This chapter describes the administration graphical user interface (GUI) for configuring and administering SunScreen. It contains information on the following topics:
Starting the administration GUI
Elements and navigation of the administration GUI
Function and controls of each page in the administration GUI
Connect to the administration GUI by starting a browser that can run Java applets, such as HotJava, Netscape Navigator, or Microsoft Internet Explorer.
The SunScreen administration GUI uses Java applets to administer and monitor Screens.
If your network uses proxies (gateways) for Internet access through a network firewall, you may need to configure your browser to ignore proxies when you are connecting to a Screen. For example, if you type localhost in the Don't Proxy field, your browser will connect to localhost directly. For information on configuring proxies, refer to the documentation for your browser.
FIGURE 5-1 shows the Login page for SunScreen. The title bar of the browser shows the application to which the browser is connecting.
You can use the navigation buttons shown in the navigation bar of the browser to move from the current page of the administration GUI to a previous page, from the current page to a next page as available, or to refresh the current page. Each browser behaves somewhat differently when you use these buttons. You will have more consistent success if you use the navigation buttons provided in the administration GUI. See "Administration GUI Navigation Bar and Buttons".
If you have changed any of the information and have not saved your changes, you will receive a warning message that you have unsaved changes. If you ignore the warning and move to a different page without returning and saving the changes, any changes that you have not saved will be lost.
Use one of the following URLs to connect to the administration GUI to administer a Screen or set of Screens remotely:
Remote administration - Type http://screenname:3852 as the URL, where screenname is the name of the Screen that you want to administer.
Use one of the following URLs to connect to the administration GUI to administer a Screen locally:
This is the only time that you need to enter a URL in the Location field of the browser.
The administration GUI for SunScreen is organized as a set of pages. Each page contains one or more controls. For example, most pages include buttons and text fields, which you update using your keyboard and mouse.
Logging in as a user with the administrative access level ALL, READ, or WRITE puts you into a session. You cannot log out of a session if you have made changes, until you have either saved or cancelled any changes to the last saved version.
Do not change the administration address (le0, qe0, hme0, and the like), the administration certificate, the local certificate, or the administration-group certificate. If you change these items, you risk losing your connectivity from the Administration Station to the Screen. Reestablishing your connectivity is difficult and requires that you log into the Screen directly or use an Administration Station that is still working. It also requires exchanging encryption information
The Login page for SunScreen appears when the browser connects to the designated Screen. FIGURE 4-3 shows the Login page for SunScreen.
The controls on the Login page are explained in TABLE 5-1.
Table 5-1 Controls on the SunScreen Login Page
During installation, a default administration user account called admin with the password admin was created. Change this password as soon as possible to assure the security of the Screen.
Do not change the administration address (le0, qe0, hme0, and the like), the administration certificate, the local certificate, or the administration-group certificate. If you change these items, you risk losing your connectivity from the Administration Station to the Screen. Reestablishing your connectivity is difficult and requires that you log into the Screen directly or use an Administration Station that is still working. It also requires exchanging encryption information
You can look at the online documentation by clicking the Documentation button on the login page, as shown in FIGURE 4-3 or by clicking the Documentation button on the administration GUI navigation bar, shown in FIGURE 4-3.
The SunScreen Information page is the default selection in the Select Task field of the Login page. On this page you can move to the Policies List page, choose the Screen about which you want information, view the logged information about a Screen's performance, check the status of a Screen, and view the SKIP statistics, view the online documentation, and logout.
The administration GUI navigation bar and navigation buttons, shown in FIGURE 5-2, appear at the top of administration GUI pages. You should use these button for moving among the pages of the administration GUI.
If these buttons are missing from a page of the administration GUI, it means that you have unsaved changes from your editing session. Once you have saved your changes the buttons reappear.
TABLE 5-2 describes the administration GUI navigation buttons.
Table 5-2 Administration GUI Navigation Buttons
You choose the name of the Screen about which you want to view the information from a choice list. The names of the screens from among which you can choose are those that are in the centralized management group or HA cluster.
Clicking one of these tabs displays the status, logs, and the traffic and SKIP statistics.
The Status tab is displayed by default. The Status tab displays the information shown in FIGURE 5-3. This information is derived from the system and the configuration of the firewall when you installed the SunScreen or modified the configuration. You cannot edit any of the fields on this page.
TABLE 5-3 describes the information presented on this page.
Table 5-3 Status Information
Title |
Description |
---|---|
Product |
The name of the software product. |
System Boot Time |
Date and time when the system was last restarted. |
SunScreen Boot Time |
Date and time when the system was last restarted. |
Version |
The release of the software that is running. |
HA Configured |
Whether high availability (HA) is configured (YES or NO). |
HA Daemon |
Whether the high availability daemon is running (OFF or ON). If the HA daemon is running, the members of the HA cluster appear in the area below along with the state of each member of the HA cluster (Active or Passive). |
HA Primary Host |
The name or IP address of the primary host of the high availability cluster. |
Host Names |
Lists the hosts configured for HA. This information appears in the area set off from the rest of the information and is updated by default every 30 seconds. You can change the update interval by changing the poll interval in the Logs tab. |
Status |
Shows the status of the primary and secondary HA hosts. The status is ACTIVE, PASSIVE, and NONRESPONSIVE. This information appears in the area set off from the rest of the information and is updated by default every 30 seconds. You can change the update interval by changing the poll interval in the Logs tab. |
Help button |
Displays the online help for this page. |
The logs tab displays the Log Browser panel, as shown in FIGURE 5-4.
TABLE 5-4 describes the column headings for the log panel of the SunScreen Information page.
Table 5-4 Column Headings on the Log Panel of the SunScreen Information Page
Field |
Description |
---|---|
Time |
Indicates the time that the packet or event represented by this record was logged by the Screen. Use this time field to retrieve records in Historical mode as set in the Log Browser Tab Retrieval Setting. |
Level |
Indicates the type and severity level of the logged event. |
Service |
Indicates the network service or protocol, such as TCP, IP, NFS, Telnet, or HTTP, over which this packet was sent or to which the event is related. |
Address(es) |
Shows the address from which and to which a packet was sent. Arrows indicate direction. Some events that, by themselves, are not related to IP traffic will not have an address or addresses, as shown in the example. |
Reason/Detail |
Shows the reason a packet or event was logged or the detail regarding the logging. This information depends on the requirements of the rules within a policy. |
The logs tab also displays the Retrieval Setting tab and Information tab for the logs.
Logged packets are configured in the packet filtering rules so that a packet or an event is displayed which meets the requirements of a rule in a policy. The log has two retrieval modes: Historical and Real Time.
The Historical mode allows you to examine a particular segment for a particular time.
The Real Time mode displays information as the packets pass through the Screen while you are looking at the log.
For more information setting the values for the log browser, see the section on the "Retrieval Setting Tab" below.
FIGURE 5-5 shows the Retrieval Setting tab for the SunScreen Information page and the log browser in particular. The Filter Keywords, Add to Current Filter, and Current Filter controls are discussed in greater detail in the following section, "Setting a Log Viewing Filter."
