WAB 3.1 Admin Guide
WAB 3.1 Admin Guide
WAB 3.1 Admin Guide
1 - Administration Guide
ii
Table of Contents
1. Introduction ............................................................................................................................. 1 1.1. Preamble ....................................................................................................................... 1 1.2. Copyright, Licences ....................................................................................................... 1 1.3. Legend ......................................................................................................................... 1 1.4. About this document ...................................................................................................... 1 2. Concepts ................................................................................................................................. 3 2.1. General information ....................................................................................................... 3 2.2. Positioning of the WAB in the network infrastructure ......................................................... 3 2.3. The concept of WAB ACLs ............................................................................................ 4 2.4. Roll-out ........................................................................................................................ 4 3. Administration interface ............................................................................................................ 6 3.1. Initial logon .................................................................................................................. 6 3.2. Menu tree structure ........................................................................................................ 7 3.3. My preferences .............................................................................................................. 9 3.4. My authorisations .......................................................................................................... 9 3.5. WAB audit .................................................................................................................. 10 3.5.1. Current connections ........................................................................................... 10 3.5.2. View sessions in real time .................................................................................. 11 3.5.3. Connection history ............................................................................................. 12 3.5.4. View session recording ...................................................................................... 14 3.5.5. Authentication history ........................................................................................ 15 3.5.6. Connection statistics .......................................................................................... 17 3.6. System audit ................................................................................................................ 18 3.6.1. System status .................................................................................................... 18 3.6.2. System logs ...................................................................................................... 19 3.7. Users .......................................................................................................................... 19 3.7.1. Accounts .......................................................................................................... 20 3.7.2. Groups (of users) ............................................................................................... 24 3.7.3. Import (users) ................................................................................................... 27 3.8. Resources and accounts ................................................................................................ 31 3.8.1. Devices ............................................................................................................ 31 3.8.2. Target accounts ................................................................................................. 34 3.8.3. Device admin credentials .................................................................................... 37 3.8.4. Groups (of target accounts) ................................................................................. 40 3.8.5. Authentication mechanisms ................................................................................. 43 3.8.6. Import (target devices and target accounts) ........................................................... 44 3.9. Manage authorisations .................................................................................................. 46 3.9.1. Add an authorisation .......................................................................................... 46 3.9.2. Delete an authorisation ....................................................................................... 48 3.9.3. Import authorisations from CSV .......................................................................... 48 3.10. User profiles .............................................................................................................. 48 3.10.1. Default profiles ................................................................................................ 49 3.10.2. Add a user profile ............................................................................................ 49 3.10.3. Edit a user profile ............................................................................................ 50 3.10.4. Delete a user profile ......................................................................................... 50 3.11. WAB configuration .................................................................................................... 50 3.11.1. Time frames .................................................................................................... 50 3.11.2. External authentications .................................................................................... 52 3.11.3. Notifications .................................................................................................... 54 3.11.4. Password policy ............................................................................................... 57 3.11.5. Secondary passwords ........................................................................................ 58
iii
Wallix AdminBastion 3.1 - Administration Guide 3.11.6. Logon settings ................................................................................................. 3.12. System configuration .................................................................................................. 3.12.1. Network .......................................................................................................... 3.12.2. Time service ................................................................................................... 3.12.3. Remote storage ................................................................................................ 3.12.4. Syslog ............................................................................................................ 3.12.5. SNMP ............................................................................................................ 3.12.6. SMTP ............................................................................................................. 3.12.7. Licence ........................................................................................................... 3.13. Back-up/Restore ......................................................................................................... Operation ............................................................................................................................... 4.1. Using the command line to connect to the WAB .............................................................. 4.2. Exporting audit data ..................................................................................................... 4.3. Back-up/Restore from the command line ......................................................................... 4.4. Configuring automatic back-up ...................................................................................... 4.5. Rights engine: operating limitations ................................................................................ 4.6. SSH flows analysis / Pattern detection ............................................................................ 4.7. TELNET connection scenario ........................................................................................ 4.8. Resolving common problems ......................................................................................... 4.8.1. Restoring the factory 'admin' account ................................................................... 4.8.2. Resetting the device ........................................................................................... Data encryption ...................................................................................................................... Compatibility: ........................................................................................................................ Limits: ................................................................................................................................... Definitions ............................................................................................................................. 61 62 62 63 64 65 66 67 68 69 71 71 71 71 72 73 73 73 74 74 74 75 76 78 79
4.
