SunScreen 3.1 Administration Guide

Appendix B Quick Start Procedures

This section contains "cookbook" style instructions for the following tasks:

FTP Proxy Service Without Proxy User Authentication

The following information is used in this example:

To Set Up the SunScreen Environment
  1. Type the following to make sure the backend FTP Server is accessible:


    ping -s BackendServer
    

  2. Add an entry in the /etc/hosts file, if it is accessible.For example:


    1.2.3.4 BackendServer
    

To Configure the FTP Proxy Service
  1. Create a new Service for the FTP proxy service:

    1. Log in to the administration GUI.

    2. On the Policies List page, select the policy and click the Edit... button.

      The Policy Rules page appears.

    3. In the Common Objects section, select Service from the Type choice list.

    4. Click New Single... from the Add New choice list.

      The Service dialog window appears.

    5. Type the name for this new service in the Name field, for example:


      proxy-ftp
      

    6. Click the Add Filter button and select ftp.

    7. Click the field under Port, and type 21.

    8. Click the OK button.


      Note -

      There is no need to create an Authorized User.


  2. Create the Proxy User:

    1. In the Common Objects section, select Proxy User from the Type choice list.

    2. Select New Single... from the Add New choice list.

      The Proxy User dialog window appears.

    3. Type a name for this Proxy User in the Name field, for example:


      pu3
      

    4. Click the User Enabled check-box.

    5. Leave the Authorized User Name field empty.

    6. Type a name in the Backend User Name field, for example:


      BkEndUsrName
      

    7. Click the OK button.

  3. Create a Policy Rule:

    1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

      The Rule Definition dialog window appears.

    2. Edit each field as follows by clicking the down arrow to display the choice list.

      • Service: proxy_ftp

      • Source Address: *

      • Destination Address: *

      • Select Action: ALLOW

      • From the PROXY list select PROXY_FTP.

      • Enable the FTP command options, for example:

        • GET: ALLOW

        • CHDIR: ALLOW

        • PROXY USERS: pu1

    3. Click the OK button.

  4. Save the changes:

    1. Click the Verify Policy button.

    2. Click the Save Changes button.

Test the FTP Proxy Service

From the Client Machine:

  1. Make sure the physical connections are good.

  2. Make sure the client machine can access SunScreen Proxy Server:


    ping -s qa22-efs-hme1
    

  3. Test the FTP proxy service:

    • Command issued: ftp qa22-efs-hme1

    • Username: pu3@BackendServer

    • Password: put_anything@BkEndUsrName"s password OR: <none>@BkEndUsrName"s password For example, zzz@cherrycoke (Password is not seen because it is echo suppressed.)


      Example B-1 Screen Output


      tiny# ftp qa22-efs-hme1
      Connected to qa22-efs-hme1.
      220- Proxy: SunScreen FTP Proxy Version 3.0
       : Username to be given as <proxy-user>'@'<FTP-server-host>
       : Password to be given as <proxy-password>'@'<FTP-server-password>
      220  Ready.
      Name (qa22-efs-hme1:root): pu3@BackendServer
      331- Proxy: Authenticate & connect:
      331  Password needed to authenticate 'pu3'.
      Password:       <zzz@cherrycoke> OR
      Password:       <@cherrycoke>
      230- Proxy: 
       : Authentication mapped 'pu3' to backend user 'BkEndUsrName'.
       : Connecting to BackendServer (1.2.3.4) - done.
       Server: 220 BackendServer FTP server (SunOS 5.6) ready.
       Proxy: Login on server as 'BkEndUsrName'.
       Server: 331 Password required for BkEndUsrName.
       Proxy: Supplying password to server.
      230  Server: User BkEndUsrName logged in.
      ftp> ls

FTP Proxy Service With Proxy User Authentication

The following information is used in this example:

To Set Up the SunScreen Environment
  1. Type the following to make sure the backend FTP Server is accessible:


    ping -s BackendServer
    

  2. Add an entry in the /etc/hosts file, if it is accessible. For example:


    1.2.3.4 BackendServer
    

To Configure the FTP Proxy Service
  1. Create a new Service for the FTP proxy service:

    1. Log in to the administration GUI.

    2. On the Policies List page, select the policy and click the Edit... button.

      The Policy Rules page appears.

