HPE Remote Device Access. Security Whitepaper

Size: px
Start display at page:

Download "HPE Remote Device Access. Security Whitepaper"

Transcription

1 HPE Remote Device Access Security Whitepaper Document Release Date: March 2018 Software Release Date: March 2018

2 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Valid license from HPE required for possession, use or copying. Consistent with FAR and , Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice Copyright Hewlett Packard Enterprise Development LP Trademark Notices Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. HPE Remote Device Access: Security Whitepaper Page 2 of 24

3 Contents Executive summary 4 HPE RDA overview 5 RDA-CAS connectivity types 8 Customer-Initiated TLS mode 9 HPE-Initiated TLS mode 9 HPE-Initiated IPsec mode 9 HPE-Initiated SSH direct mode 10 HPE-Initiated SSH over IPsec mode 10 Tunnel persistence 10 Connections summary 11 Connections summary (continued) 12 HPE RDA Security 13 CAS-Agent 13 RDA-CAS 13 SSHv2 server 14 RDA-CAS installation 14 RDA-CAS registration 14 Customer-Initiated TLS 15 HPE-Initiated TLS 16 HPE-Initiated IPsec 17 HPE-Initiated SSH 18 HPE-Initiated SSH over IPsec 19 RDA Midways 19 RDA Support App 20 Authentication 20 Certificates 20 Encryption 22 Logging 22 Access control 22 Glossary 24 HPE Remote Device Access: Security Whitepaper Page 3 of 24

4 Executive summary Executive summary About HPE Remote Device Access (HPE RDA) HPE RDA provides a new device connection method and secure transport mechanism. Designed with the customer in mind, privacy and security are of highest priority. HPE RDA gives you more control over your devices, enables secure transfer of data, and efficient package deployment. HPE RDA is a layered communications architecture, a full-featured implementation of that architecture, and the infrastructure and support structure that goes with it. HPE RDA gives more control to your administrators by providing an easy to manage user interface while moving connectivity into the HPE RDA cloud. Persistent connections originate from designated devices in your network up to the HPE RDA cloud, using well known ports and protocols. Connections can be scheduled or on demand and are fully controlled by the CAS Administrator. High-security environments with specialized, compartmented connectivity needs can be accommodated with the HPE RDA flexible options and routing mechanisms. HPE RDA comes in three versions: 1) Embedded CAS-Agent, 2) Standalone RDA-CAS and 2) SSH Direct. The Embedded CAS-Agent (Customer Access Service) provides remote access for HPE Support, data transfer of device telemetry to HPE and diagnostic or update package deployment from HPE to the device. The Standalone RDA-CAS provides secure remote access for authorized HPE support personnel into your environment. SSH Direct also provides remote access for authorized HPE Support technicians, but does not require any HPE software to be downloaded or installed in your environment. HPE RDA delivers all of these capabilities via one pipe with HPE using TLS over HTTPS or TLS over SSH. This means firewall and IPS/IDS system configurations are simplified. Monitoring and managing all external access connections to HPE can be done via a single open port in your external firewall. HPE RDA provides a reliable, available, and scalable infrastructure. Read on for more information on the technical features and capabilities. HPE Remote Device Access: Security Whitepaper Page 4 of 24

5 HPE RDA overview HPE RDA overview HPE RDA capabilities HPE RDA is a two-way communication solution for HPE Remote Support that provides: Remote access from HPE support engineers to customer devices - Available with the CAS-Agent, RDA-CAS and SSH Direct options - The CAS-Agent provides remote access via a customer device initiated HTTPS connection - The RDA-CAS provides remote access either through a customer initiated HTTPS connection or via a --HPE initiated HTTPS connection - SSH Direct provides remote access through a customer initiated SSH connection to HPE Secure data transport from customer devices to HPE (Available with some embedded clients) Remote copy and execution enables delivery and execution of files from HPE to customer devices (Available with some embedded clients) Remote access HPE RDA provides secure connectivity between HPE and customer devices using forward and reverse proxy technology. The HPE RDA Support App is a software application that resides on the HPE or Partner Service Agents' desktop. It provides a secure authenticated connection that enables quick access to devices and secure transport of data to and from HPE services, customer devices and HPE support agents from a single application. Secure data transport HPE RDA provides secure transfer of data between HPE to customer devices, as well as customer devices to HPE. To ensure secure transfer of data, incorporates: Authenticated endpoint identification. This is endpoint identity, which provides an easy method for HPE support engineers to find customers and devices and connect to them securely. Layered security protocol with a meet-in-the middle architecture. This provides two point authority, which enables user access control at the Midway server (by HPE) and at the CAS (by the CAS administrator). Remote copy and execute HPE RDA provides remote copy and execution on customer devices, which enables services such as firmware update(s) on your device(s) for fast security updates. HPE Remote Device Access: Security Whitepaper Page 5 of 24

6 HPE RDA overview Figure 1. CAS-Agent infographic Key components: RDA-CAS: HPE RDA service running as a daemon on supported Linux OS s or in a Linux VM Midway Servers: Regional relay servers, internet facing Dropbox: Data lake to store incoming customer data HPE RDA Service Nodes: Servers providing HPE RDA services and disc space in the HPE IT Data Center HPE RDA Support App: Secure client for HPE support technicians that enables access to customer devices Figure 2. RDA-CAS infographic Key components: RDA-CAS: HPE RDA service running as a daemon on supported Linux OS s or in a Linux VM Midway Server: Regional relay servers, internet facing HPE RDA Support App: Secure client for HPE support technicians that enables access to customer devices Target Devices: Systems that an HPE RDA customer authorizes for remote access HPE Remote Device Access: Security Whitepaper Page 6 of 24

7 HPE RDA overview Figure 3. SSH Direct infographic Key components: Customer Device with SSH Server: Customer provided SSHv2 Server running on a local device Midway Servers: Regional 'relay' servers, internet facing HPE RDA Support App: Secure client for HPE support technicians that enables access to customer devices Figure 4. SSH over IPsec infographic Key components: Customer Device with SSH Server: Customer Provided SSHv2 server running on a local device IPsec router: Customer IPsec device, internet facing, used to terminate an IPsec tunnel at customer site Midway Servers: Regional 'relay' servers, internet facing used to terminate IPsec tunnel at HPE HPE RDA Support App: Secure client for HPE support technicians that enables access to customer devices HPE Remote Device Access: Security Whitepaper Page 7 of 24

