nortel contivity client

110
Contivity VPN Client User and Administrator Guide for Mac OS X, Linux, Solaris Windows Mobile 2003 CE and SE Part Number 314455-3.5 Version 3.5 February 2007

Upload: robert

Post on 10-Apr-2015

2.008 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Nortel Contivity Client

Contivity VPN ClientUser and

Administrator Guidefor

Mac OS X, Linux, Solaris Windows Mobile 2003 CE and SE

Part Number 314455-3.5Version 3.5

February 2007

Page 2: Nortel Contivity Client

Copyright ©2007 by Apani Networks. All rights reserved.

This software or document (and the software described herein) is furnished under a license agreement between Apani Networks and the Licensee. The software may be used or copied only in accordance with the terms of the license agreement. The document may not be reproduced in whole or in part, except with the written permission of Apani Networks.

Product names mentioned in this document are trademarks or registered trademarks of their respective holders.

Published by:Nortel Networks Corporation8200 Dixie Road, Suite 100Brampton, Ontario L6T 5P6Canada

Nortel Networks600 Technology Park DriveBillerica, MA 01821-4130

Customer Support:Voice: 1-800-4NORTELWeb Page: http://www.nortel.com

For FAQs, follow the pathway:Customer Support FAQ Search (selection on left side of screen) Product family: Enterprise Data Product: Contivity

For Technical Documentation, follow the pathway:Customer Support Technical Documents Select a Product:Contivity 4000 VPN Switches

The Apani Networks site is an excellent source of information. You can use the Apani Knowledge Base to search for FAQs pertaining to the Contivity VPN Client.

1. http://support.apani.com/kb/

2. Select Contivity VPN Client in the Select a Product list.

3. Click Start Search.

Page 3: Nortel Contivity Client

Chapter 1. Getting Started 1

Organization of this Guide - - - - - - - - - - - - - - - - - - - - - - - - - - 2Conventions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3

Product Name - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3Cautionary Information - - - - - - - - - - - - - - - - - - - - - - - - - - 3Keyboard Conventions - - - - - - - - - - - - - - - - - - - - - - - - - - 3Typographical Conventions - - - - - - - - - - - - - - - - - - - - - - - 4Typographical Terminology - - - - - - - - - - - - - - - - - - - - - - - 4

System Requirements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5What’s New in Version 3.5? - - - - - - - - - - - - - - - - - - - - - - - - - 7Product Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8

The Nortel Networks Contivity Switch - - - - - - - - - - - - - - - 8The Contivity VPN Client - - - - - - - - - - - - - - - - - - - - - - - - 8

Chapter 2. Installing the Contivity VPN Client 11

Configuring the Contivity Switch - - - - - - - - - - - - - - - - - - - - - 13Initial Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - 13Nortel Networks Contivity Switch Configuration - - - - - - - 13Split Tunnel Inbound Port Filtering on Linux or UNIX Computers

15Pre-Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 17Installing the Contivity VPN Client for Macintosh OS X - - - - - 19Installing the Contivity VPN Client for Linux - - - - - - - - - - - - - 25

Installing with RPM Distribution on RedHat with GCC 3.X 26Installing with RPM Distribution on SUSE 9.2, 9.3, and 10.1 26Installing with TAR Distribution - - - - - - - - - - - - - - - - - - - 27

Installing the Contivity VPN Client for Solaris - - - - - - - - - - - - 28Requirements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 28Dynamic Routing - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 28Installing with TAR Distribution - - - - - - - - - - - - - - - - - - - 29Installation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 29

Contivity VPN Client iii

Page 4: Nortel Contivity Client

Installing the Contivity VPN Client for Windows Mobile - - - - - 31Windows Mobile Compatibility - - - - - - - - - - - - - - - - - - - 31Installation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 31Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 32

Registering the Contivity VPN Client Software - - - - - - - - - - - - 33New Registration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 33Entering a New Registration - - - - - - - - - - - - - - - - - - - - - - 34

Removing the Contivity VPN Client from Macintosh OS X - - - 36Removing the Contivity VPN Client from Linux - - - - - - - - - - - 38Removing the Contivity VPN Client from Solaris - - - - - - - - - - 40Removing the Contivity VPN Client from Windows CE - - - - - - 42Customizing User-Interface Graphics - - - - - - - - - - - - - - - - - - 43

Chapter 3. Configuring the Contivity VPN Client 45

User Interface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 47Launching the Contivity VPN Client - - - - - - - - - - - - - - - - - - - 48Certificate Management - - - - - - - - - - - - - - - - - - - - - - - - - - - 51

Importing a CA Certificate - - - - - - - - - - - - - - - - - - - - - - - 52Requesting a Certificate - - - - - - - - - - - - - - - - - - - - - - - - 53Importing a Certificate - - - - - - - - - - - - - - - - - - - - - - - - - 57Deleting a Certificate - - - - - - - - - - - - - - - - - - - - - - - - - - 59Viewing Certificate Details - - - - - - - - - - - - - - - - - - - - - - 60

Defining a New Connection Profile - - - - - - - - - - - - - - - - - - - 61Completing the Connection - - - - - - - - - - - - - - - - - - - - - - 70Editing a Connection Profile - - - - - - - - - - - - - - - - - - - - - 73

Connecting the Contivity VPN Client - - - - - - - - - - - - - - - - - - 74Selecting the Connection Profile - - - - - - - - - - - - - - - - - - 74Completing the Connection - - - - - - - - - - - - - - - - - - - - - - 80

Monitoring Connection History - - - - - - - - - - - - - - - - - - - - - - 82Connection Statistics - - - - - - - - - - - - - - - - - - - - - - - - - - 82

Setting Client Preferences - - - - - - - - - - - - - - - - - - - - - - - - - - 83Audit Controls - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 83Controlling Audit Information Logging - - - - - - - - - - - - - - 84Configuration Locking - - - - - - - - - - - - - - - - - - - - - - - - - 86

Viewing Audit Information - - - - - - - - - - - - - - - - - - - - - - - - - 90Disconnecting the Contivity VPN Client - - - - - - - - - - - - - - - - 91Command Line Interface - - - - - - - - - - - - - - - - - - - - - - - - - - 92

Glossary 95

Index 103

iv

Page 5: Nortel Contivity Client

1 Getting Started

Contents of this Chapter

Organization of this Guide - - - - - - - - - - - - - - - - - - - - - - - - - - 2Provides an introductory overview of Contivity VPN Client functions.

Conventions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3Explains the typographical and command conventions used in this guide.

System Requirements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5Lists the system requirements for installing a Contivity VPN Client.

What’s New in Version 3.5? - - - - - - - - - - - - - - - - - - - - - - - - - 7Provides a list of features that are new to Contivity VPN Client version 3.4.

Product Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8Provides a brief introduction to the Nortel Networks Contivity Switch and the Contivity VPN Client.

Contivity VPN Client 1

Page 6: Nortel Contivity Client

Chapter 1. Getting Started

Organization of this Guide

This guide is organized as follows:

Chapter 1, Getting Started—introduces the guide, explains the conventions used in the guide, lists system requirements for the Contivity VPN Client, and pro-vides an overview of the Contivity VPN Client.

Chapter 2, Installing the Contivity VPN Client—describes how to configure the Nortel Networks Con-tivity Switch for the Contivity VPN Client and how to install the Contivity VPN Client on supported systems.

Chapter 3, Configuring the Contivity VPN Client—a guide to the configuration and use of the Contivity VPN Client.

Glossary—provides brief definitions of security terms and terminology used in this guide.

2

Page 7: Nortel Contivity Client

Conventions

Conventions

Product Name Throughout most of this guide, the Contivity VPN Client is referred to simply as the Client and the Nortel Networks Contivity Switch is referred to simply as the Contivity Switch.

Cautionary Information

This guide presents several classes of cautionary informa-tion:

NOTE clarifies or identifies exceptions.

IMPORTANT calls your attention to information necessary to the proper installation and configuration of the Client.

CAUTION alerts you to situations that could result in unexpected or destructive results to data or software.

Keyboard Conventions

The following conventions are used in describing actions for you to take, methods of selecting and entering data, and operation of the system:

Computer dialog, code, file names, directory names, and screen instructions are represented by a mono-spaced font:

screen text display

Characters you enter on a command line are represented by bold mono-spaced type:

system text: your response

Optional text you enter on a command line is represented in mono-spaced italicized type. Where it is a term for a file name, directory name, path, or such, it is surrounded by angle brackets:

<filename>

The “|” character is used to signify one or the other:

<filename1>|<filename2>

Contivity VPN Client 3

Page 8: Nortel Contivity Client

Chapter 1. Getting Started

Typographical Conventions

This guide uses the following typographical conventions:

The names of on-screen buttons, checkboxes, option buttons, and keys are in Bold Text with Initial Caps.

The names of windows, dialog boxes, lists, window elements, and dialog box elements are in Bold Italics, capitalized the same as the item.

The names of menus and menu items are in Bold Text. Menu selections are shown as:Choose MenuName Item1 Item2This means to select Item1 in the MenuName menu and then select Item2 in the sub-menu.

Numbered items in a list describe steps in a procedure that must be followed in order. Bulleted items in a list are members of a set or parts of a whole that have no order or priority.

Typographical Terminology

Press—means to press a particular key or key combination. It does not imply also pressing the Enter key:

Press Tab

Key Combinations—two or more keys that must be pressed simultaneously are linked by a plus sign:

Press Ctrl+Alt+Del

Type—means to type text, usually in a text box or scroll box within a dialog box. It does not imply to press the Enter (or Return) key. It is usually followed by a step such as “Click OK” or “Click Continue.”

Enter—means to type text and press the Enter (or Return) key when the text has been typed.

4

Page 9: Nortel Contivity Client

System Requirements

System Requirements

A Contivity VPN Client installation requires the followingminimum configurations.

Mac OS XOperating System: Mac OS XSystem Version: 10.3 through 10.3.9, 10.4 through 10.4.7Power Macintosh or Intel MacCD-ROM Drive10 MB of free disk space128 MB of RAMEthernet card or dialup modemA web browser (Safari or Netscape are preferred.)

LinuxLinux for Intel x86 or equivalent processors, 32-bit onlyIntel-based Linux system (The Client will not work on a Sparc-based system.)Linux kernel 2.4.x*, and 2.6.x up to 2.6.18. Linux kernel 2.6.15-1.2054 will not work due to a kernel bug preventing proprietary license modules from loading correctly.Operating Systems:RedHat Enterprise Advanced Server 3.0 to 4Fedora Core 4, Core 5, and Core 6SUSE 9.2, 9.3, and 10.132 MB RAM (64 MB Recommended)30 MB of free disk spaceEthernet card or dialup modemCD-ROM DriveKernel source 2.4.x or 2.6.xA web browser (Netscape and Mozilla are preferred.)X-Window System

Contivity VPN Client 5

Page 10: Nortel Contivity Client

Chapter 1. Getting Started

* If the system is using the 2.4.x kernel, the kernel header’s 2.4.x package must be used. If the system is using the 2.6.x kernel, the kernel header’s 2.6.x package must be used.

SolarisSystem Version: 2.7 to 2.9Sun SPARC platformCD-ROM Drive12 MB of free disk space; 32 MB of RAMEthernet cardA web browser (Netscape and Hot Java are supported.)

