Page 1
GUIDE STORMSHIELD NETWORK SECURITY SNS - USER CONFIGURATION MANUAL SN Range Details Date Version November 2016 Creation Reference : sns-en-user_configuration_manual-v3...
Page 7
Sending of SNMPv2c alerts (traps) Class-based queue (CBQ) Sending of SNMPv1 alerts (traps) Monitoring queue MIBS and Traps SNMP Priority queue Stormshield Network SNMP event and alert Available queues (traps) format Examples of application and usage Management information bases (MIBs) recommendations...
Page 8
SNS - USER CONFIGURATION MANUAL V.3 Operating principle “Member of these groups” tab Configuring a profile VIRTUAL INTERFACES SSL VPN services on the Stormshield Creating or modifying an IPSec interface Network web portal (VTI) Accessing your company’s web sites via an SSL tunnel Button bar Accessing your company’s resources...
SNS - USER CONFIGURATION MANUAL V.3 WELCOME Backed by the Common Criteria, Stormshield Network advises taking into consideration the recommendations of use for the Administration Suite and Firewall product stated below. These recommendations set out the usage requirements by which to abide in order to ensure that your Firewall operates within the context of the common criteria certification.
Example no DHCP, DNS, PKI, application proxies, etc.* Stormshield Network appliances are not configured to forward IPX, Netbios, AppleTalk, PPPoE or IPv6 information flows. Firewall-VPN appliances do not depend on external “online” services (DNS, DHCP, RADIUS, etc.) to apply the information flow control policy.
Page 14
The usage mode subject to evaluation excludes the fact that the TOE relies on services other than PKI, DNS and DHCP servers and proxies. The optional modules provided by Stormshield Network to manage these services are disabled by default and have to stay that way.
Therefore to confirm the integrity of an appliance, the NETASQ and Stormshield certificate authorities must be added to the browser’s list of trusted certificate authorities before the initial connection. These...
To round up this chapter on creating user awareness of network security, the administrator has to tackle the management of user access. In fact, a Stormshield Network Firewall’s authentication mechanism, like many other systems, is based on a login/password system and does not necessarily mean that when the application enabling this authentication is closed, the user is logged off.
Update servers of the Stormshield Network URL database If the Stormshield Network URL database has been selected as the URL database provider (menu Object > Web objects, URL database tab), servers other than Stormshield Network servers can be entered.
USB key or an external hard disk. For more information, refer to the Guides PRESENTATION AND INSTALLATION OF NETASQ PRODUCTS U SERIES – S Models or PRESENTATION AND INSTALLATION OF STORMSHIELD NETWORK PRODUCTS SN Range, available in your private area, under the section Documentation.
There can only be one “superadministrator” with the following characteristics: The only administrator authorized to log on via the local console on Stormshield Network appliances, and only during the installation of the firewall or for maintenance operations outside of normal production use.
You are strongly advised to use uppercase letters and special characters. NOTE Stormshield Network uses asymmetrical encryption, meaning that it uses a key pair consisting of a public key, used for encrypting data, and a private key, used for decryption. The advantage of using this system is that it removes the problem of securely transmitting the key and allows electronic signatures.
To delete a configured server, select it in the list and click on Delete. NOTE RBL servers in Stormshield Network’s native configuration are differentiated from customized servers by a padlock symbol ( ), which indicates RBL servers in Stormshield Network’s native configuration. Reminder: Active Update only updates the list of these servers.
“unwantedness”. E-mails that obtain a value exceeding or equal 5000] : to the threshold set will be considered spam. Stormshield Network’s default value is 200. This section enables the definition of a threshold to apply. By modifying the score, the minimum value of the 3 trust thresholds will be modified.
Once the database has been downloaded, the antivirus will be enabled. Parameters Analysis of ClamAV files In this menu, the types of files that need to be scanned by the Stormshield Network firewall antivirus service are configured. Analyze compressed This option enables the decompression engine (Diet,Pkite, Lzexe, Exepack…).
Place the machine under quarantine: the packet that caused the alarm will be blocked with the following parameters. To remove a packet from quarantine, use Stormshield Network Realtime Monitor. for a period of (minutes): duration of the quarantine...
