BlackRidge BR-2120
Gateway for AWS
Setup Guide
BlackRidge Technology Inc. 10615 Professional Circle Suite 201 Reno, NV 89521
U.S.A
Part No. 2120-0030-01 Revision 1.0, September 2016
1
Preface .................................................................................................................................. 7
About This Guide ......................................................................................................................... 7
Related Material ................................................................................................................... 8
Who Should Use This Guide ........................................................................................................ 9
How This Guide is Organized .................................................................................................... 10
Typographical Conventions ....................................................................................................... 11
SECTION I ............................................................................................................................ 12
Task Map for the BlackRidge BR-2120 TAC Gateway for AWS ............................................... 13
SECTION II ........................................................................................................................... 14
Identify Security Use Case & BlackRidge Solution Requirements ........................................... 15
Security Problem ....................................................................................................................... 15
Setup Requirements ................................................................................................................. 15
VPC Requirements for the BR-2120 Gateway for AMS ......................................................... 16
Select Resources to Trust and to Protect .............................................................................. 17
Criteria to Determine Role(s) ............................................................................................... 18
Trusted Hosts: ................................................................................................................... 18
Protected Resources: ......................................................................................................... 18
Design the Network Topology .............................................................................................. 19
Port Assignments for the BR-2120 Gateway for AWS............................................................ 20
SECTION III .......................................................................................................................... 21
Create and Configure Virtual Private Cloud .......................................................................... 22
Task: Create VPC ....................................................................................................................... 23
Task: Configure Internet Gateway ............................................................................................ 24
Task: Create Subnets ................................................................................................................. 25
Task: Create Route Tables ......................................................................................................... 27
Task: Create Route Under the MGMT Route Table................................................................... 30
2
Task: Create Security Groups .................................................................................................... 31
SECTION IV .......................................................................................................................... 35
Launch and Configure a Gateway AMI Instance ................................................................... 36
Task: Configure and Launch an AMI Instance ........................................................................... 36
Task: Stop the AMI Instance ..................................................................................................... 42
Task: Review Settings of the eth0/Management Interface for the AMI Instance .................... 42
Task: Create Additional Interfaces for the AMI Instance .......................................................... 43
Task: Attach Additional Interfaces to the AMI Instance ........................................................... 45
Task: Allocate a New Elastic IP Address for the MGMT Interface ............................................ 46
Task: Associate Elastic IP with MGMT Interface ....................................................................... 47
Task: Modify Route Table for (Trusted + Protected) Side of BRT GW ....................................... 49
Task: Disable Source/Destination Check for Untrusted and Trusted Interfaces ....................... 51
Task: Disable Source/Destination Check for Untrusted and Trusted Interfaces ....................... 53
Task: Associate Elastic IP with the Public/Untrusted Interface ................................................ 54
SECTION V ........................................................................................................................... 55
Deploy a Jump Host into the MGMT Subnet in VPC .............................................................. 56
Task: Create the Jump Host Instance ........................................................................................ 57
Task: Assign an Elastic IP to the Jump Host .............................................................................. 64
SECTION VI .......................................................................................................................... 68
Deploy a (Trusted + Protected) Host into Trusted Subnet in VPC ........................................... 69
Task: Provision an Instance of the Amazon Linux AMI ............................................................. 70
Task: Check Boot Status through AWS CLI ................................................................................ 76
Task: SSH into Trusted + Protected Instance ............................................................................. 77
Task: Configure Static Networking and Routes on the Trusted + Protected Instance .............. 78
SECTION VII ......................................................................................................................... 80
Configure Layer 3 NAT – External-to-VPC (Unidirectional) .................................................... 81
3
Task: Inserter – Generate and Export SKEY ................................................................................... 86
Task: Resolver – Import SKEY ........................................................................................................ 86
Task: Inserter – Add NAT and Routes ............................................................................................ 86
Task: Inserter – Add NAT and Routes ............................................................................................ 87
Task: Inserter – Add and Enable Identity ...................................................................................... 88
Task: Inserter – Create Trusted Host and Associate Identity ........................................................ 88
Task: Resolver – Add and Enable Identity Using SKEY .................................................................. 89
Task: Resolver – Add Protected Resource ..................................................................................... 89
Task: Resolver – Add Rule and Link Identity.................................................................................. 90
Task: Inserter – Enable Enforce Mode .......................................................................................... 90
Task: Resolver – Enable Enforce Mode ......................................................................................... 90
SECTION VIII ........................................................................................................................ 91
Configure Layer 3 NAT – VPC-to-VPC (Bidirectional) ............................................................. 92
Task: Inserter + Resolver – Add NAT and Routes .......................................................................... 94
Task: Inserter + Resolver – Configure Trusted Host and Protected Resource ............................... 95
Task: Inserter – Generate and Export SKEY ................................................................................... 95
Task: Resolver – Import SKEY ........................................................................................................ 96
Task: Inserter – Add and Enable Identity ...................................................................................... 96
Task: Inserter – Associate Identity with Trusted Host ................................................................... 97
Task: Resolver – Add and Enable Identity Using SKEY .................................................................. 97
Task: Resolver – Add Rule for and Link Identity to Protected Resource ....................................... 97
Task: Inserter – Enable Enforce Mode .......................................................................................... 98
Task: Resolver – Enable Enforce Mode ......................................................................................... 98
SECTION IX .......................................................................................................................... 99
Add Certificates to BlackRidge TAC Gateway...................................................................... 100
Initiate a BlackRidge Certificate Signing Request (CSR) ....................................................... 101
4
Task: Generate BlackRidge TAC Gateway Keys ...................................................................... 102
Task: Generate a Certificate Signing Request (CSR) ............................................................... 102
Loading the BlackRidge Technology-Signed Certificates ........................................................ 103
Task: Extract the Encrypted Certificate File ............................................................................ 103
Importing Certificates into TAC Gateway ............................................................................... 107
Task: Import the Root and Intermediate Certificates ............................................................. 107
Task: Import the BlackRidge TAC Gateway Certificates ......................................................... 108
Task: Validate the BlackRidge TAC Gateway Certificates ....................................................... 108
SECTION X ......................................................................................................................... 109
Testing the Configuration .................................................................................................. 110
Task: Test the Gateways’ Ability to Route Locally in Layer 3 Mode ........................................... 110
Task: Test the Trusted + Protected Connection Using SSH ......................................................... 110
SECTION XI ........................................................................................................................ 111
Set Transport Access Control (TAC) Mode of Operation ...................................................... 112
Task: Display TAC Mode .......................................................................................................... 113
Task: Set TAC Mode as “Bridge” ............................................................................................. 113
Task: Set the TAC Mode as “Monitor” .................................................................................... 114
Task: Set the TAC Mode as “Enforce” ..................................................................................... 114
Congratulations ................................................................................................................. 115
Appendix A: Accessing the BlackRidge Gateway (SSH) ........................................................ 116
Using PuTTY and SSH to Access the Gateways ....................................................................... 116
Appendix B: CLI Commands for Configuring the IP Network Attributes of the BlackRidge TAC Gateway ........................................................................................................................... 119
Configure DHCP Network Settings for the Management Port ............................................... 119
cfg (static IP) - Configure IPv4 Network Settings for the Management Port ......................... 120
/etc/mgt/ipv6/ – Configure an IPv6 Address on the admin Port ......................................... 121
5
add – Associate IPv6 Addresses with the Management Port ................................................. 121
del – Remove IPv6 Addresses from the Management Port ................................................... 121
disable – Disable IPv6 on the Admin Port ............................................................................... 122
enable – Enable IPv6 on the Admin Port ................................................................................ 122
mod – Modify IPv6 Address on the Admin Port ..................................................................... 123
Appendix C: CLI Commands for Configuring the DNS Network Attributes of the BlackRidge TAC Gateway ........................................................................................................................... 124
/etc/dns/ - DNS Configuration ........................................................................................... 124
cfg - Configure DNS ................................................................................................................. 124
show - Show DNS Settings ...................................................................................................... 125
Appendix D: CLI Commands for Configuring the Host Name Attributes of the BlackRidge TAC Gateway ........................................................................................................................... 126
/etc/hostname/ - Host Name and Domain Name Configuration ......................................... 126
cfg - Configure Hostname ....................................................................................................... 126
show - Show the Hostname and Domain Name ..................................................................... 127
6
Copyright © 2016 BlackRidge Technology, Inc. All rights reserved.
This document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this document may be reproduced in any form by any means without prior written authorization of BlackRidge Technology Inc. Documentation is provided as is without warranty of any kind, either expressed or implied, including any kind of implied or expressed warranty of non-infringement or the implied warranties of merchantability or fitness for a particular purpose.
BlackRidge Technology Inc. reserves the right to change any products described herein at any time and without notice. BlackRidge Technology Inc. assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by BlackRidge Technology Inc. The use and purchase of this product does not convey a license under any patent rights, trademark rights or any other intellectual property rights of BlackRidge Technology Inc.
Document Part Number: 2120-0030-01
7
Preface
About This Guide
The BlackRidge BR-2120 is a TAC Gateway for Amazon™ Web Services (AWS). There are a number of initial tasks that must be completed to set up the TAC Gateway(s) for network access and operation. This document contains the instructions for deploying a single BlackRidge TAC Gateway into the AWS Elastic Compute Cloud (EC2) cloud server.
The setup instructions are divided into a number of categories, each of which contains one or more basic tasks to complete. These tasks are designed to simplify the overall process of setting up your gateway(s) to be operational and connected to the network.
This Setup Guide provides guidance in the following procedures:
Identifying resource requirements
Selecting resources to trust and protect
Designing a network topology
Creation of a Virtual Private Cloud (VPC)
Deployment of a Gateway from AMI
Deployment of a Management Instance in AWS
Deployment of trusted hosts/protected resources in AWS
Configuration of Layer 3 mode for the Gateway in AWS
Connecting an Insertion Gateway in an external network to a Resolving Gateway in AWS (Unidirectional)
Connecting an Insertion Gateway to a Resolving Gateway in AWS between VPCs (Bidirectional)
Testing the configuration
Use this Setup Guide as the prerequisite to the BlackRidge TAC Gateway - Quick Start Guide.