Windows Mobile 2003 CE and SEA list of supported devices is available on the Apani website:

http://www.apani.com/vpn-clients/nortel-overview

Refer to the system requirements in the information section.

6

Page 11: Nortel Contivity Client

What’s New in Version 3.5?

What’s New in Version 3.5?

Added support for Fedora Core 5 and Core 6

Added support for SuSE Linux 10.1

Fixed dial-up support for Mac OS X

Contivity VPN Client 7

Page 12: Nortel Contivity Client

Chapter 1. Getting Started

Product Overview

The purpose of the Client is to provide tunneled, secure communications between the Client computer and the Contivity Switch across an IP network, including the Internet and the local area network (LAN).

The Nortel Networks Contivity Switch

The Contivity Switch is a single hardware device that pro-vides routing, firewall, bandwidth management, encryp-tion, authentication, and data integrity for secure tunneling across managed IP networks and the Internet. Contivity Switches are used to connect remote users, branch offices, suppliers, and customers with the cost and performance advantages of shared IP networks and the security and control inherent in private networks.

The Contivity VPN Client

The Client is an intelligent, autonomous software agent residing in the computer for which communication is to be secured. All communications security functions are per-formed using the rules supplied by the Contivity Switch.

When the Client is installed, the Contivity Switch (according to the policies set by the network administrator) sends a set of security policies for the Client to follow when exchanging data with the Contivity Switch. These rules determine:

(1) the algorithm to be used for ESP encryption;

(2) if ESP data integrity checking is to be performed and if so, the algorithm to use;

(3) if anti-replay protection is to be provided;

(4) if Authentication Header (AH) Integrity protection is to be applied

Once these instructions are received directly from the Con-tivity Switch, the Client stores these rules locally and fol-lows them autonomously when communicating with the

8

Page 13: Nortel Contivity Client

Product Overview

Contivity Switch. The user of the Client computer can con-tinue to operate as before except that all communications over the extranet or Internet are now protected with a layer of security as part of the network protocol.

Once connected to the Contivity Switch, the operation of the Client is transparent to the user and requires no user intervention.

Contivity VPN Client 9

Page 14: Nortel Contivity Client

10

Page 15: Nortel Contivity Client

2F Installing theContivity VPN Client

This chapter provides a list of required Contivity Switch settings to operate with the Contivity VPN Client, step-by-step instructions for the installation and removal of Contivity VPN Client software, and instructions for customizing the user-interface graphics on the Contivity VPN Client.

Contents of this Chapter

Configuring the Contivity Switch - - - - - - - - - - - - - - - - - - - - - - 13Provides instructions for configuring the Contivity Switch prior to installing the Client.

Pre-Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 17Provides a step-by-step procedure for pre-configuring Clients for mass deployment in a large installation.

Installing the Contivity VPN Client for Macintosh OS X - - - - - - 19Provides a step-by-step procedure for installing a Client on a Macintosh OS X system.

Installing the Contivity VPN Client for Linux - - - - - - - - - - - - - 25Provides a step-by-step procedure for installing a Client on a Linux system.

Installing the Contivity VPN Client for Solaris - - - - - - - - - - - - - 28Provides a step-by-step procedure for installing a Client on a Solaris system.

Installing the Contivity VPN Client for Windows Mobile - - - - - 31Provides a step-by-step procedure for installing a Client on a Windows CE system.

Contivity VPN Client 11

Page 16: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Registering the Contivity VPN Client Software - - - - - - - - - - - - 33Explains the procedure for receiving a license code and registering your Contivity VPN Client.

Removing the Contivity VPN Client from Macintosh OS X - - - - 36Provides a step-by-step procedure for removing the Client software and database from a Macintosh OS X.

Removing the Contivity VPN Client from Linux - - - - - - - - - - - 38Provides a step-by-step procedure for removing the Client software and database from a Linux system.

Removing the Contivity VPN Client from Solaris - - - - - - - - - - - 40Provides a step-by-step procedure for removing the Client software and database from a Solaris system.

Removing the Contivity VPN Client from Windows CE - - - - - - 42Provides a step-by-step procedure for removing the Client software from a Windows CE system.

Customizing User-Interface Graphics - - - - - - - - - - - - - - - - - - 43Explains how to customize areas of the Graphical User Interface with user-provided art.

12

Page 17: Nortel Contivity Client

Configuring the Contivity Switch

Configuring the Contivity Switch

The Contivity Switch must be configured for the Client prior to installing the Client. This is important because the Client accepts configuration settings that are sent down from the Contivity Switch during IKE negotiations.

Initial Configuration This document assumes that you have already configured the Contivity Switch with basic settings including identity, private and public addresses, etc. Be sure that IPSec is enabled.

Nortel Networks Contivity Switch Configuration

To work with the Client, the Contivity Switch’s IPSec settings must be set according to the values in the following table.

"Supported" means the Client supports all valid options for this setting.

"Don’t Care" means the Client ignores this feature, but it may be supported by other clients.

Parameter Setting(s) Allowed

Split Tunneling Supported*

Split Tunnel Networks Supported*

Client Selection

Allowed Clients Only Contivity Clients or Both Contivity and Non-Contivity

Allow undefined networks for non-Contivity clients

Supported

Authentication

Database Authentication (LDAP)

User Name and Password Supported

RSA Digital Signature Don’t Care

Contivity VPN Client 13

Page 18: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Default Server Certificate Supported

Radius Authentication

User Name and Password Supported

Axent Technologies Defender Don’t Care

RSA Security SecureID Supported

Encryption Supported (all settings except 40-bit DES)

Perfect Forward Secrecy Supported

Forced Logoff Supported (up to 23:59, or 00:00 for off)

Client Auto Connect Don’t Care

Banner Supported

Display Banner Supported

Client Screen Saver Password Required

Disabled (not supported)

Client Screen Saver Activation Time Don’t Care

Client Failover Tuning Supported

Allow Password Storage on Client Supported on Macintosh, Linux, and Windows CE 2003 only

Compression LZS Compression supported

IPSec NAT Traversal Supported

Rekey Timeout Supported

Rekey Data Count Supported

Domain Name Don’t Care

Primary DNS Supported

Secondary DNS Supported

Primary WINS Don’t Care

Secondary WINS Don’t Care

Client Policy Macintosh: Don’t CareLinux and UNIX: Supported

Parameter Setting(s) Allowed

14

Page 19: Nortel Contivity Client

Configuring the Contivity Switch

* If using split tunneling with the Client located on aLinux or a UNIX computer, please refer to the follow-ing section for port filtering requirements.

Split Tunnel Inbound Port Filtering on Linux or UNIX Computers

Linux and UNIX operating systems support multiple simulta-neous users. In order to help prevent unauthorized access to the private network, the client automatically blocks inbound access to TCP and UDP ports 0 through 1023 on the client's local (public) network when you are connected to the Con-tivity Switch with split tunneling enabled. Remote systems and users cannot use services on these Well Known Ports while the client is connected. Existing, active communications through inbound ports 0 through 1023 will be blocked as soon as the client connects to the Contivity Switch.

NOTE: All inbound and outbound access on the Client’s local (public) network is blocked when the client is connected and split tunneling is disabled.

When the Client is connected with split tunneling enabled, the Client permits outbound access through all ports. The Client also permits inbound access through ports 1024 and above. This allows the local user to take advantage of split tunneling to connect to remote servers using web browsers and other applications.

NOTE: You must enable at least one of the following user authentication options:LDAP with User Name and PasswordLDAP with Default Server CertificateRADIUS with User Name and PasswordRADIUS with RSA Security SecurID

Parameter Setting(s) Allowed

Contivity VPN Client 15

Page 20: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

CAUTION: The Client cannot protect the Client computer, tunnel, and the private networks behind the Contivity Switch from all possible remote attacks, even though it blocks inbound access through ports 0 through 1023 (Well Known Ports) when connected. Access through higher ports is still possible. (The X Window System uses ports 6000 through 6063, for example.) The system administrator of the Client computer must frequently check to ensure that services have not been inadvertently or malevolently enabled on higher ports.We highly recommend that you enable a host-based firewall on the Client computer.

The Contivity Switch administrator can enable inbound access on one or more ports 0 through 1023 by creating a Client Policy on the Contivity Switch. See "Client Policy" in the "Group and User Configuration" chapter of the Nortel Net-works Managing the Contivity Extranet Switch user guide. Keep in mind that creating a Client Policy blocks all inbound and outbound ports, except those specifically enabled by the Con-tivity Switch administrator.

16

Page 21: Nortel Contivity Client

Pre-Configuration

Pre-Configuration

A pre-configuration allows you to configure a Client and then install a number of Clients with the same configuration. This precludes individual users from having to enter license codes, group IDs, and preferences. The primary purpose of a pre-configuration is to simplify the installation of large numbers (100+) of Clients.

If you are performing a pre-configuration on platforms with different operating systems, it may be necessary to change the file format of the database files before distributing to the other operating systems.

After a Client has been pre-configured, when the user first launches the Client, the Product Registration window will not appear and the user is taken directly to the Connections window. There is one exception to this rule.

If you are pre-configuring a multi-seat license installation, you might want to require the input of the seat number by each Client. To do this, enter a 0 (zero) as the seat number in the configuration of the first Client. Thereafter, each Client, when launched, will present the Product Registration window and require the input of a seat number.

To enter a zero for the seat number of the first Client, you must first enter a valid seat number. Then complete and test the configuration. Prior to performing step 3, below, edit the registration (see “Entering a New Registration” on page 34) and change the Seat Number to zero.

To perform a pre-configuration:

1. Perform a manual installation of the Client.

2. Configure the Client, following the instructions provided in Chapter 3, Configuring the Contivity VPN Client.

3. Copy the prefs.db and eac.db files to the same directory as the installer. This step differs slightly with different platforms.

• For a Macintosh OS X installation:

Contivity VPN Client 17

Page 22: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Copy the .db files into the same directory as the nleac.pkg file.

• For a Linux tar installation:

a. Untar the directory created by the tar file.

b. Copy the .db files to the nleac-<version> directory.

c. Re-tar the directory.

• For a Linux RPM installation:

Copy the .db files into the/usr/src/<distributor>RPMS/i386 directory. This is the same directory where the binary package was placed during the rebuild for the first install.

• For a Solaris installation:

Copy the .db files to the directory containing the nleac package.

• For a Windows CE installation:

NOTE: A pre-configured Client installation for Windows CE is not supported.

4. Using either a web distribution or creating a CDROM, install the Clients.

Each Client, when installed, will be configured as the original.

18

Page 23: Nortel Contivity Client

Installing the Contivity VPN Client for Macintosh OS X

Installing the Contivity VPN Client for Macintosh OS X

NOTE: We recommend that you remove any previously-installed IPSec Client software before installing the Contivity VPN Client. Failure to do so might result in a failure of the installation.

NOTE: There are separate installers for the MacOS versions 10.3 (Panther) and 10.4 (Tiger).

To install the Client for Macintosh OS X, perform the fol-lowing steps:

1. Display the Contivity VPN Client Installation CD-ROM (or folder from electronic download).

Figure 2-1. MacintoshOS X Install CD-ROM

2. Double-click Install Disk Image (.dmg) file.

A screen appears informing you that the install program requires an administrator password.

Contivity VPN Client 19

Page 24: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Figure 2-2. MacintoshOS X Install

Authorization

3. Click on the lock image.

An authentication dialog box appears.

