[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::seal

Title:SEAL
Moderator:GALVIA::SMITH
Created:Mon Mar 21 1994
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:1989
Total number of notes:8209

1896.0. "AltaVista Firewall 97 Beta #2 , Announcement" by NETRIX::"[email protected]" (tim) Wed Mar 26 1997 10:21

==============================================================
AltaVista Firewall 97 - Beta Test Kit #2 Release Announcement
                      and Release Notes
==============================================================

Date:	  20-March-1997


AltaVista partners as well as other interested parties are invited to 
copy,install and test this release. 

This kit may be tested in internal lab or testbed configurations and
also in network configurations where a direct connection is made to the
Internet. When a direct Internet connection is used, the internal
network being protected using the firewall MUST not have ANY connection
to Digitals internal network without the necessary EXARC approvals
having first being obtained.

This document comprises the FT announcement and release notes for this
kit. It provides information on how to copy and install the kit, and
also how to report problems. A list of known problems is also included.

Any sites that already have a previous test kit are requested to upgrade their
installation to use this kit.

Have fun!

AltaVista Firewall Engineering

NOTE: Details of UNIX included below , Details of NT kit to follow

=============================================================

1. AltaVista Firewall 97 for Digital UNIX V3.2G and V4.0B

AltaVista Firewall Version T3.0 for Digital UNIX
Release Notes 

03 March 1997

These Release Notes contain the following sections:

    1. Kit Contents
    2. Installation
    3. Configuration
    4. GUI
    5. Authentication
    6. Administrator's Guide
    7. Problem reporting
    8. Performance and Tuning
    9. Changes and Enhancements since Version 2.1
    10. Applying patches from Digital UNIX


  Each section identifies known issues or problems, and provides a
  solution or workaround, if applicable. It is recommended that you
  review these notes carefully.

  1.. Kit Contents

  The field test fit comprises of the following components:

      - setld kit tar file archive (includes both firewall and tunnel
        server software)
      - compressed POSTSCRIPT Administrators Guide (not yet available
        please use on-line help where possible)
      - compressed POSTSCRIPT Digital Firewall for UNIX SPD
      - release notes (this document)
      - bug reporting information

 
  2.. Installation

  This section contains notes relating to the installation of the   
  AltaVista Firewall.

  2.1. Copying the kit

  This kit can be copied using FTP from the following host:

       ftp.wfa.digital.ie  

  [Please mail [email protected] for 
  location of kits]

      
  with the following filenames

       AFWU300-EFT.tar                 tar archive containing
                                       the kit
       AFWU300_EFT_installguide.ps.Z   Installation  Guide
       AFWU300_EFT_release_notes.lis   Release Notes

  When you have copied the kits components, you will need to uncompress
  the POSTSCRIPT documents prior to printing (# uncompress file.Z),
  and will also need to restore the setld product from the
  tar archive, e.g.

  # tar xvf AFWU300_EFT.tar 

  
  

  2.2. Product Installation
 
  The Installation Guide contains comprehensive instructions detailing
  the required hardware and software, and how to install the product.
  This kit will be released on CD from the SSB, and is intended to
  be installed immediately after the installation of the Digital UNIX
  Operating System.
  This field test kit is also available for download from
  [email protected] 
   
  The following steps should be taken to mimic installation from a CD.

  2.2.1. Install a supported version of Digital UNIX OS on your test
         system as directed by the Installation Guide.

  2.2.2. Using the netsetup utility, configure one of the interfaces on
         your test machine and set up a default route as appropriate.
         Restart the network.

  2.2.3. Create a temporary directory and using FTP copy the kit              
    components to your test machine.

  2.2.4. Using the netsetup utility again, delete the configuration for
  the interface, previously set up in step 2. Restart the network to
  ensure that you have deleted the network interface configuration
  correctly.

  2.2.5. Restore the setld kit from the compressed tar archive, and         
         proceed with the kit installation as directed in the 
         Installation Guide

  #tar xvf  AFWU300-EFT.tar
  #cd firewall
  #setld -l .


  Note: The AltaVista Firewall is a security product that requires a
  non-standard configuration of hardware and operating system
  software. It is important that you follow carefully the 
  pre-installation and installation instructions in the Installation
  Guide.

  2.2.6. Tunnel Installation, for Remote Management.
  Before installing the tunnel software (described in installation   guide)
you must install the tunnel server PAK.