8
Related Material
The BlackRidge documentation set consists of:
BlackRidge TAC Gateway - Getting Started Guide provides a high-level roadmap for
leveraging the documentation set to successfully install and configure each model of the
BlackRidge family of gateway products.
BlackRidge BR-3110 1G Branch TAC Gateway - Setup Guide outlines the steps required
to set up the gateway for network access and operation.
BlackRidge BR-2110 1G Virtual TAC Gateway - Setup Guide outlines the steps required to
set up the gateway for network access and operation.
BlackRidge BR-2210 10G Virtual TAC Gateway - Setup Guide outlines the steps required
to set up the gateway for network access and operation.
BlackRidge BR-3100 1G Enterprise TAC Gateway - Setup Guide outlines the steps
required to set up the gateway for network access and operation.
BlackRidge BR-3120/BR-3121 1G Enterprise TAC Gateway - Setup Guide outlines the
steps required to set up the gateway for network access and operation.
BlackRidge BR-3220-T/BR-3221-T 10G Enterprise TAC Gateway - Setup Guide outlines
the steps required to set up the gateway for network access and operation.
BlackRidge BR-3220-F 10G Enterprise TAC Gateway - Setup Guide outlines the steps
required to set up the gateway for network access and operation.
BlackRidge BR-3221-SR/BR-3221-LR 10G Enterprise TAC Gateway - Setup Guide outlines
the steps required to set up the gateway for network access and operation.
BlackRidge BR-2051 Gateway for IBM z Systems - Setup Guide outlines the steps
required to set up the gateway for network access and operation on the IBM z Systems
platform.
BlackRidge BR-2061 Gateway for z/VM Systems - Setup Guide outlines the steps
required to set up the gateway for network access and operation on the IBM z/VM®
platform.
BlackRidge BR-2120 Gateway for AWS - Setup Guide outlines the steps required to set
up the gateway for network access and operation on the Amazon Web Services™ (AWS)
platform.
BlackRidge TAC Gateway - Quick Start Guide describes the concepts and procedures to
configure cloaking and Static Identities for unidirectional authentication of IPv4 network
endpoints.
BlackRidge TAC Gateway - Configuration Guide describes the advanced concepts and
procedures to configure cloaking, Static and Dynamic AD Identities for bidirectional
authentication for multiple IPv4 and IPv6 network endpoints.
BlackRidge TAC Gateway – Command Reference Guide contains the descriptions of the
commands, arguments and options that are used by the administrator to set up,
configure, and maintain the BlackRidge TAC Gateways.
9
Who Should Use This Guide
This guide is intended for experienced systems and networking IT professionals who are responsible for the initial setup of the BlackRidge BR-2120 TAC Gateway for AWS.
10
How This Guide is Organized
Section I provides a high-level map of the tasks that are performed during the initial setup of the gateway. It acquaints the administrator with the scope of the activities involved with connecting the gateway to the network.
Section II provides a sample network topology based on a pre-defined use case, and the resources that are required to architect it. Each port on the BlackRidge gateway is uniquely identified with a description of its function. Deciding what operational roles to assign the network endpoints is based on the criteria provided in this section.
Section III provides procedures for creating and configuring the Virtual Private Cloud (VPC).
Section IV outlines the procedure for launching and configuring an AMI instance.
Section V provides procedures for deploying a jump host into the MGMT Subnet in VPC.
Section VI describes how to deploy a trusted + protected host into the trusted subnet in the VPC.
Section VII describes the configuration of Layer 3 NAT, external-to-VPC (unidirectional).
Section VIII describes the configuration of Layer 3 NAT, VPC-to-VPC (bidirectional).
Section IX provides procedures for adding certificates to a BlackRidge TAC gateway.
Section X contains instructions for testing the gateway configuration.
Section XI outlines the procedures for setting the TAC mode of operation.
Appendix A: contains instructions for accessing the BlackRidge TAC Gateway using SSH.
Appendix B: contains CLI commands for configuring the IP network attributes of the Blackridge TAC Gateway.
Appendix C: contains CLI commands for configuring the DNS network attributes of the BlackRidge TAC Gateway.
Appendix D: contains CLI commands for configuring the host name and domain name attributes of the BlackRidge TAC Gateway.
11
Typographical Conventions
This document uses the following typographic conventions to help you locate and identify information:
Italic text
Identifies new terms, emphasis, and book titles
Bold text
Identifies button names and other items that you can click or touch in the graphical user interface or press on a computer keyboard
Courier New
Identifies commands, command syntax, command arguments and system prompts
Bold Courier New
Identifies command strings being executed by the system through the CLI.
Note: Notes provide extra information about a topic that is good to know but not essential to the process.
Caution: Cautions draw your attention to actions that could compromise the security of your system or result in the loss of data.
13
Task Map for the BlackRidge BR-2120 TAC Gateway for AWS
Set the Transport Access Control (TAC) Mode of Operation
Bridge Monitor Enforce
INITIATE
Certificate Signing Request (CSR)
VALIDATE
Network connectivity for the BlackRidge BR-2120 Gateway for AWS
CONFIGURE
Layer 3 mode for the BlackRidge BR-2120 Gateway for AWS
DEPLOY
Gateway from AMI, management instance and trusted hosts/protected resources
CREATE
Virtual Private Cloud
DESIGN
Network topology
SELECT
Resources to trust and protect
IDENTIFY
Security use case and the BlackRidge solution requirements
15
Identify Security Use Case & BlackRidge Solution Requirements
Security Problem
For the purpose of this document, the security problem is defined as the need to provide a level of security protection that is only available through BlackRidge Technology. The objective is to protect a critical network-attached resource from both internal and external reconnaissance and unauthorized access.
For this sample configuration, the virtual-network-attached resource is a server Virtual Machine (VM) running on a Linux platform. Since it is identified as a resource to be protected by the BlackRidge solution, it is designated a Protected Resource.
Only one system is identified as being trustworthy to be given access to the Protected Resource. That system is a Linux client. Since it has been identified as an endpoint to be trusted by the BlackRidge solution, it is designated a Trusted Host. It is the only resource granted authorized access to the Protected Resource.
Setup Requirements
The following is required to set up the BR-2120 TAC Gateway for AWS:
Account created in AWS.
Latest build of Gateway uploaded into AWS and available to AWS user account. Note: In a future version, the latest build will be available through the AWS Market Place.
16
VPC Requirements for the BR-2120 Gateway for AMS
Since it runs in a Virtual Private Cloud (VPC), there are no Physical Host requirements for the BR-2120 Gateway for AMS. However, the following components must be configured:
Untrusted Subnet
Jump Host/Management Virtual Machine
Note: The AMI Instance for the jump/management host can be a t2.micro. The BlackRidge GW AMI AWS requirement, however, is t2.medium.
o Trusted Subnet
With Corresponding security group (shown later in document)
o Management Subnet
With Corresponding security group (shown later in document)
o Public/Untrusted Subnet
With Corresponding security group (shown later in document)
o Three Elastic IP addresses (for Internet Access to BRT GW, Jump/Management Host and the Trusted resource NAT IP)
17
Select Resources to Trust and to Protect
For the purpose of the sample configuration, it has been decided that the following trust relationships will be established:
The Linux client (VM) or a Windows client (VM) is designated as the Trusted Host.
The Linux server (VM) is designated as the Protected Resource.
The two BlackRidge BR-2120 gateways will cooperate in establishing trusted
communications between the Windows or Linux client and the Linux server.
In this guide, the BlackRidge BR-2120 Gateway for AWS, with the user-defined hostname Gateway-1, will control which connected network endpoints can establish an outbound TCP/IP connection to a Protected Resource behind another BlackRidge gateway. This is done through the process of inserting Transport Access Control (TAC) tokens.
Since Gateway-1 is inserting the TAC tokens on behalf of its trusted network endpoints, it is referred to as the TAC Token Insertion Gateway. Only Trusted Hosts will have the TAC token inserted. Since all other devices will not have these tokens inserted, they are unable to establish outbound TCP/IP connections to BlackRidge Protected Resources.
The BlackRidge BR-2120 Gateway for AWS, with the user-defined hostname Gateway-2, will control which remote network endpoints can access a Protected Resource(s) attached to it. This is done through the process of resolving the TAC tokens that were inserted by the TAC Token Insertion Gateway (Gateway-1).
Since Gateway-2 is resolving the TAC tokens that were inserted by Gateway-1, it is referred to as the TAC Token Resolution Gateway. Only Trusted Hosts with valid TAC tokens that are successfully resolved by the TAC Token Resolution Gateway, are authorized to access a Protected Resource.
18
Criteria to Determine Role(s)
The following criteria can be used to determine what role (Trusted Host or Protected Resource) a particular network endpoint should be assigned:
Trusted Hosts: Any BlackRidge-authenticated network endpoint that is given access to a BlackRidge-
protected, network-attached asset, is by definition a Trusted Host.
A single network endpoint can be configured as Trusted Host or a Protected Resource, or
both.
If the network endpoint is to only initiate outbound TCP/IP connection requests through
its BlackRidge gateway, configure it as a Trusted Host.
If the network endpoint is to initiate both outbound TCP/IP connection requests and
accept inbound TCP/IP connection requests through its BlackRidge gateway, configure it
as both a Trusted Host and a Protected Resource.
Protected Resources: All networked attached assets (for example, servers and devices) that are protected by
the BlackRidge gateway are by definition a Protected Resource.
A single network endpoint can be configured as Protected Resource or a Trusted Host, or
both.
If the network endpoint is to only accept inbound TCP/IP connection requests through
its BlackRidge gateway, configure it as a Protected Resource.
If the network endpoint is to both accept inbound TCP/IP connection requests and
initiate outbound TCP/IP connection requests through its BlackRidge gateway, configure
it as both a Protected Resource and a Trusted Host.
19
Design the Network Topology
The following configurations are used as the basis for the procedures outlined in this document. It is used for illustration purposes only. All host names and network addresses contained in this guide are not intended to be representative of any real entity outside the scope of this guide or test lab environment.
Figure 2.1 – Sample AMI Instance Topology Using BlackRidge BR-2120 Gateway for AMS
20
Port Assignments for the BR-2120 Gateway for AWS
The following table contains the Ethernet port assignments on the BlackRidge BR-2120 Gateways for AWS.
