Licenses and Services
The TOE does not have general computing capabilities, other than the services required for the operation, administration, and support of the TOE. In the evaluated configuration, the TOE has only the following licenses installed: DNS, DHCP, Microsoft Management, DNS Cache Acceleration, and Query Redirection. It does not have the Multi-Grid Management license installed. For more information about licenses, see Managing Licenses.
The following services are disabled by default in the Common Criteria evaluated configuration and no claims are made regarding their function:
- bloxTools
- MGM (Multi-Grid Management)
- HSM (Hardware Security Module) Signing
- Support access
- Remote console access
Installing additional licenses or enabling any of the listed services may result in a non-compliant system.
RADIUS or TACACS+ Authentication Through IPsec Tunnel
From NIOS 8.5.2, you can configure the RADIUS or TACACS+ authentication traffic to route through the IPsec tunnel. The RADIUS or TACACS+ authentication server must support the IPsec service, firewall, and NAT. This section details the steps to configure RADIUS or TACACS+ authentication using strongSwan software for the IPsec-based VPN solution. To configure the authentication, you must install strongSwan, and then start the service. You can install strongSwan either from source code using a TAR file or an RPM file.
Configuring the Authentication Using a strongSwan TAR File
To configure the RADIUS or TACACS+ authentication, perform the following steps:
Download the .tar.gz file of strongSwan version 5.5.2 or later and install it on the RADIUS or TACACS+ server.
For example, if you download thestrongswan-5.9.0.tar.gz
file from the strongSwan - Download page, you must run the following commands to install strongSwan:tar -xzf strongswan-5.9.0.tar.gz
cd strongswan-5.9.0
./configure
make
make install
Start the strongSwan service using the following command to enable the IPsec service on the authentication server:
ipsec start
Note
ipsec
is the name of the strongSwan service that is installed from the source code.- Configure the following server configuration files available in the specified paths:
- /usr/local/etc/ipsec.conf
Example:conn <connection name>
authby=secret
auto=route
keyingtries=1
keyexchange=ike
left=<server IP>
right=%any
type=tunnel
- /usr/local/etc/ipsec.secrets
Example:# ipsec.secrets - strongSwan IPsec secrets file
<server IP> : PSK "<server shared secret>"
- /usr/local/etc/ipsec.conf
- Add the iptables rules using the following commands to configure the firewall rules:
iptables -I INPUT 1 -p udp --dport 500 --j ACCEPT
iptables -I INPUT 1 -p udp --dport 4500 --j ACCEPT
iptables -I INPUT 1 -p esp -j ACCEPT
Configuring the Authentication Using a strongSwan RPM File
To configure the RADIUS or TACACS+ authentication, perform the following steps:
Download and install a binary RPM of strongSwan version 5.5.2 or later.
For example, if you download thestrongswan-5.8.2-5.fc32.x86_64.rpm
file from the RPM repository, you must run the following command to install the .rpm package:rpm -ihv strongswan-5.8.2-5.fc32.x86_64.rpm
Start the strongSwan service using the following command:
strongswan start
Note
strongswan
is the name of the strongSwan service that is installed from the binary RPM package.- Configure the following server configuration files available in the specified paths:
- /etc/strongswan/ipsec.conf
- /etc/strongswan/ipsec.secrets
- /etc/strongswan/ipsec.conf
- Add the iptables rules using the following commands to configure the firewall rules:
iptables -I INPUT 1 -p udp --dport 500 --j ACCEPT
iptables -I INPUT 1 -p udp --dport 4500 --j ACCEPT
iptables -I INPUT 1 -p esp -j ACCEPT