8 RDA-CAS connectivity types RDA-CAS connectivity types The HPE RDA remote access connection type indicates how a tunnel-layer connection is formed between a customer device (the RDA-CAS) and an HPE RDA Midway server. The customer can choose the connectivity type most appropriate for their situation. The RDA-CAS has five connectivity types available to configure. All connectivity types provide data encryption over Transport Layer Security (TLS) or via Secure Shell (SSH). As part of installing the RDA-CAS, you will need to choose which connection type is best for your network environment: Customer-Initiated TLS - Customer RDA-CAS initiates a TLS connection to an HPE Midway server - Suitable for most customers - Uses a standard port and protocol that's likely already open in your network - Many popular proxy servers supported, with or without authentication - Very easy to setup HPE-Initiated TLS - HPE initiates a TLS tunnel from an HPE Midway server to an installed RDA-CAS - Suitable for customers that restrict outbound communications and/or filter their inbound connections - Setup is easy, fully customer driven and has a built in connection test - Setup may involve configuration of your firewall or network routes before you are able to complete the --connection setup with HPE HPE-Initiated IPsec over TLS - HPE initiates an IPsec tunnel from the HPE Midway server to an IPsec device on the customer perimeter --network - HPE initiates a TLS tunnel from an HPE Midway server through the IPsec tunnel to an installed -RDA-CAS in the customer network - Suitable for customers that restrict outbound communications and/or filter their inbound connections - Setup is easy, fully customer driven and has a built in connection test - Setup may involve configuration of your firewall or network routes before you are able to complete the --connection setup with HPE HPE-Initiated SSH Direct - Requires no HPE provided software - Uses customer provided SSH v2 server - HPE initiates an SSH connection (TCP/22) from Midway server to customer provided internet routable --IP address (Network Address Translation (NAT) is supported) HPE-Initiated SSH over IPsec - Identical to SSH Direct but the SSH tunnel is encapsulated inside a non-routable IPSec tunnel HPE Remote Device Access: Security Whitepaper Page 8 of 24

9 RDA-CAS connectivity types Customer-Initiated TLS mode Customer-Initiated TLS (Transport Layer Security) is the simplest and most popular connectivity mode. Suitable for most customers, it uses a standard HTTPS connection (TCP/443) that s typically already open or accessible via a web proxy. HPE RDA enabled customer devices connect to HPE on this port using TLSv1.2 over HTTPS with a persistent, semi-persistent, or on-demand tunnel. HPE-Initiated TLS mode HPE-Initiated TLS mode (Transport Layer Security) is used when customers prefer that HPE connects to them, instead of the customer connecting to HPE. A TLSv1.2 connection is initiated from an HPE Midway server to port TCP/2371 on the RDA-CAS. HPE-Initiated TLS supports Network Address Translation (NAT) at the customer firewall. The HPE-Initiated TLS mode is suitable for those that restrict outbound communications and filter their inbound communications. Setup is relatively easy, but involves the use of an online enrollment portal at HPE. It includes a closed-loop security check. It may, also, require that the customer configure their external (and internal) firewalls and network routing tables, to allow HPE s connection into their environment. HPE-Initiated IPsec mode The HPE-Initiated IPsec mode is designed for high-security customers, such as government, military, finance, and many health organizations will only permit access into their network via a preconfigured IPsec connection. It is essentially the HPE-Initiated TLS mode wrapped in an HPE controlled and initiated IPsec connection. IPsec uses internet Protocol 50 ( ESP) and UDP/500 (ISAKMP) between your IPsec device and the HPE Midway servers. This is a non-routing transport bridge and Generic Routing Encapsulation (GRE) is not used. Only port TCP/2371 is permitted to transit within this IPsec transport. It must be initiated by an HPE Midway server, and may only originate from per-customer unique private and non-routing micro subnet allocated on the Midway server. HPE Remote Device Access: Security Whitepaper Page 9 of 24

10 RDA-CAS connectivity types HPE-Initiated SSH direct mode The SSH tunnel is provided as a simple, secure, easy to implement connectivity option for remote access. With this solution only SSHv2 server (TCP/22) is required inbound from the HPE Midway server IP. This solution requires no HPE provided software, any standard SSHv2 server can be used as the CAS for this type of connection. Customer administrators will need to ensure their firewall and routing is properly configured to accommodate inbound SSH from the HPE Midway servers, then enroll with the HPE Midway server to receive an enrollment token (as a closed loop check). The token is valid for 24 hours and must be on the SSH server being used as the CAS. HPE-Initiated SSH over IPsec mode Tunnel persistence HPE-Initiated SSH over IPsec is essentially an HPE-Initiated SSH Direct tunnel mode wrapped in an HPE controlled and HPE-Initiated IPsec connection. SSH setup is identical, however this option requires additional online enrollment to configure the IPsec gateway parameters supplied by HPE. This setup can be performed on at the HPE online enrollment portal. In addition to the connection type, you may choose the persistence of your device s tunnel: on-demand, scheduled, or persistent. On-demand tunnels are brought-up when needed. Typically, you will access and use the HPE RDA-CAS UI to bring up the tunnel. It will stay open as long as support activity is occurring within the tunnel, but you can also set a hard-expiration time limit (such as 12 hours from now ). Scheduled tunnels are brought up on a regular time schedule. This option is only available for HPE initiated connection types; HPE will automatically check connectivity a few times every month to ensure that device certificates are maintained (renewed). Persistent tunnels stay connected all the time. This provides the best support availability, and very little network overhead when the tunnel is idle as only a few tiny and infrequent keep alive messages are exchanged. The security impact is negligible as all the other controls described in this document are still in effect. The persistent tunnel option is only available with the Customer-Initiated TLS connection type. HPE Remote Device Access: Security Whitepaper Page 10 of 24

