Академический Документы
Профессиональный Документы
Культура Документы
de
RELEASE NOTE
BIANCA/BRICK-XL
March 23, 1998
New in
4.8.2
Whats New in
Release 4.8.1
This document describes the new features, enhancements, bugfixes, and changes to the BIANCA/BRICK-XL System Software
since Release 4.7 Revision 1.
Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Fast Ethernet Support . . . . . . . . . . . . . . . . . . . . . . 6
Encryption (MPPE) . . . . . . . . . . . . . . . . . . . . . . . . . 6
Virtual Private Networking and PPTP . . . . . . . . . . 7
Token Authentication Firewall (TAF) . . . . . . . . . . . 8
New Remote Multi CAPI Client (RMCC) . . . . . . . 9
MS-STAC Compression . . . . . . . . . . . . . . . . . . . . . . 9
New Access List Methodology . . . . . . . . . . . . . . 10
Local TCP/UDP Service Access Rules . . . . . . . . 10
IP Multicasting Support for RIP V2. . . . . . . . . . . . 11
Connected Line Identification Presentation. . . 12
IP Routing Algorithm Change. . . . . . . . . . . . . . . 12
New User Login Table. . . . . . . . . . . . . . . . . . . . . . 14
Login Accounting Messages . . . . . . . . . . . . . . . 15
RADIUS Enhancements . . . . . . . . . . . . . . . . . . . . 15
Source Routing Bridge Compatibility. . . . . . . . . 16
Utility Enhancements . . . . . . . . . . . . . . . . . . . . . . 18
Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Bugfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Detailed Feature Descriptions . . . . . . . . . . . . . . . . . 23
Please note that from release 4.8.1 on a new IP access list system
is used. The old access lists will be automatically converted to
the new system.
Before upgrading from a system running release 4.7.1 or older
save your configuration to the flash ROM (using either Save as
boot configuration and exit of Setup Tool, or cmd=save).
If you want to keep your old configuration you can also save it
under a different name, e.g. cmd=save path=config471.
Then perform the upgrade as described here, check the converted access lists (see p. 10) and save the new configuration.
The access list conversion will not work if you load an older
configuration file via TFTP. The BRICK will then contain no access list settings.
2. With this image you can upgrade the BIANCA/BRICK-XL
with the update command from the SNMP shell via a remote
host (i.e. using telnet, minipad, or isdnlogin) or by using the
BOOTmonitor if you are logged in directly on the console.
Information on using the BOOTmonitor can be found in the
BRICK-XL Users Guide under Firmware Upgrades.
3. Once youve installed Release 4.8 Revision 2 you may want
to retrieve the latest documentation (in Adobes PDF format)
which is also available from BinTecs FTP server at the address noted above.
Note: When upgrading system software, it is also recommended that you use the most current versions of
BRICKware for Windows and UNIXTools. Both can be
retrieved from BinTecs FTP server.
Released: 23.03.98
Bugfixes
CAPI
When using a CAPI application in transparent transfer
mode the dataflow was occasionally interrupted, when
the application sent too few data, resulting in a connection
tear-down.
This bug has been fixed.
The capiConfigModemDefault variable is now correctly initialized to modem_profile_1 instead of 0.
IP Access Lists
In rare cases the system rebooted when trying to convert
complex access lists involving many interface-dependent
conditions from a release 4.7.1 to release 4.8.1.
This bug has been fixed.
FM-MOD-56K
When using the modem modules for non-fax CAPI applications involving large data packetse.g. file transfers
occasionally 1-3 data bytes were irrecoverably lost.
This bug has been fixed.
Behaviour for multiple simultaneous fax connections has
been improved. In previous releases sometimes no more
new fax connections could be established when many fax
connections were set-up and released simultaneously.
PPP
By mistake the CallReference field in the biboPPPLinkTable was not set in Release 4.8.1, therefore you could no
longer monitor ISDN calls from the Setup Tools [Monitoring and Debugging][Interfaces][EXTENDED] menu.
This bug has been fixed.
When setting up a DialUp-Networking PPP connection
from a Windows PC to your BRICK the PC sometimes
only acknowledged the connection set-up after about 30
seconds due to configuration inconsistenciesit seemed
to be idle for this time.
The set-up is now acknowledged much more quickly.
TAF
The ipTafTimeout timer will now continue running even if
a data connection is interrupted by the shorthold mechanism (instead of being mistakenly reset).
The user was occasionally asked to enter a new Passcode,
even when this was not necessary.
This bug has been fixed.
VPN / IP Tunnelling
When setting up and tearing down a tunnelled IP connection several hundred times the BRICK occasionally rebooted due to an internal error.
This bug has been fixed.
Important Note
IP Access Lists
When configuring IP access filters depending on an IP address (e.g. ipFilterSrcAddr or ipFilterDstAddr) you must
also specify an appropriate netmask.
The IP address/netmask combination
10.0.0.1/255.255.255.255
means 10.0.0.1 only, while
10.0.0.1/255.255.255.0
means 10.0.0.1 through 10.0.0.255.
