Web example: Configuring IP access with RADIUS authentication

Network configuration

As shown in Figure 1, the device acts as an SSL VPN gateway that connects the public network and the private network. On the private network, a Windows Server 2008 R2 CA server and a RADIUS server that runs IMC PLAT 7.3 (E0504) are deployed. Users need secure access to the internal server (20.2.2.2/24) in IP access mode.

Perform the following tasks:

Figure 1 Network diagram (RADIUS authentication)

 

Software versions used

This configuration example was created and verified on F9900 of the F5000-AI120 device.

Restrictions and guidelines

Procedure

Configuring the device

  1. Assign IP addresses to interfaces and add the interfaces to security zones.

# On the top navigation bar, click the Network tab.

# From the navigation pane, select Interface Configuration > Interfaces.

# Click the Edit icon for GE 1/0/1.

# In the dialog box that opens, configure the interface:

  1. Select the Untrust security zone.

  1. On the IPv4 Address tab, enter the IP address and mask length of the interface. In this example, enter 1.1.1.2/24.

  1. Use the default settings for other parameters.

  1. Click OK.

# Add GE 1/0/2 to the Trust security zone and set its IP address to 2.2.2.2/24 in the same way you configure GE 1/0/1.

# Add GE 1/0/3 to the Trust security zone and set its IP address to 3.3.3.1/24 in the same way you configure GE 1/0/1.

# Add GE 1/0/4 to the Trust security zone and set its IP address to 192.168.100.3/24 in the same way you configure GE 1/0/1.

  1. Configure settings for routing:

This example configures static routes.

# On the top navigation bar, click Network.

# From the navigation pane, select Routing > Static Routing.

# On the IPv4 Static Routing tab, click Create.

# In the dialog box that opens, configure a static IPv4 route to reach 40.1.1.1:

  1. Enter destination IP address 40.1.1.1.

  1. Enter mask length 24.

  1. Enter next hop address 1.1.1.3.

  1. Use the default settings for other parameters.

  1. Click OK.

# Configure a static IPv4 route to reach 20.2.2.2:

  1. Enter destination IP address 20.2.2.2.

  1. Enter mask length 24.

  1. Enter next hop address 2.2.2.3.

  1. Use the default settings for other parameters.

  1. Click OK.

  1. Create security policies:

# On the top navigation bar, click Policies.

# From the navigation pane, select Security Policies > Security Policies.

# Click Create.

# In the dialog box that opens, configure a security policy named untrust-local to permit the specified traffic from the Untrust to Local security zones:

# Click OK.

# Create security policy untrust-trust to permit the specified traffic from the Untrust to Trust security zones:

# Click OK.

  1. Request a server certificate for the device:

  1. Create a certificate subject:

# On the top navigation bar, click Objects.

# From the navigation pane, select PublicKey Cert > PKI > Certificate Subject.

# Click Create.

# Create a certificate subject as shown in Figure 2, and the click OK.

Figure 2 Creating a certificate subject

 

  1. Create a PKI domain:

# On the Certificate page, click Create PKI domain.

# Create a PKI domain as shown in Figure 3, and then click OK.

Figure 3 Creating a PKI domain

 

  1. Create a certificate request:

# On the Certificate page, click Submit Cert Request.

# Configure the certificate request settings as shown in Figure 4.

Figure 4 Creating a certificate request

 

# Click OK.

The certificate request content will be displayed, as shown in Figure 5.

Figure 5 Certificate request content

 

# Copy the certificate request content and click OK.

  1. Request a server certificate from the CA:

# Enter http://192.168.100.247/certsrv in the browser address bar.

# On the certificate service home page shown in Figure 6, click Request a certificate.

Figure 6 Certificate service home page

 

# On the Request a Certificate page shown in Figure 7, click advanced certificate request.

Figure 7 Request a Certificate page

 

# Paste the previously copied certificate request content in the Base-64-encoded certificate request CMC or PKCS # 10 or PKCS # 7) field, as shown in Figure 8.

Figure 8 Pasting the certificate request content

 

# Click Submit.

After the certificate request is approved by the CA administrator, enter http://192.168.100.247/certsrv in the browser address bar.

# On the certificate service home page shown in Figure 9, click View the status of a pending certificate request.

Figure 9 Certificate service home page

 

# Select the certificate request you want to view.

Figure 10 View the Status of a Pending Certificate Request page

 

The Certificate Issued page opens, indicating that the requested server certificate has been issued, as shown in Figure 11.

