Monday, 2010-11-15

*** nowen (~nowen@adsl-176-210-205.asm.bellsouth.net) has joined #wikid13:57
*** cmatthews_ (d8ed3803@gateway/web/freenode/ip.216.237.56.3) has joined #wikid15:15
cmatthews_Nick, trying to apply the information here http://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-configure-ias-to-support-two-factor-authentication/?searchterm=ias to a win2008 NPS server... You think I can run questions by you as I'm trying to configure this?15:16
cmatthews_The configuration process seems quite different.15:16
nowenhold on. I have one for nps15:18
cmatthews_nice15:18
nowenhttp://www.networkworld.com/news/2010/050710-two-factor-authentication-through-windows-server.html15:19
nowenI need to put it on the site15:19
cmatthews_Should still work with the checkpoint clients, nps, radius, wikid.. etc.. I mean using win2008 nps..15:20
cmatthews_That was somehow a question hope you get my meaning....15:20
nowenyes, because it should all be radius15:20
cmatthews_The ip address of your remote access server (RAS, VPN, etc) and create a shared secret. You will enter the same shared secret on the WiKID server.15:23
cmatthews_Is this the wikid server?15:24
nowenis this on nps?15:24
cmatthews_Yeah first step in the client radius setup.15:25
nowenit should go:  vpn ---> nps/ad --> wikid15:25
nowenso the vpn gets the ip of nps, the wikid server gets the ip of the nps too15:25
noweni need to upload mine. it has pictures ;)15:26
cmatthews_So in NPS the radius client configuration IP address, that is the wikid servers IP, it seems.15:26
nowenhmm15:27
nowenI think the vpn is the client and wikid is the server15:27
nowen"Next we add a new RADIUS Client - The SSH Gateway in this case."15:27
nowenso that would be the vpn or whatever service15:27
nowen"Add a new Radius Server - The WiKID Strong Authentication Server"15:28
cmatthews_We have 400 VPN's, would that mean we would need 400 defined radius clients?15:28
nowenugh.  yes.15:28
cmatthews_ouchie... but whatever works.15:28
cmatthews_I'll start with 1... shall we... ahahah15:29
nowenyou know, someone is working on a script to mass add network clients to WiKID15:29
nowenbut it sounds like you need to add them to NPS15:29
cmatthews_yeah.. nps has an import/export I'll check it out after I get 1 working.15:29
nowennice15:39
cmatthews_Start by installing PAM Radius. ... This needed? Seems redundant.15:49
nowenno - that tutorial is specifically for ssh.  for vpns that is not needed15:50
cmatthews_figured15:55
*** drhex (~Admin@76.70.9.182) has joined #wikid16:04
drhexanyone here?16:05
nowenyep16:05
drhexhi Nick16:05
nowenhmm?16:06
*** MRicketts (d8ed3803@gateway/web/freenode/ip.216.237.56.3) has joined #wikid16:06
MRickettsNick, I'm setting up the "Net work Client" for Check Point and I'm at the point where it is telling you to go to the Network Client Tab.  This appears to be for older versions of Check Point.  Is this now a User?16:08
MRickettsBTW, I'm working with CMatthews on this.16:08
nowenupi16:08
nowenerp16:08
nowenyou're on the WiKIDAdmin ?16:09
MRickettsIn the Check Point interface.16:09
MRickettsI created the Raduis server and Raduis auth service16:09
MRickettsDo you offer a paid implementation service?16:10
nowenMRicketts: not too often, but we have  we don't do checkpoint16:11
nowenso, we can't be too hands on.  we prefer to help you work through it16:12
MRickettsThat's fine.  Thanks.16:12
nowenMRicketts: ok - so you are adding WiKID to the checkpoint? I thought that the checkpoint was going to talk to NPS? or is this just a test?16:12
MRickettsThat is correct.16:13
nowenok, so on the checkpoint what are the options to add a 3rd party radius server?16:14
MRickettsAll the steps in the link provided on your site were good up until "Next we add a specific network client for the Checkpoint firewall/vpn:"  In the newer versions of Check Point, there is no Network Client tab.  I'm wondering if this should be a user?16:16
nowenaah - not that is on the WiKID server16:16
nowenthe checkpoint (or nps eventually) will be a network client on wiki16:17