Bugfixes:
Released: 9.03.98
Detailed Description:
Features
Fast Ethernet Support
Beginning with Release 4.8 the BRICK-XL now supports
BinTecs new CM-100BT Fast Ethernet module. The CM-100BT
Fast Ethernet module supports 100Base-TX according to the
IEEE 802.3u specification and provides the following features/
advantages.
mppe_128
none
Securtiy
For security reasons the BRICK rejects PPP connections for partners where Encryption is enabled but couldnt be successfully
negotiated at connect time. Also, once an encrypted link is established, (MPPE options were successfully negotiated) the
BRICK will immediately terminate the link if the remote side attempts to disable encrytion at any time during the connection.
NOTE: Since key generation is based upon the partners password data encryption is only possible if authentication
(biboPPPAuthentication = [ pap|chap|ms-chap|radius])
is enabled. Also, if 128 bit encryption is desired the MSCHAP authentication protocol must be used.
provide affordable yet secure remote access for distant or travelling workers, branch offices, or selected business partners.
By using the Internet as a transport medium both ends of the
VPN avoid costly long distance charges and are only required
to connect to their local Internet Service Provider.
NOTE: Virtual Private Networking support requires a separate license to be installed on the BRICK. Remote VPN clients will also require support for the PPTP protocol.
PPTP support for Windows 95 is a component of the Dial-Up
Networking Upgrade 1.2. You can refer to Microsofts
WWW site at http://www.microsoft.com/backoffice/communications/pptp.htm for details. PPTP is included on Windows NT 4.0 (Service Pack 3) and newer systems.
For a detailed description of VPNs and PPTP as well as the
new SetupTool menus and MIB changes refer to the section Virtual Private Networking beginning on page 29.
You will need a special TAF license to use TAF on your BRICK.
Along with the TAF license for the BRICK you will get 10 TAF
Login licenses for PCs you wish to use as TAF clients.
For a detailed description of Token Authentication Firewall
refer to section Token Authentication Firewall beginning on
page 50.
ripV2
none
11
ripV2mcast
both
ripV2
both
none
12
phases. Each phase consists of considering all IP routes, gradually reducing the list, and selecting the most desirable route.
Phase 2 is only entered if no routes were found during Phase
1. For the sake of clarity the new algorithm is outlined in detail
in the flowchart shown below.
Matching
ipExtRtTable
found
yes
no
More
yes
than one route
match
Unique
lowest Metric1
found
yes
no
no
Check the
ipRouteTable
PHASE 1
Select best route
1. Consider all matching routes where
ipRouteDest != 0
2. Does a non-default route exist [y|n]?
3. Remove from the list all routes whose
ifOperStatus != up OR dormant
4. Select routes with largest ipRouteMask
5. Select the routes with the highest
protocol priority (ipPriorityTable)
6. Select the routes with the lowest Metric
Was a
unique route
found
yes
no
More
than one route
left
yes
Route via any route in the set.
PHASE 2
no
yes
Nonno
Default route
exist
Was a
unique route
found
yes
no
Destination unreachable.
13
Command(rw)
00 checkmail
01 uucp
telnet 10.5.5.21
valid
telnet -f 10.5.5.5 540 valid
123
State(-rw)
Any external shell command (ping, telnet, minipad, isdnlogin, setup, etc.) can be used in the Command field. If the user
enters Control-C, Command is stopped and the login connection is closed. Also, by using the sh command a BRICK SNMP
shell connection can be started. For security reasons this table
can only be viewed/changed by the admin user.
Limitations/Security Considerations
The following limitations and/or security aspects involving the
use of the biboAdmLoginTable should be carefully considered:
Data links that connect via special LoginTable entries generally may not be as efficient (throughput) as true interface connections since these connections are ultimately a
sub-process of the initial login shell process which by default carries a lower priority than routing functions (refer
to your documentation of the p command).
Because the login-and-forward mechanism does require
more system resources (memory in particular) than routed connections it isnt recommended for a great number of
users.
14
~Level
Info
Info
Warning
If the login session was from a program other than the console the accounting message also states the IP address of the
source host, the X.25 address, or the calling partys number (if
received via the ISDN).
RADIUS Enhancements
Two enhancements have been made to RADIUS in Release 4.8.
1. RADIUS accounting messages generated by the BRICK now
contain NAS (Network Access Service) port information. On
15
the BRICK the NAS port corresponds to the ISDN stack the
connection was established on.
2. Two new BinTec-specific RADIUS extensions have been
added in Release 4.8 which correspond to the variables
Validate and DefaultPW (described below) that were added
to the radiusServerTable. A new dictionary file, Version 1.5,
is also available from BinTecs WWW site.
radiusSrvValidate
This option is intended for bogus RADIUS servers, which
send response messages with an incorrectly calculated
MD5 checksum. All messages generated by the BRICK,
however, will always use the proper authentication
scheme. For security reasons, this option should always be
left set to its default value of enabled.
enabled
disabled
radiusSrvDefaultPW
This is the default user password the BRICK sends when
no password is available (for example, in requests for the
calling number or boot requests). Some RADIUS servers
rely on a configured USER- or CHAP-PASSWORD for any
RADIUS request. The default value is an empty string.