5. 6. 7. 8.
iv
List of Figures
2.1. Wallix AdminBastion in the network infrastructure .................................................................... 4 3.1. WAB logon screen ................................................................................................................. 6 3.2. WAB home page (administrator profile) ................................................................................... 7 3.3. 'My preferences' page ............................................................................................................. 9 3.4. User's authorisations ............................................................................................................. 10 3.5. Close an SSH connection ...................................................................................................... 11 3.6. View RDP sessions in real time ............................................................................................. 12 3.7. Connection history ............................................................................................................... 13 3.8. Connection history filters ...................................................................................................... 14 3.9. View an RDP recording with OCR ........................................................................................ 15 3.10. Authentication history ......................................................................................................... 16 3.11. Connection statistics ........................................................................................................... 17 3.12. Sample statistical graph ....................................................................................................... 18 3.13. System status ..................................................................................................................... 19 3.14. List of users ...................................................................................................................... 20 3.15. Add user form ................................................................................................................... 22 3.16. Delete users ....................................................................................................................... 23 3.17. List of devices accessible by a user ...................................................................................... 24 3.18. List of user groups ............................................................................................................. 25 3.19. Add user group form .......................................................................................................... 26 3.20. List of users in a group ....................................................................................................... 27 3.21. Import users page ............................................................................................................... 28 3.22. Summary of user import from a CSV file .............................................................................. 29 3.23. Import users from a directory .............................................................................................. 31 3.24. List of target devices .......................................................................................................... 32 3.25. Add device form ................................................................................................................ 33 3.26. List of all target accounts for a device .................................................................................. 35 3.27. List of target accounts for a service ...................................................................................... 36 3.28. Add target account form ..................................................................................................... 37 3.29. Device admin credentials .................................................................................................... 38 3.30. Admin credentials on a Linux/Unix device ............................................................................ 39 3.31. Admin credentials on a Windows device ............................................................................... 39 3.32. Admin credentials on a Cisco device .................................................................................... 40 3.33. List of target account groups ............................................................................................... 41 3.34. Add a target account group form .......................................................................................... 42 3.35. Authentication mechanisms ................................................................................................. 43 3.36. List of authorisations .......................................................................................................... 46 3.37. Add authorisation form ....................................................................................................... 47 3.38. Add user profile form ......................................................................................................... 50 3.39. List of time frames ............................................................................................................. 51 3.40. Add time frame form .......................................................................................................... 52 3.41. Add LDAP authentication form ........................................................................................... 54 3.42. Add notification form ......................................................................................................... 56 3.43. 'Password policy' page ........................................................................................................ 58 3.44. 'Secondary password' page .................................................................................................. 59 3.45. 'Secondary password' page .................................................................................................. 61 3.46. 'Logon settings' page .......................................................................................................... 62 3.47. Network configuration ........................................................................................................ 63 3.48. Time service configuration .................................................................................................. 64 3.49. Configuring remote storage ................................................................................................. 65 3.50. Configuring syslog routing .................................................................................................. 66
Wallix AdminBastion 3.1 - Administration Guide 3.51. 3.52. 3.53. 3.54. Configuring the SNMP agent ............................................................................................... SMTP service configuration ................................................................................................ Managing the licence .......................................................................................................... 'Back-up/Restore' page ........................................................................................................ 67 68 69 70
vi
Chapter 1. Introduction
1.1. Preamble
Thank you for choosing Wallix AdminBastion, also called WAB. WAB is marketed in the form of a dedicated, ready-to-use server or as a virtual device for the VMWare ESX 4.x and 5.x environments. This product has been engineered with the greatest of care by our teams at Wallix and we trust that it will deliver complete satisfaction.
1.3. Legend
prompt $ command to input command output on one or more lines prompt $
Wallix AdminBastion 3.1 - Administration Guide a Quick Start Guide a User Guide
Chapter 2. Concepts
2.1. General information
WAB has been developed for the technical teams that administer IT infrastructure (servers, network and security devices, etc.). Designed to meet the access control and traceability needs of system administrators, Wallix AdminBastion features access control lists (ACLs) and traceability functions. It constitutes a security buffer for administrators who wish to log on to devices by: checking the authentication details provided by the user checking their access rights for the resource in question The WAB also allows you to automate logons to target devices to enhance the security of the information system by preventing disclosure of server authentication details. Protocols currently supported are: SSH (and its sub-systems) Telnet, Rlogin RDP and VNC in the user domain HTTP and HTTPS The WAB has a graphic Web interface, validated using Firefox 3, Internet Explorer 7 and Internet Explorer 8, to monitor activity and connections and to configure its component parts.