Figure 2-3. MacintoshOS X Install

Authentication

4. Type your user name in the Name text box.

5. Type your administrator password in the Password or phrase text box.

6. Click OK.

The Contivity VPN Client Install screen appears.

20

Page 25: Nortel Contivity Client

Installing the Contivity VPN Client for Macintosh OS X

Figure 2-4. MacintoshOS X Client Installer

Screen

7. Click Continue.

The Release Notes appear.

Figure 2-5. MacintoshOS X Client Release

Notes

8. Scroll to read the Read Me file, click Print to print the file, or click Save to write the file to another location.

9. Click Continue to continue with the installation.

Contivity VPN Client 21

Page 26: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

The Software License Agreement appears.

Figure 2-6. MacintoshOS X Software License

Agreement

10. Scroll to read the license agreement, click Print to print the file, or click Save to write the file to another location.

11. Click Continue to continue the installation.

A message appears asking you to agree to the terms of the license agreement.

Figure 2-7. MacintoshOS X Agreement to

Terms of License

12. Click Agree to continue.

You are prompted for a destination for the installation.

22

Page 27: Nortel Contivity Client

Installing the Contivity VPN Client for Macintosh OS X

Figure 2-8. MacintoshOS X Select Destination

13. Select the destination drive and click Continue.

You are prompted for the type of installation.

Figure 2-9. MacintoshOS X Type of Installation

Prompt

14. To accept Easy Installation (recommended), click Install.

Contivity VPN Client 23

Page 28: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

A message is displayed:

Installing this software requires you to restart your computer when the installation is done. Are you sure you want to install the software now?

15. Click Continue Installation to complete the installation.

Messages are displayed informing you of the progress of the installation.

At the completion of the installation, a message appears informing you that the software was successfully installed.

Figure 2-10. MacintoshOS X Installation

Successful

16. Click Restart.

Your computer will now reboot.

24

Page 29: Nortel Contivity Client

Installing the Contivity VPN Client for Linux

Installing the Contivity VPN Client for Linux

NOTE: You must be logged on as root to execute the commands that will install the Client on Linux.

NOTE: We recommend that you remove any previously-installed IPSec Client software before installing the Contivity VPN Client. Failure to do so might result in a failure of the installation.

The Contivity VPN Client is shipped on a multi-platform CD-ROM. Use the mount command to mount the CD, then install the Client using either the RedHat Package Manager (RPM) distribution or TAR distribution. Assuming that the CD is mounted at "/cdrom", the full path to the Linux package would be "/cdrom/linux/nleac."

NOTE: Commands are case sensitive. Those commands shown here in lower case must be typed in lower case.

Contivity VPN Client 25

Page 30: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Installing with RPM Distribution on RedHat with GCC 3.X

To install the Client on a Linux computer using RedHat with GCC 3 (RedHat Advanced Server 3.0 - 4 and Fedora Core 4, 5, and 6), use the following procedure:

The Client is kernel dependent. The package contains source code that needs to be rebuilt before being installed on the host. To rebuild the package, on the host where the Client is being installed, enter the following command:

rpmbuild --rebuild cvc_linux-rh-gcc3-[version]-0.src.rpm

This command rebuilds the Client and places the binary package in the /usr/src/redhat/RPMS/i386/ directory.

To install the package, enter the following command:

rpm -i /usr/src/redhat/RPMS/i386/cvc_linux-rh-gcc3-[version]-0.i386.rpm

Log out and log back in to the Linux computer before using the Client.

NOTE: A reboot may not always be necessary. We highly recommend, however, that you reboot the computer before using the Client.

Installing with RPM Distribution on SUSE 9.2, 9.3, and 10.1

To install the Client on a Linux computer using SUSE 9.2, 9.3, and10.1 use the following procedure:

The Client is kernel dependent. The package contains source code that needs to be rebuilt before being installed on the host. To rebuild the package, on the host where the Client is being installed, enter the following command:

rpmbuild --rebuild cvc_linux-suse-gcc3-[version]-0.src.rpm

This command rebuilds the Client and places the binary package in the /usr/src/packages/RPMS/i386/ directory.

26

Page 31: Nortel Contivity Client

Installing the Contivity VPN Client for Linux

To install the package, enter the following command:

rpm -i /usr/src/packages/RPMS/i386/cvc_linux-suse-gcc3-[version]-0.i386.rpm

Log out and log back in to the Linux computer before using the Client.

NOTE: A reboot may not always be necessary. We highly recommend, however, that you reboot the computer before using the Client.

Installing with TAR Distribution

To install the Client with TAR distribution, unTAR the files by entering the following command in the directory where the TAR file is located:

# tar -xvf <file_name>.tar

Enter the new directory created by the TAR file:

# cd <directory_name>

Rebuild the package on the host where the Client is being installed:

# make all

To install the package, enter the following command:

# make install

Reboot the Linux computer before using the Client.

NOTE: A reboot may not always be necessary. We highly recommend, however, that you reboot the computer before using the Client.

Contivity VPN Client 27

Page 32: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Installing the Contivity VPN Client for Solaris

NOTE: We recommend that you remove any previously-installed IPSec Client software before installing the Contivity VPN Client. Failure to do so might result in a failure of the installation.

Requirements In order to configure the Client and to access the on-line help, you must have a web browser installed on the host computer. The Contivity VPN Client prefers Netscape, but will also use the Sun HotJava browser.

NOTE: Commands are case sensitive. Those commands shown here in lower case must be typed in lower case.

If you install a browser after the Client, make sure that a file called "netscape" exists in the standard command path. That file should call or point to the installed browser. For example, if you install Netscape at "/opt/NSCPcom/netscape," create a symbolic link call "/usr/bin/netscape" or change your com-mand path to include "/opt/NSCPcom."

In order to install a Client on a Solaris system, you must have root or superuser permission.

Dynamic Routing The Client will not operate on a Solaris system that has dynamic routing enabled. If dynamic routing is enabled, you must disable it prior to installing the Client.

To disable dynamic routing:

Create a file named /etc/defaultrouter.

The contents of the file should be the IP address of the router.

28

Page 33: Nortel Contivity Client

Installing the Contivity VPN Client for Solaris

Installing with TAR Distribution

To install the Client with TAR distribution, unTAR the files by entering the following command in the directory where the TAR file is located:

tar -xvf <file_name>.tar

Enter the new directory created by the TAR file and proceed with step 3 of a normal installation (on the following page). The unTARed files are in the directory <directory_name>.

Installation To install the Client for Solaris:

1. Insert the CD into the drive.

The Solaris Volume Manager should mount the CD at /cdrom/cdrom0.

2. Change directory to the location of the Client installation software:

cd /cdrom/cdrom0/<path>

3. Enter the package installation command:

pkgadd -d . nleac

The version of the Client that is about to be installed is listed along with the first part of the User’s Sublicense Agreement. The User’s Sublicense Agreement is displayed in sections to allow it to be read in its entirety. Between each section, the following prompt is displayed:

Press RETURN to continue [?]

After the entire license agreement has been displayed, you are prompted to accept the agreement:

Do you accept the above license agreement [y, n, ?]

4. Press y to continue.

The installer checks the system to verify that the package can be installed and the install program provides you the opportunity to abort the installation.

Do you want to continue with the installation of <nleac> [y,n,?] y

Contivity VPN Client 29

Page 34: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

5. Press y to continue the installation. (Pressing n or any other key will abort the installation.)

Files from the CD are copied to the system. A series of messages appear, listing the process of file processing and ending with a message stating that the installation of the Client was successful.

6. Reboot the Solaris system to ensure proper operation and to start using the Client.

The installation of the Client is complete.

30

Page 35: Nortel Contivity Client

Installing the Contivity VPN Client for Windows Mobile

Installing the Contivity VPN Client for Windows Mobile

IMPORTANT: You must remove any previously-installed IPSec Client software before installing the Contivity VPN Client. Failure to do so will result in a failure of the installation and of the PDA device as well.

Windows Mobile Compatibility

This version of the Apani Contivity VPN Client is designed to be installed and run under Windows Mobile Pocket PC 2003 CE and SE.

Installation Installation can be done from a desktop computer using ActiveSync or directly on the PDA itself.

Installing from aDesktop:

Unzip the install package to a known location on the hard disk of the desktop machine.

Run the program setup.exe from that location.

This starts the desktop portion of the install. Accept the default for the location of the product on the PDA and observe that the desktop install starts the PDA install at the proper time and that it runs to completion. Reboot the PDA at this time.

NOTE: The Client requires installation in the default directory. If you choose an alternate location, the Client will not start.

Installing Directly: 1. Copy the .cab file to the PDA.

2. Double-click the .cab file.

The Client software is installed.

Contivity VPN Client 31

Page 36: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Configuration The PDA must be rebooted after installation for the client to function.

32

Page 37: Nortel Contivity Client

Registering the Contivity VPN Client Software

Registering the Contivity VPN Client Software

New Registration At the completion of installation when you first start the Client, the Product Registration window appears. You must enter your license code before any further operations can take place.If the Client has been pre-configured (see “Pre-Configuration” on page 17), the Product Registration window will not appear and the Connections window appears when the Client is first launched.An exception to that rule is: in a multi-seat license installation, if a 0 (zero) is entered as the seat number on the initial Client configuration, the Product Registration window will appear. In this case, you are prompted only for a Seat Number.

Figure 2-11. ProductRegistration Window

How and where you obtain the license code depends on where you purchased the Client.

Nortel Networks—If you purchased the Client from Nortel Networks, click the note at the bottom of the dialog box. You will be connected to the Apani Networks web site. A form is displayed which you fill out. When filling out the form, you will be asked to supply the registration code attached to the installation CD. Upon completion of the form, you will be given the license code.

Contivity VPN Client 33

Page 38: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Apani Networks—If you purchased the Client from Apani Networks, you were given the license code at the time of purchase.

1. Enter the license code in the License Code text box.

2. If this Client is one of a multi-seat license, type the assigned seat number for this client in the Seat Number text box.

3. Click Register.

A window appears with the message that the license code has been validated.

Figure 2-12. LicenseCode Validated

4. Click OK.

The Connections window appears and you can begin the configuration and operation of the Client as described in Chapter 3.

Entering a New Registration

If for any reason you need to re-enter the license code or other registration information:

1. In any of the windows (such as Connections, Monitor, Preferences, etc.), click Registration in the left column of the window to display the Product Registration window.

34

Page 39: Nortel Contivity Client

Registering the Contivity VPN Client Software

Figure 2-13. Re-Displaying the Product

Registration Window

2. Click Clear.

A confirmation prompt appears.

Figure 2-14. ConfirmingClear Registration

3. Click Yes, Clear Registration.

The current registration is cleared and the initial Product Registration window appears, as shown in Figure 2-11.

Contivity VPN Client 35

Page 40: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Removing the Contivity VPN Client from Macintosh OS X

IMPORTANT: This procedure completely removes the Client software from the Macintosh OS X computer. It should not be confused with the Disconnect procedure described in Chapter 3, Configuring the Contivity VPN Client.

IMPORTANT: The Client must be disconnected before the Client software is removed. Failure to do this will result in the Client computer being unable to access the public network. For the procedure to disconnect the Client, see Chapter 3, Configuring the Contivity VPN Client, “Disconnecting the Contivity VPN Client” on page 91.

To remove the Client from a Macintosh OS X computer:

1. Display the hard disk (HD) map.

2. Select Library Application Support Apani.

The Apani map appears.