Page 48
This protocol is equipped with a server linked to an identification database (e.g. LDAP directory). The Stormshield Network firewall can act as a RADIUS client and can therefore address authentication requests for users wishing to pass through the Firewall, to an external RADIUS server.
Page 49
(this name corresponds to the name indicated in the Stormshield Network script that comes with the installation hardware). The Service name will be the serial number preceded by “HTTP/”. Example: HTTP/U70XXAZ0000000 For firewalls in high availability, since the identifier has to be the same for both appliances, you are advised to use the name of the authentication portal’s certificate (CN) entered in the Captive...
Page 50
Windows service that allows Stormshield Network firewalls to benefit from a seamless authentication on Windows Active Directory. Please refer to the technical note Stormshield Network SSO Agent - Installation and deployment for instructions on how to install this application.
Users can indicate in their web browsers the automatic configuration script located at https://if_firewall>/config/wpad.dat. Captive portal Hide the header (logo) This option makes it possible to hide the Stormshield Network banner (this is the Stormshield logo by default) when the user authenticates on the captive portal, for confidentiality reasons.
User enrolment Stormshield Network offers web-based user enrolment. If the user attempting to connect does not exist in the user database, he may request the creation of his account via web enrolment. For certificate requests (CSR) by the user, they will be signed by the certificate authority (CA) chosen by default in the menu Certificates and PKI.
If an object is added to or deleted from the list of Multi-user objects , ensure that no authentication process relating to this object has been saved. Using Stormshield Network Realtime Monitor, check the use of this object in the User module and delete the authentication of any authenticated users by right-clicking on them –...
Contents of the e-mail This field allows modifying the text of the message received when a virus is detected in an e-mail. Example: Your Stormshield Network firewall has detected a virus in this e-mail - the embedded antivirus has cleaned it; infected attachments were removed.
For the use of the SSL VPN feature, the CA (certificate authority) “SSL VPN-full-default-authority” includes a server certificate “openvpnserver” and a user certificate “openvpnclient”. This allows the client and the Stormshield Network firewall’s SSL VPN service to identify each other without relying on an external authority.
The ‘downloads’ menu will also offer the export of a certificate revocation list (CRL) in PEM or DER format. NOTE Any issues encountered during this procedure are beyond Stormshield Network’s competence. Check usage You can look for the features or modules that use the selected certificate.
Page 73
Even though this field is not mandatory, you can indicate here a shortcut to your CN, which will come in handy for your command lines. Example Stormshield Network (owner of the FQDN) Proceed in the same way as for adding a user certificate or a Smartcard certificate: Specify the various options for your server certificate.
LIST Displays the list of connected users, by showing user privileges (by level) and privileges for the session in progress (SessionLevel). Allows viewing the Stormshield Network multifunction firewall’s activity logs, groups 6 commands. MODIFY This command is a specific privilege that allows the user to modify the configuration of a module, in addition to reading privileges.
If this option is selected, your firewall will automatically be synchronized with the local time. NOTE The date and time to which your Stormshield Network firewall is set are important – they allow you to locate events in the log files. They are also useful in the scheduling of configurations.
(see section The module configuration menu). Network This window displays the model of your Stormshield Network multifunction firewall as well as the number of interfaces available on it (32 maximum). The interface(s) used appear(s) in green. When the bypass mechanism is enabled (industrial...
The widget offers a view of Licenses of warranty and options by expiry date. Those options are : Update (firmware), Contextual protection signatures, Vulnerability Manager, ClamAV Antivirus, Kaspersky Antivirus, Stormshield Network URL databases, Extended Web Control URL databases, Antispam DNS blacklists (RBL), Antispam: heuristic engine, License expiry.
Stormshield Management Center If you have installed the Stormshield Management Center centralized administration server, this panel will allow you to display the characteristics of the firewall's connection to the SMC server.
If your firewall has the sandboxing option, this panel will allow you to show the status of the connection to the service as well as the latest scan statistics. Status of the service Indicates the status of the connection between the firewall and the Stormshield sandboxing servers. Criticality of the last...
