4
TABLE OF CONTENTS
1 THIS MANUAL ....................................................................................................................................... 6
1.1 TYPES OF USERS ........................................................................................................................................ 6
1.2 MANAGEMENT CONSOLE ........................................................................................................................... 6
1.3 MORE INFORMATION ................................................................................................................................. 7
2 SYSTEM CONFIGURATION ..................................................................................................................... 8
2.1 MANAGEMENT CONSOLE CONNECTION ......................................................................................................... 8
2.2 ADMINISTRATOR SET UP .......................................................................................................................... 10
2.3 NETWORK CONFIGURATION ...................................................................................................................... 13
2.4 SERVICE ACCESS AND BRUTE FORCE PROTECTION .......................................................................................... 16
2.5 COMMUNICATIONS SOFTWARE .................................................................................................................. 20
2.6 MANAGEMENT NETWORK CONFIGURATION ................................................................................................. 20
3 SERIAL PORT, HOST, DEVICE & USER CONFIGURATION ........................................................................ 29
3.1 CONFIGURE SERIAL PORTS ........................................................................................................................ 29
3.2 ADD AND EDIT USERS .............................................................................................................................. 40
3.3 AUTHENTICATION ................................................................................................................................... 43
3.4 NETWORK HOSTS .................................................................................................................................... 43
3.5 TRUSTED NETWORKS ............................................................................................................................... 45
3.6 SERIAL PORT CASCADING .......................................................................................................................... 46
3.7 SERIAL PORT REDIRECTION (PORTSHARE) .................................................................................................... 51
3.8 MANAGED DEVICES ................................................................................................................................. 51
3.9 IPSEC VPN ............................................................................................................................................ 54
3.10 OPENVPN ............................................................................................................................................ 56
3.11 PPTP VPN ............................................................................................................................................ 65
3.12 CALL HOME ........................................................................................................................................... 70
3.13 IP PASSTHROUGH ................................................................................................................................... 73
3.14 CONFIGURATION OVER DHCP (ZTP) .......................................................................................................... 75
3.15 ENROLLMENT INTO LIGHTHOUSE ................................................................................................................ 78
4 FIREWALL, FAILOVER & OOB ACCESS ................................................................................................... 79
4.1 DIALUP MODEM CONNECTION .................................................................................................................. 79
4.2 OOB DIAL-IN ACCESS .............................................................................................................................. 79
4.3 DIAL-OUT ACCESS ................................................................................................................................... 82
4.4 OOB BROADBAND ETHERNET ACCESS ........................................................................................................ 86
4.5 BROADBAND ETHERNET FAILOVER .............................................................................................................. 86
4.6 CELLULAR MODEM CONNECTION ............................................................................................................... 87
4.7 CELLULAR OPERATION ............................................................................................................................. 97
4.8 FIREWALL & FORWARDING ....................................................................................................................... 99
5 SSH TUNNELS & SDT CONNECTOR ..................................................................................................... 108
5.1 CONFIGURING FOR SSH TUNNELING TO HOSTS ........................................................................................... 109
5.2 SDT CONNECTOR CLIENT CONFIGURATION ................................................................................................ 109
5.3 SDT CONNECTOR TO MANAGEMENT CONSOLE .......................................................................................... 118
5.4 SDT CONNECTOR: TELNET OR SSH CONNECT TO SERIALLY ATTACHED DEVICES .................................................. 118
5.5 USING SDT CONNECTOR FOR OUT-OF-BAND CONNECTION TO THE GATEWAY .................................................... 120
5.6 IMPORTING (AND EXPORTING) PREFERENCES .............................................................................................. 121
5.7 SDT CONNECTOR PUBLIC KEY AUTHENTICATION ......................................................................................... 122
5.8 SETTING UP SDT FOR REMOTE DESKTOP ACCESS ......................................................................................... 123
5.9 SDT SSH TUNNEL FOR VNC ................................................................................................................... 124
5.10 USING SDT TO IP CONNECT TO HOSTS THAT ARE SERIALLY ATTACHED TO THE GATEWAY ...................................... 126
5.11 SSH TUNNELING USING OTHER SSH CLIENTS (E.G. PUTTY) ........................................................................... 130