Figure 2-15. MacintoshOS X Apani Screen

3. Double-click Uninstall.

36

Page 41: Nortel Contivity Client

Removing the Contivity VPN Client from Macintosh OS

The Uninstaller screen appears.

Figure 2-16. MacintoshOS X Uninstaller Screen

4. Click Uninstall.

A screen appears with a prompt to enter your Adminis-trator Password.

Figure 2-17. MacintoshOS X Uninstall Enter

Admin Password Prompt

5. Type the Administrator Password in the text box.

6. Click OK.

The uninstall process begins. A progress message is dis-played followed by a message that the uninstall was suc-cessful.

Figure 2-18. MacinstoshOS X Uninstall

Successful

7. Click OK.

Contivity VPN Client 37

Page 42: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Removing the Contivity VPN Client from Linux

IMPORTANT: This procedure completely removes the Client software from the Linux computer. It should not be confused with the Disconnect procedure described in Chapter 3, Configuring the Contivity VPN Client.

IMPORTANT: The Client must be disconnected before the Client software is removed. Failure to do this will result in the Client computer being unable to access the public network. For the procedure to disconnect the Client, see Chapter 3, Configuring the Contivity VPN Client, “Disconnecting the Contivity VPN Client” on page 91.

NOTE: You must be logged on as root to execute the command that will remove the Client from Linux.

To remove a Client from Linux, enter the following command:

If using RPM distribution:

Enter the following command to obtain the correct version number:

rpm -ga | grep cvc

The system will return the name of the installed rpm—something on the order of:

cvc_linux_rh_gcc<number>_<version_number>-0

Enter the command:

# rpm -e cvc_linux_gcc<number>_<version_number>-0

If using TAR distribution:

# cd <directory with unTARed installation files># make uninstall

Reboot the Linux host computer.

38

Page 43: Nortel Contivity Client

Removing the Contivity VPN Client from Linux

NOTE: If you want to save the configuration information, as for example in an upgrade or re-installation, save the file /etc/netlock/eac.db to another location where it will not be overwritten by another installation or upgrade. After installing the upgrade version, restore the eac.db file.

Contivity VPN Client 39

Page 44: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Removing the Contivity VPN Client from Solaris

IMPORTANT: This procedure completely removes the Client software from the Solaris computer. It should not be confused with the Disconnect procedure described in Chapter 3, Configuring the Contivity VPN Client.

IMPORTANT: The Client must be disconnected before the Client software is removed. Failure to do this will result in the Client computer being unable to access the public network. For the procedure to disconnect the Client, see Chapter 3, Configuring the Contivity VPN Client, “Disconnecting the Contivity VPN Client” on page 91.

To remove a Client from Solaris, perform the following steps:

1. Login as root.

2. At the UNIX prompt, enter:

pkgrm nleac

A screen message appears, listing the Solaris version number and requesting confirmation for removal of the Apani Extranet Access Client package.

The following package is currently installed:nleac Apani Extranet Access Client (sparc) (version number)Do you want to remove this package?

3. Enter y to continue removal of the Client package.

40

Page 45: Nortel Contivity Client

Removing the Contivity VPN Client from Solaris

A second request appears, confirming removal of the Client package.

## Removing installed package instance <nleac>This package contains scripts which will be executed with super-user permission during the process of removing this package.Do you want to continue the removal of this package (y,n,?,q)

4. Enter y to confirm removal of the Client.

A series of messages appear, describing the step-by-step removal process and finishing with the message that the removal of the Client was successful.

/etc/netlock <non-empty directory not removed>## Executing postremove script.Removing Agent log files.Removing Agent database files.Removing directory /etc.## Updating system information.Removal of <nleac> was successful.

5. Reboot the Solaris system to ensure proper operation.

The removal of the Client is now complete.

NOTE: If you want to save the configuration information, as for example in an upgrade or re-installation, save the file /etc/netlock/eac.db to another location where it will not be overwritten by another installation or upgrade. After installing the upgrade version, restore the eac.db file.

Contivity VPN Client 41

Page 46: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Removing the Contivity VPN Client from Windows CE

IMPORTANT: The Client must be disconnected before the Client software is removed. Failure to do this will result in the Client computer being unable to access the public network. For the procedure to disconnect the Client, see Chapter 3, Configuring the Contivity VPN Client, “Disconnecting the Contivity VPN Client” on page 91.

To remove the Client software from the PDA:

Select the Remove Programs applet under Settings.

42

Page 47: Nortel Contivity Client

Customizing User-Interface Graphics

Customizing User-Interface Graphics

The Client allows you to add customized graphic art to the various windows. With this feature, you can add graphics that are meaningful to your application, such as a logo or business unit representation. The graphics files packaged with the Client software are used if you do not specify customized graphics. The ability to customize user-interface graphics is applicable to all platforms that run Client software.

The graphics must be in CompuServe Bitmap (GIF) format. There are two graphics that can be customized (listed in the table below and illustrated in Figure 2-19). The graphics replace the logos for Nortel Networks and Apani Networks.

For othercomputers:

To add a customized graphic, create the graphic with the file name and size as shown in the following table. Copy or move the file to the /etc/netlock directory. The graphic will display in the GUI after the computer has been restarted.

The graphics files, their required sizes (in pixels), and their current applications are:

Examples of the customized displays are shown in Figure 2-19.

File Name Size Application

logo1.gif 100w X 32h Nortel Networks Logo

logo2.gif 72w X 32h Apani Networks Logo

Contivity VPN Client 43

Page 48: Nortel Contivity Client

Chapter 2. Installing the Contivity VPN Client

Figure 2-19. CustomizeGUI Display

logo1.gif logo2.gif

44

Page 49: Nortel Contivity Client

3 Configuring theContivity VPN Client

This chapter explains how to establish a connection between the Client and the Contivity Switch. It also explains how to monitor Client status, how to control the logging of Alert information, and how to disconnect and reconnect the Client.

Contents of this Chapter

User Interface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 47Discusses the two types of user interface provided by the Contivity VPN Client.

Launching the Contivity VPN Client - - - - - - - - - - - - - - - - - - - 48Explains the procedures for launching the Client after installation and license registration and prior to establishing a new connection.

Certificate Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - 51Explains the procedures for using digital certificates and for importing certificates and CA certificates.

Defining a New Connection Profile - - - - - - - - - - - - - - - - - - - - 61Explains the step-by-step manual procedures for defining a connection profile prior to establishing a new connection between the Contivity VPN Client and the Nortel Networks Contivity Switch.

Connecting the Contivity VPN Client - - - - - - - - - - - - - - - - - - - 74Explains the step-by-step procedure for establishing the connection between the Contivity VPN Client and the Contivity Switch using a defined connection

Contivity VPN Client 45

Page 50: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

profile or re-connecting the Client after it has been disconnected.

Monitoring Connection History - - - - - - - - - - - - - - - - - - - - - - 82Explains the procedure for viewing the status of the Contivity VPN Client connection.

Setting Client Preferences - - - - - - - - - - - - - - - - - - - - - - - - - - - 83Explains the procedures for controlling what audit and error information will be logged, controlling the maximum log file size, enabling or disabling the display of alerts information messages, and controlling configuration lockdown features.

Viewing Audit Information - - - - - - - - - - - - - - - - - - - - - - - - - - 90Explains the procedure for viewing the log files of audit and error information.

Disconnecting the Contivity VPN Client - - - - - - - - - - - - - - - - 91Explains the step-by-step procedure for disconnecting the Contivity VPN Client from the Contivity Switch.

Command Line Interface - - - - - - - - - - - - - - - - - - - - - - - - - - - 92Provides instructions for the operation of the Contivity VPN Client using the command line interface instead of the graphical user interface.

46

Page 51: Nortel Contivity Client

User Interface

User Interface

The Client provides a graphical user interface (GUI).

The instructions on the following pages illustrate the use of the GUI in the operation of the Client.

A command line interface is available for Client users on Mac-intosh OS X and Linux computers.

The command line interface does not duplicate the function-ality of the GUI. Its main purpose is to be used in shell scripts that connect to the Contivity Switch, allow limited operations such as file transfers, and disconnect.

The instructions for using the command line interface begin on page 92.

Contivity VPN Client 47

Page 52: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Launching the Contivity VPN Client

IMPORTANT: The operation and appearance of windows differ from one browser to another. The contents of the windows are the same. The illustrations that follow all show windows in a Safari browser on a Macintosh OS X system. Where procedural steps and descriptions are different from Macintosh to Linux and UNIX systems, those differences are noted in the text.

NOTE: If your TCP/IP configuration uses dialup PPP (Pass or Remote Access) or a similar non-continuous network connection, you must first connect to the network using your dialup tool before launching the Client.

After completion of a new installation and rebooting:

• on Mac OS X computers an Alias is created and labeled Apani Contivity VPN Client.url

• on Windows CE (PDA) computers, Contivity VPN Client selection is listed under the Start menu or the Start/Programs menu

• on other computers, a Apani icon is displayed on the front panel

Depending on the type of computer you have:

• On Macintosh OS X computers:

Click the Apani Contivity VPN Client icon.

The browser launches and the Connections window appears.

• On other computers (Linux, Solaris):

48

Page 53: Nortel Contivity Client

Launching the Contivity VPN Client

1. Click the expand arrow above the Apani icon on the Front Panel. Or, on the command line, enter the command:

start_cvc

A pop-up menu appears.

2. Choose Extranet Access Client.

The browser launches and the Connections window appears.

• On Windows CE computers:

1. Click Contivity VPN Client under the Start menu or the Start/Programs menu.

The browser launches and the Connections window appears.

NOTE: Another way to launch the Client is to load the browser and go to URL "http:/127.0.0.1:9161" or to "http:/localhost:9161."

Figure 3-20. Connections Window

To establish a new connection between the Client and the Contivity Switch, follow the procedures in “Defining a New Connection Profile” on page 61.

Contivity VPN Client 49

Page 54: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

If you are re-connecting to the Contivity Switch or if your connection has been pre-configured, follow the procedure in “Connecting the Contivity VPN Client” on page 74.

If you will be using Certificate Authorization to establish a connection, as opposed to User Name and Password or one of the Group Authentication options, follow the procedures in the next section to import and assign your personal certificate. After that, follow the procedures to establish a new connection or to re-connect, as appropriate.

50

Page 55: Nortel Contivity Client

Certificate Management

Certificate Management

The Client supports the use of X.509 Version 3 public key cer-tificates to bind public key values to the Client and the Contivity Switch. The binding is asserted by having a trusted Certificate Authority (CA) digitally sign each certificate. These digitally signed certificates (CA certificates) provide each Client and Contivity Switch with the confidence that the asso-ciated key is owned by the correct system with which secure communications will be established. The CA certificate is used to validate the certificate provided to the Client by the Con-tivity Switch when the Client establishes a connection with the Contivity Switch.

If you are using Certificate authorization to establish a connec-tion, as opposed to User Name and Password or one of the Group Authentication options, the personal certificate and CA certificate must be in place prior to establishing a connection. Use the procedures in this section to request a personal certifi-cate, to request a CA certificate, to import certificates, to view certificate details, to assign a certificate, and to delete a certificate.

Certificate management is performed with the Certificate Man-agement window.

To display the Certificate Management window, click Certifi-cates in the left column of the first Connections window (see Figure 3-20).