2.4. Roll-out
The WAB includes a set of import tools to facilitate roll-out. However, to ensure the WAB is commissioned successfully, we recommend inventorying:
Wallix AdminBastion 3.1 - Administration Guide the roles of users who must have access to the target accounts the roles of users who must administer the target accounts the target devices and target accounts to be accessed through the WAB You must be able to answer the following questions for each user: does this user have the right to administer the solution, and if so, which rights should be assigned to him or her? does this user need to access target accounts? when does the user have the right to log on? can s/he access critical resources? You must be able to answer the following questions for each target account: Is this target account or device critical? should user sessions on this account be recorded? what protocol(s) can be used to access this target account or device?
Note:
Your browser must be configured to accept cookies and run JavaScript. The WAB comes with a factory-set 'admin' account as standard (password 'admin').
View system status Content of file /var/log/syslog local Content of file /var/log/auth.log local Content of file /var/log/messages local Manage WAB users Manage WAB user groups
Import users (csv file and LDAP directory) Manage target devices Manage target accounts Manage target account groups
Device admin authentication de- Manage password changes tails Authentication mechanisms Import Authorisations Manage authorisations Define authentication systems Import target devices and accounts (csv file) Manage authorisations between target account groups and user groups Import authorisations. (csv file) Define user profiles Import user profiles (csv file) Manage time frames Manage external authentication methods (LDAP/LDAPS, Active Directory, Kerberos, Radius) Manage the notification mechanism Manage the local password policy Configure the policy for changing remote passwords. Settings for banners displayed when a user logs on to proxies Configure revocation lists for the X509 certificate authentication option. Configure network settings Time service settings (NTP) Manage remote storage of session recordings Manage routing via Syslog Manage the SNMP agent Configure the server for sending emails Display and update licence key Start encryption protection Save and restore the WAB configuration
Import User profiles WAB configuration Manage user profiles Import Time frames External authentications
System configuration Network Time service Remote storage Syslog SNMP SMTP server Licence Encryption Save/Restore
3.3. My preferences
This sub-menu contains the settings that can be changed by a user. All users have access to this page, regardless of their administration rights. Here users can: change their password (only if the user has been declared locally) download an SSH public key change their email address
3.4. My authorisations
This menu displays the list of accessible devices. To access target accounts via RDP, click the icon to download the linked RDP file (to open the Microsoft RDP client directly). For access to HTTP/ HTTPS, an icon gives direct access to the resources via the Web user interface.
Note:
In the remainder of this Guide, the generic term connection will be used for SSH and RDP connections, and also for HTTPS sessions. For each of these connections, the WAB shows the following information: the user, in the form user@machine(ip) the source protocol (RDP, SSH or HTTPS)
10
Wallix AdminBastion 3.1 - Administration Guide the destination protocol the target accessed (in the form account@target:service) the connection start time the connection duration You can also terminate one or more connections. In the case of the SSH and RDP proxies, users are then informed that an administrator has terminated the connection. The session is closed in the case of HTTPS.
Note:
The page displaying the current connections is refreshed regularly. To stop refresh, use the prompt at the top of the page. This feature is particularly useful when selecting the active connections to terminate.
11
12
Note:
The connection status shows you whether there was a problem connecting to the target account (for example, wrong password, target resource not available, etc.). Filters can also be applied to the records to facilitate searches. The filters available are: by time, based on: the last N days a date range by occurrence in the columns.
13
Note:
Only the last 1,000 records are displayed in the Web user interface. The occurrence filter is applied to these 1,000 records. Older sessions can only be retrieved through the date range filter.
14
15
Wallix AdminBastion 3.1 - Administration Guide This page uses the same filters as the connection history. The same limitations on the number of results displayed also apply.
16
17
18
Wallix AdminBastion 3.1 - Administration Guide available space on the partition/var (where the session recordings are saved)
Note:
The RAM usage rate does not show buffer systems.