  #cd tunnel
  #chmod +x temp-int-tunnel-server.pak
  #./temp-int-tunnel-server.pak
  #setld -l .  (to install tunnel software) 

  2.3. Logging into the GUI Web Browser 

  The Netscape[TM] web browser provides the GUI for the AltaVista   Firewall.
  When Netscape starts up, it displays a window with license   information.
  Click on the Accept button to accept the license and continue. The    
system now displays the Netscape Password login window. 
  The firewall is shipped
  with admin as the required user ID and first-time password. To log in     to
the browser, enter the following
   
      user ID: admin 
      password: admin 

  The system displays a login screen for the firewall main menu. To log     in
to the firewall system as administrator, enter the following
      user ID: admin
      password: admin


  2.4. File System Diagnosis 

  You can use the System Accounting Utilities optional software subset 
  (OSFACCT) to ease diagnosis of file system problems.  For example,     you
can use OSFACCT to diagnose disk space usage problems. You may        install
this optional software subset when installing the operating   system for the
firewall system.  Alternatively, you can install it at   a later time.

  3.. Configuration

  This section contains notes relating to the configuration of the 
  AltaVista Firewall.

  3.1.. Mail Configuration 

  The firewall system cannot be configured as a mail hub system or central
  mail server (that is the machine that handles mail for the internal
  domain). An internal system must be used to perform this role. The
  firewall system relays incoming mail to the mail hub system for the
  internal domain. The name service for the internal domain must be
  configured so that appropriate MX records exist to direct mail for the
  internal domain to the mail hub system.  The mail hub system must be
  configured with suitable aliases to pass mail for internal users to the
  appropriate internal destination. You must also configure the mail hub
  system to send external mail (that is, mail destined for outside the
  internal domain) to the firewall.  The firewall distributes this mail to
  the appropriate external destination.

  3.2.. Switching on the Mail Gateway  

  For security reasons, when you install the AltaVista Firewall, the mail
  gateway is disabled.  To allow the firewall system to deliver mail, you
  must switch the mail gateway on using the Managing the Firewall menu
  item.   To allow the firewall system to deliver mail, you must switch the
  mail gateway on using the Managing the Firewall menu item.

  3.3.. Mail Sent to the root Account

  When mail is sent to the root account on the firewall system (for
  example, reports and alarm notifications), the mail is automatically
  delivered to the root account on the mail hub system. 


  3.4.. Application Gateway Configuration

  For security reasons, when you install the AltaVista Firewall, all 
  application gateways are disabled. To enable a gateway, you must specify
  a security policy for the gateway using the Application Gateways menu 
  item, and also switch the gateway on using the Managing the Firewall 
  menu item.

  3.5.. DNS Configuration
  
  Initial configuration of DNS sets up an invalid entry for the host name.
  This must be modified. To modify, select DNS from "Managing The Firewall"
  section of the Main Menu and add DNS entries as required. You can also
  search for DNS entries to check that they have been added correctly.

  3.6.. Save Firewall Configuration
   
  This section is not included in this Field Test version

  3.7.. Firewall within a firewall
   
  If the firewall is behind another firewall, non-local DNS does not
  resolve because the query packets (UDP Port 53) can't escape through the
  outer firewall. A forwarders entry must be added to
  /usr/dfws/named.red/named.boot
  
  for example,
  forwarders outside-firewall-IP-address
  slave

  The internal name server daemon must then be restarted.
  
  

  4.. GUI

  This section contains notes relating to the AltaVista Firewall GUI.

  4.1.."Document has no data" error 

  The Netscape Web browser may display the following error message in  a
  dialog box while performing firewall configuration and administration 
  tasks:

  Document has no data

  Click OK to dismiss the dialog box. Then click Reload to reload the page 
  correctly. If the dialog box is displayed again, repeat these steps.

  4.2.. Window Border Disappears When Window is Moved

  Depending on the severity status of the firewall system, the border  of a
  window that is being moved may disappear. This may make it difficult  to
  position the window being moved. Modify the window border color to
  increase contrast.

  4.3.. Error Opening a Directory During Summary Report Generation

  If you generate a Summary Report for a period for which data logs  do not
  exist, an error message appears, as follows:
                                     
  Error: OPENDIR: cannot open directory '/var/adm/syslog/logs/date': No
  such file or directory 

  The date  indicates the days for which log data is missing. You may 
  ignore these messages when the firewall was not operational for the 
  report period.


  4.4.. Firewall Status and Alarm Settings

  When you install the AltaVista Firewall, the alarm system is configured 
  to the default alarm configuration. This default configuration is very 
  sensitive. This may result in the firewall changing state shortly after 
  deployment or during initial testing.  It is recommended that you become
  familiar with the alarm configurations  for the gateways you are
  operating.  If a gateway is not functioning as expected, check the
  current status  of the gateway using the Select Individual Services menu
  item in the  Firewall Operation Control menu. The gateway may have been
  disabled as  a result of a gateway event for which an alarm was
  generated.