The Certificate Management window appears.

Contivity VPN Client 51

Page 56: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Figure 3-21. CertificateManagement Window

Before you can use your personal certificate, you must have imported a CA certificate. This is a signed certificate from your designated Certificate Authority (CA) that validates the certifi-cates issued by the CA.

Importing a CA Certificate

To import a CA certificate:

1. In the Certificate Management window, click CA Certs in the left column.

The Certificate Management window displays CA Certifi-cates.

Figure 3-22. CACertificate Management

No CA Certificates should be listed at this time.

2. Click Add.

The Certificate Management window appears.

52

Page 57: Nortel Contivity Client

Certificate Management

Figure 3-23. Add a CACertificate

3. Do one of the following to specify the CA certificate file:

• Type the full path of the file containing the CA certificate in the Filename text box and click Import.

• Go to the CA certificate file, cut and paste the certificate into the Certificate panel.

4. With either a file name listed or the CA certificate displayed, click Add.

The CA certificate is imported into the Client and will be used to validate personal certificates imported from now on.

Requesting a Certificate

To establish a connection using personal certificate authoriza-tion, you must have imported the certificate and added it to the certificate store. This is a four-part process:

• Generate the Certificate Signing Request (CSR)

• Submit the CSR to the CA

• Import the certificate from the CA

• Add the certificate to the certificate store

This section explains how to request a certificate by (1) gener-ating a request and (2) exporting the request. Importing and assigning the certificate is covered in the following section.

Contivity VPN Client 53

Page 58: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Generating aCertificate Request

To generate a Certificate Signing Request (CSR):

1. In the Certificate Management window (see Figure 3-21), click Requests in the left column.

The Certificate Management window displays Pending Certificate Requests (which at this point should display "No pending certificate requests.").

Figure 3-24. No PendingCertificate Requests

2. Click New.

The Certificate Signing Request form appears in the Certificate Management window.

54

Page 59: Nortel Contivity Client

Certificate Management

Figure 3-25. CertificateSigning Request Form

3. Type the required information in the appropriate text boxes. Type a 6-character passphrase in the Passphrase text box. Type the passphrase again. (You will need this passphrase for authorization when connecting the Client to the Contivity Switch.)

4. Click Generate Request.

The Certificate Management window lists the new request.

Figure 3-26. NewPending Certificate

Request

Contivity VPN Client 55

Page 60: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Exporting aCertificate Request

When the Certificate Signing Request (CSR) has been created, you can export it to the Certificate Authority (CA).

1. In the Certificate Management window shown inFigure 3-26, click Export.

The Certificate Management window displays the CSR export form.

Figure 3-27. Exportingthe CSR

The CSR is displayed in the CSR panel.

2. To export the CSR, you can either:

• Type a file name in the Filename text box where the CSR is to be sent and click Export.

• Or cut and paste the CSR from the display to the export location.

3. Click Continue.

The process of receiving the CSR and generating a new certifi-cate is a function of the CA. At the completion of the process, the new certificate will be in a location where you can then import it into the Client.

56

Page 61: Nortel Contivity Client

Certificate Management

Importing a Certificate

When a CSR is sent to the CA, a new certificate is generated. That certificate will be in a file or on a server, ready to be imported. The actual location and the method of generating the certificate varies depending on the particular CA being used.

IMPORTANT: The certificate can be in either binary or base-64 encoded format. If using base-64 encoded format, you should be aware of line endings if transfering files between Windows, UNIX, and Macintosh computers because all of those systems use different line endings.

To import a new certificate:

1. The Certificate Management window should be displayed with Local Certs selected.

Figure 3-28. CertificateManagement Window

2. Click Add.

The Certificate Management window displays a form for importing a personal certificate.

Contivity VPN Client 57

Page 62: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Figure 3-29. Importing aPersonal Certificate

3. Do one of the following to specify the certificate file:

• Type the full path of the file containing the certificate in the Filename text box and click Import.

• Go to the certificate file, cut and paste the certificate into the Certificate panel.

4. Click Add.

The Certificate Management window displays the certifi-cate information and notifies that the import was suc-cessful.

Figure 3-30. CertificateImported

The window shown above can contain more than one cer-tificate. You will select the certificate to use for your per-

58

Page 63: Nortel Contivity Client

Certificate Management

sonal certificate authorization. This is explained in the following section, "Establishing a New Connection."

5. Click Connections in the left column to close the Certificate Management window and return to the Connections window.

When you get to the step in establishing a new connection where you must give the name of the certificate, you can select from a pull-down list of certificates.

Deleting a Certificate

To delete a certificate:

1. If you are in the Connections window, click Certificates in the left column to display the Certificate Management window.

Figure 3-31. PersonalCertificates Listed

2. Select the certificate that you want to delete.

3. Click Delete.

Contivity VPN Client 59

Page 64: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Viewing Certificate Details

To view the details of a certificate:

1. In the Certificate Management window, click Local Certs to view the list of certificates currently imported into the Client (see Figure 3-31, above).

2. Select the certificate from the list.

3. Click Show.

The window displays a view of the certificate details.

Figure 3-32. CertificateDetails

4. Click Continue to close the window and return to the Certificate Management window.

60

Page 65: Nortel Contivity Client

Defining a New Connection Profile

Defining a New Connection Profile

When the Client is launched, the Connections window is dis-played. (If you have been importing a certificate or performing a similar function and are in the Certificate Management window, click Connections in the left column.)

The procedures described below are predicated on this being a new connection for which you are creating a configuration profile.

If a connection has already been defined, or if your system administrator has defined the connection and enabled configuration lockdown, follow the procedures described in “Connecting the Contivity VPN Client” on page 74.

If a connection has been previously established but you want to define a new configuration profile, follow the procedure described below.

Figure 3-33. ContivityVPN Client New

Connections Window

A connection profile is identified by a Connection Name. The profile specifies the user name and password (if required), the destination name or address, and the authentication method to be used to complete the connection. There may be numerous connection profiles from which to choose. It is also possible the the system administrator will pre-define a profile and then enable configuration lockdown in which case no selection of (or changes to) connection profiles can be made.

Contivity VPN Client 61

Page 66: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

To define a new connection profile:

1. Click New.

The page to define a new connection profile appears.

Figure 3-34. Define aNew Connection Profile

2. Type a name for the connection in the Connection Name text box.

3. Type the address of the Contivity Switch in the Destination text box.

The address can be either in decimal format (nnn.nnn.nnn.nnn) or a DNS Lookup address.

4. Click Next.

The page to select the method of authentication appears.

Figure 3-35. Selectingthe Authentication

Method

5. Select one of the three authentication methods.

6. Click Next.

62

Page 67: Nortel Contivity Client

Defining a New Connection Profile

7. How you proceed now depends upon the method of authentication that you selected in Step 5 and that will be used for this connection profile.

• If authorization will be only with a User Name and Password, continue with "User Name and Password Authentication below.

• If authorization will be by Certificate Authorization, continue with the procedure under “Digital Certificate Authentication” on page 65.

• If authorization will be by any of the optional Group Authentication methods (such as RADIUS) where you were given a Group ID and Password and possibly an RSA SecurID Token or Card, continue with the procedure under “Group Security Authentication” on page 66.

User Name andPassword

Authentication

If you selected User Name and Password Authentication in the page shown in Figure 3-35, a page for you to specify a user name appears.

Figure 3-36. Selecting aUser ID

1. Type a User ID in the User ID text box.

2. Select Prompt or leave unselected.

Contivity VPN Client 63

Page 68: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

If you select Prompt, you will be prompted to type in the User ID on the New Connections page, like this:

If you leave Prompt unselected, the User ID will appear on the New Connections page without prompting, as shown in Figure 3-37, below. Also, if you leave Prompt unselected, a username should not be entered with <connect_string> when using the command line interface.

3. Click Finish.

The Connections window appears with the connection pro-file for this connection displayed.

Figure 3-37. User Namein Connections Window

4. Type the password in the Password text box.

NOTE: The Save Password feature only works on Macintosh computers and is not available on Linux and UNIX systems.

You also may have the option of saving your password on the Client. If the Contivity Switch is configured to permit saving passwords, the Save Password check box will be active. Click this box if you want to save the password and not be prompted for it the next time you establish a con-nection.

5. Continue with the procedure described in “Completing the Connection” on page 70.

64

Page 69: Nortel Contivity Client

Defining a New Connection Profile

Digital CertificateAuthentication

If you selected Digital Certificate Authentication in the page shown in Figure 3-35, a page for you to specify a certificate appears.

Figure 3-38. Selecting aCertificate

1. Select a certificate from the Default Cert list.

If no certificates are listed, a certificate or certificates will have to be imported. See “Importing a Certificate” on page 57.

2. Select Prompt or leave unselected.

If you select Prompt, you will be prompted to type in the certificate name on the New Connections page, like this:

If you leave Prompt unselected, the certificate will appear on the New Connections page without prompting, as shown in Figure 3-48, below. Also, if you leave Prompt unselected, a username should not be entered with <connect_string> when using the command line interface.

3. Click Finish.

The Connections window appears with the connection pro-file for this connection displayed.

Contivity VPN Client 65

Page 70: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Figure 3-39. CertificateName in Connections

Window

4. Type the passphrase that you used when generating the Certificate Signing Request in the Passphrase text box.

The use of the passphrase protects the integrity of the signed digital certificate.

5. Continue with the procedure described in “Completing the Connection” on page 70.

Group SecurityAuthentication

If you selected Group Security Authentication in the page shown in Figure 3-40, a page appears for you to specify one of the Group Authentication Options.

Figure 3-40. SelectingGroup Authentication

Options

66

Page 71: Nortel Contivity Client

Defining a New Connection Profile

1. Type a User Name in the User Name text box.

2. Select Prompt or leave unselected.

If you leave Prompt unselected, the User Name will appear on the New Connections page without prompting, like this:

Also, if you leave Prompt unselected, a username should not be entered with <connect_string> when using the com-mand line interface.

If you select Prompt, you will be prompted to type in the User Name on the New Connections page, as shown in Figure 3-44, Figure 3-45, or Figure 3-43, below.

3. Type the Group ID in the Group ID text box.

4. Type a password in the Group Password text box.

5. Select the appropriate Group Authentication Option. You can select:

• If authentication will be by using only a Group ID and Password, select Group ID and Password.

• If authentication will be by a standard RSA SecurID Token, which may be a Key Fob or a Card, without a numeric pinpad (as shown in Figure 3-41), select Response Only Token.

• If authentication will be by an RSA SecurID PinPad Card having a numeric pinpad entry (as shown in Figure 3-42), select Response Only Token and select Passcode Display.

Figure 3-41. RSASecurID Token Key Fob

and Card

Contivity VPN Client 67

Page 72: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Figure 3-42. RSASecurID PinPad Card

6. Click Finish.

Depending on the type of Authentication option selected, the Connections window appears with the connection pro-file for this connection displayed.

• If you selected Group ID and Password, continue with the procedure under Group Password Authentication, below.

• If you selected Response Only Token, continue with the procedure under “Response Only Token” on page 69.

• If you selected Response Only Token and Passcode Display, continue with the procedure under “Response Only Token with Passcode” on page 70.

Group Password Authentication

After selecting Group Password Authentication and clicking Finish in the previous Connections window, the Group Password option appears in the Connections window.