VIRTUAL MACHINE GATEWAY OS PORT LOGICAL PORT ASSIGNMENT
BlackRidge BR-2120 Gateway for AWS
BlackRidge Release 3.0
Port 1 M: Management
Port 2 U: Untrusted
Port 3 T: Trusted
Table 2.2– Port Assignment for BlackRidge BR-2120 Gateways
The M port can be used only after it has been configured by the Setup Wizard through the vSphere, or web client, and virtual console port. Thereafter, an SSH client, (PuTTY or equivalent) connection can be used to perform advanced administration through its command line interface (CLI).
The U port must be used to connect the gateway to untrustworthy networks (for example, intranet and Internet). No network endpoint connected to these networks, are ever aware of the high-value assets that are protected by BlackRidge gateways—they are effectively cloaked. As a result, they are unable to establish TCP/IP connections to these Protected Resources.
The T port must be used to connect the gateway to the network endpoints (for example, laptops and PCs) that are deemed trustworthy. These Trusted Hosts are configured with the proper access and authorization rights to establish TCP/IP connections to the high-value, networked assets (for example, servers for payroll, accounting and intellectual property) protected by BlackRidge gateways.
Note: For the BlackRidge AWS GW the Management port M, DHCP is set by default.
22
Create and Configure Virtual Private Cloud
This section describes the creation of a Virtual Private Cloud (VPC) in AWS, along with the following components:
Internet Gateway - Provides external access for internal components.
Subnets – Splits VPC into different zones (Trusted, Untrusted and Management subnets)
Route Tables - Defines routing paths inside the VPC.
Security Groups - Applies inbound and outbound traffic rules to the subnets.
23
Task: Create VPC 1. Using the upper left menu, navigate to Services > VPC.
2. Click Start VPC Wizard.
3. Select VPC with a Single Public Subnet, then click Select.
24
4. Configure the following options:
a. IP CIDR block – Use the default (10.0.0.0/16). b. VPC name – Set as required (for example, VPC Bravo). c. Public subnet – Use the default (10.0.0.0/24). d. Availability Zone – Select the region in which all instances and subnets will
reside. e. Subnet name – Set as required (for example, VPC Bravo Untrusted Subnet).
5. Use the defaults for the remaining fields, and click Create VPC. 6. Click OK after confirming the VPC was created successfully. 7. In the Your VPCs screen, locate the default VPC (the one that isn’t named).
8. Click the Name field for that row, and name the VPC Do Not Use.
Task: Configure Internet Gateway
1. In the left hand menu, click Internet Gateways.
25
2. Find the entry created for your VPC in the VPC column.
3. Click the Name field for that row and name it (example: VPC Bravo INET GW).
Task: Create Subnets
1. In the left hand menu, click Subnets. 2. Verify that the subnet created when the VPC was created is present. 3. Click Create Subnet to create a subnet for the private/trusted subnet.
4. Configure the following options: a. Name tag – Set as required (for example, VPC Bravo Trusted Subnet). b. VPC – Select your VPC. c. Availability Zone – Use the default. d. CIDR block – Set the IP range to use on the private/trusted subnet as required
(for example, 10.0.20.0/24). 5. Click Yes, Create.
6. Click Create Subnet to create a subnet for the Management subnet.
26
7. Configure the following options:
a. Name tag – Set as required (for example, VPC Bravo MGMT Subnet). b. VPC – Select your VPC.
c. Availability Zone – Use the default.
d. CIDR block – Set IP range to use on the management subnet as required (for example, 10.0.10.0/24).
8. Click Yes, Create.
27
Task: Create Route Tables 1. In the left hand menu, click Route Tables. 2. Click the Name column to sort the table so that entries with blank names appear at the
top.
3. Locate the row with blank name that also has a value of Yes in the Main column (it should also have 0 Subnets). Click the Name field for this row, and name it (for example, VPC Bravo Default RT).
4. Click the other row with the Name column blank, and click the Subnet Associations tab that populates at the bottom of the page
5. Verify that the Untrusted Subnet has been associated with this Route Table.
28
6. Click in the Name field for this Route Table row, and name appropriately (example: VPC Bravo Untrusted RT).
7. Click the Routes tab at the bottom of the screen, and verify that this Route Table has a route for the INET Gateway (the Destination = 0.0.0.0/0 entry per below).
8. Click Create Route Table to do so for the Trusted subnet.
9. Configure the following options:
a. Name tag – Set as required (for example, VPC Bravo Trusted RT). b. VPC – Your VPC.
10. Click Yes, Create.
29
11. Select the Trusted Route Table, and click the Subnet Associations tab at the bottom of the page.
12. Click Edit, and select the check box next to the Trusted Subnet entry. 13. Click Save. 14. Click Create Route Table to create a route table for the MGMT subnet.
15. Configure the following options: a. Name tag – set as desired (for example, VPC Bravo MGMT RT). b. VPC – Your VPC.
30
16. Select the Trusted Route table, and click the Subnet Associations tab at the bottom of the page.
17. Click Edit, and select the check box next to the MGMT Subnet entry.
18. Click Save.
Task: Create Route Under the MGMT Route Table 1) Select the MGMT Route table entry, and click the Routes tab at the bottom of the
screen. 2) Click Edit, and configure the following values in the next empty input row:
a. Destination – 0.0.0.0/0 b. Target – Clicking in this box should bring up the ID for your INET GW. Select this
value.
c. Click Save.
31
Task: Create Security Groups
1. In the left hand menu under VPC Dashboard, click on Security Groups (under Security heading).
2. For any pre-existing entries with blank “Name tag” fields, click on the “Name tag” field and input “Do Not Use” (as we’ll be creating new security groups).
3. Click on the Security Group button, and create a group for the Untrusted subnet. a. Name tag – set as desired (example: VPC Bravo Untrusted SG) b. Group name – same as Name tag c. Description – set as desired d. VPC – your VPC
4. With the Untrusted Security Group selected, click on the Inbound Rules tab at the bottom, then click Edit.
5. Configure a rule with the following settings, then click Save. a. Type – ALL Traffic b. Protocol – ALL c. Source - 0.0.0.0/0
32
6. Click on the Security Group button, and create a group for the MGMT subnet. a. Name tag – set as desired (example: VPC Bravo MGMT SG) b. Group name – same as Name tag c. Description – set as desired d. VPC – your VPC
7. With the MGMT Security Group selected, click on the Inbound Rules tab at the bottom, then click Edit.
8. Configure a rule with the following settings, then click Save. a. Type – SSH b. Protocol – TCP (6) c. Source – <Your IP Address>/32
i. As you are likely on an internal network yourself, use a site like http://whatismyipaddress.com/ to determine your public address.
ii. This setting will restrict SSH access to the MGMT port of the GW to ONLY traffic from the IP address you specify here.
9. Configure another rule with the following settings, then click Save. a. Type – ICMP b. Protocol – ICMP (1) c. Source – 0.0.0.0/0
33
i. This setting will allow ICMP access from any IP address.
10. Click on the Security Group button, and create a group for the Trusted subnet.
a. Name tag – set as desired (example: VPC Bravo Trusted SG) b. Group name – same as Name tag c. Description – set as desired d. VPC – your VPC
11. With the Trusted Security Group selected, click on the Inbound Rules tab at the bottom, then click Edit.
12. Configure a rule with the following settings, then click Save. a. Type – All Traffic b. Protocol – ALL c. Source – 0.0.0.0/0
36
Launch and Configure a Gateway AMI Instance
This section describes how to deploy and configure a BRT TAC Gateway instance from AMI into a VPC. After initial configure and deployment of a Gateway instance with one interface, the rest of the interfaces will be added and configured one-by-one as appropriate. Two (2) Elastic IPs will be created and associated with the appropriate interfaces:
Untrusted - to provide inbound and outbound access to trusted hosts/protected resources
MGMT - to provide external access to the Management port of the Gateway (protected by Inbound rules in the MGMT Security Group).
Task: Configure and Launch an AMI Instance 1. Click on the orange cube in the upper left corner of the web UI, then click on EC2 (under
Compute). 2. In the left hand menu, under the Images header, click on AMIs.
37
3. With your AMI selected, click on the Launch button. 4. Choose the “t2.medium” instance type on the next screen (to ensure support for 3
NICs), and click on the “Next: Configure Instance Details” button at the far right.
5. On the next screen (Step 3), configure the following values: a. Network – select your VPC b. Subnet – select your Management subnet c. Auto-Assign Public IP – select Disable
i. An Elastic IP will be configured later to provide access to the MGMT interface of the GW from the outside.
d. Under the “Network Interfaces” subsection towards the bottom of the page, assign your own IP address if desired from the range specified in the Subnet setting (example: 10.0.10.20)
i. You can also let AWS select the IP for you automatically if desired. e. Click on the “Next: Add Storage” button at the far right.
38
6. On the next screen (Step 4) accept the default settings and click on the “Next: Tag Instance” button at the far right.
7. On the next screen (Step 5), name the instance as desired (e.g., “VPC Bravo BRT GW”), then click on the “Next: Configure Security Group button”.
39
8. On the next screen (Step 6), do the following: a. Under “Assign a security group:”, select the 2nd radio button – “Select an existing
security group”. b. Select the checkbox next to the Management security group.
9. Click on the “Review and Launch” button. 10. The next screen will give a message about the instance not being eligible for the free
usage tier, and that the instance is open to the world. Proceed by clicking on the “Launch” button.
40
11. A popup will prompt for selection or creation of a key pair for accessing the instance. In the dropdown, select the option “Proceed without a key pair”, click on the “I acknowledge…” checkbox, and click on the “Launch” button.
12. On the next screen, click on “View Instances” (or “Instance” from the left hand menu). The AMI instance will spend some time initializing (~15-20 minutes).
13. To check on the AMI instance status, select it in the Instance screen and use Actions -> Instance Settings -> Get System Log.
41
a. If the instance has completed booting, you should be able to scroll down in the resulting popup and see the login prompt.
42
Task: Stop the AMI Instance 1. From the Actions button in the Instance screen, select -> Instance State -> Stop. 2. Verify the instance is stopped before proceeding.
Task: Review Settings of the eth0/Management Interface for the AMI Instance
1. In the left hand menu, under the “Network & Security” heading, click on “Network
Interfaces”. 2. Locate the currently configured interface (corresponds to eth0/the MGMT port on the
Gateway), and click on the Name field to give it an appropriate name (example: VPC Bravo GW Port 1 ETH0 Management).