11 Connections summary RDA-CAS Customer-Initiated TLS HPE-Initiated TLS HPE-Initiated TLS over IPsec HPE-Initiated SSH HPE-Initiated SSH over IPsec Description Customer RDA-CAS initiates a TLS tunnel to an HPE Global Midway Customer has control over when and for how long the tunnel to the Midway is connected HPE Support initiates a TLS connection to the Global HPE Midways and can then initiate an interactive support session with the desired customer target device Customer has control over who in HPE can access any given target device in their network HPE initiates a TLS tunnel from an HPE Global Midway to an installed RDA-CAS Customer has control over when and for how long the tunnel to the Midway is connected HPE Support initiates a TLS connection to the Global HPE Midways and can then initiate an interactive support session. with the desired customer target device Customer has control over who in HPE can access any given target device in their network HPE initiates an IPsec tunnel from the HPE Global Midway to a customer provided IPsec router Customer has control over when and for how long the tunnel to the Midway is connected HPE Support initiates a TLS connection to the Global HPE Midways and can then initiate an interactive support session with the desired customer target device HPE initiates an SSH direct connection from the HPE Global Midway to a customer provided SSHv2 Server Requires Internet routable IP for SSHv2 Server HPE Support initiates a TLS connection to the Global HPE Midways and can then initiate an interactive support session with the desired customer target device Customer has control over who in HPE can access any given target device in their network HPE initiates an IPsec tunnel from the HPE Global Midway to a customer provided IPsec router Requires Internet routable IP for SSHv2 Server HPE initiates an SSH direct connection from the HPE Global Midway to a customer provided SSHv2 Server through IPsec tunnel HPE Support initiates a TLS connection to the Global HPE Midways and can then initiate an interactive support session with the desired customer target device Customer has control over who in HPE can access any given target device in their network HPE Remote Device Access: Security Whitepaper Page 11 of 24

12 Connections summary (continued) RDA-CAS Customer-Initiated TLS HPE-Initiated TLS HPE-Initiated TLS over IPsec HPE-Initiated SSH HPE-Initiated SSH over IPsec Requirements Runs on CentOS or Debian Linux distributions May be installed natively or in a VM See installation guide for details Runs on CentOS or Debian Linux distributions May be installed natively or in a VM See installation guide for details IPsec tunnel terminates into a Customer managed router Only TCP/2371 traffic allowed in the IPsec tunnel IPsec IP address assigned by HPE SSHv2 Server Internet routable IP address (NAT supported) IPsec capable router SSHv2 Server Internet routable IP address (NAT supported) Activity log syslog syslog syslog Configurable (SSHd) Configurable (IPSec and SSHd) Tunnel Persistence On Demand Persistent On Demand Scheduled On Demand Scheduled On Demand Scheduled On Demand Scheduled Comments Recommended if your network allows outbound connections Requires port 443 open outbound Easiest to configure Recommended if your network policy does not allow outbound connections Requires: - Network port 2371 open inbound - Customer registration of CAS endpoint with HPE via the RDA enrollment tool Limited IPsec configurations are allowed Is essentially HPE- Initiated TLS tunnel wrapped in and HPE- Initiated IPsec tunnel Inbound connections from known source IP Customer provided SSHv2 Server required Limited IPsec configurations are allowed Customer provided SSHv2 Server required Is essentially HPE-Initiated SSH, wrapped in an HPE- Initiated IPsec tunnel More involved setup than a Customer- Initiated TLS tunnel HPE Remote Device Access: Security Whitepaper Page 12 of 24

13 HPE RDA Security HPE RDA Security CAS-Agent The CAS-Agent is available as an embedded agent in certain HPE hardware devices. There is also a standalone RDA-CAS (see next section). Regardless of the CAS type, the CAS administrator is in full control of the CAS functions and capabilities. The CAS-Agent enables a device to be connected to HPE. This CAS can be enabled or disabled by the device administrator. It is able to work with most proxies and firewalls. It also uses a single outbound HTTPS (TCP/443) connection from the CAS device (RDA-CAS or CAS-Agent) to the HPE Midway server. The CAS-Agent enables the following three primary functions: Secure data transport from device to HPE. Provides a mechanism for device information to be automatically sent to HPE. Hardware event details and logs can automatically be sent to HPE for immediate action via a secure connection. Remote connectivity for HPE support engineers to CAS-Agent device. Authenticated HPE Support engineer access to the CAS device for support purposes. All HPE RDA sessions are authenticated at HPE (only authorized support personnel are allowed to access the RDA Midways) and again at the CAS device where the device administrator has the ability to allow or deny HPE user connections. Remote copy and execution. Enables the ability for HPE to provide important updates (firmware updates, security patches, etc.) to your devices. Device updates are posted to a central repository by authorized HPE personnel, and the CAS will periodically check the repository for updates. If updates are available, the CAS can download and install them automatically, keeping your device updated with the latest firmware and patches. RDA-CAS The HPE supplied RDA-CAS is a self-contained Linux-based application package capable of running on an HPE ProLiant server or in a Virtual Machine. The RDA-CAS comes in both Debian 8.x 64-bit and CentOS 6.x 64-bit distributions. Customers are also able to configure any standard SSHv2 server to function as an SSH CAS for HPE Initiated SSH connections. Unlike the CAS-Agent, the RDA-CAS has a single function, which is to allow authorized HPE Support agent access to HPE Supported devices on your company network. The RDA-CAS accomplishes remote connectivity in one of two ways: Customer-Initiated TLS or HPE-Initiated TLS. With either method, the CAS administrator has full control of all remote access sessions. The RDA CAS-Agent User Interface provides the ability for a CAS administrator to control who (an HPE Support agent) can access what (device in your enterprise). The RDA-CAS uses a white list access control model, only connections that are specifically allowed by the CAS administrator can connect to (and through) the RDA-CAS. All others are denied. This gives the CAS administrator complete control over who at HPE can access what devices in your enterprise. Furthermore, the CAS administrator can terminate any or all access sessions with a click of the mouse, or the CAS administrator can configure a time threshold for access sessions, when the timeout threshold is exceeded, the session will automatically terminate. SSH CAS configurations are fully controlled by the customer administrator. SSH connections are authenticated using standard SSH authentication (typically keyboard interactive username/password) on the SSHv2 server. HPE Remote Device Access: Security Whitepaper Page 13 of 24

