stronger encryption.
Max Length of Encryption Key Longer keys require more computing power.
Encryption keys that are too long compared to the
performance and load of the firewall/VPN engine
may cause performance problems and may even
make it vulnerable to denial of service attacks.
What’s Next?
Adjusting Negotiation Retry Settings (page 777)
Adjusting Certificate Cache Settings (page 778)
Adjusting Anti-Clogging Settings (page 778)
Or if you are done with Gateway Settings, click OK and continue by assigning the new
Gateway settings as explained in Assigning the Gateway Settings for a Firewall/VPN
Engine (page 779).
Parameters Description
Number of possible retries when sending a packet to
a remote gateway. The negotiation for opening a
Retry Limit
tunnel is cancelled when negotiation has been
attempted the number of times specified.
What’s Next?
Adjusting Certificate Cache Settings (page 778)
Adjusting Anti-Clogging Settings (page 778)
Or if you are done with Gateway Settings, click OK and continue by assigning the new
Gateway settings as explained in Assigning the Gateway Settings for a Firewall/VPN
Engine (page 779).
Parameters Description
Maximum Number Maximum number of certificates stored in the cache.
What’s Next?
Adjusting Anti-Clogging Settings (page 778)
Or if you are done with Gateway Settings, click OK and continue by assigning the new
Gateway settings as explained in Assigning the Gateway Settings for a Firewall/VPN
Engine (page 779).
Parameters Description
Time-out for the regular generation of random local
Local Secret Recreation secrets. All IKE SA lifetimes must be smaller than 2
times this value. Enter the value in seconds.
What’s Next?
Click OK and continue by assigning the new Gateway settings as explained in Assigning
the Gateway Settings for a Firewall/VPN Engine (page 779).
What’s Next?
Refresh the policy of the firewall to transfer the changes.
StoneGate VPN Clients do not have controls for many settings that are needed for
establishing a VPN. These settings are defined in the SMC, and the IPsec VPN Client
downloads it from the gateways it connects to.
781
Getting Started With VPN Client Settings
Prerequisites: See Getting Started With IPsec VPNs
For instructions for the installation and daily use of StoneGate VPN Clients, see the VPN Client’s
PDF documentation.
What VPN Client Settings in the SMC Do
The StoneGate IPsec VPN Client settings are configured centrally in the Management Center and
then automatically updated to the Clients from the engines when the clients connect. The
following settings are transferred from the gateway to the client:
• Routing information (VPN Site definitions): generally, if an IP address that the client wants to
contact is included in the Site definition, the traffic is routed into the VPN.
• Authentication settings.
• Encryption settings.
• Information about the gateway’s end-points.
• Setting for NAT traversal method allowed.
• Settings for local security checks on the client computer (for StoneGate IPsec VPN clients
version 5.0 or higher).
• Backup gateways to contact in case there is a disruption at the gateway end (for StoneGate
IPsec VPN client version 5.1 or higher).
Limitations
• When the IPsec VPN Client is first installed, it has no configuration. Therefore, the basic
information on Gateways (such as the IP address to use for connecting) must be introduced
by either the user after installation or the administrator when preparing for the deployment.
• There are version-specific dependencies between StoneGate IPsec VPN Client and Firewall/
VPN software. See the Release Notes of the StoneGate VPN Client version you intend to use
for information on compatibility with your Firewall/VPN gateway’s software version.
• StoneGate does not create configurations for third-party VPN clients. You must create the
configuration through the controls and tools of the third-party IPsec VPN client product.
Related Tasks
Getting Started With IPsec VPNs (page 716)
Configuration 3: Basic VPN for Remote Clients (page 701)
Creating Basic Rules for VPN Client Connections (page 750)
Routing Internet Traffic Through VPNs (page 771)
The table below outlines the settings for StoneGate VPN clients available in the Management
Client.
Cipher Algorithms
AES-128
AES-256
3DES These are the supported algorithms for the
VPN Profile element Message Digest Algorithms current version of StoneGate VPN clients.
properties MD5
IKE (Phase 1) tab SHA-1
(See Defining IKE SHA-256
(Phase 1) Settings Diffie-Hellman Group
for a VPN Not supported by StoneGate VPN clients.
1 (768 bits)
(page 735).)
Authentication Methods
Pre-shared key These settings have no effect on VPN client
Negotiation Mode connections. See VPN Client tab instead.
Authentication Mode
There are two different methods to define the IP addresses VPN clients use in the internal
network. You must always configure one or the other when you want to create a client-to-gateway
VPN for the VPN to be valid. The methods are as follows:
1. You can use NAT to translate the IP addresses in communications, which gives the VPN
Clients an ‘internal’ IP address in the internal network without the need for a DHCP
server. This is called a NAT Pool.
• This method is not recommended for StoneGate IPsec VPN Clients, because it does not
allow the clients to make queries to internal DNS servers without manual configuration.
• NAT rules must not be applied to communications from clients that receive their address
through the NAT Pool feature (which also uses NAT).
• The NAT Pool method does not require any additional client-side features.
2. (Recommended for StoneGate IPsec VPN Clients) You can use a DHCP server to assign the
VPN clients a second, virtual IP address that is used in communications through the VPN
tunnel. The IP address is attached to a Virtual Adapter. Using this method provides the
following benefits over the NAT Pool:
• Centrally configure the DNS settings to any version of StoneGate IPsec VPN Clients when
connected (using the DHCP server).
• Control the IP address each VPN Client is assigned (depending on the DHCP server).
• Forward client-to-gateway VPN traffic to a site-to-site VPN and/or route the Internet traffic
from the client computer through the gateway for inspection.
• Open new connections also from the internal network to the VPN Client computers
through the VPN.
• To use the Virtual Adapter, the VPN client software must support this feature. All third-
party VPN clients do not have a Virtual Adapter feature.
Third-party VPN clients do not necessarily require utilizing either of these methods if the
communications can use a locally configured IP address. StoneGate VPN clients always require
either the NAT Pool or the Virtual Adapter. Activating both the NAT Pool and the Virtual Adapter is
technically possible, but the NAT Pool address translation is applied to all VPN client traffic
when activated, including connections from hosts that use a Virtual Adapter.
What’s Next?
Configuring NAT Pool for VPN Clients (page 786)
Configuring Virtual IP Addressing for VPN Clients (page 787)
Related Tasks
For a detailed technical discussion on using a virtual IP address, see RFC 3456.
Note – Make sure NAT is enabled for this VPN. The Enable NAT with this VPN option in
the properties of the VPN element must be selected. Otherwise, the NAT pool options have
no effect.
Note – If the NAT Pool is active, it is used for translating connections from VPN clients that
have a virtual IP address. It is not possible to exclude hosts with a virtual IP address from
being subject to the NAT Pool address translation.
5. Enter the IP addresses and ports you wish to use for translating VPN client traffic in IP
Range and Port Range.
Caution – Make sure the addresses you define here do not overlap with addresses that are
in use in your networks. Also, the addresses must not overlap with any translated address
space in your NAT rules.
What’s Next?
To configure virtual addressing, proceed to Configuring the Gateway for Virtual IP
Address Clients.
4. Select the Virtual IP Address (using Virtual adapter) option. The other options beneath
are enabled.
5. (Optional) Select Use Proxy ARP to make the firewall/VPN engine act as a proxy for the
VPN client’s ARP requests and click the corresponding Edit button to select the address
range to define the scope for this option.
Note – The Proxy ARP option may be required for a working VPN depending on your
network configuration.
Note – If the NAT Pool is active, it is used for translating connections from VPN clients that
have a virtual IP address. It is not possible to exclude hosts with a virtual IP address from
being subject to the NAT Pool address translation.
7. Select Use DHCP to define DHCP settings for the VPN clients.
8. Click the DHCP Servers button and select the correct DHCP Server element.
9. (Optional) Select the Use Local Relay option to force the use of unicast DHCP relay
messages for VPN clients’ DHCP requests even if the DHCP server is in a directly
connected network in relation to the firewall engine.
• By default, the firewall/VPN engine sends a normal DHCP client broadcast message to a
DHCP server located in a directly connected network.
• Unicast DHCP relay messages are always used when sending the DHCP requests to DHCP
server that is behind an external gateway device.
10.(Optional) Select Add User information or Add Group information to add the VPN Client
user or user group information (in the form: user@domain or group@domain) to the DHCP
Request packets’ Remote ID option field.
• Your DHCP server must support the DHCP Relay Agent Information option to use this
information.
• Depending on your DHCP server configuration, this information can be used as a basis for
IP address selection.
11.Choose one NDI address in NDI for DHCP Relay to be used as the source address for the
DHCP packets when querying the DHCP server (the interface towards the DHCP server).
12.If you have a specific need to do so, you can change the largest allowed packet size for the
relayed DHCP requests in the Max Packet Size drop-down list.
What’s Next?
DHCP relay is not allowed in the Default template. To allow this traffic, continue the
configuration in Allowing DHCP Relay in the Policy (page 789).
Note – The sub-policy also contains rules for local DHCP relay between internal networks.
If just one of these DHCP relay features is active, the rules for the other feature are invalid
and ignored when the policy is installed.
What’s Next?
Refresh the firewall’s policy before using this configuration.
You can export the settings for StoneGate IPsec VPN Clients from the Management Center. This
allows deploying new clients without requiring the users to add the VPN gateways manually.
What’s Next?
Make the configuration available to VPN Clients as explained in the StoneGate IPsec
VPN Client Administrator’s Guide.
791
792
C HAPT ER 54
Backups contain the necessary configuration information to restore the SMC to the state it
was in when the backup was taken, including the configuration information for the firewall and
IPS engines that the Management Server stores.
793
Getting Started with Backups
Prerequisites: None
What Backups Do
Backups allow you to save and restore StoneGate Management Server and Log Server
configurations on the same system or a different physical host.
• The Management Server backup contains the policies, elements, and other essential
configuration details for all Firewall/VPN and IPS components that they manage, as well as
the configuration of the Management Server itself.
• The Log Server backup contains the Log Server’s local configuration and optionally the logs.
Restoring the backups allows you to restore the SMC configurations to the exact same state as
they were when taking the backup even if you restore it on a completely new installation.
Backups are needed to recover from the loss of the system configurations, for example, due to
hardware failure. A backup also allows you to relocate the SMC servers onto different hardware.
Limitations
The private keys of engine certificates are stored locally on the engines and are not backed up.
What Do I Need to Know Before I Begin?
The Management Server is the only place that contains usable, complete configuration
information for any individual engine component in the system. The engines contain a working
copy of the configuration details that allows them to carry out traffic inspection independently,
but it is not possible to extract this information from the engines in the event that the
Management Server is lost. Regular Management Server backups are therefore essential and
must be stored in a safe storage location outside the Management Server host machine.
Always take the backups using StoneGate’s internal backup tool. External backup applications
that back up the host server may not produce usable backups of your StoneGate system,
especially if the StoneGate servers are running at the time the backup is taken.
Backups from the previous major version of StoneGate can always be restored in the current
major version of StoneGate. Backups taken from older versions may not always be restorable.
Generally, backups can be restored between versions that support direct upgrades between the
versions (see the Release Notes for version-specific details).
Note – If your configuration contains elements for HTTPS Inspection, the private keys and
certificates of the Server Protection Credentials and Client Protection Certificate
Authorities are included as plain text in the Management Server backup. Use the
encryption option for the backups when the configuration contains elements for HTTPS
Inspection. For more information, see Setting up HTTPS Inspection (page 655).
Configuration Overview
1. Backup up the Management Server(s) and Log Server(s) regularly as instructed in
Creating Backups (page 795) or schedule backup tasks to run at regular intervals as
instructed in Creating Backup Tasks (page 817) and Scheduling Tasks (page 820).
2. Store the backup files in a safe location as instructed in Storing Backup Files (page 796).
3. When necessary, restore a backup as instructed in Restoring Backups (page 796).
Management Server backups include all configuration information, including licenses, the
server components’ certificates needed for system communications, the root CA, and locally-
stored user accounts. The configurations you create in the SMC for the engine components is
included in the Management Server backup, so these components do not have to be separately
backed up.
The Log Server backup contains the Log Server configuration information and optionally also the
log data stored on the server. There is a configurable limit to how large the Log Server backup
can be.
The directions below explain how to use the Management Client to take and manage the
backups. It is also possible to create backups on the command line, see Command Line Tools
(page 917). The backup file itself is the same regardless of the method used.
Note – To back up the Management Server, there must be enough free disk space on the
server. Twice the size of the management database is required. If there is not enough
available disk space, the backup process does not start.
To create backups
1. Select FileSystem ToolsBackup. The Backup Task Properties dialog opens.
2. Select the server(s) you want to back up from the list on the left and click Add. The
selected server(s) are added to the list on the right.
3. (Optional) If you want to create an encrypted backup, select Encrypted, and enter and
confirm a password.
• We recommend using this option if the configuration contains elements for HTTPS
Inspection.
4. (Optional) If you are creating a backup of Log Server(s) and you want to back up the log
files, select Back up Log Files.
5. Click OK. The progress is shown on a new tab.
What’s Next?
Copy the backup files from the backup directory to a separate, safe location for storage,
see Storing Backup Files (page 796).
Related Tasks
If you want to create backup tasks and schedule them to run at regular intervals, see
Creating Backup Tasks (page 817) and Scheduling Tasks (page 820).
To back up and delete log data with the log management tools, see Getting Started with Log
Data Management (page 800).
The backup files are saved in the <installation directory>/backups/ directory on the
server on which they were created. We recommend copying the backup file to a safe location, for
example, to removable media or another host. Otherwise, you will have to manually recreate all
configurations if the data on the host computer is irrecoverably lost.
The backups files are compressed to .zip files or .enc files and they can also be
decompressed manually if needed. If necessary, the backups are split into several files to fit the
maximum file size. Each backup has its own subdirectory.
Note – Remember to handle the backup files securely, since they contain all the
configuration information for the system.
Restoring Backups
Prerequisites: Creating Backups
StoneGate backups created in one operating system can be restored to an installation running
on some other operating system without any special measures. This is useful when changing
the operating system or hardware platform.
See the upgrade instructions in the Release Notes. If an intermediate upgrade is required
between your current version and the newest version, upgrade the existing installation to (at
least) the intermediate version to create a working backup.
There are special scripts for Management Server High Availability for restoring a Management
Server backup to a machine other than the one where it was created. For more information
about the scripts, see Command Line Tools (page 917).
When you restore a backup, StoneGate checks that there is enough disk space on the
destination drive. Twice the size of the backup file is required. If there is not enough available
disk space, the restoration process fails.
It is also possible to restore backups on the command line. For more information, see
Command Line Tools (page 917).
What’s Next?
To restore a Management Server backup, see Restoring a Management Server Backup
(page 797).
To restore a Log Server backup, see Restoring a Log Server Backup (page 797).
What’s Next?
If the backup is restored on a system that uses a different IP address than the
Management Server that the backup is from, you must complete the relevant steps to
change the IP address, see Changing the Management Server’s IP Address (page 304).
The backup contains the internal CAs (certificate authorities). If components in the
system have certificates from a different CA than the one contained in the backup, the
certificates are not accepted as valid after restoring the backup and have to be
regenerated as explained in Troubleshooting Certificates (page 867).
Otherwise, start the Management Server.
What’s Next?
If you restore the Log Server backup on a computer with a different IP address than the
Log Server the backup was created with, complete the relevant steps in Changing the
Log Server’s IP Address (page 305).
Otherwise, restart the Log Server and the Management Server.
Note – In some cases, IPsec VPN certificate information may be lost and policy installation
fails. If this happens, delete the old IPsec VPN certificates in the Management Client and
create new VPN certificates for the engine. When you use the same CA and certificate
details, the new certificates are accepted by other components. Policy installation is also
possible if you disable the invalid configurations (for example, by disabling all VPN-specific
Access rules in the policy). See Creating and Signing VPN Certificates (page 759).
Logs must be actively managed to prevent the Log Server from filling up the hard disk with
logs. StoneGate tools help you manage the generated log entries automatically according to
settings you define.
799
Getting Started with Log Data Management
Prerequisites: None
Any Log Server will gradually fill up completely if log data is never removed. You must actively
manage the log data to prevent this from happening.
What Log Management Tools Do
You can manage the log data in the following ways:
• Export log data so that it can be used elsewhere.
• Copy log data to an archive location.
• Delete old or unnecessary log data.
• Set up automatic log management tasks for exporting, copying, and removing selected data.
• Reduce the amount of logs by pruning some of the log entries before they are stored on the
Log Server. However, preventing the unwanted log entries from being created should always
be preferred over pruning to avoid unnecessary use of resources.
Limitations
Only the logs in the active storage are used in reporting. If you archive logs, you can still view
them in the Logs view, but they are no longer available when you generate reports (see Reports
(page 145)).
Alert and audit logs cannot be pruned.
Configuration Overview
1. Tune your system to generate the log entries you need. See Defining When Logs Are
Generated (page 801).
2. (Optional) Set up log archiving to store older important logs for possible later use and free
up the space on the Log Server, see Archiving Log Data (page 802).
3. (Recommended) Set up scheduled log data tasks for deleting logs that are not needed in
the long term. See Deleting Log Data (page 805).
4. (Optional) Configure log pruning to prune out any unnecessary logs if any are generated.
See Pruning Log Data (page 807).
Related Tasks
Changing Log Server Configuration Parameters (page 279)
Exporting Log Data (page 809)
Exporting Log Data to Syslog (page 282)
To export and archive log data directly from the Logs view, see Exporting Extracts of Log
Data (page 141).
Normal and Alert logs are generated both based on internal conditions in the operation of a
component and based on traffic that the engines handle.
Internal conditions that trigger logs or alerts:
• There is a system error or warning.
• An engine test fails. You can configure the engine tester in detail and select whether test
failures trigger an alert as explained in Configuring the Engine Tester (page 397).
• The status of an engine changes (not active by default). See Enabling/Disabling Engine
Status Monitoring (page 192).
• When the values of a monitored item exceed a threshold limit in an Overview (not active by
default), see Setting Thresholds for Monitored Items (page 96).
• Diagnostics are active on a firewall engine (not active by default), see Enabling/Disabling
Firewall/VPN Diagnostics (page 193).
Traffic conditions that trigger logs and alerts:
• A sensor engine’s limit for the number of times tunneled traffic is rematched has been
reached (not active by default), see Adjusting Sensor Advanced Settings (page 428).
• Traffic matches a rule in your policy, see Getting Started with Editing the Rules in Policies
(page 510).
• Diagnostics are active on an engine (not active by default), see Enabling/Disabling Firewall/
VPN Diagnostics (page 193).
Additionally, you can set up Log Servers to receive logs from any devices that can be set up to
send syslog, see Monitoring Third-Party Devices (page 111).
In addition to activating and deactivating logging and the features listed above, you can optimize
the number of generated logs in the following ways:
• You can configure in the Sensor properties that the Sensor automatically drops duplicate log
entries as explained in Adjusting Sensor Advanced Settings (page 428).
• You can also configure log compression for antispoofing and Discard logs on firewall engines
as explained in Configuring Log Handling Settings (page 426).
What’s Next?
To archive (and delete) logs, see Archiving Log Data (page 802).
To remove unnecessary logs, see Deleting Log Data (page 805).
You can set up an Archive Log Task for copying log data from the active storage on the Log or
Management Server to some other location. The same task can also delete the log data from
the active storage, so that you do not have to set up a separate task for freeing up the space.
By default, the log archive location is on the same disk drive as the active storage. To change
the archive folder, see Changing Log Server Configuration Parameters (page 279).
Note – The Archive Log Task copies the existing log files without compression. This enables
you to view the archived logs in the Logs view but they are not used in the Reports view
when reports are generated.
What’s Next?
Start by Creating an Archive Log Task.
3. Enter a unique Name and an optional free-form Comment for your own reference.
4. Select the server from which the logs are archived and click Add.
What’s Next?
Continue by Selecting Log Data for Archiving (page 803).
2. Select the type of log data for archiving by checking the Target Data options.
3. Select the Time Range of the log entries.
• You have several options to limit the time range. For example, select Absolute Time
Range in the Time Range list and define the Start and End Time.
4. (Optional) Specify a script in the Script to Execute After the Task field. The Log Server
triggers this script after completing the task.
What’s Next?
Continue by Selecting Operation Settings for Archiving Log Data (page 804).
2. (Optional) Select the Filter for Copying. For instructions on how to define filters, see
Filtering Data (page 159).
3. In the Source Data Deletion section, select whether the data to be archived is kept in
active storage after it has been copied to the target location. You can also select that the
task removes some other data from the active storage (for example, the archive operation
can copy important logs from within the time range and then clear the active storage of all
logs within the time range).
• If you want to delete the archived data from the active storage, select the Delete Source
Data option.
• If you want to delete some other data from active storage while you archive data, select
the Delete Other Data option and optionally a log filter for deleting the other data.
4. Select the Archive Target Directory from the list. The directory is determined in the Log
Server’s configuration file (LogServerConfiguration.txt). See Changing Log Server
Configuration Parameters (page 279) for details.
5. Click OK.
The task appears under Task Definitions in the Tasks branch of the Administration tree. You can
run the task either manually or according to a fixed schedule.
What’s Next?
To run the task manually, see Starting Tasks Manually (page 821).
To make the task run automatically, see Scheduling Tasks (page 820).
Related Tasks
Viewing Logs From Specific Servers and Archive Folders (page 136)
To permanently remove generated log data, you can delete it from the active storage or delete it
as it arrives to the Log Server using pruning filters.
What’s Next?
To delete stored log data, proceed to Creating a Delete Log Task.
To delete log data as it arrives on the Log Server, see Pruning Log Data (page 807)
3. Enter a unique Name and an optional free-form Comment for your own reference.
4. Select the server from which the logs are deleted and click Add.
What’s Next?
Continue by Selecting Data for Deleting Logs (page 806).
2. Select the type of log data for deletion by checking the Target Data options.
3. Select the Time Range of the log entries.
• You have several options to limit the time range. For example, select Absolute Time
Range in the Time Range list and define the Start and End Time.
4. (Optional) Specify a script in the Script to Execute After the Task field. The Log Server
triggers this script after completing the task.
What’s Next?
Continue by Selecting Operation Settings for Deleting Logs.
2. (Optional) Select a log filter that defines which log entries are deleted. For instructions on
how to define filters, see Filtering Data (page 159).
3. Click OK.
Caution – When this task is started (either manually or as you schedule it), all logs
matching the selected filter and time range are permanently deleted from the active
storage. Make sure that the data you want to keep is exported and/or copied to a safe
location before the operation is started.
What’s Next?
To run the task manually, see Starting Tasks Manually (page 821).
To make the task run automatically, see Scheduling Tasks (page 820).
Note – Pruning has no effect on logs that have already been stored. See Deleting Log Data
(page 805) on how to delete stored data.
Caution – Never select the Match All filter for log pruning. Pruning with the Match All filter
irreversibly destroys all new logs that are created.
Caution – Any log entry that matches the filter you have selected is irrevocably deleted.
The changes you make to pruning filters are applied immediately.
5. A warning message is displayed. Click Yes to prune the selected log entries. This change is
applied immediately without any further action.
Related Tasks
Disabling Pruning Filters (page 808)
Deleting Log Data (page 805)
Note – Log Filters that are removed from pruning remain available for other use until you
delete them separately.
5. Click OK in the dialog that is displayed to affirm this action. This change is applied
immediately without any further action.
Following the steps here, you can set up a Log Export task, which can be used in manual and
scheduled export operations to export a specific log data set from the Log Server and the
Management Server log storages.
You can also export extracts of log data while browsing logs, see Exporting Data from the Logs
View (page 141).
To send log data to external monitoring products, see Exporting Log Data to Syslog (page 282).
What’s Next?
Start by Creating an Export Log Task.
3. Enter a unique Name and an optional free-form Comment for your own reference.
4. Set the Operation Type to select the format for the exported data:
• Export XML: logs are exported in XML format
• Export CSV: logs are exported in CSV (comma-separated value) format
• (For exporting IPS traffic recordings) Export IPS Recordings as PCAP: IPS recording file is
converted to PCAP format that is compatible with “sniffer” tools such as tcpdump,
WinDump, or Wireshark.
• (For exporting IPS traffic recordings) Export IPS Recordings as Snoop: IPS recording file
is converted to Snoop format that is compatible with “sniffer” tools such as Wireshark.
What’s Next?
Continue by Selecting Data for Log Export.
2. Select the type of log data for export by checking the Target Data options.
• If you selected Export IPS Recordings as PCAP or Export IPS Recordings as Snoop as
the Operation Type on the General tab, IPS Recording is automatically selected.
3. Select the Time Range of the log entries.
• You have several options to limit the time range. For example, select Absolute Time
Range in the Time Range list and define the Start and End Time.
4. (Optional) Specify a script in the Script to Execute After the Task field. The Log Server
triggers this script after completing the task.
What’s Next?
Continue by Selecting Operation Settings for Log Export.
What’s Next?
To run the task manually, see Starting Tasks Manually (page 821).
To make the task run automatically, see Scheduling Tasks (page 820).
There is a history file from which it is possible to view all previously executed tasks related to
logs (Export Logs Tasks, Archive Log Tasks, and Delete Log Tasks). The system never erases
this file.
Tasks define parameters of system maintenance operations. You can run maintenance
operations manually or automatically according to a schedule you set.
813
Getting Started with Tasks
Prerequisites: None
What Tasks Do
With Task elements, you can start maintenance operations either manually or according to a
schedule. You can do the following maintenance with Tasks:
• Back up the Management and Log Server(s).
• Upload policies.
• Upgrade engine software remotely.
• Export, archive, and delete logs.
• Synchronize redundant Management Servers in a high-availability setup.
There are also certain pre-configured system tasks that run automatically in your system, and
which you can see when you work with Task elements.
Scheduling the tasks allows you to run regular or one-off maintenance operations automatically,
for example, during a regular maintenance window.
What Do I Need to Know Before I Begin?
When scheduling automatic backups, you may want the data to be moved to a safe place
automatically. This can be achieved through operating system scripts, which Tasks can launch
upon completion. With Log Servers, you can change the backup and log archive locations in the
Log Server’s local configuration file.
See Task Types (page 815) for short descriptions of all Task types.
Configuration Overview
1. Define the Task parameters as explained in Creating New Task Definitions (page 817).
2. (Optional) Set up automatic Task execution as explained in Scheduling Tasks (page 820).
3. Run Tasks when necessary as described in Starting Tasks Manually (page 821).
Related Tasks
Pausing the Scheduled Execution of a Task (page 821)
Cancelling a Task Schedule (page 821)
Stopping Task Execution (page 822)
Tasks are based on Task Definitions. There are two kinds of Task Definitions: custom Task
Definitions and predefined System Task Definitions. To view Task Definitions or to create new
Task Definitions, browse to TasksTask Definitions in the Administration Configuration view.
Table 56.1 explains the types of custom Tasks that you can create.
Creates a ZIP file that contains copies of configuration files and system trace
SGInfo Task files for the selected component(s) for Stonesoft’s technical support. See
Creating SGInfo Tasks (page 820).
Refreshes the currently installed policy on the selected engine(s). See Creating
Policy Refresh Task
Policy Refresh Tasks (page 818).
Uploads the selected policy to the selected engine(s). See Creating Policy
Policy Upload Task
Upload Tasks (page 818).
Copies log data from the active storage or archive to the selected location.
Export Log Task
See Exporting Log Data (page 809).
Copies log data from the active storage to the selected location. See Archiving
Archive Log Task
Log Data (page 802).
Delete Logs Task Deletes log data from the active storage. See Deleting Log Data (page 805).
In addition to Task Definitions that you create and customize, there are predefined Task
Definitions for several system tasks. You can run the System Tasks manually or reschedule
them, but you cannot change the options in System Task Definitions.
Delete Old Deletes old Policy Snapshots. For more information about Policy Snapshots,
Snapshots see Checking and Comparing Policy Versions (page 504).
Renew Gateway Generates new certificates for internal gateways if automatic certificate
Certificates renewal is enabled in the internal gateways' properties.
Renew Internal Checks the status of internal certificate authorities for automatic renewal. To
Certificate ensure that the automatic certificate authority renewal works correctly, do not
Authorities change the schedule of this Task.
Checks the status of internal certificates for automatic renewal. To ensure that
Renew Internal
the automatic certificate renewal works correctly, do not change the schedule
Certificates
of this Task.