Check usage of a directory in the firewall's configuration. Creating an internal LDAP This type of directory is hosted by your Stormshield Network multi-function firewall, and your information is stored in it once the LDAP directory is created.
Name of your company (e.g.: COMPANY). Domain The country in which your company is located (e.g.: fr). Password Definition of the Stormshield Network Admin password. Confirm Confirmation of the LDAP administration password that you have just entered in the previous field.
Connecting to an external LDAP directory The external LDAP is a directory to which your Stormshield Network multi-function firewall will connect. Step 1: Selecting the directory Select the LDAP base of your choice. This is the first step in the configuration of this directory.
Page 105
Open Directory: directory of websites under license of Open Directory External directory This column represents the value given to the attribute in the external directory. For attributes PosixAccount LDAP directories, the attribute Stormshield member will have the value memberUid. Advanced properties Protected characters For some external severs, a \ has to be added so that LDAP requests will be taken into account.
The maximum size allocated to the DNS cache depends on your firewall’s model. Transparent mode As its name implies, the purpose of this option is to make the Stormshield Network (intercepts all DNS Firewall’s DNS service transparent. As such, when this option is enabled, the...
Access the settings for advanced properties by clicking on the button Advanced properties. These allow in particular, renewing registrations and changing addresses. Renewal frequency Renewal period of the Dynamic DNS service. Stormshield Network has set this period (days) to 28 days by default.
SNS - USER CONFIGURATION MANUAL V.3 ENROLMENT ENROLMENT Stormshield Network’s web enrolment service allows “unknown” users in the user database to request the creation of their access accounts (internet, mail server, all services that require authentication) and their certificates. This module requires at least the use of an LDAP database for user requests and a root CA (internal PKI) for user certificate requests.
Means that the operation is possible, Means that the object cannot be added to the chosen cell. “Filtering” tab Stormshield Network’s intrusion prevention technology includes a dynamic packet filtering engine (“stateful inspection”) with rule treatment optimization that allows the application of filter Page 123/448...
Page 128
It will be encrypted again after the scan (if it is not blocked by any rule). Log only: The Stormshield Network firewall does not do anything. This is useful when you wish to log only certain types of traffic without applying any particular action. In this case, filter rules will continue to be evaluated as no action (Block or Pass) has been applied on the traffic.
Page 129
Connection fairness: bandwidth will be distributed evenly between connections. Connection threshold The Stormshield Network firewall may limit the maximum number of connections accepted per second for a filter rule. The desired number can be defined for protocols corresponding to the rule (TCP, UDP, ICMP and some application requests).
Page 131
Advanced properties Count If you select this option, the Stormshield Network firewall will count the number of packets that correspond to this filter rule and will generate a report. It will therefore be possible to obtain volume information on a desired traffic type.
Page 136
Inspection type General Inspection level IPS (Detect and block) If this option is selected, Stormshield Network’s IPS (Intrusion Prevention System) will detect and block intrusion attempts, from the Network level to the Application level in the OSI model. IDS (Detect) If this option is selected, Stormshield Network’s IDS (Intrusion Detection System) will...
Page 141
If two clients go through the same firewall, they will not be able to connect to the same server at the same time. Stormshield Network’s intrusion prevention engine will block packets received by the second client. After 5 minutes, the intrusion prevention engine will deem the session too old and will allow the second client to take over.
“passive” will seamlessly take over. As such, the “passive” firewall becomes “active”. A video from Stormshield Network’s WebTV on YouTube will guide you step by step in the configuration of a group of Stormshield Network firewalls (cluster). Click on this link to access the...
CLI (CONFIG AUTH HTTPS sslparanoiac=0 / CONFIG AUTH ACTIVATE). Connection In order to configure your Stormshield Network firewall, you need to log onto the web administration interface. Configuration of a firewall is only accessible to administrators of the product. The “super admin”...
<number of seconds>”. The “admin” account, super administrator By default, only one user has administration privileges on Stormshield Network products – the “admin” account (whose login is “admin”). This administrator holds all privileges and can perform certain operations such as the modification of a user’s authentication method, for example.