TABLE 5-5 describes the controls on the Retrieval Setting tab.
Table 5-5 Controls on the Retrieval Setting Tab
The Log Browser filters log events to be displayed. The language that it uses is identical to the filtering options of the logdump command in the command-line program; it is a superset of the language used by the Solaris snoop packet monitor tool.
You have full access to this language typing an arbitrary logdump expression in the Current Filter text entry box in its Retrieval Settings tab and clicking the Apply button to activate it.
In addition, the Filter Keywords controls provide the ability to create many simple filtering expressions. These controls reduce typing effort as well as serving as reminders of filtering options.
The Filter Keywords controls are used by selecting one or more operations from their choice lists or entering a target (operand) in the rightmost editable combo box. After this choosing or typing your entry, click the Add to Current Filter button to add these items to the Filter Keywords text entry box at its current insertion pointer.
The leftmost editable combo box contains the Boolean operators and, or, and not.
The left-center editable combo box provides filtering terms that are complete and restrict the type of log event displayed. TABLE 5-6 describes the terms in the left-center editable combo box.
Table 5-6 Filter Terms of the Left-Center Editable Combo Box
Term |
Description |
---|---|
loglvl pkt |
Allows displaying network packet-type events |
loglvl sess |
Allows displaying network session-type events |
loglvl auth |
Allows displaying events related to authentication operations |
loglvl app |
Allows displaying events related to screen application (usually proxy) operations |
logapp auth |
Allows displaying events from the authentication subsystem |
logapp edit |
Allows displaying events related to registry or policy editing |
logapp ftpp |
Allows displaying events from the FTP proxy |
logapp log |
Allows displaying events related to the logging facilities themselves |
logapp httpp |
Allows displaying events from the HTTP proxy |
logapp smtpp |
Allows displaying events from the SMTP proxy |
logapp telnetp |
Allows displaying events from the Telnet proxy |
logsev emerg |
Allows displaying events of an emergency severity |
logsev alert |
Allows displaying events of an alert severity or above |
logsev crit |
Allows displaying events of a critical severity or above |
logsev err |
Allows displaying events of an erroneous severity or above |
logsev warn |
Allows displaying events of a warning severity or above |
logsev note |
Allows displaying events of a notice severity or above |
logsev info |
Allows displaying events of an informative severity or above (all events that are not of debug severity) |
logsev debug |
Allows displaying events of a debug severity or above (all events) |
The right-center editable combo box provides filtering terms most of which are incomplete and require an operand value, You type these in the rightmost editable combo box. They are added to the choice list of the rightmost editable combo box for reference so that you need not retype the value if you want to use it again. TABLE 5-7 describes the filter terms in the right-center editable combo box.
Table 5-7 Filter Terms in the Right-Center Editable Combo Box
Term |
Description |
---|---|
logwhy reason# |
Restricts display to packets that have the given logging reason why code (See Appendix D, Error Messages, TABLE 11-16 |
logiface iface |
Restricts display to packets that arrived on the interface named iface |
host hostname |
Restricts display to events either from or to hostname |
dst hostname |
Restricts display to events destined for hostname |
src hostname |
Restricts display to events origination from hostname |
port hostname |
Restricts display to events related to the service svcname |
dstport hostname |
Restricts display to events targeted to the service svcname |
srcport svcname |
Restricts display to events originating from the service svcname |
net netaddr |
Restricts display to events either from or to the network whose number is netaddr |
gateway gwyaddr |
Restricts display to packets that used gwyaddr as a gateway |
udp |
Restricts display to events related to the UDP transport protocol |
tcp |
Restricts display to events related to the TCP transport protocol |
icmp |
Restricts display to packets of the ICMP control protocol |
rpc |
Restricts display to packets of the RPC protocol |
etheraddr etheraddr |
Restricts display to packets that have arrived from this Ethernet address |
The terms in italics are variables for which you must supply a value or values in the when you choose this term from the choice list. The values for the variable are as follow:
reason # The reason number is shown in TABLE 11-16 in Appendix D, Error Messages.
hostname can be:
svcname can be:
A numeric TCP or UDP port number (for example, 23 for Telnet)
A numeric TCP or UDP port number range (for example, 6000. .6023 for X windows)
A service name known to the screen's naming service (for example, domain found in /etc/services)
iface can be:
The name of an interface (for example hme0)
netaddr can be:
The IP network number (for example 199.12.200)
gwyaddr can be:
The name of an Ethernet address (link-layer address gateway through which packets are flowing)
etheraddr can be:
The 6-octet Ethernet address (for example 8:0:20:A0:EE:E4)
The log-browser Information tab on the Screen Information page and shown in FIGURE 5-6, provides the statistics for the current log.
TABLE 5-8 describes the fields on the Information tab. You cannot edit the fields on this page.
Table 5-8 Fields on the Information Tab
Control |
Description |
---|---|
Server Name field |
Indicates the name of the Screen to which the Log Browser is connected. |
Log current size field (bytes) |
Indicates the current size of the log file in bytes on the server. |
Log maximum size filed (bytes) |
Indicates the maximum size of the log file in bytes on the server. |
Last Cleared field |
Indicates the date and time the log file was last cleared. |
Cleared By field |
Identifies the login name of the administrator who last cleared the log file. |
Log loss count (records) field |
Indicates the number of log records that have been thrown away since the last "clear" operation. Log records are lost if the log grows beyond its maximum size or if the file system on which the log is written fills before that maximum is reached. Packets that cannot be logged because the traffic load exceeds the logger's ability to store entries are not counted. |
The Statistics tab, shown in FIGURE 5-7, provides information on traffic and key statistics. Traffic statistics include data such as input and output, passed or failed, logged, and bad packets for packets received over the active interfaces. The Statistics tab is updated according to the setting in the Real Time Poll Interval field on the Retrieval Setting tab of the Logs Tab.
The Traffic Statistics panel (top) displays traffic statistics for each interface on the Screen. TABLE 5-9 describes the fields on the Traffic Statistics panel of the Statistics tab. The values displayed in these fields cannot be modified.
Table 5-9 Controls on the Traffic Statistics Panel of the Statistics Page
Control |
Description |
---|---|
Interface field |
Name of the interface. |
Address field |
Address of the interface. |
Inputs field |
Total number of packets seen on that network interface. This number includes packets processed by the Screen and intranet traffic. Because this counter records more than just the number of packets through the interface, the number can be much higher than the sum of the numbers in the Passes and Drops fields, which record the number of packets passed and dropped. |
Outputs field |
Total number of packets passed from other interfaces on the Screen and sent out over this interface. |
Passes field |
Number of packets received from another interface, matched to an ALLOW rule exactly, and sent out over the designated interface. |
Logs field |
Number of packets that have been logged by the Screen according to the actions in the active configuration. |
Alerts field |
Number of SNMP alerts generated because of the traffic on this network interface. |
Drops field |
Number of packets that have been dropped, either as a result of exactly matching a DENY rule or as a result of not matching any rule and being dropped as the default action of the Screen's interface. |
AllocFail field |
Error counter for packets lost because of the lack of resources. |
NoCanPuts field |
Error counter for packets lost because of the lack of stream flow control. |
BadPackets field |
Error counter for packets lost because of errors. |
The SKIP Statistics panel shows the SKIP statistics for the SunScreen. TABLE 5-10 describes the fields on the SKIP Statistics panel of the Statistics page. The values displayed in these fields cannot be modified.
