Home

Intelligent Application Gateway User Guide

image

Contents

1. Remote users access to Novell NetWare Servers is enabled Intelligent Application Gateway 233 User Guide Changing the Date Format of Files and Folders The date format of files and folders that remote users view on their browsers is determined by the IAG where the File Access application is installed not by the user s local computer By default the format is M d yyy You can change the date format to d M yyy as described in this section To change the date format of files and folders 1 At the IAG where the File Access application is installed use the Registry Editor to access the following location HKEY_USERS DEFAULT Control Panel International 2 Change the Value data of SShortDate to d M yyy 0 x Registry Edit View Favorites Help HKEY_USERS 4 Name Type Data a DEFAULT ab sLanguage REG_SZ ENU AppEvents 4 nem ab sLongDate REG_SZ dddd MMMM dd yyy EIGE Accessibity SZ2 sMonDecimalsep REG_SZ E Appearance lab sMonGrouping REG_SZ 3 0 Colors ab sMonThousandSep REG_SZ a Current ab sNativeDigits REG_SZ 0123456789 E Custom Colors ab sNegativeSign REG_SZ 41 Desktop ab sPositiveSign REG_SZ E don t load REG_SZ diMiyyyy Input Method ab sThousand REG_SZ A International w 25 sTime REG_5Z 4 4 My Computer HKEY_USERS DEFAULT Control Panel International h 3 Restart the I
2. Files were not modified through CustomUpdate folders e Files were modified through CcustomUpdate folders but the configuration settings are wrong File incompatibility during system upgrade Resolution Verify that all modifications to the module s default settings are performed according to the instructions provided in the IAG s documentation set 336 Appendix A Troubleshooting Event Logging Messages Warning 31 Global Out Of The Box Rules Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL is blocked by the application s Out Of The Box Security Rules Cause The requested URL contains an illegal character according to the definition of the trunk s global out of the box security configuration Resolution If you wish to cancel the enforcement of global out of the box security rules for this trunk in the Configuration program take the following steps 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the URL Inspection tab 2 In the Out Of The Box Security Configuration area uncheck the option Check Global Out Of The Box Rules E Note This option is global and affects all the applications in the trunk For details refer to the Intelligent Application Gateway Advanced Configuration guide to URL Inspection Tab Out
3. For information about privileged sessions refer to the Intelligent Application Gateway Advanced Configuration guide to Default and Privileged Session Settings on page 137 The lead user is the user who initiated the session The Applications tab lists all the applications for which the session users are authorized and for each application whether users are allowed to access it or only view it and whether it is launched or not The Endpoint Information tab provides information about the endpoint computer from where the session was initiated including Whale Client Components that are installed on the computer For information about the Whale Client Components refer to Whale Client Components on page 147 Other software that is installed on the computer which is related to the interaction of the computer with the IAG such as anti virus software or browser version Chapter 9 Monitoring and Control Web Monitor IP address and domain of the endpoint computer and whether it is an IAG Certified Endpoint For information about Certified Endpoints refer to Certified Endpoints on page 118 CD Tip The information provided in the Endpoint Information tab is similar to the information that is provided to the end user on the endpoint computer in the System Information window The Parameters tab lists all the session parameters including the type and value of each parameter You can view a li
4. A internet Table 36 User s Application Access Statistics Parameters Parameter Description Session ID Unique session ID Clicking the sign next to the session ID or clicking the ID itself displays a list of all the applications the user accessed during the query period For each application user access details are displayed Clicking amp HI or E expands and collapses the display for all sessions respectively Once a session s view is expanded clicking an application name or clicking the sign next to the application name displays details regarding all of the user s accesses to the specific application during the session Session Start Date Date and time when the session was started Session End Date Date and time when the session was ended For sessions that are currently active Active is displayed Duration Duration of the session from the time it was started until the time when the query was generated 292 Chapter 9 Monitoring and Control Web Monitor Event Viewer Using the event logs in the Event Viewer you can view system session security and application events and gather information about user and system activities The Event Viewer window presents you with a constantly updating snapshot of recent events that occurred in the IAG you are monitoring Figure 59 Sample Event Viewer Event Viewer All Events Server time 03 21 2006 16 55 a
5. Privileged Endpoint Policy a Default Privileged Endpoint Install Socket Forwarding Component Policy a Always Edit Policies D Prompt User when Retrieving Information from Endpoint 96 Chapter 5 Endpoint Security Endpoint Policies Note EN The selection and editing of endpoint policies in both the Create New Trunk Wizard and in the Session tab of the Advanced Trunk Configuration window is disabled when the option Disable Component Installation and Activation in the Session Configuration area of the Session tab is activated In addition you can use the Endpoint Policies area to do the following Change the selected Install Socket Forwarding Component Policy This policy is only relevant for Portal trunks it defines the conditions under which the Socket Forwarding client component can be installed on the endpoint computer in order to enable the use of the Socket Forwarding component for SSL Wrapper applications For details refer to Chapter 6 SSL Wrapper Note A If you activate the option Uninstall Socket Forwarding Component in the Endpoint Settings area of the Session tab any Socket Forwarding Client Components that are installed on endpoint computers are removed when users next accesses the site While this option is activated the Socket Forwarding component is not installed on endpoint computers regardless of a computer s conformity to the Install S
6. SMTP server information including IP Host port and if required user credentials e Mail details including the fields of the email messages issued by the mail reporter and a list of recipients for the messages The way in which you enable and configure the mail reporter is described in Enabling the Mail Reporter to Send Messages on page 246 By default even when the mail reporter is activated none of the messages that are handled by the Event Logging mechanism are sent to this reporter since it should only be used to report specific urgent or extremely important IAG related events You therefore have to determine which of the messages should be sent by email and manually configure them as described in Configuring which Messages are Sent by the Mail Reporter on page 247 Intelligent Application Gateway 245 User Guide Enabling the Mail Reporter to Send Messages 246 This section describes how you enable the mail reporter to send event messages via the SMTP server Note can Even when the mail reporter is enabled and configured the SMTP server will not send event related messages until you define which messages are sent to the mail reporter as described in Configuring which Messages are Sent by the Mail Reporter on page 247 To enable the mail reporter to send messages 1 Inthe Configuration program on the Admin menu click Event Logging The Event Logging dialog box is displayed 2 Select
7. Session Monitor Active Sessions 268 The Session Monitor Active Sessions window provides a detailed snapshot of the currently open sessions for each trunk Use it for online user access tracking and troubleshooting You select which trunk to display at the top left corner of the window The parameters that are provided for each session are listed in Table 28 Parameters of the Session Monitor Active Sessions on page 269 By default the window refreshes the data every five minutes If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Figure 43 Sample Session Monitor Active Sessions Window Session Monitor Active Sessions Server time 03 14 2006 16 57 Current Trunk portal 5 amp Bg 5 7 Session ID Lead User Repository Started At Duration Authenticated Events Terminate SESSION S B os0ss3z1 25c0 4276 8466 893F0F3BE06D whalecor rutl whalecom 03 14 2006 16 33 40 00 23 14 hi hli ht d 2 DC437D7F A3AE 4E8A AES0 8FAS5SB72A1CF whalecomieddien whalecom 03 1 4 2006 16 30 50 00 26 04 Y 3 x Ig Ig e 3 E5SC55145 3200 43F2 ACDC 1BSBB6EE0995 whalecomiezy whalecom 03 14 2006 16 30 06 00 26 48 Y x 4 2354RA22 39F3 4F14 912 25443F56D whalecomiezy whalecom 03 14 2006 16 29 57 00 26 57 Y E x 5 2F918386 E7F8
8. This installation mode is suitable for end users who have ActiveX download rights on an Internet Explorer browser and are logged in with power user or Administrator privileges In this mode as soon as users try to access the site prior to the Login stage the IAG downloads the Whale Component Manager onto their computer Once the Component Manager is installed on the endpoint computer it determines the need for the installation of the rest of the components each time the user accesses the site and installs them as follows By default the following components are installed automatically Attachment Wiper e Client Trace utility Endpoint Detection If required you can configure other components that will be installed automatically as described in Configuring the List of Automatically Installed Components on page 152 The rest of the components are installed as required For example when the user accesses a non web application for the first time the Component Manager installs the SSL Wrapper component Configuring the List of Automatically Installed Components This section describes how you can add components to the default list of components that the Component Manager installs automatically on the endpoint computer To add components to the list of automatically installed components 1 At the IAG access the following custom folder if it does not exist create it Whale Com e Gap von InternalSite inc Cus
9. Tip For a description of the Advanced tab refer to Advanced Tab on page 199 If you do change the default server resources settings once you are through troubleshooting the server in the Server Resources section of the Advanced tab click Restore Defaults Network Traffic Logs This section describes how you enable the logging of network traffic on the Network Connector server AN Caution Use network traffic logs for advanced troubleshooting purposes only since they create heavy accumulative dump files The files are not deleted automatically and may reduce the server performance considerably Tip The dump files can be written read and deleted while the Network Connector is in session To enable logging of network traffic on the Network Connector server 1 On the computer where the Network Connector server is installed access the following Registry key My Computer HKEY_LOCAL MACHINE SOFTWARE WhaleCom e Gap RemoteAccess Intelligent Application Gateway 205 User Guide 2 Under the key you accessed in step 1 create a new Registry key NetworkConnector 3 Under the key you created in step 2 create a DWORD value named log sniff and set the value data to one of the following 1 enables logging of low level network traffic to and from remote clients 2 enables logging of tunneled network traffic to and from remote clients 3 enables logging of both low level
10. Tip If a file by this name already exists you can use the existing file you do not need to create a new file in this case 3 In the file you defined in step 2 add the following lines lt SetSessionResourceParam g_cookie lt Application_ID gt RWSAuthorization lt Value gt S gt Where Application_ID is the application s ID number as can be copied from the General tab of the Application Properties dialog box Value is the value you wish to send to the application server For example To send a User_group unlimited header In the Web Settings tab name the Authorization Key User_group and select the format Header In WhalePortallPostPostValidate inc enter the value unlimited Web Server Security Tab 78 E Note This tab is not applicable for Client Server and Legacy applications Use this tab to protect the application against HTTP Request Smuggling HRS attacks Chapter 4 Application Settings Editing Application Properties Figure II Application Properties Web Server Security Tab Application Properties Webtop Documentum xi Web Servers Web Settings a Web Server Security 4 r Content Types Max HTTP Body Size 49152 bytes application x www form urlencoded multipart form data Table 12 Web Server Security Tab Parameters Parameter Activate Smuggling Protection Content Types Max HTTP Body Size Description Acti
11. To cancel the disabling of the Do not save encrypted pages to disk setting on the endpoint computer 1 At the IAG use the Registry Editor to access the following location WhaleCom e Gap common GUI 2 Create anew DWORD value named Change_NoSSLCache_Setting and set the value to 0 g Registry Editor p lO x Registry Edit View Favorites Help E WhaleCom Type Data pen e Gap fab REG_SZ value not set ae common Change_NoSSLCache_Setting REG_DWORD Ox00000000 0 ta Core il REG_5Z F Whale Com e Gap commonic dispatcher gt REG SZ Gui i a MasterReceiver REG_DWORD 0x00000000 0 Serviceming My Computer HKEY_LOCAL_MACHINE SOFTWARE WhaleCom e Gap common GUI 3 Access the Configuration program Click 0 to activate the configuration select the option Apply changes made to external configuration settings and click Activate gt Once the configuration is activated the Do not save encrypted pages to disk setting is not changed on the endpoint computer Intelligent Application Gateway 11 7 User Guide Certified Endpoints A Certified Endpoint is a computer that has been certified by the organization using a client certificate Tip You can set a policy whereby users can only access a site or an application if their computer is a Certified Endpoint For details refer to Endpoint Policies on page 93 The Certified Endpoint feature relies on PKI infrastruct
12. Aintemats ite IntemalE tror asp I Disable Component Installation and Activation T Disable Scripting Before Application Start J Use Endpoint Certification F Verify User Name Against Certificate Concurrent Sessions Threshold Max Concurrent Unauthenticated Sessions Concurrent Unauthenticated Sessions Threshold Error Message URL iV Attachment Wiper Cleans Application S pecific Temporary Files I Use DNS Suffix m Endpoint Policies Session Access Policy a Default Session Access gt Privileged Endpoint Policy a Default Privileged Endpoint Install Socket Forwarding Component Policy a Always Edit Policies J Prompt User when Retrieving Information from Endpoint ion _ Global URL Settings S URL Set amp 2 Session __ Application Customization m Default Session Settings Inactive Session Timeout Seconds 300 JZ Automatic Scheduled Logoff After 60 Minutes IV Nullify Cookies on Logoff J Avoid Browser Side Caching V Activate Attachment Wiper ActiveX IV Prompt User to Disconnect Channel when Portal is Closed without Logoff I Re open Portal if User Selects to Keep Channel Open m Privileged Session Settings Inactive Session Timeout Seconds 1800 IV Automatic Scheduled Logoff After 1440 Minutes J Nullify Cookies on Logoff I Avoid Browser Side Caching Activate Attachment Wiper Activex IV Prompt User to Disconnect Channel when Portal is Closed wit
13. Configuring the Attachment Wiper on page 112 Cleanup of items that are saved outside the cache described in Cleanup of Items That Are Saved Outside the Cache on page 1138 Scheduled cleanup which triggers a cleanup after a pre configured timeout period is described in Configuring a Scheduled Cleanup on page 115 The code that triggers the Attachment Wiper to initiate the cleanup of the browser s cache on the client is embedded in the Logoff Message page that is supplied with the IAG If however the trunk is configured to use a custom Logoff page you need to add the code in the custom page This option is described in Enabling the Attachment Wiper on a Custom Logoff Message Page on page 116 To cancel the disabling of the Do not save encrypted pages to disk setting on the endpoint computer running Internet Explorer refer to When Encrypted Pages Are Saved to a Location Other Than Temp Files on page 117 Intelligent Application Gateway 111 User Guide Configuring the Attachment Wiper You configure the Attachment Wiper in the Session tab of the Advanced Trunk Configuration window Figure 20 Configuration of the Attachment Wiper Select whether to activate the Attachment Wiper for default sessions Application Access Portal UFLin amp General 2S Authentication m Session Configuration Max Concurrent Sessions 10000 ro roo ro Session Notifications Timeout 60
14. Copy the file you accessed in step 1 into the following custom folder if the folder does not exist create it Whale Com e Gap Von Conf CustomUpdate If such a file already exists use the existing file In the file under the CcustomUpdate folder edit the cookie list under the tag lt EXCLUDE_COOKIE_LIST gt Note that cookie names are defined using regular expressions for details refer to the Intelligent Application Gateway Advanced Configuration guide to Appendix B Regex Regular Expression Syntax In addition to the cookie list the file WhlExcludeCookie xml stores a security prefix that is used in the encryption of cookie names and cookie values in the tag SECURITY_PREFIX By default the value of the security prefix is ce If required you can change the value of the prefix in the file in the custom folder Download Upload Tab 82 This tab is applicable in Portal trunks for Built In Services Web Applications and Browser Embedded Applications and in Basic trunks It defines the method by which the IAG identifies URLs in order to enforce the application s Upload and Download policies Note A If none of the options in the Download Upload Tab are activated no uploads or downloads to and from the application are blocked regardless of the settings of the application s Upload or Download policies The application s policies are defined in the General tab described in General Tab
15. DoNotRemoveProfile MyDomain Admin You can configure an unlimited number of profiles that will be left out of the deletion process by configuring one DoNotRemoveProfile parameter for each profile A Note This section is only relevant if the network includes Novell NetWare Services and you wish to enable remote access to NetWare Servers The settings you configure here are not related to the Novell Directory server which you can use for authentication and authorizing In the following procedure you determine the logon credentials that are used during the configuration of users access to the Novell NetWare Servers Note that during the configuration of the NetWare Servers only the servers and shares that are enabled to the user with which you log on will be available in the File Access window Intelligent Application Gateway 227 User Guide 228 Tip The actual configuration of remote users access to the NetWare Servers is described in Configuring Access to Domains Servers and Shares on page 229 To configure Novell logon settings 1 Access the File Access window as described in Accessing the File Access Window on page 222 2 In the left pane of the File Access window under General click Novell In the right pane the Novell Logon settings are displayed 1 ud Novel Novell Logon Reset Save Logon Logon To Novell NetWare Using Windows User Name Using Followi
16. In the domain create a group of all File Access users and grant the group local logon permissions on the IAG regardless of each user s privileges Installing a Client for Microsoft Networks This section describes how you install a Client for Microsoft Networks on the IAG during the domain setup Note EN You might be required to provide the Windows Server 2003 Installation CD during the course of this procedure To install a Client for Microsoft Networks 1 At the IAG in the Windows desktop click Start then select Settings gt Network Connections 2 In the list of connections select the Local Area Connection that is used to access the File Access resources The Local Area Connection Status dialog box is displayed 3 Click Properties Intelligent Application Gateway 217 User Guide J Local Area Connection Properties 24 x General Authentication Advanced Connect using Intel R PRO 100 S Desktop Adapter This connection uses the following items Client for Microsoft Networks 5 Network Load Balancing amp File and Printer Sharing for Microsoft Networks XF Internet Protocol TCP IP Install Uninstall Properties Description Allows your computer to access resources on a Microsoft network lt 4 J7 Show icon in notification area when connected IV Notify me when this connection has limited or no connectivity OK Cancel 4 Under t
17. Intelligent Application Gateway 155 User Guide 156 EN Note Ifthe installation detects that Whale Client Components are already installed on the computer it upgrades any of the components that are of older versions even if their installation is not enabled in the current installation configuration When using the Whale toolbar the Network Connector component only installer is always downloaded on browsers other than Internet Explorer such as Netscape Navigator or Mozilla Firefox so that the Network Connector client can run via the SSL Wrapper Java applet Installing the Whale Client Components via the Installer Once you configure the Whale Client Components Installer as described in Configuring the Whale Client Components Installer on page 154 users can download the installer onto their computer using the installer button or link on the portal homepage To install the Whale Client Components via the Installer 1 At the portal homepage click on the Whale toolbar or if the Whale toolbar is not used click the link to the installer The file that was defined during the configuration of the button or link is downloaded onto the computer When prompted select to save the file 2 Log out of the portal using the site s logout mechanism and close all the browser windows that were opened through the portal For example in sites that use the Whale toolbar click to log out of the portal 3 Run the
18. Mandatory List of trusted sites Optional End date of pilot mode While in this mode the identity of sites on the Trusted Sites list you defined here is not verified Caution Use this option for a very limited time and not during system up time Data e 1 users are prompted and can select whether to add the site to the Trusted Sites list or not 0 users are not prompted access to the site is denied If this value is not defined users are prompted Define a site as follows Schema HTTPS or HTTP Host FODN or IP Port number optional for default ports 443 and 80 Date using the following format mm dd yyyy By default no pilot period is configured The identity of trusted HTTP sites will not be verified since they do not use a server certificate Chapter 5 Endpoint Security Whale Client Components Restoring the Whale Client Components Defaults End users can restore the Whale Client Components settings on their computer to the default values in one of two ways In the System Information window which they access from the portal homepage by clicking the button Restore Whale Client Components defaults Restore Whale Client Components defaults j https Anportal microsoft com System Information 2 Microsoft Internet Explorer m x ene isles System Information Whale Communications Intelligent Application Gateway Whale Client Comp
19. Message severity Must be one of the following Information informative message denoting a normal event that might be of interest such as user login or log out lt Notice normal but significant condition such as users changing their password Warning events that might be problematic but don t result in malfunction For example an unauthorized access attempt Error a significant problem such as a failure to read the configuration Usage One and only one lt Severity gt element must be nested under lt Message gt Child Elements None lt Message gt gt lt Type gt lt Type gt Description Message type Must be one of the following System system events such as service startup and shutdown and changes to the configuration Security security events including login success or failure security policy violation or change and password change Session session events including session start or stop number of sessions and other session related events Tip In the IAG Event Manager in the Event Viewer and the Event Report this parameter is displayed in the Category column Usage One and only one lt Type gt element must be nested under lt Message gt Child Elements None 252 Chapter 9 Monitoring and Control Event Logging lt Message gt gt lt Name gt lt Name gt Description Message name Must contain only alphanumeric characters Usage One an
20. on page 19 Intelligent Application Gateway 333 User Guide Resolution Take the following steps e Verify that the correct authentication server is used to reply to the login request 1 Inthe Configuration program access the application and open the Application Properties dialog box 2 Access the Web Settings tab Verify that the authentication server that is selected for the option Automatically Reply to Application Specific Authentication Requests contains the user credentials required by the application For details refer to Application Authentication on page 74 Verify the configuration of the Form Authentication Engine for this application For details refer to the Intelligent Application Gateway Advanced Configuration guide to Appendix C Form Authentication Engine Warning 24 Application Authentication Failed Symptoms A remote user attempts to access an application The attempt fails and the following message is displayed You do not have permissions to view this Directory or page using the credentials you supplied Cause The application is configured to automatically reply to the application s authentication request HTTP 401 request The credentials supplied by the authentication server are not accepted by the application Resolution In the Configuration program verify the configuration of the authentication server for this application 1 Open the Application Prop
21. A remote user requests a page The request is processed and the user experience is unaffected Cause A cookie encryption violation was detected The cookie name is encrypted although it is listed in one or more of the cookie encryption exclude lists Resolution In order to enable the browser to send this cookie in an encrypted from you need to remove it from the list of cookies that are excluded from the cookie encryption process as follows 1 Use the IAG s trace mechanism to resolve the original name of the encrypted cookie a At the IAG access the trace configuration file Whale Com e Gap Common Conf trace ini b Add the following lines to the file Trace Wh1Filter WHLFILTSECUREREMOTE xheavy Save the file c Use a browser to request the URL that caused the Warning message as detailed in the Description field of the event in the Web Monitor s Event Viewer d At the IAG access the trace log file in the following location Whale Com e Gap logs The file is named lt Server_Name gt Wh1Filter default lt Time_Stamp gt log Intelligent Application Gateway 369 User Guide Resolve the original name of the cookie that was blocked using the EncryptedName and OrigName parameters in the log file the encrypted cookie name is indicated in the Description field of the event in the Event Viewer 2 In order to exclude the cookie from the cookie encryption process
22. For Webmail or Basic trunks in the Application Server area of the Configuration pane e Verify that the application server is running Verify that the application server is reachable from the IAG If not check the following Network connections e Verify the configuration of the ISA firewall rule that enables the connection from the IAG to the application server For details examine the ISA logs and alerts and if necessary consult ISA troubleshooting 364 Appendix A Troubleshooting Event Logging Messages Warning 81 User Failed to Change Password Symptoms A remote user attempts to change the password The attempt fails and one of the following messages is displayed in the browser window Failed to change password Or The new password you entered cannot be used since it does not comply with the password policy set by your administrator Cause The message Failed to change password indicates one of the following User entered the wrong password in the Old password field Settings of the Configuration program or the authentication server which are required in order to enable users to change their passwords are not configured correctly The message The new password you entered cannot be used since it does not comply with the password policy set by your administrator indicates that the user attempted to use a password that does not comply with the authentication
23. Handle or Ignore so that parameters are not rejected Note that if you set the value of Parameters to Handle you also have to define the parameters for this URL For details about the configuration of rulesets refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Warning 57 Unrecognized Application Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You are not authorized to access this application For assistance please contact your system administrator Cause Wrong configuration of the application in the Configuration program Resolution Take the following steps in the Configuration program 1 Use the Application Properties dialog box to locate the application according to the server configuration in the Web Servers tab Intelligent Application Gateway 357 User Guide 2 Verify the configuration of the server s addresses paths and ports for this application For details refer to Web Servers Tab on page 71 Warning 58 Unresolved Request Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window The requested URL is not associated with any configured application Cause The requested URL contains a signature that cannot be resolved to identi
24. In order to prevent unauthorized access to the IAG the IAG s configuration files are encrypted You generate an encryption key when you first access the IAG and this key is used to encrypt and decrypt the IAG configuration data This process is described in the Intelligent Application Gateway Advanced Configuration guide in the section Creating Encryption Keys on page 20 In setups where more than one IAG server is used the IAG servers have to be configured with an identical encryption key in order to Export and import configuration files between IAG servers Export and import URL inspection and File Access rulesets Use High Availability arrays Tip If you need to encrypt and decrypt any of the IAG files use the Editor For details refer to the IAG Advanced Configuration guide to Editor on page 40 Intelligent Application Gateway 21 User Guide Encryption Passphrase 22 Once the encryption key is generated every time you carry out operations that write to the disk such as saving or activating configuration files or when you import a configuration file or a set of rules into the IAG the IAG prompts you to enter the encryption passphrase You must always enter a valid passphrase this ensures that only authorized users can access the IAG s configuration files Tip In order to change the passphrase any time after the initial installation run the following command in a Command prompt
25. on page 68 Configuration of the actual policies is described in Application Endpoint Policies on page 99 Chapter 4 Application Settings Editing Application Properties The parameters of the Download Upload tab are described in Table 14 on page 84 Figure 13 Application Properties Download Upload Tab Application Properties Citrix NFuse FR2 Direct Cookie Encryption amp Download Upload Server Settings 4 m Downloads gt r Uploads IV Identify by URLs IV Identify by URLs I Identify by Extensions T Identify by Extensions Exclude Include Exclude Include Evtension List Extension List Unknown Content Type 4 Uriirsrin CortaritTy IV Identify by Size fiozs KB and above I Identify by Size fi 024 KB and aboye Help Cancel CO Tip By default the IAG identifies responses without content type as downloads If you wish downloads without content type to be considered regular responses and not downloads create the following registry key on the IAG Location WhaleCom e Gap Von UrlFilter DWORD Value name AllowResponseWithoutContentType DWORD Value data 1 After you create the key access the Configuration program activate the configuration and select the option Apply changes made to external configuration settings Intelligent Application Gateway 83 User Guide 84 Table 14 Download Upload Tab Parameters Parameter Identify by URL
26. remove it from the exclude list where it is defined Two lists define the exclusion of cookies from the process both are configured at the IAG e Per application list The cookies that are listed here are excluded from the process for this application only To edit this list in the Configuration program open the Application Properties dialog box for this application access the Cookie Encryption tab and remove the cookie from the Cookies list For details refer to Cookie Encryption Tab on page 80 Global list The cookies that are listed here are excluded from the process for all applications To edit this list access the following file Whale Com e Gap Von Conf Wh1lExcludeCookie xml Copy the file into a CustomUpdate subfolder and remove the cookie from the list under the tag lt EXCLUDE_COOKIE_LIST gt Note that cookie names are defined using regular expressions For details refer to Global Exclude List on page 82 Warning 97 Cookie Encryption Mismatch Symptoms A remote user requests a page The request is processed and the user experience is unaffected However a Cookie header in the request is blocked and is not forwarded to the server Cause A cookie encryption violation was detected The cookie name is encrypted while the cookie value is unencrypted Resolution In the browser that was used to request the page delete the cookie that was blocked The name of the cookie is pro
27. Alternate IP Host IP address or hostname of the alternate RADIUS Accounting server Alternate Port Port number of the alternate RADIUS Accounting server Secret Key Secret key that will be used to encrypt and decrypt the user password 4 Click OK IAG related events are saved to the RADIUS Accounting server you defined here Configuring the Syslog Reporter The Syslog reporter enables you to export system and security information from the IAG to an external industry standard Syslog server thus providing a greater level of network integration To configure the Syslog reporter 1 Inthe Configuration program on the Admin menu click Event Logging The Event Logging dialog box is displayed 2 Select the Syslog tab and check the Enable option x General Built In RADIUS Syslog Mail iY Enable IP Host Port 514 244 Chapter 9 Monitoring and Control Event Logging 3 Define the Syslog settings as follows Table 26 Syslog Tab Parameters Parameter Description IP Host IP address or hostname of the Syslog server Port Port number of the Syslog server Click OK IAG related events are saved to the Syslog server you defined here Configuring the Mail Reporter The mail reporter enables you to send email messages about selected event via an SMTP server In order to configure the mail reporter you have to take the following steps Enable the reporter and configure the following
28. Attachment Wiper T WY 3 7 0 12 Installation Anti virus eTrust 7 1 Updated 12 5 2006 10 09 02 PM Personal Firewall XPSP2 Version N A Operating System Windows XP Professional 5 01 2600 Service Pack 2 Browser Version Internet Explorer 6 User Agent Mozilla 4 0 compatible MSIE 6 0 Windows NT 5 1 SV1 NET CLR 2 0 50727 NET CLR 1 1 4322 Sun JRE Version N A Domain WHALECOM Certified Endpoint x Privileged Endpoint x This site is protected by the Whale Communications Intelligent Application Gateway To refresh this page please log out then log in again a Done B internet 4 Access and run an application that requires the Socket Forwarding component for example the application you tried to run when the conflict was detected The Socket Forwarding component is installed on the computer N Note The installation of the component may require a restart of the browser or of the computer Users are notified accordingly Supported Applications The SSL Wrapper supports two types of applications Client server and legacy applications also known as native applications Those types of applications are initiated by the SSL Wrapper The application s configuration data is usually stored locally on the endpoint computer For example Telnet Citrix Program Neighborhood applications Microsoft Windows XP and Windows 2000 Terminal Services Clients and more Browser embedded applications are
29. Cont d Button View Menu Description Enables you to filter the view in the Repository Users and Groups list Show all displays all users and groups in the selected folder If the option Include Subfolders is activated for the selected server subfolders are also displayed Show users only displays all users in the selected folder Show groups only displays all groups in the selected folder Show users amp groups displays all users and groups in the selected folder Subfolders are not displayed Show users amp groups including subfolders displays all users and groups in the selected folder If the option Include Subfolders is activated for the selected server subfolders are also displayed as well all users and groups in all subfolders In certain cases you may want to configure additional parameters such as Define the global Host Address Translation HAT parameters which are applied to all the trunks configured in the IAG For details refer to Configuring Global Host Address Translation on page 46 Restrict the applications in the SSL VPN Portal so that only servers within the defined subnets are enabled as described in Configuring Application Subnets on page 48 Configuring Global Host Address Translation 46 This section describes the optional configuration of HAT parameters The parameters you configure here are global and are used during link manipulation
30. If you backed up the configuration in a Command line you should restore it using a Command line you can not restore it using the Configuration interface Before you restore the backup make sure that the IAG that was backed up and the IAG to which you are restoring the configuration settings are compatible as follows Both IAG servers use the same passphrase The same application shuttles are installed on both servers Restoring the Configuration in the Configuration Program To restore the configuration in the Configuration program 1 In the Configuration program on the Admin menu click Restore from Backup Click O to activate the configuration The IAG configuration settings are restored from the backup file as defined in the file wnlbackup ini Running the Restore Utility as a Console Application You can run the Restore utility as a Console application in a Command line To run the Restore utility as a Console application 1 At the IAG open a Command line and type whlbackup exe r Still at the IAG activate the configuration by clicking O in the Configuration program The IAG configuration settings are restored from the backup file as defined in the file wnlbackup ini 306 Chapter 10 Troubleshooting Backup amp Restore Utility Error Logging and Process Tracing The error logging and tracing mechanisms are used for error logging and for tracing of a variety of IAG processes The error serve
31. Please press the lt Activate gt button to begin Cancel Click Activate gt Note an We recommend that you activate the option Back up configuration after activation so that the configuration settings are backed up For more details refer to Backup amp Restore Utility on page 303 Once the configuration is activated the following message is displayed IAG configuration activated successfully The trunk is operational All authenticated users will be able to access the applications enabled through the portal If you wish to configure authorization for any of the applications you enable through the trunk proceed to Users Setup on page 32 E Note You can duplicate a trunk including all application definitions changing only the name and the external website s IP address and port numbers Right click the trunk you wish to duplicate and select Duplicate Delete a trunk by right clicking the trunk name and selecting Delete Intelligent Application Gateway 31 User Guide Users Setup 32 Users setup determines which users are authorized to view and access each of the applications enabled through the portal When you set an application up by default all authenticated users are allowed to view and access the application If required you can change the default settings and determine which users can view and access the application Users setup affects the following Authorizati
32. Ti gi Currently installed programs IT show updates Sort by Name x Change or Remove B Java 2 Runtime Environment SE v1 4 2_10 Size 109 00MB amp Mozilla Firefox 1 0 7 Size 14 17MB g NetLimiter 1 30 remove only Size 1 04MB Programs Add New Size 5 15MB Programs D fic Whale Communications Client Components 3 5 0 g am To change this program or remove it from your computer click Change Remove Change Remove Add Remove Windows B Windows Installer 3 1 KB893803 Components Users can view the Whale Component Manager in the Downloaded Program Files folder From this location users are able to uninstall all versions of installed components as one unit F3 C WINDOWS Downloaded Program Files 10l x File Edit Yiew Favorites Tools Help Ax lt E T JO search gt Folders i E3 XxX 1 Address a C WINDOWS Downloaded Program Files Go ProgramFile Status Total Size Creation Date g Java Runtime Environment 1 4 2 Installed None 10 10 2005 4 29 E Java Runtime Environment 1 4 2 Installed None 10 10 2005 4 29 Whale Microsoft RDP Client Control redist Installed 592 KB 8 10 2002 4 16 AM Component WY whale Client Components Installed 768 KB 12 22 2005 1 21 Manager E From the portal homepage users can access the System Information window by clicking Sa where they can select to uninstall all the components uninstall t
33. To enable logs and packet dumps on the Network Connector client 1 On the endpoint computer access the following Registry key My Computer HKEY_LOCAL MACHINE SOFTWARE WhaleCom Client 2 Under the key you accessed in step 1 create a new Registry key NetworkConnector 3 Under the key you created in step 2 create one or both of the following values CD In order to enable logging create a DWORD value named log and set the value data according to the required log level Log level can be 1 4 where 4 is the most detailed log level The log file is created in the same location where the client executable resides as follows C Program Files Whale Communications Client Components 3 1 0 whlioc log Tip Set the log value to 0 to disable logging when you finish troubleshooting the client In order to enable dumping of network packets create a DWORD value named log sniff and set the value data to one of the following 1 enables logging of low level network traffic to and from the virtual network 2 enables logging of tunneled network traffic to and from the virtual network 3 enables logging of both low level and tunneled network traffic to and from the virtual network The low level and tunneled traffic dumps consist of similar information but are not necessarily the same since not all low level traffic is tunneled and vice versa The dump files are created in the same location where the client execut
34. and the Endpoint Detection component is not activated on their computer this could result in limited functionality of the site 98 Chapter 5 Endpoint Security Endpoint Policies Application Endpoint Policies Application endpoint policies include the following Access policy controls access to the application For Web and Browser Embedded applications Download policy helps prevent the spreading of sensitive data to undesired endpoints Upload policy helps prevent undesired endpoints from sending malicious data such as viruses malicious macros and more into the internal network Restricted Zone policy restrict users access to sensitive areas of the application such as administrative areas Tip The method by which the IAG enforces the selected Download and Upload policies is defined in the Application Properties dialog box in the Download Upload tab For details refer to Download Upload Tab on page 82 The Restricted Zone option is activated in the Application Properties dialog box in the Web Settings tab For details refer to Web Settings Tab on page 73 This section describes how Endpoint policies are defined for the trunk as described in Defining Application Endpoint Policies on page 99 You edit existing application endpoint policies as described in Editing Application Policies on page 100 Defining Application Endpoint Policies When you add an appli
35. in Web Monitor Layout on page 264 Provides you with helpful tips for using the Web Monitor in Tips for Using the Web Monitor on page 265 Provides detailed explanations of the Web Monitor windows and views and operations you can perform in the Web Monitor as follows Session Monitor Current Status on page 266 Session Monitor Active Sessions on page 268 Session Monitor Statistics on page 271 Application Monitor Current Status on page 275 Application Monitor Active Sessions on page 278 Application Monitor Statistics on page 279 e User Monitor Current Status on page 285 User Monitor Active Sessions on page 287 User Monitor Statistics on page 288 Event Viewer on page 293 gt Event Query on page 295 Support for sites running an IAG High Availability Array in Web Monitor High Availability Support on page 298 Intelligent Application Gateway 259 User Guide Accessing the Web Monitor 260 You can access the Web Monitor from the web browsers listed in Web Monitor Browser Support on page 264 as follows From the IAG In the Configuration program click on the toolbar or on the Admin menu click Web Monitor Or In the Windows desktop click Start then point to Programs gt Whale Communications IAG gt Additional Tools gt Web Monitor From any computer that is on the sa
36. including the prerequisites for running it on the endpoint computer is described in Chapter 6 SSL Wrapper Chapter 5 Endpoint Security Whale Client Components Note EN You can disable component installation in the Session tab of the Advanced Trunk Configuration window as follows Activating the option Disable Component Installation and Activation disables the installation and activation of all the Whale Client Components on endpoint computers including the SSL Wrapper Java applet thus disabling all the features that are enabled by those components It also disables the Certified Endpoints feature For details refer to the Intelligent Application Gateway Advanced Configuration guide to Session Configuration on page 133 Activating the option Uninstall Socket Forwarding Component disables the installation of the Socket Forwarding component on endpoint computers and removes this component from all endpoint computers when users next access the site For details refer to Endpoint Settings on page 108 This section describes The conditions under which the components are installed and run and the available installation modes in Installing and Running the Components on Endpoint Computers on page 150 How to configure users Trusted Sites lists so that the Whale Client Components can verify that the site is trusted in IAG Trusted Sites on page 160 How users can reset the Whale C
37. lt Param gt element you copy into the new file lt Message gt Description Defines an Event Logging message Usage An unlimited number of lt Message gt elements can be nested under the root lt Messages gt element 250 Chapter 9 Monitoring and Control Event Logging Child Elements lt Message gt must contain one each of the following elements e lt Id gt described on page 251 lt Severity gt described on page 252 e lt Type gt described on page 252 lt Name gt described on page 253 e lt Desc gt described on page 253 e lt DynamicDesc gt described on page 253 In addition lt Message gt can contain one each of the following optional elements e lt Params gt described on page 254 e lt Reporters gt described on page 256 E Note If no reporters are defined for a message the message is not sent to any of the Event Logging reporters It is only sent to the Web Monitor where it can be viewed in the Event Viewer but cannot be queried in the Event Query window lt Message gt gt lt Id gt lt Id gt Description Unique message ID For the default messages do not change the message ID e For custom messages use ID 10000 and up Usage One and only one lt Id gt element must be nested under lt Message gt Child Elements None Intelligent Application Gateway 251 User Guide lt Message gt gt lt Severity gt lt Severity gt Description
38. vy Sample Chart the number of concurrent sessions is sampled at the end of each interval gt Peak Chart the number of concurrent sessions reported is the highest number of sessions that were open during the interval period Select the application or applications for which to generate the query By default you can view query results for up to 15 applications If required you can change this value as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Once you submit the query the results are displayed in the window as described in Application Monitor Statistics Window Query Results View on page 281 Figure 50 Application Monitor Statistics Window Query Form Application Monitor Statistics Server time 03 23 2006 20 07 Period Week Month Quarter Year Today Last24Hours C Yesterday Start date 03 23 2006 00 00 00 ae End date 03 23 2006 21 00 00 Interval Hour X Query type eZ Sample Chart aA C Peak Chart Applications T portal S I Whale Portal I Web Monitor I whale Portal I Whale Portal Client C GFTP l E outiook I f Tenet I Whale Portal Web CT myweb I P3 Owa 2003 sptisp2 Submit Reset 280 Chapter 9 Monitoring and Control Web Monitor Di After you submit a query when you return to the query form from the query results view you can clic
39. 4504 61E1DZEE7ASE whalecomlyarivm whalecom 03 1 4 2006 16 29 41 00 27 13 Y E x 6 BA3EB6D6 ZZEC 4ESC 95FD 01152E213946 whalecomiamirm whalecom 03 14 2006 16 29 35 00 27 19 Y E 7 282235EE9 3BEB 4DCE B830 96600736452A whalecomirachel whalecom 03 14 2006 16 17 44 00 39 10 Y EJ Chapter 9 Monitoring and Control Web Monitor Table 28 Parameters of the Session Monitor Active Sessions Parameter Session ID Lead User Repository Started At Duration Authenticated Description Unique session ID Clicking the session ID opens the Session Details window described in Session Details on page 270 User who initiated the session Authentication repository of the user who initiated the session Date and time when the session was started Duration of the session Indicates whether the session is authenticated or unauthenticated A session is unauthenticated when The user s identity is unknown such as prior to the completion of the login process The session is suspended before it is closed The following example describes a sample life cycle of a session in a trunk where the Automatic Scheduled Logoff option is activated and the Logoff Scheme is triggered every 60 minutes As soon as a user accesses the site an unauthenticated session is established Once the user is authenticated the session s status changes to authenticated 60 minutes l
40. 47 46 log Error Log Files The error log files are created under Whale Com e Gap Logs lt Server_Name gt whlerrsrv error lt Time_Stamp gt log Where lt Timestamp gt represents the time and date when the file is created For example the name of an error log file created on September 25 2005 at 20 28 08 is whlerrsrv error 25 09 05 20 28 08 log Size and Quantity of Files 312 Trace Files The error server writes the reported events into the trace log file until the log file reaches the maximum file size allowed The error server then creates a new trace log file and logs events in the new file The maximum file size can be defined as follows The default maximum file size is set in the general Trace section of the trace configuration file as described in General Trace Configuration Section on page 310 Chapter 10 Troubleshooting Error Logging and Process Tracing e Youcan set a maximum file size for individual traces which overrides the default maximum file size as described in Individual Trace Sections on page 308 If the maximum file size is configured in both the individual traces and the general Trace section the individual settings take precedence In order to preserve disk space the trace log files are periodically cleaned up as described in Log File Cleanup on page 313 Tip The trace log of a process is not deleted when a process is stopped Error Log Files Entri
41. 50 MB Number of Undeleted Files Bo Cancel In the Log File Cleanup area change one or more of the default values as required as described in Table 40 Log File Cleanup Parameters on page 314 Click OX The Advanced Trunk Configuration window closes In the main window of the Configuration program click HD to save and activate the configuration The log file cleanup process will start and stop at the defined total size of files values and the error log server will retain the defined number of log files Intelligent Application Gateway 317 User Guide Excluding IIS Log Files from the Log File Cleanup Process 318 If you do not want the IIS logs to be calculated in the computation of the space allocated for log files and do not want IIS log files to be deleted during the log file cleanup process proceed as described below To exclude the IIS log files from the log file cleanup process 1 At the IAG use the Registry Editor to access the following Registry key HKEY_LOCAL_MACHIN E SYST EM CurrentControlSet Services whlerrsrv Parameters Tip If the Parameters Registry key does not exist under whlerrsrv you must create it 2 Create a new DWORD value No SLogClean 3 Change the Value data of NoIISLogClean to 1 as shown in the example below amp Registry Editor Registry Edit View Favorites Help whlegapd
42. 52 Chapter 3 Single Application Sites Optional Pre configuration of the Services To pre configure the services 1 At the IAG click Start and then point to Programs gt Whale Communications IAG gt Additional Tools gt Service Policy Manager 2 Inthe List pane of the Service Policy Manager click the sign next to Built In Services and then select the service you wish to configure HTTP Connections or HTTPS Connections The Configuration pane displays the parameters of the selected service Figure 3 Service Policy Manager Configuration Pane Service name HDDPS Connections is displayed in External Website Application Server th e titl e b ar Available IP Addresses Available IP Addresses on Add on Add Remove Remove Set As Default Set As Default Def in e Available HTTP Port Numbers Available Port Numbers D ef i ne E a o LES Applicati xterna 80 Remove All D 443 Remove All pplication Website Fane teed Rea Server parameters in Set As Default 2a Sets Default parameters this area Pyalobie HTIRS Pot Numbers Default IP Address A in this area a Default Port Number 80 443 Remove All Remove Set As Default Default IP Address Default HTTP Port Number 80 Default HTTPS Port Number 443 3 Edit the parameters in the Configuration pane as described in Table 3 on page 54 When you finish configuring the services in the Service Policy Manager click O to save and act
43. Authentication described in Chapter 4 Access Control Session settings such as the maximum number of sessions that can be concurrently open through the trunk and how you define default and privileged sessions described in Chapter 5 Session Settings Content Inspection described in Chapter 6 Content Inspection Application Customization described in Chapter 7 Application Customizers Optimizing and troubleshooting portal performance as described in Chapter 8 Optimizing Portal Performance Configuring a High Availability array as described in Chapter 9 Configuring the High Availability Array Configure the Form Authentication engine The engine handles HTML login and change password forms sent by the application as described in Appendix C Form Authentication Engine Chapter 2 SSL VPN Portals Where To Go From Here Chapter 3 Single Application Sites In addition to Portal trunks you can use the Intelligent Application Gateway IAG to create two different types of single application trunks Webmail and Basic Trunks Webmail trunks are dedicated trunks for a single Webmail application and are automatically created with authentication application customization and URL inspection rules that are optimized for the specific Webmail application you are running on this trunk Basic trunks enable you to establish a one to one connection where one IP address routes t
44. Avww myweb com User Monitor Over Time Trunk portal S Microsoft Internet Explorer Figure 54 User Monitor Over Time EE User Monitor Over Time Trunk portal S Authenticated Sessions Authenticated Unique Users a 2 S tA 3 2 2 a A 6 amp a N 0 4 23 27 PM 4 25 27 PM 4 27 27 PM Time 4 29 27 PM 4 31 27 PM 4 33 27 PM Q0 1 2 OT Applet monchart started A internet User Monitor Active Sessions This window provides a detailed snapshot of the currently open sessions for each user Use it for online user access tracking and troubleshooting You select which trunk to display at the top part of the window The parameters that are provided for each session are listed in Table 34 Window Parameters of the User Monitor Active Sessions on page 287 By default the window refreshes the data every five minutes If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Figure 55 Sample User Monitor Active Sessions Window K is Monitor Active Sessions Server time 03 21 2006 16 29 urreni Tunu oona W ox session is a Lead User Session ID E E p u Repository Started At Duration Events Terminate 7 1 whalecomirachel 9D8Z8F4A 3F69 49
45. Configuration window and access the Global URL Settings tab 2 Inthe Upload URLs list access the corresponding rule and do one of the following If required click Edit and use the Edit Upload URLs dialog box to change the URL or the method as applicable If you wish this URL to be considered an upload only if it contains attachments in the Edit Upload URLs dialog box activate the option Check for Attachments in Content Ifthe URL failed on parameters in the Edit Upload URLs dialog box either configure the rule so that parameters are not checked or change the method that is used to check parameters as applicable If you wish the URL to always be considered a regular request and not an upload remove it from the Upload URLs list For details refer to the Intelligent Application Gateway Advanced Configuration guide to Upload URLs on page 155 lt If you wish to cancel the identification of uploads by URLs for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Uploads area uncheck the option Identify by URLs Note A If none of the options in the Uploads area are activated no uploads to the application are blocked regardless of the settings of the application s Upload policy Ifyou wish to enable uploads from the submitting endpoint to the application edit the application s Upload
46. Connection s connectivity option SOCKS or Relay Date and time when the connection was established When you double click a connection you can see the number of bytes sent Chapter 6 SSL Wrapper Remote User Interaction with the SSL Wrapper Figure 27 Sample Portal Activity Window Additional Connection Details Portal Activity x Active Connections https www portal com z SOCKS session to c108 1533 Started 04 30 05 18 24 01 Client gt Server 3138 bytes Server gt Client 1149 bytes Applications Area The Applications area of the Portal Activity window displays a list of the applications that were launched since the SSL Wrapper client was started Figure 28 Sample Portal Activity Window Applications Area Launched Applications citrix to gamma Bs MS excel Power Point TM tn to cachalot Launched applications When you double click an application you can see the following details regarding the application Application name Date and time when the application was launched For client server and legacy applications the application command line For browser embedded applications the text Web Application is displayed Intelligent Application Gateway 187 User Guide Figure 29 Sample Portal Activity Window Sample Application Details Launched Applications TM tn to cacha citrix to gamma Started 04 30 05 18 55 28 Web Application Portal Ac
47. Explorer No preparation is required for other browsers Before you activate the Certified Endpoint option make sure that end users who are using Microsoft Internet Explorer prepare their endpoint computers as follows The browser needs to be configured to enable the download and launching of signed ActiveX objects e For Windows 2000 and Windows XP systems power user access level is required for the current user like any other downloaded program on Windows 2000 and Windows XP Users need to install the Microsoft Security Patch Q323172 on their computer This patch resolves the Flaw in Digital Certificate Enrollment Component Allows Certificate Deletion security vulnerability 134 Chapter 5 Endpoint Security Certified Endpoints The Q323172 security patch can be found at the following locations depending on the operating system end users are using Instruct your end users to follow the instructions on the web site to download and install the appropriate security patch Microsoft Windows 2000 http www microsoft com Downloads Release asp ReleaseID 41568 Microsoft Windows XP http www microsoft com Downloads Release asp ReleaseID 41598 Microsoft Windows XP 64 bit Edition http www microsoft com Downloads Release asp ReleaseID 41594 Adding Certified Endpoint Enrollment to the Trunk Local CA Only This section describes how you add the Certified Endpoint Enrollment application to the list of appli
48. Figure 32 Sample Access Control Tab s Network Connector Server Additional Networks Tab In this tab you can define network destinations that will be available to Network Connector clients in addition to the IP pool that you define in the IP Provisioning tab as described in IP Provisioning Tab on page 193 For example if in the IP Provisioning tab you enable access to the corporate head office use the Additional Networks tab to enable access to additional offices throughout the world which are connected to the corporate head office via the corporate gateway Intelligent Application Gateway 197 User Guide EN Note The Additional Networks option cannot be used if the Internet access level defined in the Access Control tab is non split since in this access mode all network traffic is tunneled over the virtual connection Use the Additional Networks option if the IP pool that is defined in the IP Provisioning tab is a private pool and the Internet access level defined in the Access Control tab is split or none If you do not define the corporate network as an additional network in this setup remote clients are granted access to other clients only and cannot access the corporate network For each of the networks you define here you select how to handle conflicts in case the definitions you enter here conflict with the endpoint computer s local network definitions Fail the connection a
49. Figure 48 Application Monitor Over Time oix Application Monitor Over Time Q Web Monitor portal S f Whale Portal portal S 1 0 75 a rf a amp 0 5 3 3 a 0 25 ghee 5 08 48 PM 5 10 48 PM 5 12 48 PM 5 14 48 PM 5 16 48 PM 5 18 48 PM Time OO uau OO Applet monchart started Eaa FI EO Internet a Application Monitor Active Sessions This window provides a detailed snapshot of the currently open sessions for each application Use it for online user access tracking and troubleshooting You select which trunk and application to display at the top part of the window The parameters that are provided for each session are listed in Table 31 Parameters of Application Monitor Active Sessions Window on page 279 By default the window refreshes the data every five minutes If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Figure 49 Sample Application Monitor Active Sessions Window Application Monitor Active Sessions Server time 03 21 2006 16 00 Trunk portal 5 Application Whale Portal ov amp Bg SessionID Lead User Repository Application Started At Application Duration Events Current 1 OSOD1S5C 70F5 4CD2 8B28 OBASASAFSCFS whalecom qa_admin whalecom 03 21 2006 15 47 46 00 11 22 E 2 OFD5SE6
50. Gateway 261 User Guide Tip You can quickly access the Local Users and Groups Manager via the Configuration program select Admin gt Event Logging and in the Event Logging dialog box in the General tab click the link Configure Monitor Users 2 Inthe Local Users and Groups Manager from the tree in the left pane under Local Users and Groups select Users Note that in the right pane the IAG Administrator user is disabled as indicated by a red X next to the user s name IAG Administrator is disabled hii Usergroup Console Root Local Users and Groups Local Users Kil File Action View Favorites Window Help e gt m 2 C Console Root B G Local Users and Grou Sy Users E Groups Built in account for administering the computer c Built in account for guest access to the compute Intelligent Application Gateway Administrator Local administrators to manage the Intelligent Ap zj aamini Duilk im seenunk Fae angnumane aeenne ka Tnhaun 3 In the right pane of the Local Users and Groups Manager right click the IAG Administrator user and select Properties The IAG Administrator Properties dialog box is displayed e Gap Administrator Properties 2 xi Remote control Terminal Services Profile Dial in General Member Of Profle Environment Sessions Le IAG Administrator Full name Description Local administrators to manage the Intelli
51. IAG thus the ISA Server blocks traffic from the remote LDAP server Resolution At the IAG do the following 1 Add all remote sites to the ISA Server Internal Networks For details refer to the ISA Server help system 2 Add routing entries to the Route Table to route all traffic that is sent to the remote sites to the appropriate gateway Intelligent Application Gateway 377 User Guide 378 Appendix A Troubleshooting Event Logging Messages
52. Search Anti Spyware Anti Virus Personal Firewall build number Date time double Use VBScript DateDiff d AS AV_ _LastUpdate Now lt 7 to check last update Name of domain Lower case full string of user agent OS Service Pack Number For example 4 0 Name of Windows OS logged on user name This section describes how you can optimize endpoint computer settings which might affect the experience of the remote user when working with the portal Endpoint settings are defined in the Session tab of the Advanced Trunk Configuration window in the Endpoint Settings area Endpoint Settings P Uninstall Socket Forwarding Component IV Add Site to Pop Up Blocker s Allowed Sites Endpoint settings that you can optimize include the following options Uninstall Socket Forwarding Component once this option is activated the Socket Forwarding client component is uninstalled from each endpoint computer when the user next access the site If more than one Socket Forwarding component is installed on a computer activating this option deletes only the component of the Chapter 5 Endpoint Security Endpoint Settings current IAG software version For details on the Socket Forwarding component which can be used with the SSL Wrapper refer to Chapter 6 SSL Wrapper While this option is activated the Socket Forwarding component is not installed on endpoint computers regardless of a computer s confo
53. Service for NetWare E This driver is digitally signed Keone Tell me why driver signing is important _ Cancel 7 Verify that Client for Microsoft Networks is selected in the list and click Ok If prompted insert the Windows Server 2003 Installation CD The Select Network Client dialog box closes In the Local Area Connection Properties dialog box Client for Microsoft Networks is listed 8 Make sure that the box next to Client for Microsoft Networks is checked and click to close the dialog box The installation of the Client for Microsoft Networks is complete 9 Reset the IAG as prompted Intelligent Application Gateway 219 User Guide Novell NetWare Settings In order to share Novell NetWare Server resources through the File Access application you need to install a Novell client on the IAG as described in this section cat Note While remote users interact with Novell NetWare Servers through the File Access interface temporary virtual users may be created on the IAG with the following name format whnwu_ lt hexadecimal_value gt Those users are deleted as soon as the real user closes the File Access interface To set up the IAG to enable File Access to Novell NetWare Servers 1 Install a Novell client on the IAG using a Typical installation mode 2 When prompted restart the IAG Access to Novell NetWare Servers can be enabled on the IAG Configuring F
54. The following is required in order for the SSL Wrapper Java applet to run on the endpoint computer and for the applications to be accessed via the applet when the SSL Wrapper ActiveX component cannot be installed or run on the computer JRE version 1 4 and higher must be installed on the computer Java trace level 5 can be configured in the Java Console window is not recommended and may cause the Java applet to go into an infinite loop For details see the following Sun Developer Network page http bugs sun com bugdatabase view_bug do bug_id 5097873 The following browsers on Mac OS X require the installation of JEP Java Embedding Plugin for Mac OS X e Mozilla Mozilla Firefox Mozilla Camino For details see http plugindoc mozdev org OSX html Java On Windows 2000 Professional operating systems in Internet Explorer the option Script ActiveX controls marked safe for scripting must be enabled in the Security Settings of the Internet Options In order for an application to be accessed via the SSL Wrapper Java applet in the Configuration program the application s Access policy should be configured with the option Enforce Policy Only when Endpoint Detection is Enabled 176 Chapter 6 SSL Wrapper Enabling Access to SSL Wrapper Applications You activate this option in the Policy Editor described in Basic Policy Configuration on page 103 in the General Policy Settings screen CD Tip
55. access the System Information window in order to verify your certified endpoint status There should be a checkmark next to Certified Endpoint Viewing and Processing Certificate Requests Local CA Only After a certificate is requested depending on your Certificate Authority Policy you can perform one of the following actions for the certificate request Issue a certificate for the pending request Deny a certificate for the pending request You can view requests for Certificate Authorities in the Certification Authority window To view certificate information 1 In the Windows desktop click and select Programs gt Administrative Tools gt Certification Authority The Certification Authority window is displayed 2 Select the Certification Authority and double click one of the following folders 146 Chapter 5 Endpoint Security Certified Endpoints Revoked Certificates Issued Certificates Pending Requests Failed Requests The information in the selected folder is displayed in the right pane of the Certification Authority window In the example below the Pending Requests folder was selected and all pending requests are displayed 10 x e gt S m 2 Tree Request Submissi Requester Name Taken Under Submission 17 06 2005 12 48 TAN IUSR_ADMIN IL Certification Authority Local Whale Certificate Server C Revoked Certificates E Issued Certificates 4 Pending Requ