14 HPE RDA Security SSHv2 server SSH direct and SSH over IPsec allow remote access connections without the need to download and install any HPE supplied software. SSH direct connections require a customer provided SSHv2 server to act as the connect point for HPE Support engineers. SSH direct configurations are fully controlled by the Customer administrator. SSH direct connections can be authenticated using any standard authentication option (typically keyboard interactive username/password) supported by your SSHv2 server. RDA-CAS installation Installation of the HPE-supplied RDA-CAS requires root access on the host or VM, a minimum of 10Mb s free disk and an Internet routable IPv4 or IPv6 network connection (Direct or via a Proxy). The software can be downloaded from the global URL: (choose the CentOS or Debian CAS- Agent software kit). Once downloaded and transferred to the RDA-CAS host it can be installed and configured using the instructions provided in the RDA Install Guide. The RDA-CAS is pre-configured with the names and IP addresses of all RDA Midway servers (located geographically). The RDA-CAS software includes a CAS certificate signed by the HPE RDA Certificate Authority. See the Certificates section for more information regarding RDA Certificates. The primary purpose of the RDA-CAS is to serve as an HPE remote access server that allows HPE authorized support agents to securely access supported devices in your corporate network. There are five connection methods for the RDA-CAS. They are: Customer-Initiated TLS, HPE-Initiated TLS, HPE-Initiated TLS over IPsec, HPE-Initiated SSH and HPE-Initiated SSH over IPsec. These connection types are described in more detail in the following sections. RDA-CAS registration Once the RDA-CAS installation is complete, it must register with the Midway servers. The preconfigured Global DNS entry for the RDA Midway servers (midway.ext.hpe.com) will resolve to one of several Midway servers located in three geographical regions (United States, United Kingdom and Singapore). To register, the RDA-CAS will establish communication with a Midway server and present its RDA certificate to the Midway server. The Midway server will register the RDA-CAS and issue an HPE RDA CA signed certificate for the RDA-CAS to use for HPE Remote Access sessions. HPE Remote Device Access: Security Whitepaper Page 14 of 24

15 HPE RDA Security Customer-Initiated TLS For the Customer-Initiated TLS tunnel, the RDA-CAS admin is actively involved with all HPE Support agent remote access sessions. With Customer-Initiated TLS, the CAS Admin must configure access for the HPE Support agent (based on the agent s HPE address) in the CAS User Interface (UI) and open a persistent (or on demand) HTTPS (TCP/443) connection tunnel to the RDA Midway server. When a TLS tunnel is established with the Midway server, an HPE Support agent connected to the HPE RDA Midway server using the HPE RDA Support App, can select your RDA-CAS from the list of available devices and click Start Session to connect. The Midway will bridge the RDA-CAS connection with the HPE Support agent connection and allow the connection through to the RDA-CAS where the HPE Support agent s credentials (HPE DigitalBadge) and requested service will be validated against the Access Control whitelist on the RDA- CAS. If the support agent is authorized to access the RDA-CAS, and the credentials (HPE DigitalBadge) are valid, then the connection is established and all customer authorized protocols will be tunneled through the HTTPS connection. If the HPE Support agent s HPE address is not in the RDA-CAS whitelist, the verification check will fail and the connection will be refused. Figure 5. Customer-Initiated TLS infographic HPE Remote Device Access: Security Whitepaper Page 15 of 24

16 HPE RDA Security HPE-Initiated TLS HPE-Initiated TLS tunnel is similar to Customer-Initiated TLS, in that the HPE Support agent must be configured for access to the RDA-CAS (added to the Access Control white list by a RDA-CAS administrator via the RDA-CAS user Interface) before he/she can connect. However, for HPE-Initiated TLS, the RDA-CAS administrator enables inbound TCP/2371 connections from the HPE RDA Midway servers. Authorized HPE Support agents, included in the RDA CAS access white list, can connect and authenticate with the RDA- CAS without specific interaction required by a RDA-CAS administrator. When an HPE Support agent attempts to connect to the RDA-CAS, the RDA-CAS is signaled (via TCP/2371) to open an HTTPS connection to the Midway server. The HTTPS session is connected at the Midway server to the HPE Support user session to allow access to the RDA-CAS. Access Control and user validation for HPE Support agents is identical to Customer-Initiated TLS. Figure 6. HPE-Initiated TLS infographic HPE Remote Device Access: Security Whitepaper Page 16 of 24

17 HPE RDA Security HPE-Initiated IPsec HPE-Initiated IPsec requires an IPsec tunnel between the HPE Midway servers and a customer IPsec router/device. IPsec is intended for customers that only allow access to their network via a preconfigured IPsec connection. HPE-Initiated IPsec is a non-routing transport bridge. Only TCP 2371 traffic is permitted to transit within this IPsec transport. It must be initiated by an RDA Midway server and can only originate from a per-customer-unique private and non-routing micro-subnet allocated on the Midway. To ensure the protection of customer and HPE networks, HPE-Initiated IPsec offers a limited set of IPsec parameters: All aspects of the IPsec tunnel are controlled by HPE Use of Transport Mode Disable IP forwarding Do not use GRE tunneling /32 Subnets the tiniest possible exposure Controlled address assignment iptables policies for RDA-protocol only HPE-Initiated IPsec is essentially an HPE-Initiated TLS wrapped in an HPE controlled and HPE-Initiated IPsec connection. Once the IPSec tunnel is established, an HPE-Initiated TLS connection will be established between the Midway server and the RDA-CAS via the IPsec tunnel. Access control and user validation is identical to Customer-Initiated TLS. Figure 7. HPE-Initiated IPsec infographic HPE Remote Device Access: Security Whitepaper Page 17 of 24

18 HPE RDA Security HPE-Initiated SSH HPE-Initiated SSH does not require any HPE supplied software, it uses a customer provided SSHv2 server. This SSHv2 server is configured and managed by a customer administrator according to your company IT policies. All standard SSHv2 server authentication types are supported. HPE-Initiated SSH requires an Internet Routable IP address for the SSHv2 server to be provided during enrollment on the HPE Midway servers, during the enrollment process, you must provide IP address and authentication type for your SSHv2 server session account. Authentication types include public key (recommended), or password for the session account. For public key authentication, you will be provided a public key for the midway server, this key will need to be stored in the authorized keys typically located in the session user s home directory. For password authentication, you will be prompted to enter the session user password during enrollment. This password will be stored (encrypted) on the HPE Midway server and used to initiate a remote access session when needed. The session user account should be dedicated to HPE RDA connections only and does not require remote shell capabilities. HPE user access authentication should be configured and managed separately from the session account. Once the HPE-Initiated SSH connection is enrolled and HPE is able to connect to the SSHv2 server, authorized HPE support engineers (HPE users added to the access whitelist) will be able to initiate a remote connection to the SSHv2 server at your site. The SSHv2 server administrator will need to add a user account and provide the user account access information to the authorized HPE support engineer. Figure 8. HPE-Initiated SSH infographic HPE Remote Device Access: Security Whitepaper Page 18 of 24