    3. In the Common Objects section, select Service from the Type choice list.

    4. Click New Single... from the Add New choice list.

      The Service dialog window appears.

    5. Type the name for this new service in the Name field, for example:


      proxy_ftp
      

    6. Click the Add Filter button and select ftp.

    7. Click the field under Port, and type 21.

    8. Click the OK button.

  2. Create the Authorized User:

    1. In the Common Objects section, select Authorized User from the Type choice list.

    2. Select New... from the Add New choice list.

    3. The Authorized User dialog window appears.

    4. Type a name for this Authorized User in the Name field, for example:


      au1
      

    5. Click the User Enabled check-box.

    6. Type the password:


      hello
      

    7. Click the Enabled check-box after Password: field.

    8. Retype the password:


      hello
      

    9. Click the OK button.

  3. Create a Proxy User:

    1. In the Common Objects section, select Proxy User from the Type choice list.

    2. Select New... from the Add New choice list.

      The Proxy User dialog window appears.

    3. Type a name for this Proxy User in the Name field, for example:


      pu1
      

    4. Click the User Enabled check-box.

    5. Type the following in the Authorized User Name field:


      au1
      

    6. Type a name in the Backend User Name field, for example:


      BkEndUsrName
      

    7. Click the OK button.

  4. Create a Policy Rule:

    1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

      The Rule Definition dialog window appears.

    2. Edit each field as follows by clicking the down arrow to display the choice list.

      • Service: proxy_ftp

      • Source Address: *

      • Destination Address: *

      • Action: ALLOW

      • PROXY list: PROXY_FTP

      • Enable the FTP command options, for example:

        • GET: ALLOW

        • CHDIR: ALLOW

        • PROXY USERS: pu1

  5. Click the OK button.

  6. Save the changes:

    1. Click the Verify Policy button.

    2. Click the Save Changes button.

  7. Test the FTP Proxy Service

    From the Client Machine:

    1. Make sure the physical connections are good.

    2. Make sure the client machine can access SunScreen Proxy Server:


      ping -s qa22-efs-hme1
      

    3. Test the FTP proxy service:

      • Command issued: ftp qa22-efs-hme1

      • Username: pu1@BackendServer

      • Password: For example, zzz@cherrycoke (Password is not seen because it is echo suppressed.)


        tiny# telnet qa22-efs-hme1
        Trying 70.70.70.1...
        Connected to qa22-efs-hme1.
        Escape character is "^]".
        SunScreen Telnet Proxy Version 3.0
        Username@Hostname: pu1@BackendServer
        Password:       <enter au1"s password>
        Trying BackendServer (1.2.3.4) ...
        Connected to BackendServer
        SunOS 5.6
        login: BkEndUsrName
        Password: 

Telnet Proxy Service Without Proxy User Authentication

The following information is used in this example:

To Set Up the SunScreen Environment
  1. Type the following to make sure the backend Telnet Server is accessible:


    ping -s BackendServer
    

  2. Add an entry in the /etc/hosts file, if it is accessible.For example:


    1.2.3.4 BackendServer
    

To Configure the Telnet Proxy Service
  1. Create a new Service for the Telnet proxy service:

    1. Log in to the administration GUI.

    2. On the Policies List page, select the policy and click the Edit... button.

      The Policy Rules page appears.

    3. In the Common Objects section, select Service from the Type choice list.

    4. Click New Single... from the Add New choice list.

      The Service dialog window appears.

    5. Type the name for this new service in the Name field, for example:


      proxy_telnet
      

    6. Click the Add Filter button and select tcp.

    7. Click the field under Port, and type 23.

    8. Click the OK button.


      Note -

      There is no need to create an Authorized User.


  2. Create the Proxy User:

    1. In the Common Objects section, select Proxy User from the Type choice list.

    2. Select New Single... from the Add New choice list.

      The Proxy User dialog window appears.