Synchronize Transfers the configuration changes made on the primary Management Server
Management Server to the secondary Management Server(s) when one or more secondary
Databases Management Servers are used for high availability.
What’s Next?
Creating New Task Definitions (page 817).
You can create new Tasks to help you maintain your system. The available Task Definitions are
explained in Task Types (page 815). For log data tasks (Export/Archive/Delete), see Getting
Started with Log Data Management (page 800).
What’s Next?
Creating Backup Tasks (page 817)
Creating Policy Upload Tasks (page 818)
Creating Policy Refresh Tasks (page 818)
Creating Remote Upgrade Tasks (page 819)
Creating SGInfo Tasks (page 820)
What’s Next?
To make the Task run automatically, proceed to Scheduling Tasks (page 820).
To start the Task now, proceed to Starting Tasks Manually (page 821).
Note – If you want already established connections to continue using the same
configuration information (such as NAT rules), make sure Keep Previous Configuration
Definitions is selected.
5. (Optional) Leave Validate Policy before Upload selected if you want to validate the rules
when the Task is launched manually, and select the related settings. See Validating Rules
Automatically (page 556) for more information.
• Policy validation is possible if you select only one element for the Policy Refresh Task.
6. (Optional) Add an Upload Comment that is shown in Policy Snapshots created from the
policy installations.
7. Click OK. The new Policy Refresh Task is added to the list of Task Definitions.
What’s Next?
To make the Task run automatically, proceed to Scheduling Tasks (page 820).
To start the Task now, proceed to Starting Tasks Manually (page 821).
Note – If you want already established connections to continue using the same
configuration information (such as NAT rules), make sure Keep Previous Configuration
Definitions is selected.
What’s Next?
To make the Task run automatically, proceed to Scheduling Tasks (page 820).
To start the Task now, proceed to Starting Tasks Manually (page 821).
Caution – Do not activate the new configuration simultaneously on all the nodes of a
cluster. If you want to schedule a Remote Upgrade Task for several nodes, create two
separate Remote Upgrade Tasks: one to transfer the new configuration and another to
activate it. Schedule the “Activate” Task to run only after the “Transfer” Task is complete.
See Scheduling Tasks (page 820).
5. Select the engine(s) that you want to upgrade from the list on the left and click Add. The
selected engine(s) are added to the list on the right.
6. Select the correct previously imported Engine Upgrade file for the upgrade.
7. Click OK. The new Remote Upgrade task is added to the list of Task Definitions.
What’s Next?
To make the Task run automatically, proceed to Scheduling Tasks (page 820).
To start the Task now, proceed to Starting Tasks Manually (page 821).
What’s Next?
To make the Task run automatically, proceed to Scheduling Tasks (page 820).
To start the Task now, proceed to Starting Tasks Manually (page 821).
Scheduling Tasks
Prerequisites: Creating New Task Definitions
After creating Task Definitions, you can schedule Tasks to run at a convenient time. If
necessary, you can also schedule System Tasks (see Task Types (page 815)).
To schedule a Task
1. Select ConfigurationConfigurationAdministration from the menu. The Administration
Configuration view opens.
2. Browse to TasksTask Definitions. A list of defined Tasks opens.
3. Right-click the Task you want to schedule and select Schedule. The Task Properties window
opens.
4. Set the schedule properties:
• Repeat: how often to repeat the Task. If you select No, the Task is executed only once (at
the specified time).
• Start at: the date and time when the Task starts the first scheduled run.
Tip – The date and time can be entered manually in the format YYYY-MM-DD HH:MM:SS. You can also
right-click the Up or Down arrows next to the date field to select a date from the calendar.
5. Click OK. The schedule is added as a visible element under the Task Definition in question.
If you want a Task to run immediately, you can start it from the Task Definitions list.
To start a Task
1. Select ConfigurationConfigurationAdministration from the menu. The Administration
Configuration view opens.
2. Browse to TasksTask Definitions. A list of Task Definitions opens.
3. Right-click the task you want to start and select Start. The task starts and is added to the
list of Running Tasks.
If you want to temporarily stop a Scheduled Task from running at the scheduled time, you can
suspend the Scheduled Task. When a Scheduled Task is suspended, it remains in the
Scheduled Task list, but it does not run at the scheduled time.
You can remove Tasks from the schedule by deleting the schedule information from the Task
Definition. Deleting the schedule information does not delete the Task Definition: the same Task
can be scheduled again.
MANAGING LICENSES
All system components must be licensed as a proof of purchase. Also, some additional
features can be activated by importing a feature license.
823
Getting Started with Licenses
Prerequisites: None
Licenses prove that your organization has legally purchased the StoneGate components you
configure. Licenses are issued when you purchase a product and you can upgrade them to new
supported versions as part of each component’s support and maintenance contract.
Licenses are generated by Stonesoft’s online licensing servers and imported to the system as
files. Licenses are shown as elements in the Administration Configuration view.
When Do I Have to Generate Licenses?
Generally, you must generate and import a license for each engine and each Management
Center server to start using the component. However, there are the following exceptions:
• All Management Servers in the same Management Center share a single license (high
availability setup with a primary server and one or more secondary servers).
• SOHO firewall appliances do not require separate engine licenses.
• All currently available firewall and IPS appliance models can fetch a license automatically
through the Management Server if automatic updates are enabled. If automatic licensing
fails, the appliances have a 30-day temporary license to give you time for manual licensing.
• StoneGate SSL VPN licenses can be managed locally or through the Management Center
(starting from SSL VPN version 1.4.0).
• Some optional features are activated by purchasing and importing a feature-specific license.
• You may need to replace a valid existing license to activate additional purchased features.
What Do the Different License Types Mean?
Licenses are classified based on how they are bound to components:
• Static licenses are bound to a detail about a specific component, based on which they are
automatically bound to the correct element. Static licenses of SMC servers are bound to an
IP address. Static licenses of appliances are bound to the appliance’s unique POS code.
• Dynamic licenses (except SSL VPN licenses) are bound to the Management Server’s licensing
code (POL). You must manually bind dynamic licenses to the correct element.
Available license types depend on the component:
• Management Server: always a static IP-address-bound license.
• Log Servers and Web Portal Servers: a static IP-address-bound license or a dynamic license.
• StoneGate firewall and IPS appliances: a static license bound to a POS code (all current
models) or a dynamic license (older models).
• StoneGate SSL VPN: special dynamic license bound to DNS domains instead of a POL code.
• Engines installed on your own hardware: always a dynamic license.
• Feature-specific licenses: always a dynamic license.
When Do I Have to Update Licenses?
Components do not run without a valid license. Always make sure you have an updated license
ready before you make a change that invalidates the previous license. Licenses have to be
updated for new software versions and if the binding detail in the license changes:
• Version upgrades: No action is required if automatic license upgrades are active, see
Automatic Updates and Engine Upgrades (page 209). Otherwise, upgrade licenses manually.
License upgrades are available shortly before a new version is released.
What’s Next?
Generating New Licenses (page 826)
Installing Licenses (page 828)
Related Tasks
Upgrading Licenses Manually (page 827).
Changing License Binding Details (page 828)
Checking If All Components Are Licensed (page 831)
Checking License Validity and State (page 831)
Troubleshooting Licensing (page 879)
Licenses always indicate the newest software version you are entitled to, but they are valid for
licensing any older software versions as well.
Generally, each component must have a separate license, including the Management Center
components. Some additional features may also require a separate license.
Note – Your system may be able to automatically generate licenses for new StoneGate
appliances. For automatic licensing to work, install a license for the Management Center
components and ensure that automatic updates are working. The factory-installed
temporary license is automatically replaced with a permanent POS-bound license when the
appliance is configured for use.
Note – If the binding information is incorrect, the license is unusable. If you accidentally
generate a license with the wrong binding information, request a license change through
these same licensing pages.
6. Click Submit Request. The license file is sent to you, and also becomes downloadable in
the License Center.
What’s Next?
Proceed to Installing a License for an Unlicensed Component (page 828).
Licenses are valid for any older software versions in addition to the version indicated on the
license, so you can upgrade the licenses at any time without affecting the system’s operation.
You can view, change, and download your current licenses at Stonesoft’s online License Center
www.stonesoft.com/license/ by logging in with your personal account (to view all licenses
generated using that account) or by entering a proof-of-license or proof-of-serial number code (to
view information related to a particular license).
If automatic license upgrades are configured (recommended), your licenses are automatically
kept up-to-date, but if you prefer, you can upgrade licenses manually in the following ways:
• When you log in to the online License Center, you can upgrade the license for the displayed
component(s) through the link provided and save the license as a file that you can import in
the system as explained in Installing Licenses (page 828).
• You can export information on licenses through the Management Client and use the resulting
text file to upgrade the licenses as explained below.
4. Right-click one of the selected items and select Export License Info. A file save dialog
opens.
5. Save the information to a file. A dialog opens.
6. (Optional) Click Yes to launch the online multi-upgrade form in the default web browser on
your system.
7. Upload the license file to Stonesoft’s online License Center using the multi-upgrade form.
The upgraded licenses are sent to you and also become available for download through the
online License Center.
What’s Next?
To import the upgraded license(s), proceed to Replacing the License of a Previously
Licensed Component (page 829).
Licenses that are bound to an IP address must be changed if the IP address of the component
changes. Licenses that are bound to the POL code of the Management Server must be changed
if you want to transfer the licenses to a different Management Server or if you replace the
Management Server’s license with a license that has a different POL code.
IP-address-bound licenses have been previously available for firewall and IPS engines. You can
use and update a previously generated IP-address-bound engine license, but you must switch
the binding to the Management Server’s POL code if the engine’s control IP address changes.
POS-based licenses are recommended for StoneGate appliances. These are bound to the serial
number of the appliance hardware, and are automatically bound to the correct element.
You must change IP address and POL based binding manually. To view, change, and download
your current licenses at Stonesoft’s online License Center www.stonesoft.com/license/, log in
with your personal account (for all licenses your account is authorized to view) or by entering a
proof-of-license or proof-of-serial number code (to view information related to a particular
license).
What’s Next?
If automatic license updates are active, changed licenses are downloaded automatically
as long as the license’s identification code remains the same.
To manually apply new licenses, proceed to Replacing the License of a Previously
Licensed Component (page 829).
Installing Licenses
Prerequisites: Generating New Licenses / Upgrading Licenses Manually
Caution – If you choose Management Server POL code -based licensing for appliances,
make sure you bind the licenses to the correct engine elements and make sure to also
change the license if you change the appliance hardware. For example, if you use a license
generated for a FW-310 appliance with a FW-5105 appliance, the appliance’s throughput is
limited much below its actual performance.
Caution – When you make a configuration change on the engine (policy upload or refresh),
the license is permanently bound to that engine. Such licenses cannot be rebound unless
you relicense or delete the engine element the license is currently bound to. When
unbound, such a license is shown as Retained.
5. Check that components are now licensed as intended. Note that the list of Unlicensed
Components may show those engines that have a license bound to the POS code of an
appliance, because POS-bound licenses are attached to the correct engines automatically
when the engine is installed and makes initial contact with the Management Server.
Engine licenses are applied when you upload or refresh the policy on the engines.
Related Tasks
Checking If All Components Are Licensed (page 831)
Checking License Validity and State (page 831)
Caution – If you choose Management Server POL code -based licensing for appliances,
make sure you bind the licenses to the correct engine elements and make sure to also
change the license if you change the appliance hardware. For example, if you use a license
generated for a FW-310 appliance with a FW-5105 appliance, the appliance’s throughput is
limited much below its actual performance.
Invalid or missing licenses may prevent components from working. If you are manually replacing
working licenses with new ones, we recommend that you take a back up of the Management
Server before you make changes so that you can easily roll back the changes. See Creating
Backups (page 795).
Caution – When you make a configuration change on the engine (policy upload or refresh),
the license is permanently bound to that engine. Such licenses cannot be rebound unless
you relicense or delete the engine element the license is currently bound to. When
unbound, such a license is shown as Retained.
6. Check the displayed license information, and make sure that all the components you meant
to license have the correct new license.
7. Right-click any old licenses that may still be displayed and select Delete.
The changes to the engine licenses take effect when you upload or refresh the policy on the
engines.
Related Tasks
Checking License Validity and State (page 831)
Each Management Center Server and each Firewall, Sensor, and Analyzer must have its own
license. There is no difference in licensing clustered engines compared to licensing a single
firewall or sensor engine.
To check the licenses, select ConfigurationConfigurationAdministration from the menu
and then select LicensesUnlicensed ComponentsAll. This view displays all elements in
your system that require a license but do not currently have a valid license. If any components
are shown as unlicensed:
• Engine licenses generated based on a StoneGate appliance POS code are bound when the
engine makes initial contact with the Management Server. It is normal to see the
corresponding elements as unlicensed until initial contact is made.
• To generate and install new licenses for the components listed, see Generating New Licenses
(page 826).
• If you have already generated and installed licenses, check that the binding details are
correct (POS code, POL code, or IP address).
A license that has reached the end of its validity period. Only evaluation
Dynamic Expired licenses and virtual engine licenses have a validity period. Other licenses are
valid for the indicated version without any time restrictions.
A Dynamic license that has been unbound from the “Bound” state. Can be
rebound to the same component with the “Cancel Unbind” action or changed
Dynamic Retained
to the “Unassigned” state by completing one of the procedures in License Is
Shown as ‘Retained’ (page 880).
A license that was generated based on IP address or POS code and which is
currently bound to a component. Static licenses do not need manual binding
or unbinding, because they are bound automatically. Can be deleted.
Static Active It is not possible to create new IP address bound licenses for engine
components, but previously created IP address bound engine licenses may
be present in your system and can be upgraded to new versions. However, if
a license is changed in any other way, the binding must also be changed.
A license that has reached the end of its validity period. Only evaluation
Static Expired licenses and virtual engine licenses have a validity period. Other licenses are
valid for the indicated version without any time restrictions.
This section explains how you can upgrade the Management Servers, Management Clients,
Log Servers, and Web Portal Servers in your Management Center.
833
Getting Started with Upgrading the SMC
Prerequisites: None
Before running the installer, check the installation file integrity using the MD5 or SHA-1 file
checksums. The checksums are on the StoneGate installation CD-ROM and on the product-
specific download pages at the Stonesoft website.
Windows does not have MD5 or SHA-1 checksum programs by default, but there are several
third-party programs available.
Stonesoft provides only recent versions of the software for download. We recommend you store
the upgrade files yourself to make sure you can install the exact same version at a later time
(for example, in case of a hardware failure), especially if your organization’s policies mandate
lengthy testing periods that limit the speed of adopting new versions.
Caution – Do not use files that have invalid checksums. If downloading the files again does
not help, contact Stonesoft technical support to resolve the issue.
You can upgrade without uninstalling the previous version. If you want to reinstall in a new
operating system or on different hardware, see Changing the Management Platform (page 304).
If you are upgrading from a very old version of the StoneGate Management Center to a new
version, you may have to upgrade to an intermediate version first before upgrading to the latest
version of StoneGate (check the Release Notes at http://www.stonesoft.com/en/support/
technical_support_and_documents/).
Note – In some cases, the installer may still recognize services as running even after you
have stopped them. If this happens, disable the automatic startup of all StoneGate
services and reboot the computer. During the upgrade, the installer reconfigures the
services to start automatically again.
2. Read and accept the License Agreement to continue with the installation. The Installation
Wizard automatically detects the previous installation directory.
3. Click Next to accept the installation directory. The Installation Wizard displays the
components to be upgraded.
Caution – If you are working on a Windows system and you run any StoneGate component
as a service, make sure that you have closed the Services window before you complete the
next step. Otherwise, the services may not be installed.
6. Check the pre-installation summary and click Install to continue. The upgrade begins.
7. When the upgrade is complete, click the link(s) in the notification to view the report(s) of
changes the installer has made to your system configurations in your web browser.
8. Click Done to close the installer.
Upgrade any SMC components running on other computers in the same way.
What’s Next?
If you distribute Web Start Management Clients from some external server (instead of
the Management Server), update the Web Start distribution as explained in Getting
Started with Web Start Distribution (page 270).
Otherwise, the Management Center upgrade is now complete.
This section explains how you can upgrade the firewalls, sensors, analyzers, SOHO firewall
appliances, and SSL VPN appliances.
839
Getting Started with Upgrading Engines
Prerequisites: None
The primary way to upgrade engines is a remote upgrade through the Management Server. The
local upgrade option is not covered here (see the product-specific Installation Guide instead).
How Engine Upgrades Work
The upgrade package is imported on the Management Server manually or automatically. Then,
you apply it to selected engines through the Management Client.
The engines have two alternative partitions for the software. When you install a new software
version, it is installed on the inactive partition and the current version is preserved to allow
rollback to the previous version in case the installation is interrupted or some other problems
arise. If the engine is not able to return to operation, it automatically switches back to the
previous software version at the next reboot. You can also switch the active partition manually.
You can upload and activate the new software separately, for example, to upload the upgrade
during office hours but activate it during a service window.
The currently installed working configuration (routing, policies etc.) is stored separately and is
not changed in an upgrade or a rollback. Although parts of the configuration may be version-
specific (for example, if system communications ports are changed), the new version can use
the existing configuration. Possible version-specific adjustments are made when you refresh the
policy after the upgrade.
Limitations
It is not possible to upgrade between 32-bit version and a 64-bit version of the software. If you
are running the software on a compatible standard server, you can reinstall the software using
the other version (note that in clusters, 32-bit and 64-bit nodes cannot be online
simultaneously). StoneGate appliances do not support this type of architecture change.
What Do I Need to Know before I Begin
The Management Center must be up to date before you upgrade the engines. An old
Management Center version may not be able to recognize the new version engines and generate
a valid configuration for them. The Management Server can control several older versions of
engines. See the Release Notes for version-specific compatibility information.
During a cluster upgrade, it is possible to have the upgraded nodes online and operational side
by side with the older version nodes. This way, you can upgrade the nodes one by one while the
other nodes handle the traffic. However, you must upgrade all the nodes to the same version as
soon as possible, as prolonged use with mismatched versions is not supported.
The current engine version is displayed on the General tab in the Info panel when you select
the engine (if the Info panel is not shown, select ViewInfo).
Configuration Overview
1. (If automatic engine upgrade file downloads are disabled) Prepare the installation files as
explained in Obtaining Engine Upgrade Files (page 841).
2. (If automatic license updates are disabled) Update the licenses as explained in Upgrading
Licenses Manually (page 827).
3. Upgrade the engines as explained in Upgrading Engines Remotely (page 841).
If the Management Server is not set up to download engine upgrades automatically (see
Automatic Updates and Engine Upgrades (page 209)) or if you want to perform a local upgrade,
you must download the installation files manually and check the installation file integrity using
the MD5 or SHA-1 file checksums. Windows does not have MD5 or SHA-1 checksum programs
by default, but there are several third-party programs available.
The instructions here cover the remote upgrade, which is the recommended method in most
cases. See the product-specific Installation Guide if you want to upgrade locally
Caution – Do not use files that have invalid checksums. If downloading the files again does
not help, contact Stonesoft technical support to resolve the issue.
5. Log in to the Management Client and select FileImportImport Engine Upgrades from
the main menu.
6. Select the engine upgrade (sg_engine_version_platform.zip file) and click Import. The
import takes a while. You can see the related messages in the status bar at the bottom of
the Management Client window.
The Management Server can remotely upgrade engine components that it manages. You can
upgrade several engines of the same type in the same operation. However, we recommend that
you upgrade clusters one node at a time and wait until an upgraded node is back online before
you upgrade the other node(s).
Note – Clusters operate normally throughout the upgrade when the upgrade is done in
stages, but upgrade all nodes in the cluster to the same version as soon as possible.
Prolonged use with mismatched versions is not supported. However, it is not possible to
have 32-bit and 64-bit engines online in the cluster at the same time.
Caution – To avoid an outage, do not activate the new configuration simultaneously on all
the nodes of a Firewall cluster. Activate the new configuration one node at a time, and
proceed to the next node only after the previous node is back online.
5. If necessary, adjust the selection of engines included in the upgrade. All engines in the
same upgrade Task must be of the same type.
What’s Next?
When the upgrades are finished, refresh the policy of upgraded firewalls/sensors to
make sure any possible changes specific to the new software version are transferred to
the engines.
Related Tasks
Accessing the Engine Command Line (page 202)
Creating Remote Upgrade Tasks (page 819)
Engine Commands (page 926)
Dynamic Update packages include changes and additions to the system Policies, Situations,
and other elements of the StoneGate Management Center.
845
Getting Started with Manual Dynamic Updates
Prerequisites: None
It is very important to keep the system policies and situations up-to-date so that newly
discovered vulnerabilities can be detected. Changes and additions are provided in update
packages available at the Stonesoft website.
What Dynamic Updates Do
Dynamic updates provide updates particularly to the deep inspection features on the IPS and
Firewall/VPN products. For example, new threat patterns and changes in the system Templates
and Policies are introduced in dynamic updates for up-to-date detection. They may also revise
the default elements you use to configure the system.
Limitations
• On occasion, you may need to upgrade first before you can use a certain dynamic update
package. See the Release Notes for the update packages at the Stonesoft Web site for more
information.
• If there are several Domains defined in the system, the installation of manual dynamic
updates can only be done in the Shared Domain.
What Do I Need to Know Before I Begin?
As an alternative to downloading the updates manually as explained here, you can configure the
dynamic updates to be downloaded and optionally even activated automatically in your system.
See Automatic Updates and Engine Upgrades (page 209).
Virus database updates for firewalls are always done automatically and directly by the engines.
Updates are always active when the anti-virus feature is active. For additional settings, see
Configuring Anti-Virus Settings (page 424).
Configuration Overview
1. Download the latest dynamic update package from the Stonesoft web site and import it in
the Management Client as explained in Importing an Update Package (page 846).
2. Activate the update package in the Management Client as explained in Activating an
Update Package (page 847)).
Note – Ensure that the MD5 checksums for the original files verified by Stonesoft and the
files that you have downloaded match.
What’s Next?
Proceed to Activating an Update Package.
Activation of a dynamic update package introduces the changes from an imported update
package into your system.
What’s Next?
Refresh the policies on all engines to activate the changes.
849
850
C HAPT ER 61
This section contains tips for how to troubleshoot situations that are not covered by more
specific troubleshooting sections.
851
If Your Problem Is Not Listed
When having problems with your system, you should first make sure you have followed the
relevant instructions.
Some problems you are having may be related to known issues, which you can view at the
Stonesoft Web site at http://www.stonesoft.com/support/.
If your organization is entitled to technical support, contact Stonesoft Support (for contact
details, see Technical Support (page 24)). Note that issues related to generating licenses or
updating the information contained in the licenses are handled by Stonesoft Order Services
(order@stonesoft.com).
853
Forgotten Passwords
Problem description: You or someone else in your organization forgets one of the passwords
related to the StoneGate system.
Solution: You can regain access by changing the password. An administrator who has
unrestricted permissions can change any StoneGate password. The password recovery
procedures for the different passwords are as follows:
• Management Client login passwords can be changed in the Administrator elements.
Administator elements can be found in the Administration Configuration view under Access
RightsAdministrators. See Creating a New Administrator Element (page 218) for more
information.
• Web Portal login passwords can be changed in the Web Portal User elements. Web Portal
elements can be found in the Administration Configuration view under Access RightsWeb
Portal Users. See Defining Web Portal User Accounts (page 260) for more information.
• The Engine Root account password (for command line access) can be changed by right-
clicking the individual engine node and selecting CommandsChange Password. If the
engine is not connected to the Management Server (because, for example, it is a spare
appliance), you can reset all of the engine’s settings through a boot menu option in the local
console accessible through a serial connection or through a directly connected monitor and
keyboard.
Caution – Resetting the engine through the boot menu stops the engine from processing
traffic, since all configurations are cleared.
• A User password used for end-user authentication can be changed in the User element. User
elements are stored in the Firewall Configuration view under Other ElementsUser
AuthenticationUsers (if the user is stored in the internal LDAP database or an external
LDAP database that StoneGate is configured to use).
• The default Management Server Database user account is dba, and the password is created
automatically. If you do not know the password but you need it for some operation, you can
change the password through FileSystem ToolsChange Database Password.
If none of the administrators can log in due to account issues, see Creating an Emergency
Administrator Account (page 855).
This chapter explains some common alert and log messages that you may see in the log
browser and gives hints on how to proceed when you see such messages.
857
Alert Log Messages
Related Tasks
For information on command line tools, see Command Line Tools (page 917).
“System Alert”
Problem description: you receive an alert with the title “System Alert”.
Reason: “System Alert” is a general category for all alert messages that are generated because
something in the operation of the StoneGate system components requires your attention.
Solution: Select the alert entry in the Logs view and click Details in the toolbar to view the alert
entry information. Some of the most frequently seen messages are also explained in this
section.
“Test Failed”
Problem description: test-related alerts are triggered (for example, “Tester: Link Status test
failed”).
Reason: tester alerts indicate that the automatic tester system running on the engines has
detected a failure in one of the tests that the tester is configured to run. The Tester is
configured to run some tests by default and administrators may configure additional tests. The
tester is configured in the properties of each engine.
Solution: make sure the condition that caused the test to fail is resolved.
Related Tasks
Getting Started with the Engine Tester (page 398).
Log Messages
“Connection Timeout...”
Problem description: You see “connection closed” log entries with a “connection timeout”
clarification.
Reason: Connection timeout log messages are generated for inactive connections that the
firewall clears out from its connection tracking table. For some reason, the hosts that were
communicating within this allowed connection have stopped transmitting packets between each
other.
Solution: Most connection timeouts are normal and necessary to ensure that the firewall cleans
up inactive connections from its records, freeing up the resources. However, sometimes the
timeout may prevent communications from continuing:
• If there is some application in your network that leaves connections inactive for long periods
of time before continuing again, you can increase the timeout for those connections in the
Action options for the Access rule that allows the connection. The rule-specific timeouts
override the global timeouts that are set per connection state in the Firewall element’s
properties (Advanced Settings).
Caution – Setting long timeouts for a high number of connections considerably increases
the resource consumption of the firewall and may even lead to performance problems. This
applies especially to non-TCP protocols that do not include connection closing messages,
because such virtual connections are never closed before the timeout is reached.
• If the protocol is not actually connection-oriented (for example, if the protocol is SNMP), you
can disable connection tracking for the traffic in the Access rule’s Action options. This
requires that you explicitly allow both directions of the communications in the rule, since
without connection tracking, reply packets cannot be automatically allowed. NAT rules are not
applied to connections that are not tracked. We recommend that you deactivate logging in
rules that have connection tracking off, since these rules will create a separate log entry for
each packet transmitted. This greatly increases the number of log entries generated and can
potentially lead to an unmanageable level of logging traffic.
Caution – Setting long idle timeouts for a high number of connections considerably
increases the resource consumption of the firewall and may even lead to performance
problems. Especially, non-TCP protocols do not include connection closing messages, so
such virtual connections are never closed before the timeout is reached.
• You may have to disable connection tracking in the rule allowing the connection. We
recommend that you deactivate logging in rules that have connection tracking off, since these
rules will create a separate log entry for each packet transmitted. This greatly increases the
number of log entries generated. NAT cannot be applied to traffic that is allowed without
connection tracking and both communication directions must be explicitly allowed in the
Access rules (replies are not automatically allowed).
• For some types of connections, problems may be solved by using a Service that includes a
special Protocol Agent for that kind of traffic. See Using Protocol Elements (page 579) for a
list of Protocol Agents.
Spoofed Packets
See Packets Are Dropped as Spoofed (page 903).
Error Messages
Unexpected Error
Problem description: Some action in the Management Client displays a pop-up message
stating that an “unexpected error” has occurred.
Solution: Exit and relaunch the Management Client. If the condition persists, contact technical
support.
TROUBLESHOOTING CERTIFICATES
Digital certificates allow components to prove their identity to each other. StoneGate
Components use certificates in system communications and in VPNs.
867
Understanding Certificate-Related Problems
Note – Do not confuse certificates with licenses. Certificates are proof of identity that
components use to authenticate themselves in communications. Licenses are a proof of
purchase used for ensuring that your organization is a legal license holder of the software.
For troubleshooting licenses, see Troubleshooting Licensing (page 879).
What’s Next?