19 HPE RDA Security HPE-Initiated SSH over IPsec HPE-Initiated SSH over IPsec uses a customer provided and managed SSHv2 server as the access point into their environment. This SSH is encapsulated inside a non-routable HPE managed IPsec tunnel between the Midway server and your IPsec device. Only TCP 22 (SSH) traffic is permitted between the HPE Midway and the Internet routable IP of the customer provided SSHv2 server. Setup and enrollment of the SSHv2 server is identical to HPE-Initiated SSH. Configuration of IPsec requires customers to configure their IPsec device using the IPsec parameters supplied by HPE during enrollment. Figure 9. HPE-Initiated SSH over IPsec infographic RDA Midways The HPE RDA Midway servers are located in an HPE DMZ. They serve as the master control for all HPE RDA connections. The HPE RDA Midway servers are also responsible for issuing, verifying and revoking HPE RDA CA certificates. HPE RDA Midway servers use three Certificate Authorities (see Certificates) to manage user access and CAS device tunnel sessions. HPE Midway server clusters are located in three geographical regions (Americas, Asia Pacific and EMEA) to reduce network latency. Just as the RDA-CAS controls who (from HPE) can access what (devices in your enterprise). The HPE Midway servers operate similarly, controlling who (HPE employees) can connect to which CAS (your enterprise gateway). All HPE employees connecting to the Midway servers are validated using two factor authentication with their HPE issued DigitalBadge (X.509v3 digital certificate and PIN). The HPE Midway servers maintain the list of valid HPE RDA CA certificates. HPE Midway servers manage connections by issuing one time digital keys that are used to uniquely identify connection pipes. The HPE Midway servers function as a digital switchboard, managing communication paths between the RDA Customer Access Service and the RDA Support App clients and other HPE resources. HPE Remote Device Access: Security Whitepaper Page 19 of 24

20 HPE RDA Security RDA Support App The RDA Support App is used by authorized HPE personnel and HPE authorized support providers to access a communication channel for a particular customer to establish an interactive session on a customer device. This session is initiated when both parties agree that the HPE support engineer has a need to access a device on your network to troubleshoot a support issue, provide proactive services, or provide a resolution for an ongoing support issue. The HPE support engineer opens a connection to the Midway server using the RDA Support App and authenticates using their HPE issued DigitalBadge. Once authenticated, they select the destination CAS device and target device from the list of registered CAS devices and connect. The Midway server routes the connection to the CAS-Agent on your corporate network and the CAS device will route the connection to the target device in your corporate network. Authentication Authentication for the RDA client is accomplished using digital certificates. RDA-CAS agents are preconfigured to connect to the HPE Midway server and register as a CAS-Agent. The HPE Midway server will supply a DigiCert Public certificate to the CAS-Agent as proof of identity. Upon registration the Midway server will issue an HPE RDA Root CA signed certificate to the CAS-Agent. This certificate will be checked every time the CAS-Agent initiates a remote connection to HPE. Certificates HPE RDA uses several certificate types to validate the RDA infrastructure, they are: DigiCert Global Root G2 DigiCert Global CA G2 DigiCert Global Root CA DigiCert SHA2 Secure Server CA Hewlett Packard Enterprise Collaboration CA Hewlett Packard Enterprise Private Root CA Hewlett Packard Enterprise Private SSL CA Hewlett Packard Enterprise Remote Device Access Root CA The RDA Midway servers use multiple certificates to provide various RDA services. To begin, the CAS device (RDA-CAS or CAS-Agent) software is pre-installed with a DigiCert (Public) and an HPE RDA CA (Private) certificate. These certificates are used to connect to the Midway servers, perform any updates needed and initiate the CAS device registration. Once registered the Midway server issues an HPE RDA CA certificate that will be used to uniquely identify the CAS device and manage TLS tunnel connections from the CAS device. The HPE RDA Midway servers are secured with public X.509v3 Digital certificates issued by Symantec Class 3 Secure Server SHA256 SSL CA and are signed by the public.com Root Certificate Authority VeriSign Universal Root Certification Authority. The HPE RDA Midway Private certificates are issued by the RDA CA and are the master certificates. Note: VeriSign public certificates will be replaced by DigiCert public certificates upon expiry. DigiCert Public CA The DigiCert (Public) certificates are shipped as part of the RDA-CAS software kits. The Certificates are issued by DigiCert SHA2 Secure Server CA. They are used by the RDA-CAS device to publicly validate that the Midway servers are genuine HPE. HPE Remote Device Access: Security Whitepaper Page 20 of 24

21 HPE RDA Security HPE RDA Certificate Once the CAS has verified that the RDA Midway is Genuine HPE, The RDA Midway server will verify the RDA-CAS is also genuine HPE using the RDA-CAS certificate that is shipped with the RDA-CAS software. HPE RDA Enrollment If both the RDA-CAS and RDA Midway server certificate are verified successfully, the Midway server will request device information from the RDA-CAS host in order to generate a certificate signing request for a unique (tunnel) certificate for the RDA-CAS host. This certificate will be pushed to the RDA-CAS host and will be used to uniquely identify the RDA-CAS when a tunnel is initiated between the RDA-CAS and the RDA Midway server. This certificate is signed by the RDA Intermediate CA and is valid for 1 year and can be validated by the RDA. HPE Virtual DigitalBadge HPE DigitalBadge certificates are used by HPE employees (or HPE Authorized Support agents) to drive RDA connections to an HPE Midway server. An HPE DigitalBadge is a unique certificate issued to HPE Employees (or HPE Authorized Support agents). They are used by the Midway servers and RDA-CAS- Agents to authorize access to customer devices.hpe DigitalBadges are issued by the Hewlett Packard Enterprise Private Root CA, have an expiry date of 1 year from the date of issue and are validated using HPE's private certificate authority. HPE RDA Root CA The HPE solution uses its own Certificate Authority to manage CAS certificates and trust relationships. The RDA CA uses an Enterprise Secure Key Management (ESKM) device to issue and manage RDA certificates. The ESKM device provides FIPS Level 2 security for the HPE RDA CA, enabling RDA connections to establish and manage a chain of trust for RDA connections. The RDA CA is considered part of the HPE Midway server environment. Chain of Trust The RDA connection is a series of connected stations, the stations at each end are called the terminus stations, the stations in the chain that are not terminus stations are called gateway stations. Each RDA station is responsible for verifying the trust mapping (included in the header information) from its predecessor and evaluating its own trust level and adding it to the station header information. Trust levels are expressed as a grade or numerical value (0.0 through 1.0) based on the following table: Grade Value Meaning A 0.95 Two factor authentication on a controlled link B 0.85 One factor authentication on a controlled link, or two-factor over an uncontrolled link C 0.75 One-factor on an uncontrolled link with controlled verifier D 0.65 External user/pass over uncontrolled link E 0.45 Anonymous identity with controlled issuance F 0.25 No significant authentication - untrusted Trust is measured in both directions, and can be used to provide a relative measurement of how trustworthy a connection (chain) is. The overall trust grade can depend on several factors (number of stations, number of simultaneous connections, origin and destination terminus trust value, etc.). HPE DigitalBadge certificates are issued with a trust level of A or B. HPE Remote Device Access: Security Whitepaper Page 21 of 24