Source Routing Bridge Compatibility
The BRICKs Token Ring interface can now be set to operate in
compatibility mode if source routing bridges are being used.
NOTE: This does not mean that the BRICK can be used as a
Source Routing Bridge (SRB) but that it should operate in a
manner compatible to neighboring SRBs.
In compatibility mode the BRICK adapts MAC information
(in the ethernet frame) to include an additional routing information field which is used by neighboring SRBs. Only use this
mode if source routing bridges are actually being used.
16
disabled
17
Utility Enhancements
makekeyThe makekey command is new in Release 4.8
and is a component of the TAF (Token Authentication
Firewall) support on the BRICK. See page 63 for a description of the makekey command.
shtafThe shtaf command is new in Release 4.8 and is
also a component of TAF support on the BRICK. See page
63 for a description of the shtaf command.
telnetThe -f option has been added to telnet.
The new syntax is as follows:
telnet [-f ] host [port]
The -f option specifies that the telnet connection should be
transparent. This option is especially useful for establishing connections to non-telnet ports such as uucp or smtp.
See the example in the section New User Login Table.
ifstatThe new r option now displays the Access
Rules that apply to the specified BRICK interface(s).
The new syntax is as follows:
ifstat [-lur] [<interface>]
The -l option displays long output (normally only 12
characters of the ifDescr fields are shown) while the -u
option displays status information for interfaces in the
up state. For interface a numeric ifIndex or ifDescr may
be used.
BRICK:> ifstat -r en1
01000 en1
Rul/Flt Action
001/001 deny M
003/003 deny M
002/002 allow M
Descr
telnet
http
all-else
Conditions
daddr 192.168.12.1/32, dport 23
daddr 192.168.12.1/32, dport 80,
18
Opkts Oes
407
0
0
0
up 0
up 0
0
0
0
0
Type Address
MAC 00:a0:f9:00:c0:11
IP 192.168.3.115
MAC 00:a0:f9:00:a0:11
MAC 00:a0:f9:00:a0:11
Changes
PPP
The default PPP timeout for incoming connections (inband authentication) was increased from 1000 to 3000 ms.
biboPPPProfileTable
The default value for the AuthRadius variable in the
biboPPPProfileTable has been changed from inband to
both
Setup Tool
In addition to Setup Tools new Virtual Private Networking menus the [ISDN Numbers] menu has been renamed
to [WAN Numbers] in Release 4.8. Please be aware of this
when references in your existing documentation are made
to the old [ISDN Numbers] menu.
19
Bugfixes
CAPI
A problem has been corrected which occurred when multiple BRICK capitraces were running simultaneously and
characters were lost in the transfer.
In previous releases, the BRICK incorrectly sent a
CAPI2_E_FAX_REMOTE_ABORT message when a problem occurred while receiving a fax page. CAPI now correctly transmits a CAPI2_E_FAX_ILLEGAL_CODING
message instead.
Information regarding the Channel Identification was incorrectly encoded in InfoInd messages sent by the BRICK.
CAPI applications that took unusually long to confirm reception of data sometimes induced a problem on the
BRICK that resulted in the system hanging.
IP
In rare cases entries in the ipNatOutTable couldnt be deleted. This problem has been corrected.
Incompatible ICMP implementation.
If a routing table entry existed for the special REFUSE interface (ifIndex=0), ICMP - destination unreachable
messages were sometimes incorrectly transmitted when
establishing dialup connections. This has been fixed in Release 4.8 Revision 1.
Problem with IP Fragmentation and NAT.
On NAT interfaces IP packets that were fragmented (this
only happens rarely since most protocols have a max
packet size much smaller that the interfaces MTU) were
sometimes given an incorrect TTL value. This led to a
problem where packets travelling over many hops were
discarded and never reached their destinations.
A problem involving NAT and improperly configured IP
routing entries sometimes resulted in a system panic.
20
IPX
A problem involving piggy back updates via RIP has
been fixed.
FM-8MOD
On BRICK-XLs fitted with FM-8MOD modem modules
sometimes the modems seemed to hang when many faxes
where being sent or received simultaneously. This problem has been corrected in 4.8.
OSPF
IP routes added to the ipRouteTable that were based on
OSPF External Advertisements received by the BRICK
sometimes had an incorrect NextHop value.
PPP
CCP Negotiation (STAC LZS Compression).
A problem involving STAC negotiation options with
CISCO IOS 11.2 routers hindered successful STAC LZS
compression resulting in links without compression. This
has been corrected.
CCP (STAC LZS Compression)
For interfaces where STAC compression was negotiated
and the data to be transmitted couldnt be compressed the
configured MTU size was sometimes exceeded and resulted in a disconnect during lengthy data transfers.
CCP Negotiation on leased line interfaces.