1300): administrators will be able to log on via their internal networks to port 1300 on the firewall. This service is used especially by Stormshield Network Real-Time Monitor. Allow protected interfaces to access the firewall's SSH port: allows opening access to the firewall via SSH in order to log on using command lines from a host located on the internal networks.
The following actions may be dangerous: Disabling the “Serverd” rule: in the absence of an explicit rule, may cause users to no longer have access to tools using port 1300, namely Stormshield Network RealTime Monitor, GlobalAdmin, Stormshield Network Centralized Management and Stormshield Network Event Analyzer.
Security inspection Global configuration for each profile Default configuration Configuration for Define the profile to apply for incoming traffic on the network via the Stormshield incoming traffic Network Firewall. Incoming traffic represents the traffic of an unprotected interface (such as the internet) to a protected interface (your local/internal network).
The services that Stormshield Network’s IPSec offers provide access control, integrity in offline mode, authentication of data source, protection against replay, confidentiality in encryption and on traffic.
This button allows immediately deactivating the selected IPSec policy. Site to site (Gateway-Gateway) A video from Stormshield Network’s WebTV on YouTube will guide you step by step in the configuration of a secure connection between your sites. Click on this link to access the video: ...
IPSec policy. Anonymous – Mobile users A video from Stormshield Network’s WebTV on YouTube will guide you step by step in the configuration of a secure connection between one of your sites and an IPSec VPN client. Click on this link to access the video:...
Page 171
The use of the aggressive mode + pre-shared keys (especially for VPN tunnels to mobile workstations) may be less safe than other modes in the IPSec protocol. Stormshield Network recommends using the main mode and especially main mode + certificates for tunnels to mobile workstations. In fact, the Firewall’s internal PKI is capable of providing the certificates needed for...
Page 172
If it is detected that a peer is no longer responding, the negotiated SAs will be destroyed. Warning This feature provides stability to the VPN service on Stormshield Network Firewalls on the condition that the DPD has been correctly configured. Four choices are available for configuring DPD: Inactive: DPD requests from the peer are ignored.
Page 174
The use of the aggressive mode + pre-shared keys (especially for VPN tunnels to mobile workstations) may be less safe than other modes in the IPSec protocol. Stormshield Network therefore recommends the use of main mode for mobile peers, either with authentication by certificate or by using hybrid mode.
If it is detected that a peer is no longer responding, the negotiated SAs will be destroyed. Warning This feature provides stability to the VPN service on Stormshield Network Firewalls on the condition that the DPD has been correctly configured. Four choices are available for configuring DPD: Inactive: DPD requests from the peer are ignored.
In hybrid mode: some interfaces have the same IP address and others have a distinct address. The hybrid mode uses a combination of both modes mentioned earlier. This mode may only be used with Stormshield Network products having more than two network interfaces. You may define several interfaces in transparent mode...
Here, several associated IP addresses and network masks may be defined for the same bridge (the need to create aliases, for example). These aliases may allow you to use this Stormshield Network firewall as a central routing point. As such, a bridge can be connected to various sub- networks with a different address range.
Page 186
In this case, the changed revision number must be applied to all appliances for the affected region.. REMARK On Stormshield Network firewalls, an MSTP configuration can only define one region. Table of MSTP instances This table allows defining the various instances declared in the MSTP configuration:...
Page 188
Here, several associated IP addresses and network masks may be defined for the same bridge (the need to create aliases, for example). These aliases may allow you to use this Stormshield Network firewall as a central routing point. As such, a bridge can be connected to various sub- networks with a different address range.
This window allows you to specify a MAC address for an interface instead of using the address assigned by the firewall. This allows you to better facilitate the integration of the Stormshield Network firewall in transparent mode into your network (by specifying your router’s MAC address instead of having to reconfigure all the workstations using this MAC address).
Select the type of VLAN you wish to create. VLAN attached to a Stormshield Network firewalls can be placed at the end of VLANs to add or remove a single interface (VLAN VLAN tag. The firewall carries out the filtering and takes care of communications endpoint) between the VLANS and the networks connected to the other firewall interfaces.