To recreate a certificate for an SMC server component, see Renewing SMC Server
Certificates (page 870).
To recreate a system communications or VPN certificate for an engine, see Renewing
Engine Certificates (page 871).
To make StoneGate firewall/VPN engines accept VPN certificates signed by a new or
different certificate authority, see Defining a VPN Certificate Authority (page 757).
Note – To certify a Log Server or a Web Portal Server, the Management Server must be
running and accessible through the network.
2. On the server you want to certify, open the <installation directory>/bin folder.
3. Run the correct script for the server type:
• primary Management Server: sgCertifyMgtSrv.[bat|sh
• secondary Management Server: sgOnlineReplication.[bat|sh]
• primary or secondary Log Server: sgCertifyLogSrv.[bat|sh]
• Web Portal Server: sgCertifyWebPortalServer.[bat|sh]
4. When prompted, log in using an administrator account with unrestricted permissions.
• If Domains are in use, you can also specify the Domain the Log Server or the Web Portal
Server belongs to. If you do not specify the Domain, the Shared Domain is used.
5. Make sure the Certify Again an Existing Server option is selected and that the correct
server is selected in the list below.
6. Click OK and wait for a confirmation.
No further action is required. When you restart the server, all other components accept the new
certificate, since it is issued by a certificate authority they trust. In this context, components
only trust the Internal Certificate Authority that issued also their own certificate. Administrators
who log in to the Management Client or to the StoneGate Web Portal receive a notification of the
certificate fingerprint change on the Management or Web Portal Server when they log in for the
Related Tasks
See Management Center Commands (page 918) for more information on the command line
tools on the servers.
Checking When Internal Certificates or Internal CAs Expire (page 108)
Related Tasks
See Engine Commands (page 926) for a command line tool listing.
Checking When Internal Certificates or Internal CAs Expire (page 108)
Checking When Gateway Certificates Expire (page 765)
Issues covered here concentrate on errors and problems that are directly related to the
operation of firewall, sensor, and analyzer engines. Issues related to configuring individual
features of the system, such as issues related to designing and installing policies, are
covered in separate sections.
875
Node Does not Go or Stay Online
Problem description: when you command a node online, it does not do so or turns itself offline
in a little while.
Solution:
If you have just updated the engines or you are using an evaluation license:
• Open the Administration Configuration view and check that your licenses are valid for the
version of engines you are using under Licenses in the tree view. If you need new licenses,
generate them at the Stonesoft web site, see Generating New Licenses (page 826).
If the nodes are in a cluster, and only one node at a time seems to stay online:
• Check whether the cluster is in Standby mode. Standby mode keeps one node online at a
time and uses the other nodes as backups in case the online node fails. See Adjusting
Firewall Clustering Options (page 419) or Adjusting Sensor Clustering Options (page 429).
• Refresh the policy of the cluster and check that the installation is successful so that neither
node rolls back to the previous configuration. All nodes in the cluster must have the exact
same configuration that has been installed in the same policy installation operation. You may
have to adjust the rollback timeout in the cluster’s properties if policy rollback on some node
is the problem, see Adjusting Firewall System Parameters (page 416). If policy installation
fails, see Troubleshooting Firewall Policy Installation (page 898).
• Check for alerts in the Logs view about tests failing, and if any of those tests are configured
to turn the node offline when they fail (tester will leave one node in a cluster online even if the
test fails on all nodes). If you see a test failure, it may indicate a genuine problem you need
to solve or the test may be misconfigured and may need to be disabled or reconfigured. See
more information in Getting Started with the Engine Tester (page 398).
See the Logs view for any alerts or logs regarding the functioning of the nodes.
• Certain internal error conditions (for example, heartbeat connection failures or missing
certificates) may cause nodes to go offline. These events are shown as logs and alerts.
TROUBLESHOOTING LICENSING
Licenses are a proof of purchase used for ensuring that your organization is a legal license
holder of the software.
879
Troubleshooting Licensing
Note – Do not confuse Licenses with Certificates. Licenses are a proof of purchase (given
to you by Stonesoft) used for ensuring that your organization is a legal license holder of the
software. Certificates are proof of identity (generated in your installation of the system)
that components use to authenticate themselves in system communications. For
troubleshooting certificates, see Troubleshooting Certificates (page 867).
Licenses are introduced to the system as elements that you install in your Management Server.
You must install licenses to set up the components your organization has purchased.
Components that do not have a license do not work. However, on current appliance models
running Firewall/VPN 5.0 and IPS 5.0 or above, the licenses may be generated automatically.
If the Management Server does not have a valid license, you are shown a license-related dialog
each time you log in using the Management Client. You cannot create a working configuration
without a Management Server license, since most controls are disabled. If an engine
component is missing a license, you can create a configuration for it, but you cannot transfer
that configuration to the engine.
Basic troubleshooting information and solutions for the most common problems with licenses
are provided in the following topics:
• License Is Shown as ‘Retained’ (page 880)
• License Is Shown as ‘Unassigned’ (page 881)
• “Throughput Based License Exceeded” (page 859)
Related Tasks
Getting Started with Licenses (page 824)
TROUBLESHOOTING LOGGING
This section covers some common problems you may have with viewing logs or when
performing tasks related to the log files. For information about particular messages you may
see in the logs, see Log Messages (page 860).
883
Problems With Viewing Logs
If the Logs view is unable to contact some Log Server:
• Check that the Log Server is running, and that the Log Server is reachable from the computer
used for running the Management Client. Logged data is not routed through the Management
Server, so a green status shown for a Log Server in the Management Client (based on
information that the Management Server has) is not an indication of whether the Log Server
is reachable for log browsing or not.
• If there is a NAT device between some Management Client and a Log Server, administrators
must select the correct Location for the Management Client in the status bar at the bottom
right corner of the Management Client window. See Getting Started with System
Communications (page 60).
If some or all logs are not visible in the Logs view:
• Check that the filtering, time range, and source settings in the Logs view are correct and
make sure you have clicked Apply after making the latest changes in these settings.
• Check the logging options in your policies. Not all connections automatically create log
entries. The Alert, Stored, and Essential options generate permanent log entries. The
Transient option means that logs are not stored, they can only be viewed in the Current
Events mode in the Logs view when they reach the Log Server.
• Check that logs you want to keep are not being pruned, see Pruning Log Data (page 807). The
Log Server deletes selected logs according to how pruning is configured.
• Check that the logs are being transferred from the engines to the Log Server. The log entries
are spooled on the engines if a connection to the Log Server is unavailable. Connections
between engines and the Log Server should be shown as green in the System Status view.
• Depending on your logging settings and the number of engines that send data to the same
Log Server, the logging process may slow down due to a lack of resources on the engine, in
the network, or on the Log Server, see Logs Are Filling up the Storage Space (page 884).
This section concentrates on general problems you may encounter when using the
Management Client.
Cannot View Online Help: “Help File Not Found” (page 888)
Some Options Are Disabled (page 888)
Slow Startup and Use (page 889)
Problems Logging In with the Management Client (page 889)
Problems with Layout and Views (page 890)
Problems With Viewing Statistics (page 890)
Problems with Status Monitoring (page 890)
Problems Installing Web Start on an External Server (page 891)
887
Cannot View Online Help: “Help File Not Found”
Problem description: you try to open the Online Help in the Management Client, but you get an
error message instead.
Reason: the necessary files reside in the InstallerData directory in the installation source. If the
installer does not find this directory or the files within when the Management Client is installed,
the Online Help is not installed properly. If you need to copy installation files from one location
to another, make sure you include all directories.
Solution:
If the client is installed locally:
• Reinstall the Management Client with the correct files present at installation time or shut
down the Management Client and manually copy the necessary files as follows: copy the .jar
files from the installation source, folder StoneGate_SW_Installer/InstallerData/
managementclient into <installation directory>/lib on the local computer. Overwrite
the placeholder files by the same name that already exist in the destination directory.
If the client is installed through the integrated Web Start server:
• Copy the .jar files from the installation source directory StoneGate_SW_Installer/
InstallerData/managementclient to <installation directory>/webserver/
webapps/managementclient/lib on the Management Server computer. Overwrite the
placeholder files by the same name that already exist in the destination directory. Already
installed Web Start clients update their local copies of these files the next time they are
started.
codebase=”http://www.example.com/webstart”
bouncycastle.jnlp Or
codebase=”file://localhost/C:/webstart”
codebase=”http://www.example.com/webstart”
smc_help.jnlp Or
codebase=”file://localhost/C:/webstart”
TROUBLESHOOTING NAT
This section concentrates on some common problems you may encounter with NAT
definitions.
893
Troubleshooting NAT Errors
Consider the following when troubleshooting NAT issues:
• A Dynamic NAT operation cannot be applied to all types of traffic. Dynamic (many-to-one) NAT
is done by assigning different hosts the same IP address but different ports, so that the
subsequent replies can be recognized and forwarded correctly. For this reason, dynamic NAT
does not work when the protocol in question does not use ports (only one connection can be
handled at a time). Only the TCP and UDP transport protocols use ports. See the TCP and
UDP branches in the Services tree in the Management Client to check which protocols are
transported over TCP or UDP. Use static translation for other protocols, or check if the
communicating application supports NAT traversal (tunneling the protocol inside TCP or UDP).
• Dynamic NAT may run out of ports if there are too many simultaneous connections in relation
to the IP addresses and the port range you have configured for dynamic NAT. You can increase
the available ports for translation by adding a new IP address for your dynamic NAT rule or by
expanding the port range, if the rule does not currently use the whole range of high ports. The
number of simultaneous NATed connections equals the number of IP addresses multiplied by
the number of ports.
• Check the NAT rules for definitions that overlap with the address translation done configured
in an Outbound Multi-Link or Server Pool element or the NAT pool defined for VPN clients in
the Firewall element’s properties. Errors may occur when one of the listed elements is used
and the same connection matches an overlapping NAT rule, because the elements also use
NAT. Naturally, only one address translation operation can be done for each packet and
overlapping definitions may therefore cause conflicts. Overlap within the NAT rules alone is
allowed, since the rules are resolved based on their order (first matching rule is applied).
• Check that the NAT definitions do not overlap with an IP address that is used by some
physical host present in the network (this configuration error is most common in the case of
source address translation for a DMZ or external IP address). IP address conflicts are not any
less harmful to connectivity when NAT is involved.
TROUBLESHOOTING POLICIES
This section covers some common problems you may encounter when working with policies
and the rules that they contain.
897
Troubleshooting Firewall Policy Installation
Problem description: the policy installation fails, or there is a warning message indicating
problems in the policy installation window.
Solution: see below for most common problems and messages:
• The Engine Performs a Roll-Back at Policy Installation (page 898)
• The Management Server Contact to Nodes Times Out (page 898)
• Policy Installation Fails for Some Other Reason (page 899)
• Warning “Automatic Proxy ARP Option Is Ignored” (page 899)
Caution – As the policy is installed with the “Keep Previous Configuration Definitions”
option deselected, even some currently active connections that are allowed in the new
policy may be cut. The applications must then reopen the connections.
Troubleshooting Rules
Validating Rules
You can automatically validate a policy and check the rules for invalid configurations, for
example, if policy installation fails. See Validating Rules Automatically (page 556) for more
information.
Rule That Allows ANY Service Does Not Allow All Traffic
Problem description: some connection you want to allow is stopped.
Solution:
If your problem is related to the IPS policies, note that in IPS policies, Access rules allow all
connections by default. If some connection you want to allow is stopped because of an IPS
Access rule, your Access rules contain a specific rule that defines these connections must be
stopped. If your problem is related to inspection rules, see Inspection Rules Produce False
Positives (page 901).
In firewall Access rules, even if you set the Source, Destination, and Service to ANY and set the
rule to allow the traffic, certain connections may still be discarded.
• Connections with a protocol that assigns ports dynamically must be allowed using the
appropriate Protocol Agent, so that the Firewall can track the assigned port.
TROUBLESHOOTING REPORTING
This section concentrates on common problems you may encounter when generating reports
from raw statistical and log data stored on the Log Server.
905
Troubleshooting Reporting
Error messages for reports are shown in the Comment column of the Stored Reports view.
Check the status of the report task there before you proceed with the troubleshooting.
This subject is covered in the following topics:
• No Report is Generated at All (page 906)
• Empty Report Sections or Incomplete Data (page 907)
Caution – Be very careful when excluding Log Servers from reporting. If you inadvertently
select this setting for a Log Server that is in use, there is no warning that the generated
reports are missing parts of the log data.
TROUBLESHOOTING UPGRADES
This section concentrates on common problems you may encounter when upgrading the
StoneGate system components.
909
Upgrade Fails Because of Running Services
Problem description: you cannot upgrade because the upgrade reports that some services are
still running.
Solution:
• Check the Services window in Windows and stop any StoneGate services that are still running
(Management Server, Log Server, or Web Portal Server).
• If all Services are stopped in the Windows Services window, but the upgrade still reports that
services are still running, set the services to Manual startup and reboot the computer.
TROUBLESHOOTING VPNS
This section concentrates on some common problems you may encounter when creating and
managing VPNs.
911
Checking Automatic VPN Validation Results
StoneGate has an automatic VPN validation that checks the settings you have selected are
compatible with each other.
Note – Make sure that you have successfully installed or refreshed the policy on all
affected firewall/VPN engines after you have made changes to any part of the VPN
configuration.
In this section:
Glossary - 1025
Index - 1055
915
916
APPENDIX A
This appendix describes the command line tools for StoneGate Management Center and the
engines.
917
Management Center Commands
Most of the Management Server and Log Server commands are found in the <installation
directory>/bin/ directory. In Windows, the command line tools are *.bat script files. In
Linux, the files are *.sh scripts.
Note – Using the Management Client is the recommended configuration method, as most
of the same tasks can be done through it.
Commands that require parameters must be run through the command line (cmd.exe in
Windows). Commands that do not require parameters can alternatively be run through a
graphical user interface, and may be added as shortcuts during installation.
Command Description
Displays or exports logs from archive. This command is only
available on the Log Server. The operation checks privileges for
the supplied administrator account from the Management Server
to prevent unauthorized access to the logs.
Enclose details in double quotes if they contain spaces.
Host specifies the address of the Management Server. If the
parameter is not defined, the loopback address is used.
login defines the username for the account that is used for
this operation. If this parameter is not defined, the username
root is used.
pass defines the password for the user account.
sgArchiveExport format defines the file format for the output file. If this
[ host=<address> ] parameter is not defined, the XML format is used.
[ login=<login name> ]
i defines the source from which the logs will be exported. Can
pass=<password>
be a folder or a file. The processing recurses into subfolders.
[ format=CSV|XML ]
i=<input file> o defines the destination file where the logs will be exported. If
[ o=<output file> ] this parameter is not defined, the output is displayed on screen.
[ f=<filter file> ] f defines a file that contains the filtering criteria you want to use
[ e=<filter expression> ] for filtering the log data. You can export log filters individually in
[ -h | -help ] [ -v ] the Management Client through ToolsSave for Command Line
Tools in the filter’s right-click menu.
e allows you to type in a filter expression manually (using the
same syntax as exported filter files).
-h or -help displays information on using the script.
-v displays verbose output on the command execution.
Example (exports logs from one full day to a file using a filter):
sgArchiveExport login=admin pass=abc123
i=c:/stonesoft/stonegate/data/archive/firewall/
year2009/month12/day01/ f=c:/stonesoft/
stonegate/export/MyExportedFilter.flp
format=CSV o=MyExportedLogs.csv
Command Description
Creates a backup of Log Server configuration data. The backup
file is stored in the <installation directory>/backups/
directory.
sgBackupLogSrv
Twice the size of log database is required on the destination
drive. Otherwise, the operation fails.
Also see sgRestoreLogBackup.
Command Description
Changes the Management Server’s IP address in the local
configuration to the IP address you give as a parameter. Use this
sgChangeMgtIPOnMgtSrv <IP address>
command if you change the Management Server’s IP address.
Restart the Management Server service after this command.
Command Description
Controls highly available (active and standby) Management
Servers.
Host specifies the address of the Management Server. If the
parameter is not defined, the loopback address is used.
Domain specifies the administrative Domain for this operation if
the system is divided in administrative Domains. If the Domain is
not specified, the Shared Domain is used.
login defines the username for the account that is used for
this operation. If this parameter is not defined, the username
root is used.
pass defines the password for the user account.
sgHA [host=<management server address> -h or -help displays information on using the script.
[/<domain>]] -set-active sets a standby Management Server as the active
[ login=<login name> ] Management Server, sets the formerly active Management
pass=<password> Server as a standby Management Server, and synchronizes the
[-h|-help] database between them.
[-set-active]
-set-standby sets the active Management Server as a
[-set-standby]
standby Management Server.
[-force-active]
[-sync] -force-active sets a standby Management Server as the
active Management Server without synchronizing the database
with the formerly active Management Server.
-sync functions differently on a standby Management Server
and an active Management Server. If you run it on an active
Management Server, it replicates the active database to every
standby Management Server that does not have the Disable
Database Replication option selected in its properties. If you
run it on a standby Management Server, it replicates the active
database from the active Management Server only to this
standby Management Server (regardless of whether the Disable
Database Replication option is selected in the standby
Management Server’s properties).
Command Description
Imports and exports a list of Users and User Groups in an LDIF
file from/to a StoneGate Management Server’s internal LDAP
database. To import User Groups, all User Groups in the LDIF file
must be directly under the stonegate top-level group
(dc=stonegate).
The user information in the export file is stored as plaintext.
Handle the file securely.
sgImportExportUser Host specifies the address of the Management Server. If the
[host=<management server address> parameter is not defined, the loopback address is used.
[/<domain>]] Domain specifies the administrative Domain for this operation if
[ login=<login name> ] the system is divided in administrative Domains. If the Domain is
pass=<password> not specified, the Shared Domain is used.
action=[import|export] login defines the username for the account that is used for
file=<file path and name> this operation. If this parameter is not defined, the username
root is used.
pass defines the password for the user account.
action defines whether users are imported or exported.
file defines the file that is used for the operation.
Example: sgImportExportUser login=admin
pass=abc123 action=export
file=c:\temp\exportedusers.ldif
Command Description
Creates a ZIP file that contains copies of configuration files and
the system trace files. The resulting ZIP file is stored in the
sgInfo logged in user’s home directory. The file location is displayed on
the last line of screen output. Provide the generated file to
Stonesoft support for troubleshooting purposes.
Restores logs from archive files to the Log Server. This command
is available only on the Log Server.
ARCHIVE_DIR is the number of the archive directory (0 – 31)
sgRestoreArchive ARCHIVE_DIR from where the logs will be restored. By default, only archive
directory 0 is defined. The archive directories can be defined in
the <installation directory>/data/
LogServerConfiguration.txt file:
ARCHIVE_DIR_xx=PATH.
Command Description
Displays the CA certificate’s fingerprint on the Management
sgShowFingerPrint
Server.
Command Description
Displays or exports current or stored logs. This command is
available on the Log Server.
Enclose the file and filter names in double quotes if they contain
spaces.
The pass parameter defines the password for the user account
used for this operation.
The e parameter defines the filter that you want to use for
filtering the log data. Type the name as shown in the
Management Client. The f parameter defines the StoneGate
exported filter file that you want to use for filtering the log data.
sgTextBrowser pass=PASSWORD The format parameter defines the file format for the output file.
[ e=FILTER_EXPRESSION ] If this parameter is not defined, the XML format is used.
[ f=FILTER_FILE ] The host parameter defines the address of the Management
[ format=CSV|XML ] Server used for checking the login information. If this parameter
[host=Management Server address is not defined, Management Server is expected to be on the
[/domain]] same host where the script is run. If Domains are in use, you
[login=LOGIN_NAME ] can specify the Domain the Log Server belongs to. If domain is
[ o=OUTPUT_FILE ] not specified, the Shared Domain is used.
[ m=current|stored ] The login parameter defines the username for the account that
[ -v ] [ -h ] is used for this export. If this parameter is not defined, the
username root is used.
The o parameter defines the destination output file where the
logs will be exported. If this parameter is not defined, the output
is displayed on screen.
The m parameter defines whether you want to view or export logs
as they arrive on the Log Server (current) or logs stored in the
active storage directory (stored). If this option is not defined, the
current logs are used.
The -h option displays information on using the script.
The -v option displays verbose output on command execution.
Engine
Command Description
Type
Can be used to view, add, or delete active blacklist entries.
The blacklist is applied as defined in Access Rules.
Commands:
show displays the current active blacklist entries in format:
engine node ID | blacklist entry ID | (internal) | entry creation
time | (internal) | address and port match | originally set
duration | (internal) | (internal). Use the -f option to specify a
storage file to view (/data/blacklist/db_<number>).
sg-blacklist The -v option adds operation’s details to the output.
show [-v] [-f FILENAME] | add creates a new blacklist entry. Enter the parameters (see
add [ below) or use the -i option to import parameters from a file.
[-i FILENAME] | del deletes the first matching blacklist entry. Enter the
[src IP_ADDRESS/MASK] parameters (see below) or use the -i option to import
[dst IP_ADDRESS/MASK] parameters from a file.
[proto {tcp|udp|icmp|NUM}] iddel NODE_ID ID removes one specific blacklist entry on
one specific engine. NODE_ID is the engine’s ID, ID is the
[srcport PORT{-PORT}]
blacklist entry’s ID (as shown by the show command).
[dstport PORT{-PORT}]
flush deletes all blacklist entries.
[duration NUM]
Add/Del Parameters:
]| firewall, Enter at least one parameter. The default value is used for the
del [ sensor parameters that you omit. You can also save parameters in a
[-i FILENAME] | text file; each line in the file is read as one blacklist entry.
[src IP_ADDRESS/MASK] src IP_ADDRESS/MASK defines the source IP address and
[dst IP_ADDRESS/MASK] netmask to match. Matches any IP address by default.
[proto {tcp|udp|icmp|NUM}] dst IP_ADDRESS/MASK defines the destination IP address
[srcport PORT{-PORT}] and netmask to match. Matches any IP address by default.
[dstport PORT{-PORT}] proto {tcp|udp|icmp|NUM} defines the protocol to match
by name or protocol number. Matches all IP traffic by default.
[duration NUM]
srcport PORT[-PORT] defines the TCP/UDP source port or
]|
range to match. Matches any port by default.
iddel NODE_ID ID |
dstport PORT[-PORT] defines the TCP/UDP destination
flush port or range to match. Matches any port by default.
duration NUM defines in seconds how long the entry is kept.
Default is 0, which cuts current connections, but is not kept.
Examples:
sg-blacklist add src 192.168.0.2/32 proto tcp
dstport 80 duration 60
sg-blacklist add -i myblacklist.txt
sg-blacklist del dst 192.168.1.0/24 proto 47
Engine
Command Description
Type
Can be used to edit boot command parameters for future
bootups.
--primary-console=tty0|ttyS PORT,SPEED
parameter defines the terminal settings for the primary
sg-bootconfig console.
[--primary- --secondary-console= [tty0|ttyS PORT,SPEED]
console=tty0|ttyS parameter defines the terminal settings for the secondary
PORT,SPEED] console.
[--secondary-console= --flavor=up|smp [-kdb] parameter defines whether the
[tty0|ttyS PORT,SPEED]] analyzer, kernel is uniprocessor or multiprocessor.
[--flavor=up|smp] firewall,
--initrd=yes|no parameter defines whether Ramdisk is
sensor
[--initrd=yes|no] enabled or disabled.
[--crashdump=yes|no|Y@X] --crashdump=yes|no|Y@X parameter defines whether
[--append=kernel options] kernel crashdump is enabled or disabled, and how much
[--help] memory is allocated to the crash dump kernel (Y). The default
is 24M. X must always be 16M.
apply
--append=kernel options parameter defines any other
boot options to add to the configuration.
--help parameter displays usage information.
apply command applies the specified configuration options.
Engine
Command Description
Type
Deletes VPN-related information (use vpninfo command to
view the information). Option -d (for delete) is mandatory.
-u deletes the VPN session of the named VPN client user. You
can enter the user account in the form <username@domain> if
there are several user storage locations (LDAP domains).
sg-ipsec -d
-si deletes the VPN session of a VPN client user based on
[-u <username[@domain]> | session identifier.
-si <session id> |
-ck deletes the IKE SA (Phase one security association)
-ck <ike cookie> | firewall
based on IKE cookie.
-tri <transform id>
-ri <remote ip> | -tri deletes the IPSEC SAs (Phase two security associations)
-ci <connection id>] for both communication directions based on transform
identifier.
-ri deletes all SAs related to a remote IP address in gateway-
to-gateway VPNs.
-ci deletes all SAs related to a connection identifier in
gateway-to-gateway VPNs.
Engine
Command Description
Type
Used for reconfiguring the node manually.
--boot option applies bootup behavior. Do not use this option
sg-reconfigure unless you have a specific need to do so.
analyzer,
[--boot] --maybe-contact option contacts the Management Server
firewall,
[--maybe-contact] if requested. This option is only available on firewall engines.
sensor
[--no-shutdown] --no-shutdown option allows you to make limited
configuration changes on the node without shutting it down.
Some changes may not be applied until the node is rebooted.
analyzer,
sg-version firewall, Displays the software version and build number for the node.
sensor
Engine
Command Description
Type
Gathers system information you can send to Stonesoft
support if you are having problems. Use this command only
when instructed to do so by Stonesoft support.
-f option forces sgInfo even if the configuration is encrypted.
analyzer, -d option includes core dumps in the sgInfo file.
sginfo
firewall, -s option includes slapcat output in the sgInfo file.
[-f] [-d] [-s] [-p] [--] [--help] sensor -p option includes passwords in the sgInfo file (by default
passwords are erased from the output).
-- option creates the sgInfo file without displaying the
progress
--help option displays usage information.
The table below lists some general operating system commands that may be useful in running
your StoneGate engines. Some commands can be stopped by pressing Ctrl+c.
Command Description
dmesg Shows system logs and other information. Use the -h option to see usage.
Displays IP address information. Type the command without options to see usage.
ip
Example: type ip addr for basic information on all interfaces.
Tests connectivity with ICMP echo requests. Type the command without options to
ping
see usage.
scp Secure copy. Type the command without options to see usage.
sftp Secure FTP. Type the command without options to see usage.
SSH client (for opening a terminal connection to other hosts). Type the command
ssh
without options to see usage.
tcpdump Gives information on network traffic. Use the -h option to see usage.
Displays the top CPU processes taking most processor time. Use the -h option to
top
see usage.
Traces the route packets take to the specified destination. Type the command without
traceroute
options to see usage.
Displays VPN information and allows you to issue some basic commands. Type the
vpninfo
command without options to see usage.
Command Description
Allows you to test different configurations before activating them.
-d Don’t Fork as a daemon. All log messages are printed to stdout
or stderr only.
-v level Set the verbosity level. The default level is 5. Levels 6-8
are for debugging where available.
-c path Use the specified path as the first search directory for the
sgagentd [-d] configuration.
[-v level] test [files]
[-c path] Run in the test mode - status queries do not receive a response. If
[test [files]] you specify the files, they are used for reading the configuration
instead of the default files. The output is directed to syslog or
[syntax [files]]
eventlog instead of the console where the command was run unless
you use the -d option.
syntax [files]
Check the syntax in the configuration file. If no files are specified,
the default configuration files are checked. The output is directed to
syslog or eventlog instead of the console where the command was
run unless you use the -d option.
Command Description
Sends a UDP query to the specified host and waits for a response
until received, or until the timeout limit is reached.
The request type can be defined as a parameter. If no parameter is
given, status is requested. The commands are:
status - query the status.
info - query the agent version.
proto - query the highest supported protocol version.
-p port Connect to the specified port instead of the default port.
sgmon -t timeout Set the timeout (in seconds) to wait for a response.
[status|info|proto] -a id Acknowledge the received log messages up to the specified
[-p port] id. Each response message has an id, and you may acknowledge
[-t timeout] more than one message at a given time by using the id parameter.
[-a id] Note that messages acknowledged by sgmon will no longer appear
host in the firewall logs.
host
The IP address of the host to connect to. To get the status locally,
you may give localhost as the host argument. This parameter is
mandatory.
Return value:
0 if the response was received
1 if the query timed out
-1 in case of an error
This chapter lists the default ports used in connections between StoneGate components and
the default ports StoneGate uses with external components.
