| Title: | SEAL |
| Moderator: | GALVIA::SMITH |
| Created: | Mon Mar 21 1994 |
| Last Modified: | Fri Jun 06 1997 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 1989 |
| Total number of notes: | 8209 |
==============================================================
AltaVista Firewall 97 - Beta Test Kit #2 Release Announcement
and Release Notes
==============================================================
Date: 20-March-1997
AltaVista partners as well as other interested parties are invited to
copy,install and test this release.
This kit may be tested in internal lab or testbed configurations and
also in network configurations where a direct connection is made to the
Internet. When a direct Internet connection is used, the internal
network being protected using the firewall MUST not have ANY connection
to Digitals internal network without the necessary EXARC approvals
having first being obtained.
This document comprises the FT announcement and release notes for this
kit. It provides information on how to copy and install the kit, and
also how to report problems. A list of known problems is also included.
Any sites that already have a previous test kit are requested to upgrade their
installation to use this kit.
Have fun!
AltaVista Firewall Engineering
NOTE: Details of UNIX included below , Details of NT kit to follow
=============================================================
1. AltaVista Firewall 97 for Digital UNIX V3.2G and V4.0B
AltaVista Firewall Version T3.0 for Digital UNIX
Release Notes
03 March 1997
These Release Notes contain the following sections:
1. Kit Contents
2. Installation
3. Configuration
4. GUI
5. Authentication
6. Administrator's Guide
7. Problem reporting
8. Performance and Tuning
9. Changes and Enhancements since Version 2.1
10. Applying patches from Digital UNIX
Each section identifies known issues or problems, and provides a
solution or workaround, if applicable. It is recommended that you
review these notes carefully.
1.. Kit Contents
The field test fit comprises of the following components:
- setld kit tar file archive (includes both firewall and tunnel
server software)
- compressed POSTSCRIPT Administrators Guide (not yet available
please use on-line help where possible)
- compressed POSTSCRIPT Digital Firewall for UNIX SPD
- release notes (this document)
- bug reporting information
2.. Installation
This section contains notes relating to the installation of the
AltaVista Firewall.
2.1. Copying the kit
This kit can be copied using FTP from the following host:
ftp.wfa.digital.ie
[Please mail [email protected] for
location of kits]
with the following filenames
AFWU300-EFT.tar tar archive containing
the kit
AFWU300_EFT_installguide.ps.Z Installation Guide
AFWU300_EFT_release_notes.lis Release Notes
When you have copied the kits components, you will need to uncompress
the POSTSCRIPT documents prior to printing (# uncompress file.Z),
and will also need to restore the setld product from the
tar archive, e.g.
# tar xvf AFWU300_EFT.tar
2.2. Product Installation
The Installation Guide contains comprehensive instructions detailing
the required hardware and software, and how to install the product.
This kit will be released on CD from the SSB, and is intended to
be installed immediately after the installation of the Digital UNIX
Operating System.
This field test kit is also available for download from
[email protected]
The following steps should be taken to mimic installation from a CD.
2.2.1. Install a supported version of Digital UNIX OS on your test
system as directed by the Installation Guide.
2.2.2. Using the netsetup utility, configure one of the interfaces on
your test machine and set up a default route as appropriate.
Restart the network.
2.2.3. Create a temporary directory and using FTP copy the kit
components to your test machine.
2.2.4. Using the netsetup utility again, delete the configuration for
the interface, previously set up in step 2. Restart the network to
ensure that you have deleted the network interface configuration
correctly.
2.2.5. Restore the setld kit from the compressed tar archive, and
proceed with the kit installation as directed in the
Installation Guide
#tar xvf AFWU300-EFT.tar
#cd firewall
#setld -l .
Note: The AltaVista Firewall is a security product that requires a
non-standard configuration of hardware and operating system
software. It is important that you follow carefully the
pre-installation and installation instructions in the Installation
Guide.
2.2.6. Tunnel Installation, for Remote Management.
Before installing the tunnel software (described in installation guide)
you must install the tunnel server PAK.
#cd tunnel
#chmod +x temp-int-tunnel-server.pak
#./temp-int-tunnel-server.pak
#setld -l . (to install tunnel software)
2.3. Logging into the GUI Web Browser
The Netscape[TM] web browser provides the GUI for the AltaVista Firewall.