Table 5-10 Controls on the SKIP Statistics Panel of the Statistics Tab
Control |
Description |
---|---|
skip_hdr_bad_versions field |
Total number of SKIP headers with invalid protocol versions. |
skip_hdr_short_ekps field |
Number of SKIP headers with short encrypted packet fields. |
skip_hdr_short_mids field |
Number of SKIP headers with short MID fields. |
skip_hdr_bad_kp_algs field |
Number of SKIP headers with unknown cryptographic algorithms. |
V1 skip_hdr_encodes field |
Number of SKIP V1 headers encoded. |
V1 skip_hdr_decodes field |
Number of SKIP V1 headers decoded. |
V1 skip_hdr_runts field |
Number of SKIP V1 headers with short packets. |
V1 skip_hdr_short_nodeids field |
Number of SKIP V1 headers with short node identifiers. |
IPSP skip_ipsp_decodes field |
Number of SKIP V2 headers decoded. |
IPSP skip_ipsp_encodes field |
Number of SKIP V2 headers encoded. |
IPSP skip_hdr_bad_nsid field |
Number of headers with a bad V2 name space identifier. |
IPSP skip_hdr_bad_mac_algs field |
Number of headers with unknown or bad authentication algorithms. |
IPSP skip_hdr_bad_mac_size field |
The number of headers with an authentication error in the MAC size. |
IPSP skip_hdr_bad_mac_val field |
The number of headers with an authentication error in the MAC value. |
IPSP skip_hdr_bad_next field |
Number of headers with a bad Next Protocol field. |
IPSP skip_hdr_bad_esp_spi field |
Number of headers with a bad V2 SPI field. |
IPSP skip_hdr_bad_ah_spi field |
Number of headers with a bad V2 AH SPI field. |
IPSP skip_hdr_bad_iv field |
Number of headers with a bad V2 initialization vector. |
IPSP skip_hdr_bad_short_r_mkeyid field |
Number of headers with a short V2 receiver key identifier. |
IPSP skip_hdr_bad_short_s_mkeyid field |
Number of headers with a short V2 sender key identifier. |
IPSP skip_hdr_bad_bad_r_mkeyid field |
Number of headers with a bad V2 receiver key identifier. |
skip_key_max_idle field |
Time, in seconds, until an unused key is reclaimed. |
skip_key_max_bytes field |
Maximum number of bytes to encrypt before discarding a key. |
skip_encrypt_keys_active field |
Number of encryption keys in the cache. |
skip_decrypt_keys_active field |
Number of decryption keys in the cache. |
skip_key_lookups field |
Total number of key cache lookups. |
skip_keymgr_requests field |
Total number of key cache misses (key not found). |
skip_key-reclaims field |
Total number of key entries reclaimed. |
skip_hash_collisions field |
Total number of table collisions. |
FIGURE 5-8 shows the action buttons for the SunScreen Information Page. Use these buttons to control the various actions on the log.
TABLE 5-11 describes the action buttons on the SunScreen Information Page.
Table 5-11 Action Buttons on the SunScreen Information Page
The Help button displays context-sensitive help for the page on which you are. It brings up a new browser window, which you can quit to return to your page or you can move it aside and keep it open for quick reference.
You reach the Policies List page by choosing Manage Policies for the Select Task field on the Login Page before you click the login button or by clicking the Policies button on the administration GUI's navigation bar.
You can move to the SunScreen Information page, display the online documentation, or log out by clicking the appropriate button on the administration navigation bar
The Policies List page, shown in FIGURE 5-9, allows you to add a new policy or to edit, copy, rename, delete, and backup a particular policy to a local file; to restore a policy from a local file; and to initialize HA.
The Policies List page identifies the policies that have been stored for a Screen. The List Policies page has two instructions under the top or navigation bar: "To edit a policy select one from the table and click the `Edit' button," and "For other tasks select from the top panel buttons."
Below the Policies List banner is a panel consisting of three columns that show:
The name - You must click a name of a policy that you want to edit in this column. The term "-Currently Active-" appears in this column for the active policy and the name and the version of the active policy appears in the version column.
The version (if present) - The version lists the versions of policies for your system.
The active policy information (if present).
The Policies List panel lists the policies that have been set up for a particular Screen. The active policy is the first policy in the list of policies and is automatically highlighted when you first come to this page. You can edit inactive Screen policies by clicking the name of an entry in the Policies List panel to highlight it, then click one of the controls at the bottom of the Policies List page.
The types of policies are:
Regular Policies - Policies that share common objects with other regular policies.
Versioned Policies - A policy with a version number is displayed by clicking the button next to the regular policy name in the first column of Policies List Panel of the Policies List Page. Clicking the reverse arrow hides the versions of a policy. A policy with a version number contains a snapshot of the common objects that are embedded in the saved policy. The name of the policy contains a dot followed by an incremental number. The higher the number, the later the version. Versioned policies cannot be modified, but their rules can be extracted to a new policy.
Currently Active Policy - This policy is extracted from the active policy. The currently active policy cannot be modified. If you click the currently active policy and highlight it, the edit button retains the (RO) designation to show that it is read only. A Save As button appears on the Policy Name line on the Packet Filtering tab of the Policy Rules panel. You can save any modifications to the currently active policy as a new policy. A Save As button appears on the Common Objects panel. You can save the common objects of this policy to replace the current common objects associates with regular policies. FIGURE 5-10 shows these Save As buttons.
This allows you to make the common objects embedded in this version of the policy the current common objects, overwriting the existing set of common objects.
This approach allows you to save only the rules part of the versioned policy so that:
These rules become the current rules for this policy, for example the rules for policy Initial.10 can be made the rules for the current version of Initial.
You can copy the rule to a new name.
The rules created in this way are used with the current set of common objects. On verifying this policy, you may have to fix any inconsistencies.
The difference in behavior between Save As and Edit(RO) is that Save As affects the current policy only and Edit(RO) affects a policy version. With Edit(RO), you have the additional choice of making the rules the current rules for the policy.
describes the action buttons for the Policies List page.
Table 5-12 Action Buttons on the Policies List Page
FIGURE 5-11 shows the Policy Rules page.
The topmost area contains the administration GUI navigation buttons. Figure 5-2 shows the navigation buttons and TABLE 5-2 describes these buttons.
The area below the administration GUI navigation buttons contains the command buttons for the Policy Rules page. These buttons become active when you add or edit a common object or modify a policy.
FIGURE 5-12 shows the command buttons on the Policy Rules page.
TABLE 5-13 describes the command buttons on the Policy Rules page.