933
Management Center Ports
The illustrations below present an overview to the most important default ports used in
communications between the Management Center (SMC) components and from the SMC to
external services. See Table B.1 for a complete list of default ports.
Illustration B.2 Default Destination Ports for Optional SMC Components and Features
External LDAP Server
Log Server,
Log Server 3020/TCP Alert sending. SG Log
Web Portal Server
8914- Management
Log Server Log browsing. SG Data Browsing
8918/TCP Client
Management
Management 8902-
Client, Log Server, Monitoring and control connections. SG Control
Server 8913/TCP
Web Portal Server
Monitored
SNMP status probing to external IP
Third Party 161/UDP Log Server SNMP (UDP)
addresses.
Components
Primary Secondary
8903, Database replication (pull) to the
Management Management SG Control
8907/TCP secondary Management Server.
Server Servers
Secondary Primary
8902- Database replication (push) to the
Management Management SG Control
8913/TCP secondary Management Server.
Servers Server
Illustration B.5 Default Destination Ports for Firewall/VPN Engine Service Communications
LDAP Server RADIUS Server
TACACS+
DNS Server
TCP: UDP: Server
TCP, UDP: 389 1812 TCP:
53 636 1645 49
Server Pool RPC Server
UDP:
500
2746
4500
53/UDP,
DNS server Firewall Dynamic DNS updates. DNS (TCP)
53/TCP
VPN clients,
Firewall 500/UDP VPN negotiations, VPN traffic. ISAKMP (UDP)
VPN gateways
Management
Firewall 636/TCP Internal user database replication. LDAPS (TCP)
Server
StoneGate SG UDP
Firewall 2746/UDP UDP encapsulated VPN traffic.
VPN gateways Encapsulation
SG State Sync
3000-3001/
(Multicast), SG
UDP FW/VPN Heartbeat and state synchronization
Firewall State Sync
3002-3003, engine between clustered firewalls.
(Unicast), SG Data
3010/TCP
Sync
VPN client,
Firewall 4500/UDP VPN traffic using NAT-traversal. NAT-T
VPN gateways
Management SG Remote
Firewall 4950/TCP Remote upgrade.
Server Upgrade
Management
Firewall 15000/TCP Server, Blacklist entries. SG Blacklisting
analyzer
Management SG Reverse
3023/TCP Firewall Monitoring (status) connection.
Server Monitoring
RADIUS
RADIUS 1812, 1645/
Firewall RADIUS authentication requests. (Authentication),
server UDP
RADIUS (Old)
SNMP server 162/UDP Firewall SNMP traps from the engine. SNMP Trap (UDP)
TACACS+
49/TCP Firewall TACACS+ authentication requests. TACACS (TCP)
server
500/UDP,
2746/UDP VPN traffic. Ports 2746 and 4500
VPN gateways (StoneGate Firewall may be used depending on ISAKMP (UDP)
gateways only), encapsulation options.
or 4500 UDP.
RADIUS RADIUS
1812/UDP SOHO Firewall RADIUS authentication requests.
server (Authentication)
Illustration B.6 Default Destination Ports for Basic IPS System Communications
Log Server
TCP:
3020 Other Node(s) in
TCP: Sensor the Cluster
18890
TCP: TCP:
Analyzer 4950 3002
Management 18889 3003
TCP: 3010
Server
4950
18888 UDP:
TCP: 3000
3021
3023
Management SG Remote-
Analyzer 4950/TCP Remote upgrade.
Server Upgrade
Management SG Commands
Analyzer 18889 Management connection.
Server (Analyzer)
Analyzer 18890/TCP Sensor Event data sent from the Sensors. SG Event Transfer
SG State Sync
3000-3001/
(Multicast), SG
UDP
Sensor Sensor Heartbeat between the cluster nodes. State Sync
3002,3003,
(Unicast), SG Data
3010/TCP
Sync
Management SG Remote
Sensor 4950/TCP Remote upgrade.
Server Upgrade
Management SG Commands
Sensor 18888/TCP Management connection.
Server (Sensor)
Management
Sensor, Server,
15000/TCP Blacklist entries. SG Blacklisting
firewall analyzer,
sensor
PREDEFINED ALIASES
This appendix lists the predefined Aliases that exist in the system. The predefined Aliases are
used in the Firewall’s default system policies. Some of them may be useful when you create
your own Firewall and IPS rules.
943
Pre-Defined User Aliases
User Aliases are usually created by administrators, but there are also some pre-defined user
aliases in the system. User Aliases are preceded with one $ character. Table C.1 lists all the
editable user Aliases automatically created by StoneGate Management Center. These Aliases
are used in the firewalls’ default DHCP Relay Sub-Policy.
$ DHCP servers for IPsec The DHCP servers defined for assigning virtual IP addresses to VPN
VPN Clients clients.
System Aliases
System Aliases are non-editable Aliases created by StoneGate. The System Aliases are
preceded with two $$ characters. Table C.2 lists the definitions of all the System Aliases. These
Aliases are used in the firewall’s default system policies.
$$ DHCP Enabled interface addresses for IPsec IP addresses (of NDIs on clusters) which have
VPN clients DHCP relay enabled for VPN Clients.
$$ Local Cluster (CVI addresses only) All CVI addresses of the cluster.
$$ Local Cluster (NDI addresses only) All NDI addresses of all nodes in the cluster.
$$ Local Cluster (NDI for management Management NDI address(es) of all nodes in the
addresses only) cluster.
$$ Valid DHCP Address Pools for IPsec VPN Address pools defined for assigning virtual IP
clients addresses to VPN clients.
$$ Valid DHCP Servers All DHCP servers defined for the firewall.
Regular expressions are used to define patterns in traffic for custom Situations, which can be
used in Inspection rules in StoneGate Firewall and IPS.
947
Syntax for StoneGate Regular Expressions
StoneGate custom Situations are often defined as text strings using regular expression patterns
for matching byte sequences in network traffic.
The expression matching starts always at the beginning of the traffic stream. For this reason,
‘.*’ is usually necessary at the beginning of a regular expression to indicate that there can be
an undefined number of bytes in the traffic stream preceding the expression.
The regular expression string consists of one or more branches that are separated by the ‘|’
logical OR symbol as follows: “branch-1|branch-2| . . .”. A branch contains one or more regular
expressions one after another. The Situation matches if any of the regular expression branches
separated by ‘|’ matches to the network traffic byte stream.
Note – Regular expressions are case sensitive. Space characters are included in the
matching process unless the modifier (?S) or (?x) is used to ignore spaces.
Matches if there are one or more consecutive ‘a+’ matches ‘a’, ‘aa’, ‘aaa’ and so on,
<expr>+
<expr> strings. but not the empty string.
<expr>? Matches if there is zero or one <expr> string. ‘a?’ matches ‘<empty>’ and ‘a’.
The ‘*’ and ‘+’ wildcard characters in the middle of a regular expression pattern can easily
result in an expression that has a very large number of different matching states. For this
reason, they must be used with care. The computed matching pattern can grow exponentially,
thus becoming too complex for efficient use on the Sensors.
Sequence Description
\a Bell (BEL) = \x07
Sequence Description
\S Non-whitespace character = [^ \t\r\n\f]
\Q Quotes all metacharacters between the \Q and \E. Backslashes are considered
as normal characters.
<expr>
For example, “\QC:\file.exe\E” matches the “C:\file.exe” string, not the
\E
“C:\x0Cile.exe” string where \x0C is the formfeed “\f”.
Pattern-Matching Modifiers
The StoneGate regular expression syntax has Perl-like extensions. The pattern-matching
modifiers are extensions that can be used to control the matching process in more detail. The
modifiers are enabled with (?<modifiers>) and disabled with a minus (?-<modifiers>),
where <modifiers> is a list of one or more modifiers.
The modifiers (?C), (?L), and (?s)are enabled by default. The pattern-matching modifiers are
listed in Table D.4.
Sequence Description
“Case insensitive mode”
When enabled, case insensitive matching is used for the uppercase and lowercase letters.
(?i) Thus, a letter matches regardless of its capitalization.
When disabled, the letters are matched case-sensitively so that capitalization is taken into
account in the matching process.
Sequence Description
“Allow comments mode”
When enabled, anything after the hash character ‘# ’ is considered as a comment and not
included in the matching process.
(?C)
When disabled, the hash character ‘# ’ and anything following are used in the matching
process.
This modifier is enabled by default. Use (?-C) to disable it.
(?<modifiers> Applies the <modifiers> modifiers only to the subexpression <sub-expr>. These
:<sub-expr>) modifiers are not used in other parts of the regular expression.
Note – In variable expressions a single equal sign ‘=’ sets a value for a variable, whereas
two consecutive equal signs ‘==’ evaluate the value of a variable.
Sequence Description
The expression matches and the <var> variable’s value is set to
(?{<var>=<value>}) <value> (0 or 1). Multiple value setting expressions can be defined by
separating them with a comma ‘,’.
(?{...}) can be used in the two top-level branches that are separated by the logical OR symbol ‘|’.
A variable extension is processed only when its top-level branch matches.
(?i)#case-insensitive mode
The expression in Illustration D.2 detects two different strings in the same connection. The
variable is used so that the response is triggered only when the first branch matches, followed
by the second branch match. Neither of the branches trigger the response alone.
Note – A ‘*’ or ‘?’ wildcard in a middle of an expression can result in a computed matching
pattern that is too complex for efficient use on the Sensors. Therefore, it is recommended
to divide the pattern into two branches as in Illustration D.2.
Sequence Description
(?[<expression>]) <expression> is one or more comma-separated expressions
Variables can be 1, 8, 16, 32 or 64 bits long. By default, a variable is one bit (either 0 or 1). The
default variable size in bits can be changed with a postfix that contains a "@" sign and the
number of bits.
Example test@32 means that the variable test is 32 bits long.
If the variable name is prefixed with a dollar sign ($), the variable is matched against the current
connection instead of the current stream. This matching in both client to server and server to
client traffic.
Example $command_seen@32 checks that a certain command has been issued by the client and the
server has accepted the command without errors.
Each expression has a value after evaluation. The type of the value can be a 32-bit or 64-bit
unsigned integer, or a void. The results of Expressions can be used to perform basic integer
arithmetic, variable assignment, and comparisons. The order of operations is similar to that of
the C programming language, for example A + B * C is A + (B * C), not (A + B) * C. The '->' is
lowest in precedence. Statements inside parentheses () are always evaluated first, so the order
of operations can be overridden with parentheses,
Sequence Description
false Always evaluates to a false.
Adds the value of variable <var> with the value returned by expression
<var> += <expr>
<expr> and sets the result to variable <var>.
Sequence Description
Divides the value of <var> with the value returned by expression <expr>
<var> /= <expr>
and sets the result to variable <var>.
Divides the value of <var> with the value returned by expression <expr>
<var> %= <expr>
and sets the modulo of result to variable <var>.
Performs bitwise AND with the value of variable <var> and the value
<var> &= <expr>
returned by expression <expr> and sets the result to variable <var>.
Performs bitwise OR with the value of variable <var> and the value
<var> |= <expr>
returned by expression <expr> and sets the result to variable <var>.
Performs bitwise XOR with the value of variable <var> and the value
<var> ^= <expr>
returned by expression <expr> and sets the result to variable <var>.
<expr_a> ? <expr_b> : Expression <expr_b> is evaluated only if <expr_b> is true and expression
<expr_c> <expr_c> is evaluated if <expr_a> is false.
<expr_a> == <expr_b> Test if expressions <expr_a> and <expr_b> return an equal value.
<expr_a> != <expr_b> Test if expressions <expr_a> and <expr_b> do not return an equal value.
Performs AND with expressions <expr_a> and <expr_b> and returns the
<expr_a> && <expr_b>
result.
Sequence Description
Performs OR with if expressions <expr_a> and <expr_b> and returns the
<expr_a> || <expr_b>
result.
Stream Operations
The binary data from the input stream can be read into variables with the following expressions:
Sequence Description
Parse big endian value. <size> is the size of the value to be read in bits,
parse_be@<size>
and it can be one of the following: 8, 16, 24, 32, 40, 48, 56 or 64.
Parse little endian value. <size> is the size of the value to be read in bits,
parse_le@<size>
and it can be one of the following: 8, 16, 24, 32, 40, 48, 56 or 64.
ASCII values can be read from the input stream with the following expressions:
Sequence Description
Parse ASCII decimal value. <length> is the maximum number of the
characters to parse. The actual number of parsed digits in the variable
parse_dec(<length>)
$parse_length@32. If no characters could be parsed, then the variable is
set to zero.
parse_dec(<is available>) The actual number of parsed digits is available in the variable.
parse_hex(<is available>) The actual number of parsed digits is available in the variable.
Parse ASCII value; parses hexadecimal if the string starts with "0x", octal
if the string starts with zero ("0") and decimal otherwise. <length> is the
parse_int(<length>) maximum number of the characters to parse. The actual number of
parsed digits in the variable $parse_length@32. If no characters could be
parsed, then the variable is set to zero.
Sequence Description
parse_int(<is available>) The actual number of parsed digits is available in the variable.
parse_oct(<is available>) The actual number of parsed digits is available in the variable.
Sequence Description
Calculates a 32-bit CRC value starting from the current byte up to number
CRC(<length>) of bytes specified by <length> parameter. This function is suitable to
detect large binary blocks from the input stream.
Other Expressions
Table D.11 Other Expressions
Sequence Description
Generate a situation. This expression is used to generate a situation
sid()
indicating a match.
Illustration D.3 provides an example of a regular expression that launches a variable expression.
System Variables
The syntax of the system variables is the same as for other variables (see Table D.5), except
that the variable’s value is not user-changeable.
Sequence Description
$major The major version number of the StoneGate engine.
The current destination port of the connection. This value can be used to
$dport
limit matching to traffic that is destined to a specific port.
The byte that is under inspection when counted from the beginning of the
$offset
traffic stream.
.*\xff\x53\x4d\x42\x25(?{$offset==24})
Sequence Description
<regular_expression> is a normal StoneGate regular expression
(?><regular_expression>)
launched independently from the main regular expression.
*GET(?>\s*[^\s]{400})
(?x)
(?i)
.*POST(?{post_seen=1,ignore})|
.*\nContent-length:(?>(?{post_seen==1}[^\n]{1024})
Syntax Description
#!!GROUP(X)
'X' is the group number from 0 to 7. The comment is optional. If you do not
Comment
specify the group with this tag, the Situation is processed in group zero.
#!!#
#!!GROUP(1)
This heavy regular expression is matched in parallel matching group 1.
#!!#
StoneGate Firewall/VPN and IPS engines can send SNMP traps on system events. The traps
are configured using SNMP Agent elements. Additionally, the Tester entries can be configured
to send SNMP traps. The SNMP traps are listed in Table E.1.
Objects
Trap Name Description
Included
(Firewall only) Policy was installed on the firewall
fwPolicyInstall fwSecurityPolicy
engine.
ipsPolicyInstall ipsSecurityPolicy (IPS only) Policy was installed on the IPS engine.
961
The STONESOFT-SMI-MIB defines the top-level enterprise registrations for the Stonesoft’s
products in the .iso.org.dod.internet.private.enterprises.stonesoft branch (OID
.1.3.6.1.4.1.1369). The StoneGate specific MIBs are:
• STONESOFT-FIREWALL-MIB (Table E.2)
• STONESOFT-IPS-MIB (Table E.3)
• STONESOFT-NETNODE-MIB (Table E.4).
The StoneGate Firewall/VPN MIB files can be downloaded from the Stonesoft website at http://
www.stonesoft.com/.
The StoneGate Firewall/VPN also supports objects in the following standard MIBs:
• IF-MIB (RFC 2863 and RFC 2233) (Table E.5)
• IP-MIB (RFC 2011) (Table E.6)
• SNMP-USER-BASED-SM-MIB (RFC 3414) (Table E.7).
• SNMPv2 MIB (RFC 3418) (Table E.8)
This object is an 'alias' name for the interface as specified by a network manager, and
provides a non-volatile 'handle' for the interface. On the first instantiation of an
interface, the value of ifAlias associated with that interface is the zero-length string. As
and when a value is written into an instance of ifAlias through a network management
set operation, then the agent must retain the supplied value in the ifAlias instance
associated with the same interface for as long as that interface remains instantiated,
including across all re- initializations/reboots of the network management system,
ifAlias
including those which result in a change of the interface's ifIndex value. An example of
the value which a network manager might store in this object for a WAN interface is the
(Telco's) circuit number/identifier of the interface. Some agents may support write-
access only for interfaces having particular values of ifType. An agent which supports
write access to this object is required to keep the value in non-volatile storage, but it
may limit the length of new values depending on how much storage is already occupied
by the current values for other interfaces.
A textual string containing information about the interface. This string includes the
ifDescr name of the manufacturer, the product name and the version of the interface
hardware/software.
The 64-bit wide number of packets, delivered by this sub-layer to a higher (sub-)layer,
which were addressed to a multicast address at this sub-layer. For a MAC layer
protocol, this includes both Group and Functional addresses. This object is a 64-bit
ifHCInMulticastPkts version of ifInMulticastPkts. Discontinuities in the value of this counter can occur at re-
initialization of the management system, and at other times as indicated by the value
of ifCounterDiscontinuityTime.
The 32-bit ifInMulticastPkts reports the low 32-bits of this counter’s value.
The 64-bit wide total number of octets received on the interface, including framing
characters. This object is a 64-bit version of ifInOctets. Discontinuities in the value of
ifHCInOctets this counter can occur at re-initialization of the management system, and at other
times as indicated by the value of ifCounterDiscontinuityTime.
The 32-bit ifInOctets reports the low 32-bits of this counter’s value.
963
Table E.5 IF-MIB Supported Objects (Continued)
The 64-bit wide total number of octets transmitted out of the interface, including
framing characters. This object is a 64-bit version of ifOutOctets. Discontinuities in the
ifHCOutOctets value of this counter can occur at re-initialization of the management system, and at
other times as indicated by the value of ifCounterDiscontinuityTime.
The 32-bit ifOutOctets reports the low 32-bits of this counter’s value.
The 64-bit wide total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this
sub-layer, including those that were discarded or not sent. This object is a 64-bit
ifHCOutUcastPkts version of ifOutUcastPkts. Discontinuities in the value of this counter can occur at re-
initialization of the management system, and at other times as indicated by the value
of ifCounterDiscontinuityTime.
The 32-bit ifOutUcastPkts reports the low 32-bits of this counter’s value.
An estimate of the interface's current bandwidth in units of 1,000,000 bits per second.
If this object reports a value of `n' then the speed of the interface is somewhere in the
range of `n-500,000' to `n+499,999'. For interfaces which do not vary in bandwidth or
ifHighSpeed
for those where no accurate estimation can be made, this object contains the nominal
bandwidth. For a sub-layer which has no concept of bandwidth, this object must be
zero.
A unique value, greater than zero, for each interface. It is recommended that values are
assigned contiguously starting from 1. The value for each interface sub-layer must
ifIndex
remain constant at least from one re-initialization of the entity's network management
system to the next re- initialization.
The number of inbound packets which were chosen to be discarded even though no
errors had been detected to prevent their being deliverable to a higher-layer protocol.
One possible reason for discarding such a packet could be to free up buffer space.
ifInDiscards
Discontinuities in the value of this counter can occur at re-initialization of the
management system, and at other times as indicated by the value of
ifCounterDiscontinuityTime.
For packet-oriented interfaces, the number of inbound packets that contained errors
preventing them from being deliverable to a higher-layer protocol. For character-
oriented or fixed-length interfaces, the number of inbound transmission units that
ifInErrors contained errors preventing them from being deliverable to a higher-layer protocol.
Discontinuities in the value of this counter can occur at re-initialization of the
management system, and at other times as indicated by the value of
ifCounterDiscontinuityTime.
The 32-bit wide total number of octets received on the interface, including framing
characters. Discontinuities in the value of this counter can occur at re-initialization of
ifInOctets the management system, and at other times as indicated by the value of
ifCounterDiscontinuityTime.
This object reports the low 32-bits of the 64-bit ifHCInOctets counter’s value.
The 32-bit wide number of packets, delivered by this sub-layer to a higher (sub-)layer,
which were not addressed to a multicast or broadcast address at this sub-layer.
Discontinuities in the value of this counter can occur at re-initialization of the
ifInUcastPkts management system, and at other times as indicated by the value of
ifCounterDiscontinuityTime.
This object reports the low 32-bits of the 64-bit ifHCInUcastPkts counter’s value.
The value of sysUpTime at the time the interface entered its current operational state.
ifLastChange If the current state was entered prior to the last re-initialization of the local network
management subsystem, then this object contains a zero value.
Indicates whether linkUp/linkDown traps are generated for this interface. By default,
ifLinkUpDownTrapEnable this object must have the value enabled(1) for interfaces which do not operate on 'top'
of any other interface (as defined in the ifStackTable), and disabled(2) otherwise.
The size of the largest packet which can be sent/received on the interface, specified in
ifMtu octets. For interfaces that are used for transmitting network datagrams, this is the size
of the largest network datagram that can be sent on the interface.
The textual name of the interface. The value of this object must be the name of the
interface as assigned by the local device and must be suitable for use in commands
entered at the device's `console'. This might be a text name, such as `le0' or a simple
port number, such as `1', depending on the interface naming syntax of the device. If
several entries in the ifTable together represent a single interface as named by the
ifName
device, then each will have the same value of ifName. Note that for an agent which
responds to SNMP queries concerning an interface on some other (proxied) device,
then the value of ifName for such an interface is the proxied device's local name for it.
If there is no local name, or this object is otherwise not applicable, then this object
contains a zero-length string.
The number of network interfaces (regardless of their current state) present on this
ifNumber
system.
965
Table E.5 IF-MIB Supported Objects (Continued)
The number of outbound packets which were chosen to be discarded even though no
errors had been detected to prevent their being transmitted. One possible reason for
ifOutDiscards discarding such a packet could be to free up buffer space. Discontinuities in the value
of this counter can occur at re-initialization of the management system, and at other
times as indicated by the value of ifCounterDiscontinuityTime.
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors. For character-oriented or fixed-length interfaces, the
number of outbound transmission units that could not be transmitted because of
ifOutErrors
errors. Discontinuities in the value of this counter can occur at re-initialization of the
management system, and at other times as indicated by the value of
ifCounterDiscontinuityTime.
The 32-bit wide total number of octets transmitted out of the interface, including
framing characters. Discontinuities in the value of this counter can occur at re-
ifOutOctets initialization of the management system, and at other times as indicated by the value
of ifCounterDiscontinuityTime.
This object reports the low 32-bits of the 64-bit ifHCOutOctets counter’s value.
The 32-bit wide total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this
sub-layer, including those that were discarded or not sent. Discontinuities in the value
ifOutUcastPkts of this counter can occur at re-initialization of the management system, and at other
times as indicated by the value of ifCounterDiscontinuityTime.
This object reports the low 32-bits of the 64-bit ifHCOutUcastPkts counter’s value.
The interface's address at its protocol sub-layer. For example, for an 802.x interface,
this object normally contains a MAC address. The interface's media-specific MIB must
ifPhysAddress define the bit and byte ordering and the format of the value of this object. For
interfaces which do not have such an address (e.g., a serial line), this object must
contain an octet string of zero length.
This object has a value of false(2) if this interface only accepts packets/frames that
are addressed to this station. This object has a value of true(1) when the station
accepts all packets/frames transmitted on the media. The value true(1) is only legal on
ifPromiscuousMode
certain types of media. If legal, setting this object to a value of true(1) may require the
interface to be reset before becoming effective. The value of ifPromiscuousMode does
not affect the reception of broadcast and multicast packets/frames by the interface.
The type of interface. Additional values for ifType are assigned by the Internet Assigned
ifType Numbers Authority (IANA), through updating the syntax of the IANAifType textual
convention.
The number of ICMP messages which the entity received but determined as having
icmpInErrors
ICMP-specific errors (bad ICMP checksums, bad length, etc.).
The total number of ICMP messages which the entity received. Note that this counter
icmpInMsgs
includes all those counted by icmpInErrors.
967
Table E.6 IP-MIB Supported Objects (Continued)
The total number of ICMP messages which this entity attempted to send. Note that
icmpOutMsgs
this counter includes all those counted by icmpOutErrors.
The number of ICMP Redirect messages sent. For a host, this object will always be
icmpOutRedirects
zero, since hosts do not send redirects.
The value of the least-significant bit in the IP broadcast address used for sending
datagrams on the (logical) interface associated with the IP address of this entry. For
ipAdEntBcastAddr example, when the Internet standard all-ones broadcast address is used, the value
will be 1. This value applies to both the subnet and network broadcasts addresses
used by the entity on this (logical) interface.
The index value which uniquely identifies the interface to which this entry is
ipAdEntIfIndex applicable. The interface identified by a particular value of this index is the same
interface as identified by the same value of RFC 1573's ifIndex.
The subnet mask associated with the IP address of this entry. The value of the mask
ipAdEntNetMask
is an IP address with all the network bits set to 1 and all the hosts bits set to 0.
The size of the largest IP datagram which this entity can re-assemble from incoming
ipAdEntReasmMaxSize
IP fragmented datagrams received on this interface.
The default value inserted into the Time-To-Live field of the IP header of datagrams
ipDefaultTTL originated at this entity, whenever a TTL value is not supplied by the transport layer
protocol.
The number of input datagrams for which this entity was not their final IP destination,
as a result of which an attempt was made to find a route to forward them to that final
ipForwDatagrams destination. In entities which do not act as IP routers, this counter will include only
those packets which were Source-Routed via this entity, and the Source-Route option
processing was successful.
The number of IP datagrams that have been discarded because they needed to be
ipFragFails fragmented at this entity but could not be, e.g., because their Don't Fragment flag
was set.
ipFragOKs The number of IP datagrams that have been successfully fragmented at this entity.
The number of input datagrams discarded due to errors in their IP headers, including
ipInHdrErrors bad checksums, version number mismatch, other format errors, time-to-live
exceeded, errors discovered in processing their IP options, etc.
The total number of input datagrams received from interfaces, including those
ipInReceives
received in error.
The interface on which this entry's equivalence is effective. The interface identified
ipNetToMediaIfIndex by a particular value of this index is the same interface as identified by the same
value of RFC 1573's ifIndex.
The type of mapping. Setting this object to the value invalid(2) has the effect of
invalidating the corresponding entry in the ipNetToMediaTable. That is, it effectively
disassociates the interface identified with said entry from the mapping identified with
said entry. It is an implementation- specific matter as to whether the agent removes
ipNetToMediaType
an invalidated entry from the table. Accordingly, management stations must be
prepared to receive tabular information from agents that corresponds to entries not
currently in use. Proper interpretation of such entries requires examination of the
relevant ipNetToMediaType object.
969
Table E.6 IP-MIB Supported Objects (Continued)
The total number of IP datagrams which local IP user- protocols (including ICMP)
ipOutRequests supplied to IP in requests for transmission. Note that this counter does not include
any datagrams counted in ipForwDatagrams.
ipReasmReqds The number of IP fragments received which needed to be reassembled at this entity.
The maximum number of seconds which received fragments are held while they are
ipReasmTimeout
awaiting reassembly at this entity.
The total number of packets received by the SNMP engine which were dropped
usmStatsNotInTimeWindows
because they appeared outside of the authoritative SNMP engine's window.
The total number of packets received by the SNMP engine which were dropped
usmStatsUnknownEngineIDs because they referenced an snmpEngineID that was not known to the SNMP
engine.
The total number of packets received by the SNMP engine which were dropped
usmStatsUnknownUserNames
because they referenced a user that was not known to the SNMP engine.
The total number of packets received by the SNMP engine which were dropped
usmStatsUnsupportedSecLevels because they requested a security Level that was unknown to the SNMP engine
or otherwise unavailable.
The total number of packets received by the SNMP engine which were dropped
usmStatsWrongDigests
because they didn't contain the expected digest value.
The total number of ASN.1 or BER errors encountered by the SNMP entity when
snmpInASNParseErrs
decoding received SNMP messages.
The total number of SNMP messages delivered to the SNMP entity which used a
snmpInBadCommunityNames
SNMP community name not known to said entity.
The total number of SNMP messages delivered to the SNMP entity which
snmpInBadCommunityUses represented an SNMP operation which was not allowed by the SNMP community
named in the message.
The total number of SNMP messages which were delivered to the SNMP entity and
snmpInBadVersions
were for an unsupported SNMP version.