56. and tunneled network traffic to and from remote clients The low level and tunneled traffic dumps consist of similar information but are not necessarily the same since not all low level traffic is tunneled and vice versa The dump files are created in the same location where the log files are created as described in Server Logs on page 204 with the following file names e Low level network traffic lt log_file_name gt lowlevel dmp Tunneled network traffic lt log_file_name gt tunnel dmp Tip The log sniff registry value is polled by the server executable while running and may be updated while the Network Connector is in session Set the log sniff value to 0 to disable packet dumps when you finish troubleshooting the server The dump files are written in TCPDUMP format Troubleshooting the Network Connector Client 206 This section describes how you configure the Network Connector client to create logs and packet dumps for troubleshooting purposes Tip Both log and dump files can be written read and deleted while the Network Connector is in session AN Caution It is recommended you do not enable dumps They should be used for advanced troubleshooting purposes only since they create heavy accumulative dump files The files are not deleted automatically and may reduce the server performance considerably Chapter 7 Network Connector Network Connector Troubleshooting
57. are visible in the various fields of the Configuration program This section describes the parameters that are visible and can be edited in two places The main window of the Configuration program as described in Editing in the Configuration Pane on page 59 The General tab of the Advanced Trunk Configuration window as described in Editing in the General Tab on page 61 Editing in the Configuration Pane Note EN This section applies to Webmail and Basic trunks only Portal trunks are described in Chapter 2 SSL VPN Portals This section describes the parameters that you can edit in the main pane of the Configuration program as illustrated in Figure 4 on page 60 The fields are identical in both Basic and Webmail trunks as described in Table 4 on page 60 Intelligent Application Gateway 59 User Guide N Note Once you finish editing the required parameters click to save and activate the configuration Figure 4 Configuration Pane of an Outlook Web Access Webmail Trunk QWA2007 Michosotoutook Web Access 2007 m External Website Application Server IP Address IP Address 192 168 0 119 7 HTTPS Port HTTP Port 80 X I IsSSL Public Hostname MyHost Initial Path fowar m Security amp Networking Application Properties Configure Maximum Connections 500 Advanced Trunk Configuration Configure High Availability Configure
58. as many users as required Intelligent Application Gateway 263 User Guide Web Monitor Browser Support You can access the Web Monitor using the following browsers Operating System Supported Browsers Windows 2000 Internet Explorer 6 0 Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Windows XP 2003 Internet Explorer 6 0 7 0 Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Mac OS X Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Camino 0 83 and higher On computers running Mac OS X you cannot access the Web Monitor directly from the portal homepage Access is possible from any computer that is on the same network as the IAG via port 50002 on the IAG as described in Accessing the Web Monitor on page 260 Web Monitor Layout The Web Monitor is displayed in a web browser The browser window is divided into two panes In the menu on the left a list of links enables you to select the Web Monitor window that you wish to view The links are grouped as follows Session Monitor including Current Status Active Sessions and Statistics Application Monitor including Current Status Active Sessions and Statistics User Monitor including Current Status Active Sessions and Statistics gt Event Viewer Event Query High Availability Array in sites that deploy an
59. at MB value Figure 63 describes the flow of the log file cleanup mechanism Intelligent Application Gateway 315 User Guide Figure 63 Log File Cleanup Mechanism Number of files exceeds hard coded limit Size of files exceeds Start Cleanup at MB Start Mma Next log file of files gt Number of More Undeleted Files candidates Delete oldest files until Stop Cleanup at MB reached Number of Undeleted Files not considered Delete file Reached Stop Cleanup at MBI Cleanup complete 316 Chapter 10 Troubleshooting Log File Cleanup Configuring Log File Cleanup Parameters You can change the default values of the log file cleanup parameters including The minimum and maximum amount of disk space allocated to the log files including IAG event error and trace log files and IIS log files The number of files you wish to retain E Note You can exclude IIS log files from the cleanup process as described on page 318 To configure log file cleanup parameters 1 In the Configuration program on the Admin menu click Advanced Configuration The Advanced Configuration window is displayed advanced Configuration TT x m Host Address Translation Unique Identifier Whale Encryption Key 52B20023C ABS6A9ESEEF63CE54645997 m Default Web Site Ports Log File Cleanup HTTP Port eoor Start Cleanup at 100 MB HTTPS Port e002 Stop Cleanup at
60. can also monitor user behavior over time for a selected trunk or for all active trunks In the table at the bottom of the window click a next to the trunk you wish to monitor or next to All Trunks respectively The User Monitor Over TIme window is displayed as described in User Monitor Over Time on page 286 Intelligent Application Gateway 285 User Guide Figure 53 Sample User Monitor Current Status Window User Monitor Current Status Server time 03 21 2006 16 19 an w N Sessions Unique Users portal S Trunk Name Authenticated Sessions Authenticated Unique Users portal 8 4 All Trunks a 4 User Monitor Over Time The User Monitor Over Time window is displayed when you click a in the User Monitor Current Status window Use it to monitor user behavior over time for a selected trunk or for all active trunks User behavior is displayed in a line chart showing both authenticated sessions and authenticated unique users at pre defined intervals By default the window refreshes the data at 10 second intervals If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Use the paging controls to scroll to the period of time you wish to monitor 2 QQ 286 Chapter 9 Monitoring and Control Web Monitor a https
61. changepassphrase The Passphrase prompt is shown below Passphrase i xj A Please type your passphrase Cancel When prompted enter the passphrase and click OK You can then securely carry on the operation you have started In sites where a number of IAG servers use the same encryption keys such as a High Availability array the same encryption passphrase is used for all the IAG servers at the site Tip CD When using the Configuration program the encryption passphrase you enter is valid for 10 minutes That is during the 10 minutes following an operation that requires access to the configuration files you can access the files again without having to re enter the passphrase Chapter 1 Introduction Encryption High Availability Array For high traffic sites with applications supporting a large number of simultaneous connections the IAG provides a powerful performance enhancement and traffic control solution the High Availability array Implementing central management and supporting a variety of load balancing tools the High Availability array enables you to run a server array consisting of two or more IAG servers while controlling high traffic volumes through the system The High Availability array is configured to route traffic so that it maximizes resource utilization and supports uptime For a detailed description of the High Availability array including step by step instructions on how to configure
62. communicate through this tunnel HTTP Proxy and SOCKS Proxy relays opens a port on the endpoint computer This port acts as either an HTTP or SOCKS proxy server and tunnels the HTTP or SOCKS traffic to and from the application server Using this type of relay the application on the endpoint computer can communicate through the locally opened port with multiple servers and ports The SSL Wrapper makes changes such as changes to the application settings Registry or hosts file in order for the application to communicate through this tunnel This type of relay enables the SSL VPN proxy to request more than one server thus enabling the support of dynamic ports Note A In browsers where the Java applet is used when multiple portals are open concurrently only applications that are launched from the portal that was accessed first can listen on HTTP SOCKS proxy ports Users cannot launch applications that use HTTP Proxy and SOCKS Proxy relays from additional portals For a description of when the Java applet is used refer to Enabling Access to SSL Wrapper Applications on page 175 Transparent relay automatically creates a relay between the endpoint computer and the application server for every application on the client that wants to communicate with the internal network This type of relay is only supported by the Socket Forwarding component and does not require any changes on the endpoint computer Network Connector suppor
63. configure which domains servers and shares are enabled for remote access If the network includes Novell NetWare Services and you wish to enable remote access to NetWare Servers refer to Novell Logon Settings on page 227 before you proceed Tip CD You can configure the File Access option so that users can only view the shares for which they have access permissions For details refer to Configuring Home Directory Mapped Drives and Share Permissions on page 223 To configure access to domains servers and shares 1 Access the File Access window as described in Accessing the File Access Window on page 222 File Access F ZE FileAccess Admin gy Network Sharing Domains J Servers BSc Domains Cae ee a G l a a EE M austraua E M arrica ET asia GE europe Novell GE Z SOUTH AMERICA GE T NORTH AMERICA Intelligent Application Gateway 229 User Guide Tip If you need to refresh the display at any time for instance if there have been changes in the domain structure since the last time you used the File Access window click Refresh 2 Inthe right pane of the File Access window select the domains which will be accessible to remote users through File Access and click Apply E Note If the network includes Novell NetWare Services the following services are available for selection in the Domains window Novell Directory Services NetWare Servers You can use the File Acce
64. described in Prerequisites for Installing the Whale Client Components on page 151 After the initial installation of the Socket Forwarding client users are required to restart their browser and might be required to restart the computer Once the client is installed however users do not require any privileges in order to use the application 178 Chapter 6 SSL Wrapper Enabling Access to SSL Wrapper Applications Tip When users are required to restart their browser the following message is displayed Whale Client Components x e In order to complete the update of Whale Client Components your browser must be restarted This will close all open browser windows Tl Don t show me this message again If a user selects the option Don t show me this message again this message will not be displayed again even when a restart is required In order to receive the message when applicable instruct the user to restore the default settings of the Whale Component Manager as described in Restoring the Whale Client Components Defaults on page 165 During the installation of the Socket Forwarding component the Whale Component Manager checks whether the Socket Forwarding LSP module conflicts with other LSP modules that are installed on the endpoint computer For details refer to LSP Conflict Detection on page 179 If the Socket Forwarding component is not installed on the computer but the SSL Wrapper componen
65. enables you to provide employees and partners with browser based remote access to multiple corporate applications and file systems In order to create an SSL VPN Portal you go through the following stages Portal session setup which includes the lifecycle of a session such as access IP authentication access endpoint policies and more Application setup where you set up the applications you enable through the trunk Once you set up the portal and applications the SSL VPN Portal is operational remote users can access the portal and the applications that are enabled through it Portal session setup and initial application setup are described in Creating an SSL VPN Portal on page 28 Users setup optional to determine which users are authorized to view and access each of the applications enabled through the portal By default all authenticated users are allowed access to all applications You can however configure a more granular setup and determine which users can view and access each of the applications you enable through the portal as described in Users Setup on page 32 Additional portal configuration options you may require are described in Optional Configuration on page 46 including Configuring Global Host Address Translation on page 46 Configuring Application Subnets on page 48 e Changing the Application Access Portal Port Number on page 49 If you need to make adjustments
66. file you downloaded in step 1 The Whale Client Components Installation Wizard starts 4 Follow the instructions on the screen to complete the Wizard and install the components on the computer Chapter 5 Endpoint Security Whale Client Components Offline Whale Client Components Installation This installation mode is suitable for end users who don t have ActiveX download rights on an Internet Explorer browser and are non privileged guest user users In this setup the administrator has to log in to the endpoint computer with power user or Administrator privileges and install the components before the user accesses the site In order to enable offline component installation take the following steps Configure the settings of the offline component installation as described in Configuring Offline Component Installation on page 157 Deploy the component library to end users as described in Deploying Offline Component Installation on page 158 E Note Inform users that during component installation they should not access the portal homepage or any other location within the site Ifthe installation detects that Whale Client Components are already installed on the computer it upgrades any of the components that are of older versions even if their installation is not enabled in the current installation configuration Configuring Offline Component Installation You can configure the following aspects of the of
67. for all the Portal trunks configured in the IAG Chapter 2 SSL VPN Portals Optional Configuration Note A Link manipulation is described in the Intelligent Application Gateway Advanced Configuration guide in Chapter 8 Optimizing Portal Performance Ifyou do not configure HAT parameters here the IAG automatically assigns the required parameters the first time you configure a Portal trunk You can change the configuration settings any time after the initial configuration To configure global HAT parameters 1 2 In the Configuration program on the Admin menu click Advanced Configuration The Advanced Configuration window is displayed x Host Address Translation Unique Identifier Whale Encryption Key 52B20023C ABS6A9ESEEF63CE54645997 m Default Web Site Ports Log File Cleanup HTTP Port e001 Start Cleanup at 100 MB HTTPS Pott e002 Stop Cleanup at 50 MB Number of Undeleted Files Bo Cancel In the Host Address Translation area enter the following Unique Identifier a sign that will be added to manipulated links in responses and by which the IAG will recognize the URL in the request E Note The unique identifier must contain only alphanumeric values Make sure the identifier is not a string that is contained within one of the server names in your organization For example if one of the servers in your organization is named appserver do no
68. from any device or location Highly granular access and security policy enforced at the session application and functionality levels Comprehensive basic and form based authentication through Active Directory RADIUS LDAP and SecurID Customizable identity based web portal with single sign on SSO e Handles embedded browser applications Connectivity and control for client server and legacy applications Intelligent Application Gateway 15 User Guide Protect Assets Integrated application protection helps ensure the integrity and safety of network and application infrastructure by blocking malicious traffic and attacks Application layer firewall blocks non conformant requests such as buffer overflow or SQL injection on application protocols Comprehensive protocol validation and deep content inspection with both positive and negative logic rulesets URL cloaking and full functionality for remote users through dynamic URL rewrite and HTTP parameter filtering Application Optimizers provide out of the box protection for high value applications such as SharePoint Server Microsoft Outlook Web Access SAP and WebSphere Comprehensive monitoring and reporting integrates with third party risk and policy management platforms Extensible infrastructure and tools for custom application publishing and scripting Safeguard Information Comprehensive policy enforcement helps drive compliance with l
69. general settings as described in Table 24 General Tab Parameters on page 241 240 Chapter 9 Monitoring and Control Event Logging Table 24 General Tab Parameters Parameter Description Queue Size Number of events that are displayed in the Event Viewer window of the Web Monitor as follows Number of events that are displayed each time a user opens the Event Viewer window e Maximal number of events that are added to the message list between refreshes For example if the queue size is 50 and the refresh rate is 15 seconds after a refresh no more that 50 events are added to the event list in the 15 seconds that elapse until the next refresh If in this setup 60 events are received between refreshes only the last 50 will be displayed in the event list For a description of the Event Viewer window refer to Event Viewer on page 293 Max Report Results Maximal number of events that can be fully displayed in the Web Monitor when you generate a query as follows Session Monitor Statistics window if the number of query results exceeds the number defined here Duration is not displayed Application Monitor Statistics window if the number of query results exceeds the number defined here Duration and Total Accesses are not displayed User Monitor Statistics window if the number of query results exceeds the number defined here the results are not displayed The user is notifie
70. is Collected from the End User s Computer ssssessesssrseeseerersereeerrersees 97 Application Endpoint Policies senses snecceescexctctueccanewesdnnnoeendaasranccsuamstesaetiancandeasareranneeea 99 Defining Application Endpoint Policies sseesessessseseeseesesseseeseeseesesessensenresesseesenensenseererenresee 99 Editing Application Policies s scicsccccssscasssvssssssessevsessseasnsesssasesaveescssdssnonsnconesesbasveasessaseasevaes 100 Default Policies sicsinnscsacahonnenasensienotesstutsintaseentewsiess e esr EEE E R 101 Basic Policy Configuration ssssssseessisssiasssivsesskiei ossesssseiveniesiss riveree esre ESen ineat nessi 103 Advanced Policy Configuration esesseseseseeseeeeserseresessrseeseeseeesessesseserseesreeseeseeseesereeeeess 104 Advanced Configuration Overview e e sssesseseeseesseseesesseesreresesreereresrenseerereseeseeereresreseeeene 105 Configuration in the Advanced Policy Editor seeseseesseeseeseesseresresrrsrrrereeseererresereerersensenee 106 Variable FOPMats cscvsssscsstsasssaSucoxvastovesscovsascessdnessto ERE EERE S EERTE 107 Endpoint Settings aac occcc pet haatdspsacenacmednesscbtss e R EEE R EEEa 108 Attachment Wiper ssoerrsoseeser dusteteadsasnseastudlensicecnanesednedoacwusicencteyaentessunnpnidiamies EEE 110 Configuring the Attachment Wiper eesesessssesresseresesersrereeseessersensesreneeneenseesereeneeeeeesenses 112 Cleanup of Items That Are Saved Outside the Cache ssessssesseeseerseeseesesserserseeseesess
71. is described on page 234 of the guide Once you enable cookie encryption for an application the IAG applies the encryption of Set Cookie headers in one of two modes Exclude mode all Set Cookie headers are encrypted except for the cookies that are listed in the cookie lists including both global and per application lists Include mode only headers that are listed in the cookie list are encrypted The list is applied per application only Encrypted cookie names and values are decrypted by the IAG when they are returned by the browser in the Cookie header If the cookie encryption process encounters problems when a remote user requests a page the Cookie header in the request is blocked and is not forwarded to the server The request is processed however and the user experience is unaffected In this case a Warning message is reported in the Web Monitor in the Event Viewer CD Tip Click the ID number of a message to view troubleshooting information You can also access this information in Appendix A Troubleshooting Event Logging Messages messages 94 101 You enable cookie encryption select the encryption mode and configure the per application cookie list in the Cookie Encryption tab as described in Table 13 on page 81 For a description of the global exclude list see Global Exclude List on page 82 Chapter 4 Application Settings Editing Application Properties Figure 12 Appl
72. is set to Automatic Startup mode Tip A dedicated network icon in the Windows System tray indicates that the Whale Network Connector Server service is started Intelligent Application Gateway 191 User Guide Network Segment Tab 192 Use this tab to Select the relevant corporate connection that the server should use This is normally the connection defined for the internal IP interface of the IAG Once you select a connection the fields in the Network Connection area are automatically populated with the connection information Optionally configure complementary networking data as described in Complementary Data on page 192 Figure 30 Sample Network Segment Tab s Network Connector Server x Network Segment I IP Provisioning Access Control 3 Additional Networks 3 Advanced Use the Following Connection Intel 21140 Based PCI Fast Ethemet Adapter Generi m Network Connection m Complementary Data IP Address fiszies2220000 Use the Following Data Only if Network Configuration is Missing Subnet Mask 255 255 248 0 C Always Overriding Existing Network Configuration of This Server DNS Piima fis2te7T DNS Primary f DNS Secondary 192 168 1 37 DNS Secondary ww DNS Suffix fiwhalebz DNS Sufix o WINS Primary poas WINS Primary Doo o WINS Seconday pooo WINS Seconda o Gateway fz21 Gateway i oe Complementary Data In this
73. it refer to the Intelligent Application Gateway Advanced Configuration guide to Chapter 9 Configuring the High Availability Array About This Guide This Guide is intended for the system administrator of the IAG It provides you with in depth information about the IAG s functionality and how you can best use its various components and options It includes step by step instructions on how to configure maintain monitor and control any number of IAG servers either locally or over the network This Guide provides information on the following topics Chapter 2 SSL VPN Portals explains how you use the Create New Trunk and Add Application Wizards to create SSL VPN portals to secure access to multiple applications from remote locations anywhere anytime Chapter 3 Single Application Sites describes how you can use the Service Policy Manager to pre configure the HTTP and HTTPS Connections services how you create Webmail and Basic trunks and how you use the Configuration program to edit trunks once they are created Chapter 4 Application Settings describes application specific settings you can edit and control after you add the application to the trunk or create a Webmail trunk such as the application s web and non web servers application authentication and more Chapter 5 Endpoint Security describes features that help to protect your internal network against access from non secure endpo
74. lines lt script language JavaScript gt var whaleCacheClean GetCacheCleanInstance ActivateCacheCleanDontSurf lt script gt 116 Chapter 5 Endpoint Security Attachment Wiper When Encrypted Pages Are Saved to a Location Other Than Temp Files Normally Internet Explorer browsers save encrypted SSL pages to the temp files folder However end users can enable the Do not save encrypted pages to disk setting in Internet Explorer Tools gt Internet Options gt Advanced tab and prevent the browser from saving SSL pages to the default temp files folder In this case when users download an SSL page they are prompted to provide an alternative location where it should be saved In this setup when a session ends the Attachment Wiper clears the temp files folder but cannot identify the location to which the encrypted pages are saved In order to prevent these pages from remaining on the endpoint computer at the beginning of each session the Attachment Wiper automatically disables the Do not save encrypted pages to disk setting if enabled so that encrypted pages are saved to the temp files folder At the end of the session after the Attachment Wiper stops monitoring all open sessions the Do not save encrypted pages to disk setting is reverted its original status You can cancel the disabling of the Do not save encrypted pages to disk setting as described below
75. link to the application from the portal homepage as described in Table 16 on page 88 Note EN The parameters you define in the Portal Link tab apply only if you use the Whale Portal that is the default portal homepage supplied with the IAG or the Whale toolbar In order to add the link on a custom homepage refer to the Intelligent Application Gateway Advanced Configuration guide to Using a Custom Portal Homepage on page 61 Intelligent Application Gateway 87 User Guide 88 For the File Access application you can also use this tab to hide the folder tree left pane in the remote user interface This will prevent users from browsing to any folders other than the one defined as the application URL or its subfolders For details refer to Hiding the Folder Tree in the End User Interface on page 234 Figure 16 Application Properties Portal Link Tab Application Properties Webtop Documentum xj amp Download Upload R Portal Link ES Authorization al gt IV Add Link on Portal and Toolbar Portal Application Name webtep Folder O O Application URL http localhost webtop Icon URL images Applcons w ebtop gif Short Description Description re I Startup Page T Open in New Window PCs and Handhelds PCsOnly Handhelds Only Application Supported On Parameter Add Link on Whale Portal and Toolbar Portal Application Name Table 16 Portal Link Tab Para
76. logon Display user information when the session Not Defined et eee Rd Interactive logon Do not display last user name Disabled Re Interactive logon Do not require CTRL ALT DEL Disabled Re Interactive logon Message text For users attempting to log on Rg Interactive logon Message title for users attempting to logon Not Defined Re Interactive logon Number of previous logons to cache inca 10 logons Re Interactive logon Prompt user to change password before e 14 days Re Interactive logon Require Domain Controller authentication t Disabled Re Interactive logon Require smart card Disabled Re Interactive logon Smart card removal behavior No Action RE Microsoft network client Digitally sign communications always Disabled Re Microsoft network client Digitally sign communications if ser Not Defined RE Microsoft network client Send unencrypted password to thir Not Defined Re Microsoft network server Amount of idle time required befor 15 minutes RE Microsoft network server Digitally sign communications alwa Disabled RE Microsoft network server Digitally sign communications if cli Disabled 3 Inthe right Policy pane set the Local Security Policy settings of the policies listed in Table 22 Tip To edit a policy double click it in the Local Security Policy Setting dialog box select the required setting and click OK Tabl
77. mail to the recipients you configured in Enabling the Mail Reporter to Send Messages on page 246 Note EN Message configuration is implemented in an XML file In order to edit it you need to have a working knowledge of XML technology To configure the messages that will be sent by mail 1 Create a custom message definitions file as described in Configuring Event Messages in the Message Definitions File on page 249 If such a file already exists use the existing file Intelligent Application Gateway 247 User Guide 2 For each message that you wish to send to the SMTP server under the lt Reporters gt element add a new lt Reporter gt element with the value mail as follows lt Reporter gt mail lt Reporter gt For details regarding the reporting elements refer to lt Reporters gt on page 256 For the full syntax of the message definitions file refer to Event Logging Message Definitions File on page 250 For Example To send an email message each time the number of concurrent authenticated sessions that can be opened through a trunk is exceeded access the message Number of Max Concurrent Sessions Exceeded and add the Mail reporter as shown in the example that follows Note that for the clarity of the example some of the event parameters were removed from the sample code lt Message gt lt Id gt 15 lt Id gt lt Severity gt Warning lt Severity gt lt Type gt Session lt Type gt Nam
78. more information about adding applications to a trunk refer to Creating an SSL VPN Portal on page 28 Adding the CA to the Certificate Trust List All CAs EN Note If you are using a remote CA import your server certificate into the local computer s Trusted Root Certification Authorities Certificate store before proceeding For details contact technical support The Certificate Trust List CTL is a signed list of CA certificates that have been judged reputable by the administrator In order to use a CA you have to notify the IAG that you trust the CA by adding it to the CTL for the portal To add a CA to the CTL 1 Inthe Windows desktop click and select Programs gt Administrative Tools gt Internet Information Services The Internet Information Services IIS Manager window is displayed 2 Right click on the portal and select Properties The portal Properties dialog box is displayed 3 Click the Directory Security tab 136 Chapter 5 Endpoint Security Certified Endpoints 4 5 6 portal Properties 21x Web Site Performance ISAPI Filters Home Directory Documents Directory Security HTTP Headers Custom Errors M Authentication and access control Enable anonymous access and edit the bs authentication methods for this resource MIP address and domain name restrictions Grant or deny access to this resource using A IP addresses or Internet domain names Edit M
79. of automatically installed components Response write lt Component Name SSL Wrapper ID 1 Install nq gt The following line adds the Network Connector component to the list Response write lt Component Name Network Connector TD V7 Install 4 wu gt The following line adds the Socket Forwarding component to the list Response write lt Component Name Socket Forwarding TD 8 wu Install ai gt In addition the following lines enable the Socket Forwarding activation mode Intelligent Application Gateway 153 User Guide Basic mode Response write lt Component Name Socket Forwarding activation Basic TD 33 Install 1 gt Extended mode Response write lt Component Name Socket Forwarding activation Extended ID 65 Install 1 gt VPN mode Response write lt Component Name Socket Forwarding activation VPN TD 129 Tnstall 1 gt Make sure the required Socket Forwarding Activation mode is enabled if the component is used by multiple applications in various Activation modes make sure all the applicable modes are enabled When users next access the site the automatic component installation includes the additional components you defined here Whale Client Components Installer This installation mode is suitable for end users who do not have ActiveX download rights on an I
80. on page 59 Editing the Server Settings in Webmail trunks that enable Domino iNotes Single Server and Domino iNotes Multiple Servers applications as described in Editing Webmail Trunk Server Settings on page 64 Options that are described in other chapters of this Guide include Editing any of the applications properties in the Application Properties dialog box as described in Editing Application Properties on page 67 Changing the event logging definitions as described in Event Logging on page 237 Enabling access to the Web Monitor as described in Enabling Web Monitor Access from Computers Other Than the IAG on page 261 Additional options are described in the Intelligent Application Gateway Advanced Configuration guide including Customizing the look and feel and other aspects of the HTML pages the user interacts with for example changing the company logo and the color scheme described in Chapter 3 Customizing Web Pages Authentication Server Name Translation and Initial Host Selection described in Chapter 4 Access Control Session settings such as the maximum number of sessions that can be concurrently open through the trunk and how you define default and privileged sessions described in Chapter 5 Session Settings Content Inspection described in Chapter 6 Content Inspection Application Customization described in Chapter 7 Application Customi
81. original name of the cookie that was blocked using the EncryptedName and OrigName parameters in the log file the encrypted name is indicated in the Description field of the event in the Web Monitor s Event Viewer Still at the IAG in the Configuration program open the Application Properties dialog box for this application and access the Cookie Encryption tab Add the cookie that was blocked to the Cookies list For details refer to Cookie Encryption Tab on page 80 372 Appendix A Troubleshooting Event Logging Messages Warning 101 Cookie Size Too Big Symptoms None Cause A cookie encryption violation was detected The size of the encrypted Set Cookie header exceeds the 4 KB limit Resolution In order to exclude this cookie from the cookie encryption process take the following steps 1 Use the IAG s trace mechanism to resolve the original name of the encrypted cookie a At the IAG access the trace configuration file Whale Com e Gap Common Conf trace ini b Add the following lines to the file Trace Wh1Filter WHLFILTSECUREREMOTE xheavy Save the file c Use a browser to request the URL that caused the Warning message as detailed in the Description field of the event in the Web Monitor s Event Viewer d At the IAG access the trace log file in the following location Whale Com e Gap logs The file is na
82. policies is disabled when the option Disable Component Installation and Activation in the Session tab of the Advanced Trunk Configuration window is activated Click Help for detailed information on the parameters in this tab Default Policies The IAG supplies you with pre defined default policies for all the session and application policies Those are optimized for a smooth running of the IAG while still applying security restrictions For example when you create a trunk the following policies are selected by default For Session Access Policy Default Session Access The default value of this policy is True allowing all endpoints access Intelligent Application Gateway 101 User Guide 102 For Privileged Endpoint Policy Default Privileged Endpoint The default value of this policy is False meaning that no endpoints will be considered privileged unless you edit this policy and set the criteria that will render an endpoint a privileged endpoint Note EN The Install Socket Forwarding Component Policy is set to Always by default You can view the values of the default policies and edit their definitions as well as create new policies using one of the Policy Editors as follows The Policy Editor is an easy to use basic editor you can use to create simple policies without the need for defining variables and entering complex Boolean expressions The basic editor can check the e
83. policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 346 Appendix A Troubleshooting Event Logging Messages Warning 42 Upload Policy Size Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Upload policy the requested upload is not allowed Cause The request failed since the size of the transfer data render it an upload and the application s Upload policy forbids uploads from the submitting endpoint Resolution In the Configuration program do one of the following Ifyou wish requests of this size to be considered regular requests and not uploads increase the size of data above which a request from this application is considered an upload 1 Open the Application Properties dialog box and access the Download Upload tab In the Uploads area increase the size defined in Identify by Size For details refer to Download Upload Tab on page 82 Ifyou wish to cancel the identification of uploads by size for this application uncheck the optio
84. s parameters In the following sample screen a Webmail trunk was created for the application Microsoft Outlook Web Access 2007 OWA2007 Microsoft Outlook Web Access 2007 m External Website m Application Server IP Address I IP Address 192 168 0 119 x HTTPS Port HTTP Port 80 X T IsSSL Public Hostname MyHost Initial Path owe m Security amp Networking Application Properties Configure Maximum Connections 500 Advanced Trunk Configuration Configure High Availability Configure 5 In the Configuration program click OD to save and activate the configuration The following is displayed Intelligent Application Gateway 55 User Guide 56 6 Configuration xi Po L gt j Activate Configuration We recommend that you back up the configuration settings directly after the initial configuration Following the initial backup make sure to back up the configuration settings each time you modify them in order to ensure that the backup is updated at all times Back up configuration after activation If you have made manual changes to any of the external configuration settings such as changes to XML files or to Registry settings select this option to apply the changes before activation Selecting this option will reload the configuration for all trunks I Apply changes made to external configuration settings Please press the lt Act
85. that are currently open via all the trunks of the IAG you are monitoring At the top part of the window a column chart displays each trunk in a separate column and shows the total number of sessions that are currently open through the trunk that is both authenticated and unauthenticated sessions At the bottom part of the window active trunks and open sessions are listed in a tabular format including the number of authenticated and unauthenticated sessions Clicking the number of total sessions opens the trunk s Session Monitor Active Sessions window described in Session Monitor Active Sessions on page 268 By default the window refreshes the data every 15 seconds If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 You can also monitor session behavior over time for a selected trunk or for all active trunks In the table at the bottom of the window click next to the trunk you wish to monitor or next to All Trunks respectively The Session Monitor Over Time window is displayed as described on Session Monitor Over Time on page 267 You can use the different displays to compare activity between trunks and analyze trends and variations over time Chapter 9 Monitoring and Control Web Monitor Figure 41 Sample Session Monitor Current Status Window s
86. the IAG and the application server At the IAG the following file holds the definitions of file extensions and the associated content types Whale Com e Gap von conf content types ini Applicable for downloads only when the option Identify by Extensions is activated The value you enter here should be identical to the application s unknown content type settings Identify downloads or uploads based on the size of transfer data Note GET requests are treated as downloads POST and PUT requests are treated as uploads Chapter 4 Application Settings Editing Application Properties Server Settings Tab This tab is applicable in Portal trunks only for Client Server and Legacy Applications and Browser Embedded Applications It contains the configuration of the application s non web server or servers The parameters available in this tab vary according to the application you are editing Tip In order to see a description of the parameters that are relevant to the current application click Het For SSL Wrapper applications the Help also provides a list of operating systems on which the application is supported To edit server settings for Domino iNotes non web servers in Webmail trunks see Editing Webmail Trunk Server Settings Figure 14 Application Properties Sample Server Settings Tab Application Properties Citrix NFuse FR2 Direct Eg amp Download Upload Server Settings E
87. the application prompts them to restart the computer In order to run this setup users must be logged in with Administrator privileges to enable changes to the Registry Note A This setup may decrease SMB performance no direct hosting and may impact applications that rely on SMB over TCP IP We recommend that you set this application up as follows In the Server Settings tab of the Add Application Wizard do not enable the option Launch Automatically on Start else users will be prompted to restart their computer each time they access the site In the next step Portal Link activate the option Add Link on Whale Portal and Toolbar and define the link settings so that the setup can be accessed via the portal homepage or the Whale toolbar Use the Description field to add a note telling users of Windows XP 2003 they need only run this application once in order to enable access to mapped drives Do not define this application as a prerequisite application to a Local Drive Mapping application else users will be prompted to restart their computer each time they access the mapped drive File Access File Access is a web application that enables authorized remote users to access view and download files from the organization s Windows Network and Novell NetWare file servers from any location and to upload files to the servers using a browser Via the portal File Access presents remote users with an Explorer
88. the window displays information on each of the trunks that were queried as described in Table 29 Session Monitor Statistics Window Query Results on page 274 e You can view the data that is displayed in the chart in a tabular format by clicking AE Use the paging and zooming controls to focus the view on the period of time you wish to monitor u Bp Intelligent Application Gateway 273 User Guide When you zoom out to the smallest view the window displays the entire period that is queried up to the pre defined interval limit When you zoom in to the largest view the window displays 10 intervals to view additional intervals use the paging controls To return to the query form click Show query form Figure 46 Session Monitor Statistics Window Query Results Session Monitor Statistics Server time 03 14 2006 17 27 amp Query Details Period 03 1 4 2006 00 00 00 03 14 2006 18 00 00 Interval Hour Query type nw Sample Chart Statistics available up to 03 14 2006 17 24 54 Show query form portal Ss ZAE 10 2 a8 Ss wa ge pA a 2 wa E4 2 5 o 5 o2 03 14 00 00 03 14 04 00 03 14 08 00 03 14 12 00 03 14 16 00 03 14 20 00 Time QO 1 OO omo Trunk amp Concurrent Sessions Duration Concurrent Sessions Settings Max Min Average Max Threshold Limit View portal 5 10 0 00 58 40 01 04 01 0 10000 Ez Table 29 Session Monit
89. to Windows file servers Novell NetWare Settings on page 220 describes the steps you need to take in order to enable access to Novell NetWare Servers N Note If you wish to enable access to both types of servers follow the instructions provided in both sections Windows Domain Settings Note EN In order to configure the domain settings described here you need to have a working knowledge of Windows networking This section describes the Windows domain setup required in order to share Windows Network resources through the File Access application and the trust relationships between the domains in a multiple domain environment 212 Chapter 8 Providing Access to Internal File Systems File Access You can set up the IAG Windows domain using one of two options Define the IAG as a domain controller for a new Active Directory domain as described in Setting Up the IAG as a Domain Controller on page 213 Join the IAG to an existing Windows domain for this setup refer to Joining the IAG to an Existing Domain on page 215 Setting Up the IAG as a Domain Controller In this setup you configure the IAG as the domain controller for a new Active Directory Windows 2003 domain in a new domain tree in a new forest Follow the guidelines provided below for this type of configuration During the installation of the Active Directory on the IAG make sure to select the following options Domain Controller for New Dom
90. to be considered a restricted zone only if it contains attachments click Edit and in the Edit Forbidden URLs dialog box activate the option Check for Attachments in Content Ifyou wish the URL not to be part of the restricted zone remove it from the Restricted Zone URLs list For details refer to the Intelligent Application Gateway Advanced Configuration guide to Restricted Zone URLs on page 158 If you wish to disable the Restricted Zone feature for this application take the following steps 1 Open the Application Properties dialog box and access the Web Settings tab 2 Uncheck the option Activate Restricted Zone Ifyou wish to enable access to the restricted zone from the submitting endpoint edit the application s Restricted Zone policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 376 Appendix A Troubleshooting Event Logging Messages Warning 108 Unable to Retrieve Information from LDAP Server Symptoms A remote user logs in to the site The login process is slower than usual Cause The site to site VPN is not configured in the ISA Server on the
91. unsupported environment variables in the users logon scripts the remote user will not be able to access the mapped drives as expected Intelligent Application Gateway 225 User Guide In order to examine which environment variables are supported for a typical user take the following steps at the IAG Open a Command prompt and impersonate the user by entering this command runas user lt username gt cmd exe Where lt username gt is the username as entered by the user during login In the secondary command window that opens representing the user you defined run the set command The environment variables that are displayed are the variables that are supported by the IAG for this user Deleting User Profiles When Using Mapped Drives Each time a remote user accesses mapped drives via File Access the File Access engine runs the user s logon script For each new user the operating system of the IAG creates and saves a user profile By default user profiles are not deleted from the server including old profiles that are no longer used This consumes disk space unnecessarily In addition in environments where a large number of users access mapped drives if a 10 000 profile limit is reached new profiles cannot be created and new users cannot access the drives This section describes how you can configure the IAG to delete user profiles from the IAG when required Note the following Only profiles of domain users are del
92. web initiated The application s configuration data is usually downloaded from the network at runtime For example Citrix NFuse FR2 and FR3 applications IBM Host On Demand Terminal Services Web Client and more Intelligent Application Gateway 181 User Guide Tip For a list of operating systems on which an application is supported click Help in the Server Settings tab of the Add Application Wizard or the Application Properties dialog box The SSL Wrapper open architecture enables the addition of other applications if required For details contact technical support Generic Applications 182 This group includes the enhanced generic client applications and the generic Carbonized applications Enhanced generic client applications are non web applications that run in a console environment Generic Mac OS X Carbon Applications are non web Mac OS X applications that run in a Carbon application framework For each of those application types you can select between the following options depending on the requirements of the application you are configuring hosts required running the application requires the Java applet to make changes to the hosts file on the endpoint computer If changes cannot be made to the file for example due to insufficient user privileges the application is not launched and the relay that was opened for the application is closed hosts optional when the application attempts t
93. you need to change the permissions you assign to users and groups in this repository correspondingly Figure 1 on page 39 illustrates the process of configuring users authorization permissions for an application 38 Chapter 2 SSL VPN Portals Users Setup Figure Flow of Configuring Application Authorization Application Application Properties dialog box All Users Are Authorized Select Users or Groups dialog box Choose users groups in repository Yes Application Properties dialog box Assign access permissions to chosen users groups Authorized users can access application To assign authorization for an application 1 In the Configuration program from the List pane select the trunk that enables the application you wish to edit In the Configuration pane in the Applications area select the application and click Edit or double click the application The Application Properties dialog box is displayed Select the Authorization tab Intelligent Application Gateway 39 User Guide In the Authorization tab the option All Users Are Authorized is checked Application Properties Citrix NFuse FR2 Direct kel TJ Client Settings Portal Link 2 Authorization V All Users Are Authorized Users Groups View Deny Save As Local Group Cancel 4 Uncheck the option All Users Are Authorized and click Add Th
94. 03 BCS8 D1004DFCLA77 whalecom 03 21 2006 16 26 19 00 00 59 49 x highlighted 2 whalecomiruti gt E0113476 E557 47E8 A8B2 F725545753A1 Whalecom 03 21 2006 16 22 39 00 04 39 9 x 3 whalecom qa_admin oSop18scC 70FS 4CD2 8B28 OBASASAFSCFS whalecom 03 21 2006 15 45 16 00 42 02 E5 8 4 whalecomtrachel OFDSE60D B846 40F S 99Z2A SCD458813007 whalecom 03 21 2006 15 41 04 00 46 14 9 x 5 whalecortqa_admin 237901D4 5404 4432 9C27 689B5F83A339 whalecom 03 21 2006 15 36 54 00 50 24 4 x 6 whalecomtyarivm SB6E1B23 62ER 4CES BC93 6SESA609E7F9 whalecom 03 21 2006 15 36 26 00 50 52 4 x Table 34 Parameters of the User Monitor Active Sessions Window Parameter Description Lead User User who initiated the session Intelligent Application Gateway 287 User Guide User Monitor Statistics 288 Table 34 Parameters of the User Monitor Active Sessions Window Cont d Parameter Session ID Repository Started At Duration Events Terminate Description Unique session ID Clicking the session ID opens the Session Details window described in Session Details on page 270 Authentication repository of the user who initiated the session Date and time when the session was started Duration of the session Clicking generates a report of events related to the session The report is displayed in the Event Reports window described in Event Report on page 297 Clic
95. 0D B846 40F5 992A 5CD45A813CC7 whalecomtrachel whalecom 03 21 2006 15 41 42 00 17 26 EY session Is 3 237901D4 5404 4432 9C27 689B5F83A339 whalecomga_admin whalecom 03 21 2006 15 37 15 00 21 53 E P N 4 3B6E1B23 62RE 4CES BC93 65E3A609E7F9 whalecomtyarivm whalecom 03 21 2006 15 36 57 00 22 11 highlighted gt 4B53CEES 69ED 4DB2 9218 ECC7037D2A59 whalecom ruti whalecom 03 21 2006 15 32 38 00 26 30 EJ 278 Chapter 9 Monitoring and Control Web Monitor Table 31 Parameters of Application Monitor Active Sessions Window Parameter Session ID Lead User Repository Application Started At Application Duration Events Description Unique session ID Clicking the session ID opens the Session Details window described in Session Details on page 270 User who initiated the session Authentication repository of the user who initiated the session Date and time when the application was launched Length of time during which the application was active Clicking generates a report of the session s application related events The report is displayed in the Event Reports window described in Event Report on page 297 Application Monitor Statistics This window enables you to view and analyze both the history and the current status of a selected application or any number of applications such as the number of concurrent accesses to the application e Use the query form to submit a query as d
96. 9 User Guide Warning 36 Download Policy Violation No Content Type Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response header does not contain a content type Responses without content type are rendered a download and the application s Download policy forbids downloads to the requesting endpoint Resolution At the IAG do one of the following If you wish downloads without content type to be considered regular responses and not downloads create the following Registry key Location whale Com e Gap Von UrlFilter DWORD Value name AllowResponseWithoutContentType gt DWORD Value data 1 After you create the key access the Configuration program activate the configuration and select the option Apply changes made to external configuration settings Ifyou wish to enable downloads from the application to the requesting endpoint edit the application s Download policy in the Configuration program The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 lt Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details ref
97. A to the Certificate Trust List All CAs on page 136 Backing Up the Certificate Settings All CAs on page 140 Intelligent Application Gateway 123 User Guide Installing a Microsoft Certificate Authority Local CA Only 124 This section describes how you install the Microsoft Certificate Authority on the IAG in order to provide users with the required certificates in a local CA setup If you use a CA installed on a remote computer you have to use other means in order to provide users with the certificates To install Microsoft Certificate Authority 1 In the Windows desktop click and select Settings gt Control Panel gt Add Remove Programs The Add Remove Programs Properties dialog box is displayed 2 Click Add Remove Windows Component The Windows Components Wizard is displayed Windows Components Wizard q x Windows Components You can add or remove components of Windows To add of remove a component click the checkbox 4 shaded box means that only part of the component will be installed To see what s included in a component click Details Accessories and Utilities application Server E Certificate Services E mail Services 1 1 MB V AZA Fax Services 79MA x Description Installs a certification authority CA to issue certificates for use with public key security programs Total disk space required 5 1 MB Detail Space available on disk 4692 9 MB __Deta
98. AG When remote users view files and folders the date format is the one you set here Hiding the Folder Tree in the End User Interface By default the end users File Access interface presents users with a folder tree in the left pane The folder tree contains all the folders you enable in the File Access administration window as described in File Access Administration Settings on page 221 If you wish to restrict users access to a specific folder you can define the path of the folder as the application URL and disable the view of the folder tree Users can then access only the path that is defined as the application URL including all subfolders This procedure describes how you hide the folder tree if the trunk you are configuring uses the default portal homepage supplied with the IAG If you use a custom homepage refer to the Intelligent Application Gateway Advanced Configuration guide to Adding Links to IAG Features on a Custom Homepage on page 66 234 Chapter 8 Providing Access to Internal File Systems File Access To hide the folder tree in the end user interface 1 Inthe Configuration program s configuration pane double click the File Access application The Application Properties dialog box is displayed 2 Select the Portal Link tab E Download Upload Portal Link 82 Authorization 4 gt IV Add Link on Portal and Toolbar Portal Application Name Fie Access Folder Po Application URL
99. Altemative Path Full Name o nc lov Tip For a description of the Advanced tab refer to Advanced Tab on page 199 Logging parameters include Log Level can be 1 5 where 5 is the most detailed log level Tip Set the log level to 0 to disable logging when you finish troubleshooting the server Log Path defines the location where the log file is created Server Executable Path the log file is created in the same location where the server executable resides as follows Whale Com e Gap common bin whlios log Alternative Path the log file is created in the location you specify here Make sure to enter the full file path Tip CD The log files can be written read and deleted while the Network Connector is in session 204 Chapter 7 Network Connector Network Connector Troubleshooting Server Resources The Server Resources area of the Advanced tab of the Network Connector Server window defines the server s resource usage It is recommended you do not change the default settings they are only used for advanced troubleshooting purposes For example perform server optimizations by fine tuning its threads and memory usage Figure 36 Advanced Tab Server Resources Area Server Resources Number of Threads fi perCPU Device Timeout 20000 Miliseconds Tunnel Buffer Size fi 6 KB Service Timeout 20000 Milliseconds Device Buffer Size KB Restore Defaults
100. Apache is a service mark trademark or registered trademark of The Apache Software Foundation or its subsidiaries in the United States and other countries or both Terminal Services is a service mark trademark or registered trademark of The Regents of the University of California or its subsidiaries in the United States and other countries or both Unix is a service mark trademark or registered trademark of The Open Group or its subsidiaries in the United States and other countries or both XCompress is a service mark trademark or registered trademark of XCache Technologies Inc or its subsidiaries in the United States and other countries or both All other trademarks copyrights product and or service marks mentioned in this manual whether claimed or registered are the exclusive property of their respective owners DISCLAIMER The Company has reviewed this manual thoroughly All statements technical information and recommendations in this manual and in any guides or related documents are believed reliable but the accuracy and completeness thereof are not guaranteed or warranted and they are not intended to be nor should they be understood to be representations or warranties concerning the products described Further the Company reserves the right to make changes to the information described in this manual at any time without notice and without obligation to notify any person of such changes LIMITATION OF LIABILITY Neither t
101. Applications custeetencaticcetcoadtentatescastecabchucasbarton smamapeconcctmaateeaiaeusevesseastucttcenedtenene 182 Configuration OvervieW ccts occas ccacctencscacasttecedsestetenanckictesoagaeateadaedaretaesaucdelaeaastcaeatnneaccenines 183 Remote User Interaction with the SSL Wrapper secissscccscccscetocscassiedansstbsscesinssntestocreetsbexs 183 Portal Activity WV ING OW sccusvnsssscniucsnecesuns souccsstinasenetason tsbienssanutenses seuss SEESE Ehre Etan ison 184 Connections Areas oreste een R e Ee E e ET 186 Applications Area cssiscciscscsvecscscaasetestssctvssccavessedsssaceeestc sveveedsassncenes setepsoedvenee consesedvttctovsbesen 187 Portal Activity Window BUttONS ssessccsesecseceeseseecsscesesceeceseseseeesessesesceessseeseseneesssees 188 Chapter 7 Network Connector cccccccssscccrscscscccccccsssccceccees 89 Network Connector Technology Highlights sic ccsssscsncsecassecenecascattosieceaaseccesaascsnansecucstenbasee 189 Configuring the Network Connector s eessssesssessessesseseessreseesrsseneeeseeserseesersereenseeseeseeseeseee 190 Configuring the Network Connector Server eesessessesrereessessesseseeneeeseesersereereeeeeesesses 190 Network Sesment Tab s sic satcseesssccstestccvesucss cevseuaensies SNTE EEKE EEEE EEEE EEEE Edea SSE 192 IP Provisioning Tab wsssssssssissssecsossessssestsoausiesuassscdecsteveossessescedeeasasseseh svessnee secdeveassnssasaaess aes 193 AGGESS Control Labi vcsesicctecscevstectestic
102. Certification Policy This procedure describes how you change the pending timeout interval of the Manual certification policy To set the pending timeout interval 1 At the IAG open the following file Whale Com e Gap Von WhaleSEP inc certdat inc Note EN This file is only available on the IAG after you install the CA on the server as described in Installing a Microsoft Certificate Authority Local CA Only on page 124 Intelligent Application Gateway 131 User Guide 2 Change the value of nPendingTimeoutDays For example nPendingTimeoutDays 25 3 Save the file The pending timeout interval is updated to the new value specified It will be applied to all new requests The pending timeout interval for existing requests is the interval that prevails when the request was entered Customizing User Information Properties This section describes how you change the properties of the fields that are displayed to users requesting certificates in the Certified Endpoint Certificate User Information window The default properties are determined during the installation of the CA on the IAG in the CA Identifying Information window Figure 23 Properties That Can Be Edited in the User Information Window Qj Certified Endpoint Microsoft Internet Explorer zloj x Saag Cone nications Certified Endpoint A Microsoft Subsidiary User Information Please enter the following Name Peter Reese E Mail Compa
103. Click Help for detailed information on the parameters of the screen You select an application s Access policy in the Add Application Wizard in the Application Setup step Once you add an application to the trunk you can change the selected Access policy in the General tab of the Application Properties dialog box In order to run an application where network aliases have to be created users have to be logged on to the endpoint computer with sudo privileges for the ifconfig utility In order to run an application where changes to the hosts file have to be made users have to be logged on to the endpoint computer with sudo privileges for hosts file For a description of when changes to the hosts file might be required refer to Technology Overview on page 172 For information about sudo privileges see http www linuxhelp ca guides sudo On Linux operating systems console based applications might require that the xterm application is installed on the endpoint computer If xterm is not installed on the computer users can manually run the application by opening a terminal and connecting to the relay that was opened for the application Tip To display an application s relay select the application in the Portal Activity window and click ShowRelay For details refer to Portal Activity Window on page 184 On Mac OS X and Linux operating systems when running a Telnet application that the opera
104. Client Settings iu gt Citrix Farm Servers 192 168 78 Citrix Farm Port fi 494 Intelligent Application Gateway 85 User Guide Client Settings Tab This tab is applicable in Portal trunks only for Client Server and Legacy Applications and Browser Embedded Applications It determines the activation of the Socket Forwarding component on endpoint computers for the application you are configuring Figure 15 Application Properties Client Settings Tab Application Properties Citrix NFuse FR2 Direct x amp Download Upload Server Settings EJ Client Settings Jide Socket Forwarding Mode C Disabled Basic Extended VPN JV Bind Tunnel to Client Executable Client Executable Signatwe EF NFuse2_D exe 22EE67CD9505556386975245 Help Cancel Table 15 Client Settings Tab Parameters Parameter Description Socket Forwarding Select whether to use the SSL Wrapper s Socket Mode Forwarding component with this application and in which activation mode For details on this component including prerequisites for running it on endpoint computers refer to Chapter 6 SSL Wrapper Disabled the Socket Forwarding component is not used with the application Basic Extended and VPN activation modes are described in Socket Forwarding Activation Modes on page 174 86 Chapter 4 Application Settings Editing Application Properties Table 15 Client Settings Tab Parameters Parame
105. Complete and Cached Passwords The Attachment Wiper deletes these items only when it quits and not at the end of each session Note A All items are deleted according to the DOD 5220 22 M standard Ifthe user closes the browser without first logging out of the site the Attachment Wiper does not quit immediately in this case it quits only on the next scheduled logoff or scheduled cleanup The Attachment Wiper utility includes a built in crash recovery mechanism that ensures that all items are wiped even under extreme circumstances such as a power shutdown If under those circumstances the utility is terminated without deleting all the required items when the computer is next started the utility automatically runs and cleans up any remaining items Chapter 5 Endpoint Security Attachment Wiper The Attachment Wiper is an ActiveX component and is part of the Whale Client Components which users are prompted to download when they try to access a site prior to the Login stage It will only function if the required Whale Client Components are successfully installed on the endpoint computer For details refer to Whale Client Components on page 147 Tip You can set a policy whereby users can only access a site or an application if the Attachment Wiper is running on their computer For details refer to Endpoint Policies on page 93 This section describes the following lt How you configure the utility in
106. Concurrent Sessions field increase the number of sessions that can be open through the site simultaneously Warning 16 Number of Max Concurrent Unauthenticated Sessions Exceeded Symptoms A remote user attempts to access the site Access is denied and the following message is displayed in the browser window There are too many users on the web site at the moment Please try to access the site again in a few minutes Cause The maximal number of unauthenticated sessions that can be open through the site at the same time was reached Resolution If this event occurs on a regular basis increase the number of unauthenticated sessions that can be open through the site 1 Inthe Configuration program open the Advanced Trunk Configuration window of the relevant trunk and access the Session tab 2 Inthe Max Concurrent Unauthenticated Sessions field increase the number of unauthenticated sessions that can be open through the site simultaneously Intelligent Application Gateway 329 User Guide Warning 17 Request Too Long Symptoms A remote user requests a page The request is denied and a message is displayed in the browser window informing the user what part of the request is too long URL method HTTP version or Header section Cause The request is invalid since part of it is too long as indicated in the message The allowed length is URL 2 083 bytes e Method 32 bytes e HTTP version 16
107. Data E whlerrsrv E Security value not set ox00000001 1 Parameters winacpci WinMgmt E Winsock 4 Restart the Whale Log Server service as follows In the Windows Control Panel double click Settings gt Control Panel gt Administrative Tools then double click Services Right click the Whale Log Server and select Restart The Restart Other Services dialog box is displayed Chapter 10 Troubleshooting Log File Cleanup Restart Other Services 29 xi When Whale Log Server restarts these other services will also restart Whale File Sharing Service World Wide Web Publishing Service Whale SessionMar Whale UserMar Whale MonitorMgr Do you want to restart these services Tip D When you stop the Whale Log Server service a number of other dependent services are also stopped When you use the Restart command the Whale Log Server service is automatically stopped and restarted as are all the dependent services For this reason it is recommended that you use the Restart command and not the Stop command If you do stop the service with the Stop command make sure to manually start it and all the dependent services that were stopped 5 Click to restart all listed services The Whale Log Server service and all other services in the list are stopped and are then restarted automatically ITS log files will not be computed in the calculation of space defined in
108. Domain Admins whalecom Domain Computers whalecom Domain Guests whalecom Domain Users whalecom Enterprise Admins whalecom ERPusers whalecom E xchange Domain Ser x whalecom E xchange Enterprise VSS CEE E EE E E x 9 xx 9 Se Tip You can save your selection of users and groups as a local group using the Save As Local Group button For details on local groups refer to Local Groups on page 35 7 For each user or group click the appropriate boxes to select one of the access permission levels Allow users can view and access the application via the portal homepage View the link is displayed on the portal homepage However when users click the link they are prompted to enter additional credentials in order to access the application Deny the effect of this option depends on the type of portal homepage used with the site In sites that use the default portal homepage supplied with the IAG the link is not displayed on the portal homepage and users cannot access the application In sites that use a custom portal homepage the link is displayed on the portal homepage However when users click the link access to the application is denied In both types of portal homepages if users attempt to access the application either directly or via a different link they are denied access Chapter 2 SSL VPN Portals Users Setup Click K The Application Properties dialog box c