  5.. Authentication

  5.1.. Authenticated FTP does not ask the user for a password, making
  it impossible for the user to log in.

  5.2.. CRYPTOCard authentication is not operating correctly.

  6.. Administrator's Guide

  The Administrator's Guide has not been updated to include information 
  on all of the new features provided with this version of the
  AltaVista Firewall for Digital UNIX. Use the online help provided 
  with the AltaVista Firewall rather than the Administrator's Guide 
  for information on the following topics:

  Generic Application Gateway
  WWW Application Gateway
  RealAudio Application Gateway

  There is currently no online help for the following topics:
  
  DNS
  Multiple Administrators


  7.. Problem Reporting

  Problems should be reported against both the product implementation
  and the associated documentation.

  Once you have completed the installation, you should use the
  builtin bug repoting script that is available as an option
  from the Firewall Main Menu. You will need to have mail set up 
  in your test environment for this to operate correctly.

  If you do not have mail setup, you can mail bug reports to
  [email protected]

  Please identify the following:
     - kit release, 
     - assign a priority to the bug,
     - provide a brief and detailed description of the problem, 
     - how the problem may be repeated
  
  Please provide sufficient information to avoid the need for followup
  from AltaVista Firewall Engineering.



  8. Performance and Tuning

  This section contains notes on how to tune Digital UNIX to improve  the
  performance of your AltaVista Firewall system.

  8.1. Digital UNIX Operating System

  You can improve the performance of the AltaVista Firewall by up to 15%, 
  in terms of a reduced number of dropped connections and an increased 
  throughput, if you upgrade your system to run Digital UNIX Version 3.2G,
  4.0A, or V4.0B. It is strongly recommended that you perform this upgrade. 
  For information on how to upgrade your version of Digital UNIX, see the 
  Digital UNIX documentation set. For information on how to reinstall the 
  AltaVista Firewall after upgrading the operating system, see the
  AltaVista  Firewall Installation Guide for Digital UNIX.

  8.2. Tuning Digital UNIX to Resist SYN Flood Attacks

  After you perform the operating system upgrade recommended in 5.1,  you
  can further tune your system to manage problems involving denial of
  service, such as SYN flood attacks.  In a SYN flood attack, a remote host
  sends you a SYN packet with a  nonexistent source address. This uses a
  connection slot while your  host attempts to acknowledge the connection
  to the non-existent source.  The number of slots available and the amount
  of time a slot remains  allocated are specified by the following kernel
  parameters:

  somaxconn 
  Sets the maximum number of pending requests allowed to wait on
  a  listening socket. The default value for Versions 3.2G and 4.0 is 1024. 
  The maximum value is 32767.

  sominconn
  Sets the minimum number of pending connections allowed on a 
  listening socket. When a user process calls listen with a backlog 
  less than sominconn, the backlog will be set to sominconn. The 
  sominconn parameter overrides somaxconn. The default value for 
  Versions 3.2G and 4.0 is 1. The maximum value is 32767.

  tcp_keepinit
  This is the amount of time a partially established connection remains 
  on the listen queue before it times out (for example, if a client 
  sends a SYN but never answers our SYN/ACK).
  Partially established connections use slots on the listen queue. If 
  this queue starts to fill with connections in SYN_RCVD state, you can 
  decrease the value of the tcp_keepinit parameter to make those 
  partial connects time out sooner. You specify the parameter in half-
  second units. The default value is 150 (that is, 75 seconds).


  Note: Be very careful when you modify this parameter, as legitimate
  clients  may take some time to respond to SYN/ACK.
	

  To determine the network load on your system while the machine is 
  operating in its maximum load condition (that is, when it is receiving 
  the maximum rate of new connections), use the following command:
 
# /usr/sbin/netstat -An | grep SYN_RCVD

  The output from this command may have many lines of the following 
  form:

  20e4500 tcp   0  0  10.222.222.12.9996 22.222.222.123.194 SYN_RCVD

  If so, your system may have a problem receiving connections and you 
  should tune your system accordingly. You can tune the kernel on your 
  computer by modifying the values of three kernel variables described 
  above as follows:

  You can modify the somaxconn and sominconn parameters using the 
  sysconfig command to increase the number of available slots for 
  partially established connections. You can set these parameters  to a
  maximum value of 32767.  It is recommended that you assign the sominconn
  and somaxconn  parameters the same values. This increases the number of
  slots  available, and therefore significantly improves the ability of 
  your system to continue to serve all connection requests from  valid
  clients. For more information on the sysconfig command, see the man pages
  for sysconfig and sysconfigdb.

