Configuring ScreenOS Firewall
Ivanti Policy Secure can utilize a ScreenOS device as a policy enforcement point to work as a Layer 3 Enforcer. When the ScreenOS device is configured to work as an enforcer with Ivanti Policy Secure, the following takes place:
-
Ivanti Policy Secure provisions resource access policies.
-
Screen OS device gets the user's role membership information from authentication table entries that are sent by Ivanti Policy Secure when the user authenticates with the Ivanti Policy Secure or when the user tries to access resources through ScreenOS.
-
ScreenOS device does a policy lookup in resource access policies, which is sent by Ivanti Policy Secure and accordingly takes allow/deny decisions.
Configuring ScreenOS as an Enforcer
You can configure basic Infranet auth Enforcer policies that specify a source zone and a destination zone on the Ivanti Policy Secure Series device and then push the policies to the ScreenOS Enforcer to add additional policy details, or you can use the ScreenOS Enforcer to configure the policies with the CLI or Web UI. We recommend that you use the Ivanti Policy Secure Series device to set up the policies for source IP enforcement on the Infranet Enforcer.
Before setting a policy, you must create address book entries for the destination and source addresses unless you use address book entries that already exist, such as Any.
The following example, sets an Infranet auth policy and adds it to the top of the list of policies. The policy allows all traffic of any type from any host to another host. The policy allows traffic according to the Infranet Enforcer resource access policies that you configure on the Ivanti Policy Secure Series device.
set policy top from untrust to trust any permit Infranet-auth
The following example sets two address book entries and a policy between them for anyone in the 10.64.0.0/16 range can reach the 10.65.0.0/16 range.
set address Trust "10.64 Range" 10.64.0.0 255.255.0.0
set address Untrust "10.65 Range" 10.65.0.0 255.255.0.0
set policy from trust to untrust "10.64 Range" "10.65 Range" any permit Infranet-auth
You can use Route mode or Transparent mode to configure a Juniper Networks ScreenOS Enforcer. By default, the ScreenOS Enforcer operates in Route mode. For more information on ScreenOS, see the ScreenOS Reference Guide.
Configuring the ScreenOS in Route Mode
The Ivanti Policy Secure can reside on trust/untrust interface side of the Infranet Enforcer. If Ivanti Policy Secure resides on the trust interface side, and users come in through the untrust interface, the administrator must configure a policy (untrust to trust) on the Infranet Enforcer that allows traffic to pass between Ivanti Policy Secure and Ivanti Secure Access Client. By default, Infranet Enforcer traffic from the untrust interface to the trust interface is denied.
The following procedure describes the setup with Ivanti Policy Secure on the untrust interface side (same side as users).
To configure an Infranet Enforcer in Route mode:
-
Set up the trust interface. The trust interface connects to the protected resource. The untrust interface connects to Ivanti Policy Secure. Set the following interface (ethernet1/1) settings:
-
Set routing
-
Enable management of the following services:
-
SSL
-
SSH
-
IP (options)
-
-
-
Ensure that the DHCP server is disabled or enabled, as appropriate for the deployment.
-
Import the certificate of the CA that signed Ivanti Policy Secure's server certificate into the Infranet Enforcer.
-
If you set up an NSRP cluster before you import the CA certificate into the Infranet Enforcer, the CA certificate is automatically synchronized to all Infranet Enforcers in the cluster. However, if you set up the NSRP cluster after you import the CA certificate, you must manually synchronize the certificate to the other Infranet Enforcers in the cluster by typing the following CLI command:
exec nsrp sync pki
You cannot load the self-signed SSL certificate into the Juniper security device.
The certificate of the CA that signed Ivanti Policy Secure's certificate must be imported on the Infranet Enforcer because the Infranet Enforcer must be able to trust Ivanti Policy Secure during an SSL session. When a user signs into a server by means of SSL, the server displays a dialog box in which the user can manually accept the certificate that is associated with that server. For the Infranet Enforcer to skip that manual step and automatically accept Ivanti Policy Secure's certificate, the Infranet Enforcer must have the certificate of the CA that signed Ivanti Policy Secure's certificate.
