Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server HWTO3SG1.6 - 5/3/02 Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright © 2002 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Setting Up a RADIUS Server Introduction This document outlines the steps necessary to configure StoneGate, in order to authenticate users externally to an RSA ACE/Server version 5.0 for Windows NT. This document covers authentication procedures using either password authentication or SecureID tokens. Authentication is accomplished using the RADIUS server running on the RSA ACE/Server as an intermediate agent that processes external authentication requests from a StoneGate cluster. The document assumes the reader possesses basic knowledge of the RSA ACE/Server administration software. Screenshots of the RSA ACE/Server are provided in three appendices, but only a minimum configuration of the RSA ACE/Server is addressed. Network Configuration Example The following figure depicts the structure of the final configuration. ILLUSTRATION 1.1 Final configuration SG VPN Client @ Management network Management Server Log Server FW RSA ACE/ Server (as RADIUS server) Intranet NT Agent (ACE client) Setup Requirements This setup was established with the following components: • StoneGate Management v. 1.6 HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 2 Setting Up a RADIUS Server • • • • Netscape v. 6 Microsoft Windows NT platform RSA ACE/Server v. 5.0 RSA ACE/Agent 4.4 Configuration Steps The RADIUS server setup consists of the following main steps: 1. 2. 3. 4. 5. Before you start RSA ACE/Server installation RADIUS server configuration Authentication service configuration in StoneGate User Manager Using authentication service in a rule base with StoneGate Security Policy Manager HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 3 Setting Up a RADIUS Server B e f o r e Yo u S t a r t Updating the ‘hosts’ File The RSA ACE/Server must be able to resolve the IP address of its RADIUS requesters/clients according to their names and vice versa. Thus, if you do not have a DNS server, you have to edit the file \winnt\system32\drivers\etc\hosts and add an entry for each of the nodes in your cluster as highlighted in Illustration 1.2. You need to register the dedicated IP addresses (NDI), which are the source addresses that the RSA ACE/Server sees whenever an authentication request is generated by the cluster. Make sure that the current machine IP address of the RSA ACE/Server and any RSA ACE/Agent is registered in the DNS or located in the ‘hosts’ file. If you do not have any DNS, enter the NDIs of a cluster. Figure 1.2 depicts the ‘hosts’ file. ILLUSTRATION 1.2 Hosts file update HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 4 Setting Up a RADIUS Server Note: You need to use the dedicated IP addresses, not the virtual IP addresses of the cluster. RSA/ACE Server Installation Before you can start RADIUS Server configuration, you have to install the RSA/ACE Server. For instructions, please see Appendix A “RSA ACE/Server Installation” on page 40. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 5 Setting Up a RADIUS Server RADIUS Server Configuration Before you can use the RADIUS server, you must configure and verify that you can use the RADIUS server incorporated with your RSA ACE/Server software. To configure the RADIUS server: 1. Go to Start>Programs>ACE Configuration Management. The RSA ACE/Server Configuration Management window opens. ILLUSTRATION 1.3 RSA ACE/Server Configuration Management 2. 3. In the RSA ACE/Server Configuration Management window, first click on the Edit button on the bottom left of the box. In the Enable Features section of this window, make sure that: • The DES radio button of the Encryption Type is selected. • The RADIUS Server Enabled check box is checked. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 6 Setting Up a RADIUS Server 4. 5. Click OK to continue. In the following dialog box, click Yes to save the configuration changes to the RSA ACE/Server configuration file. ILLUSTRATION 1.4 RSA ACE/Server Configuration Management RSA ACE/Server Startup Before you can use your ACE and RADIUS servers, you must first start them by doing the following: To start the RSA ACE/Server: 1. 2. Go to Start > Settings > Control Panel. Click the RSA/ACE Server icon to open the RSA ACE/Server start dialog box. ILLUSTRATION 1.5 RSA ACE/Server Start dialog box HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 7 Setting Up a RADIUS Server 3. 4. 