  You can modify the tcp_keepinit using the sysconfig command to  decrease
  the amount of time a partially established connection  remains on the
  listen queue before it times out. 

  It is strongly recommended that you have some knowledge of the 
  characteristics of the network before you decrease this parameter.  Be
  very careful when you modify this parameter, as legitimate clients  may
  take some time to respond to SYN/ACK due to network latency.

  8.3. Tuning Digital UNIX to Improve Web Proxy Performance

  You can improve the web proxy performance by increasing the lookup  speed
  for the TCP connection table. You can do this by increasing  the size of
  the hashlist for the TCP inpcb lookup table. To do this,  you modify the
  following kernel parameter:

  tcbhashsize
  The number of hash buckets used for the TCP connection  
  table used in the kernel. The default value is 32. This value 
  should be specified as a power of 2 and may be set to a 
  maximum of 1024.


  You can modify the value of tcbhashsize by patching the kernel 
  using dbx. The following steps can be used on Digital UNIX Version 
  3.2G and 4.0A: 
# /usr/bin/dbx -k /vmunix /dev/mem

  dbx version 3.11.10
  Type 'help' for help.
  stopped at [thread_block:2025 ,0xfffffc00002a7a70] Source not available 
  warning: Files compiled -g3: parameter values probably wrong
  (dbx) patch tcbhashsize=128
  128
  (dbx) quit# /sbin/sysconfig -q inet tcbhashsize
  inet:
  tcbhashsize = 128


  9. Changes and enhancements since Version 2.1

  This section describes the changes that have been implemented since the
  release of  Version 2.1 of the AltaVista Firewall for Digital UNIX.

  9.1	Versions Supported
  The firewall now supports the following versions of Digital UNIX:
  Version 3.2C
  Version 3.2D
  Version 3.2F
  Version 3.2G
  Version 4.0
  Version 4.0A
  Version 4.0B
  

  9.2. New features

  The following new features have been added to the AltaVista Firewall
  for Digital UNIX V3.0
   
  1. Remote Management
  2. URL and JAVA blocking
  3. Enhanced WWW proxy
  4. Real-audio proxy
  5. Generic TCP relay enhancements
  6. Powerful and flexible authentication  
  7. Dual DNS	
  8. Single server for firewall and VPN


  9.2.1 Remote Management


  Managing heterogeneous configurations: Because system administrators may 
  have to manage several platforms, the remote firewall management is very 
  consistent and compatible on all supported platforms. It implements a 
  HTML based user interface for a same look-and-feel. It is written in 
  Java for enhanced portability and it supports flat ASCII configuration 
  files for management flexibility.


  Centralized Management: AltaVista Firewall V3.0 offers remote management 
  for firewalls within any network sizes from a centralized console 
  running either Windows 95 or Windows NT. This is both a cost and time 
  saving feature which allows system administrators to monitor and take 
  quick actions on their UNIX or NT based firewall.

  Remote management without compromises on security: Unlike any 
  competitive offerings which establish a weak link to the firewall via a 
  serial port or telnet session on a high port, AltaVista Firewall remote 
  management includes - at no-cost - the best-in-class features of the 
  AltaVista Tunnel. The tunnel product provides RSA 512 bit 
  authentication, MD5 integrity and the strongest encryption worldwide 
  with RSA 128bit (U.S.) and 56/40 bit (International.)

  Efficiently managing firewalls from anywhere: The new remote management 
  enables system administrators to view firewall activities and allows 
  them to quickly take appropriate actions. Consistently with the OnSite 
  Computing vision of AltaVista, network managers are able to manage the 
  firewall from anywhere within the intranet or from an untrusted network. 


  On all supported platforms, the remote management displays the states of 
  all services as well as various statuses and alarms. It also allows to 
  modify the firewall status and start/stop specific services such as FTP. 
  Additionally, on Digital UNIX, network administrators can maintain and 
  manage security policies, user authentication, DNS, mail, new SNMP 
  alarms and active monitoring of traffic. Furthermore, different levels 
  of control can be assigned on UNIX. As an example, one Firewall 
  administrator can monitor the status of the firewall, while another can 
  change some security policies.

  9.2.2 URL and Java blocking

  This is both a performance and a security feature. According to easily 
  definable policies, AltaVista Firewall T3.0 can block URLs to preserve 
  network performance and to restrict access to specific Web sites for 
  productivity purposes.  Security managers can define specific policies 
  for URL access. AltaVista Firewall T3.0 can also detect and block Java 
  applets entirely by allowing selective filtering of Java applets through 
  the firewall to protect against one the most common network attacks.