Figure 11 Certificate Issued page

 

# Click Download certificate to download the server certificate and save it locally.

  1. Download the CA certificate:

# Enter http://192.168.100.247/certsrv in the browser address bar.

# On the certificate service home page shown in Figure 12, click Download a CA certificate, certificate chain, or CRL.

Figure 12 Certificate service home page

 

# On the Download a CA certificate, certificate chain, or CRL page shown in Figure 13, click Download CA certificate.

Figure 13 Download a CA certificate, certificate chain, or CRL page

 

# Save the downloaded CA certificate locally.

  1. Import the CA certificate and server certificate to the PKI domain:

  1. Import the CA certificate:

# On the top navigation bar, click Objects.

# From the navigation pane, select PublicKey Cert > PKI > Certificate.

# Click Import certificate.

# Import the locally saved CA certificate, as shown in Figure 14, and then click Apply.

Figure 14 Importing the CA certificate

 

  1. Import the server certificate:

# On the Certificate page, click Import certificate.

# Import the locally saved server certificate, as shown in Figure 15, and then click Apply.

Figure 15 Importing the server certificate

 

  1. Configure an SSL server policy:

# On the top navigation bar, click Objects.

# From the navigation pane, select SSL > SSL Server Policies.

# Click Create.

# Configure an SSL server policy as shown in Figure 16, and then click Apply.

Figure 16 Creating an SSL server policy

 

  1. Configure a RADIUS scheme:

# On the top navigation bar, click Objects.

# From the navigation pane, select User > Authentication > RADIUS.

# Click Create.

# Configure a RADIUS scheme named radius:

Figure 17 Configuring a RADIUS scheme

 

# Configure the advanced settings for the RADIUS scheme in the Advanced settings area, as shown in Figure 18.

Figure 18 Configuring the advanced settings for the RADIUS scheme

 

# Click Apply.

  1. Create an ISP domain:

# On the top navigation bar, click Objects.

# From the navigation pane, select User > Authentication > ISP Domains.

# Click Create.

# In the dialog box that opens, configure an ISP domain named sslvpn as shown in Figure 19 and Figure 20:

Figure 19 Configuring an ISP domain (1)

 

Figure 20 Configuring an ISP domain (2)

 

  1. Create a user group:

# On the top navigation bar, click Objects.

# From the navigation pane, select User > User Management > Local Users.

# Click the User Group tab.

# Click Create.

# Create a user group named sslvpn_usergroup and specify SSL VPN resource group resourcegrp for the user group, as shown in Figure 21.

# Click Apply.

Figure 21 Creating a user group

 

  1. Configure the SSL VPN gateway:

# On the top navigation bar, click Network.

# From the navigation pane, select VPN > SSL VPN > SSL VPN Gateways.

# Click Create.

# Create an SSL VPN gateway as shown in Figure 22, and then click Apply.

Figure 22 Creating an SSL VPN gateway

 

 

  1. Create an SSL VPN AC interface:

# On the top navigation bar, click Network.

# From the navigation pane, select VPN > SSL VPN > SSL VPN AC Interfaces.

# Click Create.

# In the Create Interfaces dialog box that opens, enter 1 in the Interface number field and click OK.

# In the Modify Interface Settings dialog box, configure the parameters for the SSL VPN AC interface.

# Click OK.

Figure 23 Configuring parameters for the SSL VPN AC interface (1)

 

Figure 24 Configuring basic settings for the SSL VPN AC interface (2)

 

  1. Create an address pool for IP access users:

# On the top navigation bar, click Network.

# From the navigation pane, select VPN > SSL VPN > IP Access Address Pools.

# Click Create.

# Create an IP access address pool as shown in Figure 25, and then click Apply.

Figure 25 Creating an IP access address pool

 

  1. Configure an SSL VPN context:

  1. On the top navigation bar, click Network.

  1. From the navigation pane, select VPN > SSL VPN > SSL VPN Contexts.

  1. Click Create.

  1. Configure the basic settings for the SSL VPN context as shown in Figure 26, and then click Next.

Figure 26 Configuring basic settings for an SSL VPN context

 

 

  1. Enable the tunnel service and configure tunnel service parameters, as shown in Figure 19.

Figure 27 Configuring tunnel service settings

 

  1. In the IPv4 access resources area, create an IPv4 route list named rtlist.

# Click Create in the IPv4 access resources area.

# Specify the IPv4 route list name and create IPv4 route entries.

# Click Apply.

Figure 28 Creating an IPv4 route list

 

  1. Click Next, and then configure an resource group.

# On the Resource groups page, click Create.

# Specify the resource group name as resourcegrp and configure other resource parameters, as shown in Figure 29. In this example, use IPv4 ACL 3999 to restrict user access to resources with specific IP addresses and ports.