A problem involving CCP negotiation on leased bundle
interfaces hindered the successful negotiation of STAC
LZS compression for the link. PPP connections were established, but without compression. This has been fixed in
Release 4.8.
Leased Line interfaces.
PPP keep alive packets (LCP Echo Request) are again
transmitted at regular intervals regardless whether the interface is idle or active. Starting in release 4.6.2 keep alive
21
22
Pin Assignments
Pin
Status Indicators
Function
Colour
State
Meaning
Transmit (+)
Red
On
Receiving packets.
Transmit (-)
Amber
On
Transmitting packets.
Receive (+)
On
Receive (-)
Blink
Off
Green
Crossover Cable
End One
End Two
Orange-White
Orange-White
Green-White
Orange
Orange
Green
Green-White
Green-White
Orange-White
Blue
Blue
Brown-White
Blue-White
Blue-White
Brown
Green
Green
Orange
Brown-White
Brown-White
Blue
Brown
Brown
Blue-White
23
Speed/Mode of Operation
auto
rj45_10mbit_hdup
rj45_10mbit_fdup
rj45_100mbit_hdup
rj45_100mbit_fdup
24
~Level
Debug
Warning
Warning
Warning
Warning
Err
Err
Info
Info
25
26
Data
Rate
(Mbps)
Cable
Specification
Max.
Segment
Length
(Meters)
Full
Duplex
20 x 100
Yes
Etherneta
10baseT
10
2pair, UTP
Category 5
Ethernet
10base2
10
1 pair
coaxial
185
No
Ethernet
10base5
10
1 pair
coaxial
500
No
No
Token Ring
4/16
2 pair, UTP
or DB-9
Fast Ethernet a
100baseTX
100
2 pair,
Category 5
2 x 100
Yes
Fast Ethernet
100baseT4
100
4 pair, UTP
2 x 100
Yes
LAN
Technology
Fast Ethernet
100baseFX
Data
Rate
(Mbps)
100
Cable
Specification
Fiber Optic
Max.
Segment
Length
(Meters)
Full
Duplex
2000
No
100 meters
27
28
5
meters
Class II
Repeater
100
meters
ISP
VPN Server
10.5.5.2
Internet
10.5.5.4
10.5.5.3
10.5.5.4
29
ISP
VPN Server
Private
Enterprise
LAN
Internet
PPP
PPTP
Tunnel
IP
IP
This is the most common scenario for PPTP. The remote client (mobile Win95 host) first establishes a standard PPP connection to a local ISP. The same client then initiates a second,
logical connection, to the VPN Server. The ISP (and all intermediate Internet routers), unaware that it is participating in
a VPN, simply routes IP packets from the PPTP Client.
To hosts on the Private Enterprise LAN the remote PPTP
Client appears as if it were directly connected to the LAN.
When sending data to the enterprise LAN the PPTP Client encapsulates PPP packets in the user-data field of the IP
packet which is later unpacked by the VPN Server.
PPP Header
Encrypted
Data
IP Header
GRE Header
PPP Header
IP IPX NetBEUI
User-Data
30
ISP
ISP
VPN Server
Enterprise LAN
Enterprise LAN
Internet
PPP
PPTP
IP
Tunnel
IP
31
Data Encryption
Data encryption allows you to be sure that all user data transmitted over public data networks via a VPN is secure. The
BRICK supports Microsofts Point-to-Point Encryption protocol, or MPPE data encryption. Data encryption/decryption is
performed at each end of the tunnel. Each host separately generates a session-key (40 or 128 bit key) using the respective partners PPP password which is known to each host ahead of time.
NOTE: Since session-key generation is based upon the partners password, data encryption is only possible if authentication (PAP, CHAP, or MS-CHAP) is enabled. Also, for 128
bit encryption the MS-CHAP authentication protocol is required (i.e., must be successfully negotiated at connect time.)
The Windows PPTP configuration dialoge includes an option for password encryption. This option applies to transmittal of
the PPP password and does not apply to data encryption.
Compression
Data compression, depending on the data and the compression
algorithm used, can increase performance over dial-up links as
much as 30 fold (best case scenario using Stacker LZS). In both
scenarios shown above, compression can be enabled for the initial PPP connection. Compression can also be enabled for PPTP
links between BRICKs (Scenario 2: LANtoLAN VPN).
NOTE: The following limitation currently exists when combining compression + encryption for a PPTP link with Windows based hosts.
When the Enable software compression option is enabled in the Server Types tab (see Step 5.) Windows PPTP Clients offer EITHER MS-STAC Compression OR MPPE Encryption when tunnel parameters are negotiated. Currently,
compression is only possible for the PPTP link if Encryption
is set to none for the VPN partner interface on the BRICK
(see the [VPN][ADD] menu on page 37).
32
33
34
4. Click Next> and the Finish. A new icon for the BRICK
VPN Server will be added to the Dial-Up Networking
folder.