  9.2.3 Enhanced WWW proxy

  Enhanced WWW proxy. This updated proxy contains significant performance
  improvements based  on code optimization and caching implementation. It
  supports the  following protocols: HTTP, HTTPS/SSL, gopher and ftp. It
  implements the  CERN/NCSA Common Log Format for enhanced reporting and
  integration with  third party analysis tools. As for other proxies,
  access restriction  policies per user can also be combined with time
  limitations.

  9.2.4 Support for Real-Audio proxy

  RealAudio is an application that allows playback of audio in real-time 
  over internet connections. Through the RealAudio proxy, managers can 
  allow or prevent users on internal network systems with Web browsers  to 
  access RealAudio services on the external network. For this proxy, 
  system administrators can specify security policy details, time 
  restrictions and blacklists of hosts forbidden access (common with ftp, 
  telnet and finger proxies.)


  9.2.5 Generic TCP relay enhancements

  AltaVista Firewall T3.0 broadens security policies by offering a generic 
  TCP relay for one-to-many and many-to-one connections. Consequently, an 
  instance of the generic relay such as news can have one server on the 
  inside of the firewall getting feeds from multiple news servers on the 
  outside. This generic relay is also fully transparent outbound so there 
  will be no need to reconfigure internal systems. The management GUI 
  supports both one-to-many and many-to-one configurations.


  9.2.6 Powerful and Flexible Authentication

  Authentication for WWW users or group of users The enhanced WWW proxy
  includes authentication for specific users or  group of users by any
  authentication schemes currently supported by the  UNIX firewall such as
  CRYTOcard or re-useable passwords.  This feature  provides system
  administrators with great flexibility to implement their  policies with
  finer granularity.  This authentication is integrated with  the existing
  system management GUI on UNIX.



  9.2.7 Dual-DNS Server

  Before the introduction of AltaVista Firewall T3.0, the recommended name 
  server configuration was the hidden DNS setup hiding the internal 
  address space from the untrusted network. However, this recommendation 
  required to set up a second name server within the intranet causing some 
  management issues. 

  With Altavista Firewall T3.0, firewalls can now be configured as Dual-DNS 
  servers that understand which name services are internal or external. 
  This Dual-DNS server is fully configurable through the GUI based 
  management.

  9.2.8 Single Server for Tunnel and Firewall

  F500 companies are mostly interested in dedicated boxes for security, 
  performance and management reasons. AltaVista has been offering the 
  capability of running a security low-end server on the same UNIX box. It 
  managed to minimize any security impacts by a close integration between 
  those two products. With Firewall T3.0, AltaVista now extends this 
  integrated solution to Windows NT servers5.

  9.3 Known problems fixed since V2.1

  1.  /sbin/init.d/inet In V2.1 this script had a syntax error causing it
  to query the value of the network interfaces before they were configured.
  This is now  fixed.

  2.  ftpxd
  The problem where Windows 95 and Windows NT clients cannot connect 
  to ftp servers using the Digital Firewall for UNIX V2.1 is now fixed.
  

  10. Applying Patches to Digital UNIX	

  From time to time, Digital[TM] releases patches to Digital UNIX OS. These
  patches are often released to fix known bugs, or to improve performance
  of machines running Digital UNIX.  Never apply a patch to a Digital UNIX
  machine running the AltaVista Firewall, unless Digital support can
  confirm that the patch does does not adversely affect how the
  AltaVista[TM] Firewall works. The installation procedure for the
  AltaVista Firewall applies patches  to the Digital UNIX kernel to support
  the functions of the firewall.  If further patches are applied to the
  kernel, the patches supporting  the AltaVista Firewall could be
  overwritten, and some functions of the firewall could be disabled.



                    - - - - - - - - - - - - - - -
  For additional information on the AltaVista Firewall, refer to the 
  following URL:

  http://altavista.software.digital.com/firewall/index.htm


  � Digital Equipment Corporation 1996. All rights reserved. [TM]
  AltaVista, Digital, PrintServer, and the Digital logo are trademarks of
  Digital Equipment  Corporation. [TM] Netscape is a trademark of Netscape
  Communications Corporation. S/Key is a registered trademark of Bell
  Communications Research, Inc. [TM] SecureNet Key (SNK) is a trademark of
  Digital Pathways, Inc. UNIX is a registered trademark in the US and other
  countries licensed exclusively  through X/Open Company Ltd. All other
  trademarks and registered trademarks are the property of their respective
  Owners.