-
Create an instance of Ivanti Policy Secure on the Juniper security device.
-
Enable SSH.
-
Verify routing from Ivanti Policy Secure to the untrust interface.
-
Ensure that both the Infranet Enforcer and Ivanti Policy Secure have the correct time. If possible, use a Network Time Protocol (NTP) server to set the date and time of both appliances.
Creating a Route based interface with ScreenOS
When an interface is in route mode, the security device routes traffic between different zones without performing source NAT.
To create a Ivanti Policy Secure instance on ScreenOS, you must configure the following items:
-
IP address or hostname of Ivanti Policy Secure
-
Password to use when the Infranet Enforcer uses NACN to contact Ivanti Policy Secure
-
Source interface
-
CA index number (ca-idx)
You can set these items using the Web UI or the CLI.
In the following procedure, you first set interface management options and disable the DCHP server option. Then you enable SSHv2 and configure an Ivanti Policy Secure server named controller1. Next, you set the host IP address, which is the IP address of the server, to 10.64.12.1. The NACN password is 8!JsP37cK9a*_HiEwe. The NACN password must match the NACN password that you entered for Ivanti Policy Secure server. The source interface is the interface that the Infranet Enforcer uses to communicate with Ivanti Policy Secure, and the CA index number is 001.
For this example, the source interface is ethernet 1/1. For a descriptive list of CA index numbers by typing the following command at the ScreenOS CLI:
get ssl ca-list
To change SSH versions, delete SSH settings by typing the following CLI command:
delete ssh device all
When you use the Web UI, you do not need to fill in the Full Subject Name of Ivanti Policy Secure Cert field. If you do fill it in, be sure to enter the entire certificate subject. For example:
CN=ic1.sample.net,CN=14087306185,CN=06990218,OU=Software,O=Comp,S=CA, C=US
To create the instance using the Web UI:
-
Select Network > Interfaces > Edit > Services from the left navigation bar to set management options.
-
Select Network > DHCP > Edit to disable the DHCP server for both interfaces (Trust and Untrust).
-
Select and load the CA if you have not already done so.
-
Select Objects > Certificates.
-
Click Browse to find and select the certificate. Then click Load.
-
Select CA from the show list.
-
Click Server Settings and make sure Check Method is set correctly for the certificate you are using.
-
Click OK.
-
Create Ivanti Policy Secure instance.
-
Select Configuration > Infranet Auth > Controllers (List) > New.
-
Type controller1 in Ivanti Policy Secure instance box.
-
Type IP/domain name: 10.64.12.1 in the IP/Domain Name box.
-
For the NACN Parameters, select ethernet1/1 from the Source Interface list.
-
Type 8!JsP37cK9a*_HiEwe in the Password box.
-
Select the CA from the Selected CA list.
-
Enable SSH version 2.
-
Select Configuration > Admin > Management > Enable SSH (v2).
To create the instance using the CLI, type the following commands:
set interface ethernet1/1 manage ssl
set interface ethernet1/1 manage ssh
set interface ethernet1/1 manage ip
set interface ethernet2/1manage ping
set interface ethernet2/1 dhcp server disable
set interface ethernet1/1 dhcp server disable
delete ssh device all
set ssh version v2
set ssh enable
set infranet controller name controller1 host-name 10.64.12.1
set infranet controller name controller1 password 8!JsP37cK9a*_HiEwe
set infranet controller name controller1 src-interface ethernet1/1
set infranet controller name controller1 ca-idx 001
save
Configuring the ScreenOS in Transparent Mode
The ScreenOS device is usually installed between a core router and an access distribution device in a transparent mode. The services are enabled at the zone level, and VLAN1 is used for management.
Transparent mode permits you to implement the following functionality:
-
The device can act as a Layer 2 forwarding device, such as a bridge.
-
You can control traffic flow between Layer 2 security zones by defining policies.