    3. Type a name for this Proxy User in the Name field, for example:


      pu3
      

    4. Click the User Enabled check-box.

    5. Leave the Authorized User Name field empty.

    6. Type a name in the Backend User Name field, for example:


      BkEndUsrName
      

    7. Click the OK button.

  3. Create a Policy Rule:

    1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

      The Rule Definition dialog window appears.

    2. Edit each field as follows by clicking the down arrow to display the choice list.

      • Service: proxy_TELNET

      • Source Address: *

      • Destination Address: *

      • Action: ALLOW

      • PROXY list: PROXY_TELNET.

  4. Save the changes:

    1. Click the Verify Policy button.

    2. Click the Save Changes button.

  5. Test the Telnet Proxy Service

    From the Client Machine:

    1. Make sure the physical connections are good.

    2. Make sure the client machine can access SunScreen Proxy Server:


      ping -s qa22-efs-hme1
      

    3. Test the Telnet proxy service:

      • Command issued: telnet qa22-efs-hme1

      • Username@Hostname: pu3@BackendServer

      • Password: Press the Return key


    Example B-2


    tiny# telnet qa22-efs-hme1
    Trying 70.70.70.1...
    Connected to qa22-efs-hme1.
    Escape character is "^]".
    SunScreen Telnet Proxy Version 3.0
     
    Username@Hostname: pu3@BackendServer
    Password:       <press return> 
    Trying BackendServer (1.2.3.4) ...
    Connected to BackendServer
     
    SunOS 5.6
     
    login: BkEndUsrName
    Password: 

Telnet Proxy Service With Proxy User Authentication

The following information is used in this example:

To Set Up the SunScreen Environment
  1. Type the following to make sure the backend Telnet Server is accessible:


    ping -s BackendServer
    

  2. Add an entry in the /etc/hosts file, if it is accessible. For example:


    1.2.3.4 BackendServer
    

To Configure the Telnet Proxy Service
  1. Create a new Service for the Telnet proxy service:

    1. Log in to the administration GUI.

    2. On the Policies List page, select the policy and click the Edit... button.

      The Policy Rules page appears.

    3. In the Common Objects section, select Service from the Type choice list.

    4. Click New Single... from the Add New choice list.

      The Service dialog window appears.

    5. Type the name for this new service in the Name field, for example:


      proxy_telnet
      

    6. Click the Add Filter button and select tcp.

    7. Click the field under Port, and type 23.

    8. Click the OK button.

  2. Create an Authorized User:

    1. In the Common Objects section, select Authorized User from the Type choice list.

    2. Select New... from the Add New choice list.

    3. The Authorized User dialog window appears.

    4. Type a name for this Authorized User in the Name field, for example:


      au1
      

    5. Click the User Enabled check-box.

    6. Type the password:


      hello
      

    7. Click the Enabled check-box after Password: field.

    8. Retype the password:


      hello
      

    9. Click the OK button.

  3. Create the Proxy User:

    1. In the Common Objects section, select Proxy User from the Type choice list.

    2. Select New... from the Add New choice list.

      The Proxy User dialog window appears.

    3. Type a name for this Proxy User in the Name field, for example:


      pu1
      

    4. Click the User Enabled check-box.

    5. Type the following in the Authorized User Name field:


      au1
      

    6. Type a name in the Backend User Name field, for example:


      BkEndUsrName
      

    7. Click the OK button.

  4. Create a Policy Rule:

    1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

      The Rule Definition dialog window appears.

    2. Edit each field as follows by clicking the down arrow to display the choice list.

      • Service: proxy_telnet

      • Source Address: *

      • Destination Address: *

      • Action: ALLOW

      • PROXY list: PROXY_TELNET.