109. ET CLR 1 1 4322 N A WHALECOM x x This site is protected by the Whale Communications Intelligent Application Gateway To refresh this page please log out then log in again NET CLR 2 0 50727 Os Done B mremet Installing and Running the Components on Endpoint Computers 150 This section describes how users can install and run the Whale Client Components on their computer including e Prerequisites for Installing the Whale Client Components on page 151 The available installation modes including Online Whale Client Components Installation on page 152 Whale Client Components Installer on page 154 Offline Whale Client Components Installation on page 157 Prerequisites for Running the Whale Client Components on page 159 Once the Client Components are installed on the endpoint computer the Whale Component Manager updates installed components as updates become available E Note The installation and removal of the components may require a restart of the browser or of the computer Users are notified accordingly If removal of the components is not complete because a user selected not to restart the browser or computer no updates will be installed Chapter 5 Endpoint Security Whale Client Components Prerequisites for Installing the Whale Client Components Table 18 on page 151 lists the prerequisites on the e
110. Edit Limit the Applications to the Following Subnets Subnet List Subnet Address Subnet Mask Add Edit The Add subnet dialog box is displayed Chapter 2 SSL VPN Portals Optional Configuration TENE Subnet Address Subnet Mask Cancel 2 Enter the subnet address and mask then click OK The Add subnet dialog box closes The subnet you configured is added to the Subnet list Limit the applications to the following subnets Subnet Address Subnet Mask oF 192 168 1 1 255 255 0 0 H emaye 3 Repeat steps 1 2 to define additional subnets The applications will be restricted to the defined subnets Changing the Application Access Portal Port Number The port number that is assigned to the Application Access Portal when you create the trunk in the Create New Trunk Wizard is the port number of the external website In setups where remote users access a machine other than the IAG such as a load balancer enter the port number of the actual machine that is accessible to the users at the top left side of the Configuration pane in the Application Access Portal area Public Hostname IP Address myportal com Pott 443 Application Access Portal Where To Go From Here Once the SSL VPN Portal is created you can edit it using the Configuration program You can configure any of the following Optio
111. Enabling Certified Endpoint Using Microsoft CA Locally To enable the Certified Endpoint feature using Microsoft CA installed locally on the IAG perform the following steps Install Microsoft CA on the IAG For details refer to Installing a Microsoft Certificate Authority Local CA Only on page 124 Optionally define a policy for issuing the CA certificates By default a Manual policy is defined for the CA You can change the policy to either Automatic or to Automatic with Delay For details refer to Defining a Certification Authority Policy Local CA Only on page 128 Optionally edit some of the default configuration settings Refer to Editing the Default Configuration Local CA Only on page 131 Before you activate the Certified Endpoint feature make sure that end users who are using Microsoft Internet Explorer prepare their endpoint computers as described in Preparing Endpoint Computers that Use Internet Explorer Local CA Only on page 134 Enable the Certified Endpoint feature in the Configuration program in the Session tab of the Advanced Trunk Configuration window activate the option Use Endpoint Certificate For details refer to the Intelligent Application Gateway Advanced Configuration guide to Session Configuration on page 133 Add the Certified Endpoint Enrollment application to the trunk Refer to Adding Certified Endpoint Enrollment to the Trunk Local CA Only on pa
112. H AMERICA 222 Chapter 8 Providing Access to Internal File Systems File Access Configuring Home Directory Mapped Drives and Share Permissions This section describes how you use the File Access Configuration window to configure the following access and view permissions for remote users as they use the File Access interface Home Directory remote users access to their Home Directory Mapped Drives remote users access to their mapped drives Mapped drives are defined by the users logon script which is located in the organization s Domain Controller in the NETLOGON directory File Access automatically supports batch files bat exe For any other scripts such as JavaScript js or Visual Basic vbs you can do one of the following Wrap each script within a separate batch file During the configuration of users access to mapped drives specify the script engine that will be used to run the user s logon script as detailed in the configuration procedure Note A Before you configure the Mapped Drives option see the following sections Limitations of Mapped Drives on page 225 Deleting User Profiles When Using Mapped Drives on page 226 Share Permissions users permissions to view configured shares that is whether users will view all the shares that are configured for File Access or only the shares for which they have access permissions Note EN Share Per
113. IAG High Availability Array The windows are described in detail in the sections that follow 264 Chapter 9 Monitoring and Control Web Monitor DOR Tip The selected view is highlighted e Click Troubleshooting for troubleshooting guidelines and instructions for Warning and Error messages In the right pane the Web Monitor window that you selected in the left pane is displayed Figure 40 Sample Web Monitor Window E Current status Application Monitor A 0 a EE Monitor Current Status J Web Monitor Server time 03 14 2006 16 37 IF active Sessions B Statistics C3 a Current Status Active Sessions D Statistics Total Sessions N E current Status Active Sessions B Statistics o g 2 Ga au 43 system Security E session amp Application E Total Sessions Trunk Name amp Authenticated Sessions Unauthenticated Sessions portal 8 7 All Trunks 7 0 7 Tips for Using the Web Monitor Where times are displayed such as in the Statistics windows it is the time on the JAG not the remote user s computer The current time on the IAG is displayed at the top right corner of the screen For example Server time 02 23 2006 17 40 To generate reports in Microsoft Excel format click 36 You can then use Excel to manipulate the data according to your needs For example calculate the number of users that were concurrently logged ont
114. In order for users to run SSL Wrapper applications the IAG site has to be trusted When a user launches an SSL Wrapper application the SSL Wrapper Client Component verifies the identity of the IAG site against the site s server certificate and checks whether the site is on the user s Trusted Sites list only if the site is trusted will the application launch Tip For information on how the IAG site can be added to the user s Trusted Sites list refer to IAG Trusted Sites on page 160 This chapter describes The technology used by the SSL Wrapper in Technology Overview on page 172 Intelligent Application Gateway 171 User Guide The conditions under which access to SSL Wrapper applications is enabled in endpoint computers in Enabling Access to SSL Wrapper Applications on page 175 The types of applications supported by the SSL Wrapper in Supported Applications on page 181 Steps you take in order to configure SSL Wrapper applications in Configuration Overview on page 183 Remote users interaction with the SSL Wrapper on page 183 Tip Application specific settings required for some of the SSL Wrapper applications are described in the Intelligent Application Gateway Application Aware Settings guide If you are running XCompress on the IAG you need to set the streaming optimization to Low latency You can automate the process by copying the file Xcompre
115. Intelligent Application Gateway User Guide December 2006 Version 3 7 2006 Whale Communications a Microsoft subsidiary All rights reserved This manual and the information contained herein are confidential and proprietary to Whale Communications a Microsoft subsidiary its affiliates and subsidiaries hereinafter the Company All intellectual property rights including without limitation copyrights trade secrets trademarks etc evidenced by or embodied in and or attached connected related to this manual information contained herein and the Product is and shall be owned solely by the Company The Company does not convey to you an interest in or to this manual information contained herein and the Product but only a limited right of use Any unauthorized use disclosure or reproduction is a violation of the licenses and or the Company s proprietary rights and will be prosecuted to the full extent of the Law TRADEMARKS Application Aware and Attachment Wiper are service marks trademarks or registered trademarks of Whale Communications or its subsidiaries in the United States and other countries or both Netscape and Netscape Navigator are service marks trademarks or registered trademarks of America Online Inc or its subsidiaries in the United States and other countries or both Carbon Macintosh Mac OS and Safari are service marks trademarks or registered trademarks of Apple Computer Inc or its subsidiarie
116. Of The Box Security Configuration on page 147 Warning 33 Invalid Request Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window The page cannot be displayed Cause The request is invalid possibly since it contains too many headers This could be caused by an IIS bug on the requesting client Resolution Check the browser used to request the page Intelligent Application Gateway 337 User Guide Warning 34 Download Policy Size Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response failed since the size of the transfer data renders it a download and the application s Download policy forbids downloads to the requesting endpoint Resolution In the Configuration program do one of the following If for this application you wish responses of this size to be considered regular responses and not downloads increase the size of data above which a response is considered a download as follows 1 Open the Application Properties dialog box and access the Download Upload tab 2 In the Downloads area increase the size defined in Identify by Size For details refer to Download Upload Tab on page 82 lt Ifyou wish to cance
117. Operating System Supported Browsers Mac OS X Safari 1 2 4 1 3 amp 2 0 Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Camino 0 83 and higher Linux Red Hat Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla SUSE Debian 1 7 x Firefox 1 0 x and higher Supports mobile Internet connectivity Although other browsers might also be functional for optimal performance Whale Communications extends support to these versions only Note A Some of the Whale Client Components are supported only on Windows operating systems running Internet Explorer For details refer to Whale Client Components on page 147 For those users running other operating systems or other browser versions our portal homepage has been reworked to present a stripped down page for browsers that do not support the rich environment necessary to support the entire range of IAG features such as scheduled logoffs and session timeouts The limited portal presents users with a page containing links to all applications when a user clicks a link the application opens in a new window The limited portal does not however include the Whale toolbar which enables additional IAG features such as credentials management and system information Security Management Tools The IAG provides you with security management tools that ensure strict security administration and enforcement The Service Pol
118. Personal Firewall XPSP2 Version N A Operating System Windows XP Professional 5 01 2600 Service Pack 2 Browser Version Internet Explorer 6 User Agent Mozilla 4 0 compatible MSIE 6 0 Windows NT 5 1 SV1 NET CLR 2 0 50727 NET CLR 1 1 4322 Sun JRE Version N A Domain WHALECOM Certified Endpoint x Privileged Endpoint x This site is protected by the Whale Communications Intelligent Application Gateway To refresh this page please log out then log in again Done B internet Intelligent Application Gateway 161 User Guide Remote Configuration of Users Trusted Sites Lists 162 This section describes how the domain administrator can remotely manage end users Trusted Sites list so that users are not prompted when the Whale Client Components verify that the IAG site is trusted You control the configuration of the Trusted Sites list using a Registry key that you add to the user s endpoint which you can deploy as you do any other managed configuration for example via the Windows Logon Script or as part of your Group Policy You can also use this key to control which other sites users can add on demand to their IAG Trusted Sites list To configure the Trusted Sites list 1 At the IAG access the following folder Whale Com e Gap von InternalSite samples 2 From the samples folder copy the following files to an external location make sure they reside in the same folder CheckSite ba
119. RE E R REE E EEEE EER ENEE E EER 59 Editing in the Configuration Pane sesesseseeseesessesseeseeseesersrseeureeseesesseeseseeseeuseeseesereseseeeee 59 Editing in the General Tab sessseseseessssrssesseesessresersereeureeseereresesereeeseeseesreseeseeserseeereseesees 61 Editing Webmail Trunk Server Settings essseesseeeseeseresesseseeseeseeesessrssenerseeseessesserereeeseeseesees 64 Domino iNotes Single Server e sesssessesseesesseeserserseeeenseereessesersereensresresseseeseeseeneeseesees 65 Domino iNotes Multiple Servers esseeseseseseesseserseeeeeseesesserssessrseeseeseesressesseserseesreseesees 66 Chapter 4 Application SettingsS eescsssesecosseccessssseossssecesssssessssee OF Editing Application Pr perties sxssaseoncssnsnesieassneasincvedennstoeetadsauenesesuneaonsnsanntaie eeanienabeetasennnenes 67 Accessing the Application Properties Dialog BOX sessssesesseseesesessesessesessesessensssessesesseses 68 General Tab anesicstonscaicivinna casteaenaivelated tE re Eueu ese RPE NEEE ESERE CEES eara TAER KE TEREKE SEE RENAE 68 VALESTI aaa E E E A 71 Web Settings Tab acssciict ta lope saat ornes n E Eeee erae eed E ore E Ee kE ESEE EErEE EEEa 73 Application Authentication scssssssscscsssssscsscsscssssssesssssessssscsscesessesssesceessssssessesseeenes 74 General Web Settings sscitsssciscesscocessecceasestsveesosessdessesassdectabcvssedcessscenserad sosnedseskcosseenassatsasevs 75 User Authorization Data ssssssssserser
120. RL The URL you are trying to access contains an illegal parameter Cause The URL query string or the POST data parameters of the requested URL are illegal due to one of the following reasons They contain an illegal character according to the definition of the application s Out Of The Box Security Configuration The IAG filter failed to construct a legal parameter list from the URL query string or from POST data parameters For example a parameter that contains only a value with no name Resolution Use the Configuration program to determine whether the failure was caused by an illegal character or by an illegal parameter list 1 Open the Application Properties dialog box and access the Web Settings tab 2 Uncheck the option Check Out Of The Box Rules For details refer to Web Settings Tab on page 73 3 Request the URL again and observe whether the request is accepted or not Ifthe request does not fail this time it is an indication that the failure was caused by an illegal character lt Ifthe request fails again it is an indication that the failure is caused by the filter failing to construct a legal parameter list from the URL query string or from POST data parameters According to the reason of the failure take the steps listed below to resolve the problem Before you do so in the Web Settings tab check the option Check Out Of The Box Rules so that it is activated again If t
121. SA firewall rule that enables the connection from the IAG to the application server For details examine the ISA logs and alerts and if necessary consult ISA troubleshooting Warning 26 URL Changed Symptoms During URL verification the IAG filter changes the URL The remote user s experience is not affected Intelligent Application Gateway 335 User Guide Cause The requested URL contains an illegal sequence of characters For example multiple slashes Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the URL Inspection tab 2 In the Out Of The Box Security Configuration area edit the application s Legal Characters list to include the character that caused the error as reported in the message in the Reason field For details refer to the Intelligent Application Gateway Advanced Configuration guide to URL Inspection Tab Out Of The Box Security Configuration on page 147 Error 29 Failed to Read Configuration Symptoms The message is logged after you activate the Configuration program The IAG is not functioning as expected or is not functioning at all Remote users might experience problems while working with the site or might not be able to access the site at all Cause Problem with the configuration files of the module that failed This might be caused by one or more of the following
122. Secure communications Require secure communications and 5 Certificat enable client certificates when this Bates Seti Le iho resource is accessed OK Cancel Apply Help In the Secure communications area click Edt The Secure Communications dialog box is displayed Secure Communications q x mT Require secure channel SSL J Require 128 bit encryption m Client certificates Ignore client certificates C Accept client certificates Require client certificates J Enable client certificate mapping Client certificates can be mapped to Windows user accounts This allows access control to resources Edi using client certificates ai IV Enable certificate trust list Curent CTL es New Edit Cancel Help Check the option Enable certificate trust list and click New The Welcome to the Certificate Trust List Wizard screen is displayed Click Next gt Intelligent Application Gateway 137 User Guide 138 7 8 The Certificates in the CTL screen of the Certificate Trust List Wizard is displayed Certificate Trust List Wizard i E Certificates in the CTL The certificates listed in the following table are currently in the CTL Current CTL certificates Intended Purposes Add from Store Add from File Remove View Certificate cms Click Addfrom Store The Select Certificate dialog box
123. Status ca Active Sessions B Statistics Current Status 5 Active Sessions B Statistics Qa au 49 System Security g Session High Availability Application Array link enables access to all IAG High Availability Array servers in the Array Troubleshooting If you cannot access an IAG server that is part of the Array via the applicable link verify the following e The server is up and running The server is accessible from the server where you are using the Web Monitor You assigned the same users to the IAG Monitor Users group on all the IAG servers that are part of the Array For details refer to Enabling Web Monitor Access from Computers Other Than the IAG on page 261 Tip CD If access to the IAG fails while you are accessing the Web Monitor remotely via the SSL VPN portal and the failure is due to user authentication problems the following message is displayed in the Event Viewer Login On The Fly Failed Analyzing History Reports Once an IAG Server is Removed from the Array 300 Once you remove an IAG server from the High Availability Array you are no longer able to query reports of events that were recorded on the server while it was still part of the Array You can however copy the required logs onto one of the IAG servers which are part of the Array and query the reports there using the Event Query Chapter 9 Monitoring and Control Web Monitor To query reports of a
124. Table 4 Configuration Pane Parameters Webmail and Basic Trunks Parameter Description IP Addresses External Website IP address of the external website Application Server IP address of the application server Ports External Website port number of the external website The type of port HTTP or HTTPS that is displayed and that can be edited here depends on the connection type Note The other port of the external website can be edited in the General tab of the Advanced Trunk Configuration window For example for an HTTP Connections trunk the HTTP port is displayed and can be edited here while the HTTPS port is displayed and can be edited only in the General tab of the Advanced Trunk Configuration window Application Server HTTP port of the application server 60 Chapter 3 Single Application Sites Editing Trunks Table 4 Configuration Pane Parameters Webmail and Basic Trunks Cont d Parameter Public Hostname Maximum Connections Initial Path Description Optional applicable only if the application is accessed via a hostname The host through which remote users access the application enabled in this trunk external website You can enter either a domain name effective hostname or an IP address Maximal number of simultaneous connections that are permitted for this trunk Default 500 Path of the application on the application server as follows Basic trunks required onl
125. Verify that the process inetinfo exe which runs the IIS is listed in the Image Name column 322 Chapter 10 Troubleshooting Restarting the Web Service in the IIS E windows Task Manager iof xi File Options view Help Applications Processes Performance magename mo cru cpu Tme men usage al Acrobat exe 2208 0 01 28 62 932 K acrotray exe 1560 0 00 00 4 352 K Adobelm_Cleanup 944 00 0 00 00 1 316K Adobelm_Cleanup 2040 00 0 00 00 1 312 K Adobelmsvc exe 2068 00 0 00 00 1 296 K CM_camera exe 1712 00 0 00 02 2 920 K CSR55 EXE 188 00 0 00 49 4 484 K dto2k exe 1508 02 0 06 46 10 532 K Eudora exe 556 00 0 02 37 7 164K explorer exe 1348 00 0 00 34 4 444 K FrameMaker exe 1596 01 0 02 48 21 140 K hidserv exe 552 00 0 00 00 1 748 K i j 956 00 2 7 956 K L5A55 EXE 248 00 0 00 01 1 596 K msdtc exe 992 00 0 00 00 6 444 K mstask exe 620 00 0 00 00 4 472 K mstsc exe 500 00 0 00 21 14 076 K nod32krn exe 584 01 0 00 35 16 612 K nod32kui exe 1556 00 0 00 01 2 488 K hdl End Process Processes 52 CPU Usage 4 Mem Usage 433344K 1131780k 7 This is an indication that the IIS is still running Back in the Command prompt type kill w3wp Press lt Enter gt The following message is displayed in the Command prompt INDOWS system32 cmd exe C Documents and Settings Administrator gt kill w3wp exe SUCCESS Sent termination signal to the process w3wp exe with PID 2756 C Documents and Settings Administrator g
126. Ware Servers described in Novell Logon Settings on page 227 The domains servers and shares which are exposed to remote users using File Access as described in Configuring Access to Domains Servers and Shares on page 229 Intelligent Application Gateway 221 User Guide Once you configure the administration settings in the File Access window the next time you open the window the settings remain intact E Note In order to configure File Access administration settings you must be a member of the Administrators group of the IAG Accessing the File Access Window This section describes how you access the File Access window in order to configure the global File Access administration settings To access the File Access window 1 In the Configuration program on the Admin menu click File Access The Windows Enter Network Password dialog box is displayed 2 Enter User Name and Password then click OK The network is browsed and the File Access window is displayed showing all the domains in the network which are accessible from the File Access host Depending on the complexity of the network this may take a few seconds Figure 39 Sample File Access Administration Window File Access 2 FileAccess Admin E a Network Sharing Domains Servers J Shares Domains Reset Apply Refresh B General Configuration EE austratia EE D arrica E T asta E M EvRore x Novell GE SOUTH AMERICA GE T NORT
127. XML Integrity Verification Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window The page cannot be displayed The request failed the XML Integrity verification Cause The request failed the inspection of XML integrity in HTTP data Resolution If you wish to cancel the inspection of XML integrity in HTTP date for this application take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and select the Web Settings tab 2 Uncheck the option Check XML Integrity For details refer to Web Settings Tab on page 73 356 Appendix A Troubleshooting Event Logging Messages Warning 55 Parameters not Allowed with URL Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL you are trying to access contains an illegal parameter Cause According to the configuration of the application s ruleset the requested URL is not allowed to contain parameters Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and select the URL Set tab 2 Inthe URL List access the rule that caused the failure according to the details provided in the message In the Parameters column select either
128. able 10 on page 75 Table 10 Web Settings Tab General Web Settings Parameter Verify URLs Learn Mode Allow WebDAV Methods Check XML Integrity Check Out Of The Box Rules Description When this option is activated URL requests from the application are inspected against the URL Inspection rules of this application type as defined in the URL Set tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Note Disabling this option disables URL inspection at the application level and affects this application only Also requests from this application will still be checked against the general rules such as the Internal Site rules If you wish to disable URL inspection altogether you need to set the IAG to Debug mode in the General tab of the Advanced Trunk Configuration window When this option is activated URL requests from the application are inspected against the URL Inspection rules of this application type but the rules are not enforced That is if a request is not accepted by one of the application rules the failure is logged in the Security log and the request is allowed Allow browsers to send HTTP data to the application in requests that use WebDAV methods Inspect XML integrity in HTTP data Check URLs against the application s Out Of The Box Rules as
129. able resides as follows C Program Files Whale Communications Client Components 3 1 0 whlioc dmp Tip The log sniff registry value is polled by the client executable while running and may be updated while the Network Connector is in session Set the log sniff value to 0 to disable packet dumps when you finish troubleshooting the client The dump files are written in TCPDUMP format Intelligent Application Gateway 207 User Guide 208 Chapter 7 Network Connector Network Connector Troubleshooting Chapter 8 Providing Access to Internal File Systems The Intelligent Application Gateway IAG provides two applications that enable remote users to access file systems on the internal network The Local Drive Mapping applications provide access to Windows shared network folders as described in Local Drive Mapping on page 209 The File Access application provides access to Windows Network and Novell NetWare file servers as described in File Access on page 211 Local Drive Mapping The Local Drive Mapping application enables you to map internal Windows shared network folders shares to network drives on remote users local computers Users can then connect to the shares directly from the remote computer and depending on policy configuration download and upload files to and from those drives Local Drive Mapping is supported on endpoint computers that run Windows XP Windows 2008 and Windows 2000 opera
130. absolute URL for example https whale com URL of the icon representing the application displayed in the portal to the left of the application name Short description of the application displayed in the portal directly under the application name Additional description displayed in the portal under the short description Intelligent Application Gateway 89 User Guide 90 Table 16 Portal Link Tab Parameters Cont d Parameter Startup Page Open in New Window Application Supported On Description A page containing startup functionality you wish to assign to this application in addition to the default functionality that is enabled by the IAG When this option is activated the page you define here is included by the default application startup page and the operations you define in your page are implemented at the beginning of the application startup process Default application startup for all applications is determined in the page StartApp asp located under Whale Com e Gap von InternalSite If you activate the Startup Page option take the following steps Place your own page in the following location Whale Com e Gap von InternalSite inc CustomUpdate Note File extension must be inc Enter the name of the page including its location under the inc folder in the Startup Page text field For example I Startup Page CustomUpdate startup inc Tip The page notes
131. ackup utility and the Restore utility During backup the IAG Backup amp Restore utility uses the Windows makecab exe utility to archive the necessary files and Registry values in a cab file It uses the Windows extract exe utility to restore them We recommend that you create backups as follows Run the Backup utility directly after the initial IAG configuration to back up the IAG s configuration settings Following the initial backup make sure to run the utility each time you modify the configuration settings in order to ensure that the backup is updated at all times Copy the backup file to a separate location whenever you make major changes to the configuration By default the backup is created under the IAG installation path whale Com e Gap Backup Intelligent Application Gateway 303 User Guide Tip If you do not see the backup file in this location the default path may have been changed Contact technical support for assistance in identifying the current path The name of the backup file that is created in the defined backup folder is whlbackup lt host_name gt cab Where host_name is the name of the IAG Instructions for using the Backup amp Restore utility are provided in Backing up the Configuration on page 304 Restoring the Configuration on page 305 Tip Each time you run the Backup amp Restore utility a log is created in the this file Whale Com e Gap Logs
132. age The request is denied and the following message is displayed in the browser window The page cannot be displayed Ruleset configuration invalid Cause The URL Inspection rule defined for this URL does not specify a method Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and access the URL Set tab 2 Inthe URL List access the rule that caused the request to fail and in the Methods column assign a method or methods for this URL For details about the configuration of rulesets refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Warning 51 Invalid Method Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL You are trying to access the URL using an illegal method Cause According to the configuration of the application s URL Inspection ruleset the method used to send the request is not valid for requested URL Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and access the URL Set tab 2 Inthe URL List access the rule that caused the request to fail and in the Methods column assign the appropriate method for this URL For details about the conf
133. ain New Domain Tree New Forest At the IAG verify that for the following Windows services Startup Type is set to Automatic Computer Browser optional for performance enhancement Distributed Transaction Coordinator e Workstation Still at the LAG on the Local Area Connection that is used to access File Access resources verify that a Client for Microsoft Networks is installed and activated For instructions refer to Installing a Client for Microsoft Networks on page 217 Establish domain trust relationships between the IAG and every domain one or more that holds File Access users Users can be part of a user domain or a resource domain The File Access domain must trust the domain or domains that hold the users whereas the trusted domains may not trust the File Access domain Grant local logon permissions on the IAG to all File Access users regardless of their privileges lt 5 Best Practice Create a group that will contain all File Access users from various domains Intelligent Application Gateway 213 User Guide Figure 37 on page 214 illustrates a sample File Access environment with three domain types File Access domain consisting of the IAG User domain holding all File Access users Although it is recommended that one domain holds all the File Access users there can be multiple user domains in this setup Users can also be part of a resource domain e Resource domains holding the shared r
134. ake sure you assign it a unique name that will not be used for any other purpose If the header or parameter name is unique when it is used in a request it is an indication that this is a malicious request that should be blocked To define the Source IP key header or parameter for this application take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and access the Web Settings tab 2 Under the option Source IP key assign a unique header or parameter name For details refer to Web Settings Tab on page 73 Warning 20 Attempt to Sneak Negotiate Header Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window An attempt to sneak authorization info was detected Cause The request contains a negotiate authorization header Intelligent Application Gateway 331 User Guide Resolution If you wish to cancel the blocking of negotiate authorization headers take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the URL Inspection tab 2 Uncheck the option Block Negotiate Authorization Header E Note A negotiate authorization header sent by clients may contain malformed code which could cause denial of service and browser crashes This vulnerability was an
135. al Group dialog box to exclude the three users from the local group 8 Click 0K to close the Add Local Group dialog box 9 Repeat steps 2 8 to define additional groups as required Tip You can use the button in the Local Groups dialog box to duplicate an existing local group You can now use the groups you created to define application authorization as described in Defining Authorization for Portal Applications on page 38 You can also use the local groups as building blocks when defining additional local groups Intelligent Application Gateway 37 User Guide Defining Authorization for Portal Applications You can define authorization for any of the applications enabled through an SSL VPN Portal To define authorization for an application take the following steps Assign users and groups to the application In this step you select the users and user groups from any of the defined authorization repositories and assign them to the application By default the users and groups you select here have Allow and View permissions for the application e Assign authorization permissions to the users and groups you selected for the application For each user or group you can assign Allow View or Deny authorization permissions E Note If at any time after the initial configuration there are changes in the authorization repository such as a user is removed or added from the repository or user permissions are changed
136. alidate inc Name the file as follows lt Trunk_Name gt lt Secure 0 no 1 yes gt lt Hook_Name gt For example For an HTTPS trunk named WhalePortal to create a PrePostValidate hook create the file WhalePortallPrePostValidate inc If such a file already exists use the existing file In the file you defined in step 2 add the following lines lt SetSessionParam g_cookie ATTACHMENT_WIPER_CLEAR_HISTORY_PARAM lt flag gt gt de Where flag may be any combination of the following Flag Description 1 Clear History 2 Clear Web Address AutoComplete and IntelliForms 4 Clear Cached Passwords in Forms AutoComplete and Wininet s cached passwords replies to application specific authentication requests 8 Clear all fields that are saved by Forms AutoComplete except for Cached Passwords which are cleared by flag 4 For example In order to clear the browser s History Web Address AutoComplete and IntelliForms without clearing any of the other items add the lines lt oe SetSessionParam g_cookie ATTACHMENT_WIPER_CLEAR_HISTORY_PARAM 3 gt E Note For the cleanup of the Forms AutoComplete data it is recommended to use flags 4 and 8 together 12 It is not recommended to use flag 8 on its own Chapter 5 Endpoint Security Attachment Wiper Configuring a Scheduled Cleanup In addition to the automatic cleanup that is triggered at the end of a session or when a use
137. an IAG Server is Removed from the Array essees 300 DS EEE Monitoring epcatisecten esac ce dene steed succtseecdtvcaetaunsmuaasontadadenss namsras tuienetnepetucatnanpes 301 Chapter 10 Troubleshooting ccccccccscscscscsssssssssssssssssssssssses 303 Backup amp Restore Utility sscctscticucssesscesetinctencucssedsbonscunscsrossssitnsenouctocucdausespustensiseadcconesuaciibees 303 Backing tip the Config rationi sissi smersessesrisssrssseiiiese eesi aaecenuivarenmucnsnanedtevssnareteadeacnseecs 304 Backing up the Configuration in the Configuration Program s sessesessessseseeeeeseesrsereeeseeeres 304 Running the Backup Utility as a Console Application cecsesctcssseseeeseseeeeseesseseeeeseeens 305 Rest ring the Config rati n sasccstacsattcscascttccecscarsiapeialasilndesseuisil a ceiadhin Gatanteshadnaauaaetdes 305 Restoring the Configuration in the Configuration Program scscssesssescesesseecessesseseeens 306 Running the Restore Utility as a Console Application ccesscsssssesseessscessseseeseeeseseees 306 Error Logging and Process Tracing eessssesesssressseeseeseessesseserserseereessesseneeseeurensenseeseeeeseeseess 307 Error Server and Trace Configuration File eesessseseeseeeeesrssersesseresseesersrseeeeeesensesseeseese 307 Individual Trace Sections s cssssevstsscessvacvasetevnsosaveovasensssdeesdsosecdscsuaoseneessdveadnebaoda vende soeone 308 General Trace Configuration Section oo ceccscssscsssssscsecsscsee
138. andling tab select one of the following actions Intelligent Application Gateway 129 User Guide 130 e For manual mode select the option Set the certificate request status to pending The administrator must explicitly issue the certificate For automatic mode select the option Follow the settings in the certificate template if applicable Otherwise automatically issue the certificate Properties ki xi Request Handling The Windows default policy module controls how this C4 should handle certificate requests by default Do the following when a certificate request is received C Follow the settings in the certificate template if applicable Otherwise automatically issue the certificate Cancel Apply 6 Click OX The default action is set It will be applied to all new requests Existing requests are treated according to the policy that prevails when the request was entered Setting the Certification Policy to Automatic with Delay In addition to the policies you can select via the Certification Authority interface the IAG enables you to specify an Automatic with Delay policy This policy automatically issues the certificate but only after a defined delay interval To define an Automatic with Delay policy 1 At the IAG access the following file Whale Com e Gap Von WhaleSEP inc info inc 2 Copy the file you accessed in step 1 to the following custom folder if the folde
139. arassacsensabonnsasnantsepacoassanteosennnmsenenepsassunadenssubsannessobaebocesnnonneconasunanate 160 Remote Configuration of Users Trusted Sites Lists sesseesesseseserseeseeseseeseesrerrereeeseeeres 162 Restoring the Whale Client Components Defaults eessessessseseeseeeeseesersrrerreeesensesseesesee 165 Uninstalling the Whale Client Components sssessssseseessessessesseesereessesserseeeeneeesenseeseeseeee 167 8 Contents Chapter 6 SSL Wrap per ississsissssssnssnsaveasdonsnenstessnsssacsiassnsescenstoamiee 7 Technology Overview s essssisssesssrsissossssssisere cactecanisseashectoussebevetoactvvadensesieeeatneradicesoesaanoen 172 Socket Forwarding Activation Modes eeeseessseesessesesreseenseresreseerereenreseerenreseeseeseneesensenee 174 Enabling Access to SSL Wrapper Applications eeeseeessesseserseereersesseeserseserureneensensereeeeeseess 175 SSL Wrapper Java Applet Prerequisites cccssnsenensscatevaeadsintsncentevetonsentesnasoosnienmetssenties 176 Uninstalling the SSL Wrapper Java Applet ccccccssssssssscssssssssssssssscsessessscesssessessessasees 178 Socket Forwarding Component Installation si ecistecesceinsnsssaseuisbinesseeratnicunadasiisiasasieineas 178 LSP Conflict DEtECtiOn ssrsssissrriresssiissevessntesisi soties tita sio ts sste tessa era sst ShN roe Ensoa SN earan aeee ia 179 Supported APpliCatIONS lt jsccsseceecdacetacsestladeces neecice stati dda saat lds canes ba aaa ices ras aeaeaei aiie 181 Generic
140. as unless their computer meets the requirements of the Restricted Zone endpoint policy Once you activate this option make sure you also Define the required Restricted Zone policy for the application For details refer to Application Endpoint Policies on page 99 Define the application s Restricted Zone URLs in the Global URL Settings tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Global URL Settings Tab URL Settings on page 152 Chapter 4 Application Settings Editing Application Properties User Authorization Data Use the User Authorization Data area of the Web Settings tab to configure the IAG to send data regarding the originator of the connection request to the application server User Authorization Data parameters are described in Table 11 on page 77 Table II Web Settings Tab User Authorization Data Parameter Authorization Key Format Source IP Key Format Description Name of the header or parameter that the IAG uses to send the data to the application server If you activate this option you also have to configure the value of the Authorization Key header or parameter which will be sent to the application server For details refer to Configuring Authorization Key Value on page 78 Select the format in which the IAG will send the Authorization Key to the application server Hea
141. as follows 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Uploads area edit the Extension List accordingly For details refer to Download Upload Tab on page 82 Ifyou wish to cancel the identification of uploads by extensions for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Uploads area uncheck the option Identify by Extensions Note A If none of the options in the Uploads area are activated no uploads to the application are blocked regardless of the settings of the application s Upload policy If you wish to enable uploads from the submitting endpoint to the application edit the application s Upload policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 348 Appendix A Troubleshooting Event Logging Messages Warning 44 Failed to Create Parameter List Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted U
142. ater the Scheduled Logoff is triggered the session s status changes to unauthenticated and the user is prompted to re authenticate The user re authenticates within the required timeframe and the session is authenticated again When the user finishes working with the site and logs off the status of the session changes to unauthenticated After a pre defined period of time the session closes It is no longer displayed in the Session Monitor Active Sessions window Intelligent Application Gateway 269 User Guide Table 28 Parameters of the Session Monitor Active Sessions Cont d Parameter Description Events Clicking generates a report of events related to the session The report is displayed in the Event Reports window described in Event Report on page 297 Terminate Clicking GJ terminates the session A message prompts you to verify the termination once you do the status of the session changes to unauthenticated Authenticated x Note You cannot terminate the current session or unauthenticated sessions Session Details 270 The Session Details window is displayed when you click a session s ID in any of the Web Monitor s Active Sessions windows It provides in depth session information divided into the following tabs The General tab provides general information about the session and about the users that are currently logged in to the session Note the following
143. ating policies in Script mode refer to Configuration in the Advanced Policy Editor on page 106 To configure policies and expressions in Basic mode 1 In an area where you assign policies click EditPolicies For example in the Session tab of the Advanced Trunk Configuration window The Policies dialog box is displayed Figure 18 Policies Dialog Box Policies A SharePnint 2007 Dnwnln Default Non Web Application Access Default Privileged Endpoint Default Session Access Default Web Application Access Default Web Application Download Default Web Application Restricted Za Default Web Application Upload Domino Web Access 6 5 and 7 Uploac Microsoft CRM 3 Enhanced Security Microsoft Outlook Web Access 55 Up SAP Enterprise Portal 6 Enhanced Sec SAP Enterprise Portal 6 Upload SecureView for OWA42003 SP1 SharePoint 2003 Admin Zones SharePoint 2003 Download SharePoint 2003 Enhanced Security SharePoint 2003 Upload Checkin bd gt Close Edit Remove Tip Se For a description of where you can access the Policies dialog box refer to Session Endpoint Policies on page 95 and Application Endpoint Policies on page 99 2 Do one of the following To edit an existing policy that was previously created and edited in Basic mode select the policy and click Edit To edit an existing expression click the sign to expand the Expressions group sele
144. ation Number of Last Access Avarage Total Accesses Duration Duration MyWeb 3 03 21 2006 15 41 56 00 31 39 01 34 58 m P3 Owa 2003 sptisp2 3 03 21 2006 15 42 20 00 57 54 02 53 42 E Web Monitor il 03 21 2006 12 58 05 00 33 41 00 33 41 User Access Date Duration whalecom rachel 03 21 2006 12 58 05 00 33 41 Whale Portal 5 03 21 2006 16 26 48 00 29 31 02 27 36 amp whalecomtruti 00 43 18 05 46 30 8 whalecormiyarivrn 00 41 11 02 03 34 2 Chapter 9 Monitoring and Control Web Monitor CD Tip To return to the query form click Show query form Table 35 User Monitor Statistics Window Query Results Parameter Lead User Average Session Duration Total Session Duration Accesses Description User who initiated the session Clicking the sign next to the user name or clicking the name itself displays a list of all the applications that the user accessed during the query period For each application user access details are provided Clicking H or SH expands and collapses the display for all users respectively Once a user s view is expanded clicking an application name or clicking the sign next to the application name displays details regarding all of the user s accesses to the specific application Average duration of the user s sessions during the query period Total duration of the user s sessions during the query period Number of times the user accessed the site du
145. ation Authority Refer to Viewing and Processing Certificate Requests Local CA Only on page 146 Figure 21 on page 121 illustrates the following Steps that the administrator has to perform to enable the Certified Endpoint feature when using a locally installed Microsoft CA Steps that the end user must perform in order to be recognized as a Certified Endpoint depicted in the shaded areas 120 Chapter 5 Endpoint Security Certified Endpoints Figure 21 Sample Flow for Enabling Certified Endpoint Using a Local CA Install Microsoft CA on IAG Edit default configuration optional Define policy optional Inform end users to prepare client computers if using IE Install Security Patch and prepare client computer Enable Certified Endpoint in Configuration program Add Certified Endpoint Enrollment application to trunk If using custom portal home page add link Update CTL with new CA Back up certificate settings g Submit request for Certified Endpoint status Check request status Request granted Pending In Progress Yes y Install Certificate Yes Certificate Issued Request granted No Certificate Denied ser s computer isa Certified ndpoi LEGEND Performed by end user Speak to Administrator Intelligent Application Gateway 121 User Gu
146. ation Settings Duplicating an Application Chapter 5 Endpoint Security The Intelligent Application Gateway IAG provides a number of features that help protect your internal network against access from non secure endpoint computers This chapter describes the following Endpoint security policies are used to create tiers of access by determining whether or not endpoint computers are allowed to access internal sites and applications depending on their security settings This feature is described in Endpoint Policies on page 93 e Endpoint settings help you optimize endpoint computer settings that affect the functionality of some of the IAG features as described in Endpoint Settings on page 108 The Attachment Wiper is a virtual shredder that wipes out sensitive information recorded by a web browser during an SSL VPN session such as files cookies credentials and more For details refer to Attachment Wiper on page 110 The Certified Endpoint option enables you to certify endpoint computers using client certificates This feature is described in Certified Endpoints on page 118 Whale Client Components are described in Whale Client Components on page 147 Endpoint Policies SSL VPNs are accessed from clients of differing natures company owned laptops home computers public Internet kiosks etc The IAG is equipped with technology that identifies the security level of the endpoint c
147. b Monitor on one of the IAG servers that are part of the Array the Monitor automatically maps itself to all the IAG servers in the Array 298 Chapter 9 Monitoring and Control Web Monitor Tip The list of IAG servers that are part of the Array is defined in the Configuration program in the High Availability dialog box High Availability x Enter station name 2 aa lAG1llocal Remove a Compint a Comptint OK Cancel For a full description refer to the Intelligent Application Gateway High Availability Configuration guide Accessing IAG Servers in the Array In sites that deploy a High Availability Array when you first access the Web Monitor application the High Availability Array window is displayed listing the Intelligent Application Gateway servers Web Monitor High Availability Array Please select one of the following e Gap servers e SR2 INT e SR3 INT Clicking the server you wish to monitor opens the main window of the Web Monitor Once the main window of the Web Monitor is displayed access to the IAG servers that are part of the Array is enabled via a High Availability Array link on the menu of the Web Monitor browser window clicking the link displays the High Availability Array window again Intelligent Application Gateway 299 User Guide Session Monitor E current status a Active Sessions Statistics Application Monitor a Current
148. bytes Header section 2 048 bytes Resolution Check the browser that was used to request the page Warning 18 Invalid Request Version Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window Invalid HTTP request version Cause The browser on the remote computer sent the request using an invalid HTTP protocol version Resolution Verify that the browser that was used to request the page is configured to use HTTP version 1 1 or 1 0 For example in Internet Explorer 6 0 take the following steps 1 On the Tools menu click Internet Options In the Internet Options dialog box select the Advanced tab Under HTTP 1 1 Settings verify that the option Use HTTP 1 1 is selected 330 Appendix A Troubleshooting Event Logging Messages Warning 19 Attempt to Sneak Source IP Data Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window An attempt to sneak source IP was detected Cause The request contains a header or parameter that is identical to the header or parameter that is configured as the Source IP key header or parameter for this application This could be an attempt to sneak data to the application server using this header or parameter Resolution In order to avoid a situation where the header or parameter is used in legal requests m
149. cation Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Warning 46 Mandatory Parameter Missing from URL Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL you are trying to access contains an illegal parameter Cause The requested URL was rejected by a URL Inspection rule since a mandatory parameter is missing from the URL Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and select the URL Set tab Intelligent Application Gateway 351 User Guide 2 Inthe URL List select the rule that caused the failure according to the details provided in the message 3 Inthe Parameter List select the rule of the parameter that caused the error In the Existence column select Optional so that the missing parameter is optional not mandatory For details about the configuration of rulesets refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Warning 47 POST without Content Type not Allowed Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window The upload is blocked since the request does not contain a Content Type
150. cation name displays the Application Access Details window described in Application Access Details on page 283 Trunk through which the application is enabled Minimal and maximal number of concurrent accesses to the application during the query period Chapter 9 Monitoring and Control Table 32 Application Monitor Statistics Window Query Results Cont d Parameter Description Duration The average and maximal duration of accesses to the application during the query period Note If the number of results exceeds the number of Max Report Results as defined in the Configuration program in the General tab of the Event Logging dialog box described in Configuring General Settings on page 240 Duration is not reported Total Accesses Total number of accesses to the application during the query period Note If the number of results exceeds the number of Max Report Results the number of total accesses is not reported Application Access Details The Application Access Details window is displayed when you click an application name in the Application Monitor Statistics window in the Query Results view It provides information on the application usage as listed in Table 33 Application Access Details Parameters on page 284 Intelligent Application Gateway 283 User Guide Figure 52 Sample Application Access Details Window E https www myweb com Application Access Detail
151. cation to a trunk or define a Webmail or Basic trunk the IAG automatically assigns the applicable default application endpoint policies as follows When defining Webmail and Basic trunks and when adding an application from the Built In Services group to a Portal trunk the default application policies are selected automatically when you configure the trunk Intelligent Application Gateway 99 User Guide When you add an application to a Portal trunk the default application policies relevant for that application type are automatically selected in the Application Setup step of the Add Application Wizard You can also select other application policies in this step and edit the policies by clicking to access the Policies dialog box Add Application Wizard xi J Step 2 Application Setup Application Name Microsoft CRM 3 0 Application Type M All Users Are Authorized Access Policy Defaut Web Application Access Download Policy Default Web Application Download Upload Policy a Default Web Application Upload Restricted Zone Default Web Application Restricted Zone Acc Edit Policies lt Back Cancel The selection and editing of endpoint policies is disabled when the option Disable Component Installation and Activation in the Session tab of the Advanced Trunk Configuration window is activated For all trunk and application types you can later change and
152. cations that are enabled through the trunk Once you add the application and activate the trunk a Make this computer certified link is automatically added to the default portal homepage enabling users to request a certificate and make their computer a Certified Endpoint Note an The ability to add a Certified Endpoint is automatically available on the portal homepage only if you use the default portal homepage supplied with the IAG If you use a custom homepage you can add this functionality to your page as described in the Intelligent Application Gateway Advanced Configuration guide in Adding Links to IAG Features on a Custom Homepage on page 66 The Certified Endpoint Enrollment application is not supported on Camino browsers on Mac OS X since the underlying Microsoft application is not supported on those browsers To add the Certified Endpoint Enrollment application to the trunk 1 In the Configuration program from the List pane select the trunk for which you enabled the Certified Endpoint feature In the Applications area under the Application List click Add or double click an empty line Or In the List pane right click the trunk and select Add Application The Add Application Wizard is displayed Intelligent Application Gateway 135 User Guide 3 Select Built in Services and from the drop down list select Certified Endpoint Enrollment 4 Click Finish EN Note For
153. ccess the portal homepage or site The request is denied and the following message is displayed in the browser window Your computer does not meet the security policy requirements of this site Cause The requesting endpoint does not comply with the requirements of the trunk s Session Access Policy Resolution Instruct the user what steps have to be taken in order for the endpoint to comply with the policy You can view the definitions of the policy in the Configuration program in the Policy Editors To access the Policy Editors take the following steps in the Configuration program 1 Open the Application Properties dialog box and select the General tab 2 Inthe Endpoint Policies area click EditPolicies 3 In the Policies dialog box select the applicable policy and click Edit For more details refer to Endpoint Policies on page 93 Warning 66 Attempt to Sneak Authorization Data Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window An attempt to sneak authorization info was detected Cause The request contains a header or parameter that is identical to the header or parameter that is configured as the Authorization key header or parameter for this application This could be an attempt to sneak data to the application server using this header or parameter 360 Appendix A Troubleshooting Event Logging M
154. cdestecseeaesdiudeencoueedeevdecosdchecesdedlexdsousvaceevoeusbecbedtessecsteie 18 Tr nks the IAG Transfer Channels aaipcconsancincconenahierspsnantersannvandveiassayanteammaounamersaneee 19 S pp ted BROWSE IS sects ncpcctecvenscexaecasnscbnneeducecctecunavelch bedlbaninchpveusdegeaaphoatansndlveensestadieauicuetinecta 19 Security Management Tools sic 5 ac aiaicuckuatescacuveceaccucDsaecenadentetsedeusbisaniassecbeeiscaguenbuccesseahesedes 20 Monitoring and Control Tools and Interfaces iscccacesacccatesecosuvensscecorsecatsacsapeebsnscaprecndrenctescens 21 edoae n E E A E E T ETE 21 Encryption FASS DNASE wares chee tSocsecsaedesateniucaciamsindei are ciausacaacas se Ea EEE ESET 22 High Availability Array ctasicoscccatesites soatasutteseachasMisssuneiaseatusate lilessubaiactansmsgutacenascesetusssomataebeaye 23 About TINS Gude soiree eei oone ten rs ernen EE rea RENESSE raiot anaana n 23 Conventions Used in This Guide ssensnsessseseseesessesessensseessesessrsrssssesresrssesessesesesseseeseee 25 Chapter 2 SSL VPN Portals ecoeeeosee eoeoeoeeceece eeoeeccececee eoeecceceee ecoeeeceeeeee eoeeeceece ccoo 27 Creating ni SSL VPN Portal asrhie acsncentiesceen sons des saneauueaioutensaadanconcnbaetenteie eiS odene ati Ee Piae Et 28 Users Set eee cs eats cats cnsueetebcwsiescaseeneaednas des tac esauc cae tanateenabasttnaueeatoundax eeanuveseieeaseasaantessaaecereecint 32 Defining Authorization Repositories e sssseseeeeesesssesseseeseeseessessesee
155. ce its content type renders it a download and the application s Download policy forbids downloads to the requesting endpoint Resolution At the IAG do one of the following If you wish responses with this content type to be considered regular responses and not downloads take the following steps 1 Access the file that holds the definitions of file extensions and the associated content types Whale Com e Gap von conf content types ini In this file identify the extension associated with this content type If the file does not contain this content type add the appropriate extension content type pair to the file In the Configuration program edit the application s downloads Extension List so that the extension associated with this content type is not considered a download The list is defined in the Application Properties dialog box in the Download Upload tab in the Downloads area For details refer to Download Upload Tab on page 82 If you wish to cancel the identification of downloads by extensions for this application uncheck the option Identify by Extensions in the Downloads area of the Download Upload tab Note If none of the options in the Downloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy 342 Appendix A Troubleshooting Event Logging Messages Ifyou wish to enable downloads
156. ch file enter the full path of the script engine in the field Script Engine Note A Before you configure the Mapped Drives option see Limitations of Mapped Drives on page 225 and Deleting User Profiles When Using Mapped Drives on page 226 You can only specify one script engine type in the Script Engine field By default users view all the shares that you configure for File Access If you wish users to view only the configured shares for which they have access permissions check the option Show only the shares a user is permitted to access When you finish configuring users access to the Home Directory and mapped drives at the top right of the File Access window click Apply In order to configure remote users access to domains servers and shares refer to Configuring Access to Domains Servers and Shares on page 229 When you finish configuring administration settings click at the bottom of the File Access window Once you activate the configuration remote users ability to access their Home Directory and mapped drives and to the shares configured for File Access is determined according to the definitions you configured here Limitations of Mapped Drives When defining mapped drives please note the following File Access supports the mapping of drives G and up Due to a Windows API limitation not all environment variables are supported by the File Access option If you use
157. ch3 exe actual disk version 3 1 0503 7 Would you like to update the files I Don t show me this message again No The browser has to be restarted after the installation of the Socket Forwarding component of the Whale Client Components Whale Client Components a x e In order to complete the update of Whale Client Components your 1 browser must be restarted This will close all open browser windows I Don t show me this message again Tip For details on the Socket Forwarding component which can be used with the SSL Wrapper refer to Chapter 6 SSL Wrapper Uninstalling the Whale Client Components Note EN Uninstalling the Client Components restores the Whale Component Manager settings on the endpoint computer to the default values as described in Restoring the Whale Client Components Defaults on page 165 For Windows 2000 Windows XP and Windows 2003 systems power user access level is required for the current user Intelligent Application Gateway 167 User Guide Once the Client Components are installed on the endpoint computer they can be uninstalled as follows In the Windows desktop click and select Settings gt Control Panel gt Add Remove Programs or Add or Remove Programs Locate the version of the Whale Client Components you wish to remove click Change Remove and follow the instructions on the screen to remove the components B Add or Remove Programs P E jol x
158. ck Add or double click an empty line The Add Application Wizard is displayed Follow the instructions on the screen to complete the wizard for details click Help When you complete the wizard click Finish The Add Application Wizard closes and the application you defined appears in the Applications list Once you activate the configuration the application will be accessible to remote users Intelligent Application Gateway 29 User Guide Applications Application Name Application Type 4 Whale Portal Whale Portal File Access File Access Sort alphabetically Add Edit Limit the Applications to the Following Subnets Subnet Address Subnet Mask Note can Some applications require additional setup For those applications when you finish adding the application to the trunk a help screen pops up informing you of the application specific requirements and providing step by step setup instructions where applicable The help is also available to you any time thereafter in the General tab of the Application Properties dialog box via the following link i Application Aware Settings You can find a description of all the IAG application specific requirements in the Intelligent Application Gateway Application Aware Settings guide 6 Repeat steps 4 5 to add more applications to the SSL VPN Portal You can also quickly add a new application to the trunk based on the definitio
159. csesssesescesseesseseeeseesseeseeees 136 Backing Up the Certificate Settings All CAS cssscsssssscssesssseessseessscesescessneseeseeessseees 140 End User Interaction Local CA Only csecesta saccat senate sccatendacenxeeteaceatenaantetancateandscnweess 140 Requesting Certified Endpoint Status essesseseesesseseeseesessesreseesenrerenseeresreseereesenreserereeresees 142 Checking the Certified Endpoint Request Status ssssssesssesesseseeerrsrrersesseeresresererrerrensenee 144 Installing the Certificate and Logging In as a Certified Endpoint User ssssssssseessrseesersesees 144 Viewing and Processing Certificate Requests Local CA Only oo seeseesessesreesseeseees 146 Whale Client Com pOme nus siccscesctsectensostaonssbarsstisisncessistdacedeseuekusseadsteameateseibsanmassseasnentssentae 147 Installing and Running the Components on Endpoint Computers cceecesssseseseeeees 150 Prerequisites for Installing the Whale Client CoMponent cccssesssesssesseseectesseseseeens 151 Online Whale Client Components Installation cccsscsssesssssscsesesseseecesssseseesseseeseseeesees 152 Whale Client Components Installer oo cccscscsssssesesseccseesseesescesssesssescsessessesssesesesseesseees 154 Offline Whale Client Components Installation ccescsssessessecseceeseseesesssseseesseseesesesessees 157 Prerequisites for Running the Whale Client Components sssscssssssesscseeseeseseeeseeeees 159 AG Trusted Sites cass
160. csessssesessesessssesssseseseseeeseseeees 310 TRACE Activation pencanedaxeaedssadseasasedesesaiucauatea eodedaensivbentendeadsoueateanseteedasdsandsdecreateave 311 12 Contents Error Server Trace and Log Files as cestccccetcct teste tects aeeceakecate a denaasaccesel oaceneentauracnesaas 311 Fil Location and Naming ccceescsceeescccedsscecutccetenwecengoulsdbeednessecstsncdscsactesnecsocescsesseobecanedee 311 Size and Quantity of PIES scvsssetiesscossssechescesscesecwagshecesssseisosscosssseconsedns sestsdcvobecsazseondes sateasoeds 312 Log File Cl an p siseses esise storisesr toc catisbs canencen vassamushaeosessseateseaectabcseecaantebees daccueneuacaedexbetts 313 Log File Cleanup Parameters ssessseesseseeseseesesssessrseesreseeesessrssereeeeeesesseesersrseeneeesensesseeseeee 314 How the Log File Cleanup Process Works sessesessessseeseessersessesseseesseesersereeneeesensenseeseeee 314 Configuring Log File Cleanup Parameters eeseseseeseesseseseeeseeseesessrseeeseesensersereereeeseeseeses 317 Excluding IIS Log Files from the Log File Cleanup Process sesesseeesereereseeseeerserseesesse 318 Support Utilities s2ccciintsnteabssaereseisbacnnadeussycasedetenuplvaccaevexmbnpatenutecdsaistaneactacaidetieasebansuanacenetuns 319 Running Support Utilities Tests eesesseeesseseeeeeeeseessessessrserseerresseesersereenreesenseeseeseeeerees 320 Running the Data Collection Utility eeseseeseesseseeeeeseesessessrseeesesseeserrssesreesenserseesereee
161. ct Users or Groups Dialog Box Select Users or Groups Eg Look in 9 lt Select repository gt a m Repository Users and Groups Users Groups In Folder sah o gaam m Selected Users and Groups Users Groups Help 7 Cancel To use the Select Users or Groups dialog box 1 In the Look in drop down list select the repository you wish to use You can select from two types of user group repositories Repositories of users and user groups based on the definition of a third party user group server described in User Group Servers on page 33 All the users and user groups in the selected repository are listed in the Repository Users and Groups list Local groups described in Local Groups on page 35 All the defined local groups are listed in the Local Groups list To add users and groups to the Selected Users and Groups list double click a user or a group in the Repository Users and Groups list or the Local Groups list respectively or select one or more users and groups and click Add For Active Directory and LDAP servers the Repository Users and Groups list contains groups and individual users groups are listed first then users If the option Include Subfolders is activated for this user group server when you configure the server in the Add Server dialog box subfolders are listed as well the path of the selec
162. ct the expression you wish to edit then click Edit To create a new policy or expression click Add Intelligent Application Gateway 103 User Guide 4 The basic Policy Editor is displayed Policy Editor Eg Policy Editor i E 7 g E a lt p General Policy seunas D Anti virus XK Browser me XK Desktop Search c XK IAG Components Policy Name XX Operating System Category Pais o J Personal Firewall Rego olicies XK Software Components I Enforce Policy Only when Endpoint Detection is Enabled x User OO YPN Client Explanatory Text Added to Access Denied Message fe Create As Script Cancel Enter general information about the policy or expression in the General Policy Settings screen Once general information is defined use the tree on the left to select and configure groups of pre defined variables which will compose the policy or expression You can select as many groups and group items as required in order to define the policy or expression Tip Click Help for detailed information on the parameters of each screen When you finish editing the policy click OK to close the Policy Editor then click to close the Policies dialog box Advanced Policy Configuration 104 This section describes The components of which policies are created in Advanced Configuration Overview on page 105 Policy configuration in the Advanced Policy Ed
163. cted Zone Ifyou wish to enable access to the restricted zone from the submitting endpoint edit the application s Restricted Zone policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Intelligent Application Gateway 375 User Guide Warning 107 Restricted Zone Policy Upload File Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Restricted Zone policy the requested URL is not allowed Cause The request failed since this URL is defined as a restricted zone URL for this application type and the application s Restricted Zone policy forbids access to the zone from this endpoint Resolution In the Configuration program do one of the following In order for this URL not to be part of the restricted zone for this application type take the following steps 1 Open the Advanced Trunk Configuration window and access the Global URL Settings tab 2 Inthe Restricted Zone URLs list select the corresponding rule and do one of the following Ifyou wish this URL