5. Check the Automatic ACE/Server Startup box and click Start to start the server. When the “RSA ACE/Server is started” pop-up appears, click OK to continue. In the Reminder window, click OK to exit. ILLUSTRATION 1.6 RSA ACE/Server Configuration Management 6. Go back to the RSA ACE/Server dialog box and click the Stop button to stop the RSA/ACE Server. RADIUS Server Verification Next, you need to ensure that the RADIUS service is started and listening on the appropriate port. 1. At the command prompt, enter: netstat -an | find “XXXX” (where “XXXX” 2. is the number of the port configured in “RADIUS Server Configuration” on page 6, i.e. 1645). Check in the Windows NT Service panel that the RADIUS service is started and and listening on the appropriate port. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 8 Setting Up a RADIUS Server ILLUSTRATION 1.7 Netstat RSA ACE/Server Administration The authentication methods to be used in this example are static password and keyfob (token). All administration functions are conducted from the main administration window. Main administration window 1. Open the main administration window. 2. Select Start>Programs>RSA ACE/Server>Database Administration Host Mode. 3. The RSA ACE/Server v. 5.0 Administration dialog box opens. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 9 Setting Up a RADIUS Server ILLUSTRATION 1.8 Main administration window Importing tokens You must import tokens from an .asc file before the tokens can be assigned to a user. To import tokens: 1. 2. 3. 4. Select Token>Import Token from the main menu. Insert the token diskette into drive a:\. Select the path to the .asc file from the diskette, and click Open. The Import Status dialog box opens allowing verification that the two demo tokens were imported. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 10 Setting Up a RADIUS Server ILLUSTRATION 1.9 Import Status dialog box Adding a group You should next define a group to which users can be added. To add a group: 1. 2. From the RSA ACE/Server Administration main menu, select Group>Add Group. The Edit Group dialog box opens. Enter a group name and click OK to continue. ILLUSTRATION 1.10 Edit Group dialog box Adding a user Now you can add users to the group created. The way to do this depends on the authentication method, i.e. keyfob (token) or static password, defined for the user. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 11 Setting Up a RADIUS Server Adding a user with a keyfob (token) authentication method Follow the instructions below to add a user with a keyfob (token) authentication method. For instructions on how to add a user with static password authentication method, please see “Adding a user with a static password autentication method” on page 14. To add a user with a keyfob (token) authentication method: 1. 2. 3. Enter a user by selecting User>Add User in the main RSA ACE/Server Administration window. The Add User dialog box opens. Enter at least the last name and default login (User ID) in the appropriate fields. Click the Assign Token button. ILLUSTRATION 1.11 Add User dialog box 4. 5. In the main Administration window, select Tokens. Select the token you want to assign to this user from the list of tokens on the Select Token dialog box and click OK to continue. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 12 Setting Up a RADIUS Server ILLUSTRATION 1.12 Select Token 6. You should now return to the Edit User window, which now contains the information that you have defined. ILLUSTRATION 1.13 Edit User HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 13 Setting Up a RADIUS Server 7. Click the Group Memberships button. The Memberships dialog box opens. ILLUSTRATION 1.14 Memberships Select the group you created from the Available Groups column. 9. Click Join Group. 10. Click Exit to continue. 8. Adding a user with a static password autentication method Follow the instructions below to add a user with a static password authentication method. For instructions on how to add a user with keyfob (token) authentication, please see “Adding a user with a keyfob (token) authentication method” on page 12. To add a user with a static password authentication method: 1. 2. 3. 4. 5. Enter a user by selecting User>Add User in the main RSA ACE/Server Administration window. The Add User dialog box opens. See illustration “Add User dialog box” on page 12. Enter at least the name and default login (User ID) in the appropriate fields of the Add User dialog box. Click on the Set/Change User Password... button. Enter a password of 4-8 digits in the Enter Password and Confirm Password fields. You should now return to the Edit User window, which now contains the information that you have defined. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 14 Setting Up a RADIUS Server ILLUSTRATION 1.15 Edit User 6. Repeat steps 6-10 from above (as in keyfob token authentication). Defining Agent Hosts for the Nodes and for the RADIUS Server The agent hosts must be defined so that users can authenticate from these computers. The RADIUS server acts as a proxy and must be defined as a virtual client. The computers to be defined as agent hosts are: • The nodes of the cluster using the NDI belonging to the NIC in which the CVI authentication option is defined. In this example there are two nodes - Sophia21 and Sophia22. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 15 Setting Up a RADIUS Server • The computer running the RSA ACE/Server because it also hosts the Radius-to-Ace proxy, the purpose of which is to forward authentication requests from the nodes to the RSA ACE/Server. The definition must be entered for each node plus the RSA ACE/Server itself. To define the agent hosts: 1. 2. Define a client on the RSA ACE/Server for each of the nodes in the cluster. Select Agent Host > Add Agent Host. The Edit Agent Host dialog box opens. ILLUSTRATION 1.16 Edit Agent Host 3. 4. 5. 6. In the Name field, enter the name from the ‘hosts’ file. Click in the Network Address field. The IP address for this name should automatically populate this field. If not, check the spelling of the name. For Encryption Type, specify DES (Data Encryption Standard). Click on the Group Activations button to authenticate the group that will be authenticating from StoneGate. The Group Activations dialog box opens. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 16 Setting Up a RADIUS Server ILLUSTRATION 1.17 Group Activations 7. 8. In the Group Activations dialog box, select the group to be activated from the list of Groups on the left. Click the Activate Group button and the group will appear on the list of Directly Activated Groups on the right. Click Exit to return to the previous window. In the Edit Agent Host window, click the Assign/Change Encryption Key button. The Assign/Change Encryption Key dialog box opens. ILLUSTRATION 1.18 Assign/Change Encryption Key dialog box 9. Enter an encryption key that will be used to communicate with the RADIUS server associated with the StoneGate cluster. This key will be the same as the one used for the RADIUS server on the cluster. The encryption key defined here must be the same as the one defined in the field Shared Secret in the Authentication Server Properties window in StoneGate GUI. See Figure 1.22 on page 21. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 17 Setting Up a RADIUS Server 10. Next, define the agent hosts for the other node, Sophia 22. Use the same parameters as with Sophia21 and repeat the steps 1-8. Illustration 1.19 depicts the agent host definitions used for node Sophia22. ILLUSTRATION 1.19 Edit Agent Host 11. Finally, define the agent hosts for the RSA ACE/Server itself (jowcol). Repeat the steps 1-8 described above. Illustration 1.20 depicts the agent host definitions of the RSA ACE/Server itself. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 18 Setting Up a RADIUS Server ILLUSTRATION 1.20 Edit Agent Host The RADIUS server configuration has now been finalized. RSA/ACE Client Setup The next thing to do is to setup the RSA ACE Client. If you need more information about the setup, please see Appendix B “RSA ACE Client Setup” on page 46. If you are already familiar with the RSA ACE Client setup, you can skip Appendix B. First Contact with Casual ACE Agent Next, the ACE Client needs to be contacted. If you need more information about this, please see Appendix C “First Contact with Casual ACE Agent” on page 58. If you are already familiar with the RSA ACE Client setup, you can skip Appendix C. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 19 Setting Up a RADIUS Server C r e a t i n g R A D I U S S e r v e r a n d S e r v i c e i n S t o n eG a t e In StoneGate, you must perform the following tasks: • • • • • Create a RADIUS server. Create a RADIUS authentication service. Create users or a special *external* user. Add rules in the Security Policy Manager. Check the service number. At least one CVIs in the cluster must be defined for use in authentication, which means it must use CVI mode A (this determines the interface used for authentication requests). This is enabled by checking the Use as identity for authentication request box. ILLUSTRATION 1.21 Interface Properties Creating a RADIUS Server Next, create a RADIUS server in StoneGate Network Element Manager. To create a RADIUS server: 1. 2. In the StoneGate Control Panel, open the Network Element Manager. Select the Repository View and right-click on Servers. From the contextual menu that appears, select New>Authentication Server. The Authentication Server Properties window opens. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 20 Setting Up a RADIUS Server ILLUSTRATION 1.22 Authentication Server Properties window 3. 4. 5. 6. Fill in the fields of the window. Verify that the port number in the Port Number field is the same as the RSA ACE/Server RADIUS port number (1645). Enter the shared secret. It is the same as the key created on the ACE Host Agent running on this server. See Figure 1.18 on page 17. Check the RADIUS radio button in the Type field. Click OK to continue. Creating a RADIUS Authentication Service Next, create a RADIUS authentication service in StoneGate User Manager. To create a RADIUS authentication service: 1. 2. In the StoneGate User Manager, select the Authentication Services tab. Click on the New Authentication service button on the toolbar. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 21 Setting Up a RADIUS Server 3. The Authentication Service dialog box opens. ILLUSTRATION 1.23 Authentication Service dialog box 4. 5. Enter a name for the authentication service, select the RADIUS radio button, and click OK to continue. The new service appears greyed-out on the list of authentication services in the left panel of the Authentication Services tab. It is greyed-out because it does not yet include any server. ILLUSTRATION 1.24 User Manager Authentication Services tab 6. Drag and drop the ‘RadiusServer’ that you created from the right panel to the left panel under the RADIUS authentication service. The server is now activated. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 22 Setting Up a RADIUS Server ILLUSTRATION 1.25 RADIUS server activated 7. 8. 9. Create a group profile for all users authenticating to the RSA ACE/Server. In the User Manager User Directory tab, expand the ‘InternalDomain’. Right-click on the ‘stonegate’ domain. Select New>Group from the contextual menu that appears. The Group Properties dialog box opens. ILLUSTRATION 1.26 GroupProperties dialog box Enter a name for the group profile and click the Authentication tab. 11. Drag and drop the authentication service created to the Bound Authentication Services panel. Click OK to continue. 10. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 23 Setting Up a RADIUS Server ILLUSTRATION 1.27 Group Properties Authentication tab Modifying an Existing Authentication Service Definition The default port defined in the RSA ACE/Server of the RADIUS service is 1645. The RADIUS service defined in StoneGate is 1812. This means that the port number for one or the other product will need to be changed. Note: If you change the port number on the RSA ACE/Server, you will also need to edit the ‘services’ file on the Windows NT server and change the record for the RADIUS service port. Another option is to modify the definition of the StoneGate RADIUS service. The port should be UDP (not TCP) in the ‘services’ file. See Illustration 1.29. Instead of modifying the default “RADIUS” service, you can create a new one and add it to the security policy. In the Security Policy Manager, create a rule that allows the cluster to communicate with the RSA ACE/Server. To modify an existing service: 1. In the Service Properties panel located in the Service Manager Services tab, modify the destination port of the RADIUS service. Change the port number in the Dst Ports field from 1812 to 1645. Illustration 1.28 depicts the situation before the change. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 24 Setting Up a RADIUS Server ILLUSTRATION 1.28 Service Manager, before Illustration 1.29 depicts the situation after changing the destination port number. ILLUSTRATION 1.29 Service Manager, after There is no need to add a rule in the rule base to allow RADIUS traffic from the nodes to the RADIUS server because the RADIUS service is already defined in the default rules. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 25 Setting Up a RADIUS Server ILLUSTRATION 1.30 Security Policy Manager When you select the View Inherited Rules button from the toolbar, all inherited rules will be displayed. The RADIUS service is in rule 7. ILLUSTRATION 1.31 Security Policy Manager RADIUS service Creating an External User Next, you need to create an *external* user profile. This is a special user profile that passes the actual user ID (not *external*) to the RSA ACE/Server along with the next token for authentication. This is the preferred method for authenticating to the RSA ACE/Server. Otherwise, you need to create a user profile on StoneGate for every user that will authenticate to the RSA ACE/Server. You must also maintain the same list on the RSA ACE/Server. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 26 Setting Up a RADIUS Server To create an *external* user: 1. In the User Manager, expand ‘InternalDomain’ and ‘stonegate‘ domain. Right-click on the group created above and select New>User. The User Properties dialog box opens. ILLUSTRATION 1.32 User Properties 2. 3. In the General tab, define *external* as the UserName. Select the Always Active check box or set the expiration parameters. Click OK to continue. Select the Authentication tab and drag and drop the RADIUS service to the panel on the right listing bound authentication services. For an *external* user, you do not need to specify any password here because it is retrieved from the RADIUS server. Click OK to continue. ILLUSTRATION 1.33 User Properties Authentication tab HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 27 Setting Up a RADIUS Server The *external* user has now been created and it appears in the user directory of the User Manager as depicted in Illustration 1.34. ILLUSTRATION 1.34 User Manager, User Directory tab 4. In the Security Policy Manager, open the Access Rules tab. ILLUSTRATION 1.35 Security Policy Manager Access Rules tab 5. Double-click in the Authentication field. The Authentication Parameters dialog box opens. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 28 Setting Up a RADIUS Server ILLUSTRATION 1.36 Authentication Parameters, Parameters tab Select the Parameters tab. 7. In the Method area, select the Require Authentication check box. Authentication applies on this rule if checked. If unchecked, no authentication process is applied to the rule and other parameters remain inoperative. If you select the Firewall-initiated Authentication check box, this enforces the firewall to initiate the authentication connection in case the client cannot be fully trusted. 8. In the Authorize area, you can select either: • Connection to authorize a single connection with a single authentication before time-out expires. Any new connection needs authentication. Set the Time-out in milliseconds. • Client IP to authorize all connections based on the IP address of the authenticated user until expiration of time-out. Set the Time-out in milliseconds. 9. Click the Authentication Services tab to display the embedded Authentication Service View and select the authentication services accepted by the rule. 10. Expand the Authentication Service View as necessary and select an authentication service. 11. Click Add to include the service in the Accepted Authentication Services list on the right. You can remove services from the list by selecting one and clicking the Remove button. 6. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 29 Setting Up a RADIUS Server 12. Click OK to validate your settings. ILLUSTRATION 1.37 Authentication Parameters, Authentication Services tab Adding Rules in the Security Policy Manager The node will communicate with the RSA ACE/Server using the IP addresses defined as the Default for Outgoing Connections in the NDI interface in the firewall cluster element. The protocol used is RADIUS (or radius-udp1645 if you decide to create a new service). 1. 2. 3. In the Security Policy Manager, select first the User View from the selection box. Then drag and drop the *external* user to the Users field. Drag and drop the “RADIUS” authentication service to the Authentication field. Save and install the security policy. Illustration 1.38 depicts the situation before. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 30 Setting Up a RADIUS Server ILLUSTRATION 1.38 Security Policy Manager, before Illustration 1.39 depicts the situation after. ILLUSTRATION 1.39 Security Policy Manager, after The RADIUS Server setup is now complete. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 31 Setting Up a RADIUS Server Authentication After the RADIUS server setup, you should check that it is operating properly. Try to authenticate using either Authentication Client or Telnet 2543. The Authentication Client is part of StoneGate VPN Client. Using Authentication Client authentication Follow the steps below to authenticate using the Authentication Client. To authenticate using the Authentication Client: 1. 2. 3. Select Start>Programs>StoneGate>VPN Client. The main page of StoneGate VPN Client opens on your default browser. Select option Firewall > Authentication. ILLUSTRATION 1.40 VPN Client Authentication main page 4. The User Authentication page opens. Type in the name or the address of the StoneGate Security Gateway. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 32 Setting Up a RADIUS Server ILLUSTRATION 1.41 User Authentication 5. When you use Authentication Client authentication, an Authentication Required prompt opens. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 33 Setting Up a RADIUS Server ILLUSTRATION 1.42 Authentication Required 6. 7. Enter the username, domain, and password and click the Submit button. Here, the password must consist of the PIN code (4 digits) + the keyfob number (6 digits). The Authentication Finished page opens. It informs you whether the authentication has been successful. Using simple Telnet authentication If you do not have any authentication client (StoneGate VPN Client) installed, you must create a Telnet connection to the gateway address, using StoneGate authentication port 2543. ILLUSTRATION 1.43 Telnet connection HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 34 Setting Up a RADIUS Server Tr o u b l e s h o o t i n g The following screenshot from the Log Browser shows an example of a typical error caused by situations in which the DNS server or /etc/hosts file was not correctly configured. Illustration 1.44 shows that the firewall tried to authenticate a user three times but did not succeed because in our case the /etc/hosts file was not correctly configured. The firewall was not able to resolve the IP address into a host name. ILLUSTRATION 1.44 Reverse lookup Authenticating if there are Several Authentication Services StoneGate can use the following authentication services: • UserPassword • IPSec Certificate • Radius • TACACS+ HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 35 Setting Up a RADIUS Server The authentication service used for a connection is chosen by the firewall engine unless the user specifies it as part of the user name. In all versions of StoneGate (up to and including 1.6.2) the firewall chooses the first authentication service in the user's LDAP database. However, the list of user's authentication services is not organized (it is actually a group) so the firewall may not choose the authentication service shown topmost in the user's GUI. To guarantee predictable service that operates correctly every time, the administrator should set only one authentication service for each user, or users should always specify the authentication service while authenticating. The full syntax of the user name field in the authentication process is the following: username[@domain][;authentication_service] If the user does not belong to the default domain of the management server, [@domain] needs to be specified. If the user has more than one authentication service, it is necessary to specify [;authentication_service]. The variables pictured in square brackets are optional. The ability to set these parameters makes most general cases simple to specify while delivering run-time flexibility for expert users. Examples In a typical general (simple) case, an authentication window appears in the VPN Client in response to a firewall-initiated authentication request. Only one authentication service is set for John, a user belonging to the default domain* so he must enter the following data in the authentication window: User name: john Domain: Password: secret In a more complicated case, a user named Jack normally authenticates with a static password when he is local to the corporate network. He occasionally travels, and while on the road authenticates using a SecurID card. On the road (e.g.) with only a personal digital assistant, he uses Telnet to authenticate to firewall port 2543: SG login: jack@stonegizmo.com;ace HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 36 Setting Up a RADIUS Server Enter PASSCODE: 624982 Please enter the next code from your token: 863077 PASSCODE Accepted Access granted While he is in the office, he enters: SG login: jack@stonegizmo.com;LDAP password on stonegizmo.com Password: secret2 Access granted * There may be several authentication domains, but only one is marked as the default domain. If a domain has not been specified for a user, the default domain is used. HWTO3SG1.6 - 5/3/02 HOW-TO GUIDELINES 37 APPENDICES APPENDIX A RSA ACE/Server Installation Start the RSA ACE/Server setup by installing the software and the patches. To install the RSA ACE/Server for Windows NT: 1. 