3. With this interface selected, select Actions -> Change Security Groups, and select the Management security group if not already selected.
43
Task: Create Additional Interfaces for the AMI Instance
1. Click Create Network Interface.
2. Configure the following values, and click Yes, Create. a. Description – set as desired (example: VPC Bravo GW Port 2 ETH1 Untrusted) b. Subnet – Select the Trusted subnet. c. Private IP – Set as required from the IP range for the Subnet (for example,
10.0.0.20). You can also let AWS select the IP for you automatically. d. Security groups – Select the untrusted security group.
3. Back at the Instances screen, click in the Name field for the newly-created interface, and input the same value used for Description above (for example, VPC Bravo GW Port 2 ETH1 Untrusted).
4. Click Create Network Interface.
44
5. Configure the following values, and click Yes, Create.
a. Description – Set as required (for example, VPC Bravo GW Port 3 ETH2 Trusted). b. Subnet – Select the Trusted subnet. c. Private IP – Set as required from the IP range for the Subnet (for example,
10.0.20.20). You can also let AWS select the IP for you automatically. d. Security groups – Select the trusted security group.
6. Back at the Instances screen, click in the Name field for the newly-created interface and input the same value used for Description above (for example, VPC Bravo GW Port 3 ETH2 Trusted).
7. There should now be a total of three network interfaces, for which two have no Instance ID assigned.
45
Task: Attach Additional Interfaces to the AMI Instance
1. From the Instances screen, select the row for Port2 ETH1 (the Untrusted port), and click Attach at the top (or Actions > Attach).
2. At the popup, select the Instance ID, and click Attach. 3. Repeat for the Trusted Port. ORDER MATTERS! 4. When complete, all three interfaces will have the same Instance ID set.
46
Task: Allocate a New Elastic IP Address for the MGMT Interface
1. In the left hand menu, select Elastic IPs under Network and Security.
2. Click Allocate New Address.
3. Click Yes, Allocate. Note: You are limited to five free Elastic IPs. You will be charged for any additional IPs above that number.
47
Task: Associate Elastic IP with MGMT Interface
1. In the left hand menu, select Network Interfaces to return to that screen. 2. Select the Management interface, then use the Actions button to perform the
“Associate Address”.
3. In the resulting popup, make sure that the newly-generated Elastic IP address is matched with the Management interface address, then click “Associate Address”.
4. In the left hand menu, under the “Instances” heading, click on Instances. 5. Select your instance, then start it via Actions -> Instance State -> Start. 6. Wait for the instance to come up (can take a few minutes).
48
7. When running (as shown above), SSH to the Elastic IP address as the admin user. This should result in traffic being forwarded to the Management interface on the Gateway.
8. At this point you may configure the GW as required, using the admin CLI and/or the Setup Wizard:
a. Set hostname. b. Change admin password. c. Configure other options as required.
49
Task: Modify Route Table for (Trusted + Protected) Side of BRT GW
1. In the web UI, from the EC2 Dashboard (Services -> EC2), select “Network Interfaces” from the left hand menu.
2. Find the interface corresponding to Port 3 (eth2, the Trusted port) on the Gateway.
Copy the Network Interface ID value for that interface.
50
3. In the web UI, under the VPC Dashboard (Services -> VPC), click on “Route Tables” in the left hand menu.
4. Locate the Trusted Route Table for your VPC and select it. In the Routes tab at the
bottom of the screen, click on the Edit button.
5. Click Add another route, and input the following values and click Save. a. Destination - 0.0.0.0/0 b. Target - Paste in the Network Interface ID from earlier; this will perform a lookup
for the interface that you will then select.
51
Note: The Status of the route you just added could say ‘Black Hole’. This happens when the instance is currently down.
Task: Disable Source/Destination Check for Untrusted and Trusted Interfaces
1. Go back to the EC2 Dashboard, and select Network Interfaces under Network & Security.
2. Locate the entry for the Gateway’s Untrusted interface. Right-click, and select Change
Source/Dest. Check.
52
3. In the resulting popup, select Disabled, and click Save.
4. Repeat the last two steps for the Gateway’s Trusted interface.
Note: These settings are required to allow instances to handle traffic that isn’t specifically intended for them (for example, instances providing NAT, routing or firewall services).
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html#change_source_dest_check
53
Task: Disable Source/Destination Check for Untrusted and Trusted Interfaces
1. On the EC2 Dashboard, select Elastic IPs under Network & Security. 2. Click Allocate New Address.
3. Click Yes, Allocate.
54
Task: Associate Elastic IP with the Public/Untrusted Interface
1. On the EC2 Dashboard, select Network Interfaces under Network & Security.
2. Select the Untrusted interface for the Gateway, right-click and select Associate Address.
3. Set the newly-created Elastic IP for the Address, and make sure the Gateway’s Untrusted interface’s IP address populates the Associate to private IP address drop-down.
4. Click Associate Address.
56
Deploy a Jump Host into the MGMT Subnet in VPC
This section describes how to create an Amazon instance that can be used as a jump host to access the Trusted+Protected subnet behind the Gateway in AWS. As the Trusted + Protected host will not be directly accessible from the internet, and no VPN or similar access is provided in this setup, the jump host can be used to access the Trusted+Protected host as it will have two NICs:
one on the MGMT subnet
one on the Trusted subnet
The jump host will have its MGMT interface mapped to an Elastic IP, making it accessible from the internet.
57
Task: Create the Jump Host Instance
1. From the EC2 Dashboard, click Launch Instance.
2. Select the AMI to use. This example uses the Ubuntu 14.04 LTS image (the Amazon Linux image would also suffice).
58
3. On the next screen (Step 2), select the t2.micro instance type, and click Next: Configure Instance Details.
4. On the next page (Step 3), configure the following settings (using the defaults for those
not specified), and click Next: Add Storage. a. Network - Your VPC. b. Subnet - Select the MGMT subnet, which will map to eth0 on the instance. c. Auto-assign Public IP – Disabled. d. Network Interfaces section
i. eth0 > Primary IP - Select a free IP address in the MGMT subnet range (for example, 10.0.10.22).
ii. Click Add Device under eth0. iii. eth1 > Subnet - Select the Trusted subnet.
iv. eth1 > Primary IP - Select a free IP address in the Trusted subnet range (for example, 10.0.20.22).
59
5. On the next page (Step 4), use the defaults and click Next: Tag Instance.
6. On the next page (Step 5), give the instance a name (for example, VPC Bravo MGMT VM), and click Next: Configure Security Group.
60
7. On the next page (Step 6), under Assign a security group:, choose Select an existing security group.
8. In the result table, select your MGMT Security Group. 9. Click Review and Launch.
10. On the next page (Step 7), review the settings and click Launch.
61
11. The Select an existing key pair or create a new key pair window appears.
a. If you already have a key pair that you’d like to use in AWS, select it from the Select a key pair drop-down and click Launch Instances.
b. If you haven’t created a key pair yet, or would like to use a different/new key pair, select Create a key pair from the drop down.
c. Input a name for the key pair, and click Download Key Pair to download the key pair file to a save location.
d. Click Launch Instances.
62
e. Either way, the key pair will be used to access the jump host over SSH in lieu of password-based authentication.
12. On the resulting Launch Status page, click View Instances.
13. Locate your newly-created instance, and verify that the System Status Checks and Instance Status Checks show green.
64
Task: Assign an Elastic IP to the Jump Host 1. Go to the EC2 Dashboard screen.
2. Under Network & Security in the left hand menu, select Elastic IPs.
3. Click Allocate New Address.
65
4. Click Yes, Allocate.
5. Under Network & Security in the left hand menu, click Network Interfaces.
66
6. Locate the network interfaces for the jump host instance just created (using the Primary IP values you set), and name them if blank. For example:
a. eth0 - VPC Bravo MGMT VM ETH0 b. eth1 - VPC Bravo MGMT VM ETH1
7. Select the eth0/MGMT interface for the instance, right-click and select Associate Address from the popup menu.
8. In the resulting popup, select the just-created Elastic IP in the first dropdown, and ensure the MGMT IP address is selected in the second dropdown. Click Associate Address. You should now be able to test connecting to the jump host over SSH.
67
9. From the command line on Linux or Mac, use the following command to log in as the ec2-user: Ubuntu-based VMs ssh -i /path/to/<key pair file>.pem ubuntu@<Elastic IP_MGMT>
ssh -i ~/.ssh/trust-prot-01.pem [email protected] Red Hat or Amazon Linux-based VMs ssh -i /path/to/<key pair file>.pem ec2-user@<Elastic IP_MGMT>
ssh -i ~/.ssh/trust-prot-01.pem [email protected]
a. On Windows, clients such as Putty or SecureCRT can be used.
69
Deploy a (Trusted + Protected) Host into Trusted Subnet in VPC
This section describes how to deploy a simple Linux-based Instance into the Trusted Subnet of the VPC that can act as either a Trusted Host, or a Protected Resource, or both depending on the network configuration. It includes steps on configuring custom routing rules to ensure that traffic from the Instance is forced through the Gateway.
70
Task: Provision an Instance of the Amazon Linux AMI
1. Using the web UI, click Services > EC2.
2. On the EC2 Dashboard, click Launch Instance.
3. On the next page (Step 1), select the Amazon Linux AMI image.
71
4. On the next page (Step 2), select the t2.micro image, then click on the “Next: Configure Instance Details” button.
5. On the next page (Step 3), configure the following values. a. Network – Type your VPC. b. Subnet – Select the Trusted subnet. c. Auto-assign Public IP – Select disable. d. Network Interfaces > Primary IP – Assign an IP from the Trusted subnet, if
required. Otherwise, AWS will automatically assign a Primary IP.
6. Click Next: Add Storage.
7. On the next page (Step 4), accept the defaults, and click Next: Tag Instance.
72
8. On the next page (Step 5), configure a Value for the Name tag (for example, VPC Bravo trust-prot-01), and click Next: Configure Security Group.
9. On the next page (Step 6), under Assign a security group:, select Select an existing security group.
10. Select the security group corresponding to the Trusted group, and click on Review and Launch.
73
11. Review the details, and click Launch.
12. Select either Create a new key pair from the drop-down, and create a new key pair or choose an existing key pair. If you create a new key pair, name it and click Download Key Pair. Save this file to a secure and known location (for example, under ~/.ssh on Mac or Linux). If lost you lose this information, you won’t be able to log into the VM later, and you won’t be able to download the key pair again.
