Secure Computing ADMINGUIDEREVA Guide de l'utilisateur Page 1

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Mise en réseau Secure Computing ADMINGUIDEREVA. Secure Computing ADMINGUIDEREVA User`s guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 80
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
VPN Administration Guide
Revision A
SafeNet/Soft-PK Version 5.1.3 Build 4
Sidewinder Version 5.1.0.02
Vue de la page 0
1 2 3 4 5 6 ... 79 80

Résumé du contenu

Page 1 - VPN Administration Guide

VPN Administration GuideRevision ASafeNet/Soft-PK Version 5.1.3 Build 4Sidewinder Version 5.1.0.02

Page 2

Where to find additional informationviii Preface: About this Guide To contact Se

Page 3 - Trademarks

1Getting Started 1-11 C HAPTER 1Getting StartedAbout this chapter This chapter provides an overview of the Soft-PK™ and Sidewinder Virtual Private Net

Page 4 - Printing History

1About Soft-PK & Sidewinder VPNs1-2 Getting Started About Soft-PK & Sidewinder VPNsSoft-PK is security software for remote PC users. It is des

Page 5 - T ABLE OF CONTENTS

RequirementsGetting Started 1-3Requirements To configure VPN communication between Sidewinder and Soft-PK clients, your Sidewinder must be configured

Page 6

Requirements1-4 Getting Started Soft-PK requirementsEach system on which Soft-PK

Page 7 - About this Guide

Roadmap to deploying your VPNsGetting Started 1-5Roadmap to deploying your VPNsBecause Secure Computing products provide network security, we recommen

Page 8 - How this guide is

Roadmap to deploying your VPNs1-6 Getting Started Figure 1-2. VPNdeploymentoverv

Page 9 - Where to find

Roadmap to deploying your VPNsGetting Started 1-7Soft-PK deployment checklistThe following checklist identifies each major step involved in the setup

Page 10

Roadmap to deploying your VPNs1-8 Getting Started ❒ISAKMP ACL entry: At a minimu

Page 11 - Getting Started

Roadmap to deploying your VPNsGetting Started 1-95 —Configure the VPN connections on the Sidewinder❒Use Cobra to define the VPN security association c

Page 13 - Sidewinder

Roadmap to deploying your VPNs1-10 Getting Started 8 —Troubleshoot any connectio

Page 14 - Soft-PK requirements

2Planning Your VPN Configuration 2-12 C HAPTER 2Planning Your VPN ConfigurationAbout this chapter This chapter provides information to help you unders

Page 15 - Roadmap to

2Identifying basic VPN connection needs2-2 Planning Your VPN Configuration Identifying basic VPN connection needsBefore you actually begin configuring

Page 16

Identifying authentication requirementsPlanning Your VPN Configuration 2-3Identifying authentication requirementsDetermine how you will identify and a

Page 17

Identifying authentication requirements2-4 Planning Your VPN Configuration If no

Page 18

Identifying authentication requirementsPlanning Your VPN Configuration 2-5A closer look at CA-based certificatesA VPN implemented using CA-based certi

Page 19

Identifying authentication requirements2-6 Planning Your VPN Configuration Exten

Page 20

Determining where you will terminate your VPNsPlanning Your VPN Configuration 2-7Determining where you will terminate your VPNsYou can configure a VPN

Page 21 - Configuration

Determining where you will terminate your VPNs2-8 Planning Your VPN Configuration

Page 22 - VPN connection

Understanding Sidewinder client address poolsPlanning Your VPN Configuration 2-9Understanding Sidewinder client address poolsYou may choose to impleme

Page 23 - Identifying

iCopyright NoticeThis document and the software described in it are copyrighted. Under the copyright laws, neither this document nor this software may

Page 24 -  Uses a private or public CA

Understanding Sidewinder client address pools2-10 Planning Your VPN Configuration