164. ctor Double clicking the icon opens the Portal Activity window When an application is tunneled via the Network Connector it is not listed in the Active Connections area The connection of an SSL Wrapper application via the Network Connector is reported next to the application name in the Launched Applications area Portal Activity xj Active Connections https viww portal com 443 Disconnect Network Connector started 11 03 08 Homepage Launched Applications a Network Connector ee i T telnet to MyServeyfia Network Connector Applications tunneled via the Z Drive Mapping 2 rhusic via Network Conne Network Connector Exit Tip For a detailed description of the Portal Activity window refer to Portal Activity Window on page 184 Interaction on Computers Running the SSL Wrapper Java Applet On computers that run the SSL Wrapper Java applet the Network Connector application behaves like any other SSL Wrapper application 202 Chapter 7 Network Connector Remote User Interaction with the Network Connector Once the Network Connector client is running some of the non web application traffic is tunneled through the Network Connector as follows Internal applications that is applications that are part of the corporate network which are launched directly and not via the portal homepage are tunneled through the Network Connector SSL Wrapper applications that are la
165. d accordingly Event Report window if the number of query results exceeds the number defined here the number of results defined here is displayed For details refer to Web Monitor on page 258 Configure Monitor Opens the computer s Windows Local Users and Groups Users Manager and enables you to configure additional Web Monitor users For details refer to Enabling Web Monitor Access from Computers Other Than the IAG on page 261 Intelligent Application Gateway 241 User Guide Configuring the Built In Reporter 242 The built in reporter enables you to save events into a log file You can then use the Web Monitor to query the event log and to filter events according to type time and other parameters For more information see Event Query on page 295 A new event log file is saved every day Event log files are periodically deleted from the IAG as part of the log file cleanup described in Log File Cleanup on page 313 By default the built in reporter is activated and log files are saved to the Logs Events folder under the IAG installation path You can use in the Built In tab of the Event Logging dialog box to change the default settings To configure the built in reporter 1 Inthe Configuration program on the Admin menu click Event Logging The Event Logging dialog box is displayed x General Builtin RADIUS Syslog Mail v Enable Location C whale Com e Gap Logs E ven
166. d Server 3 Use the Add Server dialog box to define the server For details regarding each server type click Help 4 Repeat steps 2 3 to define all the required servers You can now use the servers you defined in order to Define local groups as described in Local Groups on page 35 Define application authorization as described in Defining Authorization for Portal Applications on page 38 34 Chapter 2 SSL VPN Portals Users Setup Local Groups A local group is a repository of users that you define once and can then reuse as many times as required when defining authorization for portal applications A local group can contain users and groups from various user group servers it can also contain other local groups An include exclude mechanism enables you to select individual users and groups that will be included in or excluded from the local group For example you can create a local group that includes selected users from three different user group servers then use this group repeatedly to define authorization for all the portal s non web applications You can use the Configuration program to define local groups in one of two ways Via the Local Groups menu item as described in this section Via the Authorization tab of the Application Properties dialog box as described in Defining Authorization for Portal Applications on page 38 To define a local group via the
167. d access to enterprise applications to unmanaged endpoints without creating risks to network integrity it avoids having to resort to tunneling at the network layer and jeopardizing back end resources In addition the gateway s underlying application intelligence provides the ability for administrators to create granular access control policies to cordon off even parts of an application or network files based on user profile The gateway incorporates a native host checker engine that can be customized to detect third party anti virus software or personal firewalls and supports integration with third party inspection tools This engine can also extend far further into the client side and detect virtually any metric or watermark used by an organization to tag an asset Broad Set of Connectivity Options In order to support a wide variety of applications the gateway supports the following connectivity options Web proxy for the support of web applications The gateway s content translation engine removes the need for a client component enabling pure browser access The SSL Wrapper and the inherent Socket Forwarding component enable access to non web applications such as Native Outlook Citrix and Telnet based on specific application knowledge It utilizes ActiveX and Java applet controls for SSL tunneling The Network Connector turns remote clients into part of the corporate network supporting full connectivity over a v
168. d by the server itself You can use the Additional Networks option to define additional network destinations which will be available to clients when connecting via the Network Connector as described in Additional Networks Tab on page 197 The Network Connector server supports static IP provisioning using either of the following types of IP pools Corporate IP pool consisting of corporate IP addresses that is IP addresses that belong to the corporate network as defined in the Network Segment tab Private IP pool consisting of private IP addresses that is IP addresses that belong to a network segment that doesn t overlap with the network segment which is defined in the Network Segment tab For example if the corporate segment is configured to 192 168 0 0 255 255 248 0 an example of a corporate pool would be 192 168 6 2 192 168 6 200 and an example of a private pool would be 10 16 16 2 10 16 16 200 Intelligent Application Gateway 193 User Guide 194 AN Caution Ifthe IP pool is a corporate pool make sure to exclude the IP range you define here from your organization s DHCP server to avoid IP conflict with Network Connector clients IP conflicts between corporate computers and endpoint computers will result in idle sessions in which remote clients launch the Network Connector application with no errors but have no access to the Network Connector server or to the resources that shou
169. d only one lt Name gt element must be nested under lt Message gt Child Elements None lt Message gt gt lt Desc gt lt Desc gt Description Short description of the message Must contain only alphanumeric characters and spaces Tip In the IAG Event Manager in the Event Viewer and the Event Report the short description is displayed in the Type column Usage One and only one lt Desc gt element must be nested under lt Message gt Child Elements None lt Message gt gt lt DynamicDesc gt lt DynamicDesc gt Description Long description of the message This description must be encoded using Base64 encoding and must not contain the CR LF carriage return line feed character Tip To view encoded text or to encode text that you enter in this element open the file in the Editor program For details refer to the Intelligent Application Gateway Advanced Configuration guide to Editor on page 40 Intelligent Application Gateway 253 User Guide You can include one or more parameters in the long description as follows Define a parameter using a lt Param gt element For details refer to lt Params gt on page 254 Include a parameter in the message using the following format lt parameter_name gt Where lt parameter_name gt is the named assigned to the parameter in the lt Name gt sub element of lt Param gt For example to add a User Name para
170. d other countries or both Novell Novell Directory Services Novell NetWare and SUSE are service marks trademarks or registered trademarks of Novell Inc or its subsidiaries in the United States and other countries or both PGP is a service mark trademark or registered trademark of PGP Corporation or its subsidiaries in the United States and other countries or both Red Hat is a service mark trademark or registered trademark of Red Hat Inc or its subsidiaries in the United States and other countries or both Resonate is a registered trademark of Resonate Inc The Resonate logo and Resonate Central Dispatch are trademarks of Resonate Inc Resonate Central Dispatch contains technology protected under U S Patent 5 774 660 ACE SecurlD RC4 and RSA SecurlD are service marks trademarks or registered trademarks of RSA Security Inc or its subsidiaries in the United States and other countries or both SAP is a service mark trademark or registered trademark of SAP AG or its subsidiaries in the United States and other countries or both Java JavaScript JRE and Sun are service marks trademarks or registered trademarks of Sun Microsystems Inc or its subsidiaries in the United States and other countries or both Enhanced HAT owned by Sun Microsystems Inc Norton and Symantec are service marks trademarks or registered trademarks of Symantec Corporation or its subsidiaries in the United States and other countries or both
171. defined in the URL Inspection tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Configuration in the URL Inspection Tab on page 143 Intelligent Application Gateway 75 User Guide 76 Table 10 Web Settings Tab General Web Settings Cont d Parameter Use Variables in URLs Allow POST without Content Type Ignore Requests in Timeout Calculations Activate Restricted Zone Description Activate this option if any of the application s URLs use variables For a description of how you use variables in URLs refer to the Intelligent Application Gateway Advanced Configuration guide to Using Variables in URLs on page 173 Indicates whether POST requests without a Content Type header are handled or rejected For each out of the box application type the IAG automatically configures a list of Application Aware URLs that are ignored in the calculation of the Inactive Session Timeout when this option is activated You can access and edit the list via the Global URL Settings tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Ignoring URL Requests in Inactive Session Timeout Calculations on page 162 Activate this option if you wish to restrict users access to sensitive areas of the application such as administrative are
172. der as an HTTP header Parameter as part of the URL query string Name of the header or parameter that the IAG uses to send the IP address of the originator of the connection request to the application server Select the format in which the IAG will send the Source IP Key to the application server Header as an HTTP header Parameter as part of the URL query string CD Tip If a request contains a header or parameter with an identical name to a header or parameter you define here it is blocked since it is identified as a suspected attempt to sneak data to the application server Therefore make sure you assign the headers or parameters you define here unique names that will not be used for any other purpose Intelligent Application Gateway 77 User Guide Configuring Authorization Key Value This section describes how you configure the value of the Authorization Key header or parameter which will be sent to the application server when you activate the option Authorization Key in the Web Settings tab To configure the value of Authorization Key 1 Access the following custom folder if it does not exist create it Whale Com e Gap von InternalSite inc CustomUpdate 2 Under the customUpdate folder create an inc hook as follows lt Trunk_Name gt lt Secure 0 no 1 yes gt PostPostValidate inc For example For an HTTPS trunk named WhalePortal create the file WhalePortallPostPostValidate inc
173. displayed when the event occurs Troubleshooting instructions are provided in Appendix A Troubleshooting Event Logging Messages Intelligent Application Gateway 237 User Guide Overview The IAG Event Logging mechanism logs and records IAG related events to a variety of tools and output formats Using the event logs you can gather information about system usage monitor user activities be alerted about security risks troubleshoot the IAG and assist remote users if they encounter problems while accessing the internal resources protected by the IAG Event Categories IAG related events recorded by the Event Logging mechanism are categorized as follows System events including service startup and shutdown and changes to the configuration Security events including login success or failure security policy violation or change and password change Session events including the number of sessions that are open through a trunk session start or stop and other session related items Event Logging Reporters 238 The events logged by the Event Logging mechanism can be used by various reporters The built in reporter enables you to log the events in a format that can be used by the Web Monitor In the Web Monitor you can use the Event Query window to query the events logged by the reporter and to filter events according to type time and more Tip For a description of the Event Query window of the Web Monitor
174. dress Pool From To Add Edit Remove Pool Subnet IV Activate Network Connector Cancel Using a Private Pool Additional Configuration This section describes additional steps you should take if you select to use a private IP pool that is an IP provisioning pool that consists of private IP addresses In this setup do the following Configure your corporate gateway to route the private pool s subnet from the gateway s internal network card to the IP address of the Network Connector server If your corporate firewall filters traffic on its internal interface configure the firewall to allows bi directional traffic between the private pool subnet and the corporate subnet as defined in the Network Segment tab In order to enable access to the WAN Internet configure the firewall to allows bi directional traffic between the private pool subnet and the WAN and define the private pool permissions If you are using Network Address Translation NAT in order to enable access to the WAN Internet define the subnet of the private pool as an additional internal interface Intelligent Application Gateway 195 User Guide Access Control Tab Use this tab to Define Internet access level for endpoint computers connecting via the Network Connector Split Tunneling Internet traffic on the endpoint computer is routed through the computer s original Internet connection Non Split Tunnel
175. e 22 Local Security Policy Settings Parameter Description Domain member Digitally encrypt or sign secure channel data always Disabled Domain member Require strong Windows 2000 or later session key Disabled Microsoft network client Digitally sign communications always Disabled Microsoft network server Digitally sign communications always Disabled Microsoft network server Digitally sign communications if client agrees Disabled Network Security LAN Manager Authentication Level Send LM amp NTLM responses 216 Chapter 8 Providing Access to Internal File Systems File Access Note A If you change any of the Local Security Policy settings you need to restart the IAG in order for the change to go into effect Steps you need to take for all File Access installations when joining a domain 1 At the IAG verify that for the following Windows services Startup Type is set to Automatic Computer Browser optional for performance enhancement Distributed Transaction Coordinator e Workstation 2 Still at the IAG on the Local Area Connection that is used to access File Access resources install a Client for Microsoft Networks For detailed instructions refer to Installing a Client for Microsoft Networks on page 217 3 Join the IAG to the domain that holds the File Access users and shared resources 4 Grant local logon permissions on the IAG to all File Access users regardless of their privileges Best Practice
176. e 57 Note A When using the Whale toolbar the button is only visible on endpoint computers running a Windows operating system Ifyou use a custom homepage that does not include the Whale toolbar add a link to the file on the custom page For details refer to the Intelligent Application Gateway Advanced Configuration guide to Adding Links to IAG Features on a Custom Homepage on page 66 Tip For detailed information on the customization of the portal homepage and the Whale toolbar refer to the Intelligent Application Gateway Advanced Configuration guide to Portal Homepage Configuration on page 54 The following table lists the files that can be used for the installation of the Client Components including which components are installed on the endpoint computer by each file Table 19 Whale Client Components Installer Installation Options File Whl1ClientSetup Basic exe Wh1lClientSetup NetworkConnector exe Wh1lClientSetup SocketForwarder exe Wh1ClientSetup All exe Wh1lClientSetup NetworkConnectorOnly exe Installs the following components Basic components Attachment Wiper Client Trace Utility Endpoint Detection SSL Wrapper ActiveX component Basic components Network Connector component Basic components Socket Forwarding component Basic components Network Connector component Socket Forwarding component Network Connector component only without the basic components
177. e IAG HTTP Connections and HTTPS Connections services as described in Optional Pre configuration of the Services on page 52 In the Configuration program set up the portal session using the Create New Trunk Wizard The wizard facilitates a quick auto completion of the initial portal session setup including basic portal settings session authentication setup of the website that is created on the IAG and session endpoint policies that control access to the site In the trunk you defined use the Add Application Wizard to set up the applications that will be enabled to remote users through the portal including basic application attributes such as application servers application authentication endpoint policies portal page links and more The IAG Application Aware approach insures that for the supported applications out of the box settings such as replying to application authentication requests URL inspection rulesets and more are automatically applied To create an SSL VPN Portal 1 In the Windows desktop of the IAG click Start then point to Programs gt Whale Communications IAG and click Configuration Enter your password as required In the Configuration program in the List pane select and right click HTTP Connections or HTTPS Connections then select New Trunk The Create New Trunk Wizard is displayed Chapter 2 SSL VPN Portals Creating an SSL VPN Portal 3 Follow the instructions on the screen to compl
178. e Select Users or Groups dialog box is displayed Note EN If the option All Users Are Authorized is unchecked and you do not define the users and groups that are authorized to access and view the application as described in the steps that follow all users are blocked from using the application 40 Chapter 2 SSL VPN Portals Users Setup Select Users or Groups Eg Look in 8 lt Select repository gt m Repository Users and Groups Users Groups In Folder Search i 25 iA BE m Selected Users and Groups Aad Users Groups Remove E Cancel Use the Select Users or Groups dialog box to select the users and groups to which you wish to define authorization permissions for the application For a description of how you use the Select Users or Groups dialog box refer to Selecting Users and Groups on page 43 Once you select the users and groups you wish to assign to the application close the Select Users or Groups dialog box The users and groups you selected are added to the Users Groups list in the Authorization tab of the Application Properties dialog box Intelligent Application Gateway 41 User Guide 42 Application Properties File Access x amp Download Upload 8 Portal Link 2 Authorization 4 gt P All Users Are Authorized Save As Local Group Users Groups whalecom DHCP Users whalecom DnsAdmins whalecom DnsUpdateProxy whalecom
179. e Settings guide Cleanup of Items That Are Saved Outside the Cache This section describes how you configure the Attachment Wiper to Clear the browser s History pane and empty the History folder History is cleared browser wide Clear the Web Address AutoComplete list so that no addresses are displayed in the browser s Address drop down list and clear the IntelliForms entries These items are cleared browser wide Clear Cached Passwords in Forms AutoComplete and Wininet s cached passwords replies to application specific authentication requests These items are only cleared for the specific domains that were accessed via the IAG Clear all additional fields that are saved by Forms AutoComplete These items are cleared browser wide To configure cleanup of items that are saved outside the cache Tip This procedure involves the customization of authentication pages For a full description of the pages and the customization options available to you refer to the Intelligent Application Gateway Advanced Configuration guide to Authentication Pages on page 96 Access the following custom folder if it does not exist create it Whale Com e Gap von InternalSite inc customUpdate Under the CustomUpdate folder create an inc hook which will be activated before the PostValidate asp reaches the client side Intelligent Application Gateway 113 User Guide 114 PrePostValidate inc Or PostPostV
180. e defined interval limit When you zoom in to the largest view the window displays 10 intervals to view additional intervals use the paging controls To return to the query form click Show query form Intelligent Application Gateway 281 User Guide Figure 51 Application Monitor Statistics Window Query Results View Application Monitor Statistics Server time 03 21 2006 16 14 Query Details Period 03 21 2006 00 00 00 03 21 2006 17 00 00 Interval Hour Query type py Sample Chart Statistics available up to 03 21 2006 16 11 23 Show query form FTP portal S MyWeb portal S ans E oook portal S1 O 203 stp tora St Fi Telnet portal S Web Monitor portal S T Whale Portal portal S 10 g 28 E S a ge pA A a a z4 a 5 9 5 62 0 03 21 00 00 03 21 04 00 03 21 08 00 03 21 12 00 03 21 16 00 03 21 20 00 Time Q0 11 OO omo Application amp Trunk Concurrent Accesses Duration PrE Total Accesses Max Min Average Max Sete portal S 2 jo 00 19 30 00 31 19 IE MyWeb portal S 5 0 00 27 34 00 34 21 10 outlook portal 5 3 0 00 22 24 00 34 34 Os Owa 2003 sp1 sp2 portal 5 4 0 00 36 07 01 01 39 8 Table 32 Application Monitor Statistics Window Query Results Parameter Application Trunk Concurrent Accesses 282 Web Monitor Description Application name Clicking the appli
181. e gt AuthenticatedMaxExceeded lt Name gt Desc gt Number of Max Concurrent Sessions Exceeded lt Desc gt DynamicDesc gt VGh1IG1lheG1tYWwgbnVtYmVy1IG9 lt DynamicDesc gt Params gt lt Param gt lt Name gt MaxValue lt Name gt lt Param gt lt Params gt lt Reporters gt lt Reporter gt mail lt Reporter gt lt Reporter gt syslog lt Reporter gt lt Reporter gt builtin log lt Reporter gt lt Reporters gt lt Message gt 3 When you finish editing the file still at the IAG access the Configuration program Click O to activate the configuration select the option Apply changes made to external configuration settings and click Activate gt Once the configuration is activated the messages you configured here are reported to the SMTP server and sent to the recipients you configured in Enabling the Mail Reporter to Send Messages on page 246 248 Chapter 9 Monitoring and Control Event Logging Message Configuration Note an Message configuration is implemented in an XML file In order to edit it you need to have a working knowledge of XML technology This section describes the following How you edit the default message definitions file in order to change the default event messages or to create additional custom messages in Configuring Event Messages in the Message Definitions File on page 249 The syntax of the definitions file in Event Logging Message Definiti
182. e of the following e Update the IP address port number manually in the relevant Redirect trunk e Delete the existing Redirect trunk and create a new one Redirect trunks are not monitored by the Web Monitor Sessions in Redirect trunks are not calculated in the session count of the IAG When an HTTP session is redirected to HTTPS via a Redirect trunk it is only counted as one HTTPS session To create a Redirect trunk 1 Inthe List pane of the Configuration program select and right click HTTP Connections and then select New Trunk The Create New Trunk Wizard is displayed 2 Select Redirect HTTP to HTTPS Trunk and click Next gt All HTTPS trunks for which no Redirect trunk exists are listed Chapter 3 Single Application Sites Creating a Redirect Trunk 3 Select the HTTPS trunk to which you wish to redirect HTTP requests and then click Finish Tip For additional details click Help in any of the wizard screens A new trunk with the same name as the HTTPS trunk you selected is created in the List Pane 5 amp Services B amp HTTP Connections gt E HTTPS Connections MyPortal owa2007 HTTP requests that arrive at the external website that is defined for this trunk are redirected to the HTTPS trunk you selected in the wizard Editing Trunks Once you create a trunk with the Create New Trunk Wizard the trunk values you defined in the wizard and other IAG default values
183. eatesihesuaneencbstecanes blesstaaiastogtnatatalanmetencnguasaiewies 209 Mapping Shares sassantesteeccaticntctescsacaseilacasdebstes sansa anr ebe ereen Send GEN e Ss rsen SNES es TEV Ee ECSR E Sa 210 Windows 2003 XP Support ssssessssesssesseeserssesseseeseeseeseesseseeserseesressersereeserueeesensenseeseeee 210 Fil ACCESS circensi iisen ea an e ee ee ee eE ensius eE R TEE E E E NS 211 How File Access WOrkS x5 csascnerswnvsnecencnssane casianeonsedaenaterneuaunennentaventosdentsextsosemnsnactaseniees 212 Enabling Remote Access to the File Access Application esesesssessrerseseeseseeseeseeeseeeeeees 212 Windows Domain Settings scccssssccsssssscevsccsvsseccnasacssosscsvvscecsnsssevensnsctvoocsuanacssansesevsscsbvosbess 212 Novell NetWare Settings sessirnir seot ganran osn saseceevess sbsesdoucssecdessuessobcattesueseoaucesaa tobe 220 Configuring File Access in the Configuration Program Overview e sesesersreeeeesesees 220 File Access Administration Settings eesessesesseeeeresesesseserserseeesessereensereeneeesenseeseeseeeereess 221 Accessing the File Access WiNdOW sseseesesseseesesseseeseesesseseesresrreesensenrenresessreseneesesseererreees 222 Configuring Home Directory Mapped Drives and Share Permissions cssesscseeseeee 223 Novell Logon Settings i250 sisssssctsscecsveccaccsavscassvesceossccssvessssecscoaseecbevsdasbesssessobseoe beens roai sees 227 Configuring Access to Domains Servers and Shares sssscsscssessecssscseessscss
184. ecurity Configuration on page 147 7 When you are finished with the tracing de activate the trace you activated in step 1 by deleting or commenting out the trace definition If the failure was caused by an illegal parameter list take the following steps 1 At the Web Monitor look at the description of the Warning message In the Parameter List field check whether all parameters are legal that is each parameter consists of a parameter name parameter value pair 2 Ifone or more of the parameters are illegal check the requesting browser 350 Appendix A Troubleshooting Event Logging Messages Warning 45 Bad Parameter in URL Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL you are trying to access contains an illegal parameter Cause The requested URL was rejected by a URL Inspection rule since one of its parameters renders the request invalid Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and select the URL Set tab 2 Inthe URL List select the rule that caused the failure according to the details provided in the message 3 Inthe Parameter List edit the rule of the parameter that caused the error For details about the configuration of rulesets refer to the Intelligent Appli
185. ed by one of the following When you generate a report in the Event Query window as described in Event Query on page 295 When you click in one of the Active Sessions windows The Event Report window is divided into two main areas The top part of the window displays the following Period for which the query was generated Where applicable filtering criteria such as Categories Trunk or trunks for which the query was generated Number of events that were found for the selected criteria When the report is generated from within one of the Active Sessions windows it is filtered by session ID Advanced options when used The main part of the window displays a list of reported events The parameters that are reported for each event are identical to the parameters of the Event Viewer and are described in Table 37 Event Parameters on page 294 The maximal number of results that are displayed in the window is determined in the Configuration program in the General tab of the Event Logging dialog box in Max Report Results For details refer to Configuring General Settings on page 240 Intelligent Application Gateway 297 User Guide Figure 62 Sample Event Report a https Awww myweb com Event Report Microsoft Internet Explorer Event Report Query Details Period 03 21 2006 00 00 00 03 21 2006 16 59 00 Lead User wr Click the ID number Trunka portal 8 237
186. edit the policies as described in Editing Application Policies on page 100 Editing Application Policies You edit Application Policies in the General tab of the Application Properties dialog box For Portal trunks in sites that use the default portal homepage supplied with the IAG you can also use the General tab to determine the display of the application s link on the portal homepage when the endpoint does not comply with the application s Access policy 100 Chapter 5 Endpoint Security Endpoint Policies For sites that use the default portal homepage supplied with the IAG this option determines the display of the application s link on the portal page when an endpoint does not comply with the application s Access policy Tip Application Properties Webtop Documentum xj E General F Web Servers 4P Web Settings 7 Web senal Application Name Webtop Application ID 87F596957EE441 2D 80665EFC2CCD2BCA Prerequisite Applications Number of Prerequisite Applications 0 Inactivity Period 30 Minutes m Endpoint Policies Access Default Web Application Access Portal Link on Non Complying Clients Grayed Invisible Download Default Web Application Download Upload Default Web Application Upload Restricted Zone Default Session Access Edit Policies i Application Aware Settings Cancel The selection and editing of endpoint
187. eess 321 Restarting the Web Service in the IIS eeeseeseeseseeseesesseseesreseessersrsserseeseesesseesersseeereeeseeseesee 321 Appendix A Troubleshooting Event Logging Messages 325 Intelligent Application Gateway 13 User Guide 14 Contents Chapter Introduction Overview The Whale Communications Intelligent Application Gateway IAG is a Secure Socket Layer Virtual Private Network SSL VPN that provides employees and partners with policy based secure access to applications and data from any PC or device and any location The IAG secure access solution enables remote access from diverse endpoints through a single point of entry to almost any business application and file share while enforcing user authentication and authorization over a policy defined application layer connection Endpoint security management enables granular access control and deep content inspection and application protection Running over Microsoft Internet Security and Acceleration ISA Server 2006 the IAG enables users to access line of business intranet and client server resources from a broad range of devices and locations while providing infrastructure protection and information safeguards for corporate applications and data Control Access Secure web based access to business critical applications and data Differentiated and policy driven access to network server and data resources Flexible application intelligent SSL VPN
188. egal and business guidelines that require information usage criteria to limit exposure and liability when accessing sensitive corporate data Ensures network integrity by restricting client access based on endpoint security profile Strong endpoint security management and verification helps ensure endpoint health compliance and session control Enforces policy controls over actions within an application Cache cleanup tailored to specific applications removes downloaded files and pages URLs custom caches cookies history and user credentials Detects endpoint security state Intelligent Application Gateway Architecture The IAG consists of four elements SSL VPN platform Endpoint security Application security Unified policy management framework 16 Chapter 1 Introduction Intelligent Application Gateway Architecture The IAG integrated approach rests on an architecture that functions across the client proxy and appliance tiers and is managed through a single policy engine The gateway functions at the application layer terminating both inbound and outbound communications and parsing traffic through full inspection at the application layer The ability to understand traffic flows within the context of specific applications is the foundation for the IAG application specific optimizers and underpins the gateway s ability to enforce endpoint policy at the browser This application intelligence allows the gateway to exten
189. elected during trunk trunks only configuration you can use the drop down list to select any of the certificates listed in the Certificate store installed on the IIS on the default website Certificate Hash Unique ID of the selected Server Certificate displayed HTTPS Connections automatically trunks only This parameter is defined during the creation of the trunk with the Create New Trunk Wizard Editing Webmail Trunk Server Settings Note E This section is only applicable for Webmail trunks that enable access to Domino iNotes Single Server and Domino iNotes Multiple Servers applications You initially configure the server settings for Domino iNotes applications when you create the trunk in the Create New Trunk Wizard In Webmail trunks any time after the initial configuration you can edit these settings in the Advanced Trunk Configuration window in the Server Settings tab The Server Settings tab of the Domino iNotes Single Server application is described on page 65 The Server Settings tab of the Domino iNotes Multiple Servers application is described on page 66 64 Chapter 3 Single Application Sites Editing Webmail Trunk Server Settings Domino iNotes Single Server Figure 6 Server Settings Tab Domino iNotes Single Server Advanced Trunk Configuration WebmailDominoiNotesSingle E xj General BS Authentication 2 Session Application Customization 8 Health Monitor Serv
190. ent 184 When working via the SSL Wrapper ActiveX component one Portal Activity window is used to monitor all the IAG sites that are accessed from the computer When working via the SSL Wrapper Java applet a separate Portal Activity window opens for each IAG site that is accessed from the computer Chapter 6 SSL Wrapper Remote User Interaction with the SSL Wrapper Figure 24 Portal Activity Window SSL Wrapper ActiveX Component Portal Activity x Active Connections Connections area a Applications area Anw portal com Disconnect 192 168 1 186 1494 via SOCKS start amp 192 168 1 189 23 via relay started 07 Homepage https www shai com 192 168 1 186 1494 via SOCKS start 192 168 1 186 1494 via SOCKS start l Launched Applications citrix to gamma Bx MS excel Power Point TM tn to cachalot a citrix direct Hide Ext So CD Tip For a description of the Portal Activity window when the Network Connector is running on the computer refer to Interaction on Computers Running the SSL Wrapper ActiveX Component on page 201 Figure 25 Portal Activity Window SSL Wrapper Java Applet Applications area a Connections area _ Applet client started Portal Activity Whale SSL Wrapper Java Client Ae OTM SSL Wrapper Java Client AM bsidiary Closing this window will close all listed applications Launched A
191. ent to client Intelligent Application Gateway 189 User Guide The Network Connector server provides the following features e Auto detection and manual tuning of corporate networking parameters DNS WINS gateway and domain name including support for multi connection machines e Two IP provisioning methods Internet access configuration including split tunneling non split tunneling and none Protocol filters for IP based protocols Enabling access to additional networks Configuring the Network Connector In order to enable users to connect to the corporate network via the Network Connector take the following steps Configure the Network Connector server as described in Configuring the Network Connector Server on page 190 Note EN The Windows DHCP Client service must be running on the IAG server Inthe Configuration program use the Add Application Wizard to add the Network Connector application to the portal homepage The application is an SSL Wrapper application and is part of the Client Server and Legacy Applications group in the Wizard Once you complete these steps end users can install the Network Connector client on their computer The client is part of the Whale Client Components described in Whale Client Components on page 147 E Note You cannot install the Network Connector client on the same computer where the Network Connector server is installed Configuring the Netwo
192. er to Application Endpoint Policies on page 99 Warning 37 Download Policy Content Type and Extension Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed 340 Appendix A Troubleshooting Event Logging Messages Cause The response failed since its content type and extension render it a download and the application s Download policy forbids downloads to the requesting endpoint Resolution At the IAG do one of the following If you wish responses with this content type to be considered regular responses and not downloads take the following steps 1 Access the file that holds the definitions of file extensions and the associated content types Whale Com e Gap von conf content types ini In this file identify the extension associated with this content type If the file does not contain this content type add the appropriate extension content type pair to the file 2 Inthe Configuration program edit the application s downloads Extension List so that the extension associated with this content type is not considered a download The list is defined in the Application Properties dialog box in the Download Upload tab in the Downloads area For details refer to Download Upload Tab on page 82 If you wish responses with
193. erName Translation 2 URLInspection 3 Global URL Settings 2 URL Set Server Settings JV Enable Domino iNotes Single Server iNotes DOLS Server fi 92 168 1 62 Pott fi 352 J Launch Automatically on Start Table 6 Server Settings Parameters Domino iNotes Single Server Parameter Description Enable Domino iNotes Enables offline access to Domino iNotes Single Server iNotes DOLS Server Hostname or IP address of the DOLS server We recommend that you use a hostname Note If you use a hostname to define the application use the effective hostname as defined in the Domain Name System DNS Port Port number of the DOLS server Launch Automatically Automatically launches the SSL Wrapper to enable the on Start operation of the Lotus iNotes Sync Manager on the computer For details refer to Chapter 6 SSL Wrapper Intelligent Application Gateway 65 User Guide Domino iNotes Multiple Servers Figure 7 Server Settings Tab Domino iNotes Multiple Servers General Z Authentication 2 Session _J Application Customization 3B Server Name Translation 2 URL Inspection 2 Global URL Settings Bl URL Set B Server Settings V Enable Domino iNotes Multi Servers iNotes DOLS Servers 192 168 1 73 192 168 1 63 192 168 1 53 Pott fi 352 J Launch Automatically on Start Table 7 Server Settings Parameters Domino iNotes Multiple Servers Parameter Descripti
194. ereafter is tunneled through the Network Connector This includes SSL Wrapper applications that are launched via the portal homepage Internal applications that is applications that are part of the corporate network which are launched directly and not via the portal homepage For example users can launch Microsoft Outlook on their computer directly without a link on the portal homepage and connect to the corporate Exchange server In addition while end users are connected via the Network Connector they can launch any web application directly not via the portal including applications that are not defined as portal applications and applications that are not supported by the IAG Portal web applications can still be launched from the portal as usual E Note Disconnecting the Network Connector client disconnects all the applications that are tunneled through it It does not however disconnect applications that are not tunneled through the Network Connector Intelligent Application Gateway 201 User Guide When the Network Connector client is running in this setup a Network Connector icon replaces the SSL Wrapper icon in the Windows System tray to the right of the Windows taskbar SSL Wrapper Icon Network Connector Icon Hovering over the Network Connector icon displays the statistics of the traffic that is tunneled through the Network Connector Right clicking the icon enables you to disconnect the Network Conne
195. erties dialog box and access the Web Settings tab 2 Under the option Automatically Reply to Application Specific Authentication Requests verify that the selected authentication server is valid for this application For details refer to Web Settings Tab on page 73 334 Appendix A Troubleshooting Event Logging Messages Warning 25 Failed to Send Message Symptoms The IAG s Event Logging mechanism failed to send a message to a reporter even though in the Message Definitions file the message is configured to be sent to this reporter and the reporter is activated in the Configuration program Tip For a description of the Message Definitions file refer to Event Logging Message Definitions File on page 250 Cause Reporter is not configured correctly in the Configuration program Reporter s server is not running Reporter s server is not reachable from the IAG Resolution Verify configuration of the reporter in the Configuration program on the Admin menu click Event Logging and in the relevant tab check the values of the reporter s parameters such as the server s address or user credentials For details refer to Optional Event Logging Configuration Steps on page 239 Verify that the reporter s server is running Verify that the reporter s server is reachable from the IAG If not check the following Network connections e Verify the configuration of the I
196. ertification requests Requests that were entered prior to the change will be treated according to the policy that prevails when the request was entered Selecting Between Manual and Automatic Certification Policies This procedure describes how you select between the Manual and Automatic certification policies To select a certification policy 1 In the Windows desktop click and select Programs gt Administrative Tools gt Certification Authority The Certification Authority window is displayed Chapter 5 Endpoint Security Certified Endpoints CA s home folder i Certification Authority Revoked Certificates issued Certificates Pending Requests Failed Requests Revoked Certificates Issued Certificates Pending Requests Failed Requests 2 Right click the home folder of the CA and select Properties The CA s Properties dialog box is displayed 3 Select the Policy Module tab Whale Certificate Server Properties 27 xi Storage Auditing Security General Policy Module Exit Module Extensions r Description of active policy module Name Windows default Description Specifies how to handle certificate requests for Enterprise and Stand alone CAs Version 5 2 3790 1830 Copyright Microsoft Corporation All rights reserved OK Cancel Apply 4 Click Properties The Properties dialog box is displayed 5 In the Request H
197. es 113 Configuring a Scheduled Cleanup sseessessessssssrssrseesressessersersenrenseeseesersereerereseeseeseeseeseee 115 Enabling the Attachment Wiper on a Custom Logoff Message Page sssssssseseeeees 116 When Encrypted Pages Are Saved to a Location Other Than Temp Files 117 Intelligent Application Gateway 7 User Guide Certified ENdPOiINtS cessssssnces cute peacticscnnnpalenid cos vucenaedlnntasenbvesenensensneeeacauragaauactecaesoucauteuecenacl skies 118 Certified Endpoint Configuration Overview sacesacesicscassudccnnesssnsdenaibnnsdessbeccsaisinnnnndsssess 118 Enabling Certified Endpoint Using Microsoft CA Locally oo eesssssssssessscsesceseesesessseees 119 Enabling Certified Endpoints Using a Remote CA ccecscssscsectscessesesssecsssssessseseeseseeens 122 Certified Endpoint Configuration Steps eesesessesssesrserseessessessessesensensenseesereereeneeesenses 123 Installing a Microsoft Certificate Authority Local CA Only sesseseseseeeseeseeeesesseeseseesessesses 124 Defining a Certification Authority Policy Local CA Only cescesesssssesescseesseeeeseeesneeees 128 Editing the Default Configuration Local CA Only uo escesscsscsscsccsescsesssscsessseseesesesssees 131 Preparing Endpoint Computers that Use Internet Explorer Local CA Only esses 134 Adding Certified Endpoint Enrollment to the Trunk Local CA Only ccesscsseeeeeseees 135 Adding the CA to the Certificate Trust List All CAS cescess
198. es are written into the error log file until the file reaches the maximum file size allowed The error server then creates a new log file and logs errors in the new file The maximum file size is defined in the general Trace section of the trace configuration file as described in General Trace Configuration Section on page 310 In order to preserve disk space the error log files are periodically cleaned up as described in Log File Cleanup on page 313 Log File Cleanup The cleanup of log files prevents a buildup of old log files that can in time fill up the available disk space on the JAG During cleanup old log files of the following types are deleted IAG log files including Event logs Error logs Trace logs IIS log files Note A IIS log files can be excluded from the log file cleanup process as described on page 318 This section provides the following A list of the configurable log file cleanup parameters which control when a cleanup starts and stops on page 314 Intelligent Application Gateway 313 User Guide A description of how the log file cleanup process works and of how the cleanup parameters are implemented on page 314 Instructions for configuring the cleanup parameters on page 317 Instructions for excluding IIS log files from the log file cleanup process on page 318 Log File Cleanup Parameters The following log file cleanup parameters can be configured in the Confi
199. es dialog box is displayed It is described in the following sections e In Webmail or Basic trunks In the main window of the Configuration program in the Application Server area click next to Application Properties The Application Properties dialog box is displayed It is described in the following sections General Tab 68 In the General tab you can Change the application name Copy the Application ID number In portal trunks only select prerequisite applications that is one or more applications that must be active in order for the application you are configuring here to run For example if the application you define here requires connection to an internal share add a Local Drive Mapping application that will map the required drive and define it to be a prerequisite application to the application you are configuring here Only applications of the type Client Server and Legacy Applications can serve as prerequisite applications All applications of this type that are defined in the portal s Applications list are available for selection in the Prerequisite Applications list Chapter 4 Application Settings Editing Application Properties lt gt Tip the number of applications that are defined as prerequisites to the current application is indicated below the application list in the Number of Prerequisite Applications field To define an application as a prerequisite enable it in the Pre
200. esbeseeetesccesulecvoredesouessnevadsdatevectdvnselesnssansbereosestenoure sets 196 Additional Networks Tab sscscsscsssssssessssseessscssssssessscssssssesssesessesesesceesssesssscsesesesesoees 197 AdVaNCOd Tab EE E sosteslesscdssstessansosbvotecoessssesaesadcaubeddensed sassncsovesstvascests 199 Remote User Interaction with the Network Connector s ccsjecdeccscceccecssccateetocesctevencessenvntes 200 Interaction on Computers Running the SSL Wrapper ActiveX Component 201 Interaction on Computers Running the SSL Wrapper Java Applet csssssesseeees 202 Intelligent Application Gateway J User Guide Network Connector Troubleshooting sisestcscicscescsccccecetssnpensscatiudssnccebsssseshcesspeadtvenoondhenies 203 Troubleshooting the Network Connector Server sccisssecatscocdasossceirassnnacesnssoutorseetasusione 203 Server LOS vsssicvssctecssscdsessacessseivevsccenvsccussssstevevessrssccenasssevsessabesscdsossacevsce staves copersedestbetenabecss 204 Server RESOULCES sivssesdesaecsusssabvesssnsatiacecsaansesteusesnenscossavegnesbeoseaboostabsonsa bdo veo vsensdobessoneeosdedee 205 Network Traffic LOgS cissssssssesssvsscesssecssstsessesssssczscbesasoversvensssvancssdevscosbeassoossesteevasteavasanens ss 205 Troubleshooting the Network Connector Client seiccs cicsiscedsassteceicsnvssenendssoutesnesnaansions 206 Chapter 8 Providing Access to Internal File Systems 209 Local Drive Mapping sessir ieser tacsecetvinssent
201. escribed in Application Monitor Statistics Window Query Form on page 279 e The window then displays the query results as described in Application Monitor Statistics Window Query Results View on page 281 Application Monitor Statistics Window Query Form When you first access the Application Monitor Statistics window the query form is displayed Use this form to define the query Define the period of time for which to generate the query Select a pre defined period such as Today or Last Month at the top of the Period area Or Define start and end dates at the bottom of the Period area Intelligent Application Gateway 279 User Guide Define the interval at which data is sampled at the bottom right of the Period area The intervals that are available for selection depend on the selected period For example if the selected period is a day only an Hour interval can be defined for a period of a week you can select an interval of either an hour or a day By default the maximal number of intervals that can be queried is 1 500 If required you can change this value as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Note however that a value of over 1 500 intervals is not reeommended and may slow down the monitor s performance considerably Select the query type
202. eseeneeeseesenseeseeee 244 Configuring the Mail Report r sxszecvesestcatssicteguctesatugsecatetbiesssceietionsnatetethataerstuarccmsteaboss 245 Enabling the Mail Reporter to Send Messages eessesseseesersesrerresseersresreeseresresseeresensessesees 246 Configuring which Messages are Sent by the Mail Reporter ssesesrserserseesersesessererrersesee 247 Message Configuration esc cpeecact ets ttesbesecanstsencesnceshenaace satatessasenieheceuensixpactcuansantatecdecaseete 249 Configuring Event Messages in the Message Definitions File eee cseceseeseecseseeeeneees 249 Event Logging Message Definitions File ssscsssssscsessscesescsessecesescsesssscseesesessesessssees 250 Event Messages Application Interface c cescssscsssssssssscsscesescesceesesssseesesesssseesseseeseseeens 257 Disabling Event Logging and Reporting sccscsscuaussastctencssnnsonntetsarccsnnsismuncsarensssadieeubanmevece 258 WV ee MOMICOP scissione meterinn e E E Nea PA ET ESEE 258 Accessing the Web Monitor eesssesseseseseesesseeserseesseseeseeseeseesseeseneeseeneesrenseeeeeseneeseeeseeses 260 Enabling Web Monitor Access from Computers Other Than the IAG sssssseesssesesesereese 261 Web Monitor Browser SUppOrt 0 ciccsessetcecoseccsncsooeseecotiesseobecsnanscceestebarseeossusheddesoesevenes 264 Web Monitor Layout ssccciczstaidttescatsscsanncenshatenteacbererasseatsesacbeneatuccundssbasunes denmawenenacniians 264 Tips for Using th Web Monitor sie sncscinesnctcsauns
203. eshold accordingly You define those settings at the IAG in the Configuration program as follows 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the Session tab 2 Modify the required settings in the Concurrent Unauthenticated Sessions Threshold and Max Concurrent Unauthenticated Sessions fields respectively Warning 14 User Login Failed Symptoms A remote user attempts to access the site Access is denied and the following message is displayed in the browser window Failed to authenticate Intelligent Application Gateway 327 User Guide Cause The failure can be caused by e Wrong credentials entered by the remote user such as wrong user name or password the user selecting the wrong Directory authentication server in the login page and more Authentication server is not configured correctly in the Configuration program For example Invalid IP host value or invalid port Server access credentials are not strong enough Groups users search in the authentication server is defined inaccurately thus the IAG cannot find a unique instance of the user name e Authentication server is not running e Authentication server is not reachable from the IAG The cause of the login failure is reported in the message in the Error field Resolution Depending on the type of error do one or more of the following At the IAG verify the configurat
204. esources that are enabled via the File Access application Note the trust relationships between the domains in this setup Figure 37 Sample Environment with IAG as New Domain fF File Access N Domain Intelligent Application Gateway Domain Controller External IP Internal IP interface interface File Access Application User Domain File Access User File Access User File Access User File Access User File Access User File Access User Trust Trust Resource Domain Resource Domain 214 Chapter 8 Providing Access to Internal File Systems File Access Joining the IAG to an Existing Domain In this setup you join the IAG to an existing Windows domain which holds all File Access users and resources The following sections describe the steps you need to take in order to set up the IAG for this type of environment If you are joining the IAG to a domain that is not a native Active Directory domain that is a Windows NT 4 0 domain or an Active Directory Mixed Mode domain you need to go through both sets of steps described below If you are joining the IAG to a native Active Directory domain that is a Windows 2000 or Windows 2003 domain skip the first set of steps and take the steps described in Steps you need to take for all File Access installations when joining a domain on page 217 Figure 38 illus
205. ess the error server activates it Ifany of the parameters in this trace were changed since the last refresh the process applies the new parameters to the trace max_size Maximum size of the trace log file in bytes report_errors Select whether to report errors which are reported in the error log in the trace log as well This parameter can be defined in individual traces as well as in the general Trace section If it is not defined here the value in the general Trace section applies Trace Templates Following are sample templates you can use in order to create a trace as defined in the trace ini configuration file These are samples only and therefore appear in the file as comments preceded by the number sign 308 Chapter 10 Troubleshooting Error Logging and Process Tracing The last sample section Trace lists additional parameters that can either be applied to the individual trace section or if a parameter is not configured for the trace be applied from the general Trace section of the file as described in General Trace Configuration Section on page 310 Trace lt process name gt lt instance name gt lt reporter name gt lt trace level gt lt class name gt lt trace level gt Trace lt process name gt lt reporter name gt lt trace level gt lt class name gt lt trace level gt Trace lt process name gt lt trace level gt lt instance name gt lt t
206. essages Resolution In order to avoid a situation where the header or parameter is used in legal requests make sure you assign it a unique name that will not be used for any other purpose If the header or parameter name is unique when it is used in a request it is an indication that this is a malicious request that should be blocked To define the Authorization key header or parameter for this application take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and access the Web Settings tab 2 Under the option Authorization key assign a unique header or parameter name For details refer to Web Settings Tab on page 73 Warning 67 URL Path not Allowed Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL you are trying to access contains an illegal path Cause The path of the requested URL was rejected by the URL Inspection engine Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and select the URL Set tab 2 Doone of the following depending on the rule that caused the failure as specified in the Description filed of the message Ifthe rule that caused the failure is Default rule use the URL List to add a n
207. ession Monitor Current Status Server time 03 14 2006 16 37 i Total Sessions a N o g 3 t S E3 EE Trunk Name Authenticated Sessions Unauthenticated Sessions Total Sessions portal 5 ZS 7 0 i All Trunks 7 0 7 Session Monitor Over Time The Session Monitor Over Time window is displayed when you click I in the Session Monitor Current Status window Use it to monitor session behavior over time for a selected trunk or for all active trunks Session behavior is displayed in a line chart showing both authenticated and unauthenticated sessions and the total number of sessions at pre defined intervals By default the window refreshes the data at 10 second intervals If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Use the paging controls to scroll to the period of time you wish to monitor 12 Intelligent Application Gateway 267 User Guide Figure 42 Session Monitor Over Time F https Awww myweb com Session Monitor Over Time All Trunks Microsoft Internet Explorer Session Monitor Over Time All Trunks Total Sessions Authenticated Unauthenticated 3 Sessions 0 5 35 43 PM 5 37 43 PM 5 39 43 PM 5 41 43 PM 5 43 43 PM 5 45 43 PM Time 60 1 00 Applet monchart started A internet
208. ests E Failed Requests To issue a certificate from a pending request 1 Right click the pending request in the Certification Authority window and select All Tasks gt Issue The certificate is issued The pending request is moved from the Pending Requests folder to the Issued Certificates folder To deny a pending request for a certificate 1 Right click the pending request in the Certification Authority window and select All Tasks gt Deny The pending request is denied and is placed in the Failed Requests folder When the end user checks the status of the Certified Endpoint request a screen is displayed informing the end user that the request was denied Whale Client Components Whale Client Components are installed on the endpoint computer in order to enable some of the IAG features The components include the following Whale Component Manager ActiveX object which downloads installs manages and removes all the Whale Client Components Attachment Wiper ActiveX component for details refer to Attachment Wiper on page 110 Intelligent Application Gateway 147 User Guide 148 Client Trace utility used for support purposes Endpoint Detection ActiveX component for details refer to Endpoint Policies on page 98 e Non web tunneling components including SSL Wrapper ActiveX component for details refer to Chapter 6 SSL Wrapper Socket Forwarding compone
209. ete the wizard for details click Help When you complete the wizard click Finish The wizard closes The new Portal trunk you created now appears in the List pane and the Configuration pane displays the trunk s parameters 2 HTTPS Connections HTTP Connections Whale Communications Intelligent Application Gateway 2007 gt MyPortal Application Access Portal Applications Public Hostname IP Address portal site com Port 443 Application Name _ Application Type Whale Portal Whale Portal r External Website IP Address 192 168 1 5 1 HTTPS Port 443 X R r Initial Internal Application Initial Application Whale Portal X M Use Toolbar a I Sort alphabetically Add Edit Remove Limit the Applications to the Following Subnets m Security amp Networking Subnet Address Subnet Mask Maximum Connections Ea Advanced Trunk Configuration i Edit Jemove High Availability Configure Add Note EN By default the Initial Internal Application is the Whale Portal application used in conjunction with the Whale toolbar If you wish to use a different portal homepage refer to the Intelligent Application Gateway Advanced Configuration guide to Using a Custom Portal Homepage on page 61 In the List pane right click the trunk and select Add Or In the Applications area of the Configuration pane under the Application List cli
210. eted profiles of local users are not deleted Least recently used profiles are deleted first Profiles of users who are currently connected to one or more mapped drives are not deleted To delete user profiles from the IAG 1 Access the following CustomUpdate folder if it does not exist create it Whale Com e Gap von conf CustomUpdate 2 Copy the file userProfiles ini from this folder Whale Com e Gap von conf Place it in the CustomUpdate folder you accessed in step 1 If such a file already exists in the custom folder use the existing file 3 Configure the parameters in the file in the custom folder 226 Chapter 8 Providing Access to Internal File Systems File Access Table 23 Deleting User Profiles Configuration Parameters Parameter EnableProfileDeletion HighWaterMark LowWaterMark SleepPeriod DoNotRemoveProfile Novell Logon Settings Description Determines whether user profiles are deleted from the IAG or not Number of profiles above which the deletion process starts Must be equal to or greater than the LowWaterMark parameter Number of profiles that are kept on the IAG once the deletion process is complete A minimum number of 50 profiles must remain undeleted After the number of minutes defined here the process checks whether the HighWaterMark has been reached and deletes excessive profiles as required Defines a user profile that is not deleted For example
211. ew rule or edit one of the existing rules so that the requested URL is allowed Ifthe failure was caused by an existing rule and the name of the rule is specified in the message s Description field access the rule in the URL List In the URL column edit the path of the URL For details about the configuration of rulesets refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 Intelligent Application Gateway 361 User Guide Error 73 Connection to Non Web Application Failed Symptoms A remote user attempts to launch an SSL Wrapper application either via the portal homepage or by logging into a site that automatically launches the application The application is launched but fails to connect to the server Cause The IAG can not establish a connection with the application server The failure can be caused by one of the following Application server is not configured correctly in the Configuration program For example an invalid IP address port or path lt Application server is not running Application server is not reachable from the IAG The cause of the login failure is reported in the message in the Error field Resolution Verify the configuration of the application server in the Configuration program in the Application Properties dialog box in the Server Settings tab For details refer to Ser
212. f various sensitive tests Running the Data Collection Utility The Data Collection utility can be configured to collect any files required as well as to automatically run any or all of the Support Utilities tests If required you will be instructed by technical support on how to do so To run the Data Collection utility 1 On the IAG open a Command prompt and type whlcollect 2 Press lt Enter gt The utility is run and an archive file is created This may take a few minutes The resulting file is named lt hostname gt whlcollect cab It is stored in whale Com e Gap Backup 3 Encrypt the file created by the Data Collection utility using an encryption utility such as PGP 4 Send the encrypted file to technical support Note For security reasons it is recommended that you delete the original and encrypted data collection files after viewing them including deletion from the Windows Recycle Bin Restarting the Web Service in the IIS The following procedures describe how you stop the Internet Information Server IIS on the IAG then restart the Web service in order to reload the Web filters filter extensions and filter libraries as required during some of the procedures described in this Guide Note During this procedure you stop the IIS then re start the Web service If any other services on the IAG such as FTP or SMTP are using the IIS you have to start them as well Intell
213. finitions 3 Verify that the association of extensions and content types is consistent for both files If you find discrepancies between the files edit the file on the IAG to match the application server s file 4 At the IAG in the Configuration program verify that the application s downloads Extension List is configured so that the extension used here is not considered a download The list is Intelligent Application Gateway 343 User Guide defined in the Application Properties dialog box in the Download Upload tab in the Downloads area For details refer to Download Upload Tab on page 82 lt If you wish to cancel the identification of downloads by extensions for this application uncheck the option Identify by Extensions in the Downloads area of the Download Upload tab N Note If none of the options in the Downloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy Ifyou wish to enable downloads from the application to the requesting endpoint edit the application s Download policy in the Configuration program The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Pro
214. fline component installation Determine which components users will be able to install For example you can select to enable the SSL Wrapper component but not the Socket Forwarding component Replace the graphic that appears the installation screens Enable or disable Custom installation mode where users can select which of the enabled components to install If Custom mode is disabled the installation will run in Typical mode where all enabled components are installed E Note Custom mode is only applicable when you deploy the components installation in Interactive mode as described in Deploying Offline Component Installation on page 158 Intelligent Application Gateway 157 User Guide 158 To configure offline component installation 1 Copy the file ComponentsConfig xml from this location Whale Com e Gap utils OfflineClientSetup To Whale Com e Gap utils OfflineClientSetup CustomUpdate 2 In the file you copied in step 1 determine whether to enable the installation of each component or not whereas Install 1 install Install 0 don t install For example The following line enables the installation of the Network Connector component lt Component Name Network Connector ID 17 Install 1 gt 3 Still in the file you copied in step 1 determine whether to enable Custom installation mode whereas lt CustomSetup Enable 1 gt enable Custom in
215. following Request Certified Endpoint status on a remote PC Note that the certificate must be created with the option to export the private key Once the request has been approved install the certificate on the remote PC Export the certificate to the handheld device Make sure that you also export the private key Tip The endpoint enrollment pages shown in the procedures that follow are the default pages supplied with the IAG For instructions on how you can customize the look and feel of the pages refer to the Intelligent Application Gateway Advanced Configuration guide to Customizing Certified Endpoint Enrollment Pages on page 67 Intelligent Application Gateway 141 User Guide Requesting Certified Endpoint Status To submit a request to make a computer a Certified Endpoint 1 Access the portal and click the Certified Endpoint button or link The Certified Endpoint User Information window is displayed 15 x y Whale nications Certified Endpoint A Microsoft Subsidiary User Information Please enter the following Name Peter Reese E Mail Company Whale Communications Department Engineering City Tel Aviv State NA Country Region IL Submit gt 2 Enter the required user information in the text box or boxes E Note The fields available in this window may vary according to the settings defined during the configuration of the Certified Endpoint feature as described in Cus
216. for each application individually Supported Applications The SSL VPN portal supports the following groups of applications Built in Services are services that are supplied with the IAG such as File Access or Web Monitor Web Applications are applications that use HTTP HTTPS and a web interface such as Microsoft Office SharePoint Server 2007 and Outlook Web Access Client Server and Legacy Applications are applications that use non HTTP HTTPS protocols and are handled by the SSL Wrapper Examples of client server and legacy applications include Telnet Citrix MetaFrame Program Neighborhood applications Microsoft Windows Terminal Services Clients Microsoft Outlook and more Browser Embedded Applications are web initiated applications that use a web based interface to create a non HTTP HTTPS connection and are handled by the SSL Wrapper These include Citrix NFuse IBM WebSphere Host on Demand Lotus SameTime Terminal Services Web Client and others 18 Chapter 1 Introduction Intelligent Application Gateway Architecture In addition to the applications that are supported out of the box you can define your own generic applications such as a generic web application where you define all the application settings rulesets and definitions according to the application s requirements Trunks the IAG Transfer Channels Data is transferred through the gateway via transfer channels or trunks where each tr
217. from their computers 1 Atthe IAG Configuration program open the Advanced Trunk Configuration window and access the Session tab 2 Inthe Endpoint Policies area activate the option Prompt User when Retrieving Information from Endpoint When users access the site if endpoint detection is enabled on their computer they are prompted with the following page m Whale _ Communications A Microsoft Subsidiary This site is protected by the Intelligent Application Gateway In order to ensure full functionality of the site it will retrieve information from this computer including some information that may be of personal nature If you do not enable this option you will be able to access the site and use it with limited functionality only Do you wish to enable this option Enable and continue with full functionality M Dont show Continue with limited functionality Continue This site is intended only for authorized users Ifyou encounter any problems with this site please contact your system administrator at administrator server com e By selecting Enable and continue with full functionality users give their consent for the collection of information from their computers They can then continue working with site using all the functionality that is enabled by the Whale Client Components e For users who select Continue with limited functionality information is not collected from their computers
