rsa securid ready implementation guidekb.mcafee.com/.../stonesoft_stonegate_5.2_fw_am7.1.pdf ·...

15
Stonesoft Corp. Stonegate Firewall and VPN RSA SecurID Ready Implementation Guide Last Modified: February 2, 2011 Partner Information Product Information Partner Name Stonesoft Corp. Web Site www.stonesoft.com Product Name Stonegate Firewall and VPN Version & Platform Stonegate Management Center 5.2.2 [8257], Centos 5.5 Version & Platform Stonegate Firewall/VPN engine 5.2.2 [8052], Stonegate Linux Platform Product Description Stonegate TM Security Platform unifies firewall, VPN and IPS, blending network security, end-to-end availability and award-winning load balancing into a unified and centrally managed system for distributed enterprises.

Upload: others

Post on 04-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

Stonesoft Corp. Stonegate Firewall and VPN

RSA SecurID Ready Implementation Guide Last Modified: February 2, 2011

Partner Information

Product Information Partner Name Stonesoft Corp. Web Site www.stonesoft.com Product Name Stonegate Firewall and VPN Version & Platform Stonegate Management Center 5.2.2 [8257], Centos 5.5 Version & Platform Stonegate Firewall/VPN engine 5.2.2 [8052], Stonegate Linux Platform Product Description Stonegate TM Security Platform unifies firewall, VPN and IPS, blending

network security, end-to-end availability and award-winning load balancing into a unified and centrally managed system for distributed enterprises.

Page 2: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

2

Solution Summary Stonegate High Availability Firewall/VPN is a state-of-the-art firewall and Virtual Private networking (VPN) solution with built-in high availability features. Stonegate combines the best traits of several firewall techniques to provide excellent security, performance and robustness. Stonegate’s clustering features eliminate the firewall as a potential single point-of-failure. Moreover, with Stonegate’s patented Multi-link technology, high availability can also be extended to network connections.

RADIUS is a back-end protocol used by Stonegate to communicate with external authentication servers. RADIUS protocol can be used together with RSA Authentication Manager to provide Stonegate users secure two-factor authentication.

In external RADIUS authentication, the firewall engine queries an LDAP directory (either the Stonegate’s internal user database or an external server) for user identification data and the required authentication method. After receiving a response from the LDAP server regarding the user’s method of authentication, the firewall sends an authentication request to the specified authentication service.

RSA SecurID supported features Stonegate Firewall and VPN engine, 5.2.2 [8052]

RSA SecurID Authentication via Native RSA SecurID Protocol No RSA SecurID Authentication via RADIUS Protocol Yes On-Demand Authentication via Native SecurID Protocol No On-Demand Authentication via RADIUS Protocol Yes On-Demand Authentication via API No RSA Authentication Manager Replica Support No Secondary RADIUS Server Support Yes (10) RSA SecurID Software Token Automation No RSA SecurID SD800 Token Automation No RSA SecurID Protection of Administrative Interface No

Page 3: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

3

Stonegate System Architecture

Page 4: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

4

Authentication Agent Configuration Authentication Agents are records in the RSA Authentication Manager database that contain information about the systems for which RSA SecurID authentication is provided. All RSA SecurID-enabled systems require corresponding Authentication Agents. Authentication Agents are managed using the RSA Security Console.

The following information is required to create an Authentication Agent:

• Hostname • IP Addresses for network interfaces

Set the Agent Type to “Standard Agent” when adding the Authentication Agent. This setting is used by the RSA Authentication Manager to determine how communication with Stonegate Firewall/VPN engine will occur.

A RADIUS client that corresponds to the Authentication Agent must be created in the RSA Authentication Manager in order for Stonegate Firewall/VPN engine to communicate with RSA Authentication Manager. RADIUS clients are managed using the RSA Security Console.

The following information is required to create a RADIUS client:

• Hostname • IP Addresses for network interfaces • RADIUS Secret

Note: Hostnames within the RSA Authentication Manager / RSA SecurID Appliance must resolve to valid IP addresses on the local network.

Please refer to the appropriate RSA documentation for additional information about creating, modifying and managing Authentication Agents and RADIUS clients.

Page 5: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

5

Partner Product Configuration

Before You Begin This section provides instructions for configuring the Stonegate Firewall/VPN engine with RSA SecurID Authentication. This document is not intended to suggest optimum installations or configurations.

It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components.

All Stonegate components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding.

Supported Authentication Types with RSA SecurID Authentication

Client-initiated authentication Client initiated authentication means that the user starts the authentication process. It can be done with two tools: Stonegate VPN Client software or using Telnet to connect to the firewall cluster on port 2543.

It is possible to authorize the client’s IP address for a period of time with client-initiated authentication. It is also possible to authorize the next opening connection from the client. The authorization part is specified in the access rule base.