    3. Click the OK button.

  5. Save the changes:

    1. Click the Verify Policy button.

    2. Click the Save Changes button.

  6. Test the Telnet Proxy Service

    From the Client Machine:

    1. Make sure the physical connections are good.

    2. Make sure the client machine can access the SunScreen Proxy Server:


      ping -s qa22-efs-hme1
      

    3. Test the Telnet proxy service:

      • Command issued: telnet qa22-efs-hme1

      • Username: pu1@BackendServer

      • Password: au1"s password For example, hello. (Password is not seen because it is echo suppressed.)


        tiny# telnet qa22-efs-hme1
        Trying 70.70.70.1...
        Connected to qa22-efs-hme1.
        Escape character is "^]".
        SunScreen Telnet Proxy Version 3.0
        Username@Hostname: pu1@BackendServer
        Password:       <enter au1"s password>
        Trying BackendServer (1.2.3.4) ...
        Connected to BackendServer
        SunOS 5.6
        login: BkEndUsrName
        Password: 

HTTP Proxy Service


Note -

User authentication does not apply.


The following information is used in this example:

To Set Up the SunScreen Environment
  1. Disable the HTTP daemon (for example, httpd), if it is running.

  2. Type the following to make sure the backend HTTP Server is accessible:


    ping -s BackendServer
    

  3. Add an entry in the /etc/hosts file, if it is accessible. For example:


    1.2.3.4 BackendServer
    

To Configure the HTTP Proxy Service
  1. Create a new Service for the HTTP proxy service:

    1. Log in to the administration GUI.

    2. On the Policies List page, select the policy and click the Edit... button.

      The Policy Rules page appears.

    3. In the Common Objects section, select Service from the Type choice list.

    4. Click New Single... from the Add New choice list.

      The Service dialog window appears.

    5. Type the name for this new service in the Name field, for example:


      proxy_http
      

    6. Click the Add Filter button and select tcp.

    7. Click the field under Port, and type 80.

    8. Click the OK button.


      Note -

      User authentication does not apply.


  2. Create the Proxy User:

    1. In the Common Objects section, select Proxy User from the Type choice list.

    2. Select New... from the Add New choice list.

      The Proxy User dialog window appears.

    3. Type a name for this Proxy User in the Name field, for example:


      pu1
      

    4. Leave the Authorized User Name field blank.

    5. Leave the Backend User Name blank.

    6. Click the OK button.

  3. Create a Policy Rule:

    1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

      The Rule Definition dialog window appears.

    2. Edit each field as follows by clicking the down arrow to display the choice list.

      • Service: proxy_http

      • Source Address: *

      • Destination Address: *

      • Action: ALLOW

      • PROXY list: PROXY_HTTP

      • Cookies, ActiveX, Java, and SSL: ALLOW/DENY

    3. Click the OK button.

  4. Save the changes:

    1. Click the Verify Policy button.

    2. Click the Save Changes button.

  5. Test the HTTP Proxy service

    From the Client Machine:

    1. Make sure the physical connections are good.

    2. Make sure the client machine can access the SunScreen Proxy Server:


      ping -s qa22-efs-hme1
      

    3. Configure the browser to use the HTTP proxy:

      • HTTP Proxy: qa22-efs-hme1

      • Port: 80

    4. Enter the following url:


      http://gobaby/Sun.Net
      

The screen output appears on the web page.

SMTP Proxy Service


Note -

User authentication does not apply.


To Set Up the SunScreen Environment
  1. Configure addresses and rules for DNS servers and address(es) for SMTP server(s) as follows:


    ssadm edit Initial
    edit> add Address dns0 HOST 1.2.3.4
    edit> add Address dns1 HOST 1.2.3.5
    edit> add Address dns-servers GROUP { dns0 dns1 } { }
    edit> add Address smtp-server HOST ...
    edit> add Rule dns localhost dns-servers ALLOW
    

  2. Test Spam filtering:


    edit> add Rule smtp "*" smtp-server ALLOW PROXY_SMTP RELAY
    (To allow any address to all inbound mailboxes, no relay checking.)
    edit> save
    

  3. Type the following to create a basic mail spam list (list of domains and/or addresses which won"t be allowed to send mail):


    ssadm edit Initial mail_spam add spam.com
    ssadm edit Initial mail_spam add 0.0.0.0..255.255.255.255
    

  4. Type the following to activate the configuration:


    ssadm activate Initial
    

    This refuses mail from any named host in spam.com, any host which has an unregistered address, and any originator name (in MAIL FROM: command) within spam.com.)