218. from the application to the requesting endpoint edit the application s Download policy in the Configuration program The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Warning 39 Download Policy Violation File Extension Unmatched Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response failed since its content type does not match the file extension This was discovered while checking whether the response is a download according to its file extension since the application s Download policy forbids downloads to the requesting endpoint Resolution Do one of the following lt If you wish this extension content type pair to be considered a match take the following steps 1 At the IAG access the file that holds the definitions of file extensions and the associated content types Whale Com e Gap von conf content types ini 2 At the application server access the file that holds the extension content type de
219. fy the requested application server Resolution Contact technical support Warning 59 Invalid Reroute Destination Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window The requested URL is not associated with any configured application Cause The URL that the user requested was rerouted according to a Manual URL Replacement rule and the destination server is not recognized by the IAG filter Resolution Take the following steps in the Configuration program 1 Open the Advanced Trunk Configuration window and select the Application Access Portal tab 2 Inthe Manual URL Replacement area edit the applicable rule For details refer to the Intelligent Application Gateway Advanced Configuration guide to Manual URL Replacement on page 272 358 Appendix A Troubleshooting Event Logging Messages Warning 62 Unauthorized Access Attempt Symptoms A remote user attempts to access an application from the portal homepage The request is denied and the following message is displayed in the browser window You are not authorized to access the application Cause The user is not authorized to view or access the requested application Resolution Change the authorization settings for this application If you are using the default portal homepage that is supplied with the IAG you can personalize the application so that
220. g Enter the user name using the following syntax lt domain_name gt lt user_name gt You can use the asterisk wildcard at the end of the search string to define a group of users For example to enter a query for all users of a domain named ActiveDirectory enter the following in the Lead User text box ActiveDirectory Lead User ActiveDirectory Tip You can use the asterisk wildcard atthe end ofthe string e The search is case sensitive Once you submit the query the results are displayed in the window as described in User Monitor Statistics Window Query Results View on page 290 Figure 56 User Monitor Statistics Window Query Form MF Monitor Statistics 7 Trunks Period Week Month Quarter Year Today Last24Hours Yesterday Start date 03 21 2006 00 00 00 75 End date 03 21 2006 13 04 41 Lead User Tip You can use the asterisk wildcard at the end of the string Submit Show last results Reset Intelligent Application Gateway 289 User Guide lt gt Tip After you submit a query when you return to the query form from the query results view you can click to display the results of the last query submitted regardless of any changes you might have made in the query form User Monitor Statistics Window Query Results View 290 Query results are displayed in the User Monitor Statistics wind
221. ge 135 Note the following If you use the default portal homepage supplied with the IAG adding the Certified Endpoint Enrollment application to the trunk automatically adds the required links to the end user s portal If you use a custom homepage you can manually add this functionality to your page as described in the Intelligent Application Gateway Advanced Configuration guide in Adding Links to IAG Features on a Custom Homepage on page 66 The Certified Endpoint Enrollment application is not supported on Camino browsers on Mac OS X since the underlying Microsoft application is not supported on those browsers Update the Certificate Trust List CTL with the new CA Refer to Adding the CA to the Certificate Trust List All CAs on page 136 Back up the certificate settings as described in Backing Up the Certificate Settings All CAs on page 140 Note A After the initial backup make sure to back up the certificate settings from time to time especially before any IAG software upgrade or installation or any other changes to system settings Intelligent Application Gateway 119 User Guide At this point the Certified Endpoint feature is enabled End users can obtain a certificate and turn their computers into Certified Endpoints For details refer to End User Interaction Local CA Only on page 140 Once end users request certificates you can view and manage the requests using the Certific
222. ge from where you wish to send the message add the following function SetMessage lt Message_ID gt lt Optional_param_list gt Where lt Message_ID gt is the unique message ID defined in the message definitions file in the lt Id gt element described on page 251 lt Optional_param_list gt holds the definition of message parameters as follows Ifno parameters are defined in the message null Ifthe message contains one or more parameters Array lt message_param gt lt message_param gt Where lt message_param gt is the parameter you define in the message definitions file in the lt Param gt element described on page 255 2 Ifthe message contains one or more parameters for each parameter you need to create an object in the file where the name of the parameter is identical to the name you use in the function you define in step 1 Tip You can see a sample function call in the following page Whale Com e Gap von InternalSite samples set_message asp 3 Ifyou are adding the function to your own page such as your own login page you need to include the following file in the page Whale Com e Gap von InternalSite inc MonitorMgr inc Intelligent Application Gateway 257 User Guide Disabling Event Logging and Reporting This section describes how disable and re enable event logging and reporting EN Note Disable event logging and reporting for advanced troubleshooting purposes
223. gent Applic I User must change password at next logon I User cannot change password J Password never expires IV Account is disabled gt Account is locked out Cancel Apply 4 Uncheck the option Account is disabled then click to close the dialog box 262 Chapter 9 Monitoring and Control Web Monitor In the right pane of the Local Users and Groups Manager the IAG Administrator user is now enabled IAG Administrator is now enabled tii usergroup Console Root Local Users and Groups Local Users T File Action Yiew Favorites Window Help e mB C Console Root G Local Users and G Ay Users E Groups Built in account for administering the compute Built in account for guest access to the comp Intelligent Application Gateway Administrator Local administrators to manage the Intelligent H X Ruilt in_arcount For_annnymaue accace ka Inte 5 Assign a password for the IAG Administrator user in the right pane of the Local Users and Groups Manager right click the IAG Administrator user and select Set Password The Set Password dialog box is displayed 6 Use the Set Password dialog box to assign a password The IAG Administrator user can now access the Web Monitor using the password you assigned here Tip In order to enable access to the Web Monitor by additional users access the Web Monitor Users group under Users and define
224. guration is applied and whether the computer s Trusted Sites list is managed remotely or not Optional Determines whether the user can add other sites to the Trusted Sites list on demand Optional Determines whether the user can add HTTP sites to the list on demand Applicable only when the value of CanAddSites is 1 Optional Determines behavior when a trusted site s certificate is invalid Data 1 managed 0 unmanaged Note Any number other than 1 is considered a zero 1 users can add sites to list 0 users cannot add sites to list If this value is not defined users cannot add sites to the list 1 users can add HTTP sites to Trusted Sites list 0 users cannot add HTTP sites to Trusted Sites list If this value is not defined users cannot add HTTP sites to the list 1 users are prompted and can select whether to add the site to the Trusted Sites list or not 0 users are not prompted access to the site is denied If this value is not defined users are not prompted Intelligent Application Gateway 163 User Guide Value PromptlnvalidCertUntrusted TrustedSite lt gt PilotExpirationTime 164 KK Table 2I Values of CheckSite reg Cont d Type DWORD String String Values are case insensitive Description Optional Determines whether users are prompted when an untrusted site s certificate is invalid
225. guration program Table 40 Log File Cleanup Parameters Parameter Description Start Cleanup Total size in megabytes of IAG and IIS log files that can be kept on at MB the disk before the IAG starts a log file cleanup process Tip Set this value according to the disk space you can allocate for this purpose Stop Cleanup Total size in megabytes of IAG and IIS log files that are kept on the at MB disk after the log file cleanup process Number of Optimal number of files retained after the log file cleanup process Undeleted Files as follows Event trace and IIS log files the number of files retained for each individual trace Error log files the number of files retained is twice the number configured here Tip The ratio between undeleted error log files and other log files is hardcoded and cannot be changed The deletion of IIS log files can be excluded from the log file cleanup process altogether as described on page 29 How the Log File Cleanup Process Works 314 The log file cleanup process starts when one of the following occurs The number of log files including IAG event error and trace log files and IIS log files exceeds 2 048 This parameter is hard coded and cannot be changed Chapter 10 Troubleshooting Log File Cleanup The total size of all the IAG event error and trace log files and IIS log files exceeds the Start Cleanup at MB value E Note The log f
226. h of the following are added to the page so that users can request Certified Endpoint status 140 Chapter 5 Endpoint Security Certified Endpoints The Whale toolbar where the Certified Endpoint button is automatically added For a description of how you can use the Whale toolbar with a custom homepage refer to the Intelligent Application Gateway Advanced Configuration guide to the section Using a Custom Portal Homepage to step 4 on page 62 A Certified Endpoint link which can be added as described in the Intelligent Application Gateway Advanced Configuration guide in Adding Application Links on a Custom Portal Homepage on page 68 In order for an endpoint computer to be granted Certified Endpoint status end users have to take the following steps Submit a request for a certificate to be issued as described in Requesting Certified Endpoint Status on page 142 If so defined in the certification authority policy check whether the request for Certified Endpoint status has been approved as described in Checking the Certified Endpoint Request Status on page 144 Once the Certified Endpoint status has been approved install the certificate as described in Installing the Certificate and Logging In as a Certified Endpoint User on page 144 cae Note The Certified Endpoint button is not displayed on handheld devices In order to grant Certified Endpoint status to a handheld device do the
227. he Company nor any of its worldwide subsidiaries or distributors or management or employees grants any warranties in respect to any damages or deficiencies resulting from accident alteration modification foreign attachments misuse tampering negligence improper maintenance abuse or failure to implement any updates furnished The Products must be used and maintained in strict compliance with the instructions and safety precautions of the Company contained herein in all supplements thereto or in any other written documents of the Company The products must not be altered without prior written consent of the Company The Company grants no warranties with respect to the Products either express or implied including any implied warranties of merchantability or fitness for a particular purpose The Company will have no liability for any damages whatsoever arising out of or in connection with the delivery installation use or performance of the product In no event shall the Company be liable under any legal theory including but not limited to contract negligence misrepresentation strict liability in tort or warranty of any kind for any indirect special incidental or consequential damages including but not limited to loss of profits even if the Company has notice of the possibility of damages Without limiting the effect of the preceding clauses the Company s maximum liability if any for damages including but not limited to liability arising
228. he Socket Forwarding component only or enable and disable the Socket Forwarding component 168 Chapter 5 Endpoint Security Whale Client Components ej https mportal microsoft com System Information 2 Microsoft Internet Explorer lal o ooon Whale i z rbore A System Information Whale Communications Intelligent Application Gateway Uninstall all Whale Client Whale Client Components t Whale Component Manager Y 3 7 0 12 Components Endpoint Detection w 3 70 12 SSL Wrapper W 3770 12 r SSL Wrapper Java Applet N A Uninstall Socket Forwarder LSP W 3 7 0 12 NSP W 3 7 0 12 Socket Network Connector Client W 3 7 0 12 Driver W 3 7 0 12 Not Running F di attachment Wiper TM y 3 7 0 12 orwarding Anti virus eTrust 7 1 Updated 12 5 2006 10 09 02 PM component Personal Firewall XPSP2 Version N A Operating System windows XP Professional 5 01 2600 Service Pack 2 Enable disable Browser Version Internet Explorer 6 S ki t User Agent Mozilla 4 0 compatible MSIE 6 0 Windows NT 5 1 SV1 NET CLR 2 0 50727 ocke NET CLR 1 1 4322 Sun JRE Version N A Forwarding Domain WHALECOM component Certified Endpoint x Privileged Endpoint x This site is protected by the Whale Communications Intelligent Application Gateway To refresh this page please log out then log in again Done A internet You can enforce the removal of the Socket Forwarding client component f
229. he component list This connection uses the following items check whether Client for Microsoft Networks is listed and do one of the following If Client for Microsoft Networks is listed and the box next to it is checked you do not need to take any further steps Click to close the dialog box If Chent for Microsoft Networks is listed and the box next to it is unchecked check the box then click OK You do not need to take any further steps If Client for Microsoft Networks is not listed in the Local Area Connection Properties dialog box continue with the following steps 5 In the Local Area Connection Properties dialog box under the component list click Install The Select Network Component Type dialog box is displayed 218 Chapter 8 Providing Access to Internal File Systems File Access Select Network Component Type 21x Click the type of network component you want to install B amp Service Y Protocol e 4 client provides access to computers and files on the network you are connecting to Cancel 6 Verify that Client is selected in the list and click Add The Select Network Client dialog box is displayed Select Network Client 27 xi Click the Network Client that you want to install then click OK If you have an installation disk for this component click Have Disk N etwork Client Client for Microsoft Networks By Client
230. he failure was caused by an illegal character take the following steps 1 On the IAG activate a trace that will record the IAG filter activities a Access the following file Whale Com e Gap common conf trace ini Intelligent Application Gateway 349 User Guide b Add the following section to the file Trace Wh1Filter WHLFILTRULESET xheavy Save the file 2 Use a browser to request the URL again 3 Locate the log file of the trace you activated in the following location Whale Com e Gap logs The log file is named as follows WhlFilter default lt Time_Stamp gt log 4 Inthe trace log file find the following warning message WARN CanonicalizeEscapeChar Check allowed characters after escape list in Param String lt FailedString gt failed Where lt FailedString gt is a parameter that contains one or more illegal characters which caused the failure Tip For more information on the tracing process see Error Logging and Process Tracing on page 307 5 At the Configuration program open the Advanced Trunk Configuration window and access the URL Inspection tab 6 In the Out Of The Box Security Configuration area edit the application s rule so that the list of Legal Characters includes all the characters found in the parameter that caused the error For details refer to the Intelligent Application Gateway Advanced Configuration guide to URL Inspection Tab Out Of The Box S
231. he query Select a pre defined period such as Today or Last Month at the top of the Period area Or Define start and end dates at the bottom of the Period area Define the interval at which data is sampled at the bottom right of the Period area The intervals that are available for selection depend on the selected period For example if the selected period is a day only an Hour interval can be defined for a period of a week you can select an interval of either an hour or a day By default the maximal number of intervals that can be queried is 1 500 If required you can change this value as well as the number of intervals that are displayed on a single page in the default view as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Note however that a value of over 1 500 intervals is not recommended and may slow down the monitor s performance considerably Select the query type g Sample Chart the number of concurrent sessions is sampled at the end of each interval Peak Chart the number of concurrent sessions reported is the highest number of sessions that were open during the interval period Once you submit the query the results are displayed in the window as described in Session Monitor Statistics Window Query Results on page 273 Chapter 9 Monitoring and Contro
232. he server Cause A cookie encryption violation was detected The cookie name is not encrypted and is not listed in the cookie encryption exclude lists Resolution In order to enable the browser to send this cookie in an unencrypted from you need to add it to the list of cookies that are excluded from the cookie encryption process Take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and access the Cookie Encryption tab 2 Add the cookie that was blocked to the Cookies list The name of the cookie is provided in the Description field of the event in the Web Monitor s Event Viewer For details refer to Cookie Encryption Tab on page 80 Warning 95 Cookie Name Cannot be Decrypted Symptoms A remote user requests a page The request is processed and the user experience is unaffected However a Cookie header in the request is blocked and is not forwarded to the server 368 Appendix A Troubleshooting Event Logging Messages Cause A cookie encryption violation was detected An encrypted cookie name could not be decrypted since it contains an invalid security digest Resolution In the browser that was used to request the page delete the cookie that was blocked The name of the cookie is provided in the Description field of the event in the Event Viewer Warning 96 Name of Excluded Cookie is Encrypted Symptoms
233. header Cause The request does not contains a Content Type header and the method used in the request is POST According to the configuration of the IAG POST without a Content Type header is not allowed Resolution In order to allow POST requests without a Content Type header for this application take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and select the Web Settings tab 2 Check the option Allow POST without Content Type For details refer to Web Settings Tab on page 73 Warning 48 Application Out Of The Box Rule Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL The URL is blocked by the application s Out Of The Box Security Rules Cause The requested URL contains an illegal character according to the definition of the application s out of the box security configuration 352 Appendix A Troubleshooting Event Logging Messages Resolution In the Configuration program do one of the following If you wish the character that caused the error to be considered a legal character for this application take the following steps 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the URL Inspection tab 2 In the Out Of The Box Security Configuration area ed
234. hentication and User Groups Servers In the Authentication and User Group Servers dialog box select the relevant server and click Edt For details on each of the parameters in the Edit Server dialog box click Help Verify that the authentication server is running Verify that the authentication server is reachable from the IAG If not check the following Network connections Verify the configuration of the ISA firewall rule that enables the connection from the IAG to the application server For details examine the ISA logs and alerts and if necessary consult ISA troubleshooting Warning 23 Application Form Authentication Failed Symptoms A remote user attempts to access an application The attempt fails Cause Despite the fact that in the Configuration program the application is configured to automatically reply to the application server s authentication request HTML form the login attempt failed This can be caused by one of the following The credentials that were used for the authentication were not accepted by the application This can be due to one of the following reasons The authentication server used for the login does not contain the user credentials that are required by the application Incorrect configuration of the Form Authentication Engine for this application The browser used by the remote user is not supported by the IAG for a list of supported browsers refer to Supported Browsers
235. his CA _e Distinguished name suffix pe C whale DC biz Preview of distinguished name ie C iL DC whale DC biz Validity period Expiration date E Years 7 9 27 2010 1 45 PM cot e Enter the Common name for this Certificate Authority and click Next gt A cryptographic key is generated and the Certificate Database Settings window of the Windows Component Wizard is displayed Chapter 5 Endpoint Security Certified Endpoints 10 11 Windows Components Wizard xi Certificate Database Settings Enter locations for the certificate database database log and configuration information Certificate database C WINNT system32 CertLog Browse Certificate database log CAWINNT system32 CertLog Browse M Store configuration information in a shared folder Shared folder CACAConfig Browse Preserve existing certificate database coed He Do not change the default values displayed in the Certificate Database Settings window Click Next gt If the IIS is running you are prompted to stop the IIS Click to stop the IIS on your computer A progress bar appears and the Microsoft Certificate Authority is installed Click to exit the Windows Components Wizard To verify that the Certificate Authority is installed and working on your computer in the Windows desktop click and select Programs gt Administrative Tools gt Authentication Aut
236. hority The Certification Authority window with the Certificate Authority you just installed is displayed amp Certification Authority File Action view Help e Ame AR e m Certification Authority Local E A Revoked Certificates Revoked Certificates Issued Certificates 41 Issued Certificates Pending Requests Pending Requests Failed Requests E Failed Requests Intelligent Application Gateway 127 User Guide Defining a Certification Authority Policy Local CA Only 128 The Microsoft CA provides two policies for issuing certificates Manual the user s request is defined as pending until the administrator manually issues the certificate Automatic the certificate is automatically issued after the request is received When the CA is installed the default certification policy is Manual You can change this policy at any time as described in Selecting Between Manual and Automatic Certification Policies on page 128 If you select the Automatic certification policy by default the certificate is issued immediately after the certification request is received If you wish you can change the policy to Automatic with Delay whereby the certificate is issued only after the specified delay period To configure this policy refer to Setting the Certification Policy to Automatic with Delay on page 130 EN Note When you change the certification policy the change only affects new c
237. hout Logoff J Re open Portal if User Selects to Keep Channel Open m Endpoint Settings J Uninstall Socket Forwarding Component IV Add Site to Pop Up Blocker s Allowed Sites Select whether to delete application specific temporary files for all sessions where the Attachment Wiper is activated Coret Select whether to activate the Attachment Wiper for privileged sessions When you create a trunk the Attachment Wiper is automatically configured as follows 112 Chapter 5 Endpoint Security Attachment Wiper The option Activate Attachment Wiper is activated for default sessions and disabled for privileged sessions To learn more about these types of sessions refer to the Intelligent Application Gateway Advanced Configuration guide to Default and Privileged Session Settings on page 137 The option Attachment Wiper Cleans Application Specific Temporary Files is activated This option applies to all the sessions where the Attachment Wiper is activated It determines whether or not the Attachment Wiper deletes application specific temporary files for the relevant applications For a list of applications for which the Attachment Wiper deletes application specific temporary files as well as a description of the locations where the Attachment Wiper deletes files for each of these applications and what types of files are deleted refer to the Intelligent Application Gateway Application Awar
238. http localhost Auto whalefilesharing Icon URL Jimages Applcons FileAccess cif Short Description Explore Your Files Description a I Startup Page I Open in New Window Oten Carcel 3 In the Application URL field enter the following http localhost Auto WhaleFileSharing Path lt path gt amp ShowFolders False Where path is the full path of the folder users will access For example http localhost Auto WhaleFileSharing Path EUROPE NORWAY Bergen amp ShowFolders False E Note Parameter names and values are case sensitive 4 Click OK Intelligent Application Gateway 235 User Guide Once you activate the configuration end users will not be presented with a tree folder in the File Access interface In this example when users access the File Access application they will be presented with the Bergen folder and will be able to browse only this folder and its subfolders Tip gt The parameter ShowFolders can also be used with a Home Directory definition That is users will be directly presented with their Home Directory and will be able to browse only the Home Directory and its subfolders 236 Chapter 8 Providing Access to Internal File Systems File Access Chapter 9 Monitoring and Control This chapter describes the monitoring and control tools that are supplied and supported by the Intelligent Application Gateway IAG Event Logging is used to log IAG related events E
239. ibed in Editing Application Properties on page 67 It also describes how you can quickly create a new application based on an existing application in Duplicating an Application on page 91 Editing Application Properties This section describes how you can edit application properties in the Application Properties dialog box including Accessing the Application Properties Dialog Box on page 68 General Tab on page 68 Web Servers Tab on page 71 Web Settings Tab on page 73 Web Server Security Tab on page 78 Cookie Encryption Tab on page 80 Download Upload Tab on page 82 Server Settings Tab on page 85 Client Settings Tab on page 86 Portal Link Tab on page 87 Authorization Tab on page 91 Intelligent Application Gateway 67 User Guide EN Note The tabs and parameters that are available in the dialog box vary according to the application type Accessing the Application Properties Dialog Box This section describes how you access the Application Properties dialog box after you add an application to the portal or create a Webmail or Basic trunk To access the Application Properties dialog box e In Portal trunks In the main window of the Configuration program in the Applications area select and double click the application whose properties you wish to edit Or Select the application and click below the Application list The Application Properti
240. ication Properties Cookie Encryption Tab Application Properties Generic Browser Embedded App xi lt Cookie Encryption amp Download Upload 5 Server Settings 4 gt m Enable Cookie Encryption Encryption Mode Include Exclude Cookies googletalk_jid Help Cancel Table 13 Cookie Encryption Tab Parameters Parameter Description Enable Cookie Enables the Cookie Encryption option for the application Encryption Encryption Mode Exclude all cookies are encrypted except for those listed in the per application cookie list and the global exclude list Include only cookies that are listed in the per application cookie list are included in the encryption process Cookies Cookie list In an Exclude encryption mode per application list of cookies that are excluded from the encryption process In an Include encryption mode per application list of cookies that are included in the encryption process Intelligent Application Gateway 81 User Guide Global Exclude List The global list includes cookies that are excluded from the cookie encryption process of all the applications where the encryption mode is Exclude You can add cookies to the list as required A Caution Do not delete any of the cookies that are configured in the list by default To edit the global exclude list 1 Access the following file Whale Com e Gap Von Conf WhlExcludeCookie xml
241. icy Manager is where you can optionally pre configure security policies to which the configuration settings are enforced to conform The Configuration program enables robust granular configuration of all aspects of the gateway including network management content management and application control From within the Configuration 20 Chapter 1 Introduction Security Management Tools program the Create New Trunk Wizard streamlines trunk creation and configuration Application sensitive predefined rulesets and out of the box dangerous character definitions are automatically applied to the filtering mechanism as part of the configuration process The Editor enables you to easily edit sort and convert any text file including encrypted files and base64 encoded text All the tools are described in detail in the Intelligent Application Gateway Advanced Configuration guide in Chapter 2 Security Management Tools Monitoring and Control Tools and Interfaces The IAG monitoring and control tools enable network management and auditing at both the network and application levels The Event Logging mechanism logs IAG related events to a variety of tools and output formats including information about usage user activities and potential security risks The Web Monitor is a monitoring and reporting web application that enables anywhere anytime snapshot viewing of events as well as event filtering and analyzing Encryption
242. ide Enabling Certified Endpoints Using a Remote CA 122 A remote CA is any CA that is installed on a computer other than the IAG You can use Microsoft CA or any other CA When using a remote CA you have to provide end users with the necessary certificate to use the Certified Endpoint feature Note A The Certified Endpoint feature is only supported on HTTPS trunks The steps below describe how you enable Certified Endpoints for an existing trunk To enable the Certified Endpoint feature using a remote CA perform the following steps Install the certificates from the remote CA to the Trusted Root Certification Authorities Certificate store on the IAG If you require assistance with this installation contact technical support Enable the Certified Endpoint feature in the Configuration program in the Session tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Session Configuration on page 138 Update the Certificate Trust List CTL with the new CA Refer to Adding the CA to the Certificate Trust List All CAs on page 136 Back up the certificate settings as described in Backing Up the Certificate Settings All CAs on page 140 Note EN After the initial backup make sure to back up the certificate settings from time to time especially before any IAG software upgrade or installation or any other changes to system setti
243. igent Application Gateway 321 User Guide Stopping the IIS This procedure describes how you stop the IIS as well as what steps to take in case the standard procedure does not stop it To stop the IIS On the IAG open a Command prompt and type net stop iisadmin y Press lt Enter gt The following messages are displayed in the Command prompt eNCA WINDOWS system32 Microsoft Windows Version 5 2 3790 lt C Copyright 1985 2663 Microsoft Corp C Documents and Settings Administrator gt net stop iisadmin y The following services are dependent on the IIS Admin Service service Stopping the IIS Admin Service service will also stop these services Whale File Sharing Service World Wide Web Publishing Service HTTP SSL Whale File Sharing Service service is stopping Whale File Sharing Service service was stopped successfully World Wide Web Publishing Service service is stopping World Wide Web Publishing Service service was stopped successfully HTTP SSL service is opping HTTP SSL service wa topped successfully IIS Admin Service service is pping IIS Admin Service service was opped successfully C Documents and Settings Administrator gt The IIS is stopped You now have to re start the Web service as described in Starting the Web Service in the IIS on page 823 If the IIS does not stop take the following steps 1 Still on the IAG open the Windows Task Manager and select the Processes tab 2
244. iguration of rulesets refer to the Intelligent Application Gateway Advanced Configuration guide to Configuring a Ruleset in the URL Set Tab on page 164 354 Appendix A Troubleshooting Event Logging Messages Warning 52 Data not Allowed with Method Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You have attempted to access a restricted URL WebDAV methods are not allowed Cause The request uses a WebDAV method while attempting to send data to the application According to the configuration of the application such requests are not allowed Resolution Take the following steps in the Configuration program 1 Open the Application Properties dialog box for this application and select the Web Settings tab 2 Activate the option Allow WebDAV Methods For details refer to Web Settings Tab on page 73 Warning 53 File Upload Forbidden Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Upload policy the requested upload is not allowed Cause The request failed since when it contains attachments it is considered an upload URL and the application s Upload policy forbids uploads from the submitting endpoint Resolution In the Configuration program do one of the following In order for this reque
245. ile Access in the Configuration Program Overview 220 The following sections describe the configuration of the File Access option in the Configuration program A Note The File Access application can only be configured and used via a Portal trunk In order to configure the option you go through the following stages You configure the File Access administration settings including Remote users access to their Home folder and mapped drives and share permissions Settings that determine how you log on to Novell Directories in order to gain access to Novell NetWare Servers Access permissions to Domains Servers Shares Administration settings are described in File Access Administration Settings on page 221 These settings apply to all trunks where File Access is enabled Chapter 8 Providing Access to Internal File Systems File Access If the network includes Novell NetWare Services and you wish to enable remote access to NetWare Servers you need to set up authentication with the Novell Directory Service NDS For details refer to Configuring Authentication with the Novell Directory Service on page 231 Add the File Access application to the trunk as described in Creating an SSL VPN Portal on page 28 Ifthe trunk uses the default portal homepage supplied with the IAG a link to the File Access application is automatically added to the page When using a custom homepage you have to manual
246. ile cleanup process is started only under one of the two conditions described above Cleanup does not start when there is a disk overflow if there is no more space on the disk the error server stops writing error and trace logs onto the disk without notification It is therefore important to configure the Start Cleanup at MB parameter according to the disk s capacity IIS log files can be excluded from the log file cleanup process as described on page 29 Once the log file cleanup starts the log files are deleted starting with the oldest files according to the file modification time not according to the file s timestamp Files are deleted until the total size of the files left on the disk reaches the value defined in Stop Cleanup at MB For each type of file the cleanup process leaves a number of files undeleted as determined by the value defined in Number of Undeleted Files If by deleting the files as described above the total size of undeleted files is down to the value defined in Stop Cleanup at MB the log file cleanup is complete If however after leaving the number of files defined in Number of Undeleted Files the size still exceeds the Stop Cleanup at MB parameter the cleanup process ignores the Number of Undeleted Files value and deletes more files starting with the oldest file until the total size of the log files in the IAG is reduced to the Stop Cleanup
247. ing Internet traffic on the endpoint computer is routed through the gateway of the corporate network You can also select to disable local area access in this mode E Note When using non split tunneling note the following The Additional Networks option is not applicable in this access mode since all network traffic passes through the Network Connector tunnel in this mode For details refer to Additional Networks Tab on page 197 If the Network Connector session on the endpoint computer is ended ungracefully for example when the computer disconnects from the Internet users are prompted to re enable their Internet connection No Internet Access endpoint computers cannot access the Internet You can also select to disable local area access in this mode Note A In this mode endpoint computers can only access their local network the network defined in the IP Provisioning tab and any other networks defined in the Additional Network tab Determine the IP Spoofing policy By default the option Disable Spoofed Traffic is selected the Network Connector server checks and validates the source IP address of each packet and tunnels only traffic from connected Network Connector clients If you wish to enable the tunnelling of other traffic uncheck this option lt Apply filtering of any of the following IP based protocols TCP UDP ICMP 196 Chapter 7 Network Connector Configuring the Network Connector
248. int computers including the definition of endpoint security policies and the Attachment Wiper and Certified Endpoint options Intelligent Application Gateway 23 User Guide 24 Chapter 6 SSL Wrapper describes how you can provide users with secured SSL connectivity via the portal homepage to various TCP IP client server applications such as native messaging applications standard email applications collaboration tools connectivity products and more It also describes how you provide users with secured SSL connectivity to Domino iNotes servers via a Webmail trunk Chapter 7 Network Connector describes the Network Connector feature which enables you to install run and manage remote connections as if they were part of the corporate network supporting full connectivity over a virtual and secure transparent connection Chapter 8 Providing Access to Internal File Systems describes how you can provide remote users with access to the organization s internal file systems including e Local Drive Mapping which provides access to Windows shared network folders File Access which provides web access to the internal Windows Network and Novell NetWare file servers Chapter 9 Monitoring and Control familiarizes you with the IAG s monitoring and control tools and interfaces and provides detailed instructions on how to access and use them Chapter 10 Troubleshooting describes how you u
249. ion belongs This field is optional and is not displayed by default You can enable the display of this field in the file that controls the Web Monitor preferences in the parameter showApplD For details refer to the Intelligent Application Gateway Advanced Configuration guide to Customizing the Web Monitor Windows on page 72 Application ID as displayed in the Configuration program in the General tab of the Application Properties dialog box Number of users currently accessing the application Clicking the number of accesses displays the trunk s Application Session Monitor Active Sessions window described in Application Monitor Active Sessions on page 278 Application Monitor Over Time The Application Monitor Over Time window is displayed when you click in the Application Monitor Current Status window Use it to monitor application behavior over time for any selected number of applications Application behavior is displayed in a line chart showing the number of accesses for each selected application By default the window refreshes the data at 10 second intervals If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 Intelligent Application Gateway 277 User Guide Use the paging controls to scroll to the period of time you wish to monitor 2 6
250. ion data described in User Authorization Data on page 77 Figure 10 Application Properties Web Settings Tab Application Properties Webtop Documentum xj a General Web Servers W W Web Settings l Web Ser f gt Application IV Automatically Reply to Application Specific Authentication Requests authentication Select Authentication Servers 1 ace Remove 401 Request C HTMLFom Both I Verify URLs F Leam Mode Application s general I Allow WebDAV Methods web settings gt TJ Check XML Integrity IV Check Out Of The Box Rules I Use Variables in URLs I Allow POST without Content Type IV Ignore Requests in Timeout Calculations I Activate Restricted Zone User authorization data J Authorization Key Format Header Parameter I Source IP Key Format Header Parameter OK Cancel Intelligent Application Gateway 73 User Guide Application Authentication 74 This portion of the Web Settings tab is only relevant for applications that request users to authenticate It defines how to authenticate against the application server as described in Table 9 on page 74 Table 9 Web Settings Tab Application Authentication Parameter Automatically Reply to Application Specific Authentication Requests Select Authentication Servers 401 Request HTML Form Both Description Reply to the application authentication requests with user credentials Whe
251. ion of the authentication server 1 Inthe Configuration program on the Admin menu click Authentication and User Groups Servers 2 Inthe Authentication and User Group Servers dialog box select the relevant server and click Edit For details on each of the parameters in the Edit Server dialog box click Help e Verify that the authentication server is running Verify that the authentication server is reachable from the IAG If not check the following Network connections Verify the configuration of the ISA firewall rule that enables the connection from the IAG to the application server For details examine the ISA logs and alerts and if necessary consult ISA troubleshooting 328 Appendix A Troubleshooting Event Logging Messages Warning 15 Number of Max Concurrent Sessions Exceeded Symptoms A remote user attempts to log in to the site Access is denied and the following message is displayed in the browser window There are too many users on the web site at the moment Please try to access the site again in a few minutes Cause The maximal number of authenticated sessions that can be open through the site at the same time was reached Resolution If this event occurs on a regular basis increase the number of sessions that can be open through the site 1 Inthe Configuration program open the Advanced Trunk Configuration window of the relevant trunk and access the Session tab 2 Inthe Max
252. ions of the new application are derived from the application from which it is copied with the following exceptions Application Name which you assign when you create the new application Application ID a unique ID is assigned to the new application by the system Portal Application Name is the name of the new application Intelligent Application Gateway 91 User Guide Custom definitions of the application customizers and application access portal SRA templates are not applied to the new application E Note You cannot duplicate the following applications Any of the applications in the Built In Services group SharePoint Portal 5 02 in the Web Applications group To duplicate an application 1 Inthe Configuration program in the Applications area select and right click the application you wish to duplicate From the drop down menu select Duplicate The Application Duplicate Wizard is displayed 2 Inthe Wizard screen assign a unique name to the application then click Finish The new application is added to the trunk in the Applications area 3 Access the Application Properties dialog box of the new application and change the application s server definitions For Web Applications in the Web Servers tab For Client Server and Legacy Applications in the Server Settings tab For Browser Embedded Applications in both the Web Servers and Server Settings tabs 92 Chapter 4 Applic
253. irtual and secure transparent connection It enables the gateway to support split tunneling configurations and afford greater network reliability and performance Intelligent Application Gateway 17 User Guide Integrated Application Firewall The gateway s deep application level filtering assessed through application behavior knowledge prevents exploits that cause unexpected application responses It blocks potentially malicious traffic using positive and negative logic rules that identify errant commands and syntax and reduces the immediacy of server software patches by providing protection from zero day attacks Application Aware Because the IAG is application aware it can address application specific issues including security concerns and functionality requirements This ability enables organizations to customize the behavior of specific applications when accessed remotely The IAG provides out of the box support for key applications to allow for rapid optimization of most popular applications in use today Out of the box application support is optimized for each application type including features such as URL Inspection rulesets and character definitions wiping out sensitive information possibly recorded by a web browser during an SSL VPN session and more In addition the application aware approach provides administrators with tools and interfaces that enable them to define features which are not supported out of the box
254. is determined when the user first accesses the site If some of the settings on the endpoint computer are changed after the login in order for the changes to affect the computer s compliance with the endpoint policies users need to log out of the site and log in again For example if an anti virus program is installed on the computer but is not running when the user logs in the computer does not comply with a policy that requires a running anti virus If the user then runs the anti virus program without re logging in to the site the computer is still not considered as complying with this requirement until the user logs out of the site and logs in again This section describes the following Endpoint Detection on page 95 Session Endpoint Policies on page 95 Application Endpoint Policies on page 99 e Default Policies on page 101 Policy configuration options are described in Basic Policy Configuration on page 103 e Advanced Policy Configuration on page 104 Chapter 5 Endpoint Security Endpoint Policies Endpoint Detection In order to be able to determine whether an endpoint complies with the endpoint policies the IAG attempts to determine which security components are installed and running on the endpoint computer as soon as the user attempts to access the site This is done by the Endpoint Detection ActiveX component of the Whale Client Components which is installed on the e
255. is _ coed _ 3 Inthe Components list check Certificate Services and click Next gt The CA Type window of the Windows Components Wizard is displayed Chapter 5 Endpoint Security Certified Endpoints Windows Components Wizard CA Type Select the type of CA you want to set up Select Stand alone root CA Check Use custom settings to generate the key pair and CA certificate and click Next gt The Public and Private Key Pair window of the Windows Components Wizard is displayed Windows Components Wizard Public and Private Key Pair Select a cryptographic service provider CSP hash algorithm and settings for the key pair Microsoft Enhanced Cryptographic Provide I Microsoft Exchange Cryptographic Provider v1 0 Microsoft Strong Cryptographic Provider Schlumberger Cryptographic Service Provider 517174E5 57D9 4B64 91E8 8F 7A97BB9EC3 848ED484 E8E7 4753 4D96 7C52D048EFF5 Microsoft Internet Information Server J Use the Intelligent Application Gateway 125 User Guide 126 Select the following In the CSP list select Microsoft Enhanced Cryptographic Provider v1 0 In the Hash algorithm list select SHA I In the Key length drop down list select 2048 Click Next gt The CA Identifying Information window of the Windows Components Wizard is displayed CA Identifying Information Enter information to identify this CA Common name for t
256. is automatically configured here for Domino iNotes and Domino Webmail applications When you activate the Startup Page option this page redirects the user to the appropriate server according to the definitions of the repository against which the user authenticated when accessing the application The notes page is located in the following location Whale Com e Gap von InternalSite ine Determines whether the application opens in a new window or not Applicable for Web Applications only Determines the type or types of computers on which the link is displayed PCs handheld devices or both Chapter 4 Application Settings Editing Application Properties Authorization Tab This tab is applicable in Portal trunks only for all application types You can use it to configure portal homepage authorization and personalization you can also use it to define local groups For details refer to Users Setup on page 32 Figure I7 Application Properties Authorization Tab Application Properties Citrix NFuse FR2 Direct TJ Client Settings Portal Link 2 Authorization gt IV All Users Are Authorized Users Groups View Deny Save As Local Group Help Cancel Duplicating an Application Duplicating an application enables you to quickly add a new application to the trunk based on the definitions of an existing application When you duplicate an application most of the definit
257. is displayed Select Certificate 21x Select the certificates you want to use symantec Root CA Symante lt All gt None C E class 3 Public Primary Certif Class 3 Secure E VeriSign C E class 2 Public Primary Certif Class 2 Secure E VeriSign c van Test ca Yan Test lt All gt None Z E Trusted Endpoint CA Trusted lt All gt None E class 3 Public Primary Certif Class 3 Secure E VeriSign ae gt pss E2 oom im gt ee 7 r OK Cancel View Certificate Select the certificate you wish to use and click 0K The Certificates in the CTL screen of the Certificate Trust List Wizard is displayed with the certificate you selected Chapter 5 Endpoint Security Certified Endpoints Certificate Trust List Wizard 9 Click Next gt The Name and Description screen of the Certificate Trust List Wizard is displayed Certificate Trust List Wizard New IIS CTL This CTL is to be used as the list of trusted roots For IIS virtual web sites 10 Enter a name and description for the new Certificate Trust List and click Next gt The Completing the Certificate Trust List Wizard screen of the Certificate Trust List Wizard with a summary of your settings is displayed Intelligent Application Gateway 139 User Guide 11 Click Finshl The Certificate Authority is added to the Certificate Trust List The configuration process is complete End
258. is required as described in Windows 2003 XP Support on page 210 To map a share to a local network drive 1 Using the Add Application Wizard from the Client Server and Legacy Applications drop down list add the applicable Local Drive Mapping application to the trunk Tip For details refer to Creating an SSL VPN Portal on page 28 2 Define mapping parameters in the step Server Settings For details click Help Once you add the application to the trunk and activate the configuration the share is accessible to remote users as soon as they log into the portal homepage The share is accessible either via Windows Explorer or as a link on the portal homepage depending on the configuration of the IAG Windows 2003 XP Support Local Drive Mapping is supported on endpoint computers that run Windows XP Windows 20038 and Windows 2000 operating systems However in order to enable Local Drive Mapping on Windows XP 2003 you must also add the application Local Drive Mapping Setup Windows XP 20038 to the site via the Add Application Wizard and run it once from the endpoint computer prior to launching the Local Drive Mapping application 210 Chapter 8 Providing Access to Internal File Systems Local Drive Mapping This setup disables SMB over TCP IP In order to enable Local Drive Mapping on Windows XP 2003 users are required to run the setup application only once at the end of which
259. is synchronized with that of the Application Monitor window Monitor an application or any number of selected applications over time Select the application or applications you wish to monitor and click A on the toolbar at the top of the window The Application Monitor Over Time window is displayed as described in Application Monitor Over Time on page 277 Figure 47 Sample Application Monitor Current Status Window Application Monitor Current Status lal Server time 03 14 2006 18 04 EAE Name M portal S V whale Portal Web Monitor whale Portal whale Portal Client m G FTP M outlook Vv al Telnet IV Whale Portal Web M Myweb M P3 owa 2003 sptisp2 lt I Type Web Monitor Whale Portal FTP Passive Mode Outlook CorporateWorkgroup Mode Telnet web Microsoft Outlook Web Access 2003 SP1 SP2 Group See Accesses I In 1o 19 19 276 Chapter 9 Monitoring and Control Web Monitor Table 30 Parameters of Application Monitor Current Status Window Parameter Name Type Group Accesses Description Application name as defined in the Configuration program in the General tab of the Application Properties dialog box and the icon representing the application Note Applications are listed under the trunk where they are configured Internal application type The group to which the applicat
260. istry settings select this option to apply the changes before activation Selecting this option will reload the configuration for all trunks I Apply changes made to external configuration settings Please press the lt Activate gt button to begin Cancel 2 Select the option Back up configuration after activation then click Activate gt The IAG configuration is activated and backed up Running the Backup Utility as a Console Application You can run the Backup utility as a Console application in a Command line Note an If you back up the configuration in a Command line you will only be able to restore it using a Command line and not via the Configuration interface To run the Backup utility as a Console application At the IAG open a Command line and type whlbackup exe b The IAG configuration is backed up Restoring the Configuration Once you back up the IAG configuration using the Backup utility you can use the Restore utility to restore the configuration settings into an installed IAG You can restore the configuration using one of the following methods From within the Configuration interface as described in Restoring the Configuration in the Configuration Program on page 306 By running a Console application in a Command line as described in Running the Restore Utility as a Console Application on page 306 Intelligent Application Gateway 305 User Guide EN Note
261. it the application s Legal Characters list to include the character that caused the error as reported in the message in the Reason field For details refer to the Intelligent Application Gateway Advanced Configuration guide to URL Inspection Tab Out Of The Box Security Configuration on page 147 lt If you wish to cancel out of the box security checks for this application take the following steps 1 Open the Application Properties dialog box and access the Web Settings tab 2 Uncheck the option Check Out Of The Box Rules For details refer to Web Settings Tab on page 73 Warning 49 Unknown Application Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window You are not authorized to access this application For assistance please contact your system administrator Cause Wrong configuration of the application in the Configuration program Resolution Take the following steps in the Configuration program 1 Use the Application Properties dialog box to locate the application according to the server configuration in the Web Servers tab 2 Verify the configuration of the server s addresses paths and ports for this application For details refer to Web Servers Tab on page 71 Intelligent Application Gateway 353 User Guide Warning 50 Method not Defined Symptoms A remote user requests a p
262. itor using Script mode in Configuration in the Advanced Policy Editor on page 106 The format of variables that can be used to create policies and expressions using the Advanced Policy Editor in Variable Formats on page 107 Chapter 5 Endpoint Security Endpoint Policies Advanced Configuration Overview An endpoint policy is made of one or more components A policy component can be A variable Variables are pre defined basic endpoint detection parameters You cannot edit variables For example the variable Anti Virus gt Symantec gt Norton gt Running checks whether the Norton anti virus is running on the endpoint computer Tip For a description of variable formats refer to Variable Formats on page 107 An expression Expressions are built from variables free VBScript text or a combination of both You can use built in expressions as is edit them or create your own expressions For example change the expression Corporate Machine from the default False to a condition that actually defines what a corporate machine is such as Network gt Domains gt NetBIOS Domain OurDomain Tip Use expressions to define multiple conditions once and apply them across several policies VBScript text Combine VBScript syntax free text with expressions and variables to parse and manipulate them in order to define a condition For example an expression that checks that the vir
263. ivate gt button to begin Cancel Click Activate gt N Note We recommend that you activate the option Back up configuration after activation so that the configuration settings are backed up For more details refer to Backup amp Restore Utility on page 303 Once the configuration is activated the following message is displayed IAG configuration activated successfully HTTP or HTTPS protocols that arrive at the port defined in the trunk will be transferred to and from the application server specified in the configuration In addition the Create New Trunk Wizard automatically creates an external website on the Internet Information Services IIS in the following location Whale Com e Gap Von Conf WebSites lt site_name gt Where lt site_name gt is the trunk name defined in the Setting the Trunk step in the Create New Trunk Wizard The website s root folder root is created under this folder Chapter 3 Single Application Sites Creating a Webmail or a Basic Trunk Where To Go From Here Once a trunk is created you can edit it in the Configuration program The items you can edit and configure are as follows Options that are described in this chapter include For HTTPS Connections trunks creating a Redirect trunk in order to redirect HTTP requests as described in Creating a Redirect Trunk on page 58 Editing general trunk parameters as described in Editing Trunks
264. ivate the Service Policy Manager configuration file The parameters you defined here are available for selection during trunk creation and configuration in the Configuration program When the Configuration program is started it reflects the parameters in the last activated Service Policy Manager configuration file If the Configuration program is already running once you activate the Service Policy Manager configuration file and return to the Configuration program the IAG prompts you to apply the new parameters Intelligent Application Gateway 53 User Guide Table 3 Pre configuration Trunk Parameters Parameter Available IP Addresses Available Port Numbers Default IP Address Default Port Numbers Description Create lists of these IP addresses External Website Application Server Tip If you want to restrict the list of IP addresses to those entered in the Service Policy Manager delete the wildcard value Create lists of these port numbers External Website HTTP and HTTPS Application Server Tip You can add a single port or a range of ports Select the IP addresses that will be displayed by default in the Configuration program Select the port numbers that will be displayed by default in the Configuration program Creating a Webmail or a Basic Trunk 54 You create a Webmail or a Basic trunk using the Create New Trunk Wizard in the Configuration program The trunk can be created unde
265. k activities when they detect that the application within which they run is on their block list When disabled in this manner the LSP and NSP modules do not enable access from this application to the corporate network CO Tip When access to an application in the corporate network is blocked because it is included in the block list users may still gain access to other application servers that reside on the local intranet or the Internet The LSP NSP modules contain two inherent application lists A block list containing applications that are known to be problematic Access to these applications from within the corporate network is always blocked regardless of the selected Socket Forwarding activation mode An allow list containing applications for which the LSP NSP will always be active regardless of the selected Socket Forwarding activation mode Blocking of additional applications depends on the Socket Forwarding activation mode defined during application configuration Basic in this mode none of applications that load the LSP NSP modules are enabled access to configured corporate resources unless the SSL Wrapper is running and at least one tunnel is open Windows services non interactive applications are not allowed access to configured corporate resources in this mode regardless of whether the SSL Wrapper is running or not Chapter 6 SSL Wrapper Technology Overview Extended this mode is identical to the Basic m
266. k to display the results of the last query submitted regardless of any changes you might have made in the query form Application Monitor Statistics Window Query Results View Query results are displayed in the Application Monitor Statistics window after you submit a query in the query form as described in Application Monitor Statistics Window Query Form on page 279 At the top of the window query details are displayed including period interval and query type as you defined in the query form If query results are available only for a part of the defined period this is also indicated under the Period field Query results are displayed in two views Aline chart displays the number of concurrent accesses to each of the applications in the query The color that represents each application on the chart is indicated in the legend to the left of the application name and icon The table at the bottom of the window displays information on each of the applications that were queried as described in Table 32 Application Monitor Statistics Window Query Results on page 282 e You can view the data that is displayed in the chart in a tabular format by clicking E Use the paging and zooming controls to focus the view on the period of time you wish to monitor 10 QOH oo CD Tip When you zoom out to the smallest view the window displays the entire period that is queried up to the pr
267. king x terminates the session the session is no longer displayed in the User Session List Tip Once you terminate a session the status of the session in the Session Monitor Active Sessions window changes to unauthenticated Authenticated x For details refer to Session Monitor Active Sessions on page 268 Note You cannot terminate the current session This window enables you to view and analyze both the history and the current status of the users of the IAG such as average session duration for each user or the currently active sessions Use the query form to submit a query as described in User Monitor Statistics Window Query Form on page 289 The User Monitor Statistics window then displays the query results as described in User Monitor Statistics Window Query Results View on page 290 Chapter 9 Monitoring and Control Web Monitor User Monitor Statistics Window Query Form When you first access the User Monitor Statistics window the query form is displayed Use this form to define the query Select the trunk for which to generate the query Define the period of time for which to generate the query Select a pre defined period such as Today or Last Month at the top of the Period area Or Define start and end dates at the bottom of the Period area Define the lead user or users for which to generate the query Note the followin
268. l Web Monitor Figure 45 Session Monitor Statistics Window Query Form Session Monitor Statistics Server time 03 14 2006 17 22 Trunks Period Week Month Quarter Year Today Last24Hours Yesterday Start date 03 14 2006 00 00 00 75 End date 037 4 2008 18 00 00 C Interval Hour v All portal 5 Query type t Sample Chart aA C Peak Chart Submit Reset o After you submit a query when you return to the query form from the query results view you can click to display the results of the last query submitted regardless of any changes you might have made in the query form Session Monitor Statistics Window Query Results Query results are displayed in the Session Monitor Statistics window after you submit a query in the query form as described in Session Monitor Statistics Window Query Form on page 272 At the top of the window query details are displayed including period interval and query type as you defined in the query form If query results are available only for a part of the defined period this is also indicated under the Period field Query results are displayed in two views Aline chart displays the number of concurrent sessions for each of the trunks in the query The color that represents each trunk on the chart is indicated in the legend to the left of the trunk name The table at the bottom of
269. l the identification of downloads by size for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Downloads area uncheck the option Identify by Size E Note If none of the options in the Downloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy If you wish to enable downloads from the application to the requesting endpoint edit the application s Download policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 338 Appendix A Troubleshooting Event Logging Messages Warning 35 Download Policy File Extension Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response failed since its extension renders it a download and the application s Download policy forbids downloads to the requesting endpoint Resolution In the Co
270. ld be enabled to them via the server Ifthe IP pool is a private pool and the Internet access level defined in the Access Control tab is split or none in order to enable access to the corporate network you must use the Additional Networks option to add the corporate network In this setup if you do not add the corporate network remote clients are granted access to other clients only and cannot access the corporate network For details refer to Additional Networks Tab on page 197 To define the IP pool 1 In the Pool Type area select the type of IP pool you wish to define If you select Private IP Addresses additional configuration is required as described in Using a Private Pool Additional Configuration on page 195 2 Inthe Address Pool area define the range or ranges of IP addresses that can be assigned to remote clients Note the following You can enter up to 10 ranges of IP addresses All the addresses you define here use the same subnet mask you cannot define both corporate IPs and private IPs The subnet for the IP ranges you defined in displayed in Pool Subnet Chapter 7 Network Connector Configuring the Network Connector Figure 31 Sample IP Provisioning Tab s Network Connector Server xj Network Segment 2 IP Provisioning Bl Access Control a Additional Networks a Advanced m Pool Type Private IP Addresses m Ad
271. lid application process is applicable for Portal trunks only It indicates that the executable that runs the application on the client and attempted to access the application server is not authorized to access this application In this case in the Configuration program in the Application Properties dialog box in the Client Settings tab verify the configuration of the option Bind Tunnel to Client Executable Client Executable and Signature For details refer to Client Settings Tab on page 86 Error 79 Connection to Web Application Failed Symptoms A remote user attempts to access an application from the portal homepage The request is denied and the following message is displayed in the browser window The page cannot be displayed Cause The IAG can not establish a connection with the application server The failure can be caused by one of the following Application server is not configured correctly in the Configuration program For example an invalid IP address port or path Application server is not running Application server is not reachable from the IAG The cause of the login failure is reported in the message in the Error field Resolution Verify the configuration of the application server in the Configuration program as follows e For Portal trunks in the Application Properties dialog box in the Web Servers tab For details refer to Web Servers Tab on page 71