Page 25

3Configuring Sidewinder for Soft-PK Clients 3-13 C HAPTER 3Configuring Sidewinder for Soft-PK ClientsAbout this chapter This chapter provides a summar

Page 26 - Extended authentication

3Enabling the VPN servers3-2 Configuring Sidewinder for Soft-PK Clients Enabling the VPN serversBefore you configure a VPN association on your Sidewin

Page 27 - Determining

Configuring ACL & proxies entries for VPN connectionsConfiguring Sidewinder for Soft-PK Clients 3-3Configuring ACL & proxies entries for VPN c

Page 28 - Defining a virtual burb

Managing Sidewinder self-signed certs3-4 Configuring Sidewinder for Soft-PK Clients

Page 29 - Sidewinder client

Managing Sidewinder self-signed certsConfiguring Sidewinder for Soft-PK Clients 3-53.Specify the following Firewall Certificate settings.4. Click Add

Page 30 -  Protected networks

Managing Sidewinder self-signed certs3-6 Configuring Sidewinder for Soft-PK Clients

Page 31 - Soft-PK Clients

Managing Sidewinder self-signed certsConfiguring Sidewinder for Soft-PK Clients 3-73.Specify the following Remote Certificate settings.4. Click Add to

Page 32 - Enabling the VPN

Managing Sidewinder self-signed certs3-8 Configuring Sidewinder for Soft-PK Clients

Page 33 - VPN connections

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-9Managing CA-based certificatesIf you are using a CA to authorize certifica

Page 34 - Sidewinder self

ii SECURE COMPUTING’S AND ITS LICENSORS ENTIRE LIABILITY UNDER, FOR BREACH OF, OR ARISING OUT OF THIS AGREEMENT, IS LIMITED TO A REFUND OF THE PURCHAS

Page 35

Managing CA-based certificates3-10 Configuring Sidewinder for Soft-PK Clients 6.

Page 36

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-112.Specify the firewall certificate information.3. Click Add to send the e

Page 37

Managing CA-based certificates3-12 Configuring Sidewinder for Soft-PK Clients De

Page 38

Managing CA-based certificatesConfiguring Sidewinder for Soft-PK Clients 3-13Defining remote client identities in SidewinderWhen using CA-based certif

Page 39 - Managing CA

Managing pre-shared keys (passwords)3-14 Configuring Sidewinder for Soft-PK Clients

Page 40

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-15Configuring the VPN on the SidewinderCreate a VPN security associa

Page 41

Configuring the VPN on the Sidewinder3-16 Configuring Sidewinder for Soft-PK Clients

Page 42

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-173.Select the Authentication tab. Choose the authentication method

Page 43

Configuring the VPN on the Sidewinder3-18 Configuring Sidewinder for Soft-PK Clients

Page 44 - (passwords)

Configuring the VPN on the SidewinderConfiguring Sidewinder for Soft-PK Clients 3-19 If you selected Password (Figure 3-12), specify the following pa

Page 45 - VPN on the

Table of Contents iiiT ABLE OF CONTENTSPreface: About this Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . .vWho should read this guide? .

Page 46

Configuring the VPN on the Sidewinder3-20 Configuring Sidewinder for Soft-PK Clients

Page 47 - Authentication Method

4Installing and Working with Soft-PK 4-14 C HAPTER 4Installing and Working with Soft-PK About this chapter This chapter includes Soft-PK installation

Page 48

4Soft-PK installation notes4-2 Installing and Working with Soft-PK Soft-PK installation notesNote the following about installing, removing, or upgradi

Page 49 - Click Close

Starting Soft-PKInstalling and Working with Soft-PK 4-3Starting Soft-PK Soft-PK starts automatically each time the computer on which it resides is sta

Page 50

Starting Soft-PK4-4 Installing and Working with Soft-PK Activating/Deactivating

Page 51 - Soft-PK

Starting Soft-PKInstalling and Working with Soft-PK 4-5About the Soft-PK program optionsThis section provides a brief description of the Soft-PK main