[Posted by WWW Notes gateway]
T.RTitleUserPersonal
Name
DateLines
1896.1Firewall 97 NT Kit DetailsNETRIX::"[email protected]"Scott EstabrooksThu Mar 27 1997 10:14359
			
AltaVista Firewall 97 for NT Intel

AltaVista Firewall for NT T3.0-2 (Beta)
March 1997
Release Notes 

25 March 1997

These Release Notes contain the following sections:

    A. Kit Contents
    B. Copying the kit
    C. Overview
    D. Installation Instructions
    E. Release Notes
    F. Remote Management Instructions
    G. Copyright Notice
    H. Comments and Suggestions


A. Kit Contents

  The field test fit comprises of the following components:
      - ntfw30beta2.zip file containing the NT Firewall 97 kit, release notes
        and bug reporting information
      - ntfwdocs.zip  POSTSCRIPT and PDF Administrators Guide and 
        Installation Guide

B. Copying the kit

  This kit can be copied using FTP from the following host:

       ftp.wfa.digital.ie  

  [Please mail [email protected] for 
  location of kits]


C. Overview

The AltaVista Firewall for NT implements the application gateway 
firewall model. The firewall host is a dual-homed system with 
network connections to internal and external networks. IP routing
is disabled between the two network interfaces. Network traffic
must relay through the application proxies, which control access 
from both sides of the firewall. The firewall logs each access 
and monitors suspicious events. The product also includes a Windows 
NT style GUI for firewall management and installation. Both Intel 
and Alpha platforms are supported. 

This release of the product includes the following major features:

o    Remote management via a secure channel on Windows NT 4.0

o    AltaVista filter driver that prevents IP spoofing.
o    This version of the product supports Windows NT 3.51 and 4.0
      operating systems.

o    Trusted Application Proxy Gateways for web, FTP, telnet, news, 
      mail, RealAudio and finger access through the firewall. 

o    A generic TCP proxy, which can be easily configured to relay 
      tunnel and generic TCP application traffic.

o    Windows NT style GUI for easy firewall management and monitoring 
      firewall traffic.

o    Windows-style wizard to provide easy step-by-step firewall
      installation and DNS configuration.

o    Remote Access Service (RAS) support for environments where the 
      Internet connection is over a dial-up line. 

o    Logging subsystem to log all access through the firewall.
 
o    Configurable alarm system that reacts to security events detected
      by individual firewall components. The alarm system triggers
      actions when suspicious activities are detected.

o    Configurable reporting subsystem to generate reports detailing
      individual service usage over various periods of time. 

o    Strong authentication support via Digital Pathways and 
      CRYPTOCard keycards. 

o    On-line and context-sensitive help files.
 
o    Comprehensive hard copy firewall administration guide.



D. Installation Instructions 

This version of the product supports Windows NT
versions 3.51 and 4.0 operating systems. 
The firewall installation program,  setup.exe, is located in the 
processor-specific directory (Intel or Alpha) on the CD-ROM. 
The firewall documentation is in the documentation directory 
on the CD-ROM.

			Note

	The AltaVista Firewall for NT installation 
	alters your NT system to create a dedicated
	firewall machine. If you are installing this
	product for evaluation purposes, you should
	install it on a non-production system.

Before installing the AltaVista Firewall for NT, it is important 
to read the installation file, install.txt in the same directory as 
setup.exe, that comes with the product or Chapter 2 and
Appendix A in the Administrator's Guide. These documents help 
you establish your firewall environment and understand the 
pre-installation and post installation tasks. You must make sure 
you have the network addresses, and internal and external name 
server information before installing the firewall. 

Microsoft has issued patches for Window NT 3.51 and 4.0. It
is recommended that you install the latest patches.

The following are additional items to check for your firewall 
installation:

1.   Uninstall Services
      If you have a DNS server or a Purveyor server running on the 
      system on which you intend to install the AltaVista Firewall for 
      Windows NT, remove the software by using its uninstall program.
      The AltaVista Firewall for NT installs a DNS server during the
      installation. The Purveyor uninstall program by default is located
      at \win32app\psc\purveyor\uninstall.exe. The firewall 
      installation installs a Web proxy server during the 
      installation.

      If you have Mail, FTP, or News services running on the system
      on which you intend to install the AltaVista Firewall for NT,
      stop and remove the services from the system. The firewall 
      application gateways (proxies) take over the ports used by 
      these services.

      AltaVista Tunnel Server V1.1 or earlier should be removed.

2   Close Running Programs
      Close the Event Viewer, Control Panel, and any other active 
      programs and open services as you are asked to reboot as part
      of the AltaVista Firewall for NT installation.


3.   RAS
      If you plan to use NT's Remote Access Service (RAS) connect 
      your firewall to your Internet Service Provider (ISP), you 
      need to fill in your external network address in the network 
      configuration step of the installation. If your external 
      network address is dynamically assigned by the ISP, use the
      firewall graphical user interface (GUI) to reconfigure the 
      firewall external address after the installation.