35
36
Partner Name
Enabled Protocols
Encapsulation
Encryption
Identify by Calling Address
PPP Authentication Protocol
Partner PPP ID
Local PPP ID
PPP Password
vpn1
<X> IP < > IPX < > BRIDGE
PPP
MPPE 40
no
MS-CHAP
vpn1id
mybrick
vpn1pass
IP >
IPX >
Advanced Settings >
SAVE
CANCEL
In the Encryption field you may select MPPE encryption (40 bit or 128 bit session-key) or none.
Disable (no) the Identify by Calling Address option. This option can not be used since the BRICK will
assign the PPTP client an IP address at connect time.
37
none
none
IP Accounting
Dynamic IP-Address Server
Back Route Verify
off
on
off
OK
CANCEL
38
2. Right-click the Internet Server Provider icon, select Connect and enter the user/password assigned by the ISP.
(PPP Password)
vpn1pass
39
ISP-1
Internet
10.6.6.2
192.168.99.9
192.168.12.1
10.6.6.1
10.5.5.1
SupplierNet.com
10.5.5.2
CentralSite.com
Once both BRICKs are configured for Virtual Private Networking hosts on either LAN can connect to hosts on the remote
LAN. All traffic that is routed between the two networks is encrypted (user-data encryption). Individual hosts are not required to support PPP or PPTP, the VPN remains transparent.
Configuration on SupplierNet BRICK
1. A separate license must be installed before Virtual Private Networking can be used. Verify the license is installed in Setup Tools LICENSES
menu.
The status for TUNNEL must be valid.
2. The link to the ISP-1 can be setup as a standard dial-up/
leased PPP interface in the WAN PARTNER menu.
3. Configure the VPN Partner interface in the VPN menu.
The VPN Partner interface for the BRICK-XL on CentralSite.com could be configured as follows.
Define a partner name (csite) and enable one or
more protocols to support on the link.
In the Encryption field you may select MPPE encryption (40 bit or 128 bit session-key) or none. The options specified here must be the same for each partner.
Enable (yes) the Identify by Calling Address option. The VPN partner will be identified by the IP address it uses when establishing the PPP link.
40
Partner Name
Enabled Protocols
Encapsulation
Encryption
Identify by Calling Address
PPP Authentication Protocol
Partner PPP ID
Local PPP ID
PPP Password
csite
<X> IP < > IPX < > BRIDGE
PPP
MPPE 40
yes
CHAP
csiteid
mybrick
csitepass
IP >
IPX >
Advanced Settings >
SAVE
CANCEL
4. In the IP menu you will need to define the IP addresses the VPN Partner will be using.
The VPN Partners IP Address field for csite would
be set to 192.168.12.1.
Under via IP Interface select the PPP interface for the
local ISP. VPN connections to CentralSite.com may
only be established over this interface.
Specify csites LAN address and netmask in the
Partners LAN IP Address/Netmask fields.
41
192.168.12.1
ISP-1
10.5.5.1
255.0.0.0
SAVE
CANCEL
42
Enable (yes) the Identify by Calling Address option. The VPN partner will be identified by the IP address it uses when establishing the PPP link.
In the PPP Authentication Protocol field select which
authentication to use.
NOTE: If MPPE 128 encryption was selected the MS-CHAP
protocol is required here.
Set Partner PPP ID and PPP Password as needed.
BIANCA/BRICK-XL Setup Tool
[VPN][ADD]: Configure VPN Interface
Partner Name
Enabled Protocols
Encapsulation
Encryption
Identify by Calling Address
PPP Authentication Protocol
Partner PPP ID
Local PPP ID
PPP Password
SupplierNet
<X> IP < > IPX < > BRIDGE
PPP
MPPE 40
yes
CHAP
supplierid
mybrick
supplierpass
IP >
IPX >
Advanced Settings >
SAVE
CANCEL
4. In the IP menu you will need to define the IP addresses the VPN Partner will be using.
The VPN Partners IP Address field for
SupplierNet would be set to 192.168.99.99.
Under via IP Interface select the PPP interface for the
local ISP. VPN connections to SupplierNet.com may
only be established over this interface.
Specify SupplierNets LAN address and netmask
in the Partners LAN IP Address/Netmask fields.
43
192.168.99.99
ISP-2
10.6.6.1
255.0.0.0
SAVE
CANCEL
44
VPN
Main Menu
<Edit>
Partner Name
Enabled Protocols
Encapsulation
Encryption
Identify by Calling Address
Authentication Protocol
Partner PPP ID
Local PPP ID
PPP Password
IP
IPX NetNumber
RIP/SAP Updates?
Update Time
Advanced Settings
45
VPN
ADD
Partner Name
Enabled Protocols
Encapsulation
Encryption
Identify by Calling Address
PPP Authentication Protocol
Partner PPP ID
Local PPP ID
PPP Password
tunnel
<X> IP < > IPX < > BRIDGE
PPP
none
no
CHAP + PAP + MS-CHAP
tunnel1-ppp-id
brick
tunnel1-ppp-pwd
IP >
IPX >
Advanced Settings >
SAVE
CANCEL
VPN
ADD
IP
192.168.12.99
ISP
192.168.13.99
255.255.255.0
SAVE
CANCEL
47
VPN
IPX
ADD
The VPN IPX submenu defines IPX relevant settings for VPN
partner interfaces that support IPX.