  5. Connection from an unregistered host, or from a registered host under the domain spam.com:


    % telnet efs 25
    Trying 1.2.3.4...
    Connected to efs
    Escape character is "^]".
    455 Smells like ... bacon ... no, spam!
    Connection closed by foreign host.

    The reverse-translated name (or lack thereof) has determined the originator is a spammer.

  6. Connection from a registered host not under the domain spam.com:


    % telnet efs 25
    Trying 1.2.3.4...
    Connected to efs
    Escape character is "^]".
    220 efs ESMTP Sendmail 8.7.4/8.7.3; Thu,
    11 Mar 1999 19:34:40 -0800 (PST)
    helo me.com
    250 efs Hello me.com [3.4.5.6],
    pleased to meet you
    mail
    from: elvis-lives@spam.com
    455
    Smells like ... bacon ... no, spam!
    Connection closed by foreign host.

    Connection aborted because originating user was determined to be a spammer. An alternate syntax for the mailbox is: elvis-lives@spam.com.

  7. Test relay blocking:

    Type the following to replace the previous rule with a rule that checks relaying:


    edit> add Rule smtp "*" smtp-server ALLOW PROXY_SMTP
    

    This allows only configured domains in inbound mailbox names.

  8. Type the following to create a basic mail relay list (a list of domains and/or hosts which will/will not be allowed as recipient):


    ssadm edit Initial mail_relay add good.org
    ssadm edit Initial mail_relay add !too.good.org
    ssadm edit Initial mail_relay add !too-mailer
    ssadm edit Initial mail_relay add plenty.org
    

    The ! prefix indicates that the domain or host is not to be allowed; if you are using csh, remember to escape the !, as it is a shell meta-character.

    Relay processing first compares the recipient domain(s) to those which are NOTs (that is, begin with !); if the recipient is found there, the message is refused.

    Second, the recipient domain(s) are compared to the list of OK domains (that is, without " !); if found, the recipient is allowed.

  9. Activate the configuration.

    This refuses mail to any mailbox in the subdomain too.good.org or for the host too-mailer, but accepts messages bound for any mailbox in other parts of good.org, or any mailbox in plenty.org (from RCPT TO: command).

  10. Mail for allowed recipients, ending in one which will not be relayed-to:


    % telnet efs 25
    Trying 1.2.3.4...
    Connected to efs
    Escape character is "^]".
    220 efs ESMTP Sendmail 8.7.4/8.7.3; Thu,
    11 Mar 1999 19:34:40 -0800 (PST)
    helo me.com
    250 efs Hello me.com [3.4.5.6],
    pleased to meet you
    mail
    from: me@me.com
    250 me@me.com...
    Sender ok
    rcpt to: <johnny.b@good.org>
    250 Recipient ok
    rcpt to: extra@extra@good.org
    250 Recipient ok
    rcpt to: <chinz@plenty.org>
    250 Recipient ok
    rcpt to: but.not@too.good.org
    454 Relay refused
    Connection closed by foreign host.

    Connection aborted because the recipient would require a forbidden relay operation.

    Other examples of relay addresses which will not be allowed are:

    • bad1@too-mailer

    • bad2@too-mailer@good.org

    • bad3@too.good.org@good.org

    • @good.org,bad4@too.good.org

    • @too.good.org,bad5@ok.good.org

    Note that the last two bullet items are examples of older, ARPANET-style path naming, and most modern sendmails are not configured to accept them, regardless of whether or not they pass our relay filtering.

    Also note that mailbox names surrounded by <> are treated as if they there are no <>s.

