Gulrez,
 
it depend of the fw platform you are using.
 
On NT, it must be copied to system32 directory.
On UNIX, it must be copied to /var/ace directory. If /var/ace does not exit, you must create it.
 
On ACE/Server, you must create a client witch is your FW. Also, you need to activate users or group of users on that client.
 
If you need some help for define clients or activate users, please, let me know.
 
 
Victor Barrientos
[EMAIL PROTECTED]
Tivoli certified Consultant
RSA Security Certified RSA ACE/Server Engineer
Tel: 54-11-4819-3903
Fax: 54-11-4811-7103
  Telef�nica
      unifon
www.unifon.com.ar
 
 
 
 
----- Original Message -----
Sent: Thursday, July 27, 2000 5:15 PM
Subject: RE: [FW1] ACE -URGENT

Hi Victor,
 
Where would you put the sdconf.rec file on the FW ?
 
I was going through the authentication tab for defining user authentication on the firewall and when I select from the pull down menu "SecurID", it shows that there are no specific settings for it on the firewall. Now as I understand from your comments and after reading the RSA paper is that the FW has the ACE/Agent embedded in it. The only thing that I need to define is that on the ACE server itself and copy that sdconf.rec file over to the FW, is this correct?

Gulrez Jamadar
Lucent NetworkCare
Network Systems Engineer
CCNA,MCSE,CNE
1500 Broadway, Suite 808,
NY, NY 10036

Page- 1-800-453-6775
Tel- 1-212-398-5650 x382

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Victor Barrientos
Sent: Thursday, July 27, 2000 10:44 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [FW1] ACE -URGENT

Hi gulrez
 
1. You don�t need to install software on each FW. ACE/agent is embedded in FW-1.  The only  thing you need is copy sdconf.rec file from ACE/Server to FW-1 and select in FW object properties, SECURID as a authentication scheme allowed.
Then, in ACE/Server, you need to define your FW as a ACE/Server Client.
 
2. You can avoid the burden of maintaining multiple user databases by defining a user
named “generic*” whom FireWall-1 treats in a special way. FireWall-1 applies the restrictions specified in the User Properties window (for example, Allowed Sources), but for authentication purposes, uses the name typed in by the user instead of “generic*.” In this way, the external authentication server “sees” the user’s real name and authenticates him or her accordingly.
You can use the generic user feature as follows:
    1 Define a user group named SecurIDUsers (for example).
    2 Define a user named generic* as a member of SecurIDUsers.
    3 Specify SecurID as the Authentication Scheme for generic*.
    4 Add a rule to the Rule Base similar to this:
    Source                     Destination     Services     Action          Track        Install On
    SecurIDUsers@Any      tower           telnet     UserAuth     Long Log     Gateways
 
    5 Install the Security Policy.
 
 
NOTES ABOUT USING GENERIC* USER
 
- By using this feature with an external server, you disable VPN-1/FireWall-1’s
ability to detect invalid user names.
The responsibility of authenticating the user is passed to the external
server. You will only get an alert or log if the authentication fails on the
external server. Without this option, it is possible to get an alert or log
when an invalid user name is entered.
- By default, all the users defined in the external server are allowed access.
There is no way to treat the users differently (but see item 3 below). The
System Administrator should carefully consider the implications of allowing
this blanket access.
- If you wish to deny access to a specific user, define that user in the VPN-1/
FireWall-1 User Database and set the user’s Authentication Scheme to
Undefined.
- To disable this feature, delete generic* from the VPN-1/FireWall-1 User
Database, or set generic*’s Authentication Scheme to Undefined.
- This feature does not work with the S/Key and VPN-1/FireWall-1 Password
Authentication Schemes.
The user generic* will always fail S/Key and VPN-1/FireWall-1 Password
authentication, because these schemes are implemented directly by VPN-1/
FireWall-1 and not by external servers, so their users must be defined in
the VPN-1/FireWall-1 User Database.
Nevertheless, there is still an advantage to be gained by defining a user
generic* with the VPN-1/FireWall-1 Password Authentication Scheme. An
attacker who guesses at a user name will not see the error message
“unknown user.” Instead, the attacker will see a message indicating that
the authentication failed, and will not know whether it is the name or the
password that is invalid.
- generic* cannot be used as the name of a real user.
 
Best regards,
 
Victor Barrientos
[EMAIL PROTECTED]
Tivoli certified Consultant
RSA Security Certified RSA ACE/Server Engineer
Tel: 54-11-4819-3903
Fax: 54-11-4811-7103
  Telef�nica
      unifon
www.unifon.com.ar

Reply via email to