The total number of messages delivered to the SNMP entity from the transport
snmpInPkts
service.
An advisory lock used to allow several cooperating SNMPv2 entities, all acting in a
manager role, to coordinate their use of the SNMPv2 set operation. This object is
snmpSetSerialNo
used for coarse-grain coordination. To achieve fine-grain coordination, one or more
similar objects might be defined within each MIB group, as appropriate.
971
Table E.8 SNMPv2-MIB Supported Objects (Continued)
The textual identification of the contact person for this managed node, together
sysContact with information on how to contact this person. If no contact information is
known, the value is the zero-length string.
A textual description of the entity. This value must include the full name and
sysDescr version identification of the system's hardware type, software operating-system,
and networking software.
The physical location of this node (e.g., `telephone closet, 3rd floor'). If the
sysLocation
location is unknown, the value is the zero-length string.
A value which indicates the set of services that this entity may potentially offers.
The value is a sum. This sum initially takes the value zero, Then, for each layer, L,
in the range 1 through 7, that this node performs transactions for, 2 raised to (L -
1) is added to the sum. For example, a node which performs only routing functions
would have a value of 4 (2^(3-1)). In contrast, a node which is a host offering
sysServices application services would have a value of 72 (2^(4-1) + 2^(7-1)). Note that in the
context of the Internet suite of protocols, values must be calculated accordingly:
layer functionality 1 physical (e.g., repeaters) 2 datalink/subnetwork (e.g.,
bridges) 3 Internet (e.g., supports the IP) 4 end-to-end (e.g., supports the TCP) 7
applications (e.g., supports the SMTP) For systems including OSI protocols, layers
5 and 6 may also be counted.
The time (in hundredths of a second) since the network management portion of
sysUpTime
the system was last re-initialized.
This section lists the StoneGate-specific LDAP classes and attributes that you add to the
schema of external LDAP servers’.
The StoneGate specific attribute and class names start with “sg”. The classes are listed in
Table F.1.
Class Description
sggroup StoneGate user group
Last day when the user account is valid and the user
sgexpiration sguser
can log in.
973
Table F.2 StoneGate Specific LDAP Attributes (Continued)
Illustration F.1 Additional Configuration for OpenLDAP v1.2.11 and Netscape Server
include /etc/openldap/slapd.at.conf
include /etc/openldap/slapd.oc.conf
include /etc/openldap/sg-schema.conf
schemacheck on
For the OpenLDAP server versions 2.0 and later, you must configure the following lines to the
LDAP server’s slapd.conf configuration file after stopping the LDAP service:
LOG FIELDS
975
Log Entry Fields
The following tables list the fields of the log entry table and the corresponding XML fields
exported to syslog for exportable log entry fields. The rights of the administrator who views the
logs and the log type(s) that the administrator has selected for viewing determine which fields
are displayed.
• Non-exportable Log Entry Fields (page 976).
• Exportable Alert Log Entry Fields (page 980).
• Exportable Alert Trace Log Entry Fields (page 980).
• Exportable Audit Log Entry Fields (page 981).
• Exportable Firewall Log Entry Fields (page 982).
• Exportable IPS Log Entry Fields (page 984).
• Exportable IPS Recording Log Entry Fields (page 996).
• Exportable SSL VPN Log Entry Fields (page 997).
Field Description
Identifier of an additional situation that was detected
Additional Situation
simultaneously with the situation that triggered the log event.
Blacklist response.Blacklist
Duration of blacklisting in seconds.
duration
Blacklist response.Blacklist Firewall or sensor that blacklisted the traffic that triggered the log
executor event.
Blacklist response.Endpoint1
Blacklisted IP addresses for Endpoint1.
addr
Blacklist response.Endpoint1
Netmask for blacklisted Endpoint1 IP address (32 = host address).
mask
Blacklist response.Endpoint1
Blacklisted Endpoint1 port (empty = all ports).
port
Blacklist response.Endpoint1
Blacklisted Endpoint1 port range.
port range
Blacklist response.Endpoint2
Blacklisted IP addresses for Endpoint2.
addr
Blacklist response.Endpoint2
Netmask for blacklisted Endpoint2 IP address (32 = host address).
mask
Blacklist response.Endpoint2
Blacklisted Endpoint2 port (empty = all ports).
port
Field Description
Blacklist response.Endpoint2
Blacklisted Endpoint2 port range.
port range
Certificate verify error TLS/SSL Certificate verify error code related to this event.
Element Domain Administrative Domain of the element associated with the event.
The VPN Endpoint through which the traffic that triggered the log
Endpoint
event was sent or received.
Ethernet main type Ethernet frame main type (Ethernet 2, IPX, LLC, SNAP).
Field Description
IPv6 extension header type as indicated by the next header value of
IPv6 extension header type
the preceding header.
IPv6 option offset IPv6 option offset from the beginning of the IPv6 extension header.
IPv6 routing final destination Final destination address in the IPv6 routing header.
IPv6 routing segments left Segments left value in the IPv6 routing header.
The administrative Domain in which the action that triggered the log
Login Domain
event was taken.
The VPN Security Gateway through which the traffic that triggered
Security Gateway
the log event was sent or received.
Sender Domain Administrative Domain from which the log entry was sent.
Field Description
Sender module version.Sender
Minor version of the engine module that generated the event.
module minor
SSL/TLS Domain Domain name field in SSL/TLS certificate related to the event.
TCP window shrinkage The amount by which the TCP window shrunk.
User and Group Information User and Group Information related to the event.
The VPN through which the traffic that triggered the log event was
VPN
sent or received.
Information
INFO_MSG A description of the log event that further explains the entry.
message
Reception time RECEPTION_TIME Time when the entry was received by the Log Server.
Reference event
REF_EVENT Reference to a related event.
ID
Rule Tag RULE_ID Rule tag of the rule that triggered the log event.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Sender type SENDER_TYPE The type of engine or server that sent the log entry.
Situation SITUATION The identifier of the situation that triggered the log event.
User EVENT_USER User who executed the action that produced the alert.
Client IP address CLIENT_IP_ADDRESS Address of the client that triggered the audit event.
The Incident case to which the logs and/or audit events are
Incident case INCIDENT_CASE
related.
Information
INFO_MSG A description of the log event that further explains the entry.
message
Operation type TYPE_DESCRIPTION Type of action that triggered the audit entry.
Origin name ORIGIN_NAME Name of the component that triggered the audit event.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Sender type SENDER_TYPE The type of engine or server that sent the log entry.
Action of the rule that triggered the log event. The action
values are Allow, Discard, Refuse, Terminate, Wait for
Action ACTION
further actions, and Wait for authentication. For more
information on action values, see Table G.12.
Auth. Rule Tag AUTH_RULE_ID Rule number of the rule that triggered the log event.
Auth. User AUTH_NAME Username of the authorized user related to this event.
The DSCP Mark associated with the traffic that triggered the
DSCP Mark DSCP_MARK
log event.
Dst Port DPORT TCP or UDP destination port in the packet header.
The event that triggered the log creation, for example, New
Event EVENT connection, Connection closed, Connection discarded. For
more information on event values, see Table G.12.
Information
INFO_MSG A description of the log event that further explains the entry.
message
Nat Rule Tag NAT_RULE_ID The rule number of the NAT rule that triggered the log event.
Reception time RECEPTION_TIME Time when the entry was received by the Log Server.
Reference event
REF_EVENT Reference to a related event.
ID
Rule Tag RULE_ID Rule tag of the rule that triggered the log event.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Sender type SENDER_TYPE The type of engine or server that sent the log entry.
Situation SITUATION The identifier of the situation that triggered the log event.
Src IF Srcif Defined source interface number for the firewall cluster.
Src Port SPORT TCP or UDP source port in the packet header.
Blacklist response BLACKLIST_RESPONSE Firewall blacklist response that triggered the log event.
Content type of
SIP_CONTENT_TYPE Content type of the SIP message body.
message body
Correlation base The policy that decides the response after successful
CORRELATION_COMP_ID
component ID correlation.
Correlation end NTP stamp of the end of the time frame for a match to a
TIME_FRAME_END
time correlation situation.
Datagram dropped DROP_DATAGRAM The datagram was dropped by a Drop Response in the rule.
DNS hdr is
DNS_HDR_IS_REQUEST DNS message is a request.
request
DNS offset DNS_OFFSET DNS message offset where the situation occurs.
Dst Port DPORT TCP or UDP destination port in the packet header.
Error id ERROR_ID Identifier of the error that triggered the log event.
Failed response
FAILED_RESP_CNT Number of failed response attempts.
cnt
Frame dropped DROP_FRAME The frame was dropped by a Drop Response in the rule.
FTP clnt arg len FTP_CLNT_ARG_LEN Length of the FTP CLNT argument.
FTP enc arg len FTP_ENC_ARG_LEN Length of the ENC command argument.
FTP eprt arg len FTP_EPRT_ARG_LEN Length of the EPRT command argument.
FTP estp arg len FTP_ESTP_ARG_LEN Length of the ESTP command argument.
FTP help arg len FTP_HELP_ARG_LEN Length of the HELP command argument.
FTP lang arg len FTP_LANG_ARG_LEN Length of the LANG command argument.
FTP lprt arg len FTP_LPRT_ARG_LEN Length of the LPRT command argument.
FTP mic arg len FTP_MIC_ARG_LEN Length of the MIC command argument.
FTP opts arg len FTP_OPTS_ARG_LEN Length of the OPTS command argument.
FTP reply code FTP_REPLY_CODE The detected FTP server reply code.
FTP reply len FTP_REPLY_LEN Length of an FTP server reply that is too long.
FTP reply line len FTP_REPLY_LINE_LEN Length of an FTP server reply line that is too long.
FTP server action FTP_SERVER_ACTION FTP server action after a suspicious client command.
FTP site arg len FTP_SITE_ARG_LEN Length of the SITE command argument.
HTTP content
HTTP_CONTENT_LENGTH HTTP content length.
length
HTTP request
HTTP_REQUEST_MESSAGE_
message field Length of the HTTP request header field name.
FIELD_NAME_LENGTH
name length
HTTP request
HTTP_REQUEST_MESSAGE_
message field Length of the HTTP request header field value.
FIELD_VALUE_LENGTH
value length
HTTP request
HTTP_REQUEST_METHOD The detected HTTP request method.
method
HTTP request
HTTP_REQUEST_VERSION The detected HTTP request version.
version
HTTP requests not HTTP_REQUESTS_NOT_ Number of requests not stored due to HTTP pipeline
stored STORED overflow.
HTTP response
HTTP_RESPONSE_CODE The detected HTTP response code.
code
HTTP response
HTTP_RESPONSE_MESSAGE_
message field Length of the HTTP response header field name.
FIELD_NAME_LENGTH
name length
HTTP response
HTTP_RESPONSE_MESSAGE_
message field Length of the HTTP response header field value.
FIELD_VALUE_LENGTH
value length
ICMP field
ICMP_FIELD_ORIGINATE_
originate Value of the ICMP originate timestamp field.
TIMESTAMP
timestamp
ICMP field
ICMP_FIELD_OUTBOUND_
outbound hop Value of the ICMP outbound hop count field.
HOP_COUNT
count
ICMP field
ICMP_FIELD_TRACEROUTE_ID Value of the ICMP traceroute ID field.
traceroute id
ICMP field
ICMP_FIELD_TRANSMIT_
transmit Value of the ICMP transmit timestamp field.
TIMESTAMP
timestamp
ICMP message
ICMP_MESSAGE_LENGTH Length of the ICMP message.
length
ICMP referenced
ICMP_REFERENCED_ Destination IP address of the datagram related to the ICMP
destination IP
DESTINATION_IP_ADDR message.
addr
ICMP referenced ICMP_REFERENCED_ Destination port of the datagram related to the ICMP
destination port DESTINATION_PORT message.
ICMP referenced ICMP_REFERENCED_IP_ IP Protocol field of the datagram related to the ICMP
IP proto PROTO message.
ICMP referenced ICMP_REFERENCED_SOURCE Source IP address of the datagram related to the ICMP
source IP addr _IP_ADDR message.
Imf encoded word IMF_ENCODED_WORD Encoded word token related to this event.
Imf header field IMF_HEADER_FIELD_ Number of characters processed in this header field when
position POSITION this event was generated.
Imf token IMF_TOKEN Syntactical token in the mail body related to this event.
Information
INFO_MSG A description of the log event that further explains the entry.
message
IP datagram new
IP_DATAGRAM_NEW_LENGTH The new suggested length for the IP datagram.
length
IP offset IP_OFFSET Start IP offset from the beginning of the Ethernet frame.
IP option length IP_OPTION_LENGTH Length of the IP option that triggered the response.
IP protocol PROTOCOL IP protocol of the traffic that generated the log event.
Length of
SIP_CONTENT_LENGTH Length of the SIP message body.
message body
Module mem
MODULE_MEMUSAGE Memory usage of each module.
usage
Node
NODE_CONFIGURATION Current configuration of the node that sent the log entry.
configuration
Node version NODE_VERSION Node version of the node that sent the log entry.
Original
NTP stamp of the beginning of the time frame in the referred
correlation begin ORIG_TIME_FRAME_BEGIN
event.
time
Original
NTP stamp of the end of the time frame in the referred
correlation end ORIG_TIME_FRAME_END
event.
time
Original event
ORIG_EVENT_COUNT Number of events in the time frame of the referred event.
count
Original situation ORIG_SITUATION Identifier of the situation that triggered the referred event.
Packet not seen PACKET_NOT_SEEN Flag indicating that the related packet was not seen.
Reception time RECEPTION_TIME Time when the entry was received by the Log Server.
Rule Tag RULE_ID Rule tag of the rule that triggered the log event.
Scan ICMP echo SCAN_ICMP_ECHO_NO_ Number of distinct ICMP Echo Request (ping) destinations
no reply cnt RESPONSE_COUNTER that did not reply to a request.
Scan ICMP mask SCAN_ICMP_NETMASK_NO_ Number of ICMP Netmask Request destinations with no
no reply cnt RESPONSE_COUNTER reply.
Scan ICMP mask SCAN_ICMP_NETMASK_ Number of distinct ICMP Netmask Request destinations
request cnt REQUEST_COUNTER detected.
Scan ICMP no SCAN_ICMP_NO_RESPONSE_ Number of ICMP Echo, Timestamp, and Netmask Request
reply cnt COUNTER destinations with no reply.
Scan ICMP SCAN_ICMP_REQUEST_ Number of ICMP Echo, Timestamp, and Netmask Request
request cnt COUNTER destinations.
Scan ICMP time SCAN_ICMP_TIMESTAMP_NO Number of ICMP Timestamp Request destinations with no
no reply cnt _RESPONSE_COUNTER reply.
Scan ICMP time SCAN_ICMP_TIMESTAMP_ Number of distinct ICMP Timestamp Request destinations
request cnt REQUEST_COUNTER detected.
Scan TCP no ack SCAN_TCP_NO_ACK_ Number of TCP destinations targeted for illegal TCP
cnt COUNTER segments.
Scan TCP no reply SCAN_TCP_NO_RESPONSE_ Number of TCP destinations with no reply to connection
cnt COUNTER attempts.
Scan TCP positive SCAN_TCP_POSITIVE_ Number of TCP destinations with handshake but no data
cnt COUNTER sent by client.
Scan UDP SCAN_UDP_NEGATIVE_ Number of destinations that replied with ICMP Port
negative cnt COUNTER Unreachable.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Sender module
SENDER_MODULE_VERSION Version of the engine module that generated the event.
version
Sender type SENDER_TYPE The type of engine or server that sent the log entry.
SIP contact
SIP_CONTACT SIP contact address.
address
SIP request
SIP_REQUEST_METHOD Method of the SIP request.
method
SIP request
SIP_REQUEST_VERSION Version of the SIP request.
version
Situation SITUATION The identifier of the situation that triggered the log event.
SMTP misplaced SMTP_MISPLACED_ Command given in the wrong place in the command
command COMMAND sequence.
SMTP reply SMTP_REPLY Suspicious SMTP reply message sent by the server.
SMTP reverse
SMTP_REVERSE_PATH SMTP reverse path in MAIL FROM command parameter.
path
SMTP server Banner sent by the SMTP server at the beginning of the
SMTP_SERVER_BANNER
banner connection.
SMTP transaction
SMTP_TRANSACTION_STATE Session state of the SMTP transaction.
state
Src Port SPOR TCP or UDP source port in the packet header.
TCP handshake
TCP_HANDSHAKE_SEEN Initial handshake of the TCP connection detected.
seen
TCP option length TCP_OPTION_LENGTH Length of the TCP option that caused the response.
UDP datagram
UDP_DATAGRAM_SIZE Size of the UDP datagram.
size
Whole session True if no data of this session has been missed up to this
WHOLE_SESSION_SEEN
seen point.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Information
INFO_MSG A description of the log event that further explains the entry.
message
Reception time RECEPTION_TIME Time when the entry was received by the Log Server.
Sender NODE_ID IP address of the engine or server that sent the log entry.
Username USERNAME Username of the user to which this log event is related.
Value
Accounting
Authentication
Blacklisting
Cluster Daemon
Cluster Protocol
Connection Tracking
Data Synchronization
DHCP Client
DHCP Relay
Invalid
Value
IPsec
License
Log Server
Logging System
Management
Monitoring
NetLink Incoming HA
Packet Filter
Protocol Agent
Server Pool
SNMP Monitoring
State Synchronization
Syslog
System
Tester
Undefined
User Defined
Value
Critical Error
Debug high
Debug low
Debug mid
Diagnostic
Error
Informational
Internal max
Max
Notification
System Alert
Undefined
Warning
Action Description
A connection was allowed through the engine. This can be a new connection, a
related connection (for example, an FTP data connection), a related packet (for
Allow
example ICMP error messages related to an earlier TCP connection), or a new
connection through an existing VPN tunnel.
A connection matched a rule with the passive Terminate action, and a log entry
Terminate (passive)
indicating that the connection would have been terminated was produced.
A connection was terminated by the engine and TCP resets were sent to both
Terminate (reset)
communicating hosts.
Wait for A connection was waiting for successful user authentication before it could
Authentication continue.
Wait for RPC Reply A connection was waiting for an RPC reply before it could continue.
Event Description
Allowed a connection from blacklister A connection from a blacklister was allowed.
Event Description
Authentication failed A user did not successfully authenticate.
Authentication Server does not respond There is no response from the Authentication Server.
Blacklisting entries flushed All entries were removed from the engine’s blacklist.
Blacklisting entry deleted An entry was removed from the engine’s blacklist.
Can't connect to log server The engine is unable to connect to the Log Server.
Event Description
DHCP Relay address not configured, reply A DHCP reply was discarded because no DCHP
discarded address is configured for the engine.
DHCP Relay address spoofed, request A DHCP request was discarded because the DHCP
discarded relay address was considered spoofed.
Event Description
Internal engine error An internal error occurred on the engine.
Log spool is becoming full The engine’s log spool partition is becoming full.
New blacklisting entry A new entry was added to the engine’s blacklist.
New configuration successfully installed A new configuration was installed on the engine.
Oversized DHCP message discarded An excessively large DHCP message was discarded.
Event Description
Packet Discarded A packet was discarded by the engine.
Requested NAT cannot be done There was an error when applying NAT to the traffic.
Sending DHCP reply failed The engine failed to send a DHCP reply.
Sending DHCP request failed The engine failed to send a DHCP request.
Server pool member went offline A Server Pool member went offline.
Server pool member went online A Server Pool member went online.
Went locked offline The engine went to the locked offline state.
Went locked online The engine went to the locked online state.
Event Description
Went standby The engine went to standby.
A successful engine login causes an event that is displayed in the Logs view with the following
type of message in the Info Message field: date time login[id]:USERNAME LOGIN on
‘device’. A failed login causes an info message of the following type: date time
login[id]:FAILED LOGIN (#) on ‘device’ FOR ‘UNKNOWN’.
VPN Notifications
The table below lists messages that are seen in the logs as part of normal IPsec VPN operation.
ESP [...] Encrypted traffic going through the VPN tunnel. When you enable
AH [...] IPsec diagnostics you may see more of these messages.
Sending IKE SA delete sync This message is visible only when IPsec diagnostics are enabled.
Receiving IKE SA expire/delete Synchronization of SA deletion information between clustered firewall
sync engines.
The gateway at the other end of the tunnel has sent an Initial-Contact
message (indicating that it has no knowledge of previous
Initial contact notification negotiations). If there are old SAs with the gateway, they are deleted
received at this point (recently negotiated SAs are not, as may be indicated by
a further log message). If SAs exist, the notification may indicate that
the other end has been cleared, for example, in a reboot.
SA install failed
Dead peer detection checks the other gateway periodically when the
Dead peer detection failed VPN is established. If no response is received, the VPN tunnel is
IKE peer was found dead [...] closed. Indicates that the other gateway is down, unreachable, or
considers the VPN tunnel already closed.
Invalid argument Generic error. Check the other log messages for more useful
information. If the problem is not apparent in the available logs,
Invalid syntax activate diagnostics to generate more verbose logs that give you
more information about the next negotiations.
Remote ID mismatch The IKE Phase 1 ID defined for the external security gateway in
StoneGate is different from the ID with which the gateway actually
Remote identity [...] used in identified itself. The ID and its type are set for each tunnel End-Point
IKE negotiation doesn’t match in the properties of the external Gateway. Note that if an IP address
to policy [...] is used as identity, the IP address used as the identity may be
different from the IP address used for communications.
Most likely indicates that the Site definitions do not match the IP
SPD doesn’t allow connection addresses used. Check the addresses included under the Sites for
[...] both Gateways, and also that the translated addresses are included
under the Site, if NAT is used for communications inside the VPN.
Indicates connection problems or that the other end has deleted the
Timed out SA that StoneGate is using in the negotiation. Check the logs at the
other end to see if the connection makes it through.
An Access rule matched this connection, but the traffic could not be
sent across the VPN. Most likely, this is due to the (possibly NATed)
source or destination IP address not being included in the local or
Tunnel selection failed remote gateway’s Site as required. This message also appears if a
connection that is not intended for the VPN matches the VPN rule
(note that inbound cleartext traffic can be allowed from the same
addresses as tunneled traffic with the Apply action in the VPN rule).
Type Definition
audit.info Internal messages of the audit system.
Type Definition
Audited when the administrator logs out from the
stonegate.admin.logout
management server.
Type Definition
A firewall reboot by an administrator through the
stonegate.firewall.reboot
management system.
Type Definition
stonegate.ips.sensor.monitor.off Monitoring mode offline for a sensor.
Type Definition
Audited when, following to a log server re-logging to the
stonegate.logpruningfilter.refresh management, all the pruning filters are retrieved at the
management and re-applied.
Syslog Entries
The following table presents the categories for messages that appear in log entries sent to an
external syslog server.
Value
Clock daemon for BSD systems
Value
File transfer protocol
Kernel messages
Mail system
Security/authorization messages
System daemons
UUCP subsystem
Value
DNS qname
FTP command
FTP reply
HTTP header
Value
Imf header field
Imf token
SMTP command
SMTP recipient
SMTP reply
Connection States
The following states are used both in the State column in the Connections view and (in part) in
the Logs view in conjunction with info messages or logs on the closing of connections. They
reflect the standard states regarding the initiation and termination of TCP connections as seen
by the firewall in the transmissions. Table G.19 lists the possible states.
State Description
CP established StoneGate cluster protocol packet is recognized.
TCP close wait One end of the connection waits for the FIN packet (passive close).
Waiting for ACK for the FIN before going to close wait status (passive
TCP close wait ack
close).
TCP closing Closing packet (FIN) sent by one end of the connection (simultaneous).
State Description
TCP closing ack Waiting for ACK for the FIN before going to closing status (active close).
One end of the connection waits for sending the FIN packet (active
TCP fin wait 1
close).
TCP fin wait 2 One end of the connection waits for receiving ACK packet.
TCP last ack One end of the connection sent a FIN packet (passive close).
TCP last ack wait Waiting for the FIN packet to be acknowledged.
Second phase of the TCP three-way handshake, the server has replied to
TCP syn ack seen
client sent SYN with SYN+ACK, next status will be established.
TCP syn fin seen T/TCP (Transactional TCP) connection, RFC 1644.
TCP syn return Received simultaneous SYN from the other end (simultaneous open).
TCP syn seen Very first packet sent by one end of the connection.
TCP time wait One end of the connection acknowledged closing packet (FIN).
Waiting for ACK for the FIN status before going to time wait status (active
TCP time wait ack
close).
KEYBOARD SHORTCUTS
This chapter explains the shortcut keys that you can use in the StoneGate Management
Client. Most of these shortcuts are also shown in the menus of the Management Client next
to each menu item that has a shortcut.
1019
General Shortcuts
The following table lists general shortcuts that are available in most views in the Management
Client.
Action Shortcut
Bookmark all tabs Ctrl+Shift+D
Cancel Escape
Copy Ctrl+C
Cut Ctrl+X
Maximize/Restore Ctrl+M
Action Shortcut
Open sidebar F4
Paste Ctrl+V
Print Ctrl+P
Refresh F5
Save Ctrl+S
Search Ctrl+F
Audit View, Logs View Jump backward in the timeline Ctrl+ Page Up
Audit View, Logs View Jump forward in the timeline Ctrl+ Page Down
Audit View, Logs View Scroll one page up/down Page Up/Page Down
Audit View, Logs View Scroll Up and Down Up/Down arrow key
Alt+Down arrow
Security Policy Editor Move rule down
key
A
Access Control List
A list of Elements that can be used to define the Elements that an administrators with
restricted permissions can access. See also Administrator Role and Granted Element.
Access Rule
A row in a Firewall or IPS policy that defines how one type of IPv4 connection is handled by
providing matching criteria based on the source, destination, and protocol information. Confer
to IPv6 Access Rule (page 1038).
Action
What the firewall engine should do with a packet that matches the criteria for a particular rule
in the security policy.
Action Option
Additional action-specific selections that affect how the traffic is handled set in the Action cell
in rules.
Active Management Server
See Primary Management Server (page 1044).
Address Range
A Network Element that defines a range of IP addresses. Use to avoid having to repeatedly
type in the same IP addresses when defining address ranges that do not correspond to whole
networks.
Address Resolution Protocol (ARP)
An Internet standard (RFC 826) protocol used to associate IP addresses with the media
hardware address of a network interface card on a local area network (LAN).
Administrator
An Element that defines the details of a single person that is allowed to log on to the SMC
using the Management Client. If used as a general term, Web Portal Users are also
considered as administrators.
Administrator Role
An Element that defines which actions an Administrator with restricted permissions is allowed
to take. See also Granted Element and Permission Level.
1025
Aggressive Mode
The authentication of two IPsec end-points with only three messages, as opposed to Main
Mode’s six. Aggressive mode also does not provide PFS support, and SA negotiation is limited.
See Main Mode (page 1040). See also Security Association (SA) (page 1047).
AH (Authentication Header)
See Authentication Header (AH) (page 1028).
Alert Chain
A list of rules defining which Alert Channels are used, and in which order, when an alert entry is
directed to the Alert Chain from an Alert Policy to be escalated out from the Management
Center. See also Alert Escalation.
Alert Channel
A method of sending alerts out from the Log Server. You can send alerts via SMTP (e-mail),
SNMP, SMS text messages, or some other action you define in a custom script. Alert Channels
are defined in the Log Server’s properties, after which they can be used in Alert Chains.
Alert Element
An Element that gives the name and description to an Alert Event. The Alert element can be
used as a matching criteria in the rules of an Alert Policy.
Alert Entry
A log message with an alert status that has been raised based on some Situation (which you
can see in the Logs View). Alert entries trigger Alert Escalation.
Alert Escalation
Sending alerts out from the Management Center to administrators through Alert Channels (such
as e-mail) according to a predefined Alert Chain until the original Alert Entry is acknowledged by
some administrator in the Logs View.
Alert Event
A pattern in traffic or a problem in the system’s operation that matches to some Situation used
in a policy or internally in the system, and thus triggers an Alert Entry.
Alert Policy
A list of rules defining if an Alert Entry is escalated and which Alert Chain is used for escalating
which type of alert entries. See also Alert Escalation.
Alert Server
A StoneGate Management Center component that handles receiving and handling of Alerts. The
Alert Server cannot be installed separately, it is integrated in the Log Server installation.