  11. Test default relay:

    If there is no configured relay list, the domain name of the SunScreen host itself is used as the allowed domain. For example, if the SunScreen name is host@domain.com, the relay checking behaves as if the following command was configured as the entire relay list:


    ssadm edit Initial mail_relay domain.com
    

  12. Mail which actually get through:


    % telnet efs 25 Trying 1.2.3.4... Connected to efs
    Escape character is "^]". 220 efs ESMTP Sendmail 8.7.4/8.7.3; Thu,  11 Mar
    1999 19:34:40 -0800 (PST) helo me.com 250 efs Hello me.com [3.4.5.6], pleased to meet you 
    mail  from: me@me.com 250 me@me.com...  Sender ok rcpt to: you@good.com
    250 Recipient ok rcpt to: really@really.good.org 250 Recipient ok rcpt to:
    i-got@plenty.org 250 Recipient okrcpt to: good@and.plenty.org 250 Recipient
    ok data
    354 Enter mail, end with "." on a line by itself 
    Subject: I Love Candy I really, really love good candy ... 
    yummm!  Send me some!. 250 UAA01234
    Message accepted for delivery quit 221 efs closing connection
    Connection closed by foreign host.

    After the . (ending the mail session), the proxy (and mailer) returns to the state where it expects a next message (starting with a MAIL FROM: command.


    Note -

    Backslash \ and end of line denote command line continuation.


Configuring RADIUS Authentication

  1. Identify the RADIUS servers:


    # ssadm edit <Policy>> vars add prg=auth name=RADIUSServers 
    \VALUES={ host=radius_server_name }   \
    DESCRIPTION="RADIUS server name(s) or addresses to query"
    

  2. Add the node secret used by RADIUS protocol to secure traffic between the RADIUS client and server:


    # ssadm edit <Policy>> vars add sys=screen_name prg=auth  
    name=RADIUSNodeSecret VALUE="xxxxxxxx
    

    Where xxxxxxxx is the RADIUS Node Secret.

  3. Add a Rule to allow the SunScreen machine to communicate with the RADIUS servers:


    # ssadm edit <Policy>edit > add rule radius EFS_hostname 
    radius_server_name ALLOW
    edit > save
    # ssadm activate <Policy>
    

Telnet Proxy Service With RADIUS User Authentication

  1. Follow the steps in the previous section, "Configuring RADIUS Authentication for SunScreen."

  2. Add a rule to allow the Telnet Proxy for a pre-defined RADIUS user:


    # ssadm edit <Policy>edit > Add Rule telnet USER radius ALLOW  PROXY_Telnet
    edit > save
    # ssadm activate <Policy>
    

  3. Test the Telnet Proxy with RADIUS authentication:


    # telnet EFS_Screen_nameUsername @Hostname
    : /radius/ radius_user@server
    Password: radius_user_pw
    

FTP Proxy Service With RADIUS User Authentication

The following information is used in this example:

To simplify administration, the Proxy User name and the Authorized User name may use the same name as the Backend User name.

To Set Up the Service
  1. Follow the steps in the section above, "Configuring RADIUS Authentication for SunScreen."

  2. Configure the FTP Proxy Service:

    1. Create a Proxy user group, for example, ftp-grp.

    2. Add pre-defined users radius and securid to ftp-grp.


       # ssadm edit <Policy>> proxyuser add
      ftp-grp GROUP> proxyuser 
      addmember ftp-grp radius
      > proxyuser addmember ftp-grp securid
      

    3. For each user that will be using the FTP Proxy:

      • Create a record in the Authorized User database.

      • Create a record in the Proxy User database.

      • Add the user as member of ftp-grp:


        # ssadm edit <Policy>> authuser add au11
        PASSWORD=\{ au1_pw \}> 
        proxyuser add pu1 auth_user_name=au1 \
        backend_user_name=BkEndUsrName
        > proxyuser addmember ftp-grp pu1
        

      This example assumes C shell, the back slash, \ before the brackets is the escape key from special characters { and }. For Bourne shell, the backslash is not necessary.

      Since there are typically many users to administer, this can be done through a script.