272. like view from which all permitted file folders can be accessed This section describes How File Access works on page 212 How you enable remote access to the File Access application on page 212 Configuration of the File Access option in the Configuration program on page 220 Intelligent Application Gateway 211 User Guide How File Access Works The File Access application enables you to define the domains servers and shares which will be accessible to authorized remote users over the Internet The existing network resource definitions are used as the basis for the File Access definitions including Domains Servers Shares Individual user permissions After you define the enabled File Access resources remote users are able to view only the specific folders for which they already have access permissions within the organization These will invariably be a subset of the cross organization domains servers and shares defined for File Access However if the remote user has permission to access a certain domain server or share which was not defined as part of the File Access these locations will not be accessible regardless of such permission Enabling Remote Access to the File Access Application This section describes how you set up the IAG to enable remote access to the File Access application Windows Domain Settings on page 212 describes the steps you need to take in order to enable access
273. loses Once the trunk is activated the application is accessible to users according to the authorization permissions you defined in this procedure If you use the default portal homepage the portal is personalized according to each user s access permissions Selecting Users and Groups This section describes how you use the Select Users or Groups dialog box to select users and groups of users when you Define local groups as described in Local Groups on page 35 Define authorization for an application as described in Defining Authorization for Portal Applications on page 38 The dialog box is divided into two main areas The Repository Users and Groups area changes according to the type of item selected in the Look in drop down list If a users groups server is selected in the Look in drop down list all the users and groups in the selected repository are listed in the Repository Users and Groups area If Local Groups is selected in the Look in drop down list all the defined local groups are listed in the Repository Users and Groups area The Selected Users and Groups area lists the users and groups that you selected in the Repository Users and Groups area These are the users and groups that will be added to the local group or to the application s Authorization tab as applicable Intelligent Application Gateway 43 User Guide 44 Figure 2 Sample Sele
274. ly add the link to the page For details refer to the Intelligent Application Gateway Advanced Configuration guide to Using a Custom Portal Homepage on page 61 Optionally you can change the date format of files and folders as will be viewed on remote users browsers as described in Changing the Date Format of Files and Folders on page 234 You can also configure the File Access application so that users are not presented in the end user interface with a folder tree on the left pane This prevents users from browsing to any folders other than the one defined as the application URL or its subfolders For details refer to Hiding the Folder Tree in the End User Interface on page 234 Tip You can customize the language definitions of the end user pages as described in the Intelligent Application Gateway Advanced Configuration guide in Changing File Access Language Definitions on page 71 File Access Administration Settings You configure the File Access administration settings once for all the trunks where the File Access option is activated Administration settings include Configuring remote users access to their Home folder and to mapped drives and users view permissions to configured shares described in Configuring Home Directory Mapped Drives and Share Permissions on page 223 The settings that determine how you log on to Novell Directories in order to gain access to Novell Net
275. m is running on this computer Session Endpoint Policies When you create a trunk you assign it two session policies Session Access Policy defines access permissions to the site Only endpoints that comply with the selected policy are allowed access Intelligent Application Gateway 95 User Guide Privileged Endpoint Policy defines the conditions that render an endpoint a privileged endpoint which can enjoy session privileges For information about privileged session settings refer to the Intelligent Application Gateway Advanced Configuration guide to Default and Privileged Session Settings on page 137 You select those policies in the Endpoint Policies step of the Create New Trunk Wizard C j Step 7 Endpoint Policies Session Access Policy controls access to the trunk depending on endpoint policies a Default Session Access X Privileged Endpoint Policy defines a policy for endpoints that enjoy session privileges a Default Privileged Endpoint Edit Policies Her lt Back Cancel Note A The number of the step where you define endpoint policies for the session may vary depending on the type of trunk you are configuring Once the trunk is created you can change the selection of policies in the Session tab of the Advanced Trunk Configuration window in the Endpoint Policies area m Endpoint Policies Session Access Policy a Default Session Access
276. m gt must contain one each of the following elements lt Name gt described on page 255 lt Binary gt described on page 255 lt Message gt gt lt Params gt gt lt Param gt gt lt Name gt lt Name gt Description Child element of lt Param gt Defines the parameter name Usage One and only one lt Name gt element must be nested under lt Param gt Child Elements None lt Message gt gt lt Params gt gt lt Param gt gt lt Binary gt lt Binary gt Description Child element of lt Param gt Determines whether the parameter value is binary or not where 1 value is binary 0 value is non binary Intelligent Application Gateway 255 User Guide Usage One and only one lt Binary gt element must be nested under lt Param gt Child Elements None lt Message gt gt lt Reporters gt lt Reporters gt Description Defines the reporter or reporters to which the message is sent You can define any of the following reports builtin log IAG s built in reporter described in Configuring the Built In Reporter on page 242 radius accounting reporting to a RADIUS Accounting server as described in Configuring the RADIUS Reporter on page 243 Note A Only the messages that are configured by default to report to the RADIUS reporter can be sent to the RADIUS Accounting server No other messages can be sent to the RADIUS server regardle
277. me network as the IAG The Web Monitor application can be accessed via port 50002 on the IAG For example if the IP address of the IAG is 192 168 1 45 enter the following URL at the browser s Address bar http 192 168 1 45 50002 Remotely via the IAG SSL VPN portal To enable remote access via the portal at the Configuration program use the Add Application Wizard to add the Web Monitor application to the trunk the application is part of the Built In Services group Once you add the application to the trunk access the Authorization tab of the Application Properties dialog box and define the users that are authorized to access the application By default no users are authorized to access the application For details refer to Defining Authorization for Portal Applications on page 38 In order to enable access to the Web Monitor from computers other than the IAG you need to configure the user or users that are allowed to access it as described in Enabling Web Monitor Access from Computers Other Than the IAG on page 261 Chapter 9 Monitoring and Control Web Monitor Enabling Web Monitor Access from Computers Other Than the IAG E Note This section describes how you enable access to the Web Monitor application from computers other than the IAG this configuration procedure is required for users who access this application both locally from within the organization and remotely via the portal homepage In additio
278. med lt Server_Name gt Wh1lFilter default lt Time_Stamp gt log Resolve the original cookie name using the EncryptedName and OrigName parameters in the log file the encrypted name is indicated in the Description field of the event in the Event Viewer Still at the IAG in the Configuration program open the Application Properties dialog box for this application and access the Cookie Encryption tab In order to exclude the cookie from the cookie encryption process do one of the following Ifthe encryption mode is Include remove the cookie that was blocked from the Cookies list If the encryption mode is Exclude add the cookie that was blocked to the Cookies list For details refer to Cookie Encryption Tab on page 80 Intelligent Application Gateway 373 User Guide Warning 105 Restricted Zone Policy URL Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Restricted Zone policy the requested URL is not allowed Cause The request failed since this URL is defined as a restricted zone URL for this application type and the application s Restricted Zone policy forbids access to the zone from this endpoint Resolution In the Configuration program do one of the following In order for this URL not to be part of the restricted zone for this applicatio
279. menu bar 1 Inthe Configuration program on the Admin menu click Local Groups The Local Groups dialog box is displayed OK Cancel 2 Inthe Local Groups dialog box click Add The Name Local Group dialog box is displayed 3 Name the group then click OK The Add Local Group dialog box is displayed The name you assigned to the group is displayed in the title bar and in the left pane of the dialog box Intelligent Application Gateway 35 User Guide 36 4 Add Local Group AppGroup O M Local Group Add Local Group AppGroup O M amp AppGroup User Group Local Group Include E xclude Remove Help In the Add Local Group dialog box click Add The Select Users or Groups dialog box is displayed Select Users or Groups Look in H lt Select repository gt m m Repository Users and Groups Users Groups Search Ly Ee m Selected Users and Groups Add Users Groups Remove E Cancel Hep Use the Select Users or Groups dialog box to select the users and groups that will be included in the local group If other local groups are already defined they can also be selected as part of the current group For a description of how you use the Select Users or Groups dialog box refer to Selecting Users and Groups on page 43 Once you select the users and groups you wish to assign to the local group cl
280. message they receive if their computer does not comply with the policy and access is denied 6 Note Some of the default policies come with explanatory text which is tailored for the functionality of the policy If you change the policy make sure you also change the explanatory text so that it reflects the new or revised functionality When you finish editing the policy click to close the Advanced Policy Editor then click to close the Policies dialog box Variable Formats This section describes the format of the variables you can use when creating policies and expressions Table 17 Policy Variable Formats Variable Data Comments Type APP AS AV String Desktop Search Anti Spyware Anti PFW_ _Version_Product Virus Personal Firewall product version APP AS AV String Desktop Search Anti Spyware Anti PFW_ _Version _Engine Virus Personal Firewall engine version APP AS AV String Desktop Search Anti Spyware Anti PFW_ _ Version _Dat Virus Personal Firewall IDS definitions version Intelligent Application Gateway 107 User Guide Table I7 Policy Variable Formats Cont d Variable APP AS AV PFW_ _Version _Build APP AS AV PFW _ _LastUpdate Network_Domains_ System_Browser System_OS_ WinNTServicePackVersion System_WindowsLogged OnUser_UserName All other variables Endpoint Settings 108 Data Type String Double String String String String Boolean Comments Desktop
281. meter to the description of a successful login message define a parameter named UserName and include it in the message as follows User UserName logged in successfully Usage One and only one lt DynamicDesc gt element must be nested under lt Message gt Child Elements None lt Message gt gt lt Params gt lt Params gt Description Defines optional parameters that can be used as follows As part of the long description of the message in the lt DynamicDesc gt element For details see lt DynamicDesc gt on page 253 In the Web Monitor in the Event Query window to query events by trunk name and session ID For information on querying events in the Web Monitor refer to Event Query on page 295 E Note You cannot use custom parameters as query parameters in the Event Query Usage One and only one lt Params gt element can optionally be nested under lt Message gt 254 Chapter 9 Monitoring and Control Event Logging Child Elements lt Params gt can contain an unlimited number of lt Param gt elements described on page 255 lt Message gt gt lt Params gt gt lt Param gt lt Param gt Description Child element of lt Params gt Defines a single parameter For a description of parameter usage refer to lt Params gt on page 254 Usage An unlimited number of lt Param gt elements can be nested under lt Params gt Child Elements lt Para
282. meters Description Adds a link to this application on the Whale Portal default portal homepage supplied with the IAG and Whale toolbar Name of the application on the portal homepage and in the Whale toolbar Chapter 4 Application Settings Editing Application Properties Table 16 Portal Link Tab Parameters Cont d Parameter Folder Application URL Icon URL Short Description Description Description A folder or subfolder on the portal homepage via which users access the application Enables you to group a number of applications on the portal homepage together under one link For example you may want to create a folder called DriveMappings and to place all Local Drive Mapping applications under it Only the DriveMappings folder will be visible on the portal homepage In order to place a number of applications under one folder enter the same folder information for all the applications that will reside in the same folder Fora folder with no subfolders enter only the folder name For a subfolder use this format folder subfolder A subfolder B Note The name of the root folder in the folder structure is the name of the Whale Portal application as defined in the Portal Application Name field By default Whale Portal The folder structure is not retained in the Whale toolbar Internal entry link URL from the portal to the application Note The URL must be an
283. missions settings affect the Share level only they do not affect the way users view folders in a share To configure Home Directory mapped drives and share permissions 1 Access the File Access window as described in Accessing the File Access Window on page 222 2 In the left pane of the File Access window under General click Configuration The Configuration settings are displayed in the right pane Intelligent Application Gateway 223 User Guide E Secure File Access Administration Microsoft Internet Explorer k File Edt vew Favorites Toos Hep Googe SearchWeb go PaeFank hise blocked fEjauior E aloptins 2 Back gt amp A A Qsearch Favorites Ameda D 3 fj a Address fa http flocalhost 6001 WhaleFileSharingAdmin amp FileAccess Admin Egy Network Sharing xy HY E Domains ai m S s rcs Configuration Bascal ecm SQ General Home Directory Configuration Novell Dont Define Users Home Directories Use Domain Controller Settings for Home Directories Use the Following Template for Home Directories I User s Home Directory Will be Displayed Every Time File Access is Loaded Mapped Drives M Show Mapped Drives Script Engine Share Permissions I Show only the shares a user is permitted to access one LO T E tocel intranet 3 To configure access to the Home Directory select one of the following options Don t Define User s H
284. mit to the chart clicking 37 removes the display from the chart Application Monitor Current Status This window provides a view of all the applications that are enabled for access via the IAG in all trunks The parameters that are provided for each application are described in Table 30 Parameters of Application Monitor Current Status Window on page 277 You can select whether to display applications in a folder view or not by clicking La or at the top of the window respectively If no folders are defined the button is disabled Intelligent Application Gateway 275 User Guide By default the window refreshes the data every 15 seconds If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 You can also use the Application Monitor to View the status of an application or any number of selected applications Select the application or applications you wish to view and click HE on the toolbar at the top of the window A column chart is displayed showing the current status of the selected applications By default you can view the status of up to 15 applications If required you can change this value as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 The refresh rate of the window
285. mp Severity Time ID Type Category Trunk Description i Information 03 21 2006 16 49 48 2 User Removed from Session Session portal 6 User whalecom qa_admin A Source IP 192 168 2 51 was Click the ID removed from session 050D185C 70F5 4CD2 8828 number to view OBABASAF CFS trunk portal Secure 1 reason User H Request troubleshooting i Information 03 21 2006 16 49 48 61 Session Stopped Session portal 5 Session 050D185C 70F5 4CD2 H 8B28 0BASA9AF9CF5 was information for this speed hain A portal Secure 1 Source IP message Applicable 1921882 51 ss i Information 03 21 2006 16 45 48 61 Session Stopped Session portal S Session CCO2CCDD 7678 41E6 for Warning and A61B D50D98A8B8D8 was stopped in trunk Error messages portal Secure 1 Source IP 192 168 2 147 B aes eal 85 Web Monitor Logout Security NIA User whalecom ruti logged out of the Web Monitor A Warning 03 21 2006 16 14 User Login Failed Security portal 5 The following user failed to log into trunk portal secure 1 User whalecomirachel Source IP 192 168 2 147 Authentication Server whalecom Error Invalid Credentials Session CCO2CCDD 7678 41E6 A61B DS0D98A8B8D8 Warning 03 21 2006 16 42 13 14 User Login Failed Security portal S The following user failed to log into trunk portal secure 1 User whalecomirachel Source IP 499 16A 147 Authentication By default the wind
286. mponent installation in Interactive mode 1 Deploy the following folder including all files and subfolders Whale Com e Gap utils OfflineClientSetup Advise users to double click the file Setup exe located under this folder The Whale Client Components Installation wizard starts Users can follow the instructions on the screen to complete the wizard and install the components on their computer Prerequisites for Running the Whale Client Components Table 20 on page 159 lists the prerequisites on the endpoint computer for running the Whale Client Components once they are installed on the computer including Prerequisites for running the ActiveX components Attachment Wiper Endpoint Detection and SSL Wrapper components Prerequisites for running the Socket Forwarding component Prerequisites for running the Network Connector component both via the SSL Wrapper ActiveX component and via the SSL Wrapper Java applet There are no special prerequisites for running the Client Trace and Socket Forwarding Helper utilities Table 20 Prerequisites for Running the Client Component Prerequisite ActiveX Socket Network Network Components Forwarder Connectorvia Connector ActiveX SSL via Java SSL Wrapper Wrapper Operating system Windows 2000 Windows2000 Windows 2000 Windows 2000 or higher or higher or higher or higher Intelligent Application Gateway 159 User Guide Table 20 Prerequisites for Running the Client Compone
287. n Identify by Size in the Uploads area of the Download Upload tab Note If none of the options in the Uploads area are activated no uploads to the application are blocked regardless of the settings of the application s Upload policy If you wish to enable uploads from the requesting endpoint edit the application s Upload policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Intelligent Application Gateway 347 User Guide Warning 43 Upload Policy File Extension Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Upload policy the requested upload is not allowed Cause The request failed since its extension renders it an upload and the application s Upload policy forbids uploads from the submitting endpoint Resolution In the Configuration program do one of the following lt If for this application you wish requests with this extension to be considered regular requests and not uploads edit the application s uploads Extension List
288. n in order to enable remote access to the Web Monitor application via the portal homepage you must also configure authorization for this application as described in Defining Authorization for Portal Applications on page 38 The Web Monitor application is protected by the Windows Local Users and Groups management tool During the installation of the IAG a dedicated group is created in the Windows Local Users and Groups Manager on the IAG This group is used for authentication against the Web Monitor application The group s default settings are Group name Web Monitor Users One user is defined as a member of this group IAG Administrator By default this user is disabled In order to enable access by this user to the Web Monitor you need to enable the user s account and assign a password as described in the procedure that follows You can also use the Local Users and Groups Manager to add other users from other groups and other domains as members of the Web Monitor Users group who are allowed to access the application Note can In an IAG High Availability Array you must assign the same users to the Web Monitor Users group on all the IAG servers that are part of the Array For details refer to Web Monitor High Availability Support on page 298 To grant the IAG Administrator user access to the Web Monitor 1 In the Configuration program access the Local Users and Groups Manager Intelligent Application
289. n 10 days Jusing the same browser you used fo requestto become a Certified Endpoint Close Close the Certified Endpoint window Your computer is not yet certified You can continue to use the available portal options as before Within the period of time specified on the Certified Endpoint window you must use the same browser to check the status of your request as described in Checking the Certified Endpoint Request Status on page 144 Intelligent Application Gateway 143 User Guide Checking the Certified Endpoint Request Status The administrator needs to approve your request for Certified Endpoint status and issue a certificate accordingly You must periodically check the status of the request and install the certificate within the period of time specified in the Certified Endpoint window E Note If you do not install the certificate within the specified time period you must re initiate the request process To check whether the request for Certified Endpoint status has been approved 1 Access the portal and click the Certified Endpoint button or link One of the following is displayed in the Certified Endpoint window Message Do This Certificate Issued Proceed to Installing the Certificate and Logging In as a Certified Endpoint User on page 144 Certified Endpoint Check again within the period of time specified on Request in Progress the Certified Endpoint window described on page 144 using the same b
290. n IAG server that is removed from the Array 1 At the IAG server whose reports you wish to query access the location where the logs of the Built In reporter are saved The location is defined in the Built In tab of the Event Logging dialog box as described in Configuring the Built In Reporter on page 242 e By default the logs are saved in the following location Whale Com e Gap logs Events Log files are saved under this folder in the following format lt computer_name gt BuiltinLog default lt time_stamp gt For example On a computer named comp1 a log file that was created on November 24 2005 at 09 06 19 is named compl BuiltinLog default 24 11 05 09 06 19 log 2 Copy the relevant file or files to one of the IAG servers that are part of the Array placing them in the location where the logs of the Built In reporter are saved on that computer and rename the files so that lt computer_name gt is the name of the computer where you are placing the file For example If you are placing the file described in step 1 on a computer named comp2 rename the file as follows comp2 BuiltinLog default 24 11 05 09 06 19 log If such a file already exists change the time stamp as well You can now query the events logged in the file or files you copied on the IAG server where you copied the files in the Event Query SSL Event Monitoring You can set the Registry settings of the IAG so that SSL connec
291. n for the selected application For information about other relevant applications see the Intelligent Application Gateway Application Aware Settings guide Intelligent Application Gateway 69 User Guide Select prerequisit applications portal trunks only Select application Endpoint Policies Application Properties Webtop Documentum x E General web Servers Web Settings Ol Web Ser 4 gt er Prerequisite Applications Figure 8 Application Properties Sample General Tab Application Type is displayed in the title bar portal trunks only Application Name Webtop Application ID 87F596957EEA412D80665EFC2CCD28 F DOLS i Number of Prerequisite Applications 0 Inactivity Period ao Minutes m Endpoint Policies Access a Default Web Application Access Portal Link on Non Complying Clients Grayed Invisible Download a Default Web Application Download Upload a Default Web Application Upload Restricted Zone Default Session Access Edit Policies i Application Aware Settings Tip For Web and Browser Embedded Applications You can copy the application ID here portal trunks only Click to open the Policy Editor Additional application specific information is available when applicable The method by which the IAG identifies URLs in order to enforce the application s Upload and Download policies is defined in the Do
292. n settings click at the bottom of the File Access window Once you activate the configuration remote users are able to access the selected domains servers and shares through the File Access interface depending on their access permissions within the organization Configuring Authentication with the Novell Directory Service E Note This section is only relevant if the network includes Novell NetWare Services and you wish to enable remote access to NetWare Servers This section describes the steps you need to take in order to enable remote access to NetWare Servers including Configure a Novell Directory authentication server Assign the Novell Directory authentication server as one of the trunk s session authentication servers To enable remote access to NetWare Servers 1 2 In the Configuration program on the Admin menu click Authentication and User Group Servers The Authentication and User Group Servers dialog box is displayed x 9 WhaleFileSharing g9 whalecom Edit Remove In the Authentication and User Group Servers dialog box click Add The Add Server dialog box is displayed Intelligent Application Gateway 231 User Guide Add Server 3 From the Type drop down list select Novell Directory and define the server For details click Help 4 When you finish defining the sever click OK to close the Add Server dialog box In the A
293. n this option is activated once users enter a set of credentials that is valid for the application for example during the initial login they do not have to authenticate again against the application server If the authentication data is not received by the application server the session is deems unauthenticated and access is denied Select a server or number of servers that will be used for authentication against the application when users access the application Select this option if the application requires users to authenticate using HTTP 401 requests Select this option if the application requires users to authenticate using an HTML form Select this option if the application might require users to authenticate using both HTTP 401 requests and HTML forms The Form Authentication Engine handles HTML authentication forms For details refer to the Intelligent Application Gateway Advanced Configuration guide to Appendix C Form Authentication Engine To add a server to the list of authentication servers 1 Double click anywhere in the Select Authentication Servers list or click Add The Authentication and User Group Servers dialog box is displayed 2 For instructions on how to use the Authentication and User Group Servers dialog box click Help Chapter 4 Application Settings Editing Application Properties General Web Settings General web settings of the application are described in T
294. n type take the following steps 1 Open the Advanced Trunk Configuration window and access the Global URL Settings tab 2 Inthe Restricted Zone URLs list select the corresponding rule and do one of the following Click Edt and use the Edit Restricted Zone URLs dialog box to change the URL or the method as applicable Ifyou wish the URL not to be part of the restricted zone remove it from the Restricted Zone URLs list For details refer to the Intelligent Application Gateway Advanced Configuration guide to Restricted Zone URLs on page 158 If you wish to disable the Restricted Zone feature for this application take the following steps 1 Open the Application Properties dialog box and access the Web Settings tab 2 Uncheck the option Activate Restricted Zone Ifyou wish to enable access to the restricted zone from the submitting endpoint edit the application s Restricted Zone policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 374 Appendix A Troubleshooting Event Logging Messages Warning 106 Restricted Zone Policy Parameters Violation Symptoms A
295. ndpoint computer Note A o For information on the Whale Client Components refer to Whale Client Components on page 147 When the option Disable Component Installation and Activation in the Session tab of the Advanced Trunk Configuration window is activated the Endpoint Detection component is not installed or activated on endpoint computers The Endpoint Detection component verifies the identity of the IAG site against the site s server certificate and checks whether the site is on the user s Trusted Sites list only if the site is trusted will the component run on the endpoint computer and collect the data that identifies which security components are installed and running on the computer Tip For information on how the IAG site can be added to the user s Trusted Sites list refer to IAG Trusted Sites on page 160 If the Endpoint Detection component is not running on the endpoint computer compliance with policies is not detected For example on computers where the Whale Client Components are not enabled or when using a browser other than Internet Explorer When detection is not functional on an endpoint computer access may be denied even though it does comply with the requirements of the policy For example if an application s policy requires a running anti virus program and such a program is running on the computer access to the application is still denied since the IAG can not detect that the progra
296. ndpoint computer for the installation of the Whale Client Components including prerequisites for each of the available installation modes Table 18 Prerequisites for Installing the Whale Client Components Prerequisite Online Component Offline Installation Installer Installation Operating system S S S Windows 2000 or higher Browser S S Ek X Internet Explorer 6 0 or higher Browser enables download of S X X signed ActiveX objects Browser enables running of S X X signed ActiveX objects On Windows 2000 XP and S S S 2003 power user privileges For the Socket Forwarding component the endpoint computer must meet the Install Socket Forwarding Component Policy set in the Session tab in the Endpoint Policies area For details refer to Endpoint Policies on page 93 For the Network Connector component any browser supported by the IAG For a list of supported browsers see Supported Browsers on page 19 For the Socket Forwarding and Network Connector components Administrator privileges Intelligent Application Gateway 151 User Guide Online Whale Client Components Installation 152 E Note The Whale Client Components are only installed on the endpoint computer in online installation mode if component installation is enabled for the trunk that is the option Disable Component Installation and Activation is not selected in the Session tab of the Advanced Trunk Configuration window
297. nel double click Administrative Tools then double click Services 2 Select and right click the applicable service then select Start Warning 8 IAG Configuration Login Failed Symptoms When attempting to log in to the Configuration program the login fails and the following message is displayed Incorrect Password Cause Incorrect password used Intelligent Application Gateway 325 User Guide Resolution Log in using the correct password If you forgot the password you can assign a new password for the Configuration program as follows At the IAG access the Service Policy Manager In the Service Policy Manager on the Admin menu click Change Passwords 3 Inthe Change Password dialog box activate the option Use same password for all applications then enter the passphrase and the new password and click E Note The password must contain at least six digits Changing the password in this manner is global and affects the Service Policy Manager as well Warning II Concurrent Sessions Threshold Reached Symptoms None Cause This is a warning that the threshold of the number of sessions that can be open through the site at the same time was reached When the threshold is reached this message is logged whenever a new session is established until the number goes below the threshold again Once the maximal number of sessions that can be open through the site at the same time is reached
298. new sessions can no longer be established Resolution If this event occurs on a regular basis do one of the following Verify that the defined threshold is not too low Increase the number of sessions that can be open through the site and raise the threshold accordingly You define those settings at the IAG in the Configuration program as follows 1 Open the Advanced Trunk Configuration window of the relevant trunk and access the Session tab 2 Modify the required settings in the Concurrent Sessions Threshold and Max Concurrent Sessions fields respectively 326 Appendix A Troubleshooting Event Logging Messages Warning 12 Concurrent Unauthenticated Sessions Threshold Reached Symptoms None Cause This is a warning that the threshold of the number of unauthenticated sessions that can be open through the site at the same time was reached When the threshold is reached this message is logged whenever a new unauthenticated session is established until the number goes below the threshold again Once the maximal number of unauthenticated sessions that can be open through the site at the same time is reached additional unauthenticated sessions can not be established Resolution If this event occurs on a regular basis do one of the following Verify that the defined threshold is not too low Increase the number of unauthenticated sessions that can be open through the site and raise the thr
299. nfiguration program do one of the following lt If for this application you wish responses with this extension to be considered regular responses and not downloads edit the application s downloads Extension List as follows 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Downloads area edit the Extension List accordingly For details refer to Download Upload Tab on page 82 lt Ifyou wish to cancel the identification of downloads by extensions for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Downloads area uncheck the option Identify by Extensions E Note If none of the options in the Downloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy Ifyou wish to enable downloads from the application to the requesting endpoint edit the application s Download policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Intelligent Application Gateway 33
300. ng User Name and Password Username Password Close 3 Select one of the following options Using Windows User Name use the same credentials you used when you logged onto the File Access window as described in Accessing the File Access Window on page 222 Using the Following User Name and Password enter credentials with which to log on Tip Make sure the credentials you assign here enable you to view all the NetWare Servers to which you wish to configure access such as the credentials of a Novell administrator 4 Click Save then click Logon The system logs you on to the Novell NetWare Services When you configure Novell NetWare Servers the servers and shares that are enabled to the user you define here are displayed in the File Access window Chapter 8 Providing Access to Internal File Systems File Access 5 Goon to configure remote users access to domains servers and shares as described in the procedure that follows E Note In order to log on to a different tree enter the applicable credentials and click Logon Only one set of credentials can be saved in the Novell Logon window Any time after the initial configuration in order to modify the configuration of remote users access to the NetWare Servers you need to log on to the Novell NetWare Services using the Novell Logon window Configuring Access to Domains Servers and Shares This section describes how you
301. ngs Figure 22 on page 123 illustrates the following Steps that the administrator has to perform to enable the Certified Endpoint feature when using a remote CA Steps that the end user must perform in order to be recognized as a Certified Endpoint depicted in the shaded areas Chapter 5 Endpoint Security Certified Endpoints Figure 22 Sample Flow for Enabling Certified Endpoint Using a Remote CA LEGEND Performed by end user Install CA certificate to Certificate Store on IAG Enable Certified Endpoint in Configuration program Update CTL with new CA Back up certificate settings Install certificate as D directed by the administrator User s computer is a Certified Endpoint SSE Certified Endpoint Configuration Steps Depending on the way you set up the Certified Endpoint feature refer to Certified Endpoint Configuration Overview on page 118 the following procedures are available for configuring the Certified Endpoint feature Installing a Microsoft Certificate Authority Local CA Only on page 124 Defining a Certification Authority Policy Local CA Only on page 128 Editing the Default Configuration Local CA Only on page 131 Preparing Endpoint Computers that Use Internet Explorer Local CA Only on page 134 Adding Certified Endpoint Enrollment to the Trunk Local CA Only on page 135 Adding the C
302. nloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy Ifyou wish to enable downloads from the application to the requesting endpoint edit the application s Download policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Warning 41 Upload Policy URL Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Upload policy the requested upload is not allowed Cause The request failed since this URL is defined as an upload URL for this application type and the application s Upload policy forbids uploads from the submitting endpoint Tip The portion of the URL that caused the failure is indicated in the message in the URL parameter Intelligent Application Gateway 345 User Guide Resolution In the Configuration program do one of the following In order for this request not to be considered an upload for this application type take the following steps 1 Open the Advanced Trunk
303. nounced in Microsoft s Security Bulletin MS04 011 as ASN 1 Double Free Vulnerability CAN 2004 0123 Warning 22 Login On The Fly Failed Symptoms A remote user attempts to add authentication credentials on the fly for example in order to access an application that requires different credentials than those used to access the site The attempt fails and the following message is displayed in the browser window Failed to authenticate Cause The failure can be caused by e Wrong credentials entered by the remote user such as wrong user name or password the user selecting the wrong Directory authentication server in the login page and more Authentication server is not configured correctly in the Configuration program For example Invalid IP host value or invalid port Server access credentials are not strong enough Groups users search in the authentication server is defined inaccurately thus the IAG cannot find a unique instance of the user name Authentication server is not running Authentication server is not reachable from the IAG The cause of the login failure is reported in the message in the Error field 332 Appendix A Troubleshooting Event Logging Messages Resolution Depending on the type of error do one or more of the following Verify configuration of the authentication server on the IAG 1 Access the Configuration program and on the Admin menu click Aut
304. ns of an existing application as described in Duplicating an Application on page 91 7 Determine in what order you wish the applications to be displayed on the portal page as follows If you want the applications to be displayed in alphabetical order activate the option Sort alphabetically If you want to arrange the applications in any other order leave the Sort alphabetically option unchecked and use the up down arrows to arrange the order of the applications in the list They will be displayed on the portal page in the order by which they are arranged in the list of applications 30 Chapter 2 SSL VPN Portals Creating an SSL VPN Portal In the main window of the Configuration program click 0 to save and activate the configuration The following is displayed J Activate Configuration We recommend that you back up the configuration settings directly after the initial configuration Following the initial backup make sure to back up the configuration settings each time you modify them in order to ensure that the backup is updated at all times Back up configuration after activation If you have made manual changes to any of the external configuration settings such as changes to XML files or to Registry settings select this option to apply the changes before activation Selecting this option will reload the configuration for all trunks I Apply changes made to external configuration settings
305. ns that are described in this Guide include Editing any of the applications properties in the Application Properties dialog box as described in Editing Application Properties on page 67 Intelligent Application Gateway 49 User Guide 50 Tip For information on the Network Connector application see Chapter 7 Network Connector For information on the Local Drive Mapping and File Access applications see Chapter 8 Providing Access to Internal File Systems For HTTPS Connections trunks creating a Redirect trunk in order to redirect HTTP requests as described in Creating a Redirect Trunk on page 58 Editing general trunk parameters as described in Editing in the General Tab on page 61 Changing the event logging definitions as described in Event Logging on page 237 Enabling access to the Web Monitor as described in Enabling Web Monitor Access from Computers Other Than the IAG on page 261 Additional advanced options described in the Intelligent Application Gateway Advanced Configuration guide including Customizing the look and feel and other aspects of the HTML pages the user interacts with for example changing the company logo and the color scheme described in Chapter 3 Customizing Web Pages This chapter also describes how you can use your own custom portal homepage if you do not wish to use the default page supplied with the IAG
306. nsctestesosnustiesdsoussacandaictaaeitisonesauttaaneiogs 265 Session Monitor Current Status ssccsscnassnerssenassnovnssinscrevnteicsnnnsenswnscaneiteubtenstntienesscosiee 266 Session Mo itor Over TIME sccoasosedasessenvonssenevsasvavsdevesseasvasunevssuseonansbvsanavvnsnasssenteveansisvesev 267 Session Monitor Active SESSIONS 3 iiss unssasidsnenseessiordsnacessissonanseseresuniiondtonwncsnannansacsuoemnens 268 SESSION Details sic scsessessengedsesessdssasedeeasadoeevesieavntincbecnsevaeonegnesheonedbeontapeopssvsonsonbocdsodeedontsuacense 270 SESSION Monitor Statistics 2 5 snpoveasuih vans evn savsnce nsnwnvvoesmrasavencnsisndvesnseoesdseospiaatoranensanarts 271 Session Monitor Statistics Window Query Form esesseeseesesseseeerrerrersesseesesresesseeseeensenee 272 Session Monitor Statistics Window Query ReSUIts ccescssscsssssscseecseseseseeeseseeseeees 273 Application Monitor Current Status ca2eistonctecscivstecetsteuesassaiatiisescaia tei xatadatitystaaaieiiess 275 Application Monitor Over Time sesssissessssssverisssssosesiseesssrossssseotsreoses siris vensko tesiak oriris 277 Application Monitor Active Sessions esseseeeseeeeseeseseeseereesressessereeseeureesenserseeserseseess 278 Intelligent Application Gateway 11 User Guide Application Monitor Statistics cancciss sete crccsncencecoeshctessassuatesspevestesdeuvd cased lievaciwendenadeenins 279 Application Monitor Statistics Window Query Form sssseeseseesesesse
307. nseserseessesseseeseeeeeseenees 33 USE A GPOUP EIE E A E E E E E 33 LOCal Groups EE E E E E 35 Intelligent Application Gateway 5 User Guide Defining Authorization for Portal Applications sssssssscsscsssessccssesssesseessesseessesens 38 Selecting Users and GROUPS sess cncsnszcccecsnuceacneussssvemus oss seeadeucnstasaudupreseatnccouuncsuapavezacnte 43 Optional Configuration assesses eetere nenene eier sE eni E EE e aTe EEE E E E ia 46 Configuring Global Host Address Translation essssssesessesssessrssrseeseessessensensrneensensensesee 46 Configuring Application Subnets sesseseseeseeserssreseseeseeseresessrserserseeesessessenerseenreeseesesseees 48 Changing the Application Access Portal Port Number sscsscssscsssssssssessseessesseees 49 Where ToGo From Here csiseccssindssmansastncnen sara ener ae eaa E EE aR E R AE a 49 Chapter 3 Single Application Sites scccccsssssssssssscccssesssees 5l Optional Pre configuration of the Services e sesessseeseeseresessrseeseeseeseesseseenerseereessessereeeeeeeee 52 Creating a Webmail or a Basic TrunK eesessessssesrseesesseeseeserseeseeseeseeseeseeserueeseereeneeeseneeseeeeee 54 Where To Go From PGE iscccsscecassanessiencovetoncsutoseenassnieunetasuntsantasennacnntesweeandenvantdeemnanceaies 57 Creating a Redirect Tine svssctay sacsscuanssnateemessentvaceusseanemuncoassiteretuacestasudonndceaceuucouunccuaspauevecedl 58 Editing TrUNKS foes acstasstty sackets rE aeeie oE EE
308. nt Cont d Prerequisite Browser Browser enables running of signed ActiveX objects User privileges Windows DHCP Client service ActiveX Components Internet Explorer 6 0 or higher Required Any NA Socket Forwarder Internet Explorer 6 0 or higher Required Any kk NA Network Connector via ActiveX SSL Wrapper Internet Explorer 6 0 or higher Required Administrator Must be running Network Connector via Java SSL Wrapper Java SSL Wrapper supported browser NA Administrator Must be running The Java applet is supported on the browsers that are supported by the IAG as listed in Supported Browsers on page 19 Some applications might require Administrator privileges For details see Technology Overview on page 172 IAG Trusted Sites This section describes how to configure the end user s Trusted Sites list The list should contain each of the IAG sites the user needs to access so that the Whale Client Components can verify it is trusted 160 Tip For a description of when the Whale Client Components verify that the IAG site is trusted refer to Endpoint Detection on page 95 SSL Wrapper on page 171 An IAG site can be added to the user s Trusted Sites list on the endpoint in one of two ways Chapter 5 Endpoint Security Whale Client Components The domain administrator can remotely add the site or a number of sites
309. nt for details refer to Technology Overview on page 172 Socket Forwarding Helper utility used for support purposes Network Connector component for details refer to Chapter 7 Network Connector Since the Whale Client Components provide a wide range of options and features when a user first accesses the site the IAG detects whether it can install the components on the endpoint computer according to the prerequisites described in Prerequisites for Installing the Whale Client Components on page 151 On endpoint computers that meet those prerequisites the Whale Component Manager installs the Client Components as required On endpoint computers that do not meet these prerequisites such as computers running non Windows operating systems or an Internet Explorer browser where the download and launching of signed ActiveX objects is disabled the Client Components are not installed In cases where the SSL Wrapper ActiveX component is not installed on the computer when the user attempts to access a non web application the SSL Wrapper Java applet runs on the endpoint computer in order to enable access to the application The Java applet provides only SSL Wrapper functionality and does not enable any of the other features that are enabled by the Whale Client Components such as endpoint policies or the Attachment Wiper The descriptions in this section do not apply to the SSL Wrapper Java applet The applet
310. nternet Explorer browser and are logged in with power user or Administrator privileges It can also be used on browsers other than Internet Explorer by end users who are logged in with Administrator privileges to install the Network Connector component In this mode users can download an auto install file onto their computer using either an installer toolbar button or a link on the portal homepage They can then log out of the site and use this file to install the components in an offline mode In order to install the Whale Client Components in this mode the following steps have to be taken You need to configure the installer as described in Configuring the Whale Client Components Installer on page 154 End users need to install the components on their computer as described in Installing the Whale Client Components via the Installer on page 156 Configuring the Whale Client Components Installer In order for end users to be able to use the Whale Client Components Installer you need to add a link to the auto install file on the portal homepage 154 Chapter 5 Endpoint Security Whale Client Components Tf you use the Whale toolbar with the portal homepage enable the Whale Client Components Installer button and define which installation file is used For details refer to the Intelligent Application Gateway Advanced Configuration guide to Content Changes in the Default Portal Homepage on pag
311. ny Whale Communications Department Engineering City Tel Aviv State NA Country Region IL Submit gt Tip 2 For information about customizing the look and feel of the Certified Endpoint Enrollment pages refer to the Intelligent Application Gateway Advanced Configuration guide to Customizing Certified Endpoint Enrollment Pages on page 67 132 Chapter 5 Endpoint Security Certified Endpoints To edit the properties of the data fields in the User Information window 1 At the IAG access the following file Whale Com e Gap Von WhaleSEP inc info inc 2 Copy the file you accessed in step 1 to the following custom folder if the folder does not exist create it Whale Com e Gap Von WhaleSEP inc CustomUpdate If such a file already exists use the existing file The file contains the definitions of the User Information data fields In the file under the CcustomUpdate folder change the properties of the data fields as required For each field you can assign a status as follows FIELD_READONLY read only A read only field is displayed in the User Information window but users cannot edit its value FIELD_EDITABLE read write A read write field is displayed in the User Information window with a text box enabling users to enter a value FIELD_HIDDEN hides the field A hidden field is not displayed in the User Information window E Note The content of all fields except the edi
312. o a single application server Each trunk is created with a combination of the parameters you enter in the Create New Trunk Wizard and of default IAG parameters and settings Once you create a trunk you can use the Configuration program to edit the trunk You configure a Webmail or Basic trunk in the following stages You can optionally use the Service Policy Manager to pre configure the IAG HTTP Connections and HTTPS Connections services as described in Optional Pre configuration of the Services on page 52 In the Configuration program you use the Create New Trunk Wizard to create a trunk under either the HTTP Connections or the HTTPS Connections service as described in Creating a Webmail or a Basic Trunk on page 54 Options you can configure once the trunk is created are described in Where To Go From Here on page 57 Intelligent Application Gateway 51 User Guide Note EN The first time you access either the Configuration program or the Service Policy Manager you are required to create an encryption key and passphrase for the IAG The key and passphrase serve both IAG applications so that this action is only required once when you subsequently access either application you use the same passphrase Additional information is available as follows For an overview of the encryption mechanism see Encryption on page 21 For details on how to create the encryption keys and passphrase refer to the In
313. o a trunk at peak time or create charts that will present comparisons patterns and trends of system usage In the Current Status Active Sessions and Event Viewer windows you can instantly refresh the data by clicking A lead user is the user who accessed the site For example when a user logs in to the site using one set of credentials and is then required to enter different credentials when accessing a specific Intelligent Application Gateway 265 User Guide application the lead user is the user who logged in to the site In unauthenticated trunks the lead user is the first user added during the session with the site Auser name is always displayed using the following syntax lt domain_name gt lt user_name gt In tables you can specify a sort order by clicking the column heading by which you want to sort the data In line charts used in the Statistics and monitor over time windows you can highlight a line in the chart by clicking it in the legend For example clicking a trunk name highlights the chart line representing that trunk Some of the Web Monitor defaults such as refresh rates the display of graphics and the appearance of charts are customizable For details refer to the Intelligent Application Gateway Advanced Configuration guide to Customizing the Web Monitor Windows on page 72 Session Monitor Current Status 266 This window provides online display of all the sessions
314. o launch the Java applet attempts to make changes to the hosts file on the endpoint computer If changes cannot be made to the file the application is not launched However the relay that was opened for the application is left open Users are presented with a message showing the open relay so that they can manually run the application hosts disabled the Java applet does not have to make changes to the hosts file in order to run the application Chapter 6 SSL Wrapper Supported Applications Configuration Overview You enable any of the SSL Wrapper applications to remote users via a Portal trunk You can enable an unlimited number of applications via a single portal For operating instructions on how to create a Portal trunk and add applications refer to Creating an SSL VPN Portal on page 28 For out of the box applications where the Socket Forwarding component is required Socket Forwarding is enabled by default In order to enable the Socket Forwarding component for other applications once you add the application to the trunk select the required Socket Forwarding Mode in the Application Properties dialog box in the Client Settings tab For a description of the available activation modes refer to Socket Forwarding Activation Modes on page 174 For a description of the Client Settings tab refer to Client Settings Tab on page 86 If you do not use the default portal homepage supplied with the IAG yo
315. ocket Forwarding Component Policy For details refer to Endpoint Settings on page 108 Notify users prior to retrieving information from their computer and receive their consent for the retrieval of such information For details refer to What Information is Collected from the End User s Computer on page 97 What Information is Collected from the End User s Computer While working with the IAG site if endpoint detection is enabled on the end user s computer the following information is collected by the Endpoint Detection component Network domains DNS and NetBIOS User information user name and user type Certificates in My certificate store certificate issuer and certificate subject This includes all client certificates on the endpoint computer not only the IAG certificate Intelligent Application Gateway 97 User Guide If required for example in order to comply with legal or corporate guidelines you can configure the gateway so that users are notified before the information is retrieved from their computer and are prompted to give their consent for the site to collect such information On endpoints where users do not give their consent detection is not performed and the functionality of the Whale Client Components is disabled Tip For information on the Whale Client Components refer to Whale Client Components on page 147 To notify and prompt users before the retrieval of information
316. ode except that Windows services are enabled access to configured corporate resources VPN in this mode the LSP NSP modules are always active in all applications that is access is enabled to configured corporate resources except for the applications listed in the block list Basic mode will enable most applications to work via the IAG and is the recommended Socket Forwarding mode For some applications however Extended mode or VPN mode is required You select the Socket Forwarding activation mode for an application when you configure the application as described in Configuration Overview on page 183 Enabling Access to SSL Wrapper Applications In order for users to be able to access SSL Wrapper applications one of the following SSL Wrapper Client Components must run on their computer SSL Wrapper ActiveX component this is the recommended mode of operation The component is part of the Whale Client Components for a description of the installation and running of the components see Installing and Running the Components on Endpoint Computers on page 150 In addition some SSL Wrapper applications require users to be logged on with Administrator privileges in order to use the application in cases where changes to the hosts file or the Registry have to be made For details refer to Technology Overview on page 172 The SSL Wrapper ActiveX component is installed on the endpoint computer the first time a user at
317. ome Directories when this option is selected the Home Directory is not accessible to remote users The My Home Directory button and tree item are not displayed in the browser Use Domain Controller Settings for Home Directories the Home Directory is accessible to remote users through a My Home Directory button and tree item Home Directory path information is taken from the domain controller Use the Following Template for Home Directories the Home Directory is accessible to remote users through a My Home Directory button and tree item Home Directory path information is taken from the template you define in the text field You can define the path to the template using one of two methods Valid UNC path For example server share dirl dir2 Valid DFS path For example domain server share dir1 dir2 In either of those path types you can use one or both of the following variables sdomain and username For example Sdomain users username 224 Chapter 8 Providing Access to Internal File Systems File Access Determine whether the browser will display the listing of the Home Directory each time a remote users accesses File Access This is controlled by the option User s Home Directory Will be Displayed Every Time File Access is Loaded To configure access to mapped drives check the option Show Mapped Drives If the users logon script is not a batch file bat exe or not wrapped within a bat
318. omponent Manager settings on their computer to the default values in Restoring the Whale Client Components Defaults on page 165 How users can remove the components from their computer and how you can enforce the removal of the Socket Forwarding component from remote computers in Uninstalling the Whale Client Components on page 167 Intelligent Application Gateway 149 User Guide lt gt Tip Users can check whether the Whale Client Components are installed on their computer in the portal s System Information window Whale Client e https mportal microsoft com System Information 2 Microsoft Internet Explorer Whale Sj Communications System Information Whale Communications Intelligent Application Gateway Components hale Client Components Endpoint Detection SSL Wrapper SSL Wrapper Java Applet Socket Forwarder Network Connector Attachment Wiper TM Anti virus Personal Firewall Operating System Browser Version User Agent Sun JRE Version Domain Certified Endpoint Privileged Endpoint Whale Component Manager Y 3 7 0 12 Y 3 7 0 12 WY 3 7 0 12 N A LSP W 3 7 0 12 NSP W 3 7 0 12 Client W 3 7 0 12 Driver YW 3 7 0 12 Not Running Y 3 7 0 12 eTrust 7 1 Updated 12 5 2006 10 09 02 PM XPSP2 Version N A Windows XP Professional 5 01 2600 Service Pack 2 Internet Explorer 6 Mozilla 4 0 compatible MSIE 6 0 Windows NT 5 1 SV1 N
319. omputer and can allow or deny access accordingly You can use endpoint security policies to create tiers of access by determining whether or not endpoint computers are allowed to access internal sites and applications depending on their security settings For example You can set up your endpoint policies so that access to internal applications is allowed as follows e From corporate laptops all applications are allowed Intelligent Application Gateway 93 User Guide 94 e From home computers all web applications are allowed From an Internet kiosk only Webmail applications are allowed When you define an endpoint policy you determine which security components must be installed on the endpoint computer in order for it to comply with the policy Security components include options such as whether a compliant anti virus program or a personal firewall are installed on the computer whether the Attachment Wiper is launched on it and more You use endpoint policies to control Access to the site for both default and privileged sessions at the trunk level Access to each application that is accessible through the site and for web applications upload and download to and from the application and access to the application s restricted zone You can use the IAG s pre defined policies or define as many additional policies as you wish E Note Endpoint compliancy with all the policies including application policies
320. on Enable Domino iNotes Enables offline access to Domino iNotes Multi Servers iNotes DOLS Servers Hostnames or IP addresses of the DOLS servers We recommend that you use hostnames Note If you use a hostname to define an application use the effective hostname as defined in the DNS Port Port of the DOLS servers Launch Automatically Automatically launches the SSL Wrapper to enable the on Start operation of the Lotus iNotes Sync Manager on the computer For details refer to Chapter 6 SSL Wrapper 66 Chapter 3 Single Application Sites Editing Webmail Trunk Server Settings Chapter 4 Application Settings The settings of an application depend on the following Application type The Application Aware approach of the Intelligent Application Gateway IAG provides application specific out of the box optimization for the supported applications including features such as URL Inspection rulesets and character definitions deleting application specific folders and cookies and more Application properties You select some of the application properties while configuring the application for access via the SSL VPN portal or while creating a Webmail or Basic trunk whereas others are automatically applied by the IAG You can change application properties for each of your applications individually via the Application Properties dialog box This chapter describes how you can later edit the application properties as descr
321. on the process by which authenticated users are given access to the portal applications Personalization the process by which different users view different application links on the same portal homepage depending on their authorization permissions E Note Personalization only works when you use the default portal homepage supplied with the IAG However even if you are using a custom portal homepage authorization works enabling users to access only those applications for which they have access permissions When you add an application to a Portal trunk using the Add Application Wizard the option All Users Are Authorized in the Application Setup step is enabled by default You can disable this option while adding the application to the trunk or at any time after the initial application configuration in the Application Properties dialog box in the Authorization tab If you disable the All Users Are Authorized option for an application you must configure authorization in order to enable access to the application through the portal Using authorization you can grant access permissions to an application to selected users and user groups while blocking access from users that should not be accessing the application In order to configure authorization you take the following steps Define the users and groups of users to which you can grant authorization permissions as described in Defining Authorization Repo
322. on page 310 Warning Edit only the individual and general trace sections of the configuration file Do not make changes to any other sections of the file The manner in which the changes you make to the trace configuration file are activated is described in Trace Activation on page 311 Intelligent Application Gateway 307 User Guide Individual Trace Sections In order to create a trace you configure a Trace section in the trace ini configuration file Each individual trace section can hold one or more of the parameters described in the following table depending on the trace level and individual trace parameters Table 38 trace ini file Individual Trace Parameters Parameter Description Trace Defines the elements that will be traced Traces can be defined at different levels of granularity including processes instances reporters and classes The parameters you need to define will be provided by technical support trace level Determines whether the trace is active as well as the trace s log level The level none indicates that the trace is not active Any level other than none indicates that the trace is active and determines the log level Available log levels are light medium heavy and xheavy refresh Refresh period of the trace in seconds After each refresh period the process checks for changes in the configuration file If anew trace was added or an inactive trace activated for this proc
323. onents Whale Component Manager W 3 7 0 12 Endpoint Detection v 3 7 0 12 SSL Wrapper W 357 0 12 SSL Wrapper Java Applet N A Socket Forwarder LSP W 3 7 0 12 NSP W 3 7 0 12 Network Connector Client W 3 7 0 12 Driver W 3 7 0 12 Not Running Attachment Wiper T WV 3 7 0 12 Anti virus eTrust 7 1 Updated 12 5 2006 10 09 02 PM Personal Firewall XPSP2 Version N A Operating System Windows XP Professional 5 01 2600 Service Pack 2 Browser Version Internet Explorer 6 User Agent Mozilla 4 0 compatible MSIE 6 0 Windows NT 5 1 SV1 NET CLR 2 0 50727 NET CLR 1 1 4322 Sun JRE Version N A Domain WHALECOM Certified Endpoint x Privileged Endpoint x This site is protected by the Whale Communications Intelligent Application Gateway To refresh this page please log out then log in again Done B internet By uninstalling the Whale Client Components from their computers as described in Uninstalling the Whale Client Components on page 167 Restoring the Whale Client Components defaults enables users to receive the following notifications even in cases where the user previously selected the option Don t show me this message again when the message was displayed Once the defaults are restored whenever applicable the user receives notifications that are displayed when Intelligent Application Gateway 165 User Guide It is necessary to add the site to the user s Trus
324. only and be sure to re enable it as soon as you finish troubleshooting the system To disable event logging and reporting At the IAG run the following command Whale Com e Gap utils MonitorMgr MonitorMgrUtil exe sms 0 Events are no longer logged to the Event Logging mechanism and event messages are not sent to any of the configured reporters To re enable event logging and reporting At the IAG run the following command Whale Com e Gap utils MonitorMgr MonitorMgrUtil exe sms 1 Events are logged to the Event Logging mechanism and event messages are sent to the configured reporters Web Monitor 258 The Web Monitor is a monitoring and reporting web application that enables you to view IAG related events both from within the organization and from remote locations using a web browser Access from remote locations is fully secured by the IAG Application Aware security mechanisms such as URL Inspection positive logic rulesets out of the box character definitions policy compliance and session timeouts In sites where an IAG High Availability Array is deployed you can monitor each of the IAG servers within the array from a single Web Monitor A constantly updating snapshot of system administrative and remote user activities can be used to assist users online and troubleshoot any problems they may encounter while accessing the internal network via the IAG You can zoom into a user s session in real time and pinpoin
325. ons File on page 250 In order to send a custom event message or in order to send event messages from custom interfaces you need to configure the page from where you wish to send the message For details refer to Event Messages Application Interface on page 257 Configuring Event Messages in the Message Definitions File This procedure describes how you configure the message definitions file which holds the definitions of all event messages To configure messages in the message definitions file 1 Access the following CustomUpdate folder if it does not exist create it Whale Com e Gap von conf CustomUpdate Copy the file MessageDefinition xml from this folder Whale Com e Gap von conf Place it in the CustomUpdate folder you accessed in step 1 If such a file already exists in the custom folder use the existing file In the MessageDefinition xml file change the existing messages or configure additional messages as required For a description of this file refer to Event Logging Message Definitions File on page 250 Note A If you add new messages to the file or if you wish to send messages from custom scripts you also need to configure the functions that will send the messages as described in Event Messages Application Interface on page 257 Intelligent Application Gateway 249 User Guide 4 When you finish editing the file still at the IAG access the Configuration program Click P