Alias
An Element that can be used to represent other network elements in configurations. It differs
from a group element in that it does not represent all the elements at once: the value it takes in
a configuration can be different on each engine where it is used.
1026 Glossary
Allow Action
An Access Rule parameter that allows a connection matching that rule to pass through the
firewall to its destination.
Analyzer
1) A device in the StoneGate IPS system that analyzes the log information from Sensors
according to its policy to find patterns, so that separate log entries can be combined together.
2) The Network Element that represents an Analyzer device in the Management Center.
Antispoofing
Technique used to protect against malicious packages whose IP header information has been
altered. See also IP Spoofing (page 1038).
Application
A category of Tags for Situations. Meant for grouping Situations that detect known vulnerabilities
in a particular software application.
Application Layer Gateway; Application Level Firewall
A firewall system, or gateway, in which packets are examined based on the application protocol
being used (e.g., telnet, FTP, SMTP). Proxies for each application-level service are installed on
the gateway, and are often configured to relay a conversation between two systems. That is, a
packet’s destination is the gateway, which then establishes a separate connection to the other
system to complete the connection.
Apply VPN Action
A Firewall Access Rule parameter that directs traffic from protected local networks into the
Virtual Private Network (VPN) tunnel and allows traffic that arrives through a VPN, but does not
match non-VPN traffic from outside networks into the protected networks. See also Enforce VPN
Action (page 1034).
ARP (Address Resolution Protocol)
See Address Resolution Protocol (ARP) (page 1025).
Asymmetric Encryption
A cryptographic technology that uses a pair of keys. The message is encrypted with the public
half of a pair and can then be decrypted only with the matching private half of the key pair. Public
key technology can be used to create digital signatures and deal with key management issues.
Also referred to as public key encryption. See also Symmetric Encryption (page 1050) and
Public-key Cryptography (page 1045).
Auditing
A Management Center feature that logs administrators’ actions and allows administrators with
unrestricted permissions to view and manage these logs to keep track of system changes.
Authentication
The process of proving that someone or something is who or what they claim to be. For example,
typing a simple username-password combination is a form of authentication.
Glossary 1027
Authentication Header (AH)
A security protocol supported by the IPsec protocol to enhance traffic security. It enables the
authentication and integrity of data against packet corruption or tampering. AH protocol can use
SHA-1 or MD5 to generate a hash signature based on a secret component from the SA, the
packet payload and some parts of the packet header. See also Security Association (SA)
(page 1047).
Authentication Token/Authenticator
A portable device for authenticating a user. Authentication tokens typically operate by challenge/
response, time-based code sequences, or other techniques. One of the most commonly used
tokens is the RSA SecurID card.
Authorization
The process of giving someone/something permission to do or have something. Usually related
to authentication; once a user has authenticated (proved who they are), they are authorized
(given permission) to perform certain actions.
B
Balancing Mode
A StoneGate cluster mode that attempts to divide the traffic as equally as possible between the
online engines participating in the cluster. Confer to Standby Mode (page 1049).
Bandwidth Management
The process of determining and enforcing bandwidth limits and guarantees for different types of
traffic either together with Traffic Prioritization or on its own. Also see QoS Class (page 1045)
and QoS Policy (page 1045).
Blacklisting
1) The process of blocking unwanted network traffic either manually or automatically.
2) Persistently blocking access to certain URLs manually.
Bookmark
A stored link to a view or layout in the Management Client.
Bookmark Folder
A folder in the toolbar of the Management Client for storing and sharing Bookmarks.
Boot Recovery
A StoneGate setting that brings the engines automatically back online after boot-up.
Border Routing
Routing of connections between different autonomous systems.
BrightCloud
A Web Filtering categorization service that provides categories for malicious sites as well as
several categories for different types of non-malicious content that may be considered
objectionable.
1028 Glossary
Buffer Overflow
When a program’s data in the memory of a computer exceeds the space reserved for it (the
buffer), data may in some circumstances be written on other parts of the memory area.
Attackers may use buffer overflows to execute harmful program code on a remote system.
Bugtraq
A mailing list for discussing network security related issues, such as vulnerabilities.
Bulk Encryption Algorithm
Describes symmetric encryption algorithms which operate on fixed-size blocks of plaintext and
generates a block of ciphertext for each.
C
CA
See Certificate Authority (CA) (page 1029).
CAN
A candidate for a CVE entry.
Capture Interface
A Sensor interface that can listen to traffic passing in the network, but which is not used for
routing traffic through the Sensor. See also Inline Interface.
Category
A way of organizing elements and policies to display a specific subset at a time when configuring
a large StoneGate system in the Management Client to make it easier to find the relevant
elements when configuring the system. For example, a Managed Service Provider (MSP) who
manages networks of several different customers can add a customer-specific category to each
element and policy to be able to view one customer’s elements and policies at a time.
Certificate
Electronic identification of a user or device. Certificates prove the user or device is who/what
they claim to be. This is done through using public/private key pairs and digital signatures.
Certificates are used in StoneGate for authenticating communications between the system
components and for Virtual Private Network (VPN) authentication. Digital certificates are granted
and verified by a Certificate Authority (CA), such as the internal CA included in the Management
Server.
Certificate Authority (CA)
A trusted third-party organization or company that issues digital certificates, used to create
digital signatures and public-private key pairs. The role of the CA in this process is to guarantee
that the individual granted the unique certificate is, in fact, who he or she claims to be.
Challenge/Response
An authentication technique whereby a server sends an unpredictable challenge to the user,
who computes a response using some form of authentication token, which can be an
authenticator, or pre-shared keys used to encrypt random data.
Glossary 1029
Checksum
A one-way function applied to a file to produce a unique “fingerprint” of the file for later
reference. File tampering can then be discovered by verifying the checksum value in the future.
CIS
See Content Inspection Server (CIS) (page 1031).
Client
In a client-server architecture, a client is usually an application running on a computer or a
workstation that uses services provided by a Server.
Client Protection Certificate Authority
Contains the credentials that the engine uses to sign replacement server-side certificates the
engine creates and presents to clients when inspecting the clients’ HTTPS connections with
external servers. Also see Server Protection Credentials (page 1048).
Client-to-Gateway VPN
A Virtual Private Network (VPN) between a software client and a Security Gateway (SGW). Allows
connecting mobile and home office workers safely to corporate resources using a secure
(authenticated and encrypted) connection through insecure networks.
Cluster
A group of devices, or nodes, that share a given work load. In StoneGate, you can cluster
Firewalls and Sensors to share the load and provide redundancy, allowing, for example,
scheduled maintenance that takes one node out of service without interrupting services to the
users.
Cluster Mode
Determines if all members of a cluster participate to traffic processing at all times (Balancing
Mode) or if other members remain inactive until a traffic-processing member stops processing
traffic (Standby Mode).
Cluster Virtual IP Address (CVI)
An IP and MAC address shared by all nodes in a cluster, which are used by every node in a
cluster for communication. These interfaces give the cluster a single identity on the network,
reducing the complexity of routing and network design. CVIs handle the traffic directed to the
firewall for inspection in firewall clusters.
Combined Sensor-Analyzer
1) StoneGate IPS device that has both Sensor and Analyzer engines running simultaneously on
the same hardware.
2) The Network Element that represents a Combined Sensor-Analyzer device in the Management
Center.
Connection Tracking
The set of data maintained for a connection. Used for relating incoming packets to existing
connections. Connection tracking information also includes information to necessary for NAT
(Network Address Translation), Load Balanced Routing and Protocol Agents. May also contain
accounting information.
1030 Glossary
Contact Address
The IP address that is needed to contact a device performing a function in the StoneGate
Management Center when there is NAT (Network Address Translation) being performed in
between the two devices and thus the actual IP address assigned to the network interface
cannot be used directly.
Content Inspection Server (CIS)
A server that performs detailed examination of a connection’s data and assists in the
determination to allow or discard packets. Common examples include virus scanning or filtering
of Web URLs. Also known as content screening.
Continue Action
A policy parameter that sets default values to those used in the rule. The defaults are used in
all subsequent rules except where specifically overridden until some other rule with the
Continue action changes the values or the policy ends.
Context
An Element that is added to a Situation to define what the Situation should match. Provides a
framework for defining parameters, which are most entered as a regular expression, or through
a set of fields and options that the administrators adjust.
Correlation Situation
A Situation that defines the patterns that the Analyzer looks for when it examines event data
produced by Sensors.
CRL Server
A server that maintains a Certificate Revocation List (CRL), which can be used in Authentication
to check if the certificate has been cancelled.
Custom Alert
An Alert Element that is defined by a StoneGate administrator, as opposed to a ready-made
Default Element created by Stonesoft.
CVE
A dictionary that provides common names for publicly known information security vulnerabilities
and exposures and thus a standardized description for each vulnerability that links the
vulnerability information of different tools and databases.
CVI
See Cluster Virtual IP Address (CVI) (page 1030).
D
Default Element
An Element that is present in the system at installation, or is added to the system during an
upgrade or from a Dynamic Update (Package). Default elements cannot be modified or deleted
by administrators, but they may be modified or deleted by dynamic update packages or
upgrades.
Glossary 1031
Defragmentation
The process by which a large block of data is broken up into smaller pieces (datagrams), so that
it can be packaged and transmitted by the underlying network technology (Fragmentation). Once
the smaller pieces arrive at their destination, the datagrams are reassembled into the larger
block of data (defragmentation).
DHCP (Dynamic Host Configuration Protocol)
A protocol for dynamically assigning IP addresses and other network information to an interface,
based on BOOTP. A device on a network with no network information can broadcast a request for
an IP address, subnet mask, default gateway and other information from a DHCP server on that
same network. DHCP is defined in RFC 2131.
Diagram
An Element that contains one or more network diagrams created using the Diagram Editor.
Digital Certificate
See Certificate (page 1029).
Discard Action
An Access Rule parameter that stops all connections matching to the rule without sending any
notification to the connecting host. Confer to Refuse Action (page 1045).
Dispatch Clustering
See Packet Dispatch (page 1043).
DMZ Network
A DMZ (DeMilitarized Zone Network) is a network separate from both internal and external
networks, and connected through a gateway. Often used for isolating bastion hosts or publicly
available machines, e.g., mail and HTTP servers are typically located on a DMZ network.
Sometimes also referred to as a screened subnetwork.
DNS Spoofing
An attack method whereby the DNS name of a system is assumed by a malicious system, either
by corrupting the name service cache of a victim, or by compromising a domain name server for
a valid domain. The victim system is then directed to the malicious system instead of the
original server.
Domain
Domains are administrative boundaries that allow you to separate the configuration details and
other information in the system for the purpose of limiting administrator access.
DoS Attack (Denial of Service)
An attack with the objective of causing enough disruption in a computer system that its usability
to legitimate users suffers. For example, and attacker may target a website so that it becomes
overloaded, and slows down so much that it becomes unusable for people wishing to view it.
DSCP (DiffServ Code Point)
The Differentiated Services (DiffServ) Type of Service (ToS Flag) field added to packets in the
network.
1032 Glossary
DSCP Mark
A field in QoS Policy rules that writes a particular DSCP (DiffServ Code Point) marker to the
packets, if the QoS Policy is applied on the interface the packets use to exit the firewall.
DSCP Match
A field in QoS Policy rules that assigns the QoS Class specified in the rule to incoming packets
that have a specific DSCP (DiffServ Code Point) marker set, if the QoS Policy is applied on the
interface the packets use to enter of the firewall.
Dynamic IP address
An IP address that is assigned by using the DHCP (Dynamic Host Configuration Protocol).
Dynamic NAT
A way to translate network addresses, where for each original address, a translated address
and possibly a port are selected dynamically from a predefined pool.
Dynamic Update (Package)
A file supplied by Stonesoft that provides updates to Default Elements and policies, most
importantly to the Situation and Vulnerability information that is used for traffic inspection in
Inspection Rules.
E
Element
A StoneGate object representing the equipment in your physical networks or some area or
concept of configuration. Elements may, for example, represent a single device such as a
server, a range of IP addresses, or some configuration aid in the Management Center, such as a
Category. Also see Network Element (page 1042).
Encryption
Used for data security, encryption translates any data into a secret code. Public-key encryption
and symmetric encryption are the main types of encryption. Decrypting ciphertext (encrypted
data) into plaintext requires access to a secret key.
Encryption Domain
Networks that are defined to be behind a certain VPN gateway in a Virtual Private Network (VPN)
configuration.
Encryption Key
The data that is used to convert plaintext to ciphertext. In symmetric algorithms, the same key
is the decryption key as well. In public key algorithms, a different, but related key is used to
convert the ciphertext back into plaintext.
Encryption Policy
Settings that define which encryption and authentication methods are used to establish a
Virtual Private Network (VPN).
Glossary 1033
Enforce VPN Action
A firewall Access Rule parameter that directs traffic from protected local networks into the
Virtual Private Network (VPN) tunnel and allows traffic that arrives through a VPN, and drops any
non-VPN traffic from external networks to the local network that matches the rule. See also
Apply VPN Action (page 1027).
Engine
The device that runs firewall, sensor, or analyzer software; a standard server or a StoneGate
appliance. Represented by a Node in the Management Client.
Ethernet Rules
A set of rules in the IPS Policy that define which Ethernet traffic is allowed or discarded by a
Sensor in Transparent Access Control Mode.
Expression
An Element that can be used to accurately define a whole complex set of elements by including
and excluding elements using logical expressions.
External Gateway
Any Security Gateway (SGW) that is managed by a different Management Server than the one on
which the Virtual Private Network (VPN) is being configured.
F
Filter
A description of log fields and their values combined together using operators for the purpose of
sorting in or out log, alert, and audit entries. Used, for example, to filter out logs from the
display in the Logs View so that those entries that are interesting at the moment can be found
more easily.
Firewall
1) A Network Element that represents the firewall device in the Management Center. Either a
Single Firewall or a Firewall Cluster.
2) The device running the StoneGate firewall software.
Firewall Cluster
A Group of two or more Firewall Engines that work together as if they were a single unit.
Firewall Engine
The device that runs firewall software; a standard server or a StoneGate appliance Represented
by the Firewall Node in the Management Client.
Firewall Node
An individual Firewall Engine in the Management Client, representing a device that runs firewall
software as part of a Firewall Cluster or a Single Firewall.
Forward Action
A firewall Access Rule parameter that directs traffic from protected local networks or from a
Virtual Private Network (VPN) tunnel into another VPN tunnel.
1034 Glossary
Fragmentation
The process by which a large block of data is broken up into smaller pieces (datagrams), so that
it can be packaged and transmitted by the underlying network technology (fragmentation). Once
the smaller pieces arrive at their destination, the datagrams are reassembled into the larger
block of data (Defragmentation).
G
Gateway
A device that provides VPN access for other devices.
Gateway Certificate
A Certificate used for authenticating a Gateway to other Gateways and VPN Clients in a VPN.
Gateway Profile
An element that defines a set of VPN-related capabilities that a VPN Gateway supports.
Gateway Settings
An element that contains general settings for StoneGate firewall/VPN engines related to VPN
performance.
Gateway-to-Gateway VPN
In StoneGate, a Virtual Private Network (VPN) element which is set up so that the VPN is
established between two gateway devices providing connectivity to networks behind the
gateways.
Geolocation
Elements that define a geographical location of an IP address. Used for illustrating networks
and network traffic on a map and other informative purposes in the Management Client.
Granted Element
An Element or Security Policy that an administrator has been given permission to edit and install
when their Administrator Role would otherwise prevent them from doing so.
Group
A Network Element that includes other elements and represents them all at once in policies and
other parts of the configuration. For example, you can define a Group of several WWW-servers,
and then use the Group element in policies when you need to make a rule that concerns all of
the WWW-servers.
H
Hardware
A category of Tags for Situations. Meant for grouping Situations that detect known vulnerabilities
in applications that run on a particular hardware platform.
Glossary 1035
Hash Signature
A cryptography-related concept that refers to a digital fingerprint associated with a given
message and computed with one-way algorithms. Hash signatures are used to secure the
integrity of encrypted data, ensuring that no tampering has taken place during transmission.
See also Client-to-Gateway VPN (page 1030), and SHA-1 (page 1048).
Heartbeat
A protocol that the nodes of a Firewall Cluster or Sensor Cluster use to monitor each other and
for other tasks that are needed for collaboration between each Node.
High Availability
The implementation of clustering technology, hot standby technology, or general redundancy in a
system to increase the availability of an application, service, or network beyond what a single
system is capable of providing. Increased availability is achieved by eliminating all single points
of failure, with clustering technology providing the highest level of availability.
Host
1) A Network Element that represents any single device that has an IP address.
2) Any device connected to a TCP/IP network, including the Internet, with one or more IP
addresses. Hosts are distinguishable from gateways or routers, in that they do not forward, or
route, packets to other networks.
Hot Standby
A solution where one node handles the work load with the support of a back-up node, which
takes over connections in case of failure in the first node.
Hybrid Authentication
A system using both Asymmetric Encryption and Symmetric Encryption. Asymmetric techniques
are used for key management and digital signatures. The symmetric algorithms are used to
encrypt the bulk of data with reduced strain on resources.
I
IKE Proposal
The suggested encryption algorithms, authentication methods, hash algorithms, and Diffie-
Hellman information in the Security Association (SA) component of an IPsec VPN. The initiator of
an IPsec tunnel can make multiple proposals, but the responder only sends one proposal in
return. See also Internet Key Exchange (IKE) (page 1037) and Security Association (SA)
(page 1047).
Incident Case
An Element that administrators can use to gather together all the data, actions, system
configuration information, and files related to a specific incident of suspicious activity.
Incident History
A collection of all the logs and audit entries that track actions performed in a particular Incident
Case window.
1036 Glossary
Info Panel
A tab in Management Client windows that shows information on the selected element or other
object. The Info view shows, for example, the nodes belonging to a selected cluster.
Inherited Rule
A rule either hidden or shown on a grey background in a Security Policy or Template Policy which
has been added in a template higher up in the policy hierarchy so that it has been passed down
to the security policy or template policy. Inherited rules are enforced just as any other rules, but
they can be edited only in the template where the rule was originally added.
Inline Interface
A Sensor interface that combines together two physical interfaces, enabling the traffic to be
routed through as if the Sensor was an extension of the network cable, but allowing the Sensor
to actively monitor packets and connections and stop them according to its Access Rules and
Inspection Rules.
Insert Point
The place in a Security Policy or Template Policy where new rules can be inserted when no rules
have been inserted in that place yet (shown as a green row) or the place in a template policy
where rules can be inserted in inheriting policies and template policies (shown as an orange
row).
Inspection Rule
The definitions on the Inspection tab in a Firewall or IPS policy that defines options for deeper
inspection and reactions to traffic accepted in Access Rules. The matching in Inspection rules is
done based on matching information provided by Situation elements. Confer to Access Rule
(page 1025).
Internal Gateway
A StoneGate Firewall/VPN engine that are managed by the same Management Server on which
the Virtual Private Network (VPN) is being configured.
Internal Network
The networks and network resources that StoneGate is protecting. In StoneGate, there is no
concept of internal and external networks in the system.
Internet Key Exchange (IKE)
A protocol defined by the IPsec (IP Security) standard for securely exchanging key-related
information between connecting hosts when establishing a Virtual Private Network (VPN).
Internet Service Provider (ISP)
A company that provides Internet connectivity to subscribers.
Intrusion Detection System (IDS)
A system that monitors network traffic for determining, and making administrators aware of data
security exploits or attempts by providing logs or other network information. Confer to Intrusion
Prevention System (IPS).
Glossary 1037
Intrusion Prevention System (IPS)
A system that monitors network traffic (like an Intrusion Detection System (IDS)) and has the
capability of actively stopping traffic if it is deemed malicious or otherwise unwanted.
IP Address Bound License
A License file for the engines that includes the information on the IP address of the component
it licenses. If you need to change the IP address of the component, you must request an IP
address change at the Stonesoft Licensing website. On engines, an alternative to a
Management Bound License (page 1040).
IPComp (IP Payload Compression Protocol)
A protocol used to reduce the size of IP datagrams. Increases the overall communication
performance between a pair of communicating gateways by compressing the datagrams,
provided the nodes have sufficient computation power, and the communication is over slow or
congested links. IPComp is defined in RFC 2393.
IP Splicing (or Hijacking)
An attack performed by intercepting and using an active, established session. Often occurs after
the authentication phase of the connection is complete, giving the attacker the permissions of
the original, authenticated user. Encryption at the session or network layer is typically the best
defense from such an attack.
IP Spoofing
A technique used to obtain unauthorized access to computers by sending connection requests
with tampered headers, simulating a trusted source.
IPsec (IP Security)
A set of protocols supporting secure exchange of packets. Used for the implementation of
Virtual Private Network (VPN) solutions when high performance and/or support for a wide variety
of protocols are needed. IPsec provides transport and tunnel encryption modes. IPsec is
defined in RFC 2401.
IPsec Proposal
Suggested encryption algorithms, hash algorithms, authentication methods, etc. to be used for
an IPsec (IP Security) tunnel. See also IKE Proposal (page 1036).
IPS Policy
The Security Policy for IPS Sensors and Analyzers containing the Access Rule and Inspection
Rule definitions that determine how traffic is inspected and how the system reacts when a
match is found.
IPv6 Access Rule
A row in an IPS policy that defines how one type of IPv6 connection is handled by providing
matching criteria based on the source, destination, and protocol information. Confer to Access
Rule (page 1025).
ISAKMP (Internet Security Association Key Management Protocol)
An open-ended encoding protocol necessary for IKE negotiation when establishing Security
Associations. See also Security Association (SA) (page 1047).
1038 Glossary
ISP (Internet Service Provider)
See Internet Service Provider (ISP) (page 1037).
J
Journal
A tool in the Incident Case window that allows administrators to create a permanent record of
their actions while investigating an incident.
Jump Action
A Security Policy parameter that directs the inspection to a Sub-Policy, against which
connections matching the rule with the Jump action are checked. Can be used to speed up
traffic processing, as connections that do not match the Jump rules are not checked against
rules in the sub-policies.
L
License
Files you import to the system to tell the Management Server that the components you have
installed have been legally purchased. You generate the Licenses at the Stonesoft Licensing
website and import them to the Management Server using the Management Client.
Lifetime
The interval at which the IPsec participants should begin to negotiate a replacement Security
Association (SA) (soft lifetime) or the interval at which the current SA for an IPsec tunnel is no
longer valid (hard lifetime) in a Virtual Private Network (VPN).
Load Balancing
A process for distributing work evenly across multiple, available devices to avoid overwhelming
any single system.
Load Balancing Filter
A software component that determines which network connections should be handled by a
particular node in a cluster, based on address information, current load, performance of
individual machines, and other factors.
Load Balanced Routing
A method for choosing routes to destinations based on determining the fastest response time
through multiple gateways. The application of Multi-Link technology to determine which network
link provides the best round trip time.
Load Sharing
The distribution of work between multiple devices. Similar to Load Balancing, but not as
effective, since the techniques used do not ensure an equal distribution of the work load. Load
sharing is typically a static method of distributing a load, whereas load balancing is often a
dynamic method.
Glossary 1039
Location
An Element that groups together system components that are on the same side of a device
doing NAT (Network Address Translation). Used to define Contact Addresses for components
that communicate within the StoneGate Management Center.
Logging Options
A selection available in all rules in policies that determines if and how a record is created when
the rule matches.
Logging Profile
Defines how the Log Server converts Syslog data received from a particular type of third-party
component into StoneGate log entries.
Log Server
A component of the Management Center responsible for storing and managing log (and alert)
data.
Log Spool
A temporary storage area in a firewall node for log data before it is sent to a Log Server.
Logical Interface
An IPS Element used in the IPS policies to represent one or more physical network interfaces as
defined in the Sensor properties.
Logs View
A tool that allows browsing logs, alerts, audit data, and connections each in an adapted version
of the same user interface.
M
Main Mode
An IKE negotiation mode, which exchanges six messages between the end-points of an IPsec
tunnel to complete the negotiation of authentication and keys for a Virtual Private Network
(VPN). Optionally, Perfect Forward Secrecy (PFS) can be applied to protect further negotiations.
See also Aggressive Mode (page 1026) and Perfect Forward Secrecy (PFS) (page 1043).
Malware
Malicious software designed to infiltrate or damage a computer system.
Management Bound License
A License file for StoneGate engines that is based on information on the Management Server’s
Proof of License (POL) code. An alternative to an IP Address Bound License (page 1038).
Management Center
The system consisting of a Management Server, one or more Log Servers and none to several
Web Portal Servers that is used to manage the Firewall Engines, and to store and manage traffic
and system related data.
1040 Glossary
Management Client
A graphical user interface component that provides the tools for configuring, managing, and
monitoring the firewalls, sensors, analyzers, and other components in the StoneGate system.
The Management Client connects to the Management Server to provide these services based
on the Administrator information that you use when launching the Management Client software.
Management Network
The network used for communication between firewalls, Management Servers, Log Servers and
the Management Client.
Management Server
A system component that stores all information about the configurations of all firewalls,
sensors, analyzers, and other StoneGate components in the system, monitors their state, and
provides access for Management Clients when administrators want to change the configurations
or command the engines. The most important component in the system.
Maximum Transmission Unit (MTU)
The largest physical size of a datagram that can be transmitted over a network without
fragmentation. Often expressed in bytes, it can apply to frames, packets, cells or other media,
depending on the underlying topology.
Modem Interface
A firewall interface that defines the settings of a 3G modem that provides a wireless outbound
link for a Single Firewall.
Monitored Element
A StoneGate server or engine component that is actively polled by the Management Server, so
that administrators can keep track of whether it is working or not. All StoneGate system
components are monitored by default.
Monitoring Agent
A software component that can be installed on servers in a Server Pool to monitor the server’s
operation for the purposes of Traffic Management.
Multicast
A technique by which a set of packets are sent to a group of machines sharing a common
address. Unlike broadcast, it does not include all machines, and unlike unicast, it usually has
more than one member of the group.
Multi-Layer Inspection
A hybrid firewall technology that incorporates the best elements of application level and network
level firewalls, with additional technology to enable the secure handling of many connection
types.
Multi-Link
Patented Stonesoft technology to connect one site to another, or to the Internet, using more
than one network link. Applications of Multi-Link technology include inbound and outbound
traffic management for unencrypted as well as VPN traffic. See also Outbound Multi-link
(page 1042).
Glossary 1041
N
NAT (Network Address Translation)
A mechanism for assigning local networks a set of IP addresses for internal traffic and another
for external traffic. It increases security by hiding internal IP addresses and enables hosts with
"invalid" (non-routable) addresses to communicate on the Internet.
NDI
See Node Dedicated IP Address (NDI) (page 1042).
NetLink
An Element used for implementing routing of StoneGate’s Multi-Link features. NetLinks can
represent any IP-based network links (such as ISP routers, xDSL, leased lines, dial-up modems).
NetLinks are combined together into an Outbound Multi-link.
Network Element
1) All Elements that represent one or more components that have an IP address, that is, a
general category (‘Network Elements’) for those elements that represent physical devices and
networks in StoneGate.
2) The Network Element called ‘Network’ that represents a (sub)network of computers. Used for
rules and configurations that are common for all hosts in a specific (sub)network.
Network Scan
A stage of an attack in which the attacker scans the target to enumerate or map the directly-
connected network(s).
Node
The representation of an individual firewall, sensor or analyzer Engine in the Management Client.
Node Dedicated IP Address (NDI)
A unique IP address for each machine. The only interface type for single firewalls. Not used for
operative traffic in firewall clusters and sensors. Firewall clusters use a second type of
interface, Cluster Virtual IP Address (CVI), for operative traffic. Sensors have two types of
interfaces for traffic inspection, the Capture Interface and the Inline Interface.
O
Operating System
A category of Tags for Situations. Meant for grouping Situations that detect known vulnerabilities
in a particular operating system or applications that run on that operating system.
Outbound Multi-link
An Element used for combining NetLinks for load balancing outbound traffic. The NetLinks
included in a Outbound Multi-link element are frequently tested to determine which is the
fastest NetLink for new outbound connections.
1042 Glossary
P
Packet
A segment of data sent across a network that includes a header with information necessary for
the transmission, such as the source and destination IP addresses.
Packet Dispatch
A Cluster Virtual IP Address (CVI) mode in which only one node in the cluster receives packets.