2. Insert the RSA ACE/Server CD (assume CD-ROM drive is d:\). Run the installation program d:\aceserver\nt_i386\setup.exe and follow the instructions provided in the installation shield. The Welcome window of the RSA ACE/Server for Windows NT setup program opens. Click Next to continue. HOW-TO GUIDELINES 40 RSA ACE/Server Installation ILLUSTRATION A.45 RCA ACE/Server Windows NT Setup program Welcome window 3. The following window provides version information. Click Next to continue. ILLUSTRATION A.46 RSA ACE/Server 5.0 Welcome window 4. The License Agreement window opens. Read it through carefully. If you accept the agreement, click Yes to accept and continue. A — 41 HOW-TO GUIDELINES ILLUSTRATION A.47 License Agreement 5. The New Input Files window opens. On the Primary, insert the Primary Server License disk into drive A:\. Click Next to continue. ILLUSTRATION A.48 New Input Files 6. The Available Input Files window lists all the currently available input files. Click Next to continue. HOW-TO GUIDELINES A — 42 RSA ACE/Server Installation ILLUSTRATION A.49 Available Input Files 7. In the Installation Directory window, enter the pathname to the destination directory. Use standard defaults to install the server to c:\ace5\. Click Next to continue. ILLUSTRATION A.50 Installation Directory 8. In the Installation Options window, select the items you want to install. A successful configuration requires at least a New Primary RSA ACE/Server. Click Next to continue. A — 43 HOW-TO GUIDELINES ILLUSTRATION A.51 Installation Options 9. The Start Copying Files window lists the current settings. Click Next to copy the files. ILLUSTRATION A.52 Start Copying Files 10. You must restart the computer before you can use the RSA ACE/Server you installed. In the Installation Complete window select the Yes, I want to restart my computer now radio button, remove all disks from the disk drives, and click the Finish button. If required, install the appropriate service pack for the RSA ACE/Server 5.0. HOW-TO GUIDELINES A — 44 RSA ACE/Server Installation ILLUSTRATION A.53 Installation Complete A — 45 HOW-TO GUIDELINES APPENDIX B RSA ACE Client Setup Catool is a certificate utility tool provided with the ACE Client in order to create certificates and keys used by the Client when communicating with the RSA ACE/Server. Catool Installation Follow the steps below for Catool installation. To install Catool: 1. Intall the Catool that comes with the agent. Select Start > Programs > ACE Agent > RSA ACE Agent Certificate Utility. The Welcome window opens. Click Next to continue. HOW-TO GUIDELINES 46 RSA ACE Client Setup ILLUSTRATION B.54 RSA ACE/Agent Certificate Utility 2. The Software License Agreement window opens. Read it through carefully. If you accept the license agreement, click Yes to continue. ILLUSTRATION B.55 Software License Agreement B — 47 HOW-TO GUIDELINES Catool Installation 3. The Choose Destination Location window opens. Choose a folder and click Next to continue. ILLUSTRATION B.56 Choose Destination Location 4. In the Select Program Folder window, choose a program folder in which to store the program icons that will be added. Click Next to continue. ILLUSTRATION B.57 Select Program Folder HOW-TO GUIDELINES B — 48 RSA ACE Client Setup 5. The Setup Complete window will inform you when the setup is complete. Exit the program by clicking Finish. ILLUSTRATION B.58 Setup Complete 6. Next, create a new root certificate and key. In the RSA ACE/Agent Certificate Utility dialog box, define the current directory (by default in C:\Program Files\SDTI\RSA ACE Agent..). Click the New Root Certificate and Keys button. ILLUSTRATION B.59 RSA ACE/Agent Certificate Utility 7. The Create New Certificate and Keys dialog box opens. B — 49 HOW-TO GUIDELINES NT Agent Installation ILLUSTRATION B.60 Create new Certificate and Keys 8. You will receive a notification when the root certificate and keys are successfully created. ILLUSTRATION B.61 RSA Security Inc. Certificate Tool NT Agent Installation Next, you need to install the NT agent. Installing the agent itself If you receive the warning displayed in illustration Figure B.62, check that the service “RSA ACE/Server RADIUS daemon” is started. ILLUSTRATION B.62 Warning HOW-TO GUIDELINES B — 50 RSA ACE Client Setup To install the agent: 1. 2. 3. 4. Before you start the agent installation, copy c:\ace5\data\sdconf.rec from the RSA ACE/Server machine to c:\winnt\system32\ of the Agent machine. If the RSA ACE/ Server is UNIX, copy /ace5/data/sdconf.rec from the RSA ACE/Server machine to c:\winnt\system32\ of the Agent machine. This file record contains information about the RSA ACE/Server configuration that the ACE client uses when establishing the contact with the RSA ACE/Server. Insert the SecurSight Agent CD. Run the SecurSight Agent installation program d:\acecInt\nti386\agent.exe. The RSA ACE/Agent for Windows NT setup program Welcome window is displayed. Click Next to continue. ILLUSTRATION B.63 Welcome window 5. The Software License Agreement window opens. Read the license through carefully. If you accept it, click Yes to continue. B — 51 HOW-TO GUIDELINES NT Agent Installation ILLUSTRATION B.64 Software License Agreement 6. In the Select Components window, select Network Access Authentication (Client). Click Next to continue. ILLUSTRATION B.65 Select Components