326. or Statistics Window Query Results Parameter Description Trunk Trunk name Concurrent Sessions Minimal and maximal number of sessions that were concurrently open through the trunk during the query period 274 Chapter 9 Monitoring and Control Web Monitor Table 29 Session Monitor Statistics Window Query Results Cont d Parameter Duration Concurrent Sessions Settings View Description The average and maximal duration of the sessions that were open through the trunk during the query period Note If the number of results exceeds the number of Max Report Results as defined in the Configuration program in the General tab of the Event Logging dialog box described in Configuring General Settings on page 240 Duration is not reported Settings that are defined for the trunk in the Configuration program in the Session tab of the Advanced Trunk Configuration window Threshold the threshold above which each new session that opens generates a report as defined in the Concurrent Sessions Threshold field of the Session tab Limit maximal number of sessions that can be open through the trunk at the same time as defined in the Max Concurrent Sessions field of the Session tab For details refer to the Intelligent Application Gateway Advanced Configuration guide to Session Configuration on page 133 Clicking Al adds the display of concurrent sessions threshold and li
327. or technology that is part of the Intelligent Application Gateway IAG enables you to install run and manage remote connections as if they were part of the corporate network supporting full connectivity over a virtual and secure transparent connection During a Network Connector session remote endpoint computers are part of the corporate network Depending on the Network Connector server configuration they are able to Communicate with all the computers in the network that is access and be accessed by all other network computers Access corporate servers and complex systems such as mail SMB FTP databases and VoIP applications Communicate with other remote Network Connector endpoint computers For example the system administrator can connect to endpoint computers in order to install software updates configure existing applications or help users troubleshoot their systems This chapter describes the following Network Connector Technology Highlights on page 189 Configuring the Network Connector on page 190 Remote User Interaction with the Network Connector on page 200 Network Connector Troubleshooting on page 203 Network Connector Technology Highlights The Network Connector implements a client server architecture and is integrated into the IAG s secure SSL tunnel It supports all types of IP based unicast traffic in any direction client to server server to client and cli
328. ort you define here must be identical to the port number of the Network Connector application If you change the default port defined here 6003 take the following steps in the Configuration program When you add the Network Connector application to the trunk change the port number in the Add Application Wizard in the Server Settings step accordingly If the Network Connector application is already configured in the trunk change the port number in the Application Properties dialog box in the Server Settings tab The Log and Server Resources areas are used for troubleshooting the Network Connector server For details refer to Troubleshooting the Network Connector Server on page 203 Intelligent Application Gateway 199 User Guide E Note Be sure to read the information provided in the server troubleshooting section before you change any of the settings in the Log and Server Resources areas Figure 34 Sample Advanced Tab z Network Connector Server x Network Segment 2 iP Provisioning amp Access Control i Additional Networks i Advanced m Listener Type w Port e003 r Log Log Level fi Log Path Server Executable Path C Altemative Path Full Name gt Server Resources Number of Threads fi per CPU Device Timeout 20000 Miliseconds Tunnel Buffer Size jes KB Service Timeout 20000 Milliseconds Device Buffer Size p KB Res
329. ose the Select Users or Groups dialog box The selected users and groups are added in the Add Local Group dialog box Chapter 2 SSL VPN Portals Users Setup Add Local Group SW_R amp D x E SW_R amp D User Group Local Group _Include Exclude i AppGroup AppGroup Include Chri Include _ Remove H Include Help Include Include Include Include a AD ga_admin Include j Tip If the local group you created includes other local groups the nested local groups are displayed in the left pane of the Add Local Group dialog box Add Local Group SW_R amp D AppGroup local group is nested under SW_R amp D 4 E A SW PAD AppGroup User Group Local Group AppGroup amp AD ChrisC 7 If required use the Include Exclude column to refine the definition By default when you add a user or group to the local group their status is Include double clicking an entry in the Include Exclude column toggles the status of the user or group For example if you wish to include most of the users of an Active Directory user group server in the local group but exclude three individual users from that group take the following steps a Use the Select Users or Groups dialog box to select from the Active Directory repository both the Authenticated Users group and the three users you wish to exclude from the local group b Use the Add Loc
330. out of contract negligence misrepresentation strict liability in tort or warranty of any kind shall not exceed the consideration paid to the Company for the product The Company shall under no circumstances be liable for damages arising out of any claim including but not limited to a claim for personal injury or property damage made by any third person or party Document Name Intelligent Application Gateway User Guide Document Revision 3 7 Date December 2006 Software Version No 3 7 Contents Chapter l s INCFOCUCTION cccccccsccccccccces eceocee eoeceseeee ecoeeceeeeee eeeeeceeseeee l 5 OTE E E E E E E E E E E ness 15 Control ACCESS sesssucsssuc ncevnsneensennnsinconsiencnowediawinsstausse EENE ETE EEEE ra Te AN ia saree 15 Protect ASSetS cpissecncsaicaiouwasosntsensndduasniensadacnvaateasnnsdunetesuseunnneuatnianents reusea de sieis reviure 16 Safeg ard INfOrMAtION acecatehcancatabecaaaetcenasecseencannsanstconneanrsucanusesstessnpenensecienanancaseranbsceecs 16 Intelligent Application Gateway Architecture sessssessesesersereseserssesersrereessessesseseeneeesenseseeses 16 Broad Set of Connectivity Options ssseesseseseeseeseessrssrserserseessessessrnersenseessesseseeneeeeeseenees 17 Integrated Application Firewall essssseesesseseseeseeseessessrseeseeseeesessrssessrseerreesesseserseeeeeseesees 18 Application AwareT sosise rosrerssisirsisereieneee iesire a o EEE EE sE Riean 18 Supported Applications ccssacdccesscedetc
331. ow after you submit a query in the query form as described in User Monitor Statistics Window Query Form on page 289 At the top of the window query details are displayed including the query period lead user or users and trunk or trunks as you defined in the query form If query results are available only for a part of the defined period this is also indicated under the Period field Query results are displayed in a table The information that is provided for each user is described in Table 35 User Monitor Statistics Window Query Results on page 291 The number of results that can be displayed in the window is determined in the Configuration program in the General tab of the Event Logging dialog box in Max Report Results described in Configuring General Settings on page 240 If the number of results exceeds the number of Max Report Results no results are displayed Figure 57 User Monitor Statistics Window Query Results View User Monitor Statistics Server time 03 21 2006 16 38 Query Details Period 03 21 2006 00 00 00 03 21 2006 16 35 00 Lead User w Trunk portal 5 Show query form EHIEH Ej Lead User Average Session Duration Total Session Duration Accesses whalecomamirm 01 02 14 01 02 14 a whalecomieddien 00 41 50 02 05 30 3 whalecom ezy 01 02 05 02 04 11 2 whalecomiqa_admin 00 55 17 02 45 53 3 E whalecomirachel 00 47 00 03 55 00 5 Applic
332. ow refreshes the data every 15 seconds If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 The number of events that are displayed each time you open the Event Viewer window and the maximal number of events that are added to the event list between refreshes is determined in the Configuration program in the General tab of the Event Logging dialog box in Queue Size For details refer to Configuring General Settings on page 240 To view all events in the left pane of the Web Monitor window from the Event Viewer group click Al e To view only the events that are related to a single category system security session or application click the corresponding link from the Event Viewer group For example to display only session related events click Session Intelligent Application Gateway 293 User Guide 294 Parameter Severity Time Type Category Figure 60 Selecting Which Events to View Click to view all the events Click to view a single category Security amp all 43 System E Session Application Table 37 Event Parameters Description Event severity can be one of the following Information informative message denoting a normal event that might be of interest such as user login or log out Notice normal b
333. perties dialog box For details refer to Application Endpoint Policies on page 99 Warning 40 Download Policy URL Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response failed since this URL is defined as a download URL for this application type and the application s Download policy forbids downloads to the requesting endpoint Resolution In the Configuration program do one of the following In order for this request not to be considered a download for this application type take the following steps 1 Open the Advanced Trunk Configuration window and access the Global URL Settings tab 344 Appendix A Troubleshooting Event Logging Messages 2 Inthe URL Settings area click next to Download URLs 3 Inthe Download URLs Settings dialog box remove the corresponding rule For details refer to the Intelligent Application Gateway Advanced Configuration guide to Download URLs on page 153 If you wish to cancel the identification of downloads by URLs for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Downloads area uncheck the option Identify by URLs N Note If none of the options in the Dow
334. pplication and access the Cookie Encryption tab 2 Remove the cookie that was blocked from the Cookies list The name of the cookie is provided in the Description field of the event in the Web Monitor s Event Viewer For details refer to Cookie Encryption Tab on page 80 Intelligent Application Gateway 371 User Guide Warning 100 Encrypted Cookie Name Symptoms A remote user requests a page The request is processed and the user experience is unaffected Cause A cookie encryption violation was detected The cookie name is encrypted but is not listed in the cookie encryption include list Resolution In order to enable the browser to send this cookie in an encrypted from you need to add it to the list of cookies that are included in the cookie encryption process as follows 1 3 Use the IAG s trace mechanism to resolve the original name of the encrypted cookie a At the IAG access the trace configuration file b c d Whale Com e Gap Common Conf trace ini Add the following lines to the file Trace WhlFilter WHLFILTSECUREREMOTE xheavy Save the file Use a browser to request the URL that caused the Warning message as detailed in the Description field of the event in the Event Viewer At the IAG access the trace log file in the following location Whale Com e Gap logs The file is named lt Server_Name gt Wh1Filter default lt Time_Stamp gt log Resolve the
335. pplications Telnet http proxy sametime Disconnect Show Relay Homepage Active Connections E http talentula il whale biz 80 amp 192 168 1 7 23 via Simple Relay amp 192 168 1 7 23 via Simple Relay Intelligent Application Gateway 185 User Guide E Note Closing the window disconnects all the applications that are tunneled through the SSL Wrapper Java applet The Portal Activity window is divided into two main areas Connections Area described on page 186 Applications Area described on page 187 The Portal Activity window buttons are described on page 188 Connections Area 186 The Connections area of the Portal Activity window displays Active channel or channels between the client and the trunk or trunks to which the client is connected one channel per portal or trunk Under each channel the connection or connections that are currently open through the channel Figure 26 Sample Portal Activity Window Connections Area Portal Activity x https www portal com Active Connections Disconnect amp 192 168 1 186 1494 via SOCKS start 8 192 168 1 189 23 via relay started 07 Home Page B amp https www shai com 8 192 168 1 186 1494 via SOCKS start g 192 168 1 186 1494 via SOCKS start f Channel Connections When you hover over a connection you can see the following details regarding the connection Address IP address and port number
336. r either of the services HTTP or HTTPS Tip D You can pre configure lists of IP addresses and port numbers that you will be able to assign to the services when creating and editing trunks as described in Optional Pre configuration of the Services on page 52 Ifyou create an HTTPS trunk you can later add a Redirect trunk to automatically direct HTTP requests to that trunk as described in Creating a Redirect Trunk on page 58 e The Create New Trunk Wizard is also used to create Portal trunks For a description of Portal trunks refer to Chapter 2 SSLVPN Portals Chapter 3 Single Application Sites Creating a Webmail or a Basic Trunk To create a Webmail or a Basic trunk 1 At the IAG in the Windows desktop click Start and then point to Programs gt Whale Communications IAG gt Configuration 2 Inthe List pane select and right click HTTP Connections or HTTPS Connections and then select New Trunk The Create New Trunk Wizard is displayed 3 Depending on the type of trunk you are creating select Webmail Trunk or Basic Trunk Follow the instructions on the screen to complete the wizard for details click 9 Help Note A When creating Webmail trunks we recommend that you use the HTTPS Connections service 4 When you complete the wizard click Finish The Create New Trunk Wizard closes The trunk you created now appears in the List pane and the Configuration pane displays the trunk
337. r which controls the centralized logging and tracing mechanisms serves two purposes Tracing the error server can trace the activities of each process that is defined to report to it and create a trace log file which can be used for debugging purposes When required and depending on the aspects of the IAG you need to examine technical support will instruct you to run a trace including details of the processes you need to include in it The manner in which you define traces is described in Error Server and Trace Configuration File on page 307 The trace log file is described in Error Server Trace and Log Files on page 311 Error logging the error server receives error reports from the processes that are connected to it and logs them as well as its own errors in error logs The log files are described in Error Server Trace and Log Files on page 311 Error Server and Trace Configuration File The behavior of the trace mechanism and of the error and trace log files are controlled by the configuration file trace ini located under Whale Com e Gap Common Conf This file contains the following configurable parameters of the error server mechanism which can be edited as required Individual traces that the error server logs as described in Individual Trace Sections on page 308 General trace and error log file parameters as described in General Trace Configuration Section
338. r application either via the portal homepage or by logging into a site that automatically launches the application The request is denied and the following message is displayed Access to the requested resource denied Cause The requested server is not defined as an application in the Configuration program or the client executable is not authorized to access the server Resolution The resolution depends on the error that is displayed in the long description of the message in the Error field The message Access denied unknown server indicates that the user requested a server that is not defined as an application server in the Configuration program In this case do one of the following In the Configuration program verify the configuration of the application servers in the Application Properties dialog box in the Server Settings tab For details refer to Server Settings Tab on page 85 For Portal trunks in the Application Properties dialog box in the Server Settings tab For Webmail trunks in the Advanced Trunk Configuration window in the Server Settings tab Ifthe user attempted to connect to the application by manually entering the server address verify that the user tried to connect to the correct server On the endpoint computer verify the configuration of the server settings in the client application Intelligent Application Gateway 363 User Guide The message Inva
339. r does not exist create it Chapter 5 Endpoint Security Certified Endpoints Whale Com e Gap Von WhaleSEP inc CustomUpdate If such a file already exists use the existing file In the file under the CustomUpdate folder locate the line nAutoModeDelayInMinutes 0 Replace the value 0 with the required delay interval value Save the file The default policy is set to Automatic with Delay E Note If at a later time you change the policy to either Automatic or Manual you need to manually reset the value of nAutoModeDelayInMinutes back to 0 nAutoModeDelayInMinutes 0 Editing the Default Configuration Local CA Only The following Certified Endpoint configuration settings may be modified after installing the Microsoft CA Pending timeout interval for Manual certification policy This setting defines the interval between the time users request a certificate and the time they can receive it After the specified interval the end user can no longer request the pending certificate and must begin the certificate request process again The default pending timeout interval is 10 days To change this value refer to Setting Pending Timeout for Manual Certification Policy on page 131 The fields that are displayed to users requesting certificates in the Certified Endpoint Certificate User Information window as described in Customizing User Information Properties on page 132 Setting Pending Timeout for Manual
340. r each server Note If you define an address using a hostname use the effective hostname as defined in the DNS Define multiple addresses using a subnet by entering subnet address and subnet mask in the respective fields Define multiple addresses using the Regex regular expression syntax by entering a regular expression that defines the address range in the Addresses field For example 0O 9A Z whale com Define one or more paths on which the application resides by double clicking an empty line and entering a path Note A path must start with a slash HTTP and HTTPS port or ports Note Enter Auto to use the default port Enter A11 to enable all ports Leave the field empty to block all ports Multiple port entries are comma separated 81 82 85 86 Define a range of ports with a dash 81 86 Include the default port number 80 or 443 in the host header Activate this option only if it is required by the server Chapter 4 Application Settings Editing Application Properties Web Settings Tab This tab is applicable in Portal trunks for Built In Services Web Applications and Browser Embedded Applications and in Webmail and Basic trunks It contains the application s web settings as follows Application authentication described in Application Authentication on page 74 General web settings of the application are described in General Web Settings on page 75 User authorizat
341. r is logged out you can configure a scheduled cleanup whereby the Attachment Wiper utility automatically triggers a cleanup after the timeout period you configure You can configure the scheduled cleanup to be triggered by any of the pages that users access while browsing the applications enabled through the trunk If you configure a cleanup trigger in more than one page the timeout defined in the page that was last accessed sets the trigger For example if you configure a 900 second timeout in one of your pages once a user receives the page the timeout is set to 900 seconds However if you also configure a 300 second timeout in another page once a user accesses it the timeout is set to 300 seconds regardless of the time that elapsed since the user accessed the previous page In this example 300 seconds after the user accesses the second page the Attachment Wiper utility triggers the cleanup AN Caution Do not edit the pages that are supplied with the IAG Configure the cleanup in your own pages such as the application pages To configure a scheduled cleanup 1 In the page from where you wish to trigger the cleanup add the following line For Portal trunks lt script language JavaScript src http localhost 6001 InternalSite scripts CacheClean js gt lt script gt For Webmail and Basic trunks lt script language JavaScript src InternalSite scripts CacheClean js gt lt script gt 2 S
342. race level gt refresh lt refresh time in seconds gt max_size lt max trace file size in bytes gt report_errors lt yes no gt Trace refresh lt refresh time in seconds gt max_size lt max trace file size in bytes gt report_errors lt yes no gt Sample Individual Trace The following example shows a trace that is configured for the Whale Manager Service process with an extra heavy trace level and a refresh rate of two seconds The maximum file size is 10 MB and the trace is configured to log error reports in the error log Trace whlegapd xheavy refresh 2 max_size 10000000 report_errors yes Intelligent Application Gateway 309 User Guide General Trace Configuration Section The general configuration section Trace at the end of the trace ini configuration file holds general parameters that apply to all the configured individual traces unless these trace parameters are configured in the individual trace sections Some of the parameters also apply to the error log files The general parameters are described in the following table Table 39 trace ini file General Configuration Parameters Parameter refresh max_size high_water low_water instances_kept report_errors Description Affected Files Refresh period in seconds trace ini After each refresh period the process checks for changes in the configuration file If any new traces relevant to this process were added or ac
343. re related to the Web Monitor are described in Configuring General Settings on page 240 Configuration of the built in reporter is described in Configuring the Built In Reporter on page 242 Configuration of the RADIUS reporter is described in Configuring the RADIUS Reporter on page 243 Configuration of the Syslog reporter is described in Configuring the Syslog Reporter on page 244 Configuration of the mail reporter is described in Configuring the Mail Reporter on page 245 E Note The built in reporter is activated and configured by default In order to use any of the other reporters you have to activate and configure them as described in the corresponding sections Intelligent Application Gateway 239 User Guide Editing the default messages that are recorded by the Event Logging mechanism defining additional messages and sending messages from your own interfaces such as custom authentication pages are described in Message Configuration on page 249 Configuring General Settings This section describes how you configure general Event Logging settings To configure general event logging settings 1 2 In the Configuration program on the Admin menu click Event Logging The Event Logging dialog box is displayed ETT x General Buin RADIUS Syslog Mail Queue Size 50 Max Report Results 2000 Configure Monitor Users Use the General tab to configure
344. remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Restricted Zone policy the requested URL is not allowed Cause The request failed since this URL is defined as a restricted zone URL for this application type and the application s Restricted Zone policy forbids access to the zone from this endpoint Resolution In the Configuration program do one of the following In order for this URL not to be part of the restricted zone for this application type take the following steps 1 Open the Advanced Trunk Configuration window and access the Global URL Settings tab 2 Inthe Restricted Zone URLs list select the corresponding rule and do one of the following Click Edit and in the Edit Restricted Zone URLs dialog box either configure the rule so that parameters are not checked or change the method that is used to check parameters as applicable Ifyou wish the URL not to be part of the restricted zone remove it from the Restricted Zone URLs list For details refer to the Intelligent Application Gateway Advanced Configuration guide to Restricted Zone URLs on page 158 If you wish to disable the Restricted Zone feature for this application take the following steps 1 Open the Application Properties dialog box and access the Web Settings tab 2 Uncheck the option Activate Restri
345. reporter you cannot generate Event Query reports Use this window to define and submit a query as follows Select the trunk or trunks for which to generate the query Define the period of time for which to generate the query Select a pre defined period such as Today or Last Month at the top of the Period area Or Define start and end dates at the bottom of the Period area You can filter the query by one or more of the following event parameters category severity and type For a description of the parameters refer to Table 37 Event Parameters on page 294 When you narrow the query to a specific parameter only the related items are listed for the other parameters For example if in the Category list you select Security only security related severities and message types are displayed in the other lists At the bottom part of the Event Query window you can expand the Advanced Options area and use it to filter the query by the following Session ID specific session Intelligent Application Gateway 295 User Guide 296 Lead User according to user name You can use the asterisk wildcard at the end of the search string to define a group of users For example to enter a query for all users of a domain named ActiveDirectory enter the following in the User text box ActiveDirectory Old Trunks define a query on old trunks that is trunk
346. requisite Applications list If an application that is defined as a prerequisite application is not launched when the user attempts to access the application you define here the IAG automatically launches the prerequisite application prior to launching this application Define the application s inactivity period in order to monitor the actual usage of the application When a user does not use the application for the period of time defined here an Application Exited message is sent to the Web Monitor When the user resumes using the application an Application Accessed message is sent to the Web Monitor The user experience however is unaffected If the Inactivity Period field is set to zero inactivity period is unlimited that is the application is only exited when the user s session with the portal ends Change the selection of the application Endpoint Policies and access the Policy Editor For details refer to Application Endpoint Policies on page 99 EN Note The Endpoint Policies area is disabled when the option Disable Component Installation and Activation in the Session tab of the Advanced Trunk Configuration window is activated since endpoint computers compliance to the policies cannot be detected Access additional application specific settings or information E Note The i Application Aware Settings link appears when there are application specific settings or informatio
347. results were found to view troubleshooting p Severity Time Type Category Trunk Description info rmation for th Is i Information 03 21 2006 16 57 18 Application Application portal 5 Application Whale Portal was exited Exited Trunk portal Secure 1 User Name i whalecom ruti Session ID message Applicable 0113476 E557 47E8 A8B2 i F725545753A1 m I p 4 4 for Warning and i Information 03 21 2006 16 49 48 User Session portal S User whalecom qa_admin Source Removed from IP 192 168 2 51 was removed from Error messages Session session 050D185C 70F5 4CD2 8B28 OBA8A9AFSCFS5 trunk portal secure 1 reason User Request A Warning 03 21 2006 16 210 14 User Login Security portal 5 The following user failed to log into Failed trunk portal secure 1 User whalecom rachel Source IP 192 168 2 147 Authentication Server whalecom Error Invalid Credentials Session CCO2CCDD 7678 41E6 A61B D50D98A8B8D8 Warning 03 21 2006 16 42 13 14 User Login Security portal S The following user failed to log into Failed trunk portal secure 1 User whalecom rachel Source IP A internet Web Monitor High Availability Support In sites where an IAG High Availability Array is deployed you can monitor all the IAG servers that are part of the array from a single Web Monitor whether you access the Monitor from within the organization or remotely When you access the We
348. ring the query period Clicking the number of accesses displays the User s Application Access Statistics window described in User s Application Access Statistics on page 291 User s Application Access Statistics The User s Application Access Statistics window is displayed when you click a number of accesses in the Accesses column in the User Monitor Statistics Query Results window It provides information on the application usage as listed in Table 36 User s Application Access Statistics Parameters on page 292 Intelligent Application Gateway 291 User Guide Figure 58 Sample User s Application Access Statistics Window F https www myweb com User s Application Access Statistics Microsoft Internet Explorer User s Application Access Statistics El Lead User whalecomtruti Trunk portal 5 Start Date 03 21 2006 00 00 00 End Date 03 21 2006 13 04 41 EHIEHI Session ID Session Start Date Session End Date Current session 3F4C20EA 138A 4D7D A00D A393568977E4 03 21 2006 12 23 39 Active IS highlighted gt 50E59BB4 E8B0 4250 972B CBAAG7EZCDES 03 21 2006 12 38 09 Active 54234429 1443 4C85 9085 2DCOASD6EB 03 21 2006 11 49 26 03 21 2006 12 22 03 DCCS8A07 AlA2 46D3 SAAC E857B7384C39 03 21 2006 12 21 37 03 21 2006 12 24 03 ESCEF042 44DD 4B91 8132 B3D08CBSDEAB 03 21 2006 11 30 12 03 21 2006 12 32 33 Duration 00 41 02 00 26 32 00 32 37 00 02 26 01 02 21
349. rk Connector Server 190 This section describes how you configure the Network Connector server To configure the Network Connector server 1 In the Configuration program on the Admin menu click Network Connector Server Chapter 7 Network Connector Configuring the Network Connector 2 At the bottom left corner of the Network Connector Server window check the option Activate Network Connector E Note Unchecking the option Activate Network Connector once the Network Connector is activated disables this feature 3 Use the Network Connector Server window to configure the server For details refer to Network Segment Tab on page 192 TP Provisioning Tab on page 193 e Access Control Tab on page 196 Additional Networks Tab on page 197 Advanced Tab on page 199 Note an Configuration in the IP Provisioning tab is mandatory Configuration in the other tabs is optional and depend on your network settings and your requirements 4 Once you complete the configuration of the server click in the Network Connector Server window in order to activate the Network Connector 5 In the Configuration program click 0 to save and activate the configuration then click in the Activate Configuration screen The configuration settings you have defined are applied to the Network Connector server The Network Connector Windows service Whale Network Connector Server is started and
350. rmity to the Install Socket Forwarding Component Policy For details on this policy refer to Session Endpoint Policies on page 95 Add Site to Pop Up Blocker s Allowed Sites this option is applicable for Internet Explorer browsers running on Windows which feature a pop up blocker such as Internet Explorer on Windows XP SP2 It adds the site to the list of allowed sites in Internet Explorer s pop up blocker so that pop ups from the site are not blocked and users can continue to receive messages and notifications such as Inactive Session Timeout and Scheduled Logoff notifications The site is removed from the pop up blocker s allowed sites when the Whale Client Components are uninstalled as described in Uninstalling the Whale Client Components on page 167 Tip When the site is added to Internet Explorer s pop up blocker s allowed sites the user is notified by a message and is prompted to confirm the change Whale Client Components i xj e To ensure complete functionality with this site it is necessary to add the 1 site to the pop up blocker s allowed sites of the browser Would you like to implement the required changes I Don t show me this message again If a user selects the option Don t show me this message again the notification will not be displayed again when users access this site In order to receive the notification when applicable instruct the user to restore the default setting
351. rom all endpoint computers that access the site by activating the option Uninstall Socket Forwarding Component in the Session tab of the Advanced Trunk Configuration window For details refer to Endpoint Settings on page 108 Intelligent Application Gateway 169 User Guide 170 Chapter 5 Endpoint Security Whale Client Components Chapter 6 SSL Wrapper E Note The SSL Wrapper components are part of the Whale Client Components For details refer to Whale Client Components on page 147 When working with SSL Wrapper applications via an HTTP trunk tunneled traffic is not encrypted The SSL Wrapper provides secure SSL connectivity for non web protocols such as those used by client server and legacy applications from the Internet to the internal network thus enabling users of the Intelligent Application Gateway IAG to safely access back end applications Via the portal homepage remote users can access a range of applications such as native messaging applications standard email applications collaboration tools connectivity products and more The SSL Wrapper allows granular per user and per server configurations and can be used in conjunction with the IAG endpoint security policies providing for a secure SSL VPN experience Multi platform application support ensures that users can access their applications from computers running Windows Mac OS X and Linux operating systems using a wide range of browsers
352. rowser Certified Endpoint Speak to your administrator before requesting Request Denied Certified Endpoint status again Installing the Certificate and Logging In as a Certified Endpoint User 144 Once your Certified Endpoint status has been approved and a certificate issued you must install the certificate on your computer in order to complete the Certified Endpoint process To install the certificate and log in as a Certified Endpoint user 1 Access the portal and click the Certified Endpoint button or link The Certified Endpoint Certificate Issued window is displayed Z Certified Endpoint Microsoft Internet Explorer Certified Endpoint Whale Communications A Microsoft Subsidiary Install this certificate Chapter 5 Endpoint Security Certified Endpoints 2 Click Install this certificate to add the certificate to your computer Ifyou are using Microsoft Internet Explorer the certificate is installed on your computer Proceed to step 4 of this procedure Ifyou are using a different browser a certificate download dialog box is displayed in this example the Downloading Certificate dialog box displayed by Netscape Navigator Downloading Certificate x You have been asked to trust a new Certificate Authority CA Do you want to trust Trusted Endpoint CA For the Following purposes J Trust this CA to identify web sites J Trust this CA to identify email users J Trust this CA
353. rus Any Personal Firewall Corporate Machine Disable Citrix Client Printer Mapping Enable Domino Web Access Forward and Enable SharePoint Integration with Office Endpoint Detection is Disabled Privileged Endpoint Sygate Virtual Desktop Not Required Symantec Norton Antivirus Up To Date Se a Variables Name Default Privileged Endpoint Category Policies AND OR NOT Privileged_Endpoint Operators Rules area Ei Explanatory Text Added to Access Denied Message 3 For new policies and expressions Inthe Name field at the top right assign a name In the Category field select Policies or Expressions accordingly 106 Chapter 5 Endpoint Security Endpoint Policies You do not need to edit those fields for existing policies and expressions Define the rules of the policy or expression From the Components list at the left of the Policy Editor select a component to add it to the Rules area on the right Use the AND OR NOT and parenthesis operators to create a combination of as many components as you require or to combine VBScript syntax free text with expressions and variables The Rules area is a free text area you can edit and delete rules and rule components in this area as required At the bottom right of the Advanced Policy Editor you can enter text that will be displayed to users in the
354. s Identify by Extensions Unknown Content Type Identify by Size Description Identify URLs and methods by checking against the list of Download URLs or Upload URLs respectively You can access and edit the Download URLs and Upload URLs lists via the Global URL Settings tab of the Advanced Trunk Configuration window For details refer to the Intelligent Application Gateway Advanced Configuration guide to Global URL Settings Tab URL Settings on page 152 Identify URLs by file extensions which you define in Extension List Ifthe option Exclude is selected when an endpoint policy is enforced only files whose extensions are listed here are allowed Ifthe option Include is selected when an endpoint policy is enforced files whose extensions are listed here are blocked Note Extensions in the Extension List should not include the preceding dot For example exe and not exe You can define that downloading or uploading of files without an extension is allowed or blocked by adding a no_ext entry in the relevant Extension List GET requests are treated as downloads POST and PUT requests are treated as uploads In order to enable download blocking by extension you need to also define the application s unknown content type in the field Unknown Content Type below For the extensions in the list verify that the association of extensions and content types is identical between
355. s Microsoft Internet Explorer 7 Application Access Details Application Whale Portal Trunk portal S Period 03 21 2006 00 00 00 03 21 2006 13 00 00 Interval Hour HEH Bg Lead User whalecom amirm whalecomieddien whalecom ezy whalecomiqa_admin whalecomiachel whalecom ruti e lalam Accesses Last Accessed Duration Average Max Min Total 03 21 2006 11 33 55 00 37 51 00 37 51 00 37 51 00 37 51 03 21 2006 11 36 08 00 18 48 00 33 41 00 03 55 00 37 36 03 21 2006 12 18 21 00 30 06 00 35 30 00 24 42 01 00 12 03 21 2006 11 35 44 00 36 02 00 36 02 00 36 02 00 36 02 03 21 2006 11 30 08 00 31 38 00 31 38 00 31 38 00 31 38 03 21 2006 12 38 14 00 18 05 00 32 29 00 02 21 01 30 27 E whalecomtyarivm 1 3 2 1 T 5 2 03 21 2006 11 33 51 00 20 26 00 37 55 00 02 58 00 40 53 amp internet Table 33 Application Access Details Parameters Parameter Lead User Accesses Last Accessed Description User who initiated the session from where the application was accessed Clicking the sign next to the Lead User name or clicking the name itself expands the display and lists all of the user s accesses to the application during the query period where the user name is the name used to access the application Clicking or SH expands and collapses the display for all users respectively Number of times the user acces
356. s in the United States and other countries or both Citrix Citrix NFuse Citrix Presentation Server Citrix MetaFrame Citrix SecureGateway and ICA are service marks trademarks or registered trademarks of Citrix Systems Inc or its subsidiaries in the United States and other countries or both Debian is a service mark trademark or registered trademark of Software in the Public Interest Inc or its subsidiaries in the United States and other countries or both GNU and GZip are service marks trademarks or registered trademarks of Free Software Foundation Inc or its subsidiaries in the United States and other countries or both Domino Lotus IBM Lotus iNotes Lotus iNotes Lotus Domino Notes Sametime and WebSphere are service marks trademarks or registered trademarks of IBM Corporation or its subsidiaries in the United States and other countries or both Linux is a service mark trademark or registered trademark of Linus Torvalds or its subsidiaries in the United States and other countries or both Active Directory ActiveSync ActiveX Excel Microsoft Outlook SharePoint Visual Basic Windows Mobile Windows NT Windows Server are service marks trademarks or registered trademarks of Microsoft Corporation or its subsidiaries in the United States and other countries or both Camino Firefox and Mozilla are service marks trademarks or registered trademarks of Mozilla Foundation or its subsidiaries in the United States an
357. s of the Whale Component Manager as described in Restoring the Whale Client Components Defaults on page 165 Intelligent Application Gateway 109 User Guide Attachment Wiper 110 The Attachment Wiper utility deletes persistent browser data that is downloaded to the browser from the sites protected by the IAG or created by the browser whenever the following occurs The session ends for example when the user closes the browser When the user logs out using the site s Logoff mechanism During a scheduled logoff or scheduled cleanup The Attachment Wiper utility deletes items that are saved in the browser s cache during the session such as web pages cookies and files including application specific cached files The Attachment Wiper also deletes items that are saved in the browser s offline folder These include files that were opened from within the browser for editing by an external application such as an Office application For example a document that was opened via the browser for editing in Microsoft Word The offline folder is cleaned only when all the IAG sessions on the computer end Only items that were written to the offline folder since the Attachment Wiper was first activated during the initial login are deleted Optionally you can also configure the Attachment Wiper to delete items that are saved outside the cache including the browser s History Web Address AutoComplete IntelliForms Forms Auto
358. s that are no longer defined in the Configuration program Trunk names are comma separated HTTPS trunks are denoted by Ss For example MyTrunk MyTrunk S You can select whether the query includes the trunks that are selected in the Trunks list by enabling or disabling the option Include trunks selected in the Trunks list above respectively EN Note Generating Event Query reports uses system resources and might affect system performance Depending on the size of the logs and on the query you define report generation may take up to a few minutes It is therefore important that you fine tune the query as much as possible especially the date range Once you submit the query the results are displayed in the Event Report window described in Event Report on page 297 Figure 6l Event Query Event Query Server time 03 23 2006 19 58 amp Trunks Period Week Month Quarter Year portal S Today Last24 Hours Yesterday Start date 03 23 2006 00 00 00 CE End date 037 2312006 19 54 00 73 Message Filter Category Severity Type Application Error Administrative Password Change Security Information Application Access Policy Violation Session Notice Application Accessed System Warning Application Authentication Failed xl Advanced Options Reset Chapter 9 Monitoring and Control Web Monitor Event Report The Event Report window is displayed when a report is generat
359. scsesssessssees 229 Configuring Authentication with the Novell Directory Service cceseseeereesseeeeeees 231 Changing the Date Format of Files and Folders s czccszsscanceateadsaseceaassancececasanaxereaccsaebesee 234 Hiding the Folder Tree in the End User Interface eesssesseesseeereesseeserserscrseeeenseeseereese 234 Chapter 9 Monitoring and Control cccccccsssssssscssscesseeeesees 23 7 Event ONG oeeisie seiere aeae sete EEEE NEE a EA EEEE a EEEE EEEE EER 237 VEE VIS W sich sacs e ea EEEE un aba gas es E E E E daaneanaN Teas mb 238 Event Categories siete sciess scctnssacevseccsevec convnastestsesovscesenseacicnsssdevssedvavec consnacdosec ersa isvis 238 Event Logging REpOrters cai cvsessseasessceseaveedssdsescesshosseonoelecsencestecuensecUeosiee dobetebeastooseuusessessee 238 Event Logging Messages vessissssscsssstsesesdsoscssdesussoceocsdsneossesssscsostdeesvedeh ovsiensesecdeseasnsosbsans sass 239 10 Contents Optional Event Logging Configuration Steps w vcccscccossssesssesscctsesscusessstdcdnstensteooncabsnest 239 Configuring General Settings scutes nctescoresecsssnsauinecesd saecesceaseugeaste andes mineatennew 240 Configuring the Built In Reporter seessssessssssrssrseereessesserseserueeesenseeseesereerereseeseeseeseeeeee 242 Configuring the RADIUS Reporter seessessessseesresesreseeesessessesreseenreeseeseserseeueeeseeseeseeseeee 243 Configuring the Syslog Reporter sesseesseesessseesrseeseeseessessesseneeneensensesser
360. se the Backup amp Restore utility and how you use various diagnostics tools such as support utilities tests and error and trace logs It also provides information on how log files are cleaned up and how to restart the Web service in the Windows Server IIS Internet Information Server Appendix A Troubleshooting Event Logging Messages provides troubleshooting guidelines and instructions for Warning and Error messages that are reported by the Event Logging mechanism Tip For a description of additional advanced features and configuration settings refer to the Intelligent Application Gateway Advanced Configuration guide Chapter 1 Introduction About This Guide Conventions Used in This Guide This section explains the conventions used throughout this Guide Menu Item Menu names and menu items Buttons that you select with the mouse 7 Icons that you select with the mouse are represented graphically D P u Procedure Title of an operating procedure Computer text System files and information that you type in AN Caution A note advising you that failure to take or avoid a specific action could result in loss of data N Note Important information you should note Tip Helpful tips for working with the e Gap Appliance Intelligent Application Gateway 25 User Guide 26 Chapter 1 Introduction About This Guide Chapter 2 SSLVPN Portals An Intelligent Application Gateway IAG SSL VPN Portal
361. section of the Network Segment tab you can configure alternative network parameters and select when they are used e Only if Network Configuration is Missing data you enter in the Complementary Data area will be used only if no data is configured for the same item in the Network Connection area Always Overriding Existing Network Configuration of This Server the data in the Complementary Data area will always be used regardless of the configuration of the selected connection Fields that are left empty are ignored Chapter 7 Network Connector Configuring the Network Connector es Note If one or more of the fields are left empty in both the Network Connection and Complementary Data areas it might result in limited client session For example if no DNS is defined no DNS services will be available for users connecting via the Network Connector IP Provisioning Tab Use this tab to define the IP pool from which clients are assigned IP addresses when connecting via the Network Connector Note Make sure that your pool is sufficient for your needs and consists of enough IP addresses for your remote clients Note that IP addresses ending with zero or 255 are not used for IP assignment For example if you define the pool 192 168 0 0 192 168 0 9 the Network Connector server will be able to support up to 8 concurrent clients since 192 168 0 0 will not be used and 192 168 0 1 will be use
362. sed the application during the query period Time when the application was last accessed by the user during the query period 284 Chapter 9 Monitoring and Control Web Monitor Table 33 Application Access Details Parameters Parameter Description Duration Duration of accesses to the application by the user including average maximal and minimal duration and the total access time User Monitor Current Status The User Monitor Current Status window provides online display of all the users that are currently connected to the IAG you are monitoring At the top part of the window a column chart is displayed For each trunk two columns represent the following Number of authenticated sessions that are currently open through the trunk Number of authenticated unique users currently using the trunk For example if a user opens two concurrent sessions with the trunk two sessions are counted but only one unique user At the bottom part of the window the information is presented in a tabular format Clicking the number of authenticated sessions opens the trunk s User Monitor Active Sessions window described in User Monitor Active Sessions on page 287 By default the window refreshes the data every 15 seconds If required you can customize the refresh rate as described in the Intelligent Application Gateway Advanced Configuration guide in Customizing the Web Monitor Windows on page 72 You
363. see Event Query on page 295 The RADIUS reporter reports events to a RADIUS Accounting server either any external RADIUS Accounting server or a Windows RADIUS Accounting server installed on the IAG The Syslog reporter reports events to an external industry standard Syslog server The mail reporter sends email messages regarding specific events via an SMTP server E Note The built in reporter is activated and configured by default In order to use any of the other reporters you have to activate and configure them as described in the corresponding sections Chapter 9 Monitoring and Control Event Logging Event Logging Messages Event logging messages are defined in a message definitions file All the applicable IAG interfaces are configured to send the relevant message when required For example A message is sent each time the configuration is changed in the Configuration program A message is sent whenever a user logs into the IAG site Tip Use the messages to troubleshoot warnings and errors For details refer to Appendix A Troubleshooting Event Logging Messages If required you can edit the default messages define additional messages or send messages from your own interfaces such as custom authentication pages Optional Event Logging Configuration Steps The following Event Logging configuration options are available to you if required General event logging parameters which a
364. serssrsersesscssssscsscsnsosesacsacsaccaccascaccascansassassanooss 77 Web Server Security Tab czscectencsccatastecsedetiscesnncckbetacssccaehigeanescbieecusassabdrasbagetidencsccenstaenas 78 6 Contents Cooki Encryption Tab eter csctos sce cacausvedes cesencsaaipnanuateouspacupeccn coreuatensiaeuasedninapeusbeeteraesbetoms 80 Global Exclude Listerne a E S E RE S 82 Download Upload Tab sessesssseesesessrseerreseeesesseesessrseeuseeseesersseserseeseeseesreseesseserseeereseesees 82 Server Settings TaD sssrissireiesse roeren sesei a chien cceat Gut sdecea taint ae sos suet vecdennenabeue vsuctaivenlas 85 Client S ttings Tab tvs sss tecncpehccs cents seess sored iest ccans estetoosivineselbeateas iaecenctcenaacuabiatenaielicgtes 86 Pte Line E e a E E E E E 87 Authorization Tab sisinereisenissisesieinsere isnin ies eiieeii seereis niaii earn neresi 91 Duplicating at Applicaton taisccusssoctuatissisnnnesesnvanesnsenesvaaxestu ts nenssanaaivesssnnussvnzsccoutsounssediaananeeenl 91 Chapter 5 Endpoint Security ssiscissssacssssisssceccceessvansensneossscscssvanseasves 9S Endpoint Polities c tscivancestsiascteacamanedscesetesueakechesueceageatbechsanacabhesenseaaeseucmndsdecarebogennsadsoevocsnatenes 93 Endpoint Det ctioM ssssiseesseieriesorsessesies io isosie ii srkees ionos skep ias oksa K esses toss S raser esise sre sii iE 95 Session Endpoint POliCIES tai cesszasudssssescecsnnvacenunsearateuiios sanecsies eE ea REEERE e iekea 95 What Information
365. server s password policy such as password length complexity or history Resolution Depending on the message the user receives and the error indicated in the message do one of the following Take the steps required in order to enable users to change their passwords as detailed in the Intelligent Application Gateway Advanced Configuration guide in Change Password Requirements on page 93 Advise the user of the relevant password policy Warning 82 Unauthorized Access Attempt Symptoms A remote user attempts to launch an SSL Wrapper application either via the portal homepage or by logging into a site that automatically launches the application The request is denied and the following message is displayed Access to the requested resource denied Intelligent Application Gateway 365 User Guide Cause Internal error Resolution If this event occurs on a regular basis contact technical support Warning 83 Form Login Response Failed Symptoms A remote user attempts to access an application The attempt might fail Cause The application is configured so that the Form Authentication Engine automatically replies to the application s authentication requests The evaluation of the login attempt result failed Resolution Verify the configuration of the Form Authentication evaluator for this application For a description of the Form Authentication Engine refer to the Intelligent Applica
366. sitories on page 33 Define authorization and personalization per application as described in Defining Authorization for Portal Applications on page 38 Chapter 2 SSL VPN Portals Users Setup Defining Authorization Repositories Repositories are databases containing user and group information a user can be defined as an individual unit or associated with a group This section describes how you define repositories of users and user groups which you can then use in order to define authorization for portal applications including User Group Servers on page 33 Optional configuration of local groups described in Local Groups on page 35 User Group Servers This section describes how you define a third party user group server The servers are used as user group repositories for application authorization and can also be used to define local groups E Note User group servers are also used for session authentication as described in the Intelligent Application Gateway Advanced Configuration guide in Authentication on page 81 To define a user group server 1 In the Configuration program on the Admin menu click Authentication and User Group Servers The Authentication and User Group Servers dialog box is displayed x 2 Inthe Authentication and User Group Servers dialog box click Add The Add Server dialog box is displayed Intelligent Application Gateway 33 User Guide Ad
367. ss js from Whale Com e Gap von samples CustomHooks To Whale Com e Gap common bin CustomHooks Open the file you copied and follow the instructions in the file to configure it for your system Technology Overview 172 When supporting non web applications over an SSL connection the SSL Wrapper causes the application traffic at the endpoint to be tunneled through SSL to the SSL VPN gateway that is the e Gap Internal Server The SSL VPN gateway decrypts the traffic and sends the payload to the application server in the internal network The Socket Forwarding component add on which is based on Microsoft s Layered Service Provider LSP and Named Service Provider NSP technologies can be used to support a wider variety of applications such as supporting applications that jump ports without needing to make on the fly changes to the operating system Application traffic can be tunneled through SSL using one of the following relay types Simple relay opens a port on the endpoint computer and tunnels the TCP traffic to and from a specific port on the application server Using this type of relay in order to communicate with the application server the application on the endpoint computer needs to communicate Chapter 6 SSL Wrapper Technology Overview through the locally opened port The SSL Wrapper makes changes such as changes to the application settings Registry or hosts file in order for the application to
368. ss of the configuration of this reporter e syslog reporting to a Syslog server as described in Configuring the Syslog Reporter on page 244 mail sending an email message about the event as described in Configuring the Mail Reporter on page 245 Usage One and only one lt Reporters gt element can be nested under lt Message gt Child Elements lt Reporters gt can contain up to four lt Reporter gt elements described on page 255 one for each reporter lt Message gt gt lt Reporters gt gt lt Reporter gt lt Reporter gt 256 Description Child element of lt Reporters gt Defines a single reporter to which the message is sent For a description of the reporters you can configure here refer to lt Reporters gt on page 256 Chapter 9 Monitoring and Control Event Logging Usage Up to four lt Reporter gt elements can be nested under lt Reporters gt one for each reporter Child Elements None Event Messages Application Interface By default all the applicable IAG interfaces are configured to send the relevant event message when required If however you configure custom messages in the message definitions file or if you wish to send messages from custom interfaces such as a custom Login script in order to send the message you need to configure the page where you wish to send the message as described in this section To configure message interface 1 In the pa
369. ss window to enable access to NetWare Servers only you cannot enable access to Novell Directory Services through the File Access option 3 In the left pane of the File Access window click Servers The network is browsed In the File Access window all the servers in the domains you selected are displayed arranged under their respective domains 4 Inthe right pane of the File Access window select the servers which will be accessible to remote users through File Access and click Apply 5 In the left pane of the File Access window click Shares The network is browsed In the File Access window all the shares that are enabled on the selected servers are displayed arranged under their respective servers E Note If you have previously configured shares in this screen to be accessible to remote users and have since clicked Apply in either the Domains or the Servers screen all the shares in this screen appear unselected including shares that are accessible to remote users In order to refresh the view click Reset then click Refresh 6 Inthe right pane of the File Access window select the shares which will be accessible to remote users through File Access and click Appi 230 Chapter 8 Providing Access to Internal File Systems File Access lt gt Tip If there are no shares in a selected server the text No shares on this server appears under that server name When you finish configuring administratio
370. sseeseseeseesenersenseereeeeres 279 Application Monitor Statistics Window Query Results View cccscssscsseseeeessesseeseeees 281 Application Access Detalls 2 ccseyesceoseeaceesesncbssssiist sostieleskeotecbutsoectensedtesucedtedectosteotests capes 283 User Monitor Current Status sssscescscetacdaostacsSccacstesbenabencediaqcesitesavedebapsesnacegutoiececetaiaes 285 User Monitor Over Time wwe ccsccesccossessovseceedcevesvsccpecusdetccoteostesieosntcsteasezsecstpouts ESEE 286 User Monitor Active SESSIONS jasc sscssseudssvesesuass 0steee sd sssteenscunpasesscuuepancnatinssmtnemeenntvars 287 Us r a foe gears 1 gr en ee eee eee ee 288 User Monitor Statistics Window Query FOr sceessssesssesssecssscessssesesesesssseseseseseeees 289 User Monitor Statistics Window Query Results VieW scsccsssessscsessessssesesseseseeees 290 User s Application Access Statistics csssscssscssscssssssssscseessssesssssessssessscessneseseseseseeees 291 Be E E cect ot sen caren cua E E 293 Pe I cst spe tear care soared ee wc ce anes eect va asec pce eee 295 EVENE REDON sossccsecescieeessecsectset stiabenstedeadentssatesbectociscbebiectetstdebiessarhsassabestests stessettetrateates 297 Web Monitor High Availability Support sssisccscicccbixcttencasbcentesctbtecoisacabeaceiacesoinietdcaspens 298 Accessing IAG Servers in the Array ccscssssssssessssscesssccessssessscsessesesescsessseessscsessssensseees 299 Analyzing History Reports Once
371. st not to be considered an upload for this application type take the following steps 1 Open the Advanced Trunk Configuration window and access the Global URL Settings tab 2 Inthe URL Settings area click next to Upload URLs 3 Inthe Upload URLs Settings dialog box remove the corresponding rule Intelligent Application Gateway 355 User Guide For details refer to the Intelligent Application Gateway Advanced Configuration guide to Upload URLs on page 155 Ifyou wish to cancel the identification of uploads by URLs for this application take the following steps 1 Open the Application Properties dialog box and access the Download Upload tab 2 Inthe Uploads area uncheck the option Identify by URLs Note EN If none of the options in the Uploads area are activated no uploads to the application are blocked regardless of the settings of the application s Upload policy lt If you wish to enable uploads from the submitting endpoint to the application edit the application s Upload policy The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Warning 54 Failed
372. st of all the session s parameters or only parameters of a selected type Figure 44 Sample Session Details Window A hittps Awww myweb com Session Details Microsoft Internet Explorer Session Details Lead User whalecom rachel Session ID 78335EE9 3BBB 4DCB B830 96600736452A Applications Endpoint Information Parameters General Session Details Session Started At 14 03 2006 16 17 44 Session Duration 00 56 46 Session Authenticated Privileged Session x User Repository Lead User whalecomirachel whalecom A internet Session Monitor Statistics This window enables you to view and analyze both the history and the current status of the IAG sessions such as the number of concurrent sessions in a trunk and compare them to the trunk s limitations as defined by the Concurrent Sessions settings Use the query form to submit a query as described in Session Monitor Statistics Window Query Form on page 272 The window then displays the query results as described in Session Monitor Statistics Window Query Results on page 273 Intelligent Application Gateway 271 User Guide Session Monitor Statistics Window Query Form 272 When you first access the Session Monitor Statistics window the query form is displayed Use this form to define the query Select the trunk or trunks for which to generate the query Define the period of time for which to generate t
373. stallation e lt CustomSetup Enable 0 gt disable Custom installation 4 In order to replace the graphic that appears in the installation screens place your graphic in the following location Whale Com e Gap utils OfflineClientSetup CustomUpdate The replacement graphic must be lt A Bitmap bmp format graphic File name logo bmp Size of the graphic must be the same size as the original graphic Width 118 x Height 238 pixels Deploying Offline Component Installation Once you configure the installation settings as required deploy the installation to end users You can deploy the installation in one of two modes Silent mode where no user intervention is required Note that when you use this deployment method Custom installation is not applicable Interactive mode where an installation wizard guides the user through the installation Both deployment methods are described in this section Chapter 5 Endpoint Security Whale Client Components To deploy the offline component installation in Silent mode 1 Use the following command line to execute component installation in Silent mode Whale Com e Gap utils OfflineClientSetup Setup exe s For example use a batch file to run this command from the offline client setup location Once this command is run on an endpoint computer the Whale Client Components are installed on the computer with no user intervention To deploy the offline co
374. t The IIS is stopped You now have to re start it as described in the following procedure Starting the Web Service in the IIS To start the Web service in the IIS In the Command prompt on the IAG type net start w3svc Press lt Enter gt The following messages are displayed in the Command prompt Intelligent Application Gateway 323 User Guide WINDOWS system32 cmd exe Microsoft Windows Version 5 2 3796 lt C Copyright 1985 2003 Microsoft Corp C Documents and Settings Administrator gt net start w3suc The World Wide Web Publishing Service service is starting The World Wide Web Publishing Service service was started successfully C Documents and Settings Administrator gt P_ The Web service in the IIS is started and the filters are reloaded 324 Chapter 10 Troubleshooting Restarting the Web Service in the IIS Appendix A Troubleshooting Event Logging Messages This appendix describes how you troubleshoot events that are reported by the Intelligent Application Gateway IAG Event Logging mechanism according to the message that is displayed when the event occurs Troubleshooting instructions are provided for Error and Warning messages Warning 4 Service Shutdown Symptoms A Windows service running on the IAG was stopped Cause A Windows service that is required in order to run the IAG is not started Resolution Start the relevant service on the IAG 1 In the Windows Control Pa
375. t CheckSite reg 3 At the location where you copied the files edit the file CheckSite reg as described in Table 21 on page 163 The file provides a sample configuration which adds the following sites to users Trusted Sites lists https www microsoft com g https www myPortal com Note the following in the sample configuration Users can add sites to the Trusted Sites list on demand they cannot however add HTTP sites to the list Users will not be prompted if a trusted site s certificate is invalid In this case detection will not be performed Users will be prompted if an untrusted site s certificate is invalid and will be able to add it to the Trusted Sites list on demand 4 Deploy the CheckSite bat file to the end users whose Trusted Sites list you wish to configure A Note Make sure the file CheckSite reg resides in the same folder as the file CheckSite bat At the endpoints where you deployed the configuration the following Registry key is added or updated according to your definitions HKEY_CURRENT_USER Software WhaleCom Client CheckSite The Trusted Sites configuration is applied on the endpoint with the settings you defined here Chapter 5 Endpoint Security Whale Client Components Value Managed CanAddSites CanAddHttpSites PromptlnvalidCertTrusted Table 21 Values of CheckSite reg Type DWORD DWORD DWORD DWORD Description Mandatory Determines whether this confi
376. t errors and situations that hinder usability Remote access via the SSL VPN portal provides you with secure anytime anywhere monitoring of system and user activities and enables you to render users assistance while away from the office Logs and queries are used to analyze usability variations and trends over time Chapter 9 Monitoring and Control Web Monitor For example a user notifies you that they cannot log into an application When you zoom into the user s session you find that the application s Access policy requires that the Attachment Wiper is installed on the endpoint computer but the user s computer does not comply with this policy You can instruct the user to download and install the Whale Client Components when they next access the site Thereafter they are able to access the application smoothly Note A The Web Monitor application is protected by the Windows Local Users and Groups management tool By default access to the application is disabled and you need to configure the user or users that are allowed to access it as described in Enabling Web Monitor Access from Computers Other Than the IAG on page 261 This section Describes how you access the Web Monitor including the configuration steps required in order to enable access from computers other than the IAG and the list of supported browsers in Accessing the Web Monitor on page 260 Describes the general Layout of the Web Monitor screen
377. t is applications that are configured to work in Socket Forwarding Mode will still function However the additional capabilities enabled by the Socket Forwarding component as described in Technology Overview on page 172 will not apply to the application in this setup LSP Conflict Detection If during the installation of the Socket Forwarding component on the endpoint computer the Whale Component Manager detects a conflict between the Socket Forwarding LSP module and other LSP modules installed on the computer it removes the Socket Forwarding component In this case the user is notified as follows Whale Client Components F The Component Manager detected a conflict between the Whale SSL YPN Socket Forwarding component and other networking components installed on your computer The Whale SSL YPN Socket Forwarding component will be removed from your computer Intelligent Application Gateway 179 User Guide N Note The removal of the component may require a restart of the browser or of the computer Users are notified accordingly The following procedure describes how you can re enable the installation of the Socket Forwarding component on the endpoint computer after a conflict is detected To re enable the installation of the Socket Forwarding component 1 Determine which components conflict with the Socket Forwarding component In the message box that is displayed when the conflict is detected click to display
378. t use the string app or ser as the unique identifier Encryption Key a key that will be used for internal encryption Click OK The Advanced Configuration window closes Intelligent Application Gateway 47 User Guide 3 In the Configuration program click O to save and activate the configuration The IAG will use the unique identifier and encryption key you entered here during link manipulation for all Portal trunks Configuring Application Subnets 48 You can restrict any of the applications in your SSL VPN Portal so that only servers within the defined subnets are enabled Once the trunk is operative when a user requests a URL the filter first checks the URL against the Application List if the application is listed here the filter goes on to check the URL against the Subnet List Only URLs that pass both checks are enabled to the user Note A For each application you add make sure that the application is listed in the IAG s DNS or Hosts file You configure subnets in the main window of the Configuration program in the Applications area as described in this procedure To configure application subnets 1 In the Applications area under the Subnets list click Add m Applications Application List p Application Name Application Type j Whale Portal Whale Portal iNotes Domino iNotes ja FTP FTP Passive Made t I Sort alphabetically Add