nowend16:17
MRickettsAH.  I saw that part the step above, but failed to relate that I shouldn't switch back to Check Point.  My bad.  Thanks.16:17
nowenit's a bit nebulous16:18
MRickettsAnd for clarity, I need a rule in the firewall that allows the client to talk to the NPS, correct?16:19
nowenwhich client?16:19
MRickettsFirewall client16:19
nowenthe VPN client?16:19
MRickettsYes16:20
MRickettsVPN client16:20
nowenno, the VPN client will still just talk to the vpn server/firewall.  The only thing the nps is doing is authentication16:20
nowenso, the username and OTP will come to the checkpoint and the checkpoint will proxy them to NPS, which will proxy them to WiKDI16:21
nowenthose  machines need to be able to talk radius over UDP 1812, but not the vpn client16:21
*** drhex has parted #wikid (None)16:48
cmatthews_The checkpoint enpoint connect VPN client application... Do I set it up to perform authentication differently in order to process the token?16:53
cmatthews_SecurID - Software Token16:53
cmatthews_is an authentication method choice...16:53
nowenno, that's proprietary to rsa16:53
nowenall you want is radius16:54
nowenhowever, the WiKID token does need to talk to the WiKID server over port 8016:54
nowenthe WiKID ip address can be NAT'd16:54
cmatthews_What I'm at a loss for at the moment is how to configure the client application to accept the token.16:54
cmatthews_It has 6 authentication methods available right now16:55
cmatthews_but none of them are radius16:55
cmatthews_CAPI, P12, Pinpad, KeyFOb, Software Token, and Challenge Response.16:55
cmatthews_The method we currently use is Username and password...16:55
cmatthews_no token..16:55
nowenis this on the vpn client or on the checkpoint?16:56
cmatthews_the client application16:56
nowenyou will probably still use username and password16:56
cmatthews_got ya16:56
nowenbut instead of a static password,  use the OTP16:56
cmatthews_The token16:57
cmatthews_?16:57
nowenthe One-time passcode16:57
cmatthews_interesting...16:57
cmatthews_ok16:57
cmatthews_the pices of this seem to fit together so loosely I will be amazed if it works ... really seems like I am missing something.. heh16:58
nowenhehe16:58
nowenno, it just works.16:58
cmatthews_I mean "works" based on what I have configured so far.16:58
nowenwell, it is a lot of moving pieces.16:58
nowenand many of those pieces are both 'servers' and 'clients' ;)16:59
nowenthe NPS is a server to checkpoint and a client to WiKID.16:59
*** drhex (~Admin@76.70.9.182) has joined #wikid17:24
cmatthews_Nick... I'm at a loss to explain what I don't know. What I mean is users use our VPN client application to connect to our corporate firewall. From their they go to other places they have access.17:35
nowenmaybe it would help to step through it.17:36
nowenthe user wants to login to the vpn17:36
nowenthey start their WiKID token and get an otp17:36
cmatthews_Yes that is all working.17:37
nowenthey enter the username and otp into the vpn client17:37
cmatthews_ok.17:37
cmatthews_that is where the failures begin.17:37
nowenthe checkpoint sees that the user is in a group that uses radius17:37
nowenand proxies the auth request to the radius server (nps or wikid)17:37
nowenif the otp and username are correct, the radius server responds with an ack to the checkpoint17:38
nowenthe checkpoint grants them access17:38
nowentheir session and perms are still managed by the checkpoitn17:39
cmatthews_Okay I think I get it... something is missing in AD configuration that I didn't do.17:39
cmatthews_Association between NPS and an AD group.17:39
cmatthews_Also....17:40
cmatthews_if the password becomes the otp then how do I quantify that as 2 factor when no we'll longer use password but instead just OTP.17:40
nowenthe two factors are knowledge of the PIN and possession of (the private key embedded in) the token17:41
cmatthews_ok17:41
nowenwe've got lots of pci customers ;)17:41
cmatthews_yeah...17:41
nowenthe nps part is done in the Policy17:41
cmatthews_okay back to trying to figure out how the heck I get a AD user doing this.17:42