When Netscape starts up, it displays a window with license information.
Click on the Accept button to accept the license and continue. The
system now displays the Netscape Password login window.
The firewall is shipped
with admin as the required user ID and first-time password. To log in to
the browser, enter the following
user ID: admin
password: admin
The system displays a login screen for the firewall main menu. To log in
to the firewall system as administrator, enter the following
user ID: admin
password: admin
2.4. File System Diagnosis
You can use the System Accounting Utilities optional software subset
(OSFACCT) to ease diagnosis of file system problems. For example, you
can use OSFACCT to diagnose disk space usage problems. You may install
this optional software subset when installing the operating system for the
firewall system. Alternatively, you can install it at a later time.
3.. Configuration
This section contains notes relating to the configuration of the
AltaVista Firewall.
3.1.. Mail Configuration
The firewall system cannot be configured as a mail hub system or central
mail server (that is the machine that handles mail for the internal
domain). An internal system must be used to perform this role. The
firewall system relays incoming mail to the mail hub system for the
internal domain. The name service for the internal domain must be
configured so that appropriate MX records exist to direct mail for the
internal domain to the mail hub system. The mail hub system must be
configured with suitable aliases to pass mail for internal users to the
appropriate internal destination. You must also configure the mail hub
system to send external mail (that is, mail destined for outside the
internal domain) to the firewall. The firewall distributes this mail to
the appropriate external destination.
3.2.. Switching on the Mail Gateway
For security reasons, when you install the AltaVista Firewall, the mail
gateway is disabled. To allow the firewall system to deliver mail, you
must switch the mail gateway on using the Managing the Firewall menu
item. To allow the firewall system to deliver mail, you must switch the
mail gateway on using the Managing the Firewall menu item.
3.3.. Mail Sent to the root Account
When mail is sent to the root account on the firewall system (for
example, reports and alarm notifications), the mail is automatically
delivered to the root account on the mail hub system.
3.4.. Application Gateway Configuration
For security reasons, when you install the AltaVista Firewall, all
application gateways are disabled. To enable a gateway, you must specify
a security policy for the gateway using the Application Gateways menu
item, and also switch the gateway on using the Managing the Firewall
menu item.
3.5.. DNS Configuration
Initial configuration of DNS sets up an invalid entry for the host name.
This must be modified. To modify, select DNS from "Managing The Firewall"
section of the Main Menu and add DNS entries as required. You can also
search for DNS entries to check that they have been added correctly.
3.6.. Save Firewall Configuration
This section is not included in this Field Test version
3.7.. Firewall within a firewall
If the firewall is behind another firewall, non-local DNS does not
resolve because the query packets (UDP Port 53) can't escape through the
outer firewall. A forwarders entry must be added to
/usr/dfws/named.red/named.boot
for example,
forwarders outside-firewall-IP-address
slave
The internal name server daemon must then be restarted.
4.. GUI
This section contains notes relating to the AltaVista Firewall GUI.
4.1.."Document has no data" error
The Netscape Web browser may display the following error message in a
dialog box while performing firewall configuration and administration
tasks:
Document has no data
Click OK to dismiss the dialog box. Then click Reload to reload the page
correctly. If the dialog box is displayed again, repeat these steps.
4.2.. Window Border Disappears When Window is Moved
Depending on the severity status of the firewall system, the border of a
window that is being moved may disappear. This may make it difficult to
position the window being moved. Modify the window border color to
increase contrast.
4.3.. Error Opening a Directory During Summary Report Generation
If you generate a Summary Report for a period for which data logs do not
exist, an error message appears, as follows:
Error: OPENDIR: cannot open directory '/var/adm/syslog/logs/date': No
such file or directory
The date indicates the days for which log data is missing. You may
ignore these messages when the firewall was not operational for the
report period.
4.4.. Firewall Status and Alarm Settings
When you install the AltaVista Firewall, the alarm system is configured
to the default alarm configuration. This default configuration is very
sensitive. This may result in the firewall changing state shortly after
deployment or during initial testing. It is recommended that you become
familiar with the alarm configurations for the gateways you are
operating. If a gateway is not functioning as expected, check the
current status of the gateway using the Select Individual Services menu
item in the Firewall Operation Control menu. The gateway may have been
disabled as a result of a gateway event for which an alarm was
generated.