HOW-TO GUIDELINES B — 52 RSA ACE Client Setup 7. In the Location of Root Certificate window, enter the path of the “sdroot.crt” file previously created with Catool. Click Next to continue. ILLUSTRATION B.66 Location of the Root Certificate “sdroot.crt” 8. In the Select Root Cert dialog box, select the root certificate and click Open. ILLUSTRATION B.67 Select Root Cert 9. In the Location of Root Certificate “sdroot.crt” window, click Next to continue. B — 53 HOW-TO GUIDELINES NT Agent Installation ILLUSTRATION B.68 Location of Root Certificate “sdroot.crt” 10. In the following window, enter the path to your RSA ACE/Server configuration record and click Next to continue. This file was created earlier as depicted in Illustration 1.4, “RSA ACE/ Server Configuration Management,” on page 7 and it is now copied to this location. ILLUSTRATION B.69 Location of RSA ACE/Server configuration record “sdconf.rec” HOW-TO GUIDELINES B — 54 RSA ACE Client Setup 11. Follow the program registration instructions in this window. Click Next to continue. ILLUSTRATION B.70 RSA ACE/Agent Registration 12. In the Setup Complete window, click Yes, I want to restart my computer now, remove all disks from disk drives, and click Finish to complete the setup. B — 55 HOW-TO GUIDELINES NT Agent Installation ILLUSTRATION B.71 Setup complete HOW-TO GUIDELINES B — 56 First Contact with Casual ACE Agent APPENDIX C Next, contact the Ace Agent. This is the initial contact and there is no need to do this separately for each user. Later on, the users will connect using the Authentication Client. Note: 1. If you have engine version 774 or higher, this operation can be performed directly from the first authentication using the Telnet 2543 or Authentication Client connection using the StoneGate VPN Client. After reboot, start the Log Monitor on the RSA ACE/Server from Start>Programs>RSA ACE>Log Monitor. The Log Monitor assists you in configuring and troubleshooting. Complete the definitions and click OK to continue. HOW-TO GUIDELINES 58 First Contact with Casual ACE Agent ILLUSTRATION C.72 Log Monitor Selection Criteria 2. C — 59 An empty window will open. This window will display a note confirming whether or not the authentication has been accepted. HOW-TO GUIDELINES ILLUSTRATION C.73 RSA ACE/Server Log Monitor 3. 4. From the client, run Start>Programs> RSA ACE>Authentication test. When starting the client on Win2000 Professional, you may see the following warning. Click OK to continue. ILLUSTRATION C.74 RSA ACE/Agent Authentication Test 5. The RSA SecurID Authentication Information window opens. HOW-TO GUIDELINES C — 60 First Contact with Casual ACE Agent ILLUSTRATION C.75 RSA SecurID Authentication Information 6. 7. Click the RSA ACE/Server Test Directly button. This will connect to the local RSA ACE/Server (IP address 0.0.0.0) because the client is currently running on the same machine as the RSA ACE/Server. The RSA SecurID Authentication dialog box opens. ILLUSTRATION C.76 RSA SecurID Authentication 8. C — 61 Enter here the UserName and first passcode entered when defining the user. Click OK to continue. HOW-TO GUIDELINES 9. The RSA ACE/Server Log Monitor window opens. This window contains information about the authentication attempt of the user called ‘userpwd’. Click Exit to continue. ILLUSTRATION C.77 RSA ACE/Server Log Monitor A New PIN dialog box opens. Because this was the first successful authentication, the user is asked to change the PIN code. 11. Enter a new PIN code and its confirmation. Click OK to continue. 10. ILLUSTRATION C.78 New PIN HOW-TO GUIDELINES C — 62 First Contact with Casual ACE Agent 12. The RSA ACE/Agent Authentication Test dialog box opens. It confirms whether the new PIN has been accepted. Click OK to continue. ILLUSTRATION C.79 RSA ACE/Agent Authentication Test 13. The RSA ACE/Server Log Monitor window opens. It now contains information about the authentication. Illustration C.80 depicts the situation for user ‘userpwd’. Click OK to continue. ILLUSTRATION C.80 RSA ACE/Server Log Monitor Next, perform steps 7-13 with user ‘userkeyfob’. First, enter the UserName and the first passcode entered when defining the user. 15. You are asked to change the PIN code. Enter a new PIN code. 14. C — 63 HOW-TO GUIDELINES ILLUSTRATION C.81 New PIN 16. A dialog box confirms whether or not the authentication has been successful. ILLUSTRATION C.82 RSA ACE/Agent Authentication Test 17. Using the RSA ACE/Server Log Monitor, check that the actions you have taken have been accepted. See Illustration C.83 on page 65. HOW-TO GUIDELINES C — 64 First Contact with Casual ACE Agent ILLUSTRATION C.83 RSA ACE/Server Log Monitor C — 65 HOW-TO GUIDELINES
© Copyright 2025