Table 5-13 Policy Rules Page Command Buttons
The Policy Rules panel displays the rules in a policy and their order. In this panel, you can write new rules for a policy and edit the rules in a policy. You can establish rules for Packet Filtering, Administrative Access, NAT, or VPN, using the respective tab.
Below the command buttons for the page is the Common Objects panel. You use the controls on this panel to edit or create new common objects for policies and objects specific to the Screen. FIGURE 5-13 shows the Common Objects panel of the Policy Rules page
TABLE 5-14 describes the information, controls, and the buttons in the Common Objects Panel.
Table 5-14 Common Object Information, Controls, and Buttons
Information |
Control |
Description |
---|---|---|
Version |
|
The version of the registry of common objects that is being used in a policy. The latest version of the registry is used by all policies. If you edit the common objects (registry) the word "modified" appears after the number until you either cancel the changes or save the changes. |
Type |
Common Object Choice List |
Displays the list of common objects available. You choose the common object that you want from this list. |
|
Subtype Choice List for Adding a New Common Object of Chosen Type |
Displays the choice list of subtypes available for the common object that you selected. Each common object has it own set of subtypes and each subtype requires that you provide different information in a dialog box for that subtype for that common object. |
Search |
Search String |
Enter the string for a particular subtype for a common object in this editable text field. When you click the Search button, all matching subtypes appear in the Results choice list. Leaving this field blank returns all entries defined for the selected subtype or local to the selected Screen. Selecting All in Search on Screens and Search Subtype Choice with the Search String field empty returns all entries defined. |
|
Search on Screen |
Displays a choice list of the Screens that the Administration Station manages. Selecting a Screen from this list limits the search to common objects exclusive to that Screen. |
|
Search Subtypes |
Display a choice list of the subtypes available for the selected common object. |
|
Search Button |
Starts the search according to the criteria set. |
|
Results |
Displays a choice list of available entries that match the criteria. |
Found |
|
Show the number of entries in the search that match the criteria. |
Detail |
|
Displays the description for the item chosen from the Results choice list. |
|
Edit Button |
Displays the dialog box for the common object selected. Editing a common object is similar to adding a new one. The difference is that after you have chosen the common object that you want to edit and have clicked the Edit button, the dialog box for that common object contains all the information and you only need to modify the requisite information. |
|
Delete Button |
Displays the Delete dialog box. |
|
Rename Button |
Displays the Rename dialog box. |
|
Help Button |
Displays online help. |
Common objects are the components or data objects that you use to make up policy rules. Before you write these rules, you add the common objects that you plan to use in the rules.
After the common objects have been added, they are stored in a database and can be used over again to create rule sets for additional policies.
Authorized user
Admin user
Jar signature
Jar hash
Proxy user
that appear in the administration GUI are automatically saved when they are edited or new objects are added. You do not need to save these objects. Once these objects are added or edited, the change applies immediately and cannot be reversed. The Save button in the administration GUI is greyed out to show that it is inactive.
Although the changes made to these objects are saved immediately, they do not take effect until a policy is activated. The administration GUI edits authorized users, which are authuser objects; proxy users, which are proxyuser objects; and Jar signatures and Jar hashes.
Use the service common object to identify network services that a Screen will use to filter packets. The service common object has two subtypes, single service and service group.
Adding a new service with new values makes troubleshooting easier than editing the default values of a service.
You add new network services and edit the filtering activities applied when a service is used in a rule. You add a new single service using the Service dialog box that appears when you select New Single Service from the Add New combo box in the Common Objects panel, shown in FIGURE 5-14.
You control the filtering activities by specifying what packet-filtering engine you want to use and the various discriminators and parameters applicable to that filtering engine.
FIGURE 5-15 shows the filter table of the Service dialog box for a new single service.
TABLE 5-15 describes the controls in the Service dialog box for a single service.
Table 5-15 Controls for Service Dialog Box for Single Service
Control |
Description |
---|---|
Configuration Information |
|
Name |
Specifies the name of the service object. |
Description |
(Optional) Provides a brief description about the service object. |
Screen |
(Optional) Restricts the service so that it applies to the selected Screen only. The default (All) means that all Screens recognize this object unless an object exists that has been specifically defined for a particular Screen and has the same name as the Screen for which it is defined. |
Filter Table Information |
|
Filter Table |
Display the parameters for the single services.
|
Filter |
Identifies the state engine. |
Port |
Identifies the port number, program number, or type used by the forward filter. |
Broadcast |
Determines whether the rules in which the service is used allows communication to broadcast or multicast addresses. If you want the service to work for nonbroadcast addresses, you must enter a separate table entries for broadcast and nonbroadcast entries |
Parameters |
Overrides the default values the selected packet-filter state engine. Each state engine has a set of parameters; refer to Appendix C, Services and State Engines for default parameters values and their meaning. |
Reverse |
Determines whether the filter applies to packets originating from the host in the To address of a rule and going to the From address of a rule. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Displays the page of online help for this common object. |
Use the service group to group single services that you want to use together. FIGURE 5-16 shows the Service dialog box for service group.
TABLE 5-16 describes the controls in the Service dialog box for service group.
Table 5-16 Controls for Service Group Service Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name of the service object. |
Description |
(Optional) Provides a brief description about the service object. |
Screen |
(Optional) Restricts this service group applies to the selected Screen only. The default (All) means that all Screens recognize this object unless an object exists that has been specifically defined for a particular Screen and has the same name as the Screen for which it is defined. |
Services List |
Identifies the services that do not belong to the service group. Refer to "State Engines" for a description of services. |
Members List |
Identifies the services that belong to the service group. |
Add Button |
Moves the service selected in the Services list to the Members list, making the service a member of the specified service group. |
Remove Button |
Moves the service selected in the Members list to the Services list, removing the service from the specified service group. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Use the address common object to create address objects that define the source and destination address for a policy rule. If you are adding addresses, the Address dialog box that appears for a particular subtype is empty. If you are modifying an existing address, the Address dialog box displays the existing information. Address objects has three subtypes: host, range and group.
Host is a way to associate an individual host's IP address with a name for the address object. FIGURE 5-17 shows the Address dialog box for adding a new host to the host subtype.
TABLE 5-17 describes the controls in the Address dialog box for a new host.
Table 5-17 Controls for New Host Address Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name for the address object. |
Description Field |
(Optional) Provides a brief descriptive note about the address object. |
Screen |
(Optional) Restricts this address so that it applies to the selected Screen only. The default (All) means that all Screens recognize this object unless an object exists that has been specifically defined for a particular Screen and has the same name as the Screen for which it is defined. |
IP Address/Host Name |
Specifies the IP address you want to associate with the address object identified in the Name list. |
Lookup IP Address Button |
If SunScreen has access to DNS or NIS, lets you look up host addresses by host name. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Range associates a range of IP addresses with an address object name. For example, you can associate a name with a specified range of network IP addresses and use that name to filter traffic to all hosts on that network. FIGURE 5-18 shows the Address dialog box for adding a new range of addresses to the range subtype.
TABLE 5-18 describes the controls for the Address dialog box for new range.