5.. Authentication
5.1.. Authenticated FTP does not ask the user for a password, making
it impossible for the user to log in.
5.2.. CRYPTOCard authentication is not operating correctly.
6.. Administrator's Guide
The Administrator's Guide has not been updated to include information
on all of the new features provided with this version of the
AltaVista Firewall for Digital UNIX. Use the online help provided
with the AltaVista Firewall rather than the Administrator's Guide
for information on the following topics:
Generic Application Gateway
WWW Application Gateway
RealAudio Application Gateway
There is currently no online help for the following topics:
DNS
Multiple Administrators
7.. Problem Reporting
Problems should be reported against both the product implementation
and the associated documentation.
Once you have completed the installation, you should use the
builtin bug repoting script that is available as an option
from the Firewall Main Menu. You will need to have mail set up
in your test environment for this to operate correctly.
If you do not have mail setup, you can mail bug reports to
[email protected]
Please identify the following:
- kit release,
- assign a priority to the bug,
- provide a brief and detailed description of the problem,
- how the problem may be repeated
Please provide sufficient information to avoid the need for followup
from AltaVista Firewall Engineering.
8. Performance and Tuning
This section contains notes on how to tune Digital UNIX to improve the
performance of your AltaVista Firewall system.
8.1. Digital UNIX Operating System
You can improve the performance of the AltaVista Firewall by up to 15%,
in terms of a reduced number of dropped connections and an increased
throughput, if you upgrade your system to run Digital UNIX Version 3.2G,
4.0A, or V4.0B. It is strongly recommended that you perform this upgrade.
For information on how to upgrade your version of Digital UNIX, see the
Digital UNIX documentation set. For information on how to reinstall the
AltaVista Firewall after upgrading the operating system, see the
AltaVista Firewall Installation Guide for Digital UNIX.
8.2. Tuning Digital UNIX to Resist SYN Flood Attacks
After you perform the operating system upgrade recommended in 5.1, you
can further tune your system to manage problems involving denial of
service, such as SYN flood attacks. In a SYN flood attack, a remote host
sends you a SYN packet with a nonexistent source address. This uses a
connection slot while your host attempts to acknowledge the connection
to the non-existent source. The number of slots available and the amount
of time a slot remains allocated are specified by the following kernel
parameters:
somaxconn
Sets the maximum number of pending requests allowed to wait on
a listening socket. The default value for Versions 3.2G and 4.0 is 1024.
The maximum value is 32767.
sominconn
Sets the minimum number of pending connections allowed on a
listening socket. When a user process calls listen with a backlog
less than sominconn, the backlog will be set to sominconn. The
sominconn parameter overrides somaxconn. The default value for
Versions 3.2G and 4.0 is 1. The maximum value is 32767.
tcp_keepinit
This is the amount of time a partially established connection remains
on the listen queue before it times out (for example, if a client
sends a SYN but never answers our SYN/ACK).
Partially established connections use slots on the listen queue. If
this queue starts to fill with connections in SYN_RCVD state, you can
decrease the value of the tcp_keepinit parameter to make those
partial connects time out sooner. You specify the parameter in half-
second units. The default value is 150 (that is, 75 seconds).
Note: Be very careful when you modify this parameter, as legitimate
clients may take some time to respond to SYN/ACK.
To determine the network load on your system while the machine is
operating in its maximum load condition (that is, when it is receiving
the maximum rate of new connections), use the following command:
# /usr/sbin/netstat -An | grep SYN_RCVD
The output from this command may have many lines of the following
form:
20e4500 tcp 0 0 10.222.222.12.9996 22.222.222.123.194 SYN_RCVD
If so, your system may have a problem receiving connections and you
should tune your system accordingly. You can tune the kernel on your
computer by modifying the values of three kernel variables described
above as follows:
You can modify the somaxconn and sominconn parameters using the
sysconfig command to increase the number of available slots for
partially established connections. You can set these parameters to a
maximum value of 32767. It is recommended that you assign the sominconn
and somaxconn parameters the same values. This increases the number of
slots available, and therefore significantly improves the ability of
your system to continue to serve all connection requests from valid
clients. For more information on the sysconfig command, see the man pages
for sysconfig and sysconfigdb.
You can modify the tcp_keepinit using the sysconfig command to decrease
the amount of time a partially established connection remains on the
listen queue before it times out.