4.   Installation 
       During installation, you are instructed to install a filter 
       driver. If you are using a dial-up connection via RAS or any 
       local area network other than Ethernet (for example, FDDI or 
       token ring) to the Internet, you need to skip the step that
       installs the filter driver. 


E. Release Notes 

1.   Secure Socket Library (SSL) Support
      The Web proxy includes support for SSL. The SSL requests and 
       responses are proxied through the same port as HTTP traffic.
       Users in the firewall environment must define the security proxy
       port to be the Web proxy port.

2.   Web Proxy Startup Time
      The Web proxy does not show a startup time. If the Web proxy
      shows a stopped state, check to see if all the Web proxy
      configuration fields have the correct syntax.

3.   Web Proxy Log
      For performance reasons, the Web proxy writes to the log file
      every two minutes. Stopping the Web proxy will automatically
      trigger the logs to be written to the log file.

4.   Stopping Firewall Services
      On the Alpha platform, you may sometimes see a warning message 
      when you stop the firewall services. You can ignore this 
      warning message.

5.   Firewall Proxy State
      There may be a delay before the firewall proxies' state 
      information is refreshed. Clicking on the check box for 
      Related Firewall Services, or closing and re-opening the 
      Firewall Management GUI refreshes the proxies' state 
      information.

6.   Starting/Stopping Multiple Firewall Proxies
      There may be a delay when starting or stopping multiple 
      firewall proxies.

7.   System Background Color
      The firewall alarm system uses the system background color as 
      one of the ways to reflect the firewall status. The installation
      procedure removes any wallpaper that is set. The firewall
      administrator should not set a wallpaper background because
      the wallpaper would cover the system background color. 

8.  Reinstalling News or generic TCP proxies
       If you need to reinstall the firewall, you may have problems 
       redefining the news or generic TCP proxies that may have been 
       defined previously. You should check the images in the \dfw\bin 
       directory, and delete the previous news.exe or proxy images that
       match the service names you are trying to define.     

9.  CryptoCard Support
       If you use CRYPTOCard user authentication tokens, follow the 
       instructions in the firewall authentication programming screen
       and the operation and system guide that comes with the token. 
       The programming steps generate an eight digit checksum on the 
       token. The first six digits should match the checksum displayed
       in the firewall authentication programming screen. 

10. Deinstallation
       When you deinstall the remote management tunnel, the following
       keys are not properly deleted:
       
      HKey_Local_Machine\\system\\CurrentControlSet\\services\\Deccore
        
      HKey_Local_Machine\\system\\CurrentControlSet\\services\\Decps3x

      HKey_Local_Machine\\system\\CurrentControlSet\\services\\Itnd

       Run regedt32 to delete these keys. If you do not delete these
       keys, the tunnel will not reinstall.

F. Remote Management Instructions

      Remote Management for the AltaVista Firewall for NT allows 
      an administrator to:
       o  View the status of proxies and related services
       o  Start/stop proxies and related services
       o  Change the firewall status
      For other management functions, you must use the local user 
      interface.

      Remote Management requires a Java and Frames-capable 
      Web Browser.  Netscape 3.01 or Internet Explorer 3.01 
      are recommended.

      Remote Management is not currently available on Windows
      NT/alpha. A tunnel client is available for remote management
      for Windows95 and Windows NT Intel.

      Remote Management depends on the Java-based application 
      FwServer running on the firewall.  The program 
      \dfw\bin\StartFwServer.exe launches this application.  
      StartFwServer is put in the startup group by the installation
      process. Currently an administrator must be logged on for 
      this process to start.

      Access to Remote Management is limited to administrators 
      using secure channels.  The Windows NT User Manager can 
      be used to create administrator accounts.  Secure Channels 
      can be created  from the local user interface by clicking 
      on the remote tab.  Only one secure channel can be used 
      at a time.

      The Remote Management Server uses port 5000.  The Remote 
      Management Web Server uses port 8314.  These ports should 
      not be used for Generic Proxies.

      Unless you add an alias to your dns files, you should connect  
      to the tunnel IP address of the firewall. You cannot connect via
      the firewall domain name (for example, 
      http://192.160.1.200:8314).

      The event frame (at the bottom of the remote management 
      page) provides information about important firewall events 
      such as alarms, and state changes. Currently some events 
      are missing detailed information.

      At times it may be necessary to click reload to update the 
      Remote Management display.

      If the Remote Management page shows an access denied error, 
      and the event frame is empty, or shows an error, then there 
      may be a problem accessing the file \dfw\htdocs\eventmsg.html.  
      Stopping and restarting the remote management web server 
      should clear the problem.