    4. Add a rule to allow the FTP proxy for the proxy user group, ftp-grp.


      # ssadm edit <Policy>edit > Add Rule
      ftp USER ftp-grp ALLOW 
      PROXY_FTP \FTP_GET FTP_CHDIR
      edit > save
      # ssadm activate <Policy>
      

  3. Test the FTP Proxy with RADIUS authentication:


    # ftp EFS_Screen_nameUsername @Hostname: radius_user@ftp_server
    Password: radius_user_pw@password_at_ftp_server
    

SecurID Clients Supported by SunScreen

SunScreen supports two mechanisms for SecurID clients:

Or:

It will replace the system login module by an ACE login module. By installing it on each user desktop, ACE accounting will show that the user is authenticated through the user's desktop.

It needs to be installed only on the SunScreen EFS firewall. ACE accounting will show that the users are authenticated through the EFS machine.

Configuring SecurID Authentication
  1. Follow ACE documentation to set up ACE server and configure Securid users.

  2. Install either ACE/Agent 3.3 on each user desktop or SunScreen SecurID stub client on EFS machine.

  3. Add a rule to allow the SunScreen machine to communicate with the ACE servers:


    # ssadm edit <Policy>edit > Add Rule
    securid EFS_hostname 
    secureid_server_name ALLOW
    edit > save
    # ssadm activate <Policy>
    

Telnet Proxy Service With SecurID User Authentication

To Set Up the Service
  1. Follow the steps in the section above, "Configuring SecurID Authentication for SunScreen."

  2. Add Rule to allow telnet proxy for pre-defined 'securid' user


    # ssadm edit <Policy>edit > Add Rule
    telnet USER radius ALLOW  PROXY_Telnet
    edit > save
    # ssadm activate <Policy>
    
    :

  3. Test the Telnet Proxy with SecurID Authentication:


    # telnet EFS_Screen_nameUsername @Hostname : 
    /securid/securid_user@server
    Password: securid_passcode
    

FTP Proxy Service With SecurID User Authentication

The following information is used in this example:

To Set Up the Service
  1. Follow the steps in the section above, "Configuring RADIUS Authentication for SunScreen."

  2. Configure the FTP Proxy Service

    1. Create a Proxy user group, for example, ftp-grp.

    2. Add pre-defined users radius and securid toftp-grp:


      # ssadm edit <Policy>> proxyuser add
      ftp-grp GROUP> proxyuser 
      addmember ftp-grp radius
      > proxyuser addmember ftp-grp securid
      

    3. For each user that will be using the FTP Proxy:

      • Create a record in the Authorized User database.

      • Create a record in the Proxy User database.

      • Add user as member of ftp-grp:


        # ssadm edit  <Policy>> authuser add au1 PASSWORD=\{ au1_pw\}> 
        proxyuser add pu1 auth_user_name=au1
        backend_user_name=BkEndUsrName > 
        proxyuser addmember ftp-grp pu1
        

      Since there are typically many users to administer, this can be done through a script.

    4. Add a rule to allow FTP proxy for proxy user group ftp-grp:


      # ssadm edit <Policy>edit
      > Add Rule ftp USER ftp-grp ALLOW 
      PROXY_FTP \ FTP_GET FTP_CHDIRedit > save
      # ssadm activate <Policy>
      

  3. Test the FTP Proxy with SecurID Authentication:


    # ftp EFS_Screen_name
    Username @Hostname: /securid/securid_user@server
    Password: securid_passcode@BkEndUsrName_password
    

Port-by-Port Cookbook

This example covers a Port by Port scenario using Mixed Mode With Proxies).

Network 1 Topology

Graphic

Port-by-Port Limitations

Testing Proxy Telnet/FTP

Testing Telnet and FTP Without Going Through the Proxy Server

Testing Proxy HTTP

Testing HTTP Without Going Through the Proxy Server

Testing NAT

Network 2 Topology

Graphic

Port-by-Port limitations

Testing Proxy Telnet/FTP

Testing Telnet/FTP Without Going Through the Proxy Server

Testing Proxy HTTP

Testing HTTP Without Going Through the Proxy Server

Testing NAT