Table 5-18 Controls for New Range Address Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name for the address object. |
Description |
(Optional) Provides a brief description about the address object. |
Screen |
(Optional) Restricts this range of addresses so that it applies to the selected Screen only. The default (All) means that all Screens recognize this object unless an object exists that has been specifically defined for a particular Screen and has the same name as the Screen for which it is defined. |
Starting IP Address |
Specifies the starting IP address in the range. |
Ending IP Address |
Specifies the ending IP address in the range. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Group is a way to group host addresses, address ranges and other address groups. By grouping addresses that use similar services and have similar actions, you can save time when creating rules. FIGURE 5-19 shows the Address dialog box for adding a new group to the group subtype.
Before you create an address group, you first define the address objects--single addresses, address ranges, or address groups--that you want to use in the address group.
TABLE 5-19 describes the controls for the Address dialog box for new group.
Table 5-19 Controls for the New Group Address Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name for the address object. |
Description |
(Optional) Provides a brief description about the address object. |
Screen |
(Optional) Restricts this address group so that it applies to the selected Screen only. The default (All) means that all Screens recognize this object unless an object exists that has been specifically defined for a particular Screen and has the same name as the Screen for which it is defined. |
Addresses |
Displays the addresses objects that can to be used to create the address group. |
Include List |
Specifies the address objects that are currently included in the address group. Use the Add or Remove buttons to modify the list. |
Exclude List |
Specifies the address objects that are excluded from the address group. For example, you can create an address group that includes all addresses except as specified in the Exclude List. Use the Add or Remove buttons to modify the list. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Use the certificate common object to configure the certificates for the Screen and for remote hosts that will communicate securely through the Screen.
Changes to the certificate object that pertain to loading into SKIP take effect immediately without having to be saved. You cannot use the Cancel Changes button to undo the changes you made. Changes to the certificate object as stored in the common objects do not take effect immediately and must be save and only take effect when the policy in which they are used is activated. For example, in adding a new certificate, (the certificate is created and loaded immediately into SKIP, but the name has not been saved as part of the common objects and must be saved. Renaming a certificate only affects the common objects and must be saved.
Generate screen certificate generates a certificate for the Screen. FIGURE 5-20 shows the Certificate dialog box.
TABLE 5-20 describes the controls for the Certificate dialog box for generate Screen certificate.
Table 5-20 Controls for the Certificate Dialog Box for Generate Screen Certificate
Control |
Description |
---|---|
Name |
Specifies a name for the certificate. |
Description |
(Optional) Provides a brief description about the certificate object. |
Screen |
Specifies the Screen that recognizes the certificate object. The default is All. |
Installed On |
(Optional) Specifies the Screen on which the certificate is generated. |
Radio buttons |
Specifies the strength of encryption that the Screen uses. |
Generate New Certificate |
Generates the certificate. The Certificate ID field displays the certificate's certificate ID. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Associate MKID, also called the certificate ID, assigns a name to a certificate that exists on another machine. Associate a certificate ID for encrypted communication between two screens or between a screen and an Administration Station. FIGURE 5-21 shows the Certificate dialog box for Associate MKID.
TABLE 5-21 describes the controls for the Certificate dialog box for associate MKID.
Table 5-21 Controls for Associate MKID Certificate Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name for the certificate ID object. |
Description |
(Optional) Provides a brief description about the MKID or certificate ID object. |
Screen |
Specifies which Screen recognizes the certificate ID object. The default is All. Specifying a Screen allows you to define packet-filtering rules that encrypt traffic between any two machines, not just between an Administration Station and a Screen. Specify the Screen only if you are using Centralized Management. A common object or policy rule applies to all Screens unless you choose a specific Screen. |
Installed On |
(Optional) Used only if you later remove this certificate object from the common objects. At that time, the SKIP identity that is installed on the Screen will be removed from the parameter. |
Certificate ID |
Specifies the certificate ID (hash value) for the certificate that you generated on the other system. |
Radio Buttons |
Specifies the strength of encryption that the Screen uses. |
Generate New Certificate |
Generates the certificate. The Certificate ID field displays the certificate's certificate ID. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Certificate group is a way to group single certificates that you want to use together. FIGURE 5-22 shows the Certificate dialog box for certificate group.
TABLE 5-22 describes the controls in the Certificate dialog box for certificate group.
Table 5-22 Controls for Certificate Group Dialog Box
Control |
Description |
---|---|
Name |
Specifies the name of the certificate object. |
Description |
(Optional) Provides a brief description about the certificate object. |
Screen |
Specifies which Screen recognizes the certificate object. |
Available Certificate List |
Identifies the certificates that do not belong to the certificate group. Refer toAppendix C, Services and State Engines for a description of services. |
Group Members List |
Identifies the certificates that belong to the certificate group. |
Add Button |
Moves the certificate selected in the Available Certificates List to the Group Members list, making the certificate a member of the specified service group. |
Remove Button |
Moves the certificate selected in the Group Members list to the Available Certificates list, removing the certificate from the specified certificate group. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
Use the screen common object to edit or add screen objects. You can edit miscellaneous Screen parameters, SNMP parameters, and mail Proxy parameters for screen objects that already exist. The algorithms used here are for centralized management only. FIGURE 5-23 shows the Screen dialog box.
In general, edit, rather than create, screen objects because they are automatically created during installation. Specifying a Screen enables you to define packet-filtering rules that encrypt traffic between any two machines, not just between an Administration Station and a Screen.
You must enter the name of the administrative interface of the Screen. The name must be the name of the administrative interface of the Screen as it is listed in the naming service or in the /etc/hosts file.
You must create a screen object if you are setting up:
A high availability (HA) cluster
A centralized management group (CMG)
You create or edit a screen object using the Miscellaneous, Primary/Secondary, SNMP, and Mail Proxy tabs in the Screen dialog box.
Figure 5-23 shows the Miscellaneous tab of the Screen dialog box and the parameters.
TABLE 5-23 describes the controls for the Miscellaneous tab of the Screen dialog box.
Table 5-23 Controls for the Miscellaneous Tab of the Screen Dialog Box
Control |
Description |
---|---|
Name |
Specifies a name for the screen object. |
Description |
(Optional) Provides a brief description of the screen object. |
Log Size |
Sets the size of the log in megabytes. |
Stealth Network |
Specifies the network address for interfaces that are used as stealth interfaces. Set this parameter if you have used the interface object to designate any Screen interfaces as stealth interfaces. |
Stealth Netmask |
Specifies the netmask for interfaces that are used as stealth interfaces. Set this parameter if you have used the interface object to designate any Screen interfaces as stealth interfaces. |
Allow Routing Traffic |
Specifies whether the Screen sends or receives updates to the routing table using the RIP protocol. |
Name Service |
Specifies the name service (DNS, NIS, Both, or None) that the Screen will use. |
Certificate Discovery |
Specifies whether the Screen uses Certificate Discovery. |
OK Button |
Stores the new or changed information and makes the Save Changes command button active. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The SNMP tab specifies the interval for SNMP timed status indicator traps and you can add, edit, or delete SNMP trap receivers.