It is strongly recommended that you have some knowledge of the
characteristics of the network before you decrease this parameter. Be
very careful when you modify this parameter, as legitimate clients may
take some time to respond to SYN/ACK due to network latency.
8.3. Tuning Digital UNIX to Improve Web Proxy Performance
You can improve the web proxy performance by increasing the lookup speed
for the TCP connection table. You can do this by increasing the size of
the hashlist for the TCP inpcb lookup table. To do this, you modify the
following kernel parameter:
tcbhashsize
The number of hash buckets used for the TCP connection
table used in the kernel. The default value is 32. This value
should be specified as a power of 2 and may be set to a
maximum of 1024.
You can modify the value of tcbhashsize by patching the kernel
using dbx. The following steps can be used on Digital UNIX Version
3.2G and 4.0A:
# /usr/bin/dbx -k /vmunix /dev/mem
dbx version 3.11.10
Type 'help' for help.
stopped at [thread_block:2025 ,0xfffffc00002a7a70] Source not available
warning: Files compiled -g3: parameter values probably wrong
(dbx) patch tcbhashsize=128
128
(dbx) quit# /sbin/sysconfig -q inet tcbhashsize
inet:
tcbhashsize = 128
9. Changes and enhancements since Version 2.1
This section describes the changes that have been implemented since the
release of Version 2.1 of the AltaVista Firewall for Digital UNIX.
9.1 Versions Supported
The firewall now supports the following versions of Digital UNIX:
Version 3.2C
Version 3.2D
Version 3.2F
Version 3.2G
Version 4.0
Version 4.0A
Version 4.0B
9.2. New features
The following new features have been added to the AltaVista Firewall
for Digital UNIX V3.0
1. Remote Management
2. URL and JAVA blocking
3. Enhanced WWW proxy
4. Real-audio proxy
5. Generic TCP relay enhancements
6. Powerful and flexible authentication
7. Dual DNS
8. Single server for firewall and VPN
9.2.1 Remote Management
Managing heterogeneous configurations: Because system administrators may
have to manage several platforms, the remote firewall management is very
consistent and compatible on all supported platforms. It implements a
HTML based user interface for a same look-and-feel. It is written in
Java for enhanced portability and it supports flat ASCII configuration
files for management flexibility.
Centralized Management: AltaVista Firewall V3.0 offers remote management
for firewalls within any network sizes from a centralized console
running either Windows 95 or Windows NT. This is both a cost and time
saving feature which allows system administrators to monitor and take
quick actions on their UNIX or NT based firewall.
Remote management without compromises on security: Unlike any
competitive offerings which establish a weak link to the firewall via a
serial port or telnet session on a high port, AltaVista Firewall remote
management includes - at no-cost - the best-in-class features of the
AltaVista Tunnel. The tunnel product provides RSA 512 bit
authentication, MD5 integrity and the strongest encryption worldwide
with RSA 128bit (U.S.) and 56/40 bit (International.)
Efficiently managing firewalls from anywhere: The new remote management
enables system administrators to view firewall activities and allows
them to quickly take appropriate actions. Consistently with the OnSite
Computing vision of AltaVista, network managers are able to manage the
firewall from anywhere within the intranet or from an untrusted network.
On all supported platforms, the remote management displays the states of
all services as well as various statuses and alarms. It also allows to
modify the firewall status and start/stop specific services such as FTP.
Additionally, on Digital UNIX, network administrators can maintain and
manage security policies, user authentication, DNS, mail, new SNMP
alarms and active monitoring of traffic. Furthermore, different levels
of control can be assigned on UNIX. As an example, one Firewall
administrator can monitor the status of the firewall, while another can
change some security policies.
9.2.2 URL and Java blocking
This is both a performance and a security feature. According to easily
definable policies, AltaVista Firewall T3.0 can block URLs to preserve
network performance and to restrict access to specific Web sites for
productivity purposes. Security managers can define specific policies
for URL access. AltaVista Firewall T3.0 can also detect and block Java
applets entirely by allowing selective filtering of Java applets through
the firewall to protect against one the most common network attacks.
9.2.3 Enhanced WWW proxy
Enhanced WWW proxy. This updated proxy contains significant performance
improvements based on code optimization and caching implementation. It
supports the following protocols: HTTP, HTTPS/SSL, gopher and ftp. It
implements the CERN/NCSA Common Log Format for enhanced reporting and
integration with third party analysis tools. As for other proxies,
access restriction policies per user can also be combined with time
limitations.