cmatthews_I mean I'm not sure what is making a login through the VPN software trigger a validation rule against the wikid server through NPS.. that seems to be my current blockade.17:42
nowenyou need to create a Network Policy17:42
cmatthews_I'll go review the implementation materials again and come back when I have a question that makes sense... hehe17:43
nowenand look for the Conditions tab17:43
*** drhex has parted #wikid (None)17:57
MRickettsWere white boarding this with a few IT staff trying to wrap our head around what we are changing/missing/maybe misunderstanding17:58
nowenwhat is happening now?17:58
MRickettsSo right now everyone who connects to stores through our VPN does so through a central firewall here at our corporate office.17:58
nowenok17:58
MRickettsShould we be thinkning that users need to be added to all the 400 VPN's and then we start connecting directly to the store level checkpoints rather than our centralized one?17:59
MRickettsand the store level checkpoints use the Firewall ---> NPS --> AD --> NPS server --> wikid -->18:00
nowenOh, I don't think so.18:00
MRickettsyeah we can keep centralized right?18:00
nowenI think so - that's more of a question for #checkpoint if there is such a thing18:00
nowencan you just have the centralized server talk to NPS?18:02
MRicketts*discussing18:03
MRickettsokay we'll just mess with some confguration for a bit and see what we get working... seems to be a bit of a loss .. like we are just missing something bigger...18:08
MRickettsback with more questions in a few...18:08
nowentry this:18:08
nowencan you set up the checkpoint to talk radius to NPS without WiKID?  that is, auth users through radius using their AD creds?18:09
MRickettsyes. and right now were are currently using checkpoint ---> LDAP interface.18:14
MRickettsbut yes checkpoint does support radius or LDAP18:15
MRickettswithout putting wikid in for the sake of confusion18:15
nowenright - so does a switch to radius work?18:15
nowenw/o wikid18:15
MRickettsit should but this is where we are getting lost.18:18
MRickettswere not sure how the VPN client software connecting to our centralized firewall is ....18:18
MRickettsx y z... where lost here.18:18
nowendo the requests to the centralized fw come in ldap?18:19
nowenare the vpn clients connecting to the central serves and then getting access to the 400 remote sites?18:20
MRickettsyes18:20
nowenok18:20
MRickettsand yes central FW using LDAP to talk to AD18:20
nowenand did you test checkpoint > wikid directly yet?18:21
MRickettsno18:21
MRickettsnot aware of how to get their18:22
nowencan you point me to an online manual for your checkpoint?18:22
MRickettslooking18:23
nowenwhat are your support options from checkpoint?18:23
MRickettsWe have full support with CP.  Try this link to the Getting Started Guide.18:27
MRickettshttp://dl3.checkpoint.com/paid/c5/CheckPoint_R60A_GettingStarted.pdf?HashKey=1289852803_8c862f46c1babfd308774545754955ec&xtn=.pdf18:27
nowenanything better than that?18:30
nowenthat's only got Radius in it once ;)18:30
nowenis there an administrators guide?18:31
cmatthews_he's being pulled another direction for a minute... We'll look and try to post something with more depth in a moment.18:33
*** cmatthews has quit (Quit: Page closed)18:36
MRickettsI think may have what we are looking for.18:48
MRickettshttp://dl3.checkpoint.com/paid/c4/CheckPoint_R65_SecurePlatform_SecurePlatformPro_AdminGuide.pdf?HashKey=1289854070_adb0a86761d9e065e1d1cbd4581c85ff&xtn=.pdf18:48
nowenAuthentication Servers18:53
nowenThis page lists the configured RADIUS Authentication Servers and Authentication18:53
nowenServer Groups. It also allows you to add a new RADIUS server and a new18:53
nowenAuthentication Server Group, or delete them.18:53
nowenthat sounds like where you are supposed to add a radius server18:53
*** manonst (406a83fe@gateway/web/freenode/ip.64.106.131.254) has joined #wikid19:08
*** nowen has quit (Quit: Leaving.)22:59
*** MRicketts has quit (Quit: Page closed)23:25

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!