22 HPE RDA Security Encryption HPE RDA uses TLSv1.2 encryption for customer connectivity. Note that customer devices and the HPE Backend use TLSv1.2 only and meet FIPS Annex 1 encryption specifications. All communications from the CAS-Agent back to the HPE Midway servers are contained within the TLS encrypted tunnel between the CAS and the Midway server. HPE Support agent tunnel sessions are also encrypted using TLSv1.2. Services within the encrypted tunnel may or may not be encrypted. Logging RDA-CAS logs all user and web service activities to syslog. This includes setting up new connections, transferring data to and from HPE and logging of all support technician access connections. Transaction details include (but are not limited to) the source and destination URLs, timestamp, action requested and status result of the transaction request. Log levels can be adjusted (with help from an HPE RDA Support engineer) for troubleshooting or debugging purpose. Access control Access controls for RDA-CAS are determined by the contents of /etc/rda/acl-rda.dat. This file is managed by the CAS administrator through the CAS UI. The RDA-CAS has four primary modes of operation. The mode of operation is the first line of the acl-rda.dat file and begins with the word mode. See below for more info: Table 5.1 Mode attributes: Shut: Open: Local: List: All Access is disabled (regardless of the rest of the contents in acl-rda.dat) no access is allowed All access is enabled (regardless of the rest of the contents in acl-rda.dat) all users are allowed to connect to the RDA-CAS and any device on the network Allows access to the local host (RDA-CAS) only (regardless of the rest of the contents of acl=rda.dat) Access is controlled by the remaining contents of acl-rda.dat The remaining entries in the acl-rda.dat file specify access directives (allow or deny) followed by the direction (From or To) and the attribute and attribute values. Table 5.2 "From" attributes: App: Country: Group: Region: Source: Trust: Specifies an application name, such as; ssh, http, ftp, etc (listed in /etc/services file) Specifies the country of origin of HPE service technician Specifies the service technicians HPE address Specifies the group of HPE service technicians Specifies the region of origin (AMS, APJ, or EMEA) for the HPE service technician Specifies the IP address or subnet and port for the source of the connection Specifies the minimum trust level (A through F) of the HPE service technician Table 5.3 "To" attributes: App: Source: Target: Specifies an application name, such as; ssh, http, ftp, etc. Specifies the IP address or subnet and port for the source of the connection Specifies the IP address or subnet and port for the target of the connection HPE Remote Device Access: Security Whitepaper Page 22 of 24

23 HPE RDA Security Example of /etc/rda/acl-rda.dat: # allow SSH access for Jane Doe to host and deny all other connections Mode: List Allow from jane.doe@hpe.com to target TCP: :SSH Deny from all RDA-CAS administrator RDA-CAS administrators can authorize HPE support personnel to remotely access their environment using the support technician s HPE simplified address (<employee>@hpe.com). The employee s HPE simplified address is contained in their HPE DigitalBadge and can be validated automatically when connecting to a Midway server or RDA-CAS. HPE Support technicians Authorized HPE support personnel connect to the Midway servers using their HPE DigitalBadge. Once connected, they choose an RDA-CAS from a list of CAS devices they are authorized to access and connect. HPE support technicians credentials (DigitalBadge) are validated at both the RDA Midway servers as well as the RDA-CAS. HPE Remote Device Access: Security Whitepaper Page 23 of 24

24 Glossary Glossary API Application Programming Interface CA CAS CAS-Agent CAS device DMZ FIPS IPsec OCSP RDA RDA-CAS REST SSH TLS Certificate Authority Customer Access Service CAS software embedded in a hardware device (ilo4 of OA) CAS-Agent or RDA-CAS Demilitarized Zone or Perimeter Network Federal Information Processing Standard Internet Protocol Security Online Certificate Status Protocol Remote Device Access CAS software bundle (CentOS or Debian) installed on a Host server or in a VM Representational State Transfer (sometimes spelled ReST) Secure Shell Transport Layer Security HPE Remote Device Access: Security Whitepaper Page 24 of 24

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Barracuda Firewall NG F- Series Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for Barracuda Firewall NG F-Series Syslog

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware AirWatch Content Gateway Guide For Linux

VMware AirWatch Content Gateway Guide For Linux VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE c7000 Virtual Connect Module Syslog Configuration Guide October 17, 2017 SmartConnector for HPE c7000 Virtual Connect Module Syslog October 17, 2017

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

HPE ComputeSensor. User Guide. Software Version: 3.02 Windows and Linux operating systems. Document Release Date: August 2017

HPE ComputeSensor. User Guide. Software Version: 3.02 Windows and Linux operating systems. Document Release Date: August 2017 HPE ComputeSensor Software Version: 3.02 Windows and Linux operating systems User Guide Document Release Date: August 2017 Software Release Date: August 2017 Legal Notices Warranty The only warranties

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

HPE Network Virtualization

HPE Network Virtualization HPE Network Virtualization Software Version: 9.10 Installation Guide Document Release Date: June 2016 Software Release Date: June 2016 HPE Network Virtualization Legal Notices Warranty The only warranties