Figure 3-43. GroupPassword Option in

Connections Window

68

Page 73: Nortel Contivity Client

Defining a New Connection Profile

7. Type the Group Password in the Password text box.

NOTE: The Save Password feature only works on Macintosh computers and is not available on Linux and UNIX systems.

You also may have the option of saving the password on the Client. If the Contivity Switch is configured to permit saving passwords, the Save Password check box will be active. Click this box if you want to save the password and not be prompted for it the next time you establish a con-nection.

8. Continue with the procedure described in “Completing the Connection” on page 70.

Response Only Token

After selecting Response Only Token and clicking Finish in the previous Connections window, the Response Token option appears in the Connections window.

Figure 3-44. ResponseToken Option in

Connections Window

9. Type the PIN given to you by the network administrator.

10. Type the Token number currently appearing on your RSA SecurID Card.

11. Continue with the procedure described in “Completing the Connection” on page 70.

Contivity VPN Client 69

Page 74: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Response Only Token with Passcode

After selecting Response Only Token and Passcode Dis-play followed by clicking Finish in the previous Connections window, the Response Token with Passcode option appears in the Connections window.

Figure 3-45. ResponseToken with Passcode

Option in ConnectionsWindow

12. Enter the PIN given to you by the network administrator on the pinpad of your RSA SecurID Card.

13. Read the Passcode number from your RSA SecurID Card and type that number in the Passcode field.

14. Continue with the procedure for completing the connection, described below.

Completing the Connection

After defining the authentication method, you were instructed to return to this point. Continue with the following steps to complete establishing a connection.

Depending on previous connections, you may have the option of disabling Keepalives. This would override the setting of the Contivity Switch. You can disable Keepalives at the Client, even if it has been enabled at the Contivity Switch. If Keepalives is disabled at the Contivity Switch, it cannot be enabled at the Client.

1. Click Connect.

70

Page 75: Nortel Contivity Client

Defining a New Connection Profile

The Client Monitor window appears and displays a mes-sage screen while the connection is being made.

Figure 3-46. Negotiationin Progress Message

When negotiations between the Client and the Contivity Switch complete successfully, the Contivity VPN Client window with connection values is replaced by the Client Monitor window (see Figure 3-47). The Negotiation Status value in the Client Monitor window displays Successful. The other values are updated according to the Contivity Switch IPSec settings.

If the connection is not established:

• The Contivity VPN Client window is displayed, and the message "Negotiation with switch failed" is displayed.

The Client Monitor window periodically refreshes the Duration, Bytes In/Out, and Frames In/Out values as long as the Client is connected to the Contivity Switch.

Figure 3-47. ClientMonitor Window

Contivity VPN Client 71

Page 76: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

NOTE: You do not have to keep the browser window open once you have completed a connection. You may close the browser window or quit the browser application. The connection will stay unchanged.

To access the Client again:

On Macintosh computers, click the Apani icon on the menu bar and choose an item from the drop-down menu.

On Macintosh OS X computers, click the Apani icon on the desktop.

On other computers, click the expand arrow above the Apani icon on the Front Panel and choose an item from the pop-up menu.

72

Page 77: Nortel Contivity Client

Defining a New Connection Profile

Editing a Connection Profile

Provision is made to edit a connection profile. The editing fea-ture can be disabled by the system administrator using the Configuration Lockdown facility. If the editing feature has been disabled, the Edit button will not appear in any of the configuration windows.

To edit settings in a configuration profile, click Edit in the part of the configuration that you want to edit.

A screen will appear that will be similar to the screen with which you set the current screen’s values while creating the current configuration profile. The editing screen, instead of having blank values as it did when creating the configuration profile, will show the current configuration values.

You can change any values by typing in a new value, for example, change a password or select a new certificate.

Click Next to move through the configuration screens in the same order as when creating the configuration profile.

If you change a value, such as changing the method of authen-tication, when you click Next, you will then have to continue through the remainder of the configuration procedure for the newly selected method. The values for successive screens would be blank, as in defining a new profile.

Contivity VPN Client 73

Page 78: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Connecting the Contivity VPN Client

The following procedure is for:

Re-connecting a Client to a Contivity Switch

Establishing a initial connection of a Client to a Contivity Switch when a configuration profile has previously been defined

Selecting the Connection Profile

To connect the Client:

1. If the browser is not already launched and the Connections window displayed, follow the procedures described in “Launching the Contivity VPN Client” on page 48, to launch the Client.

The Connections window is displayed.

The appearance and content of the window will vary depending upon the configuration profile defined for this Client and, if the Client has been previously connected, upon the configuration profile last used.

2. The current configuration profile name is shown in the Connection list. If you want to connect under a different connection profile, select the connection name in the Connection list.

If Java scripts have been enabled, the new profile features are displayed. If Java scripts have not been enabled, click Go after selecting the connection name.

3. The type of authentication for this connection is shown directly under the Connection list under the Type heading. This will show one of several values:

• User ID & Password—If this is shown as the authentication Type, continue with the procedure described in “User ID & Password Authentication” on page 75

• Digital Certificate—If this is shown as the authentication Type, continue with the procedure

74

Page 79: Nortel Contivity Client

Connecting the Contivity VPN Client

described in “Digital Certificate Authentication” on page 76.

• One of the Group Authentication options may be displayed:

• Group (Token)—If this is shown as the authentication Type, continue with the procedure described in “Response Token Authentication” on page 77.

• Group (Token/Passcode)—If this is shown as the authentication Type, continue with the procedure described in “Response Token with Passcode Authentication” on page 78.

• Group Password—If this is shown as the authentication Type, continue with the procedure described in “Group ID and Password Authentication” on page 79.

User ID & PasswordAuthentication

If User ID & Password is the method of authentication, the Connections window that first appears will look like the fol-lowing:

Figure 3-48. User ID andPasword Connections

Window

The User Name might be displayed or a selection text box will prompt to select a User Name from the scroll list. Whether the prompt appears depends on the setting when the configura-tion profile was defined.

Contivity VPN Client 75

Page 80: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

1. If you are being prompted, select your User Name from the selection list.

2. Type your password in the Password text box.

NOTE: The Save Password feature only works on Macintosh computers and is not available on Linux and UNIX systems.

You also may have the option of saving your password on the Client. If the Contivity Switch is configured to permit saving passwords, the Save Password check box will be active. Click this box if you want to save the password and not be prompted for it the next time you establish a con-nection.

3. Continue with the procedure described in “Completing the Connection” on page 80.

Digital CertificateAuthentication

If Digital Certificates is the method of authentication, the Con-nections window that first appears will look like the following:

Figure 3-49. DigitalCertificates Connections

Window

The Certificate name might be displayed or a selection text box will prompt to select a Certificate name from the scroll list. Whether the prompt appears depends on the setting when the configuration profile was defined.

1. If you are being prompted, select your Certificate from the selection list.

2. Type your passphrase in the Passphrase text box.

76

Page 81: Nortel Contivity Client

Connecting the Contivity VPN Client

This is the passphrase used to protect the integrity of the personal certificate. It is not the same as the User ID Pass-word.

3. Continue with the procedure described in “Completing the Connection” on page 80.

Response TokenAuthentication

If the Response Token is the method of authentication, the Connections window that first appears will look like the fol-lowing:

Figure 3-50. ResponseToken Connections

Window

The User Name might be displayed or a selection text box will prompt to select a User Name from the scroll list. Whether the prompt appears depends on the setting when the configura-tion profile was defined.

1. If you are being prompted, select your User Name from the selection list.

2. Type the PIN given to you by the network administrator.

3. Type the Token number currently appearing on your RSA SecurID Card (see Figure 3-41).

4. Continue with the procedure described in “Completing the Connection” on page 80.

Contivity VPN Client 77

Page 82: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Response Tokenwith Passcode

Authentication

If the Response Token with Passcode is the method of authen-tication, the Connections window that first appears will look like the following:

Figure 3-51. ResponseToken with Passcode

Option in ConnectionsWindow

The User Name might be displayed or a selection text box will prompt to select a User Name from the scroll list. Whether the prompt appears depends on the setting when the configura-tion profile was defined.

1. If you are being prompted, select your User Name from the selection list.

2. Enter the PIN given to you by the network administrator on the pinpad of your RSA SecurID Card (see Figure 3-42).

3. Read the Passcode number from your RSA SecurID Card and type that number in the Passcode field.

4. Continue with the procedure described in “Completing the Connection” on page 80.

78

Page 83: Nortel Contivity Client

Connecting the Contivity VPN Client

Group ID andPassword

Authentication

If Group ID and Password is the method of authentication, the Connections window that first appears will look like the fol-lowing:

Figure 3-52. GroupPassword Connections

Window

The User Name might be displayed or a selection text box will prompt to select a User Name from the scroll list. Whether the prompt appears depends on the setting when the configura-tion profile was defined.

1. If you are being prompted, select your User Name from the selection list.

2. Type the Group Password in the Password text box.

NOTE: The Save Password feature only works on Macintosh computers and is not available on Linux and UNIX systems.

You also may have the option of saving the password on the Client. If the Contivity Switch is configured to permit saving passwords, the Save Password check box will be active. Click this box if you want to save the password and not be prompted for it the next time you establish a con-nection.

3. Continue with the procedure described in "Completing the Connection" below.

Contivity VPN Client 79

Page 84: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Completing the Connection

Continue with the following steps to complete establishing a connection.

Depending on previous connections, you may have the option of disabling Keepalives. This would override the setting of the Contivity Switch. You can disable Keepalives at the Client, even if it has been enabled at the Contivity Switch. If Keepalives is disabled at the Contivity Switch, it cannot be enabled at the Client.

1. Click Connect.

The Client Monitor window appears and displays a mes-sage screen while the connection is being made.

Figure 3-53. Negotiationin Progress Message

When negotiations between the Client and the Contivity Switch complete successfully, the Contivity VPN Client window with connection values is replaced by the Client Monitor window (see Figure 3-47). The Negotiation Status value in the Client Monitor window displays Successful. The other values are updated according to the Contivity Switch IPSec settings.

If the connection is not established:

• The Contivity VPN Client window is displayed, and the message "Notification with switch failed" is displayed.

The Client Monitor window periodically refreshes the Duration, Bytes In/Out, and Frames In/Out values as long as the Client is connected to the Contivity Switch.

80

Page 85: Nortel Contivity Client

Connecting the Contivity VPN Client

Figure 3-54. ClientMonitor Window

NOTE: You do not have to keep the browser window open once you have completed a connection. You may close the browser window or quit the browser application. The connection will stay unchanged.

To access the Client again:

On Macintosh OS X computers, click the Apani icon on the desktop.

On other computers, click the expand arrow above the Apani icon on the Front Panel and choose an item from the pop-up menu.

Contivity VPN Client 81

Page 86: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Monitoring Connection History

Connection Statistics

The statistics for an established connection between the Client and the Contivity Switch are displayed in the Client Monitor window. The Client Monitor window appears as soon as a suc-cessful connection is established. The connection Duration, Bytes In/Out, and Frames In/Out values are periodically updated. To update those values in the window without waiting, click Refresh.

Figure 3-55. ClientMonitor Window

If the Client Monitor window is not displayed and you want to display it:

On Macintosh OS X computers:

Click the Apani Contivity VPN Client url on the desktop.

On other computers:

a. Click the expand arrow above the Apani icon on the Front Panel.

b. Choose Extranet Access Client in the pop-up menu.