This window allows you to specify a MAC address for an interface instead of using the address assigned by the firewall. This allows you to better facilitate the integration of the Stormshield Network firewall in transparent mode into your network (by specifying your router’s MAC address instead of having to reconfigure all the workstations using this MAC address).
Here, several associated IP addresses and network masks may be defined for the same bridge (the need to create aliases, for example). These aliases may allow you to use this Stormshield Network firewall as a central routing point. As such, a bridge can be connected to various sub- networks with a different address range.
Last check for license updates performed on : date of the last time a request was made manually or automatically to search for licenses. The Stormshield Network Firewall is sold by default with all features enabled. However, some features (URL filtering, high availability, among others) are optional and not enabled. Certain options, such as updates, are valid for a limited period.
You can install your first license here if you do not have internet access or if you wish to manage licenses yourself. If you choose to use new features or renew certain options, please contact your reseller. A new encrypted file will then be given to you through your private area on Stormshield Network’s website. License file This field allows you to insert a license that you have retrieved earlier from Stormshield Network’s website and activate the configuration on your firewall.
Page 211
SPAMVendor Deadline for updating the spam filter heuristic engine. URLFiltering Deadline for updating Stormshield Network’s URL filter databases. URLVendor Deadline for updating Stormshield Network Extended Web Control URL filter databases. Update Deadline for updating the appliance. VirusVendor Deadline for updating Kaspersky antivirus databases.
Page 212
SpamVendor Enables or disables the spam filter heuristic engine. (Default value: 0). URLFiltering Enables or disables URL filtering via Stormshield Network’s database in the proxy. (Default value: 1). URLVendor Enables or disables URL filtering via Stormshield Network Extended Web Control database in the proxy.
For more information, please refer to the appendix C of the Guides PRESENTATION AND INSTALLATION OF NETASQ PRODUCTS U SERIES – S Models or PRESENTATION AND INSTALLATION OF STORMSHIELD NETWORK PRODUCT SN Range, available in your private area, under the section Documentation.
POP3 proxy: events relating to message sending (l_pop3), Vulnerability manager: events relating to the application for consulting vulnerabilities on the Stormshield Network Vulnerability Manager network (l_pvm), Sandboxing: events relating to the sandboxing of files if this option has been subscribed and enabled, Administration (Serverd) : events relating to the firewall administration server: "serverd"...
By clicking on Apply, the following message will appear: “The total disk space reserved for logs exceeds this model’s capacity. Apply this configuration?”. " You can force the save or cancel,. NOTE These files can be copied on the Stormshield Network EVENT ANALYZER solution in order to create reports or archive them. “Syslog” tab The Syslog tab allows configuring up to 4 profiles for sending logs to Syslog servers.
Configuration “Configuration” tab System disk This refers to the system disk of your Stormshield Network multifunction firewall. You are currently using this partition: your firewall’s system disk is divided into two partitions, which allow you to back up your data.
Backup filename: By default, the name of the backup will correspond to “<firewall serial number>_day_month_year.na”. Download The file will be saved in .na format (Stormshield Network ARCHIVES). Click on this button to save it. Advanced properties Password Define a password to protect your backup.
(Backup), enter it in this field, otherwise any restoration of the file will be impossible. “System update” tab A video from Stormshield Network’s WebTV on YouTube will guide you step by step in the configuration of a group of Stormshield Network firewalls (cluster). Click on this link to access the ...
External links Online help URL This URL indicates the address to access Stormshield Network’s online help: you will find the directory of the modules in alphabetical order. Click on the module of your choice in order to view the corresponding page.
URLs or checks on URL size or requests, allow you to block attacks such as Code RED, Code Blue, NIMDA, HTR, WebDav, Buffer Overflow or even Directory Traversal… Managing buffer overflows is fundamental at Stormshield Network, which is why defining the maximum sizes allowed for HTTP buffers is particularly detailed.
(reading collaborative management of documents. If this option has been selected, the and writing) WebDav protocol will be authorized in the Stormshield Network Firewall. Allow TCP tunnels The CONNECT method allows building secure tunnels through proxy servers. (CONNECT method) If this option has been selected, the CONNECT method will be authorized in the Stormshield Network Firewall.