3.7. Users
Use this menu to create/import Wallix AdminBastion users/administrators.
19
Wallix AdminBastion 3.1 - Administration Guide You can also configure the user groups to which the authorisations apply (see Section 3.9, Manage authorisations).
3.7.1. Accounts
Use this page to: list user accounts add/edit/delete a user account see the devices a user is authorised to access You can also filter the table displayed. The filter is applied to all users (and not just the page currently displayed).
20
Wallix AdminBastion 3.1 - Administration Guide The add user form consists of the following: the user name used to log on to the Web user interface and proxies a name, used to identify the person to whom the user name belongs an email address a preferred language, used to select the language in which the messages sent to the user from the proxies are displayed a source IP address, used to limit access to the proxies at this IP address or FQDN (this limitation does not concern access to the WUI), a profile, used to define a user's rights (see Section 3.10, User profiles), a list of groups, used to select the groups in which to place the user. You can also add a user to a group in the add/edit page for a group (see Section 3.7.2, Groups (of users)), an authentication procedure, which may be different for each user (see Section 3.11.2, External authentications). You can select several procedures to indicate the back-up servers for external authentications (LDAP, RADIUS, etc.) a field to force password change: users will receive a message notifying them that their account has been created and that the password must be changed the first time they log on (see also Section 3.12.6, SMTP), a password: there may be certain requirements regarding the passwords the system will accept (see Section 3.11.4, Password policy); it is not necessary to re-enter this password for authentication other than 'local', an SSH public key
21
Note:
The user name cannot be changed after it has been added; however the password and public key can be changed by the user.
22
Note:
If the 'password' field is not changed, the user's password is not changed.
23
Wallix AdminBastion 3.1 - Administration Guide protocol(s) used to access this service related time frame
24
Wallix AdminBastion 3.1 - Administration Guide see the members of each group
The form to create a user group consists of the following: group name description: open text field time frame(s) to apply a list to select the users in the group a list of actions to apply when certain character strings are detected in the upward flow from proxies (see Section 4.6, SSH flows analysis / Pattern detection).
Note:
If several time frames are selected, the resulting time frame applied is the combination of these.
25
Warning:
character string detection is only enabled for data sent by the client to the server and only for SSH, TELNET or RLOGIN connections.
26
27
Warning:
If this tag is not present, the file format must follow WAB version 3.0 conventions (not described in this document). This allows to keep compatibility with files created for former versions of WAB. Each subsequent line must be formed as follows: Field User name User group Actual name Source IP Type Text Text Text IP/FQDN R o o O R(equired)/ O(ptional) Possible values [aA-zZ], [0-9], '-', '_' [aA-zZ], [0-9], '-', '_' Free text [aA-zZ], [0-9], '-', '_' n/a n/a n/a n/a Default value
28
R(equired)/ O(ptional)
Possible values Profiles defined Authentications fined Free text n/a de- n/a n/a n/a
Default value
Note:
The password is required if authentication is defined as local ('local' authentication').
Note:
if the user group doesn't exist, it is created with the default time frame set as 'allthetime'. Example:
#wab31 martin;linuxadmins;Pierre Martin;;user;local;;jMpdu9/x2z
After you have imported the CSV file, a summary report similar to the example below is displayed.
29
Wallix AdminBastion 3.1 - Administration Guide The report contains: the import date and time the total number of lines read in the file the number of lines compliant with the syntax the number of users actually created in the WAB's internal database the number of lines rejected An error message is sent for each line rejected.
Note:
The user name and password used to log on must have read rights for the path in which the user data is stored. If the import is successful, the system opens a new page with the list of users extracted from the directory. Next, import each user and assign: a user group an authentication a user profile
Note:
If you want the imported users to be authenticated for the directory used for the import, you must first create the authentication method (see also Section 3.11.2.1, Add an external authentication).
30
3.8.1. Devices
List all devices recorded. You can add/edit/delete new devices from this page.
31
32
33
Wallix AdminBastion 3.1 - Administration Guide an authentication mechanism, used by HTTP(S), TELNET and RLOGIN Enter the text input line and click the icon Click on the right to add this service.