BIANCA/BRICK-XL Setup Tool
[VPN][ADD][IP]: IP Configurartion (tunnel)
IPX NetNumber
triggered + piggyback
Update Time
60
SAVE
CANCEL
48
VPN
ADD
ADVANCED SETTINGS
The settings defined here are similar to the [WAN PARTNERS][ADVANCED SETTINGS] menu but apply specifically to an
VPN partner interface.
BIANCA/BRICK-XL Setup Tool
BinTec Communications GmbH
[VPN][ADD][ADVANCED]: Advanced Settings (tunnel)
mybrick
none
none
IP Accounting
Dynamic IP-Address Server
Back Route Verify
off
off
off
OK
CANCEL
49
TAF-protected Network
314159
SecurID
Token Card
ISDN
TAF Server
(ACE/Agent)
ACE/Server
In the scenario shown above a remote teleworker could connect to the TAF-protected company LAN via any communications medium supported by the central site router (dialup
ISDN, analog modem, GSM, internet).
50
51
52
Now enter the name and network (IP) address of the BRICK,
select Communication Server as the client type, and select the encryption type you want to use. Please note that the same encryption type must also be configured on the BRICK.
Confirm your entries with the OK button.
If you want to modify ACE/Server system settingse.g. the
port to use for communication with the BRICK (default: 5500)
you can use the sdsetup -config command. In most cases no
changes are necessary.
53
54
55
After the installation the program will prompt you for the
TAF Login license key. Here you can also enter the configuration data for the BRICK to use for user-initiated logins.
The Trusted Routers list contains all routers which sent an authentication request to the PC and which were accepted by the
user.
56
Once you have entered the license information and configured a BRICK you can commence with the actual authentication
procedure.
Enter your login name for the ACE/Server and the passcode
displayed on your Token Card. Click on the OK button.
If the authentication was successful the TAF Login dialog
will be closed and the TAF icon in the task bar will change to ,
if the authentication failed an error message is displayed, and
the icon will remain .
TAF Login also includes a monitoring function. If you rightclick on the TAF icon you will get a menu from which you can
select Show Monitor Window.
This menu consists of two submenus where Token Authentication Firewall relevant settings are configured.
BIANCA/BRICK-XL Setup Tool
[IP][TAF]: Token Authentication Firewall
Interfaces
Server
EXIT
The
menu is used to enable/disable SecurID
INTERFACES
support separately for each BRICK interface.
The
menu is used for configuring SecurID
SERVER
Server relevant settings on the BRICK. These settings must correspond to the parameters configured on the ACE/Server.
58
IP
INTERFACES
This menu lists the BRICK interfaces that may be configured for
Token Authentication Firewall support. TAF can ony be used on
interfaces which have been explicitly enabled for use with SecurID.
NOTE: Typically, the SecurID Server (ACE/Server) is accessible via the BRICKs LAN interface. Authentication for this
interface should be set to off. Dial-Up interfaces used for
accepting secure connections from TAF clients must be set to
SecurID.
Interfaces
Datex-P
en1
en1-snap
sales-ppp1
sales-ppp2
Authentication
off
off
off
SecurID
SecurID
EXIT
Press <Ctrl-n>, <Ctrl-p> to scroll, <Return> to edit/select
59
IP
INTERFACES
EDIT
Authentication Type
Life Time (seconds)
SecurID
3600
Authentication Mode
Keep Alives (seconds)
strict
60
SAVE
CANCEL
60
IP
SERVER
This menu contains a list of the TAF servers currently configured. At the moment up to two active ACE/Servers (Master and
Slave server) are supported.
By choosing ADD or EDIT you will get to the following
menu, which contains the BRICK settings relevant to the configuration of the SecurID server (ACE/Server). The settings here
must correspond to the values used by the ACE/Server (contained in the servers sdconf.rec file).
BIANCA/BRICK-XLSetup Tool
BinTec Communications GmbH
[IP][TAF][SERVER][ADD]: Configure TAF Server
mybrick
Type
IP Address
Encryption
Priority
State
ace
Version
Retries
Timeout
7
5
5
Server Port
Client Port
Node Secret
5500
5656
empty
SAVE
sdi
0
active
CANCEL
61
62
New Commands
New makekey Command
makekey [-g]
The makekey command can be used to show the current
public key (stored on the biboAdmPublicKey variable),
orwhen invoked with the -g optionto generate a
new pair of keys (public and private).
You will only need to use makekey -g once before starting to configure TAF for the first time.
New shtaf Command
shtaf
The shtaf command can be used to test the TAF authentication procedure. The BRICK will prompt you for an
ACE/Server user name and a passcode (the Token currently displayed on this users Token Card).
If the authentication was successful, it will give you a
normal BRICK login prompt. After logging in to the
BRICK you can terminate shtaf by typing exit.