The Client Monitor window appears.

82

Page 87: Nortel Contivity Client

Setting Client Preferences

Setting Client Preferences

The Client Preferences window allows you to control the log-ging of audit information, to display the log files of audit information, to set the size of the log files, to control the dis-play of audit messages, and to control configuration lockdown features.

Audit Controls The Client logs audit messages to a log file. You can view the log file at any time. Audit controls are used to select the types of audit messages that are written to the log file and to set the maximum size of the log file.

Four types of audit information may be logged. The four types of information are:

You can enable (or disable) log file archiving by selecting what (if any) information will be logged.

InformationType

Meaning

Security Audits Indicates a possible penetration attempt.

System Audits Indicates a failure of an operating system resource within the Client.

Protocol Audits Indicates a failure of the key management or encapsulation protocol.

Trace Audits Records actions provided by the key management and encapsulation protocols.

Contivity VPN Client 83

Page 88: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Controlling Audit Information Logging

Types of InformationLogged

To select the logging of Client audit information and to select which types of information should be logged:

1. In the Client Monitor window, click Preferences.

The Client Preferences window appears.

If the Client Monitor window is not displayed, you can also view Preferences by:

• On Macintosh computers:

Click the Apani icon on the menu bar and select Pref-erences in the drop-down menu.

• On other computers:

Click the expand arrow above the Apani icon on the Front Panel and select Preferences in the pop-up menu.

Figure 3-56. ClientPreferences Window

2. Select which of the four types of information you want to have logged. See “Audit Controls” on page 83.

3. Click Submit.

84

Page 89: Nortel Contivity Client

Setting Client Preferences

Changing the LogFile Size

The Client maintains audit information in a log file. When the size of the log file reaches a maximum value, it is archived in an old log file (overwriting the previous old log file, if it exists) and a new log file is created. An audit message is written at the top of the new log file. This mechanism prevents audit information from filling the disk. The amount of time it takes for the log file to reach its maximum allowed size depends on which audit types are logged and how often the Client is run. The default maximum log file is 1000 Kilobytes.

To choose the log file maximum size:

1. In the Client Monitor window, click Preferences.

The Client Preferences window appears (see Figure 3-56).

2. Type a value, in kilobytes, in Max Logfile Size to set the maximum log file size. The minimum setting is 10 Kb; the maximum setting is 10240 Kb.

3. Click Submit.

Contivity VPN Client 85

Page 90: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Configuration Locking

Configuration locking allows you to prevent a user from editing or deleting a connection profile, prevent a user from creating a new connection profile, and set a passphrase to pre-vent others from accessing configuration locking.

To set configuration locking:

1. In the Preferences window, click Configuration Locking.

The Configuration Locking window appears.

Figure 3-57. Configuration Locking Window

To Lock a configuration:

All of the current connection profiles are listed in the Configu-ration Locking window.

1. Select (check) those configurations that you want to lock.

2. Click Submit.

When a user selects a connection profile, the Edit and Delete buttons are not available.

86

Page 91: Nortel Contivity Client

Setting Client Preferences

Figure 3-58. Editing andDeleting of

Configuration Locked

To prevent a user from defining a new connection:

1. In the Configuration Locking window, leave Allow New Configs unselected.

Figure 3-59. Disallowinga New Configuration

2. Click Submit.

When a user selects a connection profile, the New button is not available.

Contivity VPN Client 87

Page 92: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Figure 3-60. Editing,Deleting, and Creating a

New ConfigurationLocked

Figure 3-60 shows a connection for which configuration locking has been applied and new connections are not allowed. If new connections are not allowed but the configura-tion has not been locked, the user will be able to edit and delete a connection profile but not create a new one, as shown in Figure 3-61.

Figure 3-61. Creating aNew Configuration

Prohibited

To set a passphrase for configuration locking:

1. In the Configuration Locking window, type a passphrase in the Passphrase text box.

2. Type the passphrase a second time in the Repeat text box.

88

Page 93: Nortel Contivity Client

Setting Client Preferences

Figure 3-62. Specifying aPassphrase

1. Click Submit.

The passphrase is set. The next time you click Configura-tion Locking in the Preferences window to set configura-tion locking, you will be prompted to enter the passphrase, as shown in Figure 3-63.

Figure 3-63. PassphrasePrompt for

Configuration Locking

When the Configuration Locking window appears, the pass-phrase is cleared. If you want to set the passphrase to limit access the next time, you must enter it again as in the above steps.

Contivity VPN Client 89

Page 94: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Viewing Audit Information

To view logged audit information:

In any of the Client windows (Connections, Client Monitor, Certificate Management, Preferences, etc.), click Logfiles in the left-hand column.

The log files are displayed in the Contivity VPN Client Log window.

Figure 3-64. Viewing Agent Status

2. When you are finished viewing the log files, close the Client Log window.

90

Page 95: Nortel Contivity Client

Disconnecting the Contivity VPN Client

Disconnecting the Contivity VPN Client

To disconnect the Client from the Contivity Switch:

1. The Client Monitor window may already be displayed. If it isn’t double click on the URL shortcut. The Client Monitor window appears.

• Or.:

a. Click the expand arrow above the Apani icon on the Front Panel.

b. Choose Extranet Access Client in the pop-up menu.

The Client Monitor window appears.

2. In the Client Monitor window, click Disconnect.

A status message is displayed informing you that the net-work session is no longer established.

Contivity VPN Client 91

Page 96: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Command Line Interface

On Macintosh OS X and Linux computers only, the Client pro-vides a command line interface. The command line interface does not duplicate the functionality of the graphical user inter-face (GUI). It does, however, provide a means of connecting to and disconnecting from the Contivity Switch.

The command line interface can be used in shell scripts to con-nect to the Contivity Switch, perform some functions such as file transfers, and disconnect.

IMPORTANT: You must be careful with the file permissions for scripts that invoke the command line utility. If you embed Contivity connection information, such as usernames and passwords, in scripts that invoke the command line utility, the information may be disclosed to other users who have read access to your scripts. There is no way to prevent users with Administrator (Mac OS X) or root privileges from reading your files.

If you use a single line command to invoke the command line utility, the connection information (including username/password) in the command can be seen by other users who run process monitoring utilities or have access to logs of precesses run on your computer.

The format of the command is:cvc [-c <connect_string>|-p|-q|-d|-h|-v]

The options are:

<connect_string> = connection:username:password

-c connect connects to the Contivity Switch using <connect_string>

92

Page 97: Nortel Contivity Client

Command Line Interface

-p prompt prompts for <connect_string> then connects to the Contivity Switch using <connect_string>

-q read reads <connect_string> from stdin then connects to the Contivity Switch using <connect_string>

-d disconnect disconnects from the Contivity Switch-h help displays a list of command options

-v version displays the current version and build number of the Client

IMPORTANT: When defining a connection profile (see “Defining a New Connection Profile” on page 61) if you leave Prompt unselected, you would not be promted for a User ID when establishing a connection using the GUI. The same default applies when using the command line interface. If Prompt is unselected, you should not enter a username as part of the <connect_string>. Doing so will cause an error. Without the username prompt, the <connect_string> should look like:connection::password. Note that two colons are still used.

NOTE: If the browser is open and the Client Window is displayed when you connect using the command line interface, the Client Window is not updated. You must first use the browser Refresh or Reload command to update the window.

Contivity VPN Client 93

Page 98: Nortel Contivity Client

Chapter 3. Configuring the Contivity VPN Client

Examples 1:# cvc -h

Contivity VPN Client Command Line InterfaceUsage: cvc [-c <connect string>] [-pqdvh] -c connect using specified connect string -p prompt for connect string and connect -q read connect string from stdin and connect connect string = connection:username:password -d disconnect -v display version -h help

Example 2:# cvc -c connection_name:username:password

Connects the Client to the Contivity Switch using the con-nection named in the connect string then passes the user name and password to the Contivity Switch to establish the Client-to-Contivity Switch connection.

Example 3:# cvc -d

Disconnects the Client from the Contivity Switch.

94

Page 99: Nortel Contivity Client

Glossary

AH See: Authentication Header.

Anti-ReplayProtection

A form of partial sequence integrity. It detects the arrival of duplicate IP packets (within a constrained window) and the arrival of IP packets out of sequence. See also: Integrity.

Authentication (1) The verification of the identity of a user, device or other entity in a computer system, usually as a prerequisite to allow-ing access to system resources.(2) The verification of data that have been stored, transmitted, or exposed to possible unauthorized modification.

AuthenticationHeader (AH)

An upper-level header located between the IP header and the payload within an IP packet. The AH includes an integrity check value (ICV) for the contents of the IP packet. The exact nature of the checksum depends upon the method selected during configuration. It is used to ensure the integrity of the entire IP packet, including both the payload and the IP header. The AH does not provide data confidentiality.

AuthenticationInformation

The public key information needed to authenticate a digital signature.

Authorization The granting of privileges, which includes the granting of access based on previously authorized access.

Compression See: Data Compression.

Confidentiality The protection of data from unauthorized disclosure. Usually, the unauthorized disclosure of application level data is the pri-mary concern, but the disclosure of the external characteristics of communication can also be a concern in some circumstances. The traffic flow confidentiality service addresses this latter con-

Contivity VPN Client 95

Page 100: Nortel Contivity Client

cern by concealing source and destination addresses, message length, or frequency of communication. In the IPSec context, using Encapsulating Security Payload (ESP), especially at a security gateway, can provide some level of traffic flow confi-dentiality.

Data Compression Encoding data to take up less storage space. Digital data is compressed by finding repeatable patterns of binary 0s and 1s. The more patterns can be found, the more the data can be com-pressed. Text can generally be compressed to about 40% of its original size, and graphics files from 20% to 90%. Data com-pression, as used in the Contivity VPN Client, is applied to the data before encryption.

Data EncryptionStandard (DES)

A standard encryption algorithm providing a high degree of protection. DES has a key length of 56 bits and meets U.S. gov-ernment approval for general export. See also: Triple DES.

Data Integrity The property that data has not been altered or destroyed in an unauthorized manner.

Data OriginAuthentication

The corroboration that the source of data received is as claimed.

Decryption See: Encryption.

Denial of Service Denotes attacks that do not cause a security violation as such, but harm the availability of a service. For example, someone sending a large number of forged packets to a host could degrade the performance of the host.

DES See: Data Encryption Standard.

Digital Signature Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).

Encapsulating SecurityPayload (ESP)

An OSI layer 3 connection or connectionless security protocol. In general, ESP provides for the following: peer entity authenti-cation, data origin authentication, access control services, con-nection confidentiality, connectionless confidentiality, traffic flow confidentiality, connection integrity without recovery, and connectionless integrity.

96

Page 101: Nortel Contivity Client

Glossary

Encapsulation The process of wrapping a packet, or some part of it, in a secu-rity envelope to provide the means for network devices to check the authentication of the sending node and the integrity of the data.

Encryption A security mechanism used for the transformation of data from an intelligible form (plaintext) into an unintelligible form (ciphertext) to provide confidentiality. The inverse transforma-tion process is termed decryption, but encryption is often used generically to refer to both processes.

Entity A device attached to a network and identified by an internet-work address, network number, or any combination. Compo-nents are comprised of one or more entities.

ESP See: Encapsulating Security Payload.