13. Click Launch Instances.
74
14. On the resulting Launch Status page, you should see a message indicating that the instance is launching.
15. Click the instance ID in the message to navigate to the Instances screen on the EC2 Dashboard to verify the status of the VM.
76
Task: Check Boot Status through AWS CLI
For details on configuring the AWS CLI on your system, please refer to Appendix A in the AWS Deployment Guide.
1. From a terminal, run the following command: aws ec2 describe instances
2. Locate the entry for the just-deployed AMI, using the KeyName field (corresponds to the Name Tag configured earlier).
3. Using that instance ID, run the following command: aws ec2 get-console-output --instance-id <InstanceID>
4. The output should end with text for a login prompt. For example,:
nip-10-0-20-30 login: "
77
Task: SSH into Trusted + Protected Instance
1. Locate the key pair file associated with the Trusted+Protected instance, and scp it to the jump host: Ubuntu-based Instances: scp -i ~/.ssh/trust-prot-01.pem ~/.ssh/trust-prot-01.pem
[email protected]:.ssh/. Red Hat or Amazon Linux-based Instances: scp -i ~/.ssh/trust-prot-01.pem ~/.ssh/trust-prot-01.pem ec2-
[email protected]:.ssh/.
2. Access the jump host using SSH: Ubuntu-based Instances: ssh -i ~/.ssh/trust-prot-01.pem [email protected] Red Hat or Amazon Linux-based Instances: ssh -i ~/.ssh/trust-prot-01.pem [email protected]
3. Change permissions on the key pair file so that only the current user can read it: chmod 400 .ssh/trust-prot-01.pem
4. Now try to SSH to the Trusted+Protected machine, using its internal IP address on the Trusted subnet. Reference the key pair file in the command as shown below to authenticate and log into the machine. For example: ssh -i ~/.ssh/trust-prot-01.pem [email protected]
78
Task: Configure Static Networking and Routes on the Trusted + Protected Instance
In order to ensure that traffic to and from the Trusted + Protected instance is routed through the Gateway, the networking will be re-configured on that instance from DHCP-based to static. At the same time, the default gateway will be redirected to use the BRT TAC Gateway Trusted Interface (10.0.20.20) instead of the default gateway assigned by AWS (10.0.20.1).
1. For Ubuntu-based instances: a. Run the command: sudo -i b. Type: cd /etc/network/interfaces.d c. Make a copy of: eth0.cfg ‘cp eth0.cfg /var/tmp.’. d. Log into your trusted/protect host through the MGMT node. e. Again, run the command su -i or run all commands as: sudo xxxcomand f. Type: cd /etc/network/interfaces.d g. Make a copy of: eth0.cfg ‘cp eth0.cfg /var/tmp.’.
h. Edit eth0.cfg and change the following: # The primary network interface
auto eth0
iface eth0 inet dhcp
To this:
# The primary network interface
auto eth0
#iface eth0 inet dhcp
iface eth0 inet static
address 10.0.20.30
netmask 255.255.255.0
gateway 10.0.20.20
dns-nameservers 10.0.0.2
Note: AWS uses a *.2 address for DNS.
79
i. Type ifdown eth0; ifup eth0 to restart the interface. j. Type ping 10.0.0.1 to test that the networking is configured correctly (which
would not work previously)
2. For Red Hat/Amazon Linux-based instances: a. Type: cd /etc/sysconfig/network-scripts/ b. Replace the contents of the ifcfg-eth0 file with the following:
DEVICE=eth0
BOOTPROTO=none
ONBOOT=yes
TYPE=Ethernet
USERCTL=yes
PEERDNS=yes
IPV6INIT=no
#PERSISTENT_DHCLIENT=yes
RES_OPTIONS="timeout:2 attempts:5"
#DHCP_ARP_CHECK=no
IPADDR=10.0.20.30
NETMASK=255.255.255.0
GATEWAY=10.0.20.20
DNS1=10.0.0.2
c. Run the command: /etc/init.d/network restart d. Run route -n to verify that routing is correct.
81
Configure Layer 3 NAT – External-to-VPC (Unidirectional)
This section describes how to connect an Insertion Gateway in an external network (behind a NAT firewall) to a Resolving Gateway in a VPC.
82
External Network Configuration (Trusted Host)
Variable Description Value
INS_TRUST_HOST_IP IP address of the Trusted Host in the Trusted Subnet; Trusted side of NAT config
192.168.55.130
INS_TRUST_GW_IP IP address of the Gateway Interface in the Trusted Subnet; Trusted side of Route config
192.168.55.20
INS_UNTRUST_GW_IP IP address of the Gateway Interface in the Untrusted Subnet; Untrusted side of NAT config
192.168.1.20
INS_UNTRUST_ROUTER_IP IP address of the Router Interface in the Untrusted Subnet used to send traffic out of the network; Untrusted side of Route config
192.168.1.1
84
VPC Network Configuration (Protected Resource)
Variable Description Value
RES_TRUST_HOST_IP IP address of the Trusted Host in the Trusted Subnet; Trusted side of NAT config
10.0.20.30
RES_TRUST_GW_IP IP address of the Gateway Interface in the Trusted Subnet; Trusted side of Route config
10.0.20.20
RES_UNTRUST_GW_IP IP address of the Gateway Interface in the Untrusted Subnet; Untrusted side of NAT config
10.0.0.20
RES_UNTRUST_ROUTER_IP IP address of the Router Interface in the Untrusted Subnet used to send traffic out of the network; Untrusted side of Route config
10.0.0.1
86
Task: Inserter – Generate and Export SKEY
1. SSH into the MGMT interface of the Inserter Gateway as “admin”. 2. Run the following commands:
/identity/skey/generate name=tr_key
/identity/skey/export name=tr_key dest=display
3. When prompted, input a password of your choosing twice to encrypt the skey value. 4. Copy the value printed to screen for use in the next step.
Task: Resolver – Import SKEY
1. SSH into the MGMT interface of the Resolver Gateway as “admin”. 2. Run the following command, using the skey value and password from the previous step:
/identity/skey/import name=tr_key src=display
value=<displayed key value from above>
Task: Inserter – Add NAT and Routes
1. On the Inserter Gateway, run the following commands:
87
a. /layer3/nat/add tr_ip=<INS_TRUST_HOST_IP> tr_netmask=255.255.255.0 tr_vlanid=0
ut_ip=<INS_UNTRUST_GW_IP> ut_netmask=255.255.255.0
ut_vlanid=0
i. INS_TRUST_HOST_IP = IP of the Trusted Host in the Trusted Subnet
ii. INS_UNTRUST_GW_IP = IP of the Gateway interface in the Untrusted Subnet
b. /layer3/route/add trusted_flag=y ip=<INS_TRUST_GW_IP> netmask=255.255.255.0 vlanid=0
i. INS_TRUST_GW_IP = IP of the Gateway interface in the Trusted Subnet
c. /layer3/route/add trusted_flag=n
ip=<INS_UNTRUST_ROUTER_IP> netmask=255.255.255.0
vlanid=0
i. INS_UNTRUST_ROUTER_IP = IP of the Router interface in the Untrusted Subnet
d. /layer3/enable
Task: Inserter – Add NAT and Routes
1. On the Resolving Gateway, run the following commands: a. /layer3/nat/add tr_ip=<RES_TRUST_HOST_IP>
tr_netmask=255.255.255.0 tr_vlanid=0
ut_ip=<RES_UNTRUST_GW_IP> ut_netmask=255.255.255.0
ut_vlanid=0
i. RES_TRUST_HOST_IP = IP of the Trusted Host in the Trusted Subnet ii. RES_UNTRUST_GW_IP = IP of the Gateway interface in the Untrusted
Subnet
88
b. /layer3/route/add trusted_flag=y ip=<RES_TRUST_GW_IP> netmask=255.255.255.0 vlanid=0
i. RES_TRUST_GW_IP = IP of the Gateway interface in the Trusted Subnet
c. /layer3/route/add trusted_flag=n
ip=<RES_UNTRUST_ROUTER_IP> netmask=255.255.255.0
vlanid=0
i. RES_UNTRUST_ROUTER_IP = IP of the Router interface in the Untrusted Subnet
d. /layer3/enable
Task: Inserter – Add and Enable Identity
1. On the Inserter Gateway, create an Identity and enable it: a. /identity/add name=tr-id1 skey=tr_key alg=HMAC-SHA-256
comment="Identity for External trusted host"
enable=yes b. /identity/enable name=tr-id1
Task: Inserter – Create Trusted Host and Associate Identity
1. On the Inserter side, create a Trusted Host and associate it with the Identity:
89
a. /identity/host/add name=trhost1 ip=<INS_UNTRUST_GW_IP> mask=255.255.255.255 comment="Trusted host for L3."
i. INS_UNTRUST_GW_IP = IP of the Gateway interface in the Untrusted Subnet
b. /identity/associate name=tr-id1 host=trhost1
Task: Resolver – Add and Enable Identity Using SKEY
1. On the Resolver side, create and enable a corresponding identity: a. /identity/add name=tr-id1 skey=tr_key alg=HMAC-SHA-256
comment="Identity for L3, External trusted host
access." enable=yes
b. /identity/enable name=tr-id1
Task: Resolver – Add Protected Resource
1. On the Resolver side, configure the Protected Resource: a. /policy/rule/resource/add name=prhost1
ip=<RES_UNTRUST_GW_IP> mask=255.255.255.255
comment="Protected resource for L3."
i. RES_UNTRUST_GW_IP = IP of the Gateway interface in the Untrusted Subnet
90
Task: Resolver – Add Rule and Link Identity
1. On the Resolver side, configure a Forward rule for the Protected Resource and link it to the Identity:
a. /policy/rule/add name=rule1 action=forward resource=prhost1 enable=yes
b. /identity/link name=tr-id1 rule=rule1
Task: Inserter – Enable Enforce Mode
1. On the Inserter side, run the following command. a. /context/tac mode=enforce
Task: Resolver – Enable Enforce Mode
1. On the Resolver side, run the following command.
a. /context/tac mode=enforce
92
Configure Layer 3 NAT – VPC-to-VPC (Bidirectional)
This section will describe how to configure bidirectional communication between two separate VPCs in AWS that are protected by BlackRidge TAC Gateways. Specifically, the Gateways will be configured such that the Trusted+Protected host in VPC A can communicate with the Trusted+Protected host in VPC B, and vice versa.