9.2.4 Support for Real-Audio proxy
RealAudio is an application that allows playback of audio in real-time
over internet connections. Through the RealAudio proxy, managers can
allow or prevent users on internal network systems with Web browsers to
access RealAudio services on the external network. For this proxy,
system administrators can specify security policy details, time
restrictions and blacklists of hosts forbidden access (common with ftp,
telnet and finger proxies.)
9.2.5 Generic TCP relay enhancements
AltaVista Firewall T3.0 broadens security policies by offering a generic
TCP relay for one-to-many and many-to-one connections. Consequently, an
instance of the generic relay such as news can have one server on the
inside of the firewall getting feeds from multiple news servers on the
outside. This generic relay is also fully transparent outbound so there
will be no need to reconfigure internal systems. The management GUI
supports both one-to-many and many-to-one configurations.
9.2.6 Powerful and Flexible Authentication
Authentication for WWW users or group of users The enhanced WWW proxy
includes authentication for specific users or group of users by any
authentication schemes currently supported by the UNIX firewall such as
CRYTOcard or re-useable passwords. This feature provides system
administrators with great flexibility to implement their policies with
finer granularity. This authentication is integrated with the existing
system management GUI on UNIX.
9.2.7 Dual-DNS Server
Before the introduction of AltaVista Firewall T3.0, the recommended name
server configuration was the hidden DNS setup hiding the internal
address space from the untrusted network. However, this recommendation
required to set up a second name server within the intranet causing some
management issues.
With Altavista Firewall T3.0, firewalls can now be configured as Dual-DNS
servers that understand which name services are internal or external.
This Dual-DNS server is fully configurable through the GUI based
management.
9.2.8 Single Server for Tunnel and Firewall
F500 companies are mostly interested in dedicated boxes for security,
performance and management reasons. AltaVista has been offering the
capability of running a security low-end server on the same UNIX box. It
managed to minimize any security impacts by a close integration between
those two products. With Firewall T3.0, AltaVista now extends this
integrated solution to Windows NT servers5.
9.3 Known problems fixed since V2.1
1. /sbin/init.d/inet In V2.1 this script had a syntax error causing it
to query the value of the network interfaces before they were configured.
This is now fixed.
2. ftpxd
The problem where Windows 95 and Windows NT clients cannot connect
to ftp servers using the Digital Firewall for UNIX V2.1 is now fixed.
10. Applying Patches to Digital UNIX
From time to time, Digital[TM] releases patches to Digital UNIX OS. These
patches are often released to fix known bugs, or to improve performance
of machines running Digital UNIX. Never apply a patch to a Digital UNIX
machine running the AltaVista Firewall, unless Digital support can
confirm that the patch does does not adversely affect how the
AltaVista[TM] Firewall works. The installation procedure for the
AltaVista Firewall applies patches to the Digital UNIX kernel to support
the functions of the firewall. If further patches are applied to the
kernel, the patches supporting the AltaVista Firewall could be
overwritten, and some functions of the firewall could be disabled.
- - - - - - - - - - - - - - -
For additional information on the AltaVista Firewall, refer to the
following URL:
http://altavista.software.digital.com/firewall/index.htm
� Digital Equipment Corporation 1996. All rights reserved. [TM]
AltaVista, Digital, PrintServer, and the Digital logo are trademarks of
Digital Equipment Corporation. [TM] Netscape is a trademark of Netscape
Communications Corporation. S/Key is a registered trademark of Bell
Communications Research, Inc. [TM] SecureNet Key (SNK) is a trademark of
Digital Pathways, Inc. UNIX is a registered trademark in the US and other
countries licensed exclusively through X/Open Company Ltd. All other
trademarks and registered trademarks are the property of their respective
Owners.