379. tEmail field is automatically filled in based on the certificate therefore it is recommended that these fields retain their default READONLY status A sample of how this code is implemented is provided in Sample Code info inc on page 134 For more information refer to the Intelligent Application Gateway Advanced Configuration guide to Customizing Certified Endpoint Enrollment Pages on page 67 3 Save the file When users next request a certificate the data fields in the User Information window will display according to the properties you set here Intelligent Application Gateway 133 User Guide Sample Code info inc EPAGE 65001 UTF 8 info inc global DAT a if Session INFO_INC lt gt FILE_NOT_EXIST then include Session INFO_INC else Delay between certificate request and certificate issue in automatic mode Default value should be 0 nAutoModeDelayInMinutes 0 default data fields edit status FIELD_READONLY FI EDITABLE FIELD HIDDEN editCommonName FIELD_READONLY editEmail FIELD_EDITABLE editCompany FIELD_READONLY editDepartment FIELI EADONLY editLocalCity FIELD_READONLY editState FIELD_READONLY editCountry FIELD_ READONLY end if gt Preparing Endpoint Computers that Use Internet Explorer Local CA Only E Note This section is only relevant for endpoint computers using Microsoft Internet
380. ted Sites list Security Alert xj The following site is about to launch one or more applications on your computer or retrieve security information from your computer https mportal _ microsoft com IV Trust this site Temporarily until disconnect from this site For a limited period of fi days ma e ci Note A Restoring the defaults deletes only sites that the user added to the Trusted Sites list it does not delete the administrator configured sites from the list For details on adding sites to the list refer to IAG Trusted Sites on page 160 Itis necessary to add the site to the browser s pop up blocker s allowed site Whale Client Components E x 2 To ensure complete functionality with this site it is necessary to add the lL site to the pop up blocker s allowed sites of the browser Would you like to implement the required changes T Don t show me this message again Tip For details regarding this option refer to Endpoint Settings on page 108 The Whale Component Manager detects problems with some of the Whale Client Components files on the computer 166 Chapter 5 Endpoint Security Whale Client Components Whale Client Components x Whale Component Manager detected problems with some of the Whale Client Components files on your computer Files are missing or their file version is wrong as follows File TcpDumper dll is missing on disk File WhiCa
381. ted folder is shown above the Users Groups list In order to facilitate the search for a user or a group use any of the buttons described in Table 2 on page 45 Chapter 2 SSL VPN Portals Users Setup j Tip To add all the users and groups in a users groups server select Authenticated Users When you add a local group all the users and groups that are part of the local group are selected The selected users and groups are moved to the Selected Users and Groups list 3 Repeat steps 1 2 to add users and groups from other repositories if required 4 Click at the bottom of the Select Users or Groups dialog box The dialog box closes The users and groups you selected are added to the local group or to the application s Authorization tab as applicable Table 2 Select Users or Groups User Group Search Buttons Button Description 2 Search Enter a string in the Search text box then click the Search button The search is affected by the selected View setting described in View Menu below Tip You can also select an entry in the list then start typing the user group string The display automatically moves to the relevant letter or string Up One Level Moves the display one level up in the folder tree Ei Home Returns the display to the top level folder Intelligent Application Gateway 45 User Guide Optional Configuration Table 2 Select Users or Groups User Group Search Buttons
382. telligent Application Gateway Advanced Configuration guide to Creating Encryption Keys on page 20 This chapter also describes how you Create a Redirect trunk that will automatically redirect HTTP requests to an HTTPS trunk as described in Creating a Redirect Trunk on page 58 Edit an existing trunk as described in Editing Trunks on page 59 Optional Pre configuration of the Services This section describes how you can optionally pre configure the HTTP Connections and HTTPS Connections services in the Service Policy Manager During pre configuration you define lists of external websites and application servers that can be used in the configuration of the service you can pre configure only one of the services or both service types Subsequently these are available for selection during trunk creation in the Create New Trunk Wizard and when editing the trunk in the Configuration program The parameters you can define include IP addresses and port numbers of the IAG external websites IP addresses and port numbers of the application servers that will be accessed via the IAG You pre configure these parameters separately for the HTTP Connections and the HTTPS Connections services Note A A detailed description of the Service Policy Manager including detailed procedures is available in the chapter titled Security Management Tools in the Intelligent Application Gateway Advanced Configuration guide
383. tempts to access an SSL Wrapper application If an application is configured to operate in Socket Forwarding Mode and providing that the endpoint computer meets the Socket Forwarding component installation requirements the Socket Forwarding component is installed as well For details refer to Socket Forwarding Component Installation on page 178 SSL Wrapper Java applet used as a fallback for endpoint computers where the SSL Wrapper ActiveX component cannot be installed or run such as computers running Mac OS X or Linux operating systems or an Internet Explorer browser on Windows where the download and launching of ActiveX components is disabled e The Java applet is supported on the browsers that are supported by the IAG as listed in Supported Browsers on page 19 Intelligent Application Gateway us User Guide In order for the Java applet to run on the endpoint computer the computer must meet the requirements described in SSL Wrapper Java Applet Prerequisites on page 176 Tip If a personal firewall is installed on the endpoint computer the following has to be added to the firewall s trusted applications list When working via the SSL Wrapper ActiveX component the client executable whlclnt3 exe When working via the SSL Wrapper Java applet the browser s executable For example when browsing with Firefox add the executable irefox exe to the list SSL Wrapper Java Applet Prerequisites
384. ter Bind Tunnel to Client Executable Portal Link Tab Description Applicable only when Socket Forwarding Mode is enabled for the application Activating this option restricts access to the resources of this application server IPs and ports on endpoint computers to the process or processes you define here For example when you configure a Telnet application the SSL Wrapper tunnels all communications to and from the servers and port you define for this application regardless of the process that initiates the communication Using the Bind Tunnel to Client Executable option you can restrict the tunneling to communications initiated by the Telnet process only by defining the Telnet process as the client executable for this application You can define multiple processes for an application For each process you can define the following Client Executable name of executable that runs the application on the endpoint computer Use the Add button to add an executable either by browsing and selecting a file or by manually entering the executable name in the File name field Signature optional MD5 check sum of the executable We recommend that you do not define a signature for applications whose check sum might change frequently such as Internet Explorer and other Microsoft applications This tab is applicable in Portal trunks only for all application types You can use it to control the appearance of the
385. ters defined in the Configuration program are implemented at this time Thereafter the processes examine the configuration file and activate any relevant changes at the defined refresh intervals Error Server Trace and Log Files This section describes the trace and log files that are created by the Error Server including The file location and naming conventions on page 311 The file size and the number of files retained on the server on page 312 File Location and Naming E Note The file timestamps as well as the timing of the events inside the files are derived from the local computer s clock Intelligent Application Gateway 311 User Guide Trace Files For every active trace the error server creates a trace log file under Whale Com e Gap Logs In the following format lt Server_Name gt lt Process_Name gt lt Instance_Name gt lt Time_Stamp gt log Where lt Server_Name gt represents the name of the server from which the log file originated lt Process_Name gt represents the name of the reporting process Process names as defined by the IAG lt Instance_Name gt represents the name of the reporting instance lt Timestamp gt represents the log file creation time and date For example The name of a trace file created by the server whlsrv by the service instance of the Whale Manager Service on October 1 2005 at 12 47 46 is whlsrv whlegapd service 01 10 05 12
386. the HTTPS port here and you edit the HTTP port in the main Configuration window Note Both HTTP and HTTPS ports are displayed in the General tab since you can use the same IP address for two trunks sharing the same site name one for HTTP sessions and the other for HTTPS sessions Sites with the same IP address must have matching site names sites with different IP addresses must have unique site names Name of the external website folder determined by the trunk name as defined in the Create New Trunk Wizard Enable this option if you wish the IIS to record a log of the transactions through the trunk including the source IP addresses The log is created in the location that is defined in the Microsoft Management Console MMC in the filter site Properties dialog box under the Web Site tab Select whether to add the username which the user enters during login to the IIS log you enabled in Enable Web Server Logging above This option disables all of the trunk s security features Caution This mode is intended for use only when so instructed by technical support Whenever you use this option be sure to disable it when you finish debugging the trunk Intelligent Application Gateway 63 User Guide Table 5 Advanced Trunk Configuration General Tab Cont d Parameter Description Server Certificate Server certificate used for the external website HTTPS Connections The certificate that is displayed here is s
387. the Mail tab and check the Enable option x General Built In RADIUS Syslog Mail mY Enable IP Host Port 25 From To Subject Mail From IAG System User o O Password PO Confirm Password CY 3 Define the following settings Chapter 9 Monitoring and Control Event Logging Table 27 Mail Tab Parameters Parameter Description IP Host IP address or hostname of the SMTP server Port Port number of the SMTP server From email address that appears in the email From field To email addresses to which you wish to send event logging email messages Subject Text that appears in the email Subject field User User name used to log into the SMTP server if required Password Password used to log into the SMTP server if required Confirm Password Confirmation of the password used to log into the SMTP server if required 4 Click OK 5 Goon to configure which of the AG related events will be sent to the recipients you configured here as described in Configuring which Messages are Sent by the Mail Reporter on page 247 Configuring which Messages are Sent by the Mail Reporter By default the mail server does not send any messages to the email recipients even if this option is enabled in the Event Logging dialog box so that the recipients are not flooded with all of the event logging messages This procedure describes how you configure the messages that will be sent by
388. the link to the application is not displayed on the homepage of users that are not authorized to access the application Authorization and personalization of an application are defined in the Configuration program in the Authorization tab of the Application Properties dialog box For details refer to Users Setup on page 32 Warning 64 Application Access Policy Violation Symptoms A remote user attempts to access an application from the portal homepage The request is denied and the following message is displayed in the browser window Your computer does not meet the security policy requirements of this application Cause The requesting endpoint does not comply with the requirements of the application s Access policy Resolution Instruct the user what steps have to be taken in order for the endpoint to comply with the policy You can view the definitions of the policy in the Configuration program in the Policy Editors To access the Policy Editors take the following steps in the Configuration program 1 Open the Application Properties dialog box and select the General tab 2 Inthe Endpoint Policies area click EditPolicies 3 In the Policies dialog box select the applicable policy and click Edit For more details refer to Endpoint Policies on page 93 Intelligent Application Gateway 359 User Guide Warning 65 Session Access Policy Violation Symptoms A remote user attempts to a
389. the list of conflicting components Whale Client Components k The Component Manager detected a conflict between the Whale SSL YPN Socket Forwarding component and other networking components installed on your computer The Whale SSL YPN Socket Forwarding component will be removed from your computer The following Winsock Layered Service Providers LSPs are installed over TCP NL LSP C Program Files NetLimiter nl_Isp dll Whale SSL VPN C PROGRA 1 WHALEC 1SCLIENT 1431 265D 1 O WhIL Encountered Winsock error 5 Or e Access the following file stemp SFConflictInfo txt 2 In order to remove conflicting components contact technical support 3 Once the conflicting components are removed use the System Information window which you access from the Whale toolbar on the portal homepage to re enable the installation of the Socket Forwarding component 180 Chapter 6 SSL Wrapper Enabling Access to SSL Wrapper Applications lej https mportal microsoft com System Information 2 Microsoft Internet Explorer hlr A System Information Whale Communications Intelligent Application Gateway Whale Client Components Whale Component Manager Y 3 7 0 12 Endpoint Detection o 3 7 0 12 SSL Wrapper Y 3 7 0 12 SSL Wrapper Java Applet N A Enable Socket Socket Forwarder LSP X NSP X Installation disabled Network Connector Client W 3 7 0 12 Driver W 3 7 0 12 Not Running Forwarding
390. the trace ini configuration file and will not be deleted by the log file cleanup process on the IAG Support Utilities The Support Utilities are a set of command line utilities designed for diagnostics purposes which technical support may ask you to run in order to help to diagnose problems The utilities include e Pre defined Support Utilities tests which you can run to examine the system configuration IAG functionality and other data in order to enhance diagnosing problems For instructions on how to run these tests see Running Support Utilities Tests on page 320 Intelligent Application Gateway 319 User Guide The Data Collection utility which collects and packs files of different types to be sent to technical support for offline diagnostics purposes For instructions on how to run the Data Collection Utility see Running the Data Collection Utility on page 321 Running Support Utilities Tests 320 Before running the tests note the following For some of the tests you may need to stop the Web service of the IIS as described in Restarting the Web Service in the IIS on page 321 For information on the available tests and commands you can use the following commands from the Command prompt Type whitest list fora list of the available tests Type whitest h for a list of the command options If you used the N or n command options alarms and warnings are displayed as pop up messages d
391. this extension to be considered regular responses for this application and not downloads edit the application s downloads Extension List accordingly as described in step 2 above If you wish to cancel the identification of downloads by extensions for this application uncheck the option Identify by Extensions in the Downloads area of the Download Upload tab E Note If none of the options in the Downloads area are activated no downloads from the application are blocked regardless of the settings of the application s Download policy If you wish to enable downloads from the application to the requesting endpoint edit the application s Download policy in the Configuration program The application s policies are selected in the Application Properties dialog box in the General tab For details refer to General Tab on page 68 Intelligent Application Gateway 341 User Guide Configuration of the endpoint policies is via the Policy Editors which you can access via the General tab of the Application Properties dialog box For details refer to Application Endpoint Policies on page 99 Warning 38 Download Policy Content Type Violation Symptoms A remote user requests a page The request is denied and the following message is displayed in the browser window According to your organization s Download policy the requested download is not allowed Cause The response failed sin
392. ties of the applications as follows On computers where the SSL Wrapper ActiveX component is used a Portal Activity icon is added to the Windows System tray to the right of the Windows taskbar Double clicking this icon opens the Portal Activity window When the Network Connector is activated the icon changes Fa For details refer to Remote User Interaction with the Network Connector on page 200 On computers where the SSL Wrapper Java applet is used the Portal Activity SSL Wrapper Java Client window opens as soon as an SSL Wrapper application is launched on the computer Webmail trunk when an SSL Wrapper application runs on a client a Portal Activity icon is added to the Windows System tray to the right of the Windows taskbar l Double clicking this icon opens the Portal Activity window Clicking the Portal Activity icon on the Whale toolbar brings the Portal Activity window to the front of the screen am Activity Note If the endpoint browser or the client Java Plugin are set to connect to the web via a proxy the SSL Wrapper Java applet will attempt to connect to the IAG site via the same proxy using the applicable setting except for Firefox browsers when the browser is set to connect to the web via proxy and the Java Plugin is set to use the browser settings Portal Activity Window The Portal Activity window monitors the activity of the applications that are run by the SSL Wrapper cli
393. till in the same page add the following lines lt script language JavaScript gt var whaleCacheClean GetCacheCleanInstance SetTimeoutForCacheClean Timeout lt script gt Intelligent Application Gateway 115 User Guide Where Timeout is defined in seconds For example In order to trigger a cleanup 600 seconds after the user accessed the page enter the line SetTimeoutForCacheClean 600 E Note If you set the timeout to zero the cleanup is triggered as soon as the user accesses the page Enabling the Attachment Wiper on a Custom Logoff Message Page This section describes the code you need to embed in the Logoff Message page used with the trunk if you do not use the default page supplied with the IAG The code triggers the Attachment Wiper to initiate the cleanup of the browser s cache Tip D You select the Logoff Message page used with the trunk in the Authentication tab of the Advanced Trunk Configuration window in Logoff Message For details refer to the Intelligent Application Gateway Advanced Configuration guide to Configuration in the Authentication Tab on page 82 You can find sample code in the Logoff Message page supplied with the IAG Whale Com e Gap von InternalSite LogoffMsg asp To configure a non default Logoff Message page to trigger the Attachment Wiper 1 In your Logoff Message page add the following line 2 Still in the same page add the following
394. ting system opened in a Terminal application Mac OS X or in xterm Linux the user needs to configure the Telnet application to work in Character mode by entering mode character in the Telnet window For more information consult the Telnet manual pages Intelligent Application Gateway 177 User Guide Uninstalling the SSLWrapper Java Applet E Note Do not uninstall the Java applet while it is running on the computer Once the SSL Wrapper Java applet runs on the endpoint computer users can remove it from their computer as follows 1 Clean the following applet from the Java plug in applets cache sslvpnclient jar 2 Delete the following folder Windows operating systems userprofile whalesslwrapper e Mac OS X operating systems lt username gt whalesslwrapper Or Var root whalesslwrapper e Linux operating systems lt username gt whalesslwrapper Or root whalesslwrapper E Note If the folder whalesslwrapper contains the file backupdata map this file might contain changes that were made to the system by the SSL Wrapper Java applet and were not restored when the applet stopped running For example entries added to the hosts file In this case don t delete the folder before backing it up In order to restore the settings contact technical support Socket Forwarding Component Installation The conditions for the installation of the Socket Forwarding client component on the endpoint computer are
395. ting systems E Note We recommend that you enable this feature only for endpoints that comply with your corporate endpoint policy For example only endpoints where the latest update of the corporate anti virus program is running are allowed access to internal shares For details on how you determine endpoint policies for an application refer to Endpoint Policies on page 93 You can enable access to multiple shares by adding multiple Local Drive Mapping applications to the trunk one for each share For each share you can decide how it will be accessible to remote users As soon as users log into the portal homepage the share is automatically added to the Windows Explorer shares on the endpoint computer default option Via a link on the portal homepage Intelligent Application Gateway 209 User Guide EN Note Once the drive is mapped on the endpoint computer it is displayed in Windows Explorer with the IP address of the local listener that is used as the relay to the application server If you define a share as a prerequisite application to another application the IAG automatically connects to the share prior to launching this application For details regarding prerequisite applications refer to General Tab on page 68 Mapping Shares This section describes how you map one share repeat the procedure to map multiple shares In order to enable Local Drive Mapping on Windows XP 2008 additional configuration
396. tion attempts are reported in the Windows Event Viewer You can select to view errors warning and informational and success events or any combination of these event types For details and instructions see the following Microsoft article http support microsoft com kb 260729 EN US Note EN Make sure to restart the IAG after you make changes to the Registry Intelligent Application Gateway 301 User Guide 302 Chapter 9 Monitoring and Control SSL Event Monitoring Chapter 10 Troubleshooting This chapter describes the following troubleshooting procedures Backup amp Restore Utility on page 303 provides instructions on how to back up and restore the configuration settings of the Intelligent Application Gateway IAG Error Logging and Process Tracing on page 307 describes how you run the IAG centralized logging and tracing mechanisms Log File Cleanup on page 313 describing the log file cleanup for IAG and IIS log files and the manner in which they are implemented This section also provides instructions for configuring the log file cleanup process and for excluding IIS log files from the cleanup process Support Utilities on page 319 describes how you run support utilities tests Restarting the Web Service in the IIS on page 321 is required during some of the procedures relating to the IAG filter Backup amp Restore Utility The Backup amp Restore utility is comprised of the B
397. tion Gateway Advanced Configuration guide to Appendix C Form Authentication Engine The evaluator is defined in the lt LOGIN_EVALUATOR gt element The failure is most likely caused by the lt HEADER gt sub element Warning 87 Service Policy Manager Login Failed Symptoms When attempting to log in to the Service Policy Manager program the login fails and the following message is displayed Incorrect Password Cause Incorrect password used Resolution Log in using the correct password If you forgot the password you can assign a new password for the Service Policy Manager program as follows At the IAG delete the following file Whale Com e Gap common conf auth sec 366 Appendix A Troubleshooting Event Logging Messages When you next access the Service Policy Manager you are prompted to assign a new password E Note The password must contain at least six digits Changing the password in this manner is global and affects the Configuration program as well Warning 91 Passphrase Entry Failed Symptoms The IAG administrator is prompted to enter a passphrase while working with the IAG for example when activating the configuration After submitting the passphrase a message informs the administrator that the passphrase is incorrect Cause Incorrect passphrase used Resolution Enter the correct passphrase Warning 93 HTTP Request Smuggling HRS Attempt Symptoms A remote
398. tivated since the file was last checked the process starts tracing them If any of the parameters in the existing traces were changed since the last refresh the process applies the new parameters Maximum file size in bytes Error log files Trace log files Log file cleanup parameters N A Note These parameters are defined in the Configuration program and should not be changed in the configuration file For instructions on configuring these parameters see Configuring Log File Cleanup Parameters on page 317 Select whether to report errors which are Trace log reported in the error log in the trace log files files as well If this parameter is configured in both the individual and the general Trace sections the individual settings take precedence 310 Chapter 10 Troubleshooting Error Logging and Process Tracing Sample trace ini General Configuration Section Trace refresh 60 max_size 1468006 high_water 100 low_water 50 instances_kept 3 report_errors yes E Note The high_water low_water and instances_kept parameters are derived from Configuration program definitions Trace Activation When the IAG processes are activated each of the processes examines the trace configuration file At this time any changes in the file relevant to that process such as new traces or changes to existing traces are activated In addition the general parameters and the log file cleanup parame
399. tivity Window Buttons The following table describes the buttons of the Portal Activity window Button Java applet only zl 188 Chapter 6 SSL Wrapper Description Disconnects the item that is currently selected in the Connections area If you select a channel this button disconnects the channel including all the connections that are open through the channel If you select a single connection this button disconnects it Note Disconnecting a connection does not always completely disconnect the application For applications that support reconnection the tunnel listener remains open to allow reconnection if required Displays the open relay of the currently selected application Takes you to the portal homepage of the selected channel or connection without closing the Portal Activity window Closes all open channels and connections and exits the Portal Activity window When using the Activex component the Portal Activity icon is no longer displayed in the Windows System tray Hides the Portal Activity window To show the window again When using the ActiveX component either double click the Portal Activity icon or right click it and select Show Status You can also click the Portal Activity icon on the portal homepage When using the Java applet click the Portal Activity icon on the portal homepage Remote User Interaction with the SSL Wrapper Chapter 7 Network Connector The Network Connect
400. to the user s Trusted Sites list with no user intervention For details refer to Remote Configuration of Users Trusted Sites Lists on page 162 Users can add the JAG site to their Trusted Sites list on demand as shown in the sample prompt below Security Alert x The following site is about to launch one or more applications on your computer or retrieve security information from your computer https mportal microsoft com IV Trust this site Temporarily until disconnect from this site For a limited period of fi E days ma e Once users add a site or a number of sites to the list they can remove them from the list via the System Information window by clicking the button Delete user defined Trusted Sites list this removes all the user defined sites from the list Delete user defined Trusted Sites list Ej https mportal microsoft com System Information 2 Microsoft Internet Explorer ma o ix Saag Whale ications System Information Whale Communications Intelligent Application Gateway Whale Client Components Whale Component Manager Ce leh elena Endpoint Detection VW 3 7 0 12 SSL Wrapper 3 7 0 12 SSL Wrapper Java Applet N A Socket Forwarder LSP W 3 7 0 12 NSP W 3 7 0 12 Network Connector Client W 3 7 0 12 Driver W 3 7 0 12 Not Running Attachment Wiper T W 3 7 G 12 Anti virus eTrust 7 1 Updated 12 5 2006 10 09 02 PM
401. to activate the configuration select the option Apply changes made to external configuration settings and click Activate gt Once the configuration is activated the messages you configured here are reported to the applicable reporter or reporters Event Logging Message Definitions File Note A This section describes the message definitions file For instructions on the steps you need to take in order to edit the file refer to Configuring Event Messages in the Message Definitions File on page 249 Do not make changes to the default file supplied with the IAG The message definitions file MessageDefinition xml holds the definitions of all event messages under the root lt Messages gt element Each message is defined in a dedicated lt Message gt sub element You can edit existing messages or define new messages according to the description and guidelines in lt Message gt on page 250 AN Caution Element names are case sensitive Be sure to follow the guidelines provided here Message definitions that do not follow these guidelines may result in wrong or missing reports 0 In version 2 of the file introduced in version 3 5 a new element was added under each lt Param gt element lt Binary gt described on page 255 If you are editing a version 2 file and you copy into it custom elements which were originally created or edited in a version 1 file be sure to add one lt Binary gt element under each
402. to identify software developers Before trusting this CA for any purpose you should examine its certificate and its policy and procedures if available Examine CA certificate 3 Click OK The certificate is installed on the computer Once the certificate is installed the Certified Endpoint window indicates that this computer is now certified Certified Endpoint Microsoft Internet Explorer Whale ication Certified Endpoint A Microsoft Subsidiary This computer is now Certified Your new certificate has been successfully installed In order for your changes to take effect please close all browser windows Close 4 Click to close the Certified Endpoint window Your computer is now granted Certified Endpoint privileges as set by the administrator 5 Close all open browser windows then re access the portal and log in The Client Authentication dialog box is displayed Intelligent Application Gateway 145 User Guide Client Authentication 2 xi r Identification The Web site you want to view requests identification Select the certificate to use when connecting More Info View Certificate Cancel 6 Select a certificate from the list and click 0K The login process is complete and you are logged on as a Certified Endpoint The Certified Endpoint button or link is no longer available 6s Tip If your portal homepage includes the Whale toolbar you can click to
403. to the look and feel of the portal homepage refer to the Intelligent Application Gateway Advanced Configuration guide to Portal Homepage Configuration on page 54 Some of the applications you can enable through the portal require additional configuration For details refer to the Intelligent Application Gateway Application Aware Settings guide Additional advanced configuration options which are not covered in this chapter are described in Where To Go From Here on page 49 Intelligent Application Gateway 27 User Guide Creating an SSLVPN Portal 28 E Note Before you start the configuration process log on to Windows with full administrator privileges e The first time you access either the Configuration program or the Service Policy Manager you are required to create an encryption key and passphrase for the IAG The key and passphrase serve both IAG applications so that this action is only required once when you subsequently access either application you use the same passphrase Additional information is available as follows For an overview of the encryption mechanism see Encryption on page 21 For details on how to create the encryption keys and passphrase refer to the Intelligent Application Gateway Advanced Configuration guide to Creating Encryption Keys on page 20 You create an SSL VPN Portal in these stages You can optionally use the Service Policy Manager to pre configure th
404. tomUpdate 2 Under the folder you accessed in step 1 create the following file Chapter 5 Endpoint Security Whale Client Components If you wish the changes you make to affect all trunks create the file Instal1lxml inc If you wish the changes you make to be applied to a specific trunk create the following file lt Trunk_Name gt lt Secure 0 no 1 yes gt Instal1lXml inc For example for an HTTPS trunk named MyTrunk create the file mytrunk1Installxml inc If such a file already exists use the existing file 3 Copy the following lines into the file you created in step 2 lt Response write lt Component Name SSL Wrapper ID 1 Install 1 gt Response write lt Component Name Network Connector ID 17 Install q1 n gt if uninstall_lln 0 and remove_lln 0 then Response write lt Component Name Socket Forwarding ID 8 Install wa n gt Response write lt Component Name Socket Forwarding activation Basic ID 33 n Install q n gt Response write lt Component Name Socket Forwarding activation Extended ID 65 n Install 1 n gt Response write lt Component Name Socket Forwarding activation VPN ID 129 n Install 1 n gt end if S gt 4 Comment out the lines that are not applicable by adding at beginning of the line where The following line adds the SSL Wrapper component to the list
405. tomizing User Information Properties on page 132 3 At the bottom right corner of the screen click Submit gt A message is displayed prompting you to confirm the request for a certificate 4 Click to request a certificate Depending on your organization s certification policy one of the following is displayed Ifthe certificate is issued immediately you are notified in the Certified Endpoint window that the certificate has been issued and are prompted to install the certificate on your computer 142 Chapter 5 Endpoint Security Certified Endpoints Whale nications Certified Endpoint A Microsoft Subsidiary Certificate Issued Refer to Installing the Certificate and Logging In as a Certified Endpoint User on page 144 for further details If the certificate is not issued immediately the Certified Endpoint window indicates that the Certified Endpoint request is in progress ixi ma Whale Certified Endpoint M Communications ertfie napoin A Microsoft Subsidiary Certified Endpoint Request in Progress Your request for making this computer certified has been received You must now wait for an administrator to issue the certificate In the meanwhile you can continue using all available portal options Your Request Id is 13 Please check the status of your request in a day or two using the Check your Certified Endpoint request status link on the Portal Hompage Note you must access the link withi
406. tore Defaults IV Activate Network Connector Cancel Remote User Interaction with the Network Connector Remote users launch the Network Connector client via the Network Connector application link on the portal homepage E Note Only one Network Connector client can run on a computer at a time It is recommended that while the Network Connector is active you do not access other IAG portal sites 200 Chapter 7 Network Connector Remote User Interaction with the Network Connector Once the application is launched users are connected to the internal network They can access and be accessed by other network computers They can run additional internal applications without having to launch the application from the portal homepage Users interaction with the Network Connector depends on the SSL Wrapper client component that is installed on their computer as described in Interaction on Computers Running the SSL Wrapper ActiveX Component on page 201 Interaction on Computers Running the SSL Wrapper Java Applet on page 202 Tip For a description of when a computer runs each of the SSL Wrapper clients refer to Whale Client Components on page 147 Interaction on Computers Running the SSL Wrapper ActiveX Component On computers that run the SSL Wrapper ActiveX client component once the Network Connector client is running the traffic of all non web applications that are launched th
407. trates a sample File Access environment where the IAG joins an existing domain Figure 38 Sample Environment with IAG as Part of Domain Domain File File File Access Access Access User User User Intelligent File File File Application Access Access Access Gateway User User User External IP Internal IP interface interface File Access Resource File Access Application Steps you need to take if you are joining the IAG to a Windows NT 4 0 domain or an Active Directory mixed Mode domain 1 At the IAG in the Windows desktop click Start then select Programs gt Administrative Tools gt Local Security Policy The Local Security Settings window is displayed 2 Inthe Tree pane select Local Policies gt Security Options Intelligent Application Gateway 215 User Guide hi Local Security Settings File Action view Help gt m x B Security Settings a Account Policies RSI omain member D git C Disabled E Local Policies R8 Domain member Digitally encrypt secure channel data when Not Defined Audit Policy RE Domain member Digitally sign secure channel data when po Not Defined a User Rights Assignm 8 Domain member Disable machine account password changes Not Defined T DeUEY eros Rg Domain member Maximum machine account password age Not Defined a Public Key Policies RE Domain member Require strong Windows 2000 or later ses Disabled a 2 es Pol Re Interactive
408. ts full connectivity over a virtual transparent connection and enables you to install run and manage remote connections as if they were part of the corporate network For details refer to Chapter 7 Network Connector Tip CD For a description of how the SSL Wrapper is used to handle unsigned HTTP requests generated by both web applications and non web application components refer to the Intelligent Application Gateway Advanced Configuration guide to HAT via Proxy on page 338 Intelligent Application Gateway 173 User Guide Socket Forwarding Activation Modes 174 The Socket Forwarding component comprises two modules Winsock2 Layered Service Provider LSP and Name Service Provider NSP When an application uses Winsock Windows will load either the NSP module when the application performs a name resolution and or the LSP module when the application uses sockets to connect to a remote server The NSP and LSP modules intercept every networking activity performed by the application Though this interception should not pose any problem and is completely transparent to the application there is a slight possibility that the application will not function correctly because of the NSP LSP interception To minimize the risk of potential problems certain applications are included in the LSP NSP moduleg block list Based on this list the NSP and LSP modules can completely disable themselves and stop intercepting networ
409. ts zi 2 Use the Built In tab to configure the settings of the built in reporter EN Note Ifyou disable the built in reporter you will not be able to query logs in the Web Monitor It is recommended that the location where the log files are saved is on the IAG Chapter 9 Monitoring and Control Event Logging Configuring the RADIUS Reporter The RADIUS reporter logs event information to a RADIUS Accounting server This information can then be exported in a format that any standard reporting utility can read and visual statistics about the users and applications can be generated Tip You can install a Windows RADIUS Accounting server on the IAG and log the information there To configure the RADIUS reporter 1 Inthe Configuration program on the Admin menu click Event Logging The Event Logging dialog box is displayed 2 Select the RADIUS tab and check the Enable option A Event Logging x General Built In RADIUS Syslog Mail Enable IP Host Port fi 813 Alternate IP Host Altemate Port fi 813 Secret Key 3 Define the RADIUS Accounting settings as follows Table 25 RADIUS Tab Parameters Parameter Description IP Host IP address or hostname of the RADIUS Accounting server Port Port number of the RADIUS Accounting server Intelligent Application Gateway 243 User Guide Table 25 RADIUS Tab Parameters Cont d Parameter Description
410. ttempt fails and the computer is not connected via the Network Connector Prompt prompt user to select whether to fail the connection attempt or to skip this network and connect to the other networks via the Network Connector Skip connection to this network is skipped The computer is connected to all the other networks via the Network Connector To configure additional networks 1 In the Additional Networks tab activate the option Enable Access to the Following Additional Networks 2 Click Add and use the Add Network dialog box to define the network including IP address mask and conflict handling E Note Make sure that the network s IP address and mask are valid and do not overlap with the network that is defined in the IP Provisioning tab invalid parameters may cause errors when remote users attempt to connect via the Network Connector 3 Repeat step 2 to configure additional networks You can add up to seven networks here 198 Chapter 7 Network Connector Configuring the Network Connector Figure 33 Sample Additional Networks Tab s Network Connector Server xj amp Network Segment E IP Provisioning amp l Access Control ca Additional Networks E Advanced ve Conflict Handling IV Activate Network Connector Cancel Advanced Tab Use this tab to configure advanced server settings The listener area defines the listener of the Network Connector server Note A The p
411. u need to add links to the applications on your custom homepage as described in the Intelligent Application Gateway Advanced Configuration guide in Adding Application Links on a Custom Portal Homepage on page 63 Some of the applications require additional setup For details refer to the Intelligent Application Gateway Application Aware Settings guide Remote User Interaction with the SSL Wrapper Note EN In the Session tab of the Advanced Trunk Configuration window you determine the behavior of SSL Wrapper applications when the portal window closes without the user having logged off the site such as when the browser crashes or when the user accesses a non portal page from within the portal This is configured in the following options Prompt User to Disconnect Channel when Portal Closed without Logoff Re open Portal if User Selects to Keep Channel Open You can configure different settings for default and privileged sessions For details refer to the Intelligent Application Gateway Advanced Configuration guide to Default and Privileged Session Settings on page 137 Intelligent Application Gateway 183 User Guide Remote users access SSL Wrapper applications via the portal homepage You access the Portal Activity Window described in Portal Activity Window on page 184 as follows Portal trunk when one or more SSL Wrapper applications run on a client users can view the status and activi
412. unched via the portal homepage are not tunneled through the Network Connector client in this setup In addition while end users are connected via the Network Connector they can launch any web application directly not via the portal including applications that are not defined as portal applications and applications that are not supported by the IAG Portal web applications can still be launched from the portal as usual N Note Disconnecting the Network Connector client disconnects all the applications that are tunneled through it It does not however disconnect applications that were not tunneled through the Network Connector Network Connector Troubleshooting This section describes the Network Connector troubleshooting options including Troubleshooting the Network Connector Server on page 203 Troubleshooting the Network Connector Client on page 206 Troubleshooting the Network Connector Server This section describes how you can troubleshoot the Network Connector Server as follows Server Logs on page 204 Server Resources on page 205 Network Traffic Logs on page 205 Intelligent Application Gateway 203 User Guide Server Logs The Log section of the Advanced tab of the Network Connector Server window defines the Network Connector server s logging parameters Figure 35 Advanced Tab Log Area r Log Log Level fi LogPath Server Executable Path
413. unk is related to the type of data being transferred HTTP or HTTPS Each trunk is divided into two channels one incoming and one outgoing allowing for bi directional data flow You can configure three types of trunks Portal trunk a forked one to many connection where the same IP address is used to access multiple applications Use it to enable access to any number of web and non web applications for both out of the box and generic applications e Webmail trunk a one to one connection enabling access to a single Webmail application A Webmail trunk is automatically created with authentication application customization and URL inspection rules that are optimized for the Webmail application you are running e Basic trunk a one to one straight line where one IP address routes to a single web server enabling access to any generic web application Supported Browsers On endpoint computers the following browsers are supported Table I Supported Browsers Operating System Supported Browsers Windows 2000 Internet Explorer 6 0 Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Windows XP 2003 Internet Explorer 6 0 7 0 Mozilla family Netscape Navigator 7 1 x 7 2 x Mozilla 1 7 x Firefox 1 0 x and higher Windows Mobile 2003 Pocket Internet Explorer for Pocket PC Intelligent Application Gateway 19 User Guide Table Supported Browsers Cont d
414. ure digital certificates and Certificate Authorities In order to register a computer as a Certified Endpoint end users need to install a unique certificate provided by the organization on their computers To provide users with the required certificate this feature may make use of any Certificate Authority CA installed on a remote computer any computer other than the IAG In addition for Portal trunks the IAG provides built in support for Microsoft CA installed locally on the IAG Note gi The Certified Endpoint feature is only supported on HTTPS trunks e Activating the option Disable Component Installation and Activation in the Session tab of the Advanced Trunk Configuration window disables the Certified Endpoints feature For details refer to the Intelligent Application Gateway Advanced Configuration guide to Session Configuration on page 133 Certified Endpoint Configuration Overview 118 There are two ways of setting up the Certified Endpoint feature depending on where the CA is installed Using Microsoft CA installed on the IAG This setup is only applicable for Portal trunks and is described in Enabling Certified Endpoint Using Microsoft CA Locally on page 119 Using any CA installed on a remote computer This setup can be used with any HTTPS trunk and is described in Enabling Certified Endpoints Using a Remote CA on page 122 Chapter 5 Endpoint Security Certified Endpoints
415. uring tests In the message box indicates an alarm Alarms should be handled immediately as they indicate serious IAG problems gt indicates a warning Warnings contain information you may need to take into consideration but which does not necessarily have an immediate effect on the operation of the IAG After viewing the message box click in the message box to continue running the tests To run a Support Utilities test le On the IAG open a Command prompt and enter the command string in this format whltest lt option gt lt option gt lt name gt lt name gt Where lt option gt indicates a required test option and lt name gt contains the name of the test you wish to run For example whitest n system where one test system is run with one option n Press lt Enter gt The test is run according to the parameters you entered in the command line A log file is created whenever a test is run containing any alarms or warnings as well as general information gathered during the tests The log file is named according to the IAG trace mechanism log file conventions described in File Location and Naming on page 311 Chapter 10 Troubleshooting Support Utilities Note For security reasons it is recommended that you delete the Support Utilities log files after viewing them including deletion from the Windows Recycle Bin since they are not encrypted and contain the results o
416. us definitions of the Norton anti virus were updated within the last seven days can be defined as follows DateDiff d Components_AV_Norton_LastUpdate Now lt 7 Tip To see a sample expression in the Policies dialog box select the expression Symantec Norton Anti Virus Up To Date Sample and click Edit For details refer to Configuration in the Advanced Policy Editor on page 106 Intelligent Application Gateway 105 User Guide Configuration in the Advanced Policy Editor This section describes how you use the Advanced Policy Editor to edit and create policies and expressions in Script mode For details on creating policies in Basic mode refer to Basic Policy Configuration on page 1038 To configure policies and expressions in Script mode 1 Access the Policies dialog box as described in Basic Policy Configuration on page 103 2 Do one of the following To edit an existing policy select the policy and click Edt To edit an existing expression click the sign to expand the Expressions group select the expression you wish to edit then click Edit To create a new policy or expression click Add In this case the basic Policy Editor is displayed To access the Advanced Policy Editor click Create As Script The Advanced Policy Editor is displayed Figure 19 Sample Policy Editor Advanced Policy Editor xi Components E a Expressions Any Antivi
417. user attempts to access an application from the portal homepage The request is denied and the following message is displayed in the browser window HTTP Request Smuggling HRS attempt detected Cause The request is suspected as being an HRS attack as indicated by its method content type and length Resolution To define this request as legal for this application take the following steps in Configuration program 1 Open the Application Properties dialog box for this application and access the Web Server Security tab 2 Ifthe option Activate Smuggling Protection is not already activated activate it Intelligent Application Gateway 367 User Guide AN Caution Activate this option only for servers that are vulnerable to HRS attacks such as IIS 5 0 based servers Activating this option unnecessarily or configuring it inaccurately might result in application malfunction 3 Configure the option to enable the request by doing one or both of the following Add the request s content type to the Content Types list Define the Max HTTP Body Size option to be equal to or larger than the size of the request For details refer to Web Server Security Tab on page 78 Warning 94 Unencrypted Cookie Name Symptoms A remote user requests a page The request is processed and the user experience is unaffected However a Cookie header in the request is blocked and is not forwarded to t
418. users can proceed to make their computers Certified Endpoints in one of the following ways e Local CA installation as described in End User Interaction Local CA Only on page 140 e Remote CA installation end users need to request a certificate by means determined by the administrator Backing Up the Certificate Settings All CAs Make sure that you have a backup of the private key If not create backup files via the certificate store After the initial backup make sure to back up the certificate settings from time to time especially before any IAG software upgrade or installation or any other changes to system settings CD Tip For instructions on how to back up the certificate see http 7 www thawte com ssl digital certificates hni iis6 html End User Interaction Local CA Only Note A This section is applicable only if the CA is installed locally on the IAG Once the Certified Endpoint Enrollment application is added to the trunk the appropriate tools need to be added to the end user pages The available tools depend on whether you are using the default portal homepage or your own custom page as follows Ifyou use the default portal homepage the following happens automatically The Certified Endpoint button is added to the Whale toolbar A Certified Endpoint link er Make this computer certified is added to the portal homepage Ifyou use a custom page you must ensure that one or bot
419. ut significant condition such as users changing their password Warning events that might be problematic but don t result in malfunction For example an unauthorized access attempt Error a significant problem such as a failure to read the configuration Time when the event occurred Message ID Tip For Warning and Error messages click the ID number to view troubleshooting information for the message Short description of the event Events are categorized as follows System events such as service startup and shutdown and changes to the configuration Security events including login success or failure security policy violation or change and password change Session events including session start or stop number of sessions and other session related events Application events such as access to the application Chapter 9 Monitoring and Control Web Monitor Table 37 Event Parameters Parameter Description Trunk Name of the trunk where the event was generated Description Long description of the event Event Query In the Event Query window you can query events that are recorded by the built in reporter of the Event Logging mechanism For a description of the Event Logging mechanism see Event Logging on page 237 For a description of the built in reporter including configuration instructions see Configuring the Built In Reporter on page 242 Note EX If you disable the built in
420. uthentication and User Group Servers dialog box the Novell Directory server you defined is added to the list of authentication servers 232 Chapter 8 Providing Access to Internal File Systems File Access Authentication and User Group Servers f x 9 WhaleFileSharing 9 whalecom 5 Edit of Novell __ Fat Remove Novell Directory Server Added to List Help Close Close the Authentication and User Group Servers dialog box In the main window of the Configuration program next to Advanced Trunk Configuration click to open the Advanced Trunk Configuration window Select the Authentication tab In the Authentication tab in the top left area click to the right of the Select Authentication Servers list Authenticate User on Session Login Select Authentication Servers gf whalecom Click this button o 4 The Authentication and User Group Servers dialog box is displayed In the Authentication and User Group Servers dialog box select the server you defined in step 3 then click Select The Authentication and User Group Servers dialog box closes In the Authentication tab the Novell Directory server you defined is added to the list of servers in the Authentication tab Iv Authenticate User on Session Login Select Authentication Servers g8 whalecom Add a Novel Remove t Novell Directory Server Added to List
421. vating this option protects the application against HTTP Request Smuggling attacks by blocking requests where the following conditions prevail The method is POST The content type is not listed in the content type list The length is larger than the size defined here or both Caution Activate this option only for servers that are vulnerable to HRS attacks such as IIS 5 0 based servers Activating this option unnecessarily or configuring it inaccurately might result in application malfunction POST requests of a content type other than the types listed here are blocked if they are larger than the size defined in Max HTTP Body Size POST requests of a size larger than defined here are blocked if they are not listed in the Content Types list Intelligent Application Gateway 79 User Guide Cookie Encryption Tab 80 This tab is applicable in Portal trunks only for Web Applications and Browser Embedded Applications You can use it to encrypt the application server s Set Cookie headers in order to hide cookie names and values and protect them against unauthorized changes E Note Once a cookie is encrypted it cannot be manipulated by the application customizers lt HEADER_CHANGE gt element For details refer to the Intelligent Application Gateway Advanced Configuration guide Application customizers are described in Chapter 7 Application Customizers The lt HEADER_CHANGE gt element
422. vents can be logged by several reporters including both IAG tools and third party network reporting solutions as described in Event Logging on page 237 The Web Monitor enables anywhere anytime snapshot viewing of IAG events as well as event filtering and analyzing Where an IAG High Availability Array is deployed you can use the Web Monitor to monitor all the IAG servers that are part of the Array For details refer to Web Monitor on page 258 You can monitor SSL connection attempts in the Windows Event Viewer as described in SSL Event Monitoring on page 301 Event Logging This section describes the IAG Event Logging as follows The Event Logging mechanism is described in Overview on page 238 Although by default no configuration is required in order for the Event Logging to work and IAG related events are logged and reported with no user intervention several configuration options are available to you if you wish to adapt message reporting to your needs Those are listed in Optional Event Logging Configuration Steps on page 239 and are described in detail in the subsequent sections For advanced troubleshooting purposes you can temporarily disable the Event Logging mechanism altogether as described in Disabling Event Logging and Reporting on page 258 Tip You can troubleshoot warnings and errors that are reported by the Event Logging mechanism according to the message that is
423. ver Certificate Server Certificate 2 edinburgh amp be Certificate Hash 5 AG EA 94 47 C4 9C 24 F4 68 7B 1200620515 86 F4 CE 39 The Server Certificate parameters are applicable in HTTPS Connections trunks only they do not appear in this tab in HTTP Connections trunks Cancel 3 Edit the parameters in the General tab as required as described in Advanced Trunk Configuration General Tab on page 63 4 When you complete editing all the required options for the filter click OK The Advanced Trunk Configuration window closes and you are returned to the main window of the Configuration program 5 In the main window of the Configuration program click H to save and activate the configuration The trunk will function according to the configured settings Chapter 3 Single Application Sites Editing Trunks Table 5 Advanced Trunk Configuration General Tab Parameter IP Address HTTP HTTPS Ports Site Name Enable Web Server Logging Include Username in Log Debug Mode Description Read only IP address of the external website on the IAG Tip You can edit the IP address of the external website in the main Configuration window HTTP and HTTPS ports of the external website Note The port that corresponds with the Connections type of this trunk cannot be edited here You edit it in the main Configuration window For example for an HTTP Connections trunk you edit
424. ver Settings Tab on page 85 e Verify that the application server is running e Verify that the application server is reachable from the IAG If not check the following Network connections e Verify the configuration of the ISA firewall rule that enables the connection from the IAG to the application server For details examine the ISA logs and alerts and if necessary consult ISA troubleshooting Warning 76 Failed to Start Application Symptoms A remote user attempts to launch an SSL Wrapper application either via the portal homepage or by logging into a site that automatically launches the application The request is denied and a message is displayed informing the user that the server failed to execute the application 362 Appendix A Troubleshooting Event Logging Messages Cause The IAG failed to load and initialize the application profile from the Configuration program The cause for the error is reported in the message in the Error field It can be due to incorrect configuration of the application server in the Configuration program For example an invalid IP address port or path Resolution Verify the configuration of the application server in the Configuration program in the Application Properties dialog box in the Server Settings tab For details refer to Server Settings Tab on page 85 Warning 77 Unauthorized Access Attempt Symptoms A remote user attempts to launch an SSL Wrappe
425. vided in the Description field of the event in the Web Monitor s Event Viewer 370 Appendix A Troubleshooting Event Logging Messages Warning 98 Cookie Value Cannot be Decrypted Symptoms A remote user requests a page The request is processed and the user experience is unaffected However a Cookie header in the request is blocked and is not forwarded to the server Cause A cookie encryption violation was detected An encrypted cookie value could not be decrypted since it contains an invalid security digest Resolution In the browser that was used to request the page delete the cookie that was blocked The name of the cookie is provided in the Description field of the event in the Web Monitor s Event Viewer Warning 99 Name of Included Cookie not Encrypted Symptoms A remote user requests a page The request is processed and the user experience is unaffected However a Cookie header in the request is blocked and is not forwarded to the server Cause A cookie encryption violation was detected The cookie name is not encrypted although it is listed in the cookie encryption include list Resolution In order to enable the browser to send this cookie in an unencrypted from you need to remove it from the list of cookies that are included in the cookie encryption process Take the following steps in the Configuration program 1 Open the Application Properties dialog box for this a
426. whlbackup log Backing up the Configuration You can backup the configuration in one of the following methods From within the Configuration interface as described in Backing up the Configuration in the Configuration Program on page 304 By running a Console application in a Command line as described in Running the Backup Utility as a Console Application on page 305 Note EN The BackUp utility can be run as is using the default settings or can be configured If you need to configure the utility contact technical support for further details Backing up the Configuration in the Configuration Program You can select to back up the configuration settings each time you activate the configuration in the Configuration program To back up the configuration in the Configuration program 1 Inthe Configuration program when you click O to activate the configuration the following is displayed 304 Chapter 10 Troubleshooting Backup amp Restore Utility Configuration Eg 5j Activate Configuration We recommend that you back up the configuration settings directly after the initial configuration Following the initial backup make sure to back up the configuration settings each time you modify them in order to ensure that the backup is updated at all times Back up configuration after activation If you have made manual changes to any of the external configuration settings such as changes to XML files or to Reg
427. wnload Upload tab described on page 82 The Restricted Zone option is activated in the Web Settings tab described on page 73 70 Chapter 4 Application Settings Editing Application Properties Web Servers Tab This tab is available in Portal trunks only for Built In Services Web Applications and Browser Embedded Applications It contains the configuration of the application s web server or servers The parameters of this tab are described in Table 8 on page 71 Figure 9 Application Properties Web Servers Tab Application Properties Citrix NFuse FR2 Direct xi E General 4P Web Servers web Settings Gl Web Sen4 gt Address Type P Host Subnet Regular Expression Addresses 132 168 1 56 132 168 1 69 132 168 1 73 Paths lswet HTTP Potts jeo HTTPS Ports J Add Default Port to Host Table 8 Web Servers Tab Parameters Parameter Description Address Type Select a method by which to define the address of the application server IP Host Subnet or Regular Expression Intelligent Application Gateway 71 User Guide 72 Table 8 Parameter IP Host Subnet Regular Expression Paths HTTP Ports HTTPS Ports Add Default Port to Host Web Servers Tab Parameters Cont d Description Define an address or multiple addresses using IP addresses or hostnames by double clicking an empty line in the Addresses list and entering an IP address or hostname fo
428. xistence of the most commonly used endpoint security tools such as anti virus and personal firewall as well as client configuration settings such as Whale Client Components operating system and user privilege level For configuration instructions refer to Basic Policy Configuration on page 103 Use the Advanced Policy Editor for more complex policies or attributes that are not presented in the basic editor Once you edit a policy in the Advanced Policy Editor you will only be able to open it for further editing in the Advanced Policy Editor you will not be able to revert to editing in the basic Policy Editor For detailed configuration instructions refer to Advanced Policy Configuration on page 104 Note A When you edit a policy the changes you make affect all the Whale Client Components that use this policy For example If the policy is used to control both session access and application access changes you make to the policy will affect both session and application access In order to apply changes to a specific component only create a dedicated policy and use it with the applicable component All default policies can only be edited in the Advanced Policy Editor since they contain complex expressions Chapter 5 Endpoint Security Endpoint Policies Basic Policy Configuration This section describes how you use the Policy Editor to edit and create policies and expressions in Basic mode For details on cre
429. y if the application is not located in the root folder For example if the application is located under a subfolder named MyApplication enter MyApplication in this field Webmail trunks by default the default installation path of the application for example exchange for Microsoft Outlook Web Access applications If the application resides under a different path change this field accordingly This parameter is defined during the creation of the trunk with the Create New Trunk Wizard Editing in the General Tab This section describes the parameters that you can edit in the General tab of the Advanced Configuration window as illustrated in Figure 5 on page 62 To edit parameters in the General tab 1 Inthe Configuration program select the trunk in the List pane 2 Inthe Security amp Networking area next to Advanced Trunk Configuration click Configure The Advanced Trunk Configuration window is displayed Intelligent Application Gateway 61 User Guide 62 Figure 5 Advanced Trunk Configuration General Tab 4 Server Name Translation UBL Inspection 2 Global URL Settings El URL Set 2 General as Authentication 2 Session Application Customization m External Website r Website Logging IP Address J Enable Web Server Logging F Include Username in Log HTTP Port 30 X HITPS Port S443 y r Debugging Site Name J Debug Made m Ser
430. zers Configuring a High Availability array as described in Chapter 9 Configuring the High Availability Array Intelligent Application Gateway 57 User Guide Configuring the Form Authentication engine The engine handles HTML login and change password forms sent by the application as described in Appendix C Form Authentication Engine E Note You can delete a trunk in the Configuration program by selecting the trunk in the List pane and selecting Delete from the right click menu Creating a Redirect Trunk 58 When you create an HTTPS trunk only HTTPS requests that arrive at the IAG are handled by the trunk If you want the IAG to automatically redirect HTTP requests to the HTTPS trunk you can create an additional Redirect trunk as described in the following procedure Before you create a Redirect trunk please note the following Make sure that you have already created the HTTPS trunk to which you wish to redirect HTTP requests For Webmail and Basic trunks see Creating a Webmail or a Basic Trunk on page 54 e For Portal trunks refer to Chapter 2 SSL VPN Portals Make sure to complete the definition of all the parameters of the HTTPS Connections trunk before you create the Redirect trunk including definitions you make in the Configuration program after completing the New Trunk Wizard If ata later stage you change the IP address or port number of the HTTPS Connections trunk do on

Download Pdf Manuals

image

Related Search

Related Contents

Wi-Fi Remote  Texte intégral PDF (740 ko)  Communication bridge Xcom-MS  Gestion des déchets chimiques  

Copyright © All rights reserved.
Failed to retrieve file