Use the Action field of the packet-filtering Rule Definition dialog box to specify actions that generate SNMP alerts. The machine that receives SNMP trap alerts must not be a remote Administration Station.
FIGURE 5-24 shows the SNMP tab of the Screen dialog box.
TABLE 5-24 describes the controls for the SNMP tab on the Screen dialog box.
Table 5-24 Controls for the SNMP Tab of the Screen Dialog Box
The following SNMP traps are supported:
As an action on a packet that matches a particular rule
As a default drop action on an interface
Time status indicator traps
The first two types include the following data:
interface - The SunScreen network interface number on which the packet was received.
interfaceName - The SunScreen network interface name on which the packet was received.
errorReason - The reason the alert was generated. (See the sunscreen.mib file for a complete list of reasons.)
packetLength - The actual length of the packet in bytes.
lengthLogged - The length of the data logged in bytes.
packetData - The packet data.
The SNMP timed status indicator trap uses the same receivers database as other types of SNMP traps. There is only one database with a maximum of five receivers. These receivers are specified as variable to the screen object.
To activate the timed status indicator traps, set the SNMP timer interval.
The following data are in the SNMP timed status indicator. These data cannot be modified and new data cannot be added:
cpuUsage - Average percentile CPU usage
memoryAvail - Current swap space available, in kilobytes
swapIn - Current swap ins
swapOut - Current swap outs
scanRate - Current scan rate
tcpUsage - Current number TCP connections in the SunScreen state table
ipUsage - Current number IP connections in the SunScreen state table
udpUsage - Current number UDP connections in the SunScreen state table
rootUsage - Disk usage of the root partition, /
varUsage - Disk usage of the var partition, /var
etcUsage - Disk usage of the etc partition, /etc
tmpUsage - Disk usage at the tmp partition, /tmp
Only these SNMP traps are supported. No get or set operations are supported.
The Primary/Secondary tab associates a certificate object with a Screen that is part of an HA cluster or a CMG. The High Availability choice (No, Primary, or Secondary) and the Primary Name choice determine the role a Screen has within an HA cluster and centralized management group (CMG). The settings you choose determine which other controls on the Primary/Secondary tab are active. FIGURE 5-25 shows the Primary/Secondary tab of the Screen dialog box.
TABLE 5-25 describes the controls for the Primary/Secondary tab.
Table 5-25 Controls for the Primary/Secondary Tab of the Screen Dialog Box
The Mail Proxy tab allows adding, editing, or deleting domains known to distribute unsolicited electronic mail (spam). You can define spam domains if you use an SMTP proxy.
FIGURE 5-26 shows the Mail Proxy tab of the Screen dialog box.
TABLE 5-26 describes the controls for the Mail Proxy tab of the Screen dialog box.
Table 5-26 Controls for the Mail Proxy Tab of the Screen Dialog Box
The interface common object defines interfaces and specifies the actions a Screen should take when a packet that is received on that interface is rejected.
FIGURE 5-27 shows the Interface Definition dialog box.
TABLE 5-27 describes the controls for the Interface Definition dialog box.
Table 5-27 Controls for the Interface Definition Dialog Box
The proxy user common object contains the mapping information for users of SunScreen proxies. The proxy user object has the subtypes single and group. FTP and Telnet rules reference the proxy user entries.
The proxy user object is automatically saved when it is edited or a new proxy user object is added. Any changes apply immediately and cannot be reversed. The Save Changes button is greyed out to show that it is inactive.
The single dialog box defines a new single proxy user.
If you want to use the authentication feature of the FTP and Telnet proxies, you must define an authorized user before you add a proxy user.
FIGURE 5-28 shows the Proxy User dialog box for adding a new single proxy user.
TABLE 5-28 describes the controls for the Proxy User dialog box for a single proxy user.
Table 5-28 Controls for the Proxy User Dialog Box for a Single Proxy User
Control |
Description |
---|---|
Name |
Specifies the name of the proxy user. |
Description |
Adds a brief description of the proxy user. |
User Enabled |
Controls whether the user can log into the Screen. This function permits the administrator to refuse login privileges to someone who previously could log in without having to remove that person from the list of proxy users. |
Authorized User Name |
Selects the name of the authorized user to be used to authenticate this proxy user. Names in this list are generated when you add an authorized user object. If this field is empty, authorization is not required for this user. |
Proxy User Group |
Identifies the user group or groups to which the user belongs. If no groups are highlighted, user does not belong to any group. |
Backend User Name |
Identifies the user on a specific server. It defaults to the user name. |
OK Button |
Stores the new or changed information. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The group is a way to group proxy users that have the same privileges. Group proxy users to save time when creating rules. Before creating a proxy user group, define the proxy user objects for that proxy user group. Group proxy users to save time when creating rules.
FIGURE 5-29 shows the Proxy User dialog box for adding a new group.
TABLE 5-29 describes the controls for the Proxy User dialog box for grouping proxy users.
Table 5-29 Controls for the Proxy User Dialog Box for Grouping Proxy Users
Control |
Description |
---|---|
Name |
Specifies the name of the proxy group. |
Description |
Adds a brief description of the proxy group. |
User Enabled |
Controls whether this group of proxy users can log into the Screen's proxy. This function permits the administrator to refuse login privileges to a group that previously could log in without having to remove that group from the list of member users. |
Proxy Users |
Displays the proxy user objects that can to be used to create the member user list for the proxy user group. |
Member Users |
Specifies the proxy user objects that are currently included in the member users list of the proxy user group. Use the Add or Remove buttons to modify the member users list. |
OK Button |
Stores the new or changed information. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The common object authorized user specifies the users that are allowed to use the Telnet and FTP proxies.
The common object authorized user is automatically saved when it is edited or a new authorized user object is added. Any changes apply immediately and cannot be reversed. The Save Changes button is greyed out to show that it is inactive.
FIGURE 5-30 shows the User dialog box for an authorized user object. This same dialog box also appears for the administrative user object.
TABLE 5-30 describes the controls for the User dialog box for an authorized user object and for an administrative user object.
Table 5-30 Controls for the User Dialog Box for an Authorized User Object and an Administrative User Object
Control |
Description |
---|---|
User Name |
Specifies the login name of the authorized user. |
Description |
(Optional) Provides a brief description about the authorized user. |
User Enabled |
Controls whether the user can log into the Screen's proxy. This function permits the administrator to refuse login privileges to someone who previously could log in without having to remove that person from the list of proxy users. |
Password |
Specifies the login password for the authorized user. |
Retype Password |
Specifies the login password for the authorized user. The password typed in this field must exactly match the password you typed in the Password field. |
SecurID Name |
(Optional) Specifies the user's login name for SecurID authorization. |
Real Name |
(Optional) Identifies the real name of the authorized user. |
Contact Information |
(Optional) Displays information on how to contact the specified user. |
OK Button |
Stores the new or changed information. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The common object administrative user identifies the SunScreen administrators that have access to the Screen. This object refers to an authorized user; therefore, the administrative user object uses the same User dialog box that the authorized user object does.