The authentication mechanism must be specified in the following cases: access to a device in TELNET, select a connection scenario you have previously defined (see also Section 4.7, TELNET connection scenario) access to a HTTP(S) device using HTTP authentication, select the HTTP(S)_BASIC or HTTP(S)_DIGEST mechanism according to the authentication mode required by the server access to a HTTP(S) device using HTML form authentication, select the predefined mechanism for your target application, if it is supported, or the generic HTTP_SIMPLE_FORM, if your application uses a simple form (containing only the Login and Password fields in static HTML).
Note:
You cannot delete a target device if there are target accounts declared on it.
34
35
Note:
See Chapter 5, Data encryption for the data encryption information for storing passwords.
36
37
38
39
40
41
42
Wallix AdminBastion 3.1 - Administration Guide useful when the user's account is declared on a company directory and the user has access rights to the target resource. The user's primary credentials are then replayed on the target device. a list of actions to apply when certain character strings are detected in the upward flow from proxies (similar to the list presented on the user groups page, see Section 4.6, SSH flows analysis / Pattern detection).
Note:
You cannot delete a target account group if the account has active authorisations attached (see Section 3.9, Manage authorisations) and/or if there are target accounts attached to this group.
43
Note:
You cannot delete pre-configured authentication mechanisms.
Note:
The import takes place in two steps: first the devices are imported, and then the target accounts (the device linked to each target account must previously exist). The file must start with a line containing the following tag:
#wab31
Warning:
If this tag is not present, the file format must follow WAB version 3.0 conventions (not described in this document). This allows to keep compatibility with files created for former versions of WAB. The lines describing a device must comply with the following: Field Device name Type Text R(equired)/ O(ptional) R Possible values [aA-zZ], [0-9], '-', '_' n/a Default value
44
R(equired)/ O(ptional) O O R R
Possible values [aA-zZ], [0-9], '-', '_' Free text [aA-zZ], [0-9], '-', '_' NAME/PROTOCOL/N*/ SUB-PROTOCOL* NAME: Free text PROTOCOL Protocol name (see below) N*: Optional port number SUB-PROTOCOL*: Optional sub-protocol name (see below) n/a n/a n/a n/a
Default value
PROTOCOL: one of the following values: SSH, TELNET, RLOGIN, RDP, VNC, HTTP, HTTPS. SUB-PROTOCOL: For SSH: one of the following values: SSH_SHELL_SESSION, SSH_REMOTE_COMMAND, SSH_SCP_UP, SSH_SCP_DOWN, SSH_X11_SESSION, SFTP_SESSION. If SUB-PROTOCOL is not specified, all the sub-protocols are added. The value for the other protocols is exactly the same as PROTOCOL and can be omitted. The 'Service/Protocol/Port/Sub-Protocol' may contain several values separated by a space. Example:
#wab31 asterix;intranet;"Intranet server";192.168.0.10;ssh_22/ssh/22/ssh_shell_session obelix;mail1;"Exchange server";192.168.0.11;telnet_23/telnet/23 rdp_1/rdp/3389
The lines describing a target device must comply with the following format: Field Account name Group name Description Password Type Text Text Text IP/FQDN R R O R R(equired)/ O(ptional) Possible values [aA-zZ], [0-9], '-', '_' [aA-zZ], [0-9], '-', '_' Free text [aA-zZ], [0-9], '-', '_' n/a n/a n/a n/a Default value
Note:
At present, you cannot create target accounts with the 'secondary auto logon' function disabled. Example:
#wab31
45
46
Wallix AdminBastion 3.1 - Administration Guide a description a list of authorised protocols a check box to indicate whether or not the sessions allowed by the authorisation are critical (a notification can be sent each time a critical device is accessed) a check box to enable or disable session recording. The type of recording depends on the protocol to access the device.
Note:
The recording for RDP includes both video and automatic OCR of the applications run on the remote machine by detecting title bars. Important note: the algorithm used to detect the title bar content is very fast to enable real-time execution, but also very sensitive to the configuration. It only works with 'Windows Standard' windows and a default font size of 96PPP with a colour depth of 15 bits or more (15, 16, 24 or 32 bits, it does not work in 8-bit mode). In its current version, the OCR function will not work if the title bar style is changed, even to a style that is visually very similar, for example to 'Windows classic', or if the title bar colour, style, font size or resolution is changed. In addition, OCR is configured to detect only the title bars of applications closed using the three icons, close, minimise and maximise. If the title bar contains an icon, this will generally be replaced by question marks before the recognised text.