Page 52

Managing certificates on Soft-PK4-6 Installing and Working with Soft-PK Managing

Page 53

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-7Setting up CA-based certificatesIf you are using CA-based digital certificates,

Page 54

Managing certificates on Soft-PK4-8 Installing and Working with Soft-PK Requesti

Page 55 -  Connection Monitor

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-9TIP: You should select the new certificate and click Verify to validate it.Exp

Page 56

iv Table of ContentsDefining remote client identities in Sidewinder . . . . . . . . . . . 3-13Managing pre-shared keys (passwords) . . . . . . . . .

Page 57

Managing certificates on Soft-PK4-10 Installing and Working with Soft-PK Figure

Page 58

Managing certificates on Soft-PKInstalling and Working with Soft-PK 4-11Importing a personal certificate into Soft-PKUse the following procedure to im

Page 59

Managing certificates on Soft-PK4-12 Installing and Working with Soft-PK Note:

Page 60

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-13Configuring a security policy on the Soft-PKAs an administrator, y

Page 61

Configuring a security policy on the Soft-PK4-14 Installing and Working with Soft-PK

Page 62 - Click Ye s

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-15— Click on the Edit Name button, in the window that appears (Figur

Page 63 - Configuring a

Configuring a security policy on the Soft-PK4-16 Installing and Working with Soft-PK

Page 64

Configuring a security policy on the Soft-PKInstalling and Working with Soft-PK 4-1712.Specify the Key Exchange settings. Select Key Exchange (Phase 2

Page 65

Configuring a security policy on the Soft-PK4-18 Installing and Working with Soft-PK

Page 66

5Deploying Soft-PK to Your End Users 5-15 7C HAPTER 5Deploying Soft-PK to Your End UsersAbout this chapter This chapter summarizes the final preparati

Page 67

PPreface: About this Guide vP REFACEAbout this GuideThis guide provides the information needed to set up connections between remote systems running Sa

Page 68

5Overview5-2 Deploying Soft-PK to Your End Users Overview You should deploy the Soft-PK installation program with a customized security policy and the

Page 69 - End Users

OverviewDeploying Soft-PK to Your End Users 5-3Prior to customizing the worksheet, take a few minutes to organize the files and information you need t

Page 70 -  Certificate instructions

Customizing the user worksheet5-4 Deploying Soft-PK to Your End Users Customizin

Page 71 -  CA root certificate (*.pem)

Customizing the user worksheetDeploying Soft-PK to Your End Users 5-5Specifying certificate import/request instructionsFigure 5-4 shows the text in th

Page 72 - Customizing the

Customizing the user worksheet5-6 Deploying Soft-PK to Your End Users Specifying

Page 73

ATroubleshooting A-1A A PPENDIX ATroubleshootingAbout this appendix This appendix provides a summary of troubleshooting techniques available for resol

Page 74

ASoft-PK Connection MonitorA-2 Troubleshooting The following summarizes the tasks you can perform.Soft-PK Connection MonitorThe Connection Monitor dis

Page 75 - Troubleshooting

Soft-PK Connection MonitorTroubleshooting A-3You will see an icon to the left of the connection name: A key indicates that the connection has a Phase

Page 76 - Connection

Sidewinder troubleshooting commandsA-4 Troubleshooting that the selected connect

Page 78

PHow this guide is organizedvi Preface: About this Guide How this guide is organizedThis guide contains the following chapters.Finding information Thi

Page 79

Part Number: 86-0935037-ASoftware Version : Soft-PK 5.1.3 Build 4 and Sideiwnder 5.1.0.02Product names used within are trademarks of their respective

Page 80 - Part Number: 86-0935037-A

Where to find additional informationPreface: About this Guide viiViewing and printing this document onlineWhen you view this document online in PDF fo

Commentaires sur ces manuels

Pas de commentaire