FIGURE 4-32 shows the User dialog box for both an authorized user object and an administrative user object. TABLE 5-30 describes the controls for the User dialog box for both an authorized user object and an administrative user object.
The administrative user object is automatically saved when it is edited or a new administrative user object is added. Any changes apply immediately and cannot be reversed. The Save Changes button is greyed out to show that it is inactive.
After you create an administrative user object, you grant administrative access by creating a rule in the Administrative Access tab of the Policy Rules panel. The name that you create for the administrative user object is the same name that you use when you create administrative access rules.
The Jar signature common object identifies the Java archives (JARs) that you want the Screen to pass. JAR signatures apply only to the HTTP proxy.
The Jar signature object is automatically saved when it is edited or a new Jar signature object is added. Any changes apply immediately and cannot be reversed. The Save Changes button is greyed out to show that it is inactive.
FIGURE 5-31 shows the Jar Signature dialog box.
TABLE 5-31 describes the controls for the JAR signature dialog box.
Table 5-31 Controls for the Jar Signature Dialog Box
Control |
Description |
---|---|
Name |
Identifies the name of the certificate. |
Master Key ID |
Identifies the certificate ID. |
Load Jar Certificate Button |
Loads the certificate used to authenticate the Java archive. This procedure requires that your browser can allow local access to files. |
OK Button |
Stores the new or changed information. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The HTTP proxy can be set up to filter the Java applets based on the hash value of the Jar file.
The Jar hash object is automatically saved when it is edited or a new Jar hash object is added. Any changes apply immediately and cannot be reversed. The Save Changes button is greyed out to show that it is inactive.
FIGURE 5-32 shows the Jar Hash dialog box.
TABLE 5-32 describes the controls for the Jar hash dialog box.
Table 5-32 Controls for the Jar Hash Dialog Box
Control |
Description |
---|---|
Name |
Identifies the name of the certificate. |
Master Key ID |
Identifies the certificate ID. |
OK Button |
Stores the new or changed information. |
Cancel Button |
Cancels any new or changed information. |
Help Button |
Calls up the page of online help for this common object. |
The time common object specifies the time of day and the day of the week that a rule applies.
FIGURE 5-33 shows the Time dialog box.
TABLE 5-33 describes the controls in the Time dialog box.
Table 5-33 Controls for the Time Dialog Box
Policy rules govern data communication between systems--either another host, a network, or a remote computer and your network. You write and edit the rules that govern this communication in the Policy Rules panel. SunScreen uses ordered sets of rules to implement the security policies. Ordered set of rules means that, when a Screen receives a packet, it matches the packet against each rule in its active policy until it finds one that applies, and then takes the actions associated with that rule. Once a Screen finds an applicable rule for a packet, it ignores subsequent rules in its active policies.
Rules do not take effect until you save and activate the policy to which they belong by clicking the Save Changes button located above the Common Objects area, and the Activate button in the bottom area of the Policies List page. SunScreen sets up the basic security policy for name service lookups, Routing Information Protocol (RIP) packets, and SunScreen SKIP certificate discovery during installation. You can change these setting for each Screen by changing them in the screen object. You can use the Rules area on the Policy Rules page to specify how your Screen should filter other types of packets.
If the specified filtering rule fails to detect any issued certificate (key) encryption algorithms, it may display the following error message: An error occurred in detecting the Encryption algorithms. Please check if skipd process is running. If this occurs, restart the skipd process using the command skipd_restart.
Use the Policy Rules panel to add or modify a rule in a SunScreen policy. Clicking the Add New button (or selecting a policy and clicking the Edit button) opens the Policy Rules panel of the Policy List page.
To display the controls on a tab, click the tab header. TABLE 5-34 describes the tabs that are available from the Policy Rules panel.
Table 5-34 Policy Rules Panel Tabs
Tab |
Description |
---|---|
Packet Filtering |
Shows the packet filtering rule or rules. |
Administration Access |
Defines access rules for local administration and remote Administration Stations through the administration GUI or the command line (seeAppendix B, Command-Line Reference ). |
NAT (Network Address Translation) |
Maps private network addresses to public network addresses. |
VPN (Virtual Private Network) |
Maps name, address, certificate, issued certificate (key) algorithm, data algorithm, MAC algorithm, tunnel address, and description. |
The Packet Filtering tab displays a panel, shown in FIGURE 5-34, for configuring packet-filtering rules. Use packet filtering to control traffic using a particular service, traffic intended for a particular service, or traffic coming from a particular address.
SunScreen uses ordered packet filtering. The Screen assumes that the first rule that matches a packet is the rule that governs the disposition of the packet.
If the packet does not match any rule, the Screen uses its default action to determine the disposition of the packet.
The default action is set when defining the interfaces. A default action can be set for each interface, but not for the entire Screen. Typically, the default action is to only drop the packet. Other options are available. See "Interface".
TABLE 5-35 describes the available fields in the Packet Filtering tab.
Table 5-35 fields on the Packet Filtering Tab
Field |
Description |
---|---|
Rule Index |
(Optional) Assigns a number to a rule. When editing or adding a new rule, by default, this field displays a number one greater than the last rule (indicating this rule will be placed at the bottom of the list). If you type a lower number, the new rule is inserted into the specified position in the list, and the rules currently in the configuration are renumbered. |
Screen |
(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. |
Service |
Identifies the network service or service group to which this rule applies. Network services and service groups are described in Appendix C, Services and State Engines. |
Source |
The value to which the source address of a packet is compared. If an asterisk (*) appears, any source address meets the criteria of the rule. |
Destination |
The value to which the destination address of a packet is compared to determine whether the rule should apply. If an asterisk (*) appears, any destination address meets the criteria of the rule. |
Action |
Displays the action for the rule and permits setting the logging behavior. The options are:
|
Time |
Specifies the time of day for the rule. |
Description |
(Optional) Provides a brief description of the Administrative Access rule. |
To edit every field, except the Rule Index field, on the Packet Filtering tab, click it to display the choice list. The changes in the fields for a rule are reflected in the Common Objects panel, except for the Action field, which displays a dialog box for that rule and policy. Set the logging options for the action in the dialog box for that action. The particular dialog box that appears depends on the action selected.
FIGURE 5-35 shows the Policy Rule Index dialog box for the ALLOW action.
TABLE 5-36 describes the controls in Policy Rule Index dialog box for ALLOW action.
Table 5-36 Controls for ALLOW Action
PROXY_HTTP - Presents the dialog box shown in FIGURE 5-36.
TABLE 5-37 lists the flags for the HTTP proxy.
Table 5-37 HTTP Proxy Flags
PROXY_FTP - Presents the dialog box shown in FIGURE 5-37.
TABLE 5-38 lists the settings available for the flags for the FTP proxy.