47
Wallix AdminBastion 3.1 - Administration Guide Use the form to select several protocols for a user group and a given target account group. This means you can create several authorisations between the two groups.
Warning:
If this tag is not present, the file format must follow WAB version 3.0 conventions (not described in this document). This allows to keep compatibility with files created for former versions of WAB. Each subsequent line must be formed as follows: Field User Group Device Group Protocol Type Text Text Text R(equired)/ O(ptional) R R R Possible values [aA-zZ], [0-9], '-', '_' [aA-zZ], [0-9], '-', '_' n/a n/a Default value
SSH_SHELL_SESSION, n/a SSH_REMOTE_COMMAND, SSH_SCP_UP, SSH_SCP_DOWN, SSH_X11_SESSION, TELNET, RLOGIN, RDP, VNC, HTTP, HTTPS
Example:
#wab31 group_users1;group_devices1;SSH_SHELL_SESSION
After you have imported the CSV file, a summary report is displayed.
48
Wallix AdminBastion 3.1 - Administration Guide The authorisation types match the menu on the left of the main interface.
Note:
The factory configuration for the 'admin' profile is the 'Wab_Administrator' profile
49
50
Wallix AdminBastion 3.1 - Administration Guide The default WAB time frame is 'allthetime'. This time frame allows users to connect to target devices at any time and on any day. You cannot delete this time frame.
51
Note:
The time used in the WAB local time.
52
server address (IP or FQDN) a connection port For LDAP/LDAPS authentications, enter the organisation unit and the connection attribute. The connection attribute must be the field where the WAB user's name is stored. You can also add a user name and a password, if anonymous access is disabled on the directory.
Note:
The user must have read rights for the DN base used. The connection attribute for LDAP-AD authentications is sAMAccountName. In addition, since you cannot access an Active Directory anonymously, a domain administrator account is required to create the authentication. For KERBEROS authentications, a domain name is required (REALM) For RADIUS authentications, the packet encryption key is required. For LDAP/AD authentications, the user name to specify must be the user's 'Distinguished Name' (or DN) (e.g.: cn=admin,dc=mycorp,dc=lan).
53
3.11.3. Notifications
WAB allows you to define notifications. These notifications are triggered if one of the following events is detected: wrong primary authentication logon to a critical device new recording of an SSH server fingerprint bad SSH fingerprint detected RAID error
54
Wallix AdminBastion 3.1 - Administration Guide failed secondary logon detection of an occurrence during analysis of an SSH flow licence error password expiry alerts available disk space alerts daily logs
55
Note:
Go to 'System configuration'/SMTP to configure the mail settings (Section 3.12.6, SMTP).
56
Note:
The list of prohibited passwords must be in a file in UTF-8 format
57
Warning:
The following systems are supported by the password change procedures: Local accounts on UNIX systems managed by the passwd command. Local accounts on Windows server machines: Windows Server 2003 and Windows Server 2008 Active Directory accounts.
There are three steps to configuring the procedure for changing the passwords to target accounts:
58
Note:
The domain administrator account must match an existing WAB account, otherwise the system returns an error and the credentials are not saved. The administrator's password (local or on the DA).
59
Wallix AdminBastion 3.1 - Administration Guide b. For a Cisco device: Enter the password to elevate privilege levels. c. For all devices (Linux/Unix, Windows and Cisco): Input the email addresses for the recipients of the new passwords generated (their GPG/ PGP keys must have been previously imported). The minimum length of the passwords generated. Check the box to enable special characters in the passwords generated, according to the password strength policy for the device. 3. Enable password change for each account on each device (see Figure 3.45, 'Secondary password' page): Go to Devices & Accounts > Accounts > and click the device > then click the key for each account. Check the box to enable automatic password change for this account. If automatic password change is not enabled, you can enter a password manually. Each time a password is changed, an email will be sent to the recipients configured in the system indicating whether the new password was successfully changed (encrypted email), or if the attempt failed, specifying the reason for the failure.
Warning:
On Windows machines belonging to a domain, it is essential to correctly configure the domain controller's IP address for the password change process to function successfully. If the SMTP server is not configured, the passwords will not be changed. If a GPG/PGP key is missing from the list of recipients, the passwords will not be changed. For password changes on UNIX machines, the WAB must always have the passwords for the accounts to manage. Passwords must never be changed without entering them in the WAB; otherwise the changes will not be made.