This dispatcher node then forwards the packets to the correct node according to Load
Balancing, as well as handles traffic as a normal node. The recommended cluster mode for new
installations.
Packet Filtering
A method of controlling access to a network, or set of networks, by examining packets for
source and destination address information, and permitting those packets to pass, or halting
them based on defined rules.
Packet Sniffer
See Sniffer (page 1048).
Perfect Forward Secrecy (PFS)
A property of IKE transactions that enhances the secrecy of keys, but requires additional
processing overhead. PFS ensures that the distribution of key-related information remains
independent from previously existing key material. See also Internet Key Exchange (IKE)
(page 1037).
Permission Level
The general level of rights that an Administrator has. Permissions are customized with
Administrator Roles and Granted Elements.
Permit Action
An Inspection Rule action that stops the inspection of all traffic that matches to the rule that
uses the Permit action and lets the traffic continue to its destination.
Phishing
A Social Engineering attack in which a malicious e-mail or web page attempts to solicit sensitive
information such as usernames, passwords, and credit card details by masquerading as coming
from a trustworthy entity.
Player
Any element or IP address that was involved in an incident that is being investigated using the
Incident Case element.
Policy
A container for the Access rules, Inspection rules, and NAT rules.
Policy Routing
User-defined routing based on information that is not normally used in routing, such as the
source IP address, port information, or service type.
Glossary 1043
Policy Snapshot
A record of policy configuration that shows the configuration in the form that it was installed or
refreshed, including the rules of the policy, the elements included and their properties, as well
as the time when the policy was uploaded, and which administrator performed the upload. Helps
in keeping track of configuration changes.
Port Address Translation (PAT)
A process, similar to NAT (Network Address Translation), where the source or destination port is
changed to a different port. PAT is often used to disguise, or masquerade a service in place of
another. See also NAT (Network Address Translation) (page 1042).
Pre-shared Key
A string of characters that is stored on two (or more) systems and that is used for
authenticating or encrypting communications between the systems.
Primary Management Server
The Management Server that is actively used for configuring the system in a system that has at
least one Secondary Management Server.
Probing Profile
Settings that define how a Log Server monitors third-party components.
Proof of License (POL)
A code used for verifying the legitimate purchase of StoneGate software products. Used for
generating License files at the Stonesoft website.
Proof of Serial Number (POS)
Identification code attached to StoneGate appliances.
Protocol
An element that is used inside Service elements to specific a Protocol Agent for the Firewall
Access Rules and the protocol of the traffic for the Inspection Rules.
Protocol Agent
A process on the firewalls that assists the engine in handling a particular Protocol. Protocol
Agents ensure that related connections for a service are properly grouped and evaluated by the
firewall engine, as well as assisting the engine with content filtering or network address
translation tasks. See also Connection Tracking (page 1030).
Protocol Tag
A type for Protocol elements that are only used to define the protocol of traffic for inspection
against the inspection rules. Confer to Protocol Agent.
Proxy ARP
Proxy ARP option on a device that does routing means that the device relays broadcast
messages between two hosts that are in separate physical networks, but still have IP addresses
from the same network. This proxy is needed for the ARP requests, as broadcast messages are
not normally relayed from one network to another. See also Address Resolution Protocol (ARP)
(page 1025).
1044 Glossary
Pruning
Deleting log entries according to Filters either as the logs arrive on the Log Server or before they
are stored (after displaying them in the current view in the Logs view).
Public-key Cryptography
A cryptographic system that uses a pair of keys: a public key, used to encrypt a message, and a
private (secret) key that can decrypt the message. This is also called asymmetric encryption.
Q
QoS Class
An Element that works as a link between a rule in a QoS Policy and one or more firewall Access
Rules. The traffic allowed in the access rule is assigned the QoS Class defined for the rule, and
the QoS class is used as the matching criteria for applying QoS Policy rules.
QoS Policy
A set of rules for Bandwidth Management and Traffic Prioritization for traffic that has a particular
QoS Class, or rules for assigning QoS Classes based on a DSCP Match found in the traffic.
R
Refragmentation
A technique to fragment outbound packets from the firewall in the same manner in which they
were fragmented when the firewall received them. See also Virtual Defragmentation
(page 1053).
Refuse Action
An Access Rule parameter that blocks the packet that matches the rule and sends an error
message to the originator of the packet. Confer to Discard Action (page 1032).
Regular Expression
A string that describes a set of strings. Used in many text editors and utilities to search for text
patterns and, for example, replace them with some other string. In StoneGate, regular
expressions are used, for example, for defining patterns in traffic that you want a certain
Situation to match when you give the Situation a Context that calls for a Regular Expression.
Related Connection
A connection that has a relationship to another connection defined by a Service. For example,
the FTP protocol defines a relationship between a control connection, and one or more data
connections at the application level. The firewall may be required to allow a connection that
would otherwise be discarded, if it is related to an already allowed connection.
Request for Comments (RFC)
A document that outlines a proposed standard for a protocol. RFCs define how the protocol
should function, and are developed by working groups of the Internet Engineering Task Force
(IETF), and reviewed and approved by the Internet Engineering Steering Group (IESG). See
http://www.rfc-editor.org/.
Glossary 1045
Retained License
A Management Bound License that has been used to install a policy on an engine and has then
been unbound without relicensing or deleting the engine the license was bound to. Retained
licenses cannot be bound to any engine before the engine the license was previously bound to
is deleted or has a new policy refresh with a valid license.
RFC
See Request for Comments (RFC).
Rootkit
A set of tools that intruders to computer systems use for hiding their presence and the traces of
their actions.
Route
The set of routers or gateways a packet travels through in order to reach its destination. In TCP/
IP networks, individual packets for a connection may travel through different routes to reach the
destination host.
Router
A Network Element representing a physical router in your network. Most often used to indicate
next-hop routers in the Routing view and in Network Diagrams.
Routing Table
A database maintained on every router and gateway with information on paths to different
networks. In StoneGate, the routing table is represented graphically in the Routing view.
Rule
An expression used to define the eventual outcome of packets arriving at the firewall, which
match certain conditions (e.g., source and destination address, protocol, user).
Rules Tree
The main configuration tool for adjusting Inspection Rule definitions.
S
SA (Security Association)
See Security Association (SA) (page 1047).
Scan
See Network Scan (page 1042).
Secondary IP address
An IP address used for identifying an element with multiple addresses as a source or
destination of traffic, defined in addition to a primary IP address.
Secondary Log Server
A Log Server defined as a backup channel for components that primarily send their logs to some
other Log Server.
1046 Glossary
Secondary Management Server
A redundant Management Server that replicates the configuration data from the Primary
Management Server under normal conditions so that the services offered by the Management
Server can be used without interruption if components fail or are otherwise unavailable.
Secret Key Cryptography
See Symmetric Encryption (page 1050).
Security Association (SA)
A unidirectional, logical connection established for securing Virtual Private Network (VPN)
communications between two sites. A security association records the information required by
one site to support one direction of the IPsec connection whether inbound or outbound. It uses
transport mode for communications between two hosts and tunnel mode for communication
between security gateways. See also Authentication Header (AH) (page 1028).
Security Gateway (SGW)
A device, typically a firewall, that performs encryption/decryption on Virtual Private Network
(VPN) packets sent between Sites through untrusted networks.
Security Parameter Index (SPI)
A value used by AH and ESP protocols to help the firewall cluster select the security association
that will process an incoming packet. See also Authentication Header (AH) (page 1028).
Security Policy
The set of templates, policies, and sub-policies together or individually that define what traffic is
acceptable and what traffic is unwanted. Policies are defined using the Management Client,
stored on the Management Server and installed on firewalls, sensors, and analyzers, which then
use their installed version of the policies to determine the appropriate action to take regarding
packets in the network.
Sensor
A StoneGate IPS component that captures all the traffic from a physical network link, inspects it
according to its policy, and if installed inline, selects which connections are allowed to continue.
Provides data for the Analyzer (see Analyzer (page 1027)).
Sensor Cluster
Group of two or more IPS Sensor nodes that work together as if they were a single Sensor.
Server
1) A Network Element representing a physical server in your network. Generally, server elements
are only defined to configure a specific server for use with the Management Center (such as a
RADIUS server used for authenticating administrators), but generic Servers can be used in
Network Diagrams instead of Host elements to better illustrate the network layout.
2) In a client-server architecture, a computer that is dedicated for running services used by
Client computers. The services may include, for example, file storage, e-mail, or web pages.
Server Pool
A Network Element representing a group of Servers. Used for inbound traffic management.
Glossary 1047
Server Protection Credentials
An element that stores the private key and certificate of an internal HTTPS server. The private
key and certificate allow the engine to present itself as the server to clients so that the engine
can decrypt and inspect incoming HTTPS traffic. Also see Client Protection Certificate Authority
(page 1030).
Service
An Element that is used for matching traffic to an application level protocol, for example, FTP,
HTTP or SMTP. The TCP and UDP Services also determine the port number. Service elements are
used in policies to make the rule match only a particular protocol, to enable Protocol Agents,
and select traffic to be matched against Inspection Rules.
Session Stealing
See IP Splicing (or Hijacking) (page 1038).
SHA-1
A cryptographic algorithm used for hash functions. It generates a 160-bit signature from an
input of any length. See also Hash Signature (page 1036).
Single Firewall
A firewall that has only one Firewall Engine.
Single Point of Failure
The point at which the failure of a single device or component of a system will lead to either the
failure of the entire system, or the inability to use services normally provided by that system.
Redundant systems, using high availability technologies, eliminate single points of failure.
Site
A set of resources protected by StoneGate.
Situation
1) An Element that identifies and describes detected events in the traffic or in the operation of
the system. Situations contain the Context information, i.e., a pattern that the system is to look
for in the inspected traffic.
2) An Inspection Rule cell where Situation elements are inserted.
Situation Type
A category of Tags for Situations. Meant for indicating what kind of events the associated
Situations detect (for example, Attacks, Suspicious Traffic).
Sniffer
A device or program that captures data traveling over a network. Sniffers are often used for
troubleshooting network problems, as they can show the packet flow taking place. They can also
be used maliciously to steal data off a network.
SNMP Agent
A software component that sends SNMP traps when specific events are encountered.
1048 Glossary
Social Engineering
An attack involving trickery or deception for the purpose of manipulating people into performing
actions or divulging confidential information.
SOHO Firewall
A Small Office/Home Office Firewall appliance with WLAN (Wireless Local Area Network)
features and an integrated ADSL modem to provide small remote site or home office users
access to the main company network through a wired or wireless connection.
SPI (Security Parameter Index)
See Security Parameter Index (SPI) (page 1047).
SSH (Secure Shell)
A program to log into another computer over a network, to execute commands in a remote
machine, and to move files from one machine to another. It provides strong authentication and
secure communications over insecure channels. Often used as a replacement for insecure
programs such as telnet or rsh. In StoneGate, SSH can be used for remotely accessing the
engine command line.
SSL VPN
A VPN technology that utilizes SSL encryption to secure users’ remote access to specific
applications. Allow authenticated users to establish secure connections to a limited number of
specific internal services through a standard web browser (“clientless” access) or through a
client application that allows a wider range of services.
Standby Management Server
See Secondary Management Server (page 1047).
Standby Mode
An operating state of a StoneGate cluster that keeps one node online and the rest in standby,
so that State Synchronization is done, but node does not process the traffic. If the online node
is taken offline or fails, one of the standby nodes takes over the existing connections.
State Synchronization
The communication of connection tracking information between several firewall nodes in a
cluster. Can be either a full synchronization, where all connection tracking information is
transferred to the other nodes of a cluster, or an incremental synchronization, where only the
information on connections changed after the last synchronization are transferred. See also
Connection Tracking (page 1030).
Static IP address
IP address that is typed in by a user or an administrator, and which does not change without
their action.
Static NAT
NAT (Network Address Translation) where for each original address, there is a single, predefined
translated address.
Glossary 1049
Static Routing
A form of routing that has permanent routes between networks programmed into every Routing
Table.
Sub-Policy
A set of rules that are separated from the main policy, based on some common category, such
as the service or the destination IP address. In this way, related rules can be grouped together
to make the entire policy easier to understand. Because subrules are only processed if the
general rule in the main policy matches, the overall processing time is improved.
Subtunnel
The actual tunnels that are combined logically within a multi-route VPN tunnel in a StoneGate
Multi-Link environment. They represent all possible routes that connect the end-points of the
security gateways between which a Virtual Private Network (VPN) is formed. The individual
subtunnels may connect the two gateways through different network links.
Symmetric Encryption
An Encryption mechanism that uses the same shared secret key for encrypting and decrypting
messages. It is often referred to as symmetric bulk encryption since it processes large amounts
of data rather quickly. Also known as conventional or secret key cryptography. There are two
main types of symmetric encryption algorithms, bulk and stream encryption (also known as
block ciphers and stream ciphers). Common symmetric algorithms are DES and 3DES. See also
Asymmetric Encryption (page 1027).
Syslog
A standard protocol for exchanging logs between network components. Defined in RFC 5424.
System Summary
A panel in the System Status view that provides a general summary view of the current status of
the monitored elements according to the component type.
T
Tag
An Element for organizing Situations. Tags can also be used in Inspection Rules, in the Situation
cell, to represent all Situations marked with that Tag.
Takeover Period
The time interval during which the active nodes in a firewall or sensor cluster collaborate to
redistribute the work load of a failed node.
Task
An Element that allows you to schedule commands to run automatically at a convenient time.
Template Policy
A combination of rules and Insert Points, which is used as a basis when creating policies or
other template policies. Policies and template policies created from a particular template policy
then inherit all the rules from that template policy and any of the template policies higher up in
1050 Glossary
the inheritance hierarchy. The Inherited Rules cannot be edited within the inheriting policy. Used,
for example, by high-privilege Administrators to restrict changes administrators with a lower
Administrator Role can make to rules.
Temporary Filter
A log filter that is created from details of entries in the Logs View or the Connections view, and
which is only available until the view is closed.
Terminate Action
An Inspection Rule parameter that stops or attempts to stop the connection matching to the
rule according to the Action Option selected and the whether the Engine where the rule matching
occurs is capable of stopping the connection.
Tester
A tool that can automatically run tests on StoneGate engines to check system or network
operation and take action based on the results of those tests.
Timeline
A tool in the Logs View that allows you to select and change the time range for the logs that are
displayed.
ToS Flag
A data field in IP packet headers that provides a number representing the type of the service the
packet is a part of. The ToS flag is used for Traffic Prioritization and is also know as DSCP
(DiffServ Code Point).
Traffic Handler
The set of Network Elements used for inbound and outbound traffic management. Includes
NetLinks, Outbound Multi-links, and Server Pools.
Traffic Management
The control, definition, and management of how packets or connections should flow through
firewalls, routers, network links, VPNs or other gateway objects, based on load balancing,
clusters, availability of links and more.
Traffic Prioritization
The process of assigning traffic a priority value, which is used to determine the order in which
queued packets are sent forward, overriding the standard first-come-first-served operation of
network devices. Used for assuring Quality of Service (QoS) for time-critical connections. Can be
used together with Bandwidth Management or on its own. See also DSCP (DiffServ Code Point)
(page 1032), QoS Class (page 1045) and QoS Policy (page 1045).
Transparent Access Control Mode
A Sensor configuration in which the Sensor examines Ethernet traffic according to the Ethernet
Rules.
Transparent Proxy
A technique whereby a connection is routed to a proxy server, which then establishes a second
connection to the original destination host, but the entire transaction takes place without
notifying the user, or requiring the user to perform any additional actions.
Glossary 1051
Transport Protocol
Any protocol that communicates and functions on the transport layer of the TCP/IP protocol
stack. These protocols function above the network layer, and are usually responsible for error
correction, quality of service, and other characteristics not handled by the network layer. TCP,
UDP, and IPsec are common examples of transport protocols.
Tunneling
A technology that enables one network to send its data through another, perhaps dissimilar,
network. Tunneling works by encapsulating, or packaging, a network protocol within packets
carried by the second network.
U
Use IPsec VPN Action
A firewall Access Rule parameter that directs traffic matching to the rule to a VPN. Can be either
an Apply VPN Action or an Enforce VPN Action.
UDP Tracking
Information maintained by the firewall engines to group together UDP requests and replies,
handling them as a single virtual connection. See also Virtual Connection Tracking (page 1052).
User
An Element that defines an end-user in your network. Used for defining Authentication with or
without Client-to-Gateway VPN access. Confer to Administrator (page 1025).
User Response
Defines additional notification actions for rule matches, such as redirecting access to a
forbidden URL to a page on an internal web server instead.
UTM (Unified Threat Management)
A device that combines different types of traffic filtering in one physical appliance. The features
offered in a UTM device vary greatly from vendor to vendor. The StoneGate UTM comprises a
firewall, deep packet inspection (IDS), and antivirus.
V
Virtual Adapter
A component of the StoneGate VPN Client, or a third-party VPN client, that allows using a
second, Virtual IP address for Virtual Private Network (VPN) traffic. Shown as a network adapter
in the operating system.
Virtual Connection Tracking
A superset of UDP tracking, ICMP tracking, etc. A technology that is used by the firewall engines
for connectionless network protocols like UDP and ICMP. The firewall engines keep track of
virtual connections by grouping together packets that are related, based on information in the
packet headers. See also Related Connection (page 1045).
1052 Glossary
Virtual Defragmentation
A procedure in which incoming packet fragments are collected. The packet is defragmented for
processing by the firewall engine, and refragmented before it is transmitted again. See also
Fragmentation (page 1035).
Virtual IP address
A second IP address that is given to a VPN Client that has a Virtual Adapter enabled, and that is
connecting to a security gateway using Client-to-Gateway VPN. A virtual IP address enables the
use of certain services that require the client to have an IP address belonging to a specific
address range, while enabling it to retain its primary IP address for maintaining other
connections. The Virtual IP address for StoneGate VPN Clients is always assigned by DHCP
(Dynamic Host Configuration Protocol).
Virtual Local Area Network (VLAN)
A local area network which is defined through software in a switch or other networking device,
rather than by the more traditional hardware division.
Virtual Private Network (VPN)
Refers to a confidential connection that is established through unsecured networks by the
means of authentication, encryption, and integrity checking. The two major VPN technologies
are IPsec (IP Security), which is better suited when a wide variety of network services and large
traffic volumes are involved, and SSL VPN, which is used to provide access to a limited number
of services to individual users without client-side device configuration.
VPN Client
Software that can be used to establish a Virtual Private Network (VPN) with a VPN gateway
device to securely access remote resources over insecure networks.
VPN Profile
An element that defines the IPsec (IP Security)-related settings for one or more VPNs.
Vulnerability
An IPS element that contains information on a publicly known flaw that affects security of some
system. Vulnerabilities are attached to Situations to provide you more information on what has
happened when the Situation matches.
W
Web Filtering
A feature that compares the URLs that users attempt to open to a list of URLs to prevent users
from intentionally or accidentally accessing most web sites that are objectionable or potentially
harmful.
Web Portal
Browser-based service that allows users to view logs, Policy Snapshots, and reports.
Whitelisting
The process of exempting specific traffic from being blocked by Blacklisting or Web Filtering.
Glossary 1053
1054 Glossary
I NDEX
Numerics with granted elements, 220
3DES , 738 ADSL interfaces
changing ISP settings for, 363
defining for SOHO firewalls, 367
A advanced settings , 416, 418
access control lists analyzers, 416
creating, 217 cluster mode, 419, 429
in engine properties, 408 default termination option for sensors, 428
predefined, 221 firewalls, 416
access rules heartbeat traffic, 419
blacklisting, 522 modifying, 416
creating and modifying, 518 node state synchronization, 420
creating from logs, 143 sensor-analyzers, 416
deep inspection, 527 sensors, 416
firewall traffic handling options, 523 agents , 579
for CIS redirection, 674 for server pool monitoring, 471
for HTTPS inspection, 668 for SNMP, 432
hits, 515 aggressive mode , 737
logging options, 528 AH , 738
response options, 527, 528 alert browser, see logs view
validity time, 555 alert channels , 233, 242
acknowledging alerts , 240 alert entry fields , 980
action field , 1000 alert server , 278
active directory servers , 627 alert trace entry fields , 980
authentication settings, 629 alerts
LDAP settings, 628 acknowledging, 240
active VPN tunnels , 747 channels, 236
address range element , 563 custom, 231
administrative domains, see domains default alert, 231
administrator accounts event traces, 129
access control lists, 217 on engine status, 193
administrator element, 218 policies, 238
creating, 218 redirecting chains, 237
deleting, 227 system, 231
domains, 221 test, 231
getting started, 214 testing, 244
granted elements, 220 threshold to block, 236
log colors, 222 aliases , 943
password policy, 223 DHCP, 363
password strength, 225 network element, 564
passwords, changing, 226 system aliases, 944
permission levels, 220 translation values, 412
RADIUS authentication, 226 user aliases, system-defined, 944
troubleshooting, 853 allow SA to any network , 739, 741
administrator messaging , 52 analyzers
administrator permissions command line tools, 201
descriptions, 216 creating element for, 318
in engine properties, 408 editing properties of, 336
administrator roles network interfaces, 377
creating, 215 timeout for failover to backup analyzer, 427
in engine properties, 408 troubleshooting, 875
predefined, 221 announcements , 266
using, 220 anti-clogging settings , 778
Index 1055
anti-replay window , 739 browser-based access , 256
antispoofing
disabling, 455 C
for routable IP addresses, 456
CA (certificate authority) for HTTPS inspection , 662
modifying, 454
CA (certificate authority) for VPNs , 726, 742, 756, 757
anti-virus , 417, 424
capture interfaces , 381
application portal , 322
category filters , 72
apply NAT rules option , 743
activating, 73
archiving log data , 802
combining, 74
ARP (address resolution protocol) , 387
creating, 72
audit entry fields , 981
category-based web filtering , 652
audit entry types , 1010
central gateways, in VPNs , 745
auditing , 105, 157, 812
certificate cache settings , 778
authentication
certificates , 870
groups, defining, 638
automated node certificate renewal, 417, 427, 428
LDAP, 626
checking expiration for VPN, 108, 766
RADIUS, 226
expiration, 868
servers, 635
for VPN authentication, 756
users, 623, 640
renewing engine certificates, 871
authentication services , 637
renewing log server certificates, 870
auto recovery , 399
renewing management server certificates, 870
automated node certificate renewal , 417, 427, 428 troubleshooting, 867
automatic blacklisting , 681, 682
VPN certificate expiry, 765
automatic reboot , 417
VPN certificate renewing, 763
certifying log server , 278
B changing administrator passwords , 226
background templates for PDFs , 51 changing IP addresses of SMC components , 304
backups , 793 changing platform , 304
automating, 817 channels for alerts , 233, 236
creating, 795 CHAP , 629
deleting, 795 charts , 38, 92
files, 794 checking file integrity , 835, 841
restoring, 796 checking status using tests , 398
restoring across management servers, 299 checking version
types of, 795 engines, 840
balancing cluster mode , 419, 429 management center, 834
base DN , 628 CIS (content inspection server)
basic routing , 441 access rules for, 674
between operation , 163 element, defining, 671
blacklist snapshots , 99 inspected services, 671
comparing, 101 NAT rules for CIS redirection, 675
exporting, 100 redirecting traffic to, 669, 670
opening, 100 services for, 672, 673
blacklisting , 677 classes for traffic , 617, 618
automatic, 681, 682 client protect certificate authorities , 659
firewall rules, 680 exporting certificates, 662
getting started with, 678 generating certificates, 661
in access rules, 522 importing certificates, 660
in inspection rules, 682 client security checks , 741
manually, 198 client-to-gateway VPNs , 701, 716, 718, 727
monitoring, 97 authentication settings for, 740
snapshots of, 99 creating certificates for, 761
blacklisting URLs , 653 hub configuration, 772
bookmarks , 41 NAT in, 786
boot recovery , 399 relaying DHCP requests in, 788
1056 Index
virtual IP addresses, 787 corporate interfaces , 364, 370
closing connections manually , 198 correlations , 597, 602
cluster virtual IP addresses , 356 event compress, 603
clusters event count, 604
cluster virtual IP addresses, 356 event group, 604
disabling nodes, 195 event match, 605
node dedicated IP addresses, 356 event sequence, 606
re-enabling nodes, 196 counting rule hits , 515
setting mode for, 429 create multiple SOHO firewalls , 316
setting operating mode for, 419 CRLs (certificate revocation lists)
CN , 628 for HTTPS inspection, 664
CN authentication , 741 for VPN certificates, 757
code for ICMP , 575 current events mode , 137
color selection for logs , 141 custom
column selection in logs , 139 alerts, 231
combined sensor-analyzer situations, 597
creating element for, 321 customer service , 24
combined sensor-analyzers CVI (cluster virtual IP address) , 356
editing properties of, 339
command line D
accessing on engines, 202
data collection tab , 180
command line tools , 917
data filters , 160
commanding engines , 190
creating, 162
commands
examples of, 161
engine, 926
organizing, 164
log server, 918
using, 165
management server, 918
database password , 303
comments in rules , 513
date field resolvers , 118
communications between components , 59
DDNS (dynamic domain name service)
configuration data, encryption of , 417
defining DNS server element, 491
conflicting element resolving at import , 76
defining DNS update information, 492
connecting engines to SMC , 392
defining dynamic DNS rule, 493
connection states , 1016