To configure a ScreenOS Enforcer in Transparent mode:
-
Set up Transparent mode using the predefined security zones, v1-trust and v1- untrust.
-
Assign interfaces to v1-trust and v1-untrust.
-
Configure the IP address for a source interface to establish connectivity with Ivanti Policy Secure. You can use V1-trust, V1-untrust, or V1-dmz.
-
Configure the broadcast mechanism to flooding (default) or ARP/traceroute. ARP/trace-route is more secure than broadcast.
-
Enable management of the following services for VLAN1:
-
SSL
-
SSH
-
Web (optional)
-
-
Set up the Juniper Networks security device zones. The protected resources can be in either zone (v1-trust or v1-untrust) as long as the protected resources are in a zone different from the endpoints.
Ivanti Policy Secure can also reside in either zone. If Ivanti Policy Secure resides in a zone different from the endpoints, configure a policy that allows traffic to the endpoints through the ScreenOS Enforcer. -
Import the certificate of the CA that signed Ivanti Policy Secure's server certificate into the ScreenOS Enforcer.
Do not import Ivanti Policy Secure SSL certificate into the Juniper Networks security device. -
Create an instance of Ivanti Policy Secure on the ScreenOS Enforcer.
-
Enable SSH.
-
Verify routing from Ivanti Policy Secure to the V1-untrust zone.
To use IPsec enforcement with a ScreenOS Enforcer in Transparent mode, you might need to configure a source interface policy on Ivanti Policy Secure. -
Ensure that both the Infranet Enforcer and Ivanti Policy Secure have the correct time. If possible, use a Network Time Protocol (NTP) server to set the date and time of both appliances.
Creating a Transparent Mode instance on the ScreenOS
To create a Ivanti Policy Secure instance in transparent mode, use the CLI to perform the following actions:
-
Assign all interfaces to Layer 2 zones.
-
Assign an IP address to vlan1 and set the route command.
-
Set interface management options.
-
Configure a Ivanti Policy Secure instance named controller1.
-
Set the host IP address, which is the IP address of Ivanti Policy Secure, to 10.64.12.1.
-
Enter the NACN password. The NACN password is 8!JsP37cK9a*_HiEwe. The NACN password must match the NACN password that you entered for Ivanti Policy Secure.
-
The source interface, vlan1, is the interface that the Infranet Enforcer uses to communicate with Ivanti Policy Secure. The CA index number is 001. For a descriptive list of CA index numbers type the following CLI command: get ssl ca-list
You can use the following sample configuration to create the instance using the CLI.
For the firewall to operate in Transparent (Layer 2) mode, all interfaces must be in a Layer 2 zone, such as v1-trust or in the null zone. Interfaces cannot remain in a Layer 3 zone
set interface eth1 zone v1-trust
set interface eth2 zone v1-untrust
set interface vlan1 ip 10.64.12.x
set interface vlan1 route
set interface vlan1 ip manageable
unset interface vlan1 manage ping
unset interface vlan1 manage telnet
unset interface vlan1 manage snmp
unset interface vlan1 manage web
set infranet controller name controller1 host-name 10.64.12.1
set infranet controller name controller1 password 8!JsP37cK9a*_HiEwe
set infranet controller name controller1 src-interface vlan1
set infranet controller name controller1 ca-idx 0001
Verifying the Ivanti Policy Secure Configuration on ScreenOS Enforcer
You can view the configuration of a Ivanti Policy Secure instance through the Web UI and the CLI. You can view the following information:
-
Name of Ivanti Policy Secure instance
-
IP address or domain name of Ivanti Policy Secure
-
Port number (Default 11122)
-
Timeout (60 seconds by default)
-
Source interface
The Web UI also allows you to view the NACN password.
Web UI
To view configuration information on the Web UI select the following:
-
Configuration > Infranet Auth > Controllers from the left navigation bar.
-
Configuration > Infranet Auth > General Settings from the left navigation bar.
CLI
To view configuration information at the CLI, type the following command:
get infranet controller name controller1