Secure Computing ADMINGUIDEREVA Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Vernetzung Secure Computing ADMINGUIDEREVA herunter. Secure Computing ADMINGUIDEREVA User`s guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 80
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
VPN Administration Guide
Revision A
SafeNet/Soft-PK Version 5.1.3 Build 4
Sidewinder Version 5.1.0.02
Seitenansicht 0
1 2 3 4 5 6 ... 79 80

Inhaltsverzeichnis

Seite 1 - VPN Administration Guide

VPN Administration GuideRevision ASafeNet/Soft-PK Version 5.1.3 Build 4Sidewinder Version 5.1.0.02

Seite 2

Where to find additional informationviii Preface: About this Guide To contact Se

Seite 3 - Trademarks

1Getting Started 1-11 C HAPTER 1Getting StartedAbout this chapter This chapter provides an overview of the Soft-PK™ and Sidewinder Virtual Private Net

Seite 4 - Printing History

1About Soft-PK & Sidewinder VPNs1-2 Getting Started About Soft-PK & Sidewinder VPNsSoft-PK is security software for remote PC users. It is des

Seite 5 - T ABLE OF CONTENTS

RequirementsGetting Started 1-3Requirements To configure VPN communication between Sidewinder and Soft-PK clients, your Sidewinder must be configured

Seite 6

Requirements1-4 Getting Started Soft-PK requirementsEach system on which Soft-PK

Seite 7 - About this Guide

Roadmap to deploying your VPNsGetting Started 1-5Roadmap to deploying your VPNsBecause Secure Computing products provide network security, we recommen

Seite 8 - How this guide is

Roadmap to deploying your VPNs1-6 Getting Started Figure 1-2. VPNdeploymentoverv

Seite 9 - Where to find

Roadmap to deploying your VPNsGetting Started 1-7Soft-PK deployment checklistThe following checklist identifies each major step involved in the setup

Seite 10

Roadmap to deploying your VPNs1-8 Getting Started ❒ISAKMP ACL entry: At a minimu

Seite 11 - Getting Started

Roadmap to deploying your VPNsGetting Started 1-95 —Configure the VPN connections on the Sidewinder❒Use Cobra to define the VPN security association c

Seite 13 - Sidewinder

Roadmap to deploying your VPNs1-10 Getting Started 8 —Troubleshoot any connectio

Seite 14 - Soft-PK requirements

2Planning Your VPN Configuration 2-12 C HAPTER 2Planning Your VPN ConfigurationAbout this chapter This chapter provides information to help you unders

Seite 15 - Roadmap to

2Identifying basic VPN connection needs2-2 Planning Your VPN Configuration Identifying basic VPN connection needsBefore you actually begin configuring

Seite 16

Identifying authentication requirementsPlanning Your VPN Configuration 2-3Identifying authentication requirementsDetermine how you will identify and a

Seite 17

Identifying authentication requirements2-4 Planning Your VPN Configuration If no

Seite 18

Identifying authentication requirementsPlanning Your VPN Configuration 2-5A closer look at CA-based certificatesA VPN implemented using CA-based certi

Seite 19

Identifying authentication requirements2-6 Planning Your VPN Configuration Exten

Seite 20

Determining where you will terminate your VPNsPlanning Your VPN Configuration 2-7Determining where you will terminate your VPNsYou can configure a VPN

Seite 21 - Configuration

Determining where you will terminate your VPNs2-8 Planning Your VPN Configuration

Seite 22 - VPN connection

Understanding Sidewinder client address poolsPlanning Your VPN Configuration 2-9Understanding Sidewinder client address poolsYou may choose to impleme

Seite 23 - Identifying

iCopyright NoticeThis document and the software described in it are copyrighted. Under the copyright laws, neither this document nor this software may

Seite 24 -  Uses a private or public CA

Understanding Sidewinder client address pools2-10 Planning Your VPN Configuration

Seite 25

3Configuring Sidewinder for Soft-PK Clients 3-13 C HAPTER 3Configuring Sidewinder for Soft-PK ClientsAbout this chapter This chapter provides a summar

Seite 26 - Extended authentication

3Enabling the VPN servers3-2 Configuring Sidewinder for Soft-PK Clients Enabling the VPN serversBefore you configure a VPN association on your Sidewin

Seite 27 - Determining

Configuring ACL & proxies entries for VPN connectionsConfiguring Sidewinder for Soft-PK Clients 3-3Configuring ACL & proxies entries for VPN c

Seite 28 - Defining a virtual burb

Managing Sidewinder self-signed certs3-4 Configuring Sidewinder for Soft-PK Clients

Seite 29 - Sidewinder client

Managing Sidewinder self-signed certsConfiguring Sidewinder for Soft-PK Clients 3-53.Specify the following Firewall Certificate settings.4. Click Add

Seite 30 -  Protected networks

Managing Sidewinder self-signed certs3-6 Configuring Sidewinder for Soft-PK Clients

Seite 31 - Soft-PK Clients

Managing Sidewinder self-signed certsConfiguring Sidewinder for Soft-PK Clients 3-73.Specify the following Remote Certificate settings.4. Click Add to

Seite 32 - Enabling the VPN

Managing Sidewinder self-signed certs3-8 Configuring Sidewinder for Soft-PK Clients

Seite 33 - VPN connections

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-9Managing CA-based certificatesIf you are using a CA to authorize certifica

Seite 34 - Sidewinder self

ii SECURE COMPUTING’S AND ITS LICENSORS ENTIRE LIABILITY UNDER, FOR BREACH OF, OR ARISING OUT OF THIS AGREEMENT, IS LIMITED TO A REFUND OF THE PURCHAS

Seite 35

Managing CA-based certificates3-10 Configuring Sidewinder for Soft-PK Clients 6.