(the refusal will be indicated by an SMTP error). This allows restricting spam. Maximum size of the Indicates the maximum size of messages passing through the Stormshield Network message [0 – firewall. Messages exceeding the defined size will be refused by the firewall.
Rewrite TCP sequences If this option is selected, TCP sequence numbers generated by the client and server with strong random will be overwritten and replaced with the Stormshield Network intrusion prevention values (arc4) engine, which will produce random sequence numbers.
The optimized control of congestion and the management of data queues has become a major challenge in Quality of Service. Stormshield Network Firewalls employ two algorithms for congestion management – TailDrop and BLUE. However, Stormshield Network recommends the use of BLUE for managing congestion.
USB key or an external hard disk. For more information, refer to the Guides PRESENTATION AND INSTALLATION OF NETASQ PRODUCTS U SERIES – S Models or PRESENTATION AND INSTALLATION OF STORMSHIELD NETWORK PRODUCTS SN Range, available in your private area, under the section Documentation.
At the bottom right of the table, the disk space used by the SQLite database will be shown. NOTE Such data may be sent via Syslog to the Virtual Log Appliance for Stormshield solution in order to build reports or archive them.
The default router is generally the equipment which allows your network to access the (router) Internet. The Stormshield Network Firewall sends all packets which have to exit on the public network to this address. Often the default router is connected to the Internet. If...
Clicking on this column will open the objects database in order to select a host (router). Color (Optional) A window will appear, allowing the selection of an interface color (used in Stormshield Network REAL-TIME MONITOR). (Optional) Comments Any text. “Dynamic routing” tab This tab allows enabling and configuring the Bird dynamic routing engine.
Stormshield Network’s information base (these MIBs are available on Stormshield Network’s website, at the address indicated in the chapter on Stormshield Network MIBs). MIB data are files in text format that describe a list of SNMP objects used by the supervisor. These MIBs therefore provision data that the supervisor would need in order to interpret SNMP traps, events and query messages sent to the firewall.
The descriptions of system alarms are also given in the chapter SYSTEM EVENTS in the section List of events. Management information bases (MIBs) Stormshield Network MIBs Here is the list of fields of Stormshield Network MIBs, CLI commands corresponding and console commands. The links can be downloaded from: https://www.stormshield.eu/landing/mibs/ NETASQ-SMI-MIB: Mib as a whole ...
SSL FILTERING SSL FILTERING SSL filtering is now integrated into the new security policy on Stormshield Network multi-function firewalls. This module allows filtering access to secure web sites. It also makes it possible to allow or prohibit web sites or certificates that pose risks.
(example: disconnecting a disk from a remote shared network). NOTE Only client hosts running under Windows and with the Stormshield Network client can use the executable script service. The format of files must be “.bat”. NOTE All Windows environment variables can be used in connection/disconnection scripts (example: %USERDOMAIN%, %SystemRoot%, etc.).
SNS - USER CONFIGURATION MANUAL V.3 SSL VPN PORTAL SSL VPN Portal Stormshield Network’s SSL VPN allows your mobile or static users to connect to your company’s resources securely. The SSL VPN configuration screen consists of 4 tabs: General: Allows enabling the module, selecting the access type and configuring advanced properties.
Advanced properties Access to servers via SSL VPN Prefix for the URL root Stormshield Network’s SSL VPN technology enables masking the real addresses of directory servers to which users are redirected, by rewriting all URLs contained in HTTP pages visited. These URLs will then be replaced by a prefixed followed by 4 digits. This field enables defining the prefix to be used.
Page 336
URL used by SSL VPN Link calculated based on 3 fields: Destination server, Port and URL: access path. (Example: http://destination server/URL: access path). Name of the link on The defined link appears on the Stormshield Network web portal. When the user clicks the user portal on this link, he will be redirected to the corresponding server.
Adding an OWA web server The SSL VPN module on Stormshield Network Firewalls supports OWA (Outlook Web Access) Exchange 2003, 2007 and 2010 servers. “Premium” mode can only be used in Windows with Internet Explorer 5 and higher. It is based on web technologies such as html, css and javascript but also on Microsoft proprietary technologies such as htc, xml and activeX.