[Posted by WWW Notes gateway]
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 1896.1 | Firewall 97 NT Kit Details | NETRIX::"[email protected]" | Scott Estabrooks | Thu Mar 27 1997 10:14 | 359 |
AltaVista Firewall 97 for NT Intel
AltaVista Firewall for NT T3.0-2 (Beta)
March 1997
Release Notes
25 March 1997
These Release Notes contain the following sections:
A. Kit Contents
B. Copying the kit
C. Overview
D. Installation Instructions
E. Release Notes
F. Remote Management Instructions
G. Copyright Notice
H. Comments and Suggestions
A. Kit Contents
The field test fit comprises of the following components:
- ntfw30beta2.zip file containing the NT Firewall 97 kit, release notes
and bug reporting information
- ntfwdocs.zip POSTSCRIPT and PDF Administrators Guide and
Installation Guide
B. Copying the kit
This kit can be copied using FTP from the following host:
ftp.wfa.digital.ie
[Please mail [email protected] for
location of kits]
C. Overview
The AltaVista Firewall for NT implements the application gateway
firewall model. The firewall host is a dual-homed system with
network connections to internal and external networks. IP routing
is disabled between the two network interfaces. Network traffic
must relay through the application proxies, which control access
from both sides of the firewall. The firewall logs each access
and monitors suspicious events. The product also includes a Windows
NT style GUI for firewall management and installation. Both Intel
and Alpha platforms are supported.
This release of the product includes the following major features:
o Remote management via a secure channel on Windows NT 4.0
o AltaVista filter driver that prevents IP spoofing.
o This version of the product supports Windows NT 3.51 and 4.0
operating systems.
o Trusted Application Proxy Gateways for web, FTP, telnet, news,
mail, RealAudio and finger access through the firewall.
o A generic TCP proxy, which can be easily configured to relay
tunnel and generic TCP application traffic.
o Windows NT style GUI for easy firewall management and monitoring
firewall traffic.
o Windows-style wizard to provide easy step-by-step firewall
installation and DNS configuration.
o Remote Access Service (RAS) support for environments where the
Internet connection is over a dial-up line.
o Logging subsystem to log all access through the firewall.
o Configurable alarm system that reacts to security events detected
by individual firewall components. The alarm system triggers
actions when suspicious activities are detected.
o Configurable reporting subsystem to generate reports detailing
individual service usage over various periods of time.
o Strong authentication support via Digital Pathways and
CRYPTOCard keycards.
o On-line and context-sensitive help files.
o Comprehensive hard copy firewall administration guide.
D. Installation Instructions
This version of the product supports Windows NT
versions 3.51 and 4.0 operating systems.
The firewall installation program, setup.exe, is located in the
processor-specific directory (Intel or Alpha) on the CD-ROM.
The firewall documentation is in the documentation directory
on the CD-ROM.
Note
The AltaVista Firewall for NT installation
alters your NT system to create a dedicated
firewall machine. If you are installing this
product for evaluation purposes, you should
install it on a non-production system.
Before installing the AltaVista Firewall for NT, it is important
to read the installation file, install.txt in the same directory as
setup.exe, that comes with the product or Chapter 2 and
Appendix A in the Administrator's Guide. These documents help
you establish your firewall environment and understand the
pre-installation and post installation tasks. You must make sure
you have the network addresses, and internal and external name
server information before installing the firewall.
Microsoft has issued patches for Window NT 3.51 and 4.0. It
is recommended that you install the latest patches.
The following are additional items to check for your firewall
installation:
1. Uninstall Services
If you have a DNS server or a Purveyor server running on the
system on which you intend to install the AltaVista Firewall for
Windows NT, remove the software by using its uninstall program.
The AltaVista Firewall for NT installs a DNS server during the
installation. The Purveyor uninstall program by default is located
at \win32app\psc\purveyor\uninstall.exe. The firewall
installation installs a Web proxy server during the
installation.
If you have Mail, FTP, or News services running on the system
on which you intend to install the AltaVista Firewall for NT,
stop and remove the services from the system. The firewall
application gateways (proxies) take over the ports used by
these services.
AltaVista Tunnel Server V1.1 or earlier should be removed.
2 Close Running Programs
Close the Event Viewer, Control Panel, and any other active
programs and open services as you are asked to reboot as part
of the AltaVista Firewall for NT installation.
3. RAS
If you plan to use NT's Remote Access Service (RAS) connect
your firewall to your Internet Service Provider (ISP), you
need to fill in your external network address in the network
configuration step of the installation. If your external
network address is dynamically assigned by the ISP, use the
firewall graphical user interface (GUI) to reconfigure the
firewall external address after the installation.