60
61
3.12.1. Network
This page sends the device's network information. You can change: the host name the domain name the gateway the configuration of network interfaces You can add: routes entries in the 'hosts' file DNS servers
62
Warning:
Before changing the WAB IP address used to communicate with the file server with remote storage, we recommend disabling remote storage and re-enabling it again after you have changed the address. See Section 3.12.3, Remote storage
63
64
3.12.4. Syslog
From this page you can configure the routing of syslogs to another network device. The logs will be sent to the selected IP address, port and protocol stored on the local file system so that they are always available in read access through the System audit tab.
65
3.12.5. SNMP
WAB includes an embedded SNMP agent with the following properties: Protocol version supported: 2c MIB implemented: MIB 2 no alert mechanisms (traps) or notifications no ACL on the source IP address SNMP command available: 'get', 'getbulk' The factory configuration is: sysName: WAB v2 sysContact: root@yourdomain sysLocation: yourlocation community: empty by default; the community name used to connect to the WAB By default, the agent is disabled.
66
Note:
The SNMP agent can only be enabled via the Web user interface. Examples of use:
$ snmpget -v2c -c WALLIXdefault 192.168.0.5 system.sysDescr.0 SNMPv2-MIB::sysDescr.0 = STRING: "Wallix AdminBastion Version 3.1" $ snmpget -v2c -c WALLIXdefault 192.168.0.5 system.sysUpTime.0 DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (65833) 0:10:58.33 $ snmpget -v2c -c WALLIXdefault 192.168.0.5 IF-MIB::ifHCOutOctets.1 IF-MIB::ifHCOutOctets.1 = Counter64: 255823831
3.12.6. SMTP
You can use this entry to configure (or change the configuration of) the mail server for sending notifications. Enter the following information: Server name server port (default: 25)
67
Wallix AdminBastion 3.1 - Administration Guide sender's name (default: wab) a user name and password if required, To test the settings, enter one or more destination addresses in a free text field and click 'TEST'.
3.12.7. Licence
From this page you can display the licence information and modify the licence key. Use of the WAB is controlled by this licence key. The licence mechanisms checks: the number of target devices that can be declared the maximum number of simultaneous unique primary connections the maximum number of simultaneous secondary connections the licence expiration date The licence key contains the elements included in the sales contract and is provided by Wallix. It is entered in the WAB by the client via the Web user interface. To obtain a licence, the device serial number and all network card MAC addresses must be sent to Wallix. The licence key can also be managed from the command line (root menu). To display the licence information:
wab2:~# WABGetLicence
68
3.13. Back-up/Restore
From this page you can back up or restore a copy of the WAB configuration. Each back-up is encrypted using a 16-character key. You must know the back-up key before restoring it.
Warning:
only back-ups created with WAB version 3.1 can be restored. this back-up/restore function does not save audit data, all data changed or added after a back-up will be lost if the back-up is restored. the administrator will be logged off. S/he must log on again with one of the accounts included in the back-up, which might be different from those in the system before the back-up/restore was performed. if a back-up is restored on a machine other than the one used to generate the backup, the encrypted data present before the restore may become indecipherable.
69
70
Chapter 4. Operation
4.1. Using the command line to connect to the WAB
An SSH daemon listening on port 2242 allows you to connect to an administration shell. The default credentials are: User name: wabadmin Password: SecureWabAdmin This user is in the list of 'sudoers'. You can use the 'sudo' command to access the root menu using the same password. Once in root, you can use a set of scripts to manage the day-to-day operation of the WAB.
Note:
We strongly recommend changing the wabadmin account password on first connection.
Use this command to create a zip file, saved in /var/wab/recorded/export_sessions, containing for the period defined: all SSH and RDP sessions a CSV file containing the export of the data viewed in the connection history
71
DIRECTORY is the directory path in which the back-up file will be created. Option -s can be used to create a copy on an external drive (sdcard or USB). Options -a and -b should not normally be used. Without these options, the file is GPG encrypted.
wab2:~# /usr/bin/wallix-config-restore.py -h Usage: wallix-config-restore.py [options] Options: -h, --help show this help message and exit -f FILENAME, --file=FILENAME Provide full path of Backup file (.wbk). -s, --sdcard Enter in interactive mode to select file on SDcard. -a, --aes Set this option force use of AES256 instead of Gpg symmetric cipher. -b, --blowfish Set this option force use of Blowfish instead of Gpg symmetric cipher.