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

HPE ilo mobile app for ios

HPE ilo mobile app for ios HPE ilo mobile app for ios User Guide Abstract The HPE ilo mobile app provides access to the remote console, web interface, and scripting features of HPE ProLiant servers. Part Number: 689175-004 Published:

More information

HPE Insight Online User Guide

HPE Insight Online User Guide HPE Insight Online User Guide Document Release Date: October 2017 Software Release Date: October 2017 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development LP products and

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE H3C Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for HPE H3C Syslog October 17, 2017 Copyright 2012 2017 Hewlett

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Microsoft System Center Configuration Manager DB Configuration Guide October 17, 2017 SmartConnector for Microsoft System Center Configuration Manager

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Polycom RealPresence Access Director System

Polycom RealPresence Access Director System Release Notes Polycom RealPresence Access Director System 4.0 June 2014 3725-78700-001D Polycom announces the release of the Polycom RealPresence Access Director system, version 4.0. This document provides

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also

More information

Installing Cisco APIC-EM on a Virtual Machine

Installing Cisco APIC-EM on a Virtual Machine About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing

More information

HPE Security ArcSight SmartConnectors. Format Preserving Encryption Environment Setup Guide

HPE Security ArcSight SmartConnectors. Format Preserving Encryption Environment Setup Guide HPE Security ArcSight SmartConnectors Format Preserving Encryption Environment Setup Guide October 19, 2017 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services

More information

HPE ilo Federation User Guide for ilo 5

HPE ilo Federation User Guide for ilo 5 HPE ilo Federation User Guide for ilo 5 Abstract This guide explains how to configure and use the HPE ilo Federation features. It is intended for system administrators, Hewlett Packard Enterprise representatives,

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for IP Flow (NetFlow/J-Flow) Configuration Guide October 17, 2017 SmartConnector for IP Flow (NetFlow/J-Flow) October 17, 2017 Copyright 2004 2017 Hewlett

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Polycom RealPresence Access Director System

Polycom RealPresence Access Director System RELEASE NOTES Version 4.0.1 August 2014 3725-78700-001D1 Polycom RealPresence Access Director System Polycom, Inc. 1 Document Title Version What s New in Release 4.0.1 The RealPresence Access Director

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Application Security AppDetective DB Configuration Guide October 17, 2017 SmartConnector for Application Security AppDetective DB October 17, 2017 Copyright

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Tanium Appliance Installation Guide

Tanium Appliance Installation Guide Tanium Appliance Installation Guide Version 1.0.0 September 25, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided

More information

HP Device Connect - Software Lite Technical Quick Specs

HP Device Connect - Software Lite Technical Quick Specs HP Device Connect - Software Lite Software Release Version: 4.4 Document Version: 1.3 Document Release Date: January, 2016 Document Last Update Date: December, 2016 Software Release Date: December, 2016

More information

ARUBA MULTIZONE DATA SHEET

ARUBA MULTIZONE DATA SHEET Aruba s centralized architecture provides a more secure Wi-Fi environment that is different from any other Wi-Fi vendor on the market today. Among the key security advantages of this architecture are:

More information

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP AutoPass License Server

HP AutoPass License Server HP AutoPass License Server Software Version: 9.0 Windows, Linux and CentOS operating systems Support Matrix Document Release Date: October 2015 Software Release Date: October 2015 Page 2 of 10 Legal Notices

More information

HPE ALM Client MSI Generator

HPE ALM Client MSI Generator HPE ALM Client MSI Generator Software Version: 12.55 User Guide Document Release Date: August 2017 Software Release Date: August 2017 HPE ALM Client MSI Generator Legal Notices Warranty The only warranties

More information

Introduction to HPE ProLiant Servers HE643S

Introduction to HPE ProLiant Servers HE643S Course data sheet Introduction to HPE ProLiant Servers HE643S HPE course number Course length Delivery mode View schedule, local pricing, and register View related courses HE643S 2 Days ILT, VILT View

More information

Intelligent Provisioning 1.64(B) Release Notes

Intelligent Provisioning 1.64(B) Release Notes Intelligent Provisioning 1.64(B) Release Notes Part Number: 680065-407 Published: March 2017 Edition: 1 2017 Hewlett Packard Enterprise Development LP Notices The information contained herein is subject

More information

HP Management Integration Framework 1.7

HP Management Integration Framework 1.7 HP Management Integration Framework 1.7 Administrator Guide Abstract This document describes the use of HP Management Integration Framework interfaces and is intended for administrators involved in the

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall s database or violations of those rules. 2.

More information

Unified Communications in RealPresence Access Director System Environments

Unified Communications in RealPresence Access Director System Environments [Type the document title] 2.1.0 March 2013 3725-78704-001A Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information POLYCOM

More information

Micro Focus Security ArcSight Connectors. SmartConnector for McAfee Gateway Syslog. Configuration Guide

Micro Focus Security ArcSight Connectors. SmartConnector for McAfee  Gateway Syslog. Configuration Guide Micro Focus Security ArcSight Connectors SmartConnector for McAfee Email Gateway Syslog Configuration Guide June, 2018 Configuration Guide SmartConnector for McAfee Email Gateway Syslog June, 2018 Copyright

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Microsoft DHCP File Configuration Guide October 17, 2017 Configuration Guide SmartConnector for Microsoft DHCP File October 17, 2017 Copyright 2006 2017

More information

Intelligent Provisioning 3.00 Release Notes

Intelligent Provisioning 3.00 Release Notes Intelligent Provisioning 3.00 Release Notes Part Number: 881705-001b Published: October 2017 Edition: 3 Copyright 2017 Hewlett Packard Enterprise Development LP Notices The information contained herein

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

LPI202 - LPIC-2 Exam Prep (Course 2) (LPI202) HL966S

LPI202 - LPIC-2 Exam Prep (Course 2) (LPI202) HL966S Course data sheet LPI202 - LPIC-2 Exam Prep (Course 2) (LPI202) HL966S Prerequisites Supported distributions Course data sheet Page 1 Detailed course outline Module 5: Maintaining a Web Server Module 6:

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

VMware Content Gateway to Unified Access Gateway Migration Guide

VMware Content Gateway to Unified Access Gateway Migration Guide VMware Content Gateway to Unified Access Gateway Migration Guide Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Polycom RealPresence Access Director System