4. Installation
During installation, you are instructed to install a filter
driver. If you are using a dial-up connection via RAS or any
local area network other than Ethernet (for example, FDDI or
token ring) to the Internet, you need to skip the step that
installs the filter driver.
E. Release Notes
1. Secure Socket Library (SSL) Support
The Web proxy includes support for SSL. The SSL requests and
responses are proxied through the same port as HTTP traffic.
Users in the firewall environment must define the security proxy
port to be the Web proxy port.
2. Web Proxy Startup Time
The Web proxy does not show a startup time. If the Web proxy
shows a stopped state, check to see if all the Web proxy
configuration fields have the correct syntax.
3. Web Proxy Log
For performance reasons, the Web proxy writes to the log file
every two minutes. Stopping the Web proxy will automatically
trigger the logs to be written to the log file.
4. Stopping Firewall Services
On the Alpha platform, you may sometimes see a warning message
when you stop the firewall services. You can ignore this
warning message.
5. Firewall Proxy State
There may be a delay before the firewall proxies' state
information is refreshed. Clicking on the check box for
Related Firewall Services, or closing and re-opening the
Firewall Management GUI refreshes the proxies' state
information.
6. Starting/Stopping Multiple Firewall Proxies
There may be a delay when starting or stopping multiple
firewall proxies.
7. System Background Color
The firewall alarm system uses the system background color as
one of the ways to reflect the firewall status. The installation
procedure removes any wallpaper that is set. The firewall
administrator should not set a wallpaper background because
the wallpaper would cover the system background color.
8. Reinstalling News or generic TCP proxies
If you need to reinstall the firewall, you may have problems
redefining the news or generic TCP proxies that may have been
defined previously. You should check the images in the \dfw\bin
directory, and delete the previous news.exe or proxy images that
match the service names you are trying to define.
9. CryptoCard Support
If you use CRYPTOCard user authentication tokens, follow the
instructions in the firewall authentication programming screen
and the operation and system guide that comes with the token.
The programming steps generate an eight digit checksum on the
token. The first six digits should match the checksum displayed
in the firewall authentication programming screen.
10. Deinstallation
When you deinstall the remote management tunnel, the following
keys are not properly deleted:
HKey_Local_Machine\\system\\CurrentControlSet\\services\\Deccore
HKey_Local_Machine\\system\\CurrentControlSet\\services\\Decps3x
HKey_Local_Machine\\system\\CurrentControlSet\\services\\Itnd
Run regedt32 to delete these keys. If you do not delete these
keys, the tunnel will not reinstall.
F. Remote Management Instructions
Remote Management for the AltaVista Firewall for NT allows
an administrator to:
o View the status of proxies and related services
o Start/stop proxies and related services
o Change the firewall status
For other management functions, you must use the local user
interface.
Remote Management requires a Java and Frames-capable
Web Browser. Netscape 3.01 or Internet Explorer 3.01
are recommended.
Remote Management is not currently available on Windows
NT/alpha. A tunnel client is available for remote management
for Windows95 and Windows NT Intel.
Remote Management depends on the Java-based application
FwServer running on the firewall. The program
\dfw\bin\StartFwServer.exe launches this application.
StartFwServer is put in the startup group by the installation
process. Currently an administrator must be logged on for
this process to start.
Access to Remote Management is limited to administrators
using secure channels. The Windows NT User Manager can
be used to create administrator accounts. Secure Channels
can be created from the local user interface by clicking
on the remote tab. Only one secure channel can be used
at a time.
The Remote Management Server uses port 5000. The Remote
Management Web Server uses port 8314. These ports should
not be used for Generic Proxies.
Unless you add an alias to your dns files, you should connect
to the tunnel IP address of the firewall. You cannot connect via
the firewall domain name (for example,
http://192.160.1.200:8314).
The event frame (at the bottom of the remote management
page) provides information about important firewall events
such as alarms, and state changes. Currently some events
are missing detailed information.
At times it may be necessary to click reload to update the
Remote Management display.
If the Remote Management page shows an access denied error,
and the event frame is empty, or shows an error, then there
may be a problem accessing the file \dfw\htdocs\eventmsg.html.
Stopping and restarting the remote management web server
should clear the problem.
When changing the Firewall status remotely using an HTML form,
some browsers display a security warning when using HTML
forms. Since remote management access to the firewall is
via a secure channel, all data is encrypted and this warning
does not apply.
