SunScreen 3.1 Administration Guide

Administrative Access Rules

You use the Administrative Access Rules tab to:

You can add new users that you have created, re-add users for whom new passwords have been defined, or SecurID assigned names on this page. You add user, create and change passwords, and change SecurID names. Also, you can add an Access Rule for users, and change the encryption parameters.

You must activate a new policy for any changes to take effect.

The fields of the Administrative Access Rules tab are described in the SunScreen Reference Manual.

The following information describes using the administration GUI. Appendix A contains information about the command line interface.

To Add an Administrative Access Rule for Local Administration
  1. Click the Administrative Access tab in the Policy Rules area of the Policy Rules page to move to the Administrative Access area.

    Figure 4-6 Administrative Access Area

    Graphic

  2. Click the Add New... button, or Edit button, below the Access Rules for GUI Local Administration area.

    The Local Access Rules dialog window appears.

    Figure 4-7 Local Access Rules Dialog Window

    Graphic

In the Administrative Access definition dialog window, there are different fields for local and remote administration.

The fields for Local Administration are:

To Add an Administrative Access Rule for Remote Administration

If you are adding an additional remote Administration Station, you must add a rule for it. Make a note of the encryption parameters you are using, these parameters have to match the encryption parameters on the remote Administration Station.

  1. Click the Administrative Access Rules tab in the Policy Rules area.

  2. Click the Add New... button in the Access Rules for Remote Administration area.

    The Remote Access Rule dialog window appears.

    Figure 4-8 Remote Access Rules Dialog Window

    Graphic

    Encryption can have two values: SKIP_VERSION_1, and SKIP_Version_2.

    • Fields required for SKIP_VERSION_1:

      • Certificate Group

      • Key Algorithm

      • Data Algorithm

    • Fields required for SKIP Version 2:

      • MAC Algorithm

      • Certificate Group

      • Key Algorithm

      • Data Algorithm

  3. Click the down arrow on the Screen field to display the choice list of Screens.

    Perform this step only if you want to associate this entry with a specific screen.


    Note -

    If you are using the Centralized Management Group feature, and this field is left blank, or with a "*" in it, the Access Rule being defined will allow, by default, access to all of the Screens in the cluster.


  4. Click the down arrow on the Address Object field to display the choice list of addresses.

  5. Click and highlight the address that you want to use.

    Type the authorized user name in the User field.

  6. Click the down arrow on the Encryption field to display the choice list of the versions of SKIP and highlight the version of SKIP that you want to use.

    SKIP_VERSION_1 is used for communicating with an SPF-100.

  7. Click the down arrow on the Certificate Group field to display the choice list of certificate groups and highlight the certificate group that you want to use.

    Specify the Screen's certificate or certificate group (in this case, the Certificate or Certificate Group that includes the Remote Administration Station's certificate) and Administration IP address in the Screen's Administration Certificate field.

  8. Click the down arrow on the Key Algorithm field to display the choice list of key algorithms and highlight the key algorithm that you want to use.

  9. Click the down arrow on the Data Algorithm field to display the choice list of data algorithms and highlight the data algorithm that you want to use.

  10. If you are using SKIP_VERSION_2 only, click the down arrow on the MAC Algorithm field to display the choice list of MAC algorithms and highlight the MAC algorithm that you want to use.

  11. Click the down arrow on the Tunnel field to display the choice list of tunnel addresses and highlight the tunnel address of the Remote Administration Station.

  12. Enter a description in the Description field.

  13. Click the down arrow on the Access Level field to display the choice list of the access levels and highlight the level of access that you want this user to have.

    There are four access levels for remote administrators:

    ALL STATUS READ WRITE NONE (Default)

  14. Click the OK button.

  15. Repeat the previous steps until you have added all the access rules for remote administration through the administration GUI, as required.

  16. Click the Save Changes button.

  17. Add the Screen's certificate MKID in the SKIP database of the Remote Administration Station and configure it to use SKIP to communicate with the Screen.

To Edit an Administrative Access Rule for Remote Administration

If you change the encryption parameters, make a note of them before the changes because they have to match the encryption parameters on the remote Administration Station.

Perform the following steps to make any changes through the administration GUI:

  1. Click the Administrative Access tab in the Policy Rules panel to display the Access Rules page.

  2. Click and highlight the rule that you want to edit in the Access Rules for Remote Administration panel then click the Edit button.

    The Access Rules applet window appears with the values for that rule.

  3. Click the down arrow on the Address field,to display the choice list of addresses and highlight the address you want to use.

  4. Type the Authorized User in the User field.

  5. Click the down arrow on the SKIP Version field to display the choice list of the versions of SKIP and highlight the version of SKIP you want to use.

  6. Click the down arrow on the Certificate Group field to display the choice list of certificate groups and highlight the Certificate Group that you want to use.

    Choose the Certificate Group containing the Remote Administration station's Certificate, not the Group that contains the Screen's certificate.

  7. Click the down arrow on the Key Algorithm field to display the choice list of key algorithms and highlight the algorithm you want to use.

  8. Click the down arrow on the Data Algorithm field to display the choice list of data algorithm and highlight the algorithm you want to use.

  9. Click the Save button