Configuration overview Stonegate Firewall and VPN integration with RSA Authentication Server includes the following steps: 1. Defining RADIUS Authentication Server 2. Defining Authentication Service 3. Defining users 4. Defining access rules

Page 6: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

6

Stonegate Firewall/VPN / RSA SecurID Authentication Configuration – User Authentication 1. The following steps can be carried out using the Stonegate Management Client. Open the Stonegate

Configuration Window.

Page 7: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

7

2. Create RADIUS Authentication Server/Servers from the Network Elements section.

Page 8: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

8

3. Create an Authentication Service and bind the Authentication Servers.

Create an Authentication Service (located under Other Elements/User Authentication section) by right-clicking Authentication Services.

4. Choose type RADIUS and then bind Authentication Servers to the Authentication Service.

Page 9: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

9

5. Create a User (or User Group) to be used in authentication rules by expanding the User Authentication tree-branch and right-clicking the appropriate user group.

If you want to use RSA Authentication Manager authentication as your default Authentication Service for all users, create a special user with the User Name: *external* within the Stonegate User Database and bind it to the previously created Authentication Service. Using this generic method of authentication, *external* is the only user you will be required to create within the Stonegate user database. If there is a need to configure Authentication Services on a per user basis, it can be done by creating individual user records within the Stonegate User Database and binding them to the appropriate Authentication Service.

Page 10: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

10

6. Select the Authentication tab from User properties and define Authentication Service for the user. You may also

create an user group. This way the Authentication Service definition will be inherited from the group user it belongs to.

7. Using the Security Policy Manager, associate the appropriate access rules to the users or user group being authenticated by the RSA Authentication Manager server.

8. Install the policy on the firewall to activate the configuration.

Note: More detailed information on using Stonegate Firewall user access and authentication rules can be found in the Stonegate FW/VPN 5.s, SMC 5.2 and IPS 5.2 Administrators Guide. See chapter 44, Setting up User Authentication.

Page 11: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

11

Example RSA SecurID-Enabled Login Sequences

Client/Firewall Initiated Authentication with RSA Authentication Manager User Account Set to System generated PIN mode • Right-click on top of Stonegate VPN Client icon (located in System Tray) and select “Connect”. • Enter user name and tokencode (password field) into pop-up window and click O

• The following pop-up windows are shown asking for approval for the system to generate the PIN code.

Page 12: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

12

• After the new PIN is accepted the following pop-up will be shown and new passcode is prompted to authenticate the user.

Client/Firewall Initiated authentication with RSA Authentication Manager – User Account set to On-Demand Authentication • Right-click on top of Stonegate VPN Client icon (located in System Tray) and select “Connect”. • Enter user name and tokencode (password field) into pop-up window and click OK.

Page 13: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

13

• A new pop-up window is shown asking to enter a new PIN code.

• Once the system has accepted the new PIN code, it asks to wait for the token code to change and then to re-enter the PIN code just created.

Page 14: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

14

• The system will then send an email to the pre-defined email address with an On-Demand token code. Enter it to the Tokencode field.

Page 15: RSA SecurID Ready Implementation Guidekb.mcafee.com/.../Stonesoft_Stonegate_5.2_FW_Am7.1.pdf · Client initiated authentication means that the user starts the authentication process

15

Certification Checklist for RSA Authentication Manager Date Tested: February 2, 2011

Certification Environment Product Name Version Information Operating System

RSA Authentication Manager 7.1SP3 Windows 2003 Server R2 Stonegate Management Server 5.2.2 [8257] Centos 5.5 Stonegate Firewall and VPN 5.2.2 [8052] Stonegate Linux

Mandatory Functionality

RSA Native Protocol RADIUS Protocol New PIN Mode Force Authentication After New PIN N/A Force Authentication After New PIN System Generated PIN N/A System Generated PIN User Defined (4-8 Alphanumeric) N/A User Defined (4-8 Alphanumeric) User Defined (5-7 Numeric) N/A User Defined (5-7 Numeric) Deny 4 and 8 Digit PIN N/A Deny 4 and 8 Digit PIN Deny Alphanumeric PIN N/A Deny Alphanumeric PIN Deny Numeric PIN N/A Deny Numeric PIN Deny PIN Reuse N/A Deny PIN Reuse N/APasscode 16 Digit Passcode N/A 16 Digit Passcode 4 Digit Fixed Passcode N/A 4 Digit Fixed Passcode Next Tokencode Mode Next Tokencode Mode N/A Next Tokencode Mode On-Demand Authentication On-Demand Authentication N/A On-Demand Authentication On-Demand New PIN N/A On-Demand New PIN Load Balancing / Reliability Testing Failover (3-10 Replicas) N/A Failover No RSA Authentication Manager N/A No RSA Authentication Manager GLS / PAR = Pass = Fail N/A = Not Applicable to Integration