Management
Chapter 1. Product Overview
10
In a branch-to-central office application, data is secured between each branch and
the central office. Additionally, a secure tunnel is established between the two
branch sites. This configuration can be used to transfer sensitive data between
remote sites or to back up remote servers to central storage devices.
Tunnels
A security tunnel is the network path inside which data is encrypted. Tunnels can
begin and terminate at various points in the network:
z
Client workstation, either the desktop or remote access, such as dial-in
z
Edge device, such as a router or an edge switch
z
Switch or router inside the service provider network, typically at the
point-of-presence (POP)
The HA4000 can be deployed in a variety of locations and topologies, depending
on the application. Several examples are a geographically remote Storage Area
Network (SAN) environment, a site-to-site VPN, a gigabit Ethernet Metropolitan
Area Network (MAN), or a campus building-to-building environment.
In an IPSec deployment, identify the communication endpoints and the secure
tunnel endpoints. A communication endpoint is the entity that is being protected
by the HA4000. This can be a host, a server, or a subnet. The secure tunnel
endpoints are the HA4000 gateways or other IPSec peer.
Management
The HA4000 gateway is managed from the SafeEnterprise Security Management
Center (SMC). It also has a command line interface (CLI) to configure the HA4000
operating parameters. CLI sessions are managed through a direct serial link to the
HA4000.
For information on configuring and working with the HA4000 from the SMC, refer
to the
SafeEnterprise Security Management Center User’s Guide
.
Software Requirements
Make sure that these customer-provided software products are installed on the
management workstation:
z
VT-100 terminal emulation utility, such as HyperTerminal, to connect to the CLI
through a serial link.
z
Optional
. Telnet client to remotely configure the HA4000 through the
gateway’s 10/100 Ethernet management port.
FIPS 140-2 Level 2 Operation
The National Institute of Standards and Technology (NIST) validated the HA4000
gateway as FIPS 140-2 Level 2 compliant. To meet FIPS 140-2 Level 2
requirements, configure the HA4000 using these guidelines:
z
DES, 3DES, or AES encryption