for inbound load balancing, 490
connection timeouts , 419
security, 490
connections
DDoS (distributed denial of service) , 525
blacklisting manually, 198
deactivating tests , 405
monitoring, 97
decreasing log text size , 139
snapshots of, 99
deep inspection
terminating manually, 198
in IPS access rules, 527
connections snapshots , 99
default
comparing, 101
alert, 231
exporting, 100
basic routes, 441
opening, 100
connection timeouts, 419
connectivity diagrams , 168
firewall policy template, 499
contact addresses , 60
policy template, 499, 560
defining, 62
termination option for sensors, 428
firewall clusters, 356
defining
contact node timeout , 416
backup tasks, 817
contact policy , 423
custom situations, 597
context options
domain logos, 248
for correlation situations, 602
domains, 247
for situations, 599
dynamic IP for firewall, 362
controlling engines
ethernet rules, 516
on command line, 201
ethernet services, 577
rebooting, 191
filters, 160
state changes, 189, 201
Index 1057
MAC address elements, 518 disabling
policy refresh tasks, 818 anti-replay window in VPNs, 739
policy upload tasks, 818 sites in VPNs, 746
remote upgrade tasks, 819, 820 distinguished name , 628
routing, 453 distributing web start clients from web server , 272
server pools, 469 DNS (domain name service) , 367
services, 574 DNS addresses
tasks, 815 searching, 48
tests, 398 DNS resolving in logs , 140
deflate compression, for VPNs , 739 documentation available , 23
defragmentation, virtual , 418 domain logos , 248
deleting domains
administrator accounts, 227 announcement tab, 266
bookmarks, 41 creating, 247
domains, 250 deleting, 250
elements, 79 domain overview, 252
log data, 802, 805 getting started, 246
report tasks, 155 logging in to, 249
DES , 738 logging out of, 250
destination cache , 464 logos for, 248
destination IP address , 562 moving elements between, 250
details arrangement in logs , 131 shared domain, 246
DHCP , 388 DoS (denial of service) , 525
aliases, 363 DSAP , 577
element, 446 DSCP , 616
index, 363 duplicating engine elements , 323
relay, 447, 788 dynamic firewall IP addresses , 362
server for SOHO firewalls, 317 dynamic update packages , 209, 210, 845
DHCP relay dynamic updates , 209, 210, 845
sub-policies, 447
diagnostics logging , 193 E
diagrams , 167
elements
arranging selected elements, 172
address ranges, 563
background images, 169
administrators, 218
changing detail level, 175
aliases, 564
changing the background color, 169
categories, 72
collapsing clusters or groups of elements, 175
certificate authority, 757
connectivity, 168
domains
creating
expressions, 565
automatically from configured elements, 172
filtering out from view, 72
connecting elements, 173
firewall (single), 361
from new elements, 170
firewall clusters, 361
links between diagrams, 174
gateway profiles, 718
manually, 171
gateway settings, 774
turning points, 173
groups, 567
exporting, 176
hosts, 568
getting started with, 168
importing and exporting, 75
IP, 168
incident case, 177
modifying layout, 172
locations, 61
printing, 176
locking, 79
specifying parent diagrams for, 174
networks, 569
VPN, 168
outbound multi-link, 461
zooming, 176
routers, 570
diffie-hellman , 739
sites, 729
diffserv code point , 616
SNMP agent, 432
1058 Index
tasks, 813 upgrading, 210
unlocking, 79 equal to operation , 163
user groups, 637 error messages , 857
users, 637 ESP , 738
VPN, 742 ethernet rules
VPN profiles, 734 defining, 516
web portal users, 260 ethernet services , 573, 577
encapsulating VPN traffic , 725 event compress , 603
encryption key length , 776 event count , 604
encryption of configuration data , 417 event field , 1000
end-points event group , 604
contact addresses for external end-points, 68 event match , 605
external, 724 event sequence , 606
internal, 722 event traces, alert , 129
endpoint-to-endpoint tunnels , 746 event visualization panel in logs , 129
engine certificates, renewing , 871 exceptions in inspection rules , 535
engines excluding log server from reporting , 906
activating SNMP agent on, 435 expired certificates , 868
alias translations for, 411 exporting
anti-virus, 417, 424 diagrams, 176
automatic reboot, 417 elements, 75
changing control IP address, 331 filters, 284
to different network, 332 log data, 141, 809
within same network, 331 to syslog, 282
changing passwords, 194 logs, 141
command line tools, 201 reports as PDF, 156
commands, 190 reports as text, 156
contact addresses for, 62 to syslog, 282
creating elements for, 313 users, 645
duplicating elements for, 323 expression element , 565
editing configurations, 196 external
FIPS mode, 417 authentication servers, 634
firewall contact policy, 419 LDAP servers, 626
getting started with, 312 SOHO firewall interface, 364
granted policies, 409 SOHO firewall interfaces, 366
locations, 62 test type, 400
log compression, 426 VPN endpoints, 724
log spooling, 426 external LDAP
modifying, 323 schema files, 974
operating state changes, 189, 201 external security gateways, in VPNs , 692
permissions, 408
policy handshake, 417 F
policy routing, 418
facility field , 997
rebooting, 191
false by comparison/filter , 162
reconfiguring basic settings, 203
field resolvers , 113, 117
refreshing current policy, 192
fields panel in logs , 129, 133
restoring previous configuration, 205
file system space test , 400
rollback timeout, 417
filter types , 164
scripts for, 204
filtering web pages , 652
standby, 191
filters
SYN flood protection, 425
applying, 165
tests, 400
category filters, 72
time synchronization, 340
creating, 162
troubleshooting, 875
defining, 160
turning offline, 191
examples of, 161
turning online, 190
Index 1059
for elements in view, 72 forgotten passwords , 854
getting started with, 160 forwarding settings, for VPNs , 745, 746
in query panel, 134 fragmented packets , 418
load balancing, 421 free swap space test , 400
organizing, 164 FTP protocol agent , 580
specifying filter types, 165 full sync , 420
finding
DNS addresses, 48 G
IP addresses, 47
gateway profiles, for VPNs , 718
users, 46, 49
gateway settings , 774
fingerprint of certificates , 924
anti-clogging, 778
fingerprint syntax , 947
assigning to engines, 779
FIPS , 417
certificate cache, 778
firewall clusters
general, 776
adding nodes to, 330
negotiation retry, 777
contact addresses, 356
gateway-to-gateway tunnels , 746
creating element for, 314
gateway-to-gateway VPNs , 688, 692, 716, 718
disabling nodes, 195
generating licenses , 824
editing properties of, 334
geolocation , 103
IP addresses, 356
go offline command , 191
re-enabling nodes, 196
go online command , 190
firewall interfaces
granted elements , 220
advanced properties, 349
granularity of SAs , 739, 741
configuring, 343
GRE , 575, 582, 901
firewall log fields , 982
group element , 567
firewalls
grouping services , 578
adding nodes to cluster, 330
GroupObjectClass , 632
ADSL interfaces, 348
guarantees for traffic , 616
blacklisting rules, 680
guest interfaces , 364, 372
clusters, 361
clustering options, 419
command line tools, 201 H
contact policy, 419, 423 H.323 protocol agent , 582
creating element for clustered, 314 hairpin NAT , 546
creating element for single, 313 hardware requirements , 24
default policy template, 499 heartbeat traffic , 419
DHCP, 388 hex panel in logs , 129
editing configurations, 196 history of log data management , 812
editing properties of clustered, 334 hits in access rules , 515
editing properties of single, 333 host element , 568
getting started with, 56 HTML tags in announcements , 266
HTTPS inspection, 665 HTTP protocol agent , 583
interface options, 361 HTTPS for Web Portal , 258
load charts, 38, 92 HTTPS inspection
modem interfaces, 358 access rules, 668
network interfaces, 343 client protect certificate authority, 659
offline mode, 191 client protection, 656, 659, 660, 661, 662
online mode, 190 HTTPS inspection exceptions, 666
physical interfaces, 344 in engine properties, 665
policies, 497 limitations, 656
rebooting, 191 security considerations, 656
single, 361 server protection, 656, 658
standby mode, 191 services for, 667
troubleshooting, 875 trusted certificate authorities, 663
VLAN interfaces, 346 trusted certificate authority, 662, 663, 664
font size in logs , 139 HTTPS protocol agent , 583
1060 Index
hub configuration for VPNs , 772 interfaces
hub configuration, for VPNs , 709 ADSL, 348
hybrid authentication , 741 analyzers, 377
capture, 381
I firewall clusters, 356
inline, 383
IAS , 629
link speed setting, 621
ICMP , 575
logical, 380
ICMP service groups , 578
QoS policy setting, 621
icon display in logs , 140
reset, 381
ID in rules , 513
sensor-analyzers, 377
ID value, in VPN end-points , 724
sensors, 377
IGMP-based multicast forwarding , 447
single firewalls, 351
IKE (internet key exchange) settings , 735
SOHO firewalls, 364
importing
speed, 621
elements, 75
VLAN, 346, 384
licenses, 824
internal security gateways, in VPNs , 688
resolving conflicting elements, 76
internal VPN endpoints , 722
users, 644
IP addresses
in operation , 163
defining, 562
inbound load balancing
dynamic firewall addresses, 362
creating rules for, 489
firewall clusters, 356
using DDNS updates, 490
resolving in logs, 140
inbound traffic management
searching, 47
creating rules for, 489
single firewalls, 351
incident cases , 177
virtual, 787
attaching information to, 180
IP diagrams , 168
changing priority, 184
IP protocols , 575
changing state, 185
IP-proto service groups , 578
creating, 179
IPS
editing, 184
blacklisting, 681
incident history, 185
getting started with, 57
incident history, checking , 185
policies, 497
incr sync , 420
system communications interfaces, 378
increasing log text size , 139
system template, 499
initial configuration , 392, 393, 395, 396
troubleshooting, 875
inline interfaces , 383
IPS log fields , 984
inline pair link speed test , 400
IPS recording logs fields , 996
insert points in template policies , 498
IPsec (internet protocol security) , 716
inspecting tunneled traffic , 429
IPsec settings (phase 2) , 737
inspection rules
iptables , 124
blacklisting, 682
IPv4 encapsulation protocol agent , 584
creating from logs, 143
IPv6 access rules
editing, 531
creating from logs, 143
exceptions, 535
IPv6 encapsulation protocol agent , 585
logging in exceptions, 543
IPX , 577
logging in rules tree, 533
is defined operation , 163
protocol, 536
rules tree, 511, 531
severity, 536 J
installation directory , 837 java web start , 269, 270
installation files
creating CD-ROMs, 836 K
installing
kay-value pairs , 116
policies, 501
keep IPsec tunnels alive, on SOHO firewalls , 372
key-value pairs , 113
Index 1061
L disabling, 808
LDAP immediate discard filters, 807
configuring schema files, 627 log server
external, 626 certifying, 278
GroupObjectClass, 632 changing IP address of, 304
server elements, 629 log server certificates, renewing , 870
user services, 628, 631 log spooling , 418, 426
UserObjectClass, 632 log storage selection in logs view , 136
LDAP (Lightweight Directory Access Protocol) logging options in inspection exceptions , 543
schema updates, 974 logging options in inspection rules tree , 533
length of encryption key , 776 logging profiles , 113, 114
licenses , 824 logical interfaces
automatic upgrades, 210 in engine properties, 380
generating, 824, 826 logos for domains , 248
importing, 824 logs
maintenance contract information, 107, 211 action field values, 1000
retained type, 829, 830 additional payload, 1015
support level information, 107, 211 alert entry fields, 980
troubleshooting, 879 alert trace entry fields, 980
upgrading, 824 attaching to incident cases, 143
limits for traffic , 616 audit entry fields, 981
link speed , 621 connection states, 1016
link status test , 400 creating rules from, 143
LLC , 577 event field values, 1000
load balancing exporting, 141
filter, 421 filtering in the logs view, 134
inbound firewall log fields, 982
creating NAT rules for, 489 for VPNs, 753
creating rules for, 489 IPS log fields, 984
using DDNS updates, 490 IPS recording log fields, 996
outbound, 459 log field values, 976
creating NAT rules for, 465 non-exportable log fields, 976
getting started with, 460 SSL VPN log fields, 997
load charts , 38, 92 syslog entries, 1014
local management server , 302 troubleshooting, 883
local security checks , 741 VPN log messages, 1005
locations logs view
creating, 61 colors, 141
getting started with, 60 column selection, 139
selecting for management clients, 69 create rule action, 143
lock offline command , 191 current events mode, 137
lock online command , 190 details, 131
log colors, customizing , 222 filtering logs in, 134
log compression , 349, 418, 426 opening, 128
log data , 127, 799 query, 134
analyzing, 282 records arrangement, 128
archiving, 802 resolving details, 140
attaching to incident cases, 180 retrieving traffic recordings from, 142
clean-up operations, 800 senders, 136
deleting, 802, 805 sorting entries, 138
exporting, 141, 809 statistics, 132
to syslog, 282 storage, 136
filtering, 160 text size, 139
managing, 800, 802, 805, 807, 809, 812 time zone, 139
pruning, 807 timeline, 137
log pruning , 807
1062 Index
M hairpin, 546
MAC address elements , 518 pool for VPN clients, 786
MAC addresses , 387 troubleshooting, 894
MAC type , 577 with VPNs, 743
main mode , 737 NDI (node dedicated IP address) , 356
maintenance contract information , 107, 211 negotiation mode , 737
managed units , 825 negotiation retry , 777
management center NetBIOS protocol agent , 586
changing platform, 304 NetLinks
reconfiguring, 301 adding probe IP addresses, 443
management clients adding to outbound Multi-Link elements, 463
locations, 69 changing the state of, 195
troubleshooting, 887 creating, 443
web start, 269, 273 destination cache settings, 464
management databases status icons, 90
changing password, 303 system communications, 70
synchronizing, 298 network elements , 562
management server certificates, renewing , 870 address ranges, 563
management servers , 302 aliases, 564
announcement tab, 266 categories, 72
changing active, 297 deleting, 79
changing IP address of, 304 expressions, 565
database synchronization, 298 filtering out from view, 72
manual blacklisting , 198 firewall (single), 361
manual CRL server , 758 firewall clusters, 361
max packet size for DHCP requests , 788 groups, 567
messages to administrators , 52 hosts, 568
MIBs , 120, 432 networks, 569
mirrored SSL VPN appliances , 322 outbound multi-link, 461
mobile VPN , 781 references, searching, 46
modem interfaces , 358 removing, 79
changing PIN code, 360 routers, 570
monitoring , 83 network interface configuration , 341
connections or blacklisting, 97 network interfaces , 377
status of external devices, 119 ADSL, 348
third-party devices, 111 analyzers, 377
user authentication, 649 capture, 381
VPNs, 753 configuring, 341
moving elements between domains , 250 firewall clusters, 356
MSRPC protocol agent , 585 firewalls, 343
MTU for VPNs , 740 inline, 383
multi-link , 459, 746 logical, 380
monitoring, 90 reset, 381
NAT, 70 sensor-analyzers, 377
routing, 442 sensors, 377
system communications, 70 single firewalls, 351
VPN tunnels, 747 VLAN, 346, 384
multiping test , 400 network models, see diagrams
multi-valued field resolvers , 118 network protocols , 573
network security policies , 497
NIC index changed logs , 903
N node dedicated IP addresses , 356
NAS , 629 nodes
NAT (network address translation) , 465, 489 adding to firewall cluster, 330
contact addresses for system components, 60 adding to sensor cluster, 330
for VPNs, 752 automated certificate renewal, 417, 427, 428
Index 1063
automatic reboot, 417 for firewalls, 344
converting single node to cluster, 325 sensor-analyzers, 377
synchronization of connections, 420 sensors, 377
non-decrypted domains , 666 play button in logs , 137
non-exportable log fields , 976 player list tab , 183
NPS , 629 policies , 510
NTP (Network Time Protocol) , 340 alert, 238
server for SOHO firewalls, 315, 317 creating, 499
null algorithm , 738 default template, 499, 560
number of IKE SAs , 776 deleting, 507
editing, 511
O finding unused rules, 515
firewall, 497
OCSP , 758
installing and updating, 501
OIDs , 120
IPS, 497
one-time password , 393, 395, 396
QoS, 616, 617, 618
operating states , 189, 201
refreshing, 192, 818
operations in filters , 163
searching for rules, 514
oracle protocol agent , 587
switching templates, 506
ordered fields , 113, 115
template policies, 498, 499
OU , 628
uploading, 818
outbound multi-link elements , 461
validating, 556
outbound traffic management , 459
policy editing view , 511
creating rules for, 465
policy handshake , 417
monitoring, 466
policy routing , 418, 451
testing, 466
policy snapshots, attaching to incident cases, 181
overall topology of VPNs , 744
policy validation , 556
overrides , 535
excluding issues for rules, 559
overrides in inspection , 532
excluding rules, 559
overviews
issues, 558
domain overview, 252
selecting issues for rules, 557
statistical, 38, 92
port resolving in logs , 140
port scan detection , 600
P ports , 573, 575
PAP , 629 PPPoE , 354, 367
parent diagrams , 174 PPTP , 901
password pre-defined aliases , 944
changing, 226 pre-shared keys in VPNs , 747, 773
for management database, 303 printing diagrams , 176
password policy , 223 priorities for traffic , 616
enabling, 224 probing , 119
enforcing, 224 probing NetLinks , 443
password strength, 225 probing profiles , 121
passwords product sales , 25
forgotten, 854 profiles for VPNs , 734
troubleshooting, 853 program number , 575
path MTU discovery , 740 protocol agents
PCAP , 142 for CIS redirection, 670
PDF style templates , 51 FTP, 580
perfect forward secrecy , 739 GRE, 582
permission levels , 220 H.323, 582
phase 1 settings , 735 HTTP, 583
phase 2 settings , 737 HTTPS, 583
physical interfaces IPv4 encapsulation, 584
analyzers, 377 IPv6 encapsulation, 585
for firewall clusters, 356 MSRPC, 585
1064 Index
NetBIOS, 586 e-mailing, 156, 157
oracle, 587 excluding log servers, 906
shell, 588 exporting, 156
SIP, 589 exporting as PDF, 156
SMTP, 590 exporting as text, 156
SSH, 590 generating, 152
SunRPC, 591 getting started, 146
TCP proxy, 592 tasks, 153, 155
TFTP, 593 troubleshooting, 906
protocols , 573, 574 viewing, 155
agents, 579 requirements for running stonegate , 24
tags, 579 reset interfaces , 381
proxy identity , 746 resolving log details , 140
pruning log data , 807 restrict virtual address ranges , 788
restricting network traffic , 497
Q retained licenses , 829, 830
retry settings for gateways , 777
QoS (quality of service) , 615
rollback timeout , 417
classes, 617, 618
router element , 570
getting started, 616
routing
policies, 617, 618
checking routes, 456
policy setting, 621
configuration, 440
query panel , 129
creating NetLinks, 443
filters, 134
default route
overview, 134
with multi-link, 442
senders, 136
with single link, 441
storage, 136
DHCP messages, 445
for IPS components, 453
R getting started, 440
RADIUS authentication IGMP-based multicast forwarding, 447
for administrator accounts, 226 multi-link, 442
for end-users, 635 policy routing, 451
reactivating tests , 405 removing routes, 454
rebooting engines , 191 static IP multicast, 447
reconfiguring management center , 301 view, 440
record response recordings, retrieving , 142 RPC program number , 575
records arrangement , 128 RSH protocol agent , 588
recovery , 399 rule counters , 515
redirecting alert chains , 237 rule ID and tag , 513
referenced elements , 46 rule searches , 514
references panel in the logs view , 131 rules tree in inspection rules , 511, 531
refreshing policies , 501, 818 running tasks, aborting , 822
regular expression syntax , 947
relaying DHCP requests of VPN clients , 788
S
remote engine upgrades , 210
SA per host/net , 739, 741
remote shell protocol agent , 588
sales information , 25
remote upgrades , 819, 820, 833, 841
satellite gateways, in VPNs , 745
removing
saving the initial configuration , 393, 395, 396
elements, 79
scan started event , 600
tests, 405
scheduled tasks , 820
renewing engine certificates , 871
removing from schedule, 821
renewing log server certificates , 870
starting, 821
renewing management server certificates , 870
suspending, 821
reports , 145
data sources, 154
designs, 148
Index 1065
scripts management server, 302
for automatic tester, 400 web portal server, 257
for engines, 204 server pool monitoring agents , 471
searching configuring, 474
for DNS addresses, 48 DNS setup, 488
for IP addresses, 47 enabling, 488
for users, 46, 49 installing, 472
secondary log servers internal tests, 483
installing, 293 monitoring, 493
selecting, 277 sgagent.conf, 475
secondary management server installation , 288 sgagent.local.conf, 474
security considerations for HTTPS inspection , 656 testing, 493
security policies , 497 uninstalling, 473
senders in the logs view , 136 server pools
sensor clusters adding members, 471
adding nodes to, 330 defining, 469
creating element for, 320 external addresses, 470
disabling nodes, 195 servers
re-enabling nodes, 196 contact addresses, 67
sensor-analyzers , 377 locations, 67
creating element for, 321 services , 573, 574
editing properties of, 339 custom services, 575
sensors ethernet-level, 577
adding nodes to cluster, 330 for CIS, 672, 673
bypass traffic on overload, 428 for HTTPS inspection, 667
capture interfaces, 381 groups of, 578
command line tools, 201 IP-based, 575
creating element for, 319 severity , 239, 536, 598
default termination option, 428 sgagent.conf , 475
defining VLAN ID, 385 sgagent.local.conf , 474
editing configurations, 196 shared bookmarks , 41
editing properties of clustered, 338 shared domain , 246
editing properties of single, 337 shell protocol agent , 588
HTTPS inspection, 665 show records , 133
inline interfaces, 383 show summary column , 139
limit for rematching tunneled traffic, 429 signing external certificate requests , 761
logical interfaces, 380 single firewalls
network interfaces, 377 creating element for, 313
offline mode, 191 editing properties of, 333
online mode, 190 IP addresses, 351
rebooting, 191 SIP protocol agent , 589
reset interfaces, 381 sites in , 729
silent drop for duplicate log events, 428 situation types , 534
standby mode, 191 situations , 595, 597
traffic inspection interfaces, 379 context options, 599, 602
troubleshooting, 875 getting started with, 596
server contact addresses , 67 website access control, 600, 653
server elements SMTP protocol agent , 590
active directory servers, 627 SNAP , 577
alert server, 278 snapshots
authentication servers, 635 of connections or blacklists, 99
CIS, 671 SNMP , 400, 432
DDNS, defining, 491 SNMP port , 124
DHCP, 446 SNMP reception , 119
external authentication servers, 634 SNOOP , 142
LDAP servers, 629 SOHO firewalls
1066 Index
ADSL or PPPoE interface, 367 SunRPC protocol agent , 591
ADSL settings, 368 support level information , 107, 211
corporate interfaces, 370 support services , 24
creating multiple, 316 SYN flood protection , 349, 417, 425
creating one at a time, 315 synchronization of connection state , 420
DNS, 367 syslog , 322, 1014
editing properties of, 335 receiving, 113
ethernet external interfaces, 366 syslog port , 124
external interfaces, 366 syslog servers , 282
guest interfaces, 372 system alert , 231
interfaces, 364 system aliases , 944
RADIUS authentication, 635 system communications , 59
reopen delay, 430 contact addresses, 60
saving initial configuration, 395 IPS interfaces for, 378
wireless access settings, 373 locations, 60
source IP address , 562 multi-link, 70
spokes in VPNs , 709 NAT, 60
SQL*Net , 587 NetLinks, 70
SSAP , 577 system report , 157
SSH access to engines , 194 system requirements , 24
SSH protocol agent , 590 system-defined user aliases , 944
SSL VPN , 322
application portal, 322 T
connecting gateway to SMC, 396
tag in rules , 513
saving initial configuration for, 396
tags , 579, 595, 596
SSL VPN log fields , 997
task elements , 813
standby
archive log task, 802, 815
cluster mode, 419, 429
backup task, 815, 817
engine command, 191
defining, 815
VPN tunnels, 747
delete log tasks, 805
starting scheduled tasks , 821
delete logs task, 815
state synchronization , 420
export log task, 815
static IP multicast routing, defining , 447 export log tasks, 809
statistics , 38, 92
policy refresh task, 815, 818
statistics in the logs view , 132
policy upload task, 815, 818
status monitoring , 83, 192
remote upgrade task, 815, 819, 820
status surveillance , 125, 193
running tasks, 822
stonegate VPN client , 727, 781
scheduled tasks, 820, 821
authentication settings for, 740
sgInfo task, 815
creating certificates for, 761
task status panel in logs , 129
relaying DHCP requests of, 788
tasks
storage selection in logs view , 136
create snapshot of all system elements task, 815
strength of passwords , 225
delete old executed tasks, 815
strict connection tracking , 418
delete old snapshots task, 815
style templates
disable unused administrator accounts task, 816
adding, 51
refresh certificate revocation lists task, 816
deleting, 52
renew gateway certificates task, 816
sub-policies , 498, 521
renew internal certificate authorities task, 816
creating, 500
renew internal certificates task, 816
deleting, 507
synchronize management server databases task, 816
DHCP
upload gateway and certificate authority certificates task,
sub-policy, 447
816
summary column in logs , 139
TCP connection timeouts , 419
summary panel in logs , 129
TCP ports , 575
sun RPC , 575
TCP proxy protocol agent , 592
sun RPC service groups , 578
Index 1067
TCP service groups , 578 logging, 883
technical support , 24 management client, 887
template policies , 498, 499 management connections with engines, 307
creating, 499 NAT, 894
deleting, 507 passwords, 853
insert points, 498 reporting, 906
switching, 506 rules, 900
temporary log entries , 137 upgrades, 909
terminating connections manually , 198 VPNs, 911
test alert , 231 web start, 891
tester , 398 true by filter , 162
testing trusted CA , 726, 742
alerts, 244 trusted certificate authorities
user authentication, 649 certificates, 663
tests CRL (certificate revocation lists), 664
deactivating, 405 for HTTPS inspection, 662
reactivating, 405 tuning
removing, 405 heartbeat traffic, 419
text size in logs , 139 load balancing, 421
TFTP protocol agent , 593 tunnel recovery , 776
third-party device monitoring , 111 tunneled traffic , 429
threshold to block , 236 tunnels for VPNs , 746
time zone in logs view , 139 tunnels in VPNs , 744
timeline , 137 type field , 999
timeout type for ICMP , 575
connections, 419 type for SNAP , 577
contact between management and node, 416 Type-Ahead Search , 49
TNS , 587
tools profile , 53 U
topology of VPNs , 744
UDP connection timeouts , 419
ToS fields , 616
UDP encapsulation , 725
traffic charts , 38, 92
UDP ports , 575
traffic classification , 617, 618
UDP service groups , 578
traffic handling configuration , 510
UID , 628
traffic inspection interfaces for sensors , 379
undefined value policy , 162
traffic management
unit in licensing , 825
inbound
unknown engine status alerts , 193
creating NAT rules for, 489
update packages , 209, 845
outbound, 459
activating, 847
creating NAT rules for, 465
importing, 846
getting started with, 460
upgrades
traffic recordings
engine upgrades, 210
retrieving, 142
remote engine upgrades, 210, 841
transient logs , 137
remote upgrades, 841
traps, SNMP , 432
troubleshooting, 909
troubleshooting
upgrading , 841
accounts, 853
engine upgrades, 833
alerts, 857
licenses, 824
certificates, 867
management system, 836
engine operation, 875
remote engine upgrades, 841
error messages, 857
remote upgrades, 833, 841
firewall policy installation, 898
remotely, 819, 820
general troubleshooting tips, 851
uploading policies , 818
IPS policy installation, 900
URL filtering , 652
licenses, 879
use PFS , 739
log messages, 857
1068 Index
user aliases, system-defined , 944 client address management, 787
user authentication , 623 client settings, 727
access rules, defining, 642 client-to-gateway, 701, 716, 727, 740
dialog, customizing, 648 configuring, 718
getting started, 624 defining pre-shared keys for, 747
groups, defining, 638 deflate compression for, 739
monitoring, 649 diffie-hellman, 739
testing, 649 element for, 742
users, defining, 640 enabling NAT for, 743
user database replication , 646 error codes, 1009
user groups , 637 error messages, 1007
user responses , 611 excluding sites from, 746
creating, 612 external end-points in, 724
in access rules, 527, 528 external security gateways in, 692
user response entries, 613 forwarding settings for, 745, 746
user services , 628, 631 gateway profiles for, 718
UserObjectClass , 632 gateway settings, 774
users , 637 gateway-to-gateway, 688, 692, 716
adding, 644 generating pre-shared keys for, 773
authentication, 647 granting access to new hosts in, 771
authentication settings, clearing, 646 granularity of SAs in, 739, 741
exporting, 645 hub configuration, 772
importing, 644 hub configuration for, 709
passwords, 646 ID value in end-points, 724
removing, 644 IKE (phase 1) settings for, 735
searching, 46, 49 internal end-points for, 722
UTM , 417, 424 internal security gateways in, 688
IPsec (phase 2) settings for, 737
V keepalive for SOHO tunnels, 372
local security checks for, 741
validating policies , 556
log messages, 1005
validity for VPNs , 747
logs for, 753
vendor for SNAP , 577
monitoring, 753
verbose logging , 193
multi-link for, 746, 747
version of RPC , 575
NAT for clients in, 786
virtual adapter , 727, 728, 787
NAT rules for, 752
virtual defragmentation , 418
negotiation mode in, 737
virtual IP addresses , 787
negotiation retry, 777
virus scanning , 424
notification messages, 1005
VLAN ID, defining for sensors , 385
null encryption in, 738
VLANs, defining for firewalls , 346
overview, 756
VPN clients , 781
path MTU discovery for, 740
getting started with, 782
PFS in, 739
IP addresses, 785
profiles for, 734
settings in management client, 783
proxy identities for, 746
VPN diagrams , 168
reconfiguring, 767
VPNs , 715, 729
removing tunnels, 768
adding tunnels, 768
satellite gateways in, 745
anti-clogging, 778
signing external certificate requests, 761
anti-replay window in, 739
topology of, 744
basic configuration of, 687
troubleshooting, 911
central gateways in, 745
trusted CA for, 726, 742
certificate cache, 778
tunnels for, 746
certificate expiry checking, 765
tunnels in, 744
certificate renewal in, 763
UDP encapsulation for, 725
certificates for, 756
user aliases, 944
Index 1069
validity for, 747
virtual adapter for VPN clients, 727
VRRP , 353
vulnerabilities , 595, 596, 597
W
watchlist , 133
web filtering , 652
web portal , 256
announcements, 266
encrypting communications, 258
server, 257
users, 260
web start , 269, 270
distribution from stonegate servers, 271
distribution from web server, 272
troubleshooting, 891
website access control , 600, 653
white engine status , 192
whitelisting URLs , 653
wireless LAN , 373
1070 Index
StoneGate Guides
Administrator’s Guides - step-by-step instructions for configuring and managing the system.
Installation Guides - step-by-step instructions for installing and upgrading the system.
Reference Guides - system and feature descriptions with overviews to configuration tasks.
Copyright 2010 Stonesoft Corporation. All rights reserved. All specifications are subject to change.