System Logging Messages
Syslog messages are created during various events. TAF Syslog
messages are reported on the BRICK under the INET subsystem. The following messages may be seen in connection with
Token Authentication Firewall and SecurID.
biboAdmSyslogMessage
~Level
Debug
Debug
Debug
Info
Info
63
biboAdmSyslogMessage
~Level
Err
Err
Err
Notice
Err
Err
Err
Notice
Err
Err
Err
Err
Err
Err
Notice
Tafd: Authentication ok
Debug
Debug
Debug
MIB Changes
A couple of changes were made to the MIB to enable TAF server
support.
tafServerTable
First there is the new tafServerTable, which contains the configuration entries for each TAF server. For a description of the var-
64
Possible Values
Type (*rw)
NodeSecret (rw)
Version (rw)
Integer, Default: 7
Retries (rw)
Integer, Default: 5
Timeout (rw)
Encryption (rw)
Address (rw)
IP address
Port (rw)
ClientPort (rw)
Priority (rw)
0 7, Default: 0
State (-rw)
CheckInterface (rw)
dont-verify(1), verify(2)
ipTafTable
Then there is the new ipTafTable. It contains information about
IP partners that sent packets to an interface that has authentication enabled.
ipTafIfIndex (ro)
The interface index (from the ifTable).
ipTafAddress (ro)
IP address of the partner.
ipTafState (ro)
This object shows the authentication state of the partner. Packets are only routed if the state is xfer. If the
state is authenticating a response from an authentica-
65
66
cated.
The timeout can also be configured in the Life Time entry in the [IP][TAF][Interfaces][EDIT] menu of the Setup Tool.
180 seconds before the Life Time runs out, a new passcode is requested from the user.
Possible values: 180 3600 (seconds)
Default value: 3600
AuthKeepalive (rw)
This object defines the interval between keep-alive
packets exchanged between the BRICK (ACE/Client)
and the PC to ensure that the PC is still online.
Possible values: Integer (seconds)
Default value: 60
bintecsec
bintecsec contains the new biboAdmPublicKey object. Initially
this object will be emply. If you want to use TAF you have to
generate a new pair of keys (private and public key, similar to
the Pretty Good Privacy (PGP) encryption scheme) by invoking
the makekey -g command (see page 63) from the SNMP shell of
the BRICK. You only need to do this once before you start configuring TAF for the first time.
The private key is only visible to the BRICK. The public key
is transmitted to each TAF client (PC) trying to connect to the
BRICK. The keys are subsequently used to encrypt the messagesespecially important for the messages containing the passcodebetween the BRICK and the PC.
The biboAdmPublicKey object is read-only.
Please note that the current version of DIME Browser is unable to display the public key.
67
68
Configuration
You can configure the Remote Multi CAPI Client from the TAPI
and CAPI Configuration program which is located in the
BRICKware program group.
The BRICK configured in this dialog will be used for 16bit CAPI
applications and is also used initially for 32bit CAPI applications.
If you want to use two or more BRICKs simultaneously,
press the new More BRICKs button.
69
The list will initially be empty (unless you already configured a BRICK on the main page).
If you select a BRICK from this list, the Info field in the lower
half of the dialog box will display the number of controllers
available on this BRICK, whether a CAPI license is installed, the
system software revision, and the serial number.
If you select a Controller from this list, the Info fieldwill display the number of B channels available from this controller,
whether DTMF tones are supported, and the supported B1-layer protocols.
Changes made to this list (for 32bit CAPI applications) will not
automatically affect the settings made for 16bit CAPI applications in the main dialog.
Add BRICK
To add a BRICK click the Add BRICK button. Enter its hostname
or IP address and its CAPI TCP port in the appropriate fields.
70
71
Configure Controller
By double-clicking on a controller (or first clicking the controller
and then clicking the Controller button) you get the following
dialog.
72
Addr(*rw)
Service(rw)
Mask(rw)
IfMode(rw)
00 verify
0
01 verify
0
192.168.12.2
http
192.168.5.0
telnet
255.255.255.255
dont_verify
255.255.255.0
dont_verify
localUdpAllowTable
The localUdpAllowTable defines access rules for UDP services.
Each entry defines an access rule for a specific UDP service.
Controllable BRICK UDP services (Service) include:
snmp
rip
bootps
dns
The following localUdpAllowTable entry limits access to the
SNMP service on the BRICK to hosts on the LAN.
BRICK:> localUdpAllowTable
inx AddrMode(-rw)
IfIndex(rw)
Addr(*rw)
Service(rw)
Mask(rw)
IfMode(rw)
00 dont_verify
1000
0.0.0.0
snmp
0.0.0.0
verify
73
Access Lists
The new IP Access List methodology used on the BRICK is
based upon a concept of Rules, Filters, and so-called Chains.
Suggested Method for configuring Acces Lists
Because the potential danger exists of locking oneself out of
the system when configuring IP Access Lists the following order of events should be used.