The configuration and internal addressing for each VPC in this example is identical. Different Elastic IPs are assigned for external access to the various components of the VPC.
VPC Network Configuration (Protected Resource)
93
Variable Description Value
TRUST_HOST_IP IP address of the Trusted Host in the Trusted Subnet; Trusted side of NAT config
10.0.20.30
TRUST_GW_IP IP address of the Gateway Interface in the Trusted Subnet; Trusted side of Route config
10.0.20.20
UNTRUST_GW_IP IP address of the Gateway Interface in the Untrusted Subnet; Untrusted side of NAT config
10.0.0.20
UNTRUST_ROUTER_IP IP address of the Router Interface in the Untrusted Subnet used to send traffic out of the network; Untrusted side of Route config
10.0.0.1
94
Task: Inserter + Resolver – Add NAT and Routes
The Gateway in each VPC has been configured for Layer 3 NAT mode using the following commands:
/layer3/nat/add tr_ip=<TRUST_HOST_IP>
tr_netmask=255.255.255.0 tr_vlanid=0 ut_ip=<UNTRUST_GW_IP>
ut_netmask=255.255.255.0 ut_vlanid=0
o TRUST_HOST_IP = IP of the Trusted Host in the Trusted Subnet o UNTRUST_GW_IP = IP of the Gateway interface in the Untrusted Subnet
/layer3/route/add trusted_flag=y ip=<TRUST_GW_IP>
netmask=255.255.255.0 vlanid=0
o TRUST_GW_IP = IP of the Gateway interface in the Trusted Subnet
/layer3/route/add trusted_flag=n ip=<UNTRUST_ROUTER_IP>
netmask=255.255.255.0 vlanid=0
o UNTRUST_ROUTER_IP = IP of the Router interface in the Untrusted Subnet
/layer3/enable
Note that each Trusted+Protected host in a VPC will require its own Elastic IP, as well as its own NAT entry via the /layer3/nat/add command above. AWS provides five (5) Elastic IPs free of charge; usage above that limit will incur additional costs.
95
Task: Inserter + Resolver – Configure Trusted Host and Protected Resource
Trusted Host and Protected Resource entries can be created for the Trusted+Protected host in each VPC, and referenced in the commands to follow.
1. Trusted Host
/identity/host/add name=trhost1 ip=<UNTRUST_ROUTER_IP>
mask=255.255.255.255 comment="Trusted host for L3."
a. UNTRUST_ROUTER_IP = IP of the Router interface in the Untrusted Subnet
2. Protected Resource /policy/rule/resource/add name=prhost1
ip=<UNTRUST_ROUTER_IP> mask=255.255.255.255
comment="Protected resource for L3."
a. UNTRUST_ROUTER_IP = IP of the Router interface in the Untrusted Subnet
3. Verify the creation/existence of the Trusted+Protected host via the following
commands: /identity/host/show
/policy/rule/resource/show
Task: Inserter – Generate and Export SKEY
1. SSH into the MGMT interface of the Inserter Gateway as “admin”. 2. Run the following commands:
/identity/skey/generate name=tr_key_Steve
/identity/skey/export name=tr_key_Steve dest=display
96
3. When prompted, input a password of your choosing twice to encrypt the skey value. 4. Copy the value printed to screen for use in the next step.
Task: Resolver – Import SKEY
1. SSH into the MGMT interface of the Resolver Gateway as “admin”. 2. Run the following command, using the skey value and password from the previous step:
/identity/skey/import name=tr_key_Steve src=display
value=<displayed key value from above>
Task: Inserter – Add and Enable Identity
1. On the Inserter Side, create and enable a new Identity:
a. /identity/add name=tr-id-Steve skey=tr_key_Steve alg=HMAC-SHA-256 comment="Identity for L3." enable=yes
b. /identity/enable name=tr-id-Steve
97
Task: Inserter – Associate Identity with Trusted Host
1. On the Inserter Side, associate the new Identity with the Trusted Host:
a. /identity/associate name=tr-id-Steve host=trhost1
Task: Resolver – Add and Enable Identity Using SKEY
1. On the Resolver side, create and enable a new Identity: a. /identity/add name=tr-id-Steve skey=tr_key_Steve
alg=HMAC-SHA-256 comment="Identity for L3." enable=yes
b. /identity/enable name=tr-id-Steve
Task: Resolver – Add Rule for and Link Identity to Protected Resource
1. On the Resolver side, create a Forward rule for the Protected Resource. Then, link the rule to the Identity:
a. /policy/rule/add name=rule1-Steve action=forward resource=prhost1 enable=yes
b. /identity/link name=tr-id-Steve rule=rule1-Steve
98
Task: Inserter – Enable Enforce Mode
1. On the Inserter side, run the following command:
/context/tac mode=enforce
Task: Resolver – Enable Enforce Mode
1. On the Resolver side, run the following command:
/context/tac mode=enforce
100
Add Certificates to BlackRidge TAC Gateway
To load signed certificates on a BlackRidge TAC Gateway, please ensure the customer site has the following:
Network access to TAC Gateway management IP address
Computer or server running Secure Copy Protocol (SCP), WinSCP or Bitvise
Customer Contact information to securely transfer certificates
The customer must first configure the Gateway management interface prior to initiating a Certificate Signing Request (CSR). The Gateway must be configured with the following using either static addresses or DHCP:
IP address
Gateway Hostname
Default Gateway
DNS
Note: TAC Gateway’s IP address is configurable using either static or dynamic (DHCP) addressing. IPv4 and IPv6. The Gateway’s management IP address is used as an additional security feature when generating certificate keys. Changing the Gateways IP address invalidates existing signed certificates. Please contact BlackRidge Support when changing gateway management IP addresses.
Before contacting BlackRidge support to load your certificate, please have the following information ready:
Customer Name
Gateway Fully Qualified Domain Name (can use hostname.customer if no FQDN is configured)
Gateway Hostname
Gateway Management IP Address
Site Contact (name, e-mail, day time phone)
101
Initiate a BlackRidge Certificate Signing Request (CSR)
For security and protection purposes, each BlackRidge TAC Gateway must have a valid certificate, signed by BlackRidge Technology, before it can operate in production. The following procedure outlines the steps that must be completed in order to acquire and load the signed certificate.
CSR Prerequisites – The procedures outlined in sections IV and V of this Setup Guide must be completed and verified before attempting to initiate a CSR with BlackRidge Technology. The Setup Wizard, introduced in section IV, was used to configure the prerequisite networking attributes of the gateway, including the host name, IP address, and DNS configuration for the management port on the BlackRidge TAC Gateway.
As indicated throughout section IV, the networking attributes can also be configured through the command line interface (CLI). For your convenience, excerpts of the CLI commands used to configure the various host and networking attributes from the BlackRidge 3.0 Command Reference are included in appendices B – D of this Setup Guide.
Each BlackRidge TAC Gateway must be properly configured with the following:
Static or DHCP generated IP address (IPv4 or IPv6)
BlackRidge TAC Gateway hostname
Default gateway
DNS
Caution: The IP address of the BlackRidge TAC Gateway management port is used as an additional security feature when generating certificate keys. Changing the IP address of the management port invalidates existing BlackRidge Technology certificates. Please contact BlackRidge Support when changing the IP address of the management port of the BlackRidge TAC Gateway that has certificates signed by BlackRidge Technology.
Customer Site Requirements – Using the procedures and tools provided in this Setup Guide, the customer must have the following before initiating a CSR with BlackRidge Technology:
Network access to the management port of each BlackRidge TAC Gateway
A computer system running either Bitvise or Secure Copy Protocol (SCP)
Customer point-of-contact information to transfer the certificates securely
Customer Name
Fully Qualified Domain Name (FQDN) for the BlackRidge TAC Gateway
Note: If no FQDN is configured, the customer can use hostname.customer, where
hostname is the value assigned during the Setup Wizard or through the CLI, and
customer is the actual name of the customer initiating the CSR.
Hostname of the BlackRidge TAC Gateway
IP address of the management port of the BlackRidge TAC Gateway
Site contact information, such as the name, e-mail address and daytime telephone
number of the point person
102
Task: Generate BlackRidge TAC Gateway Keys
The customer or onsite systems engineer (SE) generates keys unique to the BlackRidge TAC Gateway prior to initiating a CSR. For example:
admin@Gateway-1[bump0]:/> cd /etc/certificate
admin@Gateway-1[bump0]:/etc/certificate/> genkeys
Existing keys will be overwritten; proceed (y/n)? y
genkeys command was successful
Figure 7.1 – Screen capture for generating the BlackRidge TAC Gateway keys
Task: Generate a Certificate Signing Request (CSR)
The customer or onsite SE generates a CSR by executing the gencsr command.
Note: The entire output from the gencsr command must be copied and included in the e-mail that is sent to BlackRidge Technology. In the example below, a string of Xs is used as placeholders for the actual hashed output.
admin@Gateway-1[bump0]:/> cd /etc/certificate
admin@Gateway-1[bump0]:/etc/certificate/> gencsr
A CSR was found on the system. Select y to generate a new CSR
or n to display the existing CSR (y/n) y
-----BEGIN NEW CERTIFICATE REQUEST-----
XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
-----END NEW CERTIFICATE REQUEST-----
gencsr command was successful
Figure 7.2 – Screen capture for generating the Certificate Signing Request (CSR)
103
Note: The system will notify the administrator in the event a CSR already exists, and will prompt
the administrator to display the existing CSR or overwrite it. The example above shows the CSR
being overwritten.
The customer is now required to copy the entire output of the gencsr command: -----BEGIN NEW CERTIFICATE REQUEST-----
XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
-----END NEW CERTIFICATE REQUEST-----
The customer must include the entire output in an e-mail, with subject heading of Certificate Signature Request, and addressed to [email protected].
BlackRidge Technology will generate the signed certificates, encrypt and forward to the customer point-of-contact for that site.