Seite 36

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-112.Specify the firewall certificate information.3. Click Add to send the e

Seite 37

Managing CA-based certificates3-12 Configuring Sidewinder for Soft-PK Clients De

Seite 38

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-13Defining remote client identities in SidewinderWhen using CA-based certif

Seite 39 - Managing CA

Managing pre-shared keys (passwords)3-14 Configuring Sidewinder for Soft-PK Clients

Seite 40

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-15Configuring the VPN on the SidewinderCreate a VPN security associa

Seite 41

Configuring the VPN on the Sidewinder3-16 Configuring Sidewinder for Soft-PK Clients

Seite 42

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-173.Select the Authentication tab. Choose the authentication method

Seite 43

Configuring the VPN on the Sidewinder3-18 Configuring Sidewinder for Soft-PK Clients

Seite 44 - (passwords)

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-19 If you selected Password (Figure 3-12), specify the following pa

Seite 45 - VPN on the

Table of Contents iiiT ABLE OF CONTENTSPreface: About this Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . .vWho should read this guide? .

Seite 46

Configuring the VPN on the Sidewinder3-20 Configuring Sidewinder for Soft-PK Clients

Seite 47 - Authentication Method

4Installing and Working with Soft-PK 4-14 C HAPTER 4Installing and Working with Soft-PK About this chapter This chapter includes Soft-PK installation

Seite 48

4Soft-PK installation notes4-2 Installing and Working with Soft-PK Soft-PK installation notesNote the following about installing, removing, or upgradi

Seite 49 - Click Close

Starting Soft-PKInstalling and Working with Soft-PK 4-3Starting Soft-PK Soft-PK starts automatically each time the computer on which it resides is sta

Seite 50

Starting Soft-PK4-4 Installing and Working with Soft-PK Activating/Deactivating

Seite 51 - Soft-PK

Starting Soft-PKInstalling and Working with Soft-PK 4-5About the Soft-PK program optionsThis section provides a brief description of the Soft-PK main

Seite 52

Managing certificates on Soft-PK4-6 Installing and Working with Soft-PK Managing

Seite 53

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-7Setting up CA-based certificatesIf you are using CA-based digital certificates,

Seite 54

Managing certificates on Soft-PK4-8 Installing and Working with Soft-PK Requesti

Seite 55 -  Connection Monitor

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-9TIP: You should select the new certificate and click Verify to validate it.Exp

Seite 56

iv Table of ContentsDefining remote client identities in Sidewinder . . . . . . . . . . . 3-13Managing pre-shared keys (passwords) . . . . . . . . .

Seite 57

Managing certificates on Soft-PK4-10 Installing and Working with Soft-PK Figure

Seite 58

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-11Importing a personal certificate into Soft-PKUse the following procedure to im

Seite 59

Managing certificates on Soft-PK4-12 Installing and Working with Soft-PK Note:

Seite 60

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-13Configuring a security policy on the Soft-PKAs an administrator, y

Seite 61

Configuring a security policy on the Soft-PK4-14 Installing and Working with Soft-PK

Seite 62 - Click Ye s

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-15— Click on the Edit Name button, in the window that appears (Figur

Seite 63 - Configuring a

Configuring a security policy on the Soft-PK4-16 Installing and Working with Soft-PK

Seite 64

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-1712.Specify the Key Exchange settings. Select Key Exchange (Phase 2

Seite 65

Configuring a security policy on the Soft-PK4-18 Installing and Working with Soft-PK

Seite 66

5Deploying Soft-PK to Your End Users 5-15 7C HAPTER 5Deploying Soft-PK to Your End UsersAbout this chapter This chapter summarizes the final preparati

Seite 67

PPreface: About this Guide vP REFACEAbout this GuideThis guide provides the information needed to set up connections between remote systems running Sa

Seite 68

5Overview5-2 Deploying Soft-PK to Your End Users Overview You should deploy the Soft-PK installation program with a customized security policy and the

Seite 69 - End Users

OverviewDeploying Soft-PK to Your End Users 5-3Prior to customizing the worksheet, take a few minutes to organize the files and information you need t

Seite 70 -  Certificate instructions

Customizing the user worksheet5-4 Deploying Soft-PK to Your End Users Customizin

Seite 71 -  CA root certificate (*.pem)

Customizing the user worksheetDeploying Soft-PK to Your End Users 5-5Specifying certificate import/request instructionsFigure 5-4 shows the text in th

Seite 72 - Customizing the

Customizing the user worksheet5-6 Deploying Soft-PK to Your End Users Specifying

Seite 73

ATroubleshooting A-1A A PPENDIX ATroubleshootingAbout this appendix This appendix provides a summary of troubleshooting techniques available for resol

Seite 74

ASoft-PK Connection MonitorA-2 Troubleshooting The following summarizes the tasks you can perform.Soft-PK Connection MonitorThe Connection Monitor dis

Seite 75 - Troubleshooting

Soft-PK Connection MonitorTroubleshooting A-3You will see an icon to the left of the connection name: A key indicates that the connection has a Phase

Seite 76 - Connection

Sidewinder troubleshooting commandsA-4 Troubleshooting that the selected connect

Seite 78

PHow this guide is organizedvi Preface: About this Guide How this guide is organizedThis guide contains the following chapters.Finding information Thi

Seite 79

Part Number: 86-0935037-ASoftware Version : Soft-PK 5.1.3 Build 4 and Sideiwnder 5.1.0.02Product names used within are trademarks of their respective

Seite 80 - Part Number: 86-0935037-A

Where to find additional informationPreface: About this Guide viiViewing and printing this document onlineWhen you view this document online in PDF fo

Kommentare zu diesen Handbüchern

Keine Kommentare