FILENAME is the back-up file path. Option -s can be used to restore from the external drive (sdcard or USB). Options -a and -b should not normally be used. Without these options, the file is GPG decrypted.
72
is interpreted as follows:
73
Wallix AdminBastion 3.1 - Administration Guide send a carriage return expect to receive the 'login' string (ignoring the case) send the user name followed by a carriage return expect to receive the 'password' string (ignoring the case) send the password followed by a carriage return
Note:
This command will also delete all audit data (session recordings, connection history, etc.).
74
Authentication settings on the remote storage AES 256 symmetric encryption servers Back-up Web user interface connection key SSH proxy connection key RDP proxy connection AES 256 symmetric encryption RSA 2048 bit key + AES 256 RSA 2048 bit key + AES 256 RSA 1024 bit key + RC4 128 bits
75
Chapter 6. Compatibility:
The WAB was tested with the following clients: SSH: OpenSSH 5.1 to 5.5 Putty Cygwin SCP OpenSSH 5.1 to 5.5 Putty Cygwin SFTP OpenSSH 5.1 to 5.5 Cygwin FileZilla WinSCP (in SFTP mode) SSH X11 forwarding OpenSSH 5.1 to 5.5 Cygwin and Xming RDP MSTSC 6.x (Windows native client, 'Remote desktop access') for Windows XP, Windows 7, Windows Server 2003, Windows Server 2008, rdesktop, freerdp (Linux) HTTPS: Mozilla Firefox 3.x Internet Explorer 7 and 8 Safari 5 Google Chrome The following remote servers were tested: SSH/SCP/SFTP/X11 OpenSSH 5.1 to 5.5 RDP Microsoft Terminal Server for: Windows Server 2008 Windows Server 2003 VNC RealVNC (for Windows) xtightvnc with Ubuntu Server 10.04 The HTTPS proxy was tested on the following targets in particular:
76
Wallix AdminBastion 3.1 - Administration Guide BitDefender Remote Admin. Cisco Access Point Configuration Utility - AP541N-K9-2.0 Dell OpenManage Switch Administrator - PowerConnect 2848 Dell iDRAC Enterprise Dell iDRAC Express F5 BIG-IP 10.1 TLM GLPI - 0.78 administration interface Switch NetGear GS724T Wallix AdminBastion Web UI - 3.1 Wallix LogBox Web UI - 2.1 Zabbix 1.8 Password change has been tested on the following servers: Linux/Unix GNU/Linux OpenBSD 5.1 FreeBSD 9 NetBSD 5.1.2 French Solaris 10 Solaris 11 Windows Windows Server 2003 Cisco ASA 5510
77
Chapter 7. Limits:
RDP: Screen resizing is not supported by Rdesktop (see Patches 2987616: http://sourceforge.net/ tracker/?func=detail&aid=2987616&group_id=24366&atid=381349), the connection to some VNC servers may appear pink; increasing the number of colours may resolve the problem. The former MSTSC 5.1 client in 16 bit mode causes palette problems in full screen (the screen appears green). SSH: X11 support is not enabled with the PuTTY client, WinSCP is not supported in SCP mode. WinSCP may cause problems in SFTP when creating files and directories with accented characters. HTTPS: Although tested on numerous targets (Chapter 6, Compatibility:), the operation of the HTTP/ HTTPS proxy may be degraded in some cases: "highly dynamic" JavaScript code, with calls to external targets, for example. Java or Flash Applets, communicating with protocols other than HTTP(S), or where the target is hard coded, are not supported. HTTP(S) sessions that are not based on cookies cannot really be cut off (Section 3.5.1, Current connections).
78
Chapter 8. Definitions
1. ACLs: Acronym for 'Access Control List This is a system to manage access to a resource (a device, file, etc.). 2. Primary connection: connection initiated between a user and the WAB. 3. Secondary connection: connection initiated between the WAB and a target account. 4. Local authentication: authentication managed by the WAB. 5. External authentication: authentication managed by a directory external to the WAB. 6. User domain: low trust domain (open access to the Internet, etc.). 7. Connection scenario: scenario to automate connection to a device that does not offer protocols supporting automated sending of credentials (SSH, RDP).
79