Once the signed BlackRidge Technology certificates are received, the customer will contact BlackRidge Technology Support to get the decryption key for the certificate files. Note: The certificates are contained within an encrypted .zip file generated by 7-zip.
Loading the BlackRidge Technology-Signed Certificates
The following steps demonstrate the process of loading certificates into the BlackRidge TAC Gateway.
Task: Extract the Encrypted Certificate File
Step 1: Download and install 7-zip (or equivalent software).
Step 2: Extract the .zip file using the password supplied by BlackRidge Technology Support.
BlackRidge will provide two certificates: (1) a .pem file containing the Root and Intermediary signed certificates and (2) a .txt file, which contains the BlackRidge TAC Gateway-specific certificate.
104
Step 3: Select the certificate file, and right-click Extract files.
Figure 7.3 – Screen capture selecting the certificate file
105
Step 4: Enter the BlackRidge-supplied password to decrypt the file.
Figure 7.4 – Screen capture for entering the password supplied by BlackRidge Technology Support.
106
Step 5: The Certificates are now ready to deploy to your TAC Gateway.
Figure 7.5 – Screen capture of the certificates now ready to deploy to the Customer’s BlackRidge TAC Gateway
107
Importing Certificates into TAC Gateway
The TAC Gateway requires two separate certificate files to populate the signed certificates.
Task: Import the Root and Intermediate Certificates
The following is an example of importing the Root and Intermediate certificates. The values used are for illustration purposes only. Customers must use values that are unique to their own environment.
admin@Gateway-1[bump0]:/> cd /etc/certificate
admin@Gateway-1[bump0]:/etc/certificate/> ca-import user=user
host=192.168.2.29 filename=BlackRidgeSample_ca_chain.pem
path=/Blackridge/Certs/164/
The authenticity of host '192.168.2.29 (192.168.2.29)' can't be
established.
ECDSA key fingerprint is
5f:fa:0e:0d:bc:1d:54:65:4a:dc:a9:ba:72:3b:f9:01.
Are you sure you want to continue connecting (yes/no)? yes
Password:
BlackRidgeSample_ca_chain.pem 100%
2410 2.4KB/s 00:00
File transferred successfully.
Figure 7.6 – Screen capture of importing the Root and Intermediate Certificates
108
Task: Import the BlackRidge TAC Gateway Certificates
The following is an example of importing the BlackRidge TAC Gateway certificates. The values used are for illustration purposes only. Customers must use values that are unique to their own environment.
admin@Gateway-1[bump0]:/> cd /etc/certificate
admin@Gateway-1[bump0]:/etc/certificate/> import user=<remote_user>
host=<remote_host> [port=<remote_port>]
filename=<remote_certificate_file_name> path=<remote_path_to_file>
admin@GW3[bump0]:/etc/certificate/> import user=user
host=192.168.2.29 filename=SampleCustomerGateway123.txt
path=/Blackridge/Certs/164/
Password:
SampleCustomerGateway123.txt 100%
1400 1.4KB/s 00:00
File transferred successfully.
Figure 7.7 – Screen capture of importing the BlackRidge TAC Gateway Certificates
Task: Validate the BlackRidge TAC Gateway Certificates
The following is an example of validating the BlackRidge TAC Gateway certificates. The values used are for illustration purposes only. Customers must use values that are unique to their own environment.
admin@Gateway-1[bump0]:/> cd /etc/certificate
admin@Gateway-1[bump0]:/etc/certificate/> verify
Certificates successfully verified.
Figure 7.8 – Screen capture of validating the imported BlackRidge TAC Gateway Certificates
110
Testing the Configuration
The following sections outline tests that can be performed to verify the configuration of VPCs and Gateway. These consist of:
Verifying that a Gateway will route traffic from Trusted to Untrusted locally
Verifying that traffic is sent from Trusted Host to Untrusted host through the respective Gateways.
Task: Test the Gateways’ Ability to Route Locally in Layer 3 Mode
With Layer 3 mode enabled, the Gateway should be able to route traffic from the Trusted Subnet to the Untrusted Subnet and back.
1. Log into the Trusted Host (via jump-host:SSH or console). 2. Ping the Route IP address in the Untrusted subnet; e.g.
ping 10.0.0.1
3. The router on the other side of the Gateway should respond.
Task: Test the Trusted + Protected Connection Using SSH
For bi-directional configurations (two VPCs), the following steps should be performed in both directions; e.g., Trust_VPC_A->Protected_VPC_B and Trust_VPC_B->Protected_VPC_A. In this document, Trust_VPC_A = Protected_VPC_A, and Trust_VPC_B = Protected_VPC_B.
1. Log into the Trusted Host (via jump-host:SSH or console). 2. Perform an SSH command against the Elastic IP address of the target VPC in which the
Protected Resource resides. For example: ssh -i .ssh/trust-prot-01.pem [email protected] Access should be granted to the Protected Resource.
112
Set Transport Access Control (TAC) Mode of Operation
The TAC Gateways have three modes of operation that are configurable through the /context/tac CLI command.
Bridge Mode – The Gateway acts like a transparent bridge or switch and passes traffic from the Untrusted port (Port 1 of Gateway) to the Trusted port (Port 2 of Gateway) and vice versa. It does not insert or authenticate tokens or protect any resources. When the BlackRidge Gateway is initially powered on, it will be in bridge mode. The first step to complete after the gateway is physically installed is to verify network connectivity by executing the ping command. This should be done while the gateway is still in bridge mode.
Monitor Mode - The TAC Gateway inserts tokens on behalf of Trusted Hosts and authenticates tokens on behalf of Protected Resources, but does not enforce policy (forward or discard packets). The second step to complete is to configure the gateway with customer-specific requirements, and then set the gateway to monitor mode.
Only after successfully testing the configuration is the gateway to be set to enforce mode. This is an important step before moving to enforce mode because, if something is wrong, customer traffic could be dropped, causing application failure or at-risk resources (resources thought to be protected are actually not protected).
By setting the monitor TAC mode on the gateway, these issues can be resolved without causing a network outage or disruption.
Enforce Mode – Enforce mode adds to the functionality of monitor mode by also enforcing policy to either forward or discard packets.
When a Trusted Host accesses a Protected Resource, the gateway it is attached to (token insertion gateway) inserts a token into the TCP header SEQ field. Traffic is then forwarded to the other gateway through the Internet or customer Intranet.
The receiving gateway (token resolution gateway) then checks to see if the received token is a valid token in the token cache. If the token is in the token cache, additional checks are performed to resolve token collisions and to ensure network endpoint authentication and authorization.
Once a token has been unambiguously resolved to an identity, the policy associated with the identity is obtained and applied to the TCP/IP connection request. Tokens are not inserted for Untrusted Hosts and are not authenticated for Unprotected Resources.
113
Task: Display TAC Mode
Display the current TAC mode of operation for Gateway-1.
admin@Gateway-1[bump0]:/> /context/show
Context name : bump0
Context comment :
TAC mode : Enforce
MISC SETTINGS
Max anonymous connections: 100
Timer period : 3
Wait time : 3600
Hash source port : enable
admin@Gateway-1[bump0]:/>
Figure 8.1 – Screen capture for displaying TAC mode
Task: Set TAC Mode as “Bridge”
Set the TAC mode of operation to bridge.
admin@Gateway-1[bump0]:/> /context/tac bridge
Bridge Mode enabled successfully.
admin@Gateway-1[bump0]:/> /context/show
Context name : bump0
Context comment :
TAC mode : Bridge
MISC SETTINGS
Max anonymous connections: 100
Timer period : 3
Wait time : 3600
Hash source port : enable
admin@Gateway-1[bump0]:/>
Figure 8.2 – Screen capture for setting bridge TAC mode on Gateway-1 and executing the show command
Note: Gateways are configured at the factory to operate in bridge mode as the default mode before they are shipped.
114
Task: Set the TAC Mode as “Monitor”
Set the TAC mode of operation to monitor.
admin@Gateway-1[bump0]:/> /context/tac monitor
Monitor Mode enabled successfully.
admin@Gateway-1[bump0]:/> /context/show
Context name : bump0
Context comment :
TAC mode : Monitor
MISC SETTINGS
Max anonymous connections: 100
Timer period : 3
Wait time : 3600
Hash source port : enable
admin@Gateway-1[bump0]:/>
Figure 8.3 – Screen capture for setting ‘monitor’ TAC mode on Gateway-1 and the show command
Task: Set the TAC Mode as “Enforce”
Set the TAC mode of operation to enforce.
Figure 8.4 – Screen capture for setting ‘enforce’ TAC mode on Gateway-1 and the show command
admin@Gateway-1[bump0]:/> /context/tac enforce
Enforce Mode enabled successfully.
admin@Gateway-1[bump0]:/> /context/show
Context name : bump0
Context comment :
TAC mode : Enforce
MISC SETTINGS
Max anonymous connections: 100
Timer period : 3
Wait time : 3600
Hash source port : enable
admin@Gateway-1[bump0]:/>
115
Congratulations
You have successfully accomplished the following:
Identified resource requirements for setting up the gateways.
Selected resources to trust and protect within your environment.
Designed a network topology to integrate the BlackRidge Technology solution.
Created a Virtual Private Cloud (VPC)
Deployed of a Gateway from AMI
Deployed a Management Instance in AWS
Deployed trusted hosts/protected resources in AWS
Configured Layer 3 mode for the Gateway in AWS
Connected an Insertion Gateway a network to a Resolving Gateway in AWS
Tested the configuration
Initiated and completed the Certificate Signing Request (CSR) procedure, and now have
BlackRidge Technology-signed certificates for your configured BlackRidge TAC Gateways.
At this point, all the necessary tasks for getting your gateway operational and connected to the network have been successfully completed. The BlackRidge signed certificates are now imported on each of the BlackRidge TAC Gateways, and they are now ready for network access and operation.
The procedures outlined in this Setup Guide must be performed on every BlackRidge BR-2120 Gateway for AWS. At a minimum, you must configure two BlackRidge BR-2120 Gateways (one gateway to insert the TAC security tokens, and the other to resolve the TAC security tokens and apply the security policies) in order to use the BlackRidge solution to safeguard your high-value assets.
Once you have successfully completed the initial configuration of the BlackRidge BR-2120 Gateways for your environment, you must proceed with the next phase of the configuration process.
To continue the configuration process, please refer to the BlackRidge Gateway - Quick Start Guide.