G. Copyright Notice
Embedded Proxy Server Portions Copyright(c) 1996 Process Software
Corp. All rights reserved.Portions Copyright(c) 1996 MetaInfo, Inc.
All rights reserved. Portions Copyright(c) 1995 Corporate Computer,
Inc. All rights reserved.
MetaInfo, Inc. and its suppliers retain all right, title and
interest in and to this software and all components thereof,
including without limitation all patents, copyrights, trademarks
and trade secrets. Other than as set forth in the end user
license agreement, this software may not be copied, modified or
distributed. Additional rights and restrictions are set forth in
the end user license agreement included with the software.
Portions Copyright(c) 1989 The Regents of the University of
California. All rights reserved.
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided
with the distribution.
3. All advertising materials mentioning features or use of this
software must display the following acknowledgment: "This
product includes software developed by the University of
California, Berkeley and its contributors."
4. Neither the name of the University nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONDEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
H. Comments and Suggestions
Thank you for using AltaVista Firewall for NT. Your comments and
suggestions help us improve the quality of our software and
publications.
Please send your comments to:
[email protected]
(c) Digital Equipment Corporation 1997. All rights reserved.
[Posted by WWW Notes gateway]
| |||||
| 1896.2 | Any news for the BSD version ? | BIS50::BOKOR | Big Browser | Fri Mar 28 1997 01:57 | 0 |
| 1896.3 | what is the highest DU version supported ? | BACHUS::ROELANDTS | Wa d'es ma da ve ne stuut | Fri Mar 28 1997 10:57 | 13 |
Hello,
Having down loaded the kits I'm wondering something : on which
version(s) of Digital Unix can this kit be installed ? The versions
stated in .0 are not the same as the ones mentionned in the
AFWU300_EFT_inst_guide.ps on pg 1-3. So which one is correct ? Will
V3.0 be supported on the current shipping version of DU (V4.0B) or not?
Regards,
Guy
| |||||
| 1896.4 | print install guide ? | PRMS00::COLE | Tue Apr 01 1997 09:12 | 8 | |
Has anyone successfully printed the Installation Guide?
It dies after about 5 pages on an LN17 !
How about making a .pdf version available ?
...larry
| |||||
| 1896.5 | Printed fine for me | PMESD::BEABES | Tue Apr 01 1997 11:07 | 5 | |
Larry It is a .PDF file in the Ntfwdocs.zip Ernie | |||||
| 1896.6 | PLEASE ENSURE Customers sign an NDA and Beta Agreement | NETRIX::"[email protected]" | tim | Tue Apr 01 1997 12:24 | 13 |
Please note that if you intend to provide the Beta kit #2 to your customer you must ensure that the customer has signed an NDA and the Beta agreement. Details from the Firewall Product Manger Philippe Der Arslanian. If you intend to use this kit within Digital you don't need the NDA obviously. Sorry for the omission. [Posted by WWW Notes gateway] | |||||
| 1896.7 | new admin guide; exarc approval ? | SEAWLF::COLE | Digital NSIS, Greenbelt, Maryland | Mon Apr 07 1997 15:57 | 14 |
Tim,
1) Are there any pre-publication copies of the new
Administrator's Guide available yet ?
2) Are any Digital Corporate sites using AFWU 2.0/3.0
on their ISP connection ? (ie, has the EXARC committee
blessed it ?)
thanks,
...larry
| |||||
| 1896.8 | AFWU used in Europe | NETRIX::"[email protected]" | Jan-Erik Pedersen | Thu Apr 10 1997 07:15 | 8 |
We are using AFWU (2.1) at two corporate gateways in Europe in Reading & Munich, in Valbonne we still use the SEAL setup. The EXARC approval is for the gateway and not for the software which means we could as well use TIS or any other software if we found it usefull. [Posted by WWW Notes gateway] | |||||
| 1896.9 | CHEFS::zkodhcp-29-48-237.zko.dec.com::PITT | Gone with the winsock ... | Fri Apr 18 1997 13:33 | 10 | |
Surely the EXARC proposal had some technical specification associated with it, so it can't be quite true that you could use anything... At least it must be capable of doing a particular set of things. For example, I don't think you could use a filtering router as the firewall ... Still, I'm sure you're right that V2.1 to V3.0 won't be an issue. T | |||||