Figure 29 Configuring IP access resources for the IP access service

 

# Click Apply.

  1. Click Next to configure authentication settings.

Figure 30 Configuring authentication settings

 

  1. Click Finish.

Configuring the RADIUS server

In this example, the IMC version is iMC PLAT 7.3 (E0504).

  1. Configure an access policy named resourcegrp:

# Log in to IMC.

# On the top navigation bar, click User.

# From the navigation pane, select User Access Policy > Access Policy.

# Click Add.

# Add an access policy as shown in Figure 33.

# Click OK.

Figure 31 Creating an access policy

 

  1. Configure an access service named sslvpnservice:

# On the top navigation bar, click User.

# From the navigation pane, select User Access Policy > Access Service.

# Click Add.

# Add an access service as shown in Figure 34. In this example, specify access policy resourcegrp as the default access policy.

# Click OK.

Figure 32 Creating an access service

 

  1. Configure an access device:

# On the top navigation bar, click User.

# From the navigation pane, select User Access Policy > Access Device Management > Access Device.

# Click Add.

# Add an access device as shown in Figure 35. In this example, set the shared key to 123456.

# Click OK.

Figure 33 Configuring an access device

 

  1. Configure an access user:

# Access the User > Add User page.

# Add a platform user as shown in Figure 36.

# Click OK.

Figure 34 Adding a platform user

 

# From the navigation pane, select Access User > All Access Users.

# Click Add.

# Add an access user and assign access service sslvpnservice to the user, as shown in Figure 37.

# Click OK.

Figure 35 Adding an access user

 

Configuring the host

  1. Configure the IP address and gateway address settings for the host and make sure it can reach the SSL VPN gateway and the CA server.

  1. Submit a client certificate request to the CA server:

  1. Enter http://192.168.100.247/certsrv in the browser address bar.

  1. On the certificate service home page shown in Figure 38, click Request a certificate.

Figure 36 Certificate service home page

 

  1. On the Request a Certificate page shown in Figure 39, click advanced certificate request.

Figure 37 Request a Certificate page

 

  1. Create a client certificate request, as shown in Figure 40.

Figure 38 Creating a client certificate request

 

  1. Click Submit.

  1. Install the client certificate on the host:

  1. After the certificate request is approved by the CA administrator, enter http://192.168.100.247/certsrv in the browser address bar.

  1. On the certificate service home page shown in Figure 41, click View the status of a pending certificate request.

Figure 39 Certificate service home page

 

The View the Status of a Pending Certificate Request page opens, as shown in Figure 42.

Figure 40 View the Status of a Pending Certificate Request page

 

  1. Click the client certificate whose status you want to view.

  1. On the Certificate Issued page shown in Figure 43, click Install this certificate to install the client certificate. If the host does not have a CA certificate, the page shown in Figure 44 opens. You must install the CA certificate first.

Figure 41 Installing the client certificate

 

  1. To install the CA certificate, click install this CA certificate. Then, click Install this certificate to install the client certificate.

Figure 42 Installing the CA certificate and then the client certificate

 

After the client certificate is installed, the Certificate Installed page shown in Figure 45 opens.

Figure 43 Certificate Installed page

 

Verifying the configuration

  1. In the browser address bar of the host, enter https://1.1.1.2:2000 and press Enter.

  1. Select the client certificate for authentication, and then click OK to go to the Domain List  page.

  1. Click domainip to access the login page. Then, enter username user1 and password 123456.

Figure 44 SSL VPN login page

 

  1. Click Login.

  1. Click START to start the IP client application.

If the host does not have an iNode client installed, the system installs the iNode client, and then starts and connects the iNode client to the SSL VPN gateway.

If the host already has an iNode client installed, the system starts the iNode client and connects it to the SSL VPN gateway directly.

For the first login, you must configure properties and select an authentication mode and a client certificate.

Figure 49 shows that the iNode client is successfully connected to the SSL VPN gateway.

Figure 45 Connecting the iNode client to the SSL VPN gateway