1. Define the set of filters to use.
2. Disable access lists for all interfaces by setting the
FirstRule to 0 (no access rules).
3. Define the complete set of rules.
4. Enable the rule(s) for the desired interfaces.
Access List Methodolgoy
An Access Filter simply describes a subset of IP traffic and
may be based upon one or more of the following attributes.
Source and/or Destination IP address.
Source and/or Destination Port.
Source and/or Destination Protocol.
An Access Rule defines an:
1. Access Filter to compare the packet to.
2. Action to take if a packet matches/doesnt-match a filter.
3. Index of the next rule to use if no action was taken.
Each Rule references a NextRule allowing different Chains
(sequence of Rules) to be defined. For each interface a separate
starting rule must be defined (via the ipExtIfRuleIndex field)
that determines which Rule chain is applied. Rule 1 has special
meaning; it is used by default for all newly created interfaces.
Rules are applied until one of the following events occur:
The packet matches and the Action is match based OR
the packet doesnt match and the Action is if_not based.
The packet is discarded if the end of the chain or Rule 0 is
reached.
74
en1
mpx25
dialup1
dialup2
In the diagram below, packets arriving via the dialup1 interface are compared to Rules 123 while packets arriving on
the mpx25 are applied to Rules 423.
Source Interface of
incoming IP packet
Action=Allow Next
Rule
0
FilterIndex=1
Rule 4
Rule 2
Action=Deny Next
Rule
3
FilterIndex=5
Action=Allow Next
Rule
2
FilterIndex=2
Rule 5
Rule 1
Action=Deny Next
Rule
2
FilterIndex=3
Rule 3
(Global Chain)
Action=Deny Next
Rule
0
FilterIndex=2
75
Incoming IP Packets
ipExtIfRuleIndex
=0
yes
Discard IP packet!
no
yes
ipExtIfRuleIndex
exist
Action
=
ignore
no
yes
no
Does
Filter
exist?
Check
ipRuleTable at
ipExtIfRuleIndex
no
yes
ipRuleAction
deny_if_not
allow_if_not
no
Does
yes
packet match
referenced
filter?
ipRuleAction
deny
allow
else
else
Go to
Rule at
NextRuleIndex
Does
this Rule
exist
?
no
yes
Route IP packet!
76
yes
Is
this Rule 0
?
no
ACCESS LISTS
Filters
Rules
Interfaces
EXIT
The
menu is used to configure filters. Each
FILTERS
filter describes a subset of IP traffic and may be address, protocol, source or destination port based.
The
menu is used to configure rules. Rules
RULES
can be ordered, or chained to control the order in which the
filters are applied.
The
menu is used to define which rule is
INTERFACES
used first for traffic arriving on that interface.
77
IP
ACCESS LISTS
FILTERS
Description
Index
no http
4
Protocol
any
Source Address
Source Mask
Source Port
192.168.50.5
255.255.255.0
any
Destination Address
Destination Mask
Destination Port
Specify Port
specify
80
SAVE
CANCEL
78
...
1023
1024
...
4999
5000
privileged
server
... 32767
unprivileged
clients
server
clients
200.1.1.2
ftp
server
79
IP
ACCESS LISTS
RULES
Index
Insert behind Rule
R2
Action
deny M
Filter
no ftp (1)
SAVE
F5
(no telnet)
EXIT
80
Allow All
Rule 1
Rule 4
Next
Rule
0
FilterIndex=2
no FTP
Rule 2
Rule 3
Next
Rule
4
FilterIndex=1
Next
Rule
3
FilterIndex=2
Rule 3
Rule 2
FilterIndex=5
Next
Rule
2
FilterIndex=1
Next
Rule
4
FilterIndex=3
Rule 4
Rule 1
Next
Rule
2
FilterIndex=3
no HTTP
no TELNET
After:
REORG:
Rule 3 = Rule 1
Next
Rule
1
FilterIndex=5
no FTP
Allow All
Next
Rule
0
no HTTP
no TELNET
NOTE: The appropriate indicies are renumbered but the access semantics remain the same.
81
IP
ACCESS LISTS
INTERFACES
This menu is used to control which Rule Chain(s) are used for
packets arriving via the BRICK interface. This menu lists all IP
capable interfaces and the First Rule that is currently being used
for this interface.
To change the First Rule for any interface highlight the entry
Exit
and hit Return key; otherwise select
to accept the
displayed settings.
Note: By default Rule 1 is always used for newly created
BRICK interfaces.
BIANCA/BRICK-XL Setup Tool
BinTec Communications GmbH
[IP][ACCESS][INTERFACES]: Configure First Rules
mybrick
First Rule
First Filter
0 (no access rules)
2
3 (all else)
2
3 (all else)
2
3 (all else)
EXIT
82
First Rule = Use the scrollbar to select the Rule to use first for
packets arriving on this interface. Setting this field to none
disables the Access List mechanism for this interface.
NOTE: If the referenced Rule doesnt exist (in ipRuleTable)
then all packets arriving on this interface will be allowed.