Table 5-38 FTP Proxy Flags
Flag |
Function |
---|---|
GET |
Allow or disallow use of the FTP get command |
PUT |
Allow or disallow use of the FTP put command |
CHDIR |
Allow or disallow use of the FTP chdir command |
MKDIR |
Allow or disallow use of the FTP mkdir command |
RENAME |
Allow or disallow use of the FTP rename command |
REMOVE |
Allow or disallow use of the FTP remove_dir command |
DELETE |
Allow or disallow use of the FTP delete command |
PROXY USERS |
Choose the proxy user or the group of proxy users that you want for this rule. You can have only one proxy user or one group of proxy users in this field. You define these proxy users in the proxy user common object. |
PROXY_SMTP - Presents the dialog box shown in FIGURE 5-38.
The only flag for the SMTP proxy is to allow or disallow relayed mail.
PROXY_Telnet - Presents the dialog box shown in FIGURE 5-39.
For the PROXY USER field, type the proxy user or the group of proxy users that you want for this rule from the choice list. Specify only one proxy user or one group of proxy users in this field. Define these proxy users in the proxy user common object.
FIGURE 5-40 shows the Policy Rule Index dialog box for DENY action
TABLE 5-39 describes the controls in Policy Rule Index dialog box for DENY action.
Table 5-39 Controls for DENY Action
PROXY_HTTP - Presents the same dialog box shown in Figure 5-40 save that PROXY_HTTP appears in the PROXY field. There are no flags to set.
PROXY_FTP - Presents the dialog box shown in FIGURE 5-41.
PROXY_SMTP - Presents same dialog box shown in Figure 5-40 save that PROXY_SMTP appears in the PROXY field. There are no flags to set.
PROXY_Telnet - Presents the dialog box shown in FIGURE 5-42.
FIGURE 5-43 shows the Policy Rule Index dialog box for ENCRYPT action.
TABLE 5-40 describes the controls in Policy Rule Index dialog box for ENCRYPT action.
Table 5-40 Controls For ENCRYPT Action
FIGURE 5-44 shows the Policy Rule Index dialog box for SECURE action
TABLE 5-41 describes the controls in Policy Rule Index dialog box for SECURE action.
Table 5-41 Controls for SECURE Action
The Administrative Access rules tab shows access and encryption settings for local and remote administration. FIGURE 5-45 shows the Administrative Access tab. You set the values reflected on the two panels of this tab through the dialog box for each panel.
Use the Access Rules for GUI Local Administration dialog box, shown in FIGURE 5-46, to add or modify administrative access rules for local Administration Stations.
TABLE 5-42 describes the controls for the Local Access Rules dialog box.
Table 5-42 Controls for the Local Access Rules Dialog Box
Use the Remote Access Rules dialog box, shown in FIGURE 5-47, to add or modify administrative access rules for remote administration stations. The certificates used here must be of the same strength and type as those defined in the screen object. The entries here determine what type of remote Administration Station the Screen will accept. The Screen only uses the administration certificate field of the Screen object here.
TABLE 5-43 describes the controls for the Remote Access Rules dialog box.
Table 5-43 Controls for the Remote Access Rules Dialog Box
Use the Network Address Translation (NAT) tab, shown in FIGURE 5-48, to set up mapping rules to translate IP addresses according to specific rules. These rules interpret the source and destination of incoming IP packets, then translate either the apparent source or the intended destination, and send the packets on. You can map hosts, lists of addresses, ranges of addresses, or specific groups, depending on what you have configured in your SunScreen installation. See "Address" for information on defining addresses, ranges, or groups of addresses.
In general, you map addresses to:
Ensure that internal addresses appear as registered addresses on the Internet, or
Send traffic for a specific destination to a different, predetermined destination.
Translating both source and destination addresses is not possible--that is, making packets appear to come from a different IP address and directing the packets to a different destination simultaneously is not possible.
When defining NAT rules, the first rule (lowest number) that matches a packet is the one that applies, and no other rules can apply; define specific rules first, then broader cases later.
FIGURE 5-49 shows the NAT Definition dialog box.
TABLE 5-44 describes the controls for the NAT Definition dialog box.
Table 5-44 Controls for the NAT Dialog Box
When defining rules, remember that translating both source and destination addresses is not possible. Either translate packets so they appear to come from a different source, or translate packets so they go to a specific destination, but not both.
All static NAT rules are unidirectional--that is, they work precisely as defined, and are not interpreted as also applying in the reverse direction. For rules to apply in both directions, specify two different rules. For example, if you map the source address internalname.com to the destination publicip.com, you will also have to map the source publicip.com to the destination internalname.com to translate traffic in both directions.
The VPN tab, shown in FIGURE 5-50, allows you to define VPN gateways. Defining VPN gateways using this mechanism simplifies the creation of VPNs that include more than two gateways and are managed in a centralized management group.
Each gateway in this type of configuration must be able to connect to the other ones directly--without going through another gateway.
Setting up a VPN requires:
Choosing a name for the VPN.
Defining the VPN gateway.
Adding a rule for the VPN.
Use the VPN Definition box, shown in FIGURE 5-51, to define and edit VPN gateways.
TABLE 5-45 describes the controls in the VPN Definition dialog box for defining VPN gateways.
Table 5-45 Controls in the VPN Definition Dialog Box
Control |
Descriptions |
---|---|
Rule Index |
(Optional) Assigns a number to a rule. By default, this field displays a number one greater than the last rule (indicating this rule will be placed the end of the list). Typing a lower number inserts the new rule into the specified position in the list and renumbers the rules currently in the configuration. Rules take effect in order. |
Name |
Specifies the Name of the VPN to which this gateway belongs. Type the same name in the Name field for each gateway that is in the VPN. |
Address |
Specifies the machine to be included in the VPN. |
Certificate |
Specifies the name of the certificate for this VPN gateway. |
Key Algorithm |
Specifies the secret (key) algorithm the VPN uses. All gateways in the same VPN must use the same (key) algorithm. |
Data Algorithm |
Specifies the data algorithm the VPN uses. All gateways in the same VPN must use the same data algorithm. |
MAC Algorithm |
Specifies the MAC algorithm the VPN uses. All gateways in the same VPN must use the same MAC algorithm. |
Tunnel Address |
Specifies the destination address on the outer (unencrypted) IP packet to which tunnel packets are sent. |
Description |
(Optional) Provides a short description of the VPN gateway. |
Add New |
Allows adding a new VPN rule. |
Edit |
Allows you to edit the VPN rule that you highlighted in the NAT tab. |
Move |
Allows assigning a new rule index number for the rule highlighted in the NAT tab. |
Delete |
Deletes the access rule highlighted in the VPN tab. |
Help |
Displays the online help. |
After defining the gateways in a VPN, add a packet-filtering rule for this VPN. Add the packet-filtering rule using the Packet Filter tab.
When adding a packet-filtering rule for a VPN, leave the Screen field empty.
Specify SECURE for the packet-filtering action.
Type the name of the VPN in the VPN field.
Use any address in the VPN rules. Only addresses that interact with a VPN Gateway and the address specified in the rule will apply. The simplest rule uses * for the source and destination address. This rule allows encrypted use of the specified service for all addresses in the VPN.
The administration graphical user interface (GUI) performs almost all the normal administration tasks, but it does not support every option of the command line interface. The command line offers many options for each command. Appendix B, Command-Line Reference contains information about the command line interface.