      When changing the Firewall status remotely using an HTML form, 
      some browsers display a security warning when using HTML 
      forms. Since remote management access to the firewall is 
      via a secure channel, all data is encrypted and this warning
      does not apply.


G. Copyright Notice

Embedded Proxy Server Portions Copyright(c) 1996 Process Software 
Corp. All rights reserved.Portions Copyright(c) 1996 MetaInfo, Inc. 
All rights reserved. Portions Copyright(c) 1995 Corporate Computer, 
Inc. All rights reserved.
MetaInfo, Inc. and its suppliers retain all right, title and 
interest in and to this software and all components thereof, 
including without limitation all patents, copyrights, trademarks
and trade secrets. Other than as set forth in the end user 
license agreement, this software may not be copied, modified or
distributed. Additional rights and restrictions are set forth in
the end user license agreement included with the software.

Portions Copyright(c) 1989 The Regents of the University of 
California. All rights reserved.

1.   Redistributions of source code must retain the above copyright
      notice, this list of conditions and the following disclaimer.

2.   Redistributions in binary form must reproduce the above 
      copyright notice, this list of conditions and the following
      disclaimer in the documentation and/or other materials provided
      with the distribution.

3.   All advertising materials mentioning features or use of this
      software must display the following acknowledgment: "This 
      product includes software developed by the University of 
      California, Berkeley and its contributors."

4.   Neither the name of the University nor the names of its 
      contributors may be used to endorse or promote products derived
      from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONDEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN 
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 
POSSIBILITY OF SUCH DAMAGE.

H. Comments and Suggestions 

Thank you for using AltaVista Firewall for NT. Your comments and 
suggestions help us improve the quality of our software and 
publications. 

Please send your comments to: 

[email protected]

	(c) Digital Equipment Corporation 1997. All rights reserved.



[Posted by WWW Notes gateway]
1896.2Any news for the BSD version ?BIS50::BOKORBig BrowserFri Mar 28 1997 01:570
1896.3what is the highest DU version supported ?BACHUS::ROELANDTSWa d'es ma da ve ne stuutFri Mar 28 1997 10:5713
    
    Hello,
    
    Having down loaded the kits I'm wondering something : on which
    version(s) of Digital Unix can this kit be installed ? The versions
    stated in .0 are not the same as the ones mentionned in the
    AFWU300_EFT_inst_guide.ps on pg 1-3. So which one is correct ? Will
    V3.0 be supported on the current shipping version of DU (V4.0B) or not?
    
    Regards,
    
          Guy
    
1896.4print install guide ?PRMS00::COLETue Apr 01 1997 10:128
    Has anyone successfully printed the Installation Guide?
    
    It dies after about 5 pages on an LN17 !
    
    How about making a .pdf version available ?
    
    ...larry
    
1896.5Printed fine for mePMESD::BEABESTue Apr 01 1997 12:075
Larry

It is a .PDF file in the Ntfwdocs.zip

Ernie
1896.6PLEASE ENSURE Customers sign an NDA and Beta AgreementNETRIX::"[email protected]"tim Tue Apr 01 1997 13:2413
Please note that if you intend to provide the Beta kit #2 to your 
customer you must ensure that the customer has signed an NDA and 
the Beta agreement. 

Details from the Firewall Product Manger Philippe Der Arslanian.

If you intend to use this kit within Digital you don't need the NDA 
obviously.

Sorry for the omission.


[Posted by WWW Notes gateway]
1896.7new admin guide; exarc approval ?SEAWLF::COLEDigital NSIS, Greenbelt, MarylandMon Apr 07 1997 16:5714
    
	Tim,

	1) Are there any pre-publication copies of the new
	   Administrator's Guide available yet ?

        2) Are any Digital Corporate  sites using AFWU 2.0/3.0
           on their ISP connection ? (ie, has the EXARC committee
	   blessed it ?)

	thanks,

	...larry

1896.8AFWU used in EuropeNETRIX::"[email protected]"Jan-Erik PedersenThu Apr 10 1997 08:158
We are using AFWU (2.1) at two corporate gateways in Europe
in Reading & Munich, in Valbonne we still use the SEAL setup.

The EXARC approval is for the gateway and not for the software
which means we could as well use TIS or any other software if
we found it usefull.
[Posted by WWW Notes gateway]
1896.9CHEFS::zkodhcp-29-48-237.zko.dec.com::PITTGone with the winsock ...Fri Apr 18 1997 14:3310
Surely the EXARC proposal had some technical specification
associated with it, so it can't be quite true that you could
use anything...  At least it must be capable of doing a
particular set of things.  For example, I don't think you
could use a filtering router as the firewall ...

Still, I'm sure you're right that V2.1 to V3.0 won't be an
issue.

T