Firewall Clustering


High Availability Firewalls (Active / Active or Active /Passive )

Firewall high availability option provide option to install two firewalls in a same network with fail over feature. Therefore to achieve this target , we need to install two firewalls with same configuration and with same software and firmware updates. Further in this nature, in every time one firewall should be online mode and the other one should be in standby mode. when the online firewall went down, the standby firewall should be automatically switch with the process and need to continue the firewall requirement. This second firewall will handle the process till the first firewall start its duty. When the first (master) firewall comes online again, automatically second firewall will go to standby mode again. This process can identify as firewall fail over handling or firewall clustering.

When we consider high availability or firewall clustering configuration, both firewalls having same IP address and one is in online mode and the other one is in standby mode. The online firewall become as the primary firewall and the standby firewall become as the secondary firewall. This primary and secondary relationship is dynamic relationship. Because either first firewall or second firewall can be the primary firewall as well as the secondary firewall. No matter what, they are in fail over configuration and so each firewall can easily switched with the process.

As I mentioned earlier, in fail over configured network , the secondary or standby firewall always take care of the status of primary or online firewall. If it detect the primary firewall is no longer active , standby firewall become the primary firewall. While the fail over occurs , the standby firewall will take the responsibility of active firewall duty and will handover
  

www.firewalltips.bloggspot.com



Firewall Authentication Methods


Most of firewalls can support more than one authentication servers such as :
• Internal firewall database
• RADIUS
• SecurID
• VASCO
• Generic LDAP (Lightweight Directory Access Protocol)
• Active Directory


Further if you use an authentication server , you must have the accessibility from the firewall to the authentication server. That is the main requirement of configuring it correctly.

Use the Firewall Authentication Server

Most of firewalls can maintain its own user credential database within it. Therefore no need to have a separate authentication server here and according to the urgency you can implement separate secondary database. Moreover, you should follow these steps to implement firewall authentication server.

• Divide your company into groups according to tasks people do and information they need
• Create users for the groups
• Assign groups and users to policies

Third-party Authentication Servers

The procedure to configure the  device to use a third-party authentication server is similar for each of the supported server types. Before you configure your authentication server:

• You must have the configuration information for your server such as server port, IP address, and shared secret. If you use Active Directory or LDAP, you must also know the group membership attribute and Distinguished Name (DN) of the Organizational Unit (OU) that contains the user accounts.
• If it is available, you can configure the  device with a backup authentication server to contact if it cannot connect to the primary authentication server.
• The  device must be able to connect to the authentication server(s).

RADIUS Authentication Servers

Remote Authentication Dial-In User Service (RADIUS) authenticates the local and remote users on a company network. RADIUS is a client/server system that keeps the authentication information for users, remote access servers, VPN gateways, and other resources in one central database.

The authentication messages to and from the RADIUS server always use an authentication key. This authentication key, or shared secret, must be the same on the RADIUS client and server. Without this key, hackers cannot decrypt the authentication messages. Note that RADIUS sends a key, and not the password the user typed, during authentication. For web and MUVPN authentication, RADIUS supports only PAP (not CHAP) authentication. For authentication with PPTP, RADIUS supports only MSCHAPv2. To use RADIUS server authentication with the firewall device, you must:

• Add the IP address of the device to the RADIUS server, as described in the RADIUS vendor
documentation.
• Enable and specify the RADIUS server in your device configuration.
• Add RADIUS user names or group names to the policies in Policy Manager.
VASCO server authentication also uses the RADIUS configuration user interface.


SecurID Authentication Servers

To use SecurID authentication, you must configure both the RADIUS and ACE/Server servers correctly. Each user must also have an approved SecurID token and a PIN (personal identification number). Refer to the RSA SecurID instructions for more information.

LDAP Authentication Servers



You can use an LDAP (Lightweight Directory Access Protocol) authentication server to authenticate your users to the device. LDAP is an open standard protocol for using online directory services, and it operates with Internet transport protocols, such as TCP. Before you configure your device for LDAP authentication, make sure you check your LDAP vendor documentation to see if your installation


-sensitive attributes.

When you configure the device to use LDAP authentication, you must set a search base to limit the server directories in which the device searches for an authentication match. The standard format for the search base setting is: ou=organizational unit,dc=first part of distinguished server name,dc=any part of the distinguished server name appearing after the dot. For example, if your user accounts are in an OU (organizational unit) you refer to as accounts and your domain name is example.com, your search base is:

ou=accounts,dc=example,dc=com.


Active Directory Authentication Servers

Configuring the device to use Active Directory authentication is similar to the process for LDAP authentication. You must set a search base to limit the server directories in which the device searches for an authentication match. The standard format for the search base setting is the same as the LDAP format. You can add multiple Active Directory domains for user authentication, and add a primary and a backup Active Directory server for each domain.

If you use Active Directory for your authentication server, you can also configure Single Sign-On (SSO). SSO is a method of network access control that allows a user to enter credentials once to gain access to many resources. 

Users log in to the Windows domain controller, which then passes the credentials to the SSO Agent. The device automatically sends authentication requests to the SSO Agent when users try to connect to resources outside their own network.


 

 

No comments:

Post a Comment