Adding a Lotus Domino web server The SSL VPN module on Stormshield Network Firewalls supports Lotus domino servers. An HTTP server can be added to the list of web access servers with certain options specifically pre-entered for compatibility with Lotus Domino.
Go to "Secure access" then select “Pop up secure-access window” from the drop-down list. Warning It is important for the Stormshield Network SSL VPN applet to operate as a background task. Next, select Portal access\Portal then enter your username, password and domain.
“User profiles” tab Operating principle All servers configured in the SSL VPN module are listed on the Stormshield Network authentication portal by default. As such, users who have the right to access SSL VPN features on the firewall have access to all the servers configured by the administrator. The concept of using profiles enables determining which users will have access to which servers configured in SSL VPN.
SSL VPN services on the Stormshield Network web portal When authentication is enabled on the firewall (module Users\Authentication\General, select “Enable the captive portal”), then you will be able to access Stormshield Network’s SSL VPN features. To access SSL VPN features, the procedure is as follows: Open the web browser.
SNS - USER CONFIGURATION MANUAL V.3 STORMSHIELD MANAGEMENT CENTER STORMSHIELD MANAGEMENT CENTER If you have installed the Stormshield Management Center centralized administration server, this panel will allow you to install the attachment package in order to connect your firewall to the SMC server.
This alarm is transferred to the logs, and can be sent by Syslog (Logs – Syslog) or by e-mail (see module E-mail alerts). Log: The Stormshield Network firewall does not do anything. This is useful when you wish to log only certain types of traffic without applying any particular action.
When you select an event from the list by clicking on it, a “Show help” link appears. Clicking on this link will take you to the Stormshield Network knowledge base, providing more details on the information relating to the event.
Enable application and If this option is selected, vulnerability detection will be enabled and the relevant vulnerability detection information will be visible in Stormshield Network REAL-TIME MONITOR. REMARK During the update (if you have purchased the license), the Vulnerability management module will be enabled by default. Alarms will be raised according to the default configuration: monitor all vulnerabilities for all internal hosts.
Network object (host Selects the network object to which monitoring applies. This object will be scanned by or group – network – the Stormshield Network Vulnerability Manager engine which will rely on the rules address range) contained in the associated detection profile.
Database servers (SQL) “All known applications” profile This profile allows assigning to an object (host, group, network or address range), the detection of all client/server and operating system vulnerabilities detected by the Stormshield Network Vulnerability Manager. Advanced configuration Data lifetime (days) [1 – 30]: Duration for which data (application, vulnerability) will be kept without traffic or updates detected.
(URL database). URL database : Depending on le type of option subscribed, the available URL lists are updated by different providers (Stormshield Network or Stormshield Network Extended Web). Stormshield Network’s URL lists are offered by default.
URL filter is its higher quality compared to the embedded solutions. If you have subscribed to the option Stormshield Network EWC, in order to enable the URL filter feature on Extended Web Control URL lists, select the entry from the list of suggested providers.
Several IP addresses and associated masks can be defined for the same bridge (when aliases need to be created, for example). These aliases can allow you to use the Stormshield Network firewall as a central routing point. As such, a bridge can be connected to various sub-networks with a different address range.
Clicking on this column will open the objects database in order to select a host (router). Color (Optional) A window will appear, allowing the selection of an interface color (used in Stormshield Network REAL-TIME MONITOR). (Optional) Comments Any text. “IPv6 dynamic routing” tab This tab makes it possible to enable and configure the IPv6 Bird dynamic routing engine (Bird6).
“block all” filter policy. This concerns NS (Neighbour Solicitation) and NA (Neighbour Advertisement) messages. In Stormshield Network 1.0, certain actions that can only apply to IPv4 traffic will generate warnings ( icon) or errors ( icon) in the field “Checking the policy” if IPv6 objects are included in the filter rules.
HOW TO: Implementing a filter rule In this example, you wish to authorize HTTP access from a workstation on the internal network to an intranet server (located in a dmz1 for example) through your Stormshield Network firewall. REMARK For connections to another type of application server, such as a database server for example, the procedure is the same except for the value of the destination port(s).