Extranet (1) A semi-permanent WAN connection over a public network between a corporation and its business associations, such as partners, customers, suppliers, and investors.(2) A Web site for existing customers rather than the general public. It can provide access to paid research, current invento-ries and internal databases, and virtually any information that is private and not published for everyone. An extranet uses the public Internet as its transmission system, but requires pass-words to gain access. See also: Internet, Intranet.

File Encryption File encryption software is specific to particular operating sys-tems, and does not protect data during remote logins or when updating records across a network.

Firewall (1) A combination of hardware and software that separates a LAN into two or more parts for security purposes.(2) A router or workstation with multiple network interfaces that controls and limits specific protocols, types of traffic within each protocol, types of services, and direction of the flow of information.

Host Any computer on a network that is a repository for services available to other computers on the network. It is quite com-mon to have one host machine provide several different ser-vices.

Contivity VPN Client 97

Page 102: Nortel Contivity Client

ICV See: Integrity Check Value.

Identity-BasedSecurity Policy

A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/ objects being accessed.

IKE See: Internet Key Exchange.

Integrity A security service ensuring that data modifications are detected.

Integrity Check Value(ICV)

A value that is derived by performing an algorithmic transfor-mation on the data unit for which data integrity services are provided. The ICV is sent with the protected data unit and is recalculated and compared by the receiver to detect data modi-fication.

Intrusion Detection A generic term for detecting network penetration attempts by observing activities on the network.

Internet (1) A large network made up of a number of smaller networks.(2) "The" Internet is made up of more than 100,000 intercon-nected networks in over 100 countries, comprised of commer-cial, academic and government networks. See also: Extranet, Intranet.

Internet Key Exchange(IKE)

A key management protocol that provides secure management and exchange of cryptographic keys between distant devices. IKE also provides a secure way to transmit keys. IKE uses pub-lic-key cryptography to create a secure association. That associ-ation is then used to perform a secure second public-key exchange, resulting in a symmetric key for encryption.

Intranet An inhouse Web site serving the employees of the enterprise. Although intranet pages may link to the Internet, an intranet is not a site accessed by the general public. The term has become so popular that it is often used to refer to any inhouse LAN and client/server system. See also: Extranet, Internet.

IPSec Internet Protocol Security. A set of protocols for authentica-tion, privacy, and data integrity that is transparent to the underlying network infrastructure and can be configured to run in two distinct modes—tunnel mode and transport mode.

98

Page 103: Nortel Contivity Client

Glossary

IPSec is implemented at the packet processing layer of network communication as opposed to earlier security approaches that were implemented at the application layer.IPSec provides two choices of security service: Authentication Header (AH), which allows authentication of the sender, and Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data, The spe-cific AH and ESP information is inserted into the packet as a header that follows the IP packet header. Separate key proto-cols, such as ISAKMP, can be selected. See also: Authentication, Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE), and ISAKMP

ISAKMP Internet Security Association and Key Management Protocol. The IPSec standard procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA) and for defining payloads for exchanging key generation and authenti-cation data. See also: Authentication, Internet Key Exchange (IKE), and IPSec.

IS Router Intermediate Services Router. A router, acting as a security gateway, usually placed between an intranet and the public network. See also: Router.

Key Generation Method of establishing key materials used in ciphering func-tions.

Key Management The generation, storage, distribution, deletion, archiving, and application of keys in accordance with a security policy.

LAN (Local Area Network) See Intranet.

Logging The process of maintaining a diary of the occurrence of security relevant events.

Logging Trail A chronological record of system activities that can be used to reconstruct and review the sequence of activities surrounding or leading to an operation, procedure, or event in a transaction from its inception to final results.

LZS An algorithm used for data compression. See also: Data Com-pression.

NAT See: Network Address Translator.

Contivity VPN Client 99

Page 104: Nortel Contivity Client

Network AddressTranslator (NAT)

Usually implemented in a firewall or router at the boundary between a company's intranet and the public Internet, main-taining a mapping between internal IP addresses and external public IP addresses. The internal addresses are not advertised outside of the intranet and can remain private (in the case of globally ambiguous addresses), or secret (in the case of glo-bally unique addresses).

Packet Filtering A method for determining how passing IP packets should be handled. Packet filtering is applied to all IP packets passing the IPSec engine. Packet filtering may modify the IP packet, pass it intact, or even drop it. See also: Port Filtering.

Perfect ForwardSecrecy

Forces the regeneration of keying material for each new Secu-rity Association (SA) and/or completely separates authentica-tion encryption from data encryption.

Port Filtering Allows communications to be limited to certain specific appli-cations.

Protocol A set of rules that governs the communication and exchange of data between system elements and that provides a basic level of service in a system.

Protocol Alerts An alert indicating a failure of the key management or encap-sulation protocol.

RC4 An encryption algorithm that provides solid, mid-range pro-tection using a variable-length encryption key. RC4/128 key length is 128 bits and is approved for limited export. RC4/40 key length is 40 bits and meets U.S. government standards for general export.

Repudiation Denial by one of the entities involved in a communication of having participated in all or part of the communication.

Router A special-purpose dedicated system that connects several net-works and makes decisions about which of several paths net-work traffic will take. The process may be repeated several times on a single packet by multiple routers until the packet is delivered to its final destination. To accomplish this, a routing protocol is used to gather information about the network, and algorithms based on several criteria known as “routing met-rics” choose the best route. See also: IS Router.

100

Page 105: Nortel Contivity Client

Glossary

Security Audit An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy, and procedures.

Security Audit Trail Data collected and potentially used in a security audit.

Security Controls Hardware, firmware, and software features within a system that restrict access of resources to authorized users, devices, or entities only.

Security Gateway An intermediate system acting as a communications interface between two networks. The internal subnetworks and hosts served by a security gateway are presumed to be trusted because of shared local security administration. The set of hosts and networks on the external side of the security gateway is viewed as not trusted or less trusted.

Security Policy The set of laws, rules, and practices that regulate how an orga-nization manages, protects, and distributes sensitive informa-tion.

Security Service The technology-based security functions provided by a net-working system. They are Authentication Services, Access Control Services, Confidentiality Services, Data Integrity Ser-vices, and Non-repudiation Services.

Subject An active entity, either a person, device, or process, that causes information to flow among objects or changes the system state.

Subnet A portion of a network, which may be a physically indepen-dent network, which shares a network address with other por-tions of the network and is distinguished by a subnet number. A subnet is to a network what a network is to an internet.

Subnet Number A part of the internet address that designates a subnet. It is ignored for the purposes of internet routing, but is used for intranet routing.

TCP Transmission Control Protocol. The major Internet transport protocol, which provides reliable, connection-oriented, full-duplex streams.

Contivity VPN Client 101

Page 106: Nortel Contivity Client

Threat Any circumstance or event which has the potential to cause harm to a system. Harm may arise in the form of destruction, modification, or disclosure of data, and/or denial of service.

Transformation A particular type of change applied to an IP packet. ESP encryption and AH integrity are types of transformations. A Security Association supplies the keys and other association-specific data to a transformation.

TransformationSequence

A set of transformations applied to an IP packet one after another. For example, an outgoing IP packet can be protected first with an ESP to ensure data confidentiality and higher level data integrity, and then with an AH to protect the integrity of the IP header carrying the IP packet. In this case, the transfor-mation sequence consists of an ESP transformation followed by an AH transformation. IPSec supports other types of transfor-mations, and therefore transformation sequences may occa-sionally be rather long, even 5 or 6 stages. However, more transformation sequences typically consist of just one or two steps.

Transport Mode As opposed to tunnel mode wherein the entire packet, includ-ing the IP header, is wrapped in the packet protection of a tun-nel and a new IP header is prepended to the packet, in transport mode, the IP header is sent in the normal, unencap-sulated format.

Triple DES A stronger iteration of the Data Encryption Standard, Triple DES is designed to resist focused, persistent attacks by well-financed, expert crypto-analysts. The U.S. government restricts Triple DES to domestic use and limited export.

Tunnel Mode Packet transmission wherein the entire packet, including the IP header, is wrapped in the packet protection of a tunnel and a new IP header is prepended to the packet.

UnsecuredCommunications

Unencrypted, non-firewalled, or unprotected communications between two network computers.

Virtual PrivateNetwork (VPN)

A temporary, secure connection over a public network, usually the Internet.

102

Page 107: Nortel Contivity Client

Index

Aaddress of Contivity Switch 62address, DNS 62allowing new configuraitons 87audit

information 90audit information

controlling 83logging 84viewing 90

authentication 13autoconnect 14

Bbulleted lists 4

CCertificate Authority

Netlock Manager 51third party 51

Certificate Management window 52certificates

managing 51

Clientdisconnecting 91discussion about 8log file archiving 83new connection 61preferences 83purpose 8re-connecting 74registering license code 33

Contivity VPN ClientSee Client

Client Log window 90command line interface 47commands

start_cvc 49compression 14configuration locking 86Configuration Locking window 86configuring the Contivity Switch 13connecting the Client 61connection profile 61Connections window 49Contivity Switch

address 62configuring 13description of 8purpose 8

controllingaudit information logging 84log file size 85

conventionskeyboard 3terminology 4typographical 3

customizing graphics 43

Contivity VPN Client 103

Page 108: Nortel Contivity Client

Ddatabase authentication 13disabling Keepalives 70, 80disconnecting the Client 91display banner 14DNS Lookup 62

Eencryption 14establishing a new connection 61

FFailover 14failover 14forced logoff 14

Ggraphical user interface (GUI) 47graphics files

headbar.gif 43graphics, customizing 43group ID 63

Hheadbar.gif file 43

Iinformation

status 90trace 83

installingClient for Linux 25Client for Macintosh OS X 19Client for Solaris 28Client for Windows Mobile 31

IPSecContivity Switch settings 13

KKeepalives, disabling 70, 80keyboard conventions 3

LLDAP 13license code 33Linux

installing Client on 25removing Client from 38system requirements 5

locking a configuration 86log file archiving for Clients 83

MMacintosh OS X

installing Client on 19removing Client from 36system requirements 5

managing the use of certificates 51

NNortel Contivity Switch

See Contivity Switchnumbered lists 4

104

Page 109: Nortel Contivity Client

Index

Oobtaining a license code 33operation of Client 8organization of document 2overview of product 8

Ppassword

with Group ID 63with user name 63

perfect forward secrecy 14PIN 69, 77Preferences window 84preferences, setting 83prevent defining a new connection profile 87prevent deleting a connection profile 86prevent editing of connection profile 86product overview 8product registration 33

Rradius authentication 14re-connecting the Client 74registration of Client 33removing

Client from Linux 38Client from Macintosh OS X 36Client from Solaris 40

requirements, system 5

Ssecurity policies 8setting configuration locking 86setting preferences 83Solaris

installing Client on 28removing Client from 40system requirements 6

split tunneling 13start_cvc command 49

statusinformation 90

supported settings 13system requirements

Linux 5Macintosh OS X 5Solaris 6

Ttimeout 14trace information 83tunneling 13typographical conventions 3typographical terminology 4

Uuser interface

command line 47graphical (GUI) 47

user name 63using certificates 51

Vviewing audit information 90

Wwindows

Certificate Management 52Client Log 90Configuration Locking 86Connections 49Preferences 84

Windows Mobileinstalling Client on 31

Contivity VPN Client 105

Page 110: Nortel Contivity Client

XX.509v3 certificates

format 51

106