Polycom RealPresence Access Director System Release Notes 3.1.1 April 2014 3725-78700-001C1 Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1.1. This document

More information

Intelligent Provisioning 3.10 Release Notes

Intelligent Provisioning 3.10 Release Notes Intelligent Provisioning 3.10 Release Notes Part Number: 881705-002 Published: February 2018 Edition: 1 Copyright 2017, 2018 Hewlett Packard Enterprise Development LP Notices The information contained

More information

A Technical Overview of the Lucent Managed Firewall

A Technical Overview of the Lucent Managed Firewall Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

VMware Horizon View Deployment

VMware Horizon View Deployment VMware Horizon View provides end users with access to their machines and applications through a unified workspace across multiple devices, locations, and connections. The Horizon View Connection Server

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

Workspace ONE UEM Notification Service 2. VMware Workspace ONE UEM 1811

Workspace ONE UEM  Notification Service 2. VMware Workspace ONE UEM 1811 Workspace ONE UEM Email Notification Service 2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Creating Application Definitions in Hana Cloud Platform Mobile Services

Creating Application Definitions in Hana Cloud Platform Mobile Services SAP Hana Cloud Platform Mobile Services How-To Guide Provided by SAP s Technology RIG Creating Application Definitions in Hana Cloud Platform Mobile Services Applicable Releases: Platform Mobile Services

More information

HPE StoreVirtual OS Update Guide

HPE StoreVirtual OS Update Guide HPE StoreVirtual OS Update Guide Abstract This guide is intended for system administrators who are responsible for updating to the latest versions of software for StoreVirtual storage. Part Number: 865551-002

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

IPsec NAT Transparency

IPsec NAT Transparency sec NAT Transparency First Published: November 25, 2002 Last Updated: March 1, 2011 The sec NAT Transparency feature introduces support for Security (sec) traffic to travel through Network Address Translation

More information

HP UFT Connection Agent

HP UFT Connection Agent HP UFT Connection Agent Software Version: For UFT 12.53 User Guide Document Release Date: June 2016 Software Release Date: June 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise

More information

VMware Tunnel Guide for Windows

VMware Tunnel Guide for Windows VMware Tunnel Guide for Windows Installing the VMware Tunnel for your Workspace ONE UEM environment Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Azure Compute. Azure Virtual Machines

Azure Compute. Azure Virtual Machines Azure Compute Azure Virtual Machines Virtual Machines Getting started Select image and VM size New disk persisted in storage Management portal Windows Server Boot VM from new disk >_ Scripting (Windows,

More information

VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment

VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

HPE VMware ESXi and vsphere 5.x, 6.x and Updates Getting Started Guide

HPE VMware ESXi and vsphere 5.x, 6.x and Updates Getting Started Guide HPE VMware ESXi and vsphere 5.x, 6.x and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HPE VMware ESXi and vsphere. Part Number: 818330-003 Published: April

More information

HP Operations Orchestration

HP Operations Orchestration HP Operations Orchestration Software Version: 10.20 Windows and Linux Operating Systems Shell Wizard Guide Document Release Date: November 2014 Software Release Date: November 2014 Legal Notices Warranty

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Security Configuration Guide Part number: 5998-2686 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Windows Event Log Unified: Microsoft Network Policy Server Supplemental Configuration Guide March 29, 2013 Supplemental Configuration Guide SmartConnector

More information

VMware Tunnel on Windows. VMware Workspace ONE UEM 1810

VMware Tunnel on Windows. VMware Workspace ONE UEM 1810 VMware Tunnel on Windows VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

VMware Tunnel on Linux. VMware Workspace ONE UEM 1811

VMware Tunnel on Linux. VMware Workspace ONE UEM 1811 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

Goliath Application Availability Monitor for Citrix Prerequisites Guide

Goliath Application Availability Monitor for Citrix Prerequisites Guide Goliath Application Availability Monitor for Citrix Prerequisites Guide Goliath Application Availability Monitor Proof of Concept Limitations Goliath Application Availability Monitor Proof of Concepts

More information

Vertica on Microsoft Azure HPE Vertica Analytic Database. Software Version: 7.2.x

Vertica on Microsoft Azure HPE Vertica Analytic Database. Software Version: 7.2.x HPE Vertica Analytic Database Software Version: 7.2.x Document Release Date: 8/29/2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1)

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) First Published: 2014-01-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems, Inc.

More information

Microsoft Azure Configuration. Azure Setup for VNS3

Microsoft Azure Configuration. Azure Setup for VNS3 Microsoft Azure Configuration Azure Setup for VNS3 2016 Table of Contents Requirements 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 Deliver and launch VNS3 from Azure 22 VNS3

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Avaya Port Matrix: Avaya Diagnostic Server 3.0

Avaya Port Matrix: Avaya Diagnostic Server 3.0 Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 HP t5740 Windows XPe Support Guide Table of contents Overview... 3 Updating the HPDM Agent... 3 Symantec Endpoint Protection (SEP) Firewall... 3 VNC Shadowing...

More information

Micro Focus Security ArcSight Connectors. SmartConnector for Snort Syslog. Configuration Guide

Micro Focus Security ArcSight Connectors. SmartConnector for Snort Syslog. Configuration Guide Micro Focus Security ArcSight Connectors SmartConnector for Snort Syslog Configuration Guide June, 2018 SmartConnector for Snort Syslog June, 2018 Copyright 2011 2017; 2018 Micro Focus and its affiliates

More information

IP Addressing: Fragmentation and Reassembly Configuration Guide

IP Addressing: Fragmentation and Reassembly Configuration Guide First Published: December 05, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

VMware Tunnel Guide for Windows

VMware Tunnel Guide for Windows VMware Tunnel Guide for Windows Installing the VMware Tunnel for your Workspace ONE UEM environment Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Intelligent Provisioning 1.70 Release Notes

Intelligent Provisioning 1.70 Release Notes Intelligent Provisioning 1.70 Release Notes Part Number: 680065-408 Published: October 2017 Edition: 1 Copyright 2012, 2017 Hewlett Packard Enterprise Development LP Notices The information contained herein

More information

Interdomain Federation for the IM and Presence Service, Release 10.x

Interdomain Federation for the IM and Presence Service, Release 10.x First Published: 2014-01-29 Last Modified: 2018-11-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Security Considerations for Cloud Readiness

Security Considerations for Cloud Readiness Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server

More information