For the Destination port field, select HTTP. The filter and NAT rule will then look like this: NOTE It is certainly possible to complete this rule with extended Stormshield Network firewall features (customized security inspection profiled, scheduling, etc). Activating the filter policy At the bottom of the Filter-NAT window, click on Save and apply.
Checking in Stormshield Network Realtime Monitor Launch Stormshield Network Realtime Monitor, log on to the IPS-Firewall of the main site through the program and click on the module Logs > VPN. Check that phases 1 and 2 took place correctly (message “Phase established”):...
Page 402
A message “Negotiation failed due to timeout” in phase 1 appears in the module Logs > VPN in Stormshield Network Realtime Monitor on the “initiator” IPS-Firewall. A message “Negotiation failed” in phase 1 appears in the module Logs > VPN in Stormshield Network Realtime Monitor on the “responder” IPS-Firewall.
A message “Could not get a valid proposal” in phase 2 appears in the module Logs > VPN in Stormshield Network Realtime Monitor on the “responder” IPS-Firewall. Solution: The appliances are attempting to negotiate but cannot seem to agree on an encryption policy in phase 2 (IPSec).
Checking in Stormshield Network Realtime Monitor Launch Stormshield Network Realtime Monitor, log on to the IPS-Firewall of the main site through the program and click on the module Logs > VPN. Check that phases 1 and 2 took place correctly (message “Phase established”):...
Page 414
Symptom: The tunnel cannot be set up. The messages “Negotiation failed” and “Certificate with serial XXX from issuer YYY: unable to get local issuer certificate” in phase 1 appear in the module Logs > VPN in Stormshield Network Realtime Monitor on the “responder” IPS-Firewall Solution: the “responder”...
Via the Stormshield Network administration suite Launch Stormshield Network Realtime Monitor, log on to the IPS-Firewall of the Hub site through the program and click on the module Logs > VPN. Check that phases 1 and 2 took place correctly (message “Phase established”):...
From the same client workstation on the Spoke A site, set up a connection to a host on the Spoke B site, in order to test the setup of the second tunnel (Hub to Spoke B). In the module Logs > VPN in Stormshield Network Real-Time Monitor, check that phases 1 and 2 took place correctly (message “Phase established”):...
Mbps. Like regular Ethernet, Fast Ethernet is a shared media network in which all nodes share the 100 Mbps bandwidth. Active Update The Active Update module on Stormshield Network Firewalls enables updating antivirus and ASQ contextual signature databases as well as the list of antispam servers and the URLs used in dynamic URL filtering.
Page 434
ASQ (Active Security Qualification) Technology which offers Stormshield Network Firewalls not only a very high security level but also powerful configuration help and administration tools. This intrusion prevention and detection engine integrates an IPS which detects and gets rid of any malicious activity in real time.
Page 441
Packet analyzer When an alarm is raised on a Stormshield Network Firewall, the packet that caused this alarm to be raised can be viewed. To be able to do so, a packet viewing tool like “Ethereal” or “Packetyzer” is necessary. Specify the selected tool in the Packet analyzer field, which Reporter will use in order to display malicious packets.
Page 444
A secure authentication method which deters the misuse of passwords by issuing a different password for each new session. Slot Configuration files in the Stormshield Network UNIFIED MANAGER application, numbered from 01 to 10 and which allow generating filter and NAT policies, for example. SMTP (Simple Mail Transfer Protocol) TCP/IP communication protocol used for electronic mail exchange over the internet.
Page 445
Static quarantine A quarantine that the administrator sets when configuring the firewall. Stormshield Network REAL-TIME MONITOR Module in Stormshield Network’s Administration Suite that allows viewing the firewall’s activity in real time. Stormshield Network GLOBAL ADMINISTRATION Module in Stormshield Network’s Administration Suite that allows configuring firewalls.
Page 446
When an authentication service has been set up, every authorized user has to be defined by creating a “user” object. The larger the enterprise, the longer this task will take. Stormshield Network’s web enrolment service makes this task easier. If the administrator has defined a PKI, “unknown”...
Need help?
Do you have a question about the SN series and is the answer not in the manual?
Questions and answers