116
Appendix A: Accessing the BlackRidge Gateway (SSH)
Using PuTTY and SSH to Access the Gateways
Initial configuration of the BlackRidge BR-2120 TAC Gateway for AWS must be done through the Virtual Console port.
After the initial configuration of the BlackRidge gateway has been completed through the Setup Wizard, you can use the SSH command to connect to the gateway through port 4, the M port, to perform subsequent administration and configuration tasks.
It is recommended that you determine what subnet and netmask values are appropriate for your local network environment before performing this task.
Step 1: Ensure that the computer used to perform the following procedure is connected on the same network as your gateways so that you can use SSH to connect to them as opposed to using the virtual console.
Step 2: Open another PuTTY session.
Figure B.1 – PuTTY Settings for SSH Connection to Gateway-1
Step 3: When you start the PuTTY program it opens the PuTTY Configuration screen. Click Session at the top of the configuration hierarchy displayed in the Category: section of the left window pane.
117
Step 4: Under the Basic options for your PuTTY session section, located on the right window
pane, enter your site-specific, user-defined IP address (for example, 192.168.1.42), the address previously assigned to the Management Port for BlackRidge gateway (Gateway-1), in the window labeled Host Name (or IP address).
Step 5: Enter 22 in the window labeled Port.
Step 6: Select the SSH connection type.
Step 7: Click Open to open an SSH connection to the management port on Gateway-1.
Now you can do all your administration and configuration through this SSH connection should you decide to discontinue using the virtual console.
If you want to create an SSH connection to BlackRidge Gateway (GW2), repeat steps 1 – 7 with
your site-specific, user-defined IP address for the Management Port on Gateway-2 (for
example, 192.168.1.43).
To continue with the configuration of the BlackRidge gateways, see the current version of the
BlackRidge Gateway Quick Start Guide.
118
Note: You may get the following warning:
Figure B.2 – rsa2 Key Fingerprint Warning
Step 8: Click Yes to update your PuTTY cache. You will be prompted with the following:
Login as: admin
[email protected]’s password:
Connecting to dispatcher...
Connected.
BlackRidge Bridge
Model BR-2110 Version 3.0.0.4619 Build Date Wed Aug 31 12:13:32 PDT
2016
WARNING: Your password is currently still set to the factory default!
Change it for security reasons.
admin@Gateway-1[bump0]:/>
Step 9: Log in with the default admin account using the default or user-defined password.
119
Appendix B: CLI Commands for Configuring the IP Network Attributes of the BlackRidge TAC Gateway
Configure DHCP Network Settings for the Management Port
Configure the IPv4 network settings of the management port.
Note: DHCP works for IPv4 and IPv6 protocols provided they are configured with it enabled. DHCP can only be enabled through the /etc/mgt/ipv4 command. IPv6 must be configured in order to obtain a dynamic IPv6 address.
Authorization
admin | netadm
Syntax
cfg [dhcp=<yes|no>] ip=<ip_address> mask=<netmask> gw=<gateway>
ARGUMENTS DEFINITIONS
dhcp Dynamic Host Configuration Protocol
ip IPv4 address of the management port
mask Network mask
gw Default gateway
Example (DHCP)
admin@Gateway-1 [bump0]:/> cd etc/mgt/ipv4
admin@Gateway-1 [bump0]:/etc/mgt/ipv4/> cfg dhcp=yes
Active Settings:
port4 Link encap:Ethernet HWaddr 00:90:0b:3a:0a:29
inet addr:192.168.0.209 Bcast:192.168.0.255
Mask:255.255.255.0
inet6 addr: 2602:306:c447:9edf:290:bff:fe3a:a29/64
Scope:Global
inet6 addr: fe80::290:bff:fe3a:a29/64 Scope:Link
inet6 addr: 2602:306:c447:9edf:c66:5738:e76b:8fb1/64
120
Scope:Global
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:402 errors:0 dropped:0 overruns:0 frame:0
TX packets:270 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:51286 (51.2 KB) TX bytes:31262 (31.2 KB)
Persistent IPv4 Settings:
# DHCP IP Netmask Gateway
4 Enabled <None> <None> <None>
Persistent IPv6 Settings:
# IP Prefix Gateway
Admin port settings changed.
cfg (static IP) - Configure IPv4 Network Settings for the Management Port
Configure the IPv4 network settings of the management port.
Authorization
admin | netadm
Syntax
cfg ip=<ip_address> mask=<netmask> gw=<gateway>
ARGUMENTS DEFINITIONS
dhcp Dynamic Host Configuration Protocol
ip IPv4 address of the management port
mask Network mask
gw Default gateway
Example (Static IP)
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv4 admin@Gateway-1[bump0]:/etc/mgt/ipv4> cfg ip=192.168.4.200
mask=255.255.255.0 gw=192.168.4.1
Admin port settings changed.
121
/etc/mgt/ipv6/ – Configure an IPv6 Address on the admin Port
add – Associate IPv6 Addresses with the Management Port
Configure an IPv6 address on the management port.
Authorization
admin | netadm
Syntax
add ip=<ip_address> prefix=<prefix_length> gw=<default_gateway>
ARGUMENTS DEFINITIONS
ip IPv6 address of the management port
prefix IPv6 address prefix
gw Default gateway (optional)
Example
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv6
admin@Gateway-1[bump0]:/etc/mgt/ipv6> add
ip=fe80::290:bff:fe1c:c961 prefix=64
IPv6 address added successfully.
del – Remove IPv6 Addresses from the Management Port
Remove an IPv6 address from the management port.
Authorization
admin | netadm
Syntax
del ip=<ip_address>
122
ARGUMENTS DEFINITIONS
ip IPv6 address of the management port
Example
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv6 admin@Gateway-1[bump0]:/etc/mgt/ipv6> del
ip=fe80::290:bff:fe1c:c961
IPv6 address deleted successfully.
disable – Disable IPv6 on the Admin Port
Disable IPv6 on the admin port.
Authorization
admin | netadm
Syntax
disable
Arguments
None.
Example
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv6 admin@Gateway-1[bump0]:/etc/mgt/ipv6> disable
IPv6 disabled successfully.
enable – Enable IPv6 on the Admin Port
Enable IPv6 on the admin port.
Authorization
admin | netadm
Syntax
enable
123
Arguments
None.
Example
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv6 admin@Gateway-1[bump0]:/etc/mgt/ipv6> enable
IPv6 enabled successfully.
mod – Modify IPv6 Address on the Admin Port
Modify an IPv6 address on the admin port.
Authorization
admin | netadm
Syntax
mod current_ip=<current_address> new_ip=<new_address>
[new_prefix=<new_prefix_length>] [new_gw=<new_default_gateway>]
ARGUMENTS DEFINITIONS
current_ip Current IPv6 address of the management port
new_ip Replacement IPv6 address of the management port
new_prefix Replacement IPv6 address prefix
new_gw Replacement IPv6 address prefix
Example
admin@Gateway-1[bump0]:/> cd /etc/mgt/ipv6 admin@Gateway-1[bump0]:/etc/mgt/ipv6> mod
current_ip=fe80::290:bff:fe1c:c961
new_ip=fe80::290:bff:fe1c:c961 new_prefix=32
IPv6 address modded successfully.
124
Appendix C: CLI Commands for Configuring the DNS Network Attributes of the BlackRidge TAC Gateway
/etc/dns/ - DNS Configuration
This directory contains commands for configuring up to three DNS servers for the management port on the gateway.
cfg - Configure DNS
Configure up to three distinct DNS servers.
Authorization
admin | netadm
Syntax
cfg dns1=<server_1> dns2=<server_2> dns3=<server_3>
ARGUMENTS DEFINITIONS
dns{1-3} The IP address of up to three DNS servers. These will be tried in order, beginning with dns1
Example
admin@Gateway-1[bump0]:/> cd /etc/dns
admin@Gateway-1[bump0]:/etc/dns> cfg dns1=8.8.8.8 dns2=8.8.4.4
dns3=8.8.8.4
The DNS servers were set successfully.
admin@Gateway-1[bump0]:/etc/dns/> show
# Dynamic resolv.conf(5) file for glibc resolver(3) generated by
resolvconf(8)
# DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE
OVERWRITTEN
nameserver 8.8.8.8
nameserver 8.8.4.4
nameserver 8.8.8.4
admin@Gateway-1[bump0]:/etc/dns/>
125
show - Show DNS Settings
Display the DNS configuration.
Authorization
admin | netadm
Syntax
show
Arguments
None
Example
admin@Gateway-1[bump0]:/> cd /etc/dns
admin@Gateway-1[bump0]:/etc/dns> show
# Dynamic resolv.conf(5) file for glibc resolver(3) generated by
resolvconf(8)
# DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE
OVERWRITTEN
nameserver 8.8.8.8
nameserver 8.8.4.4
admin@Gateway-1[bump0]:/etc/dns/>
126
Appendix D: CLI Commands for Configuring the Host Name Attributes of the BlackRidge TAC Gateway
/etc/hostname/ - Host Name and Domain Name Configuration
This directory contains the host name and domain name configuration attributes and commands.
cfg - Configure Hostname
Set the hostname.
Authorization
admin | netadm
Syntax
cfg name=<hostname> [domain=<domain name>]
ARGUMENTS DEFINITIONS
name The name of the local device
Example
admin@Gateway-1[bump0]:/> cd /etc/hostname
admin@Gateway-1[bump0]:/etc/hostname/> cfg name=Gateway-A
domain=brt.com
Hostname and Domain name were set successfully.
Syslog was successfully restarted.
admin@Gateway-1[bump0]:/etc/hostname/>
Note: The CLI prompt will reflect the change until the admin login session is exited and a new login session is established as shown below.
admin@Gateway-1[bump0]:/etc/hostname/> exit
Exit? [n] y
BlackRidge Gateway-A ttyS0
Gateway-A login:
127
show - Show the Hostname and Domain Name
Display the current hostname and domain name.
Authorization
admin | cloakadm | keymgr | netadm | user
Syntax
show
Arguments
None
Example
admin@Gateway-1[bump0]:/> cd /etc/hostname
admin@Gateway-1[bump0]:/etc/hostname> show
Hostname=Gateway-1
Domainname=brt.com
admin@Gateway-1[bump0]:/>