4
TABLE OF CONTENTS
1 THIS MANUAL ....................................................................................................................................... 6
1.1 TYPES OF USERS ........................................................................................................................................ 6
1.2 MANAGEMENT CONSOLE ........................................................................................................................... 6
1.3 MORE INFORMATION ................................................................................................................................. 7
2 SYSTEM CONFIGURATION ..................................................................................................................... 8
2.1 MANAGEMENT CONSOLE CONNECTION ......................................................................................................... 8
2.2 ADMINISTRATOR SET UP .......................................................................................................................... 10
2.3 NETWORK CONFIGURATION ...................................................................................................................... 11
2.4 SERVICE ACCESS AND BRUTE FORCE PROTECTION .......................................................................................... 15
2.5 COMMUNICATIONS SOFTWARE .................................................................................................................. 18
2.6 MANAGEMENT NETWORK CONFIGURATION ................................................................................................. 19
3 SERIAL PORT, HOST, DEVICE & USER CONFIGURATION ........................................................................ 28
3.1 CONFIGURE SERIAL PORTS ........................................................................................................................ 28
3.2 ADD AND EDIT USERS .............................................................................................................................. 38
3.3 AUTHENTICATION ................................................................................................................................... 42
3.4 NETWORK HOSTS .................................................................................................................................... 42
3.5 TRUSTED NETWORKS ............................................................................................................................... 43
3.6 SERIAL PORT CASCADING .......................................................................................................................... 45
3.7 SERIAL PORT REDIRECTION (PORTSHARE) .................................................................................................... 49
3.8 MANAGED DEVICES ................................................................................................................................. 50
3.9 IPSEC VPN ............................................................................................................................................ 52
3.10 OPENVPN ............................................................................................................................................ 55
3.11 PPTP VPN ............................................................................................................................................ 63
3.12 CALL HOME ........................................................................................................................................... 68
3.13 IP PASSTHROUGH ................................................................................................................................... 71
3.14 CONFIGURATION OVER DHCP (ZTP) .......................................................................................................... 73
3.15 ENROLLMENT INTO LIGHTHOUSE ................................................................................................................ 75
4 FIREWALL, FAILOVER & OOB ACCESS ................................................................................................... 76
4.1 DIALUP MODEM CONNECTION .................................................................................................................. 76
4.2 OOB DIAL-IN ACCESS .............................................................................................................................. 76
4.3 DIAL-OUT ACCESS ................................................................................................................................... 79
4.4 OOB BROADBAND ETHERNET ACCESS ........................................................................................................ 83
4.5 BROADBAND ETHERNET FAILOVER .............................................................................................................. 83
4.6 CELLULAR MODEM CONNECTION ............................................................................................................... 84
4.7 CELLULAR OPERATION ............................................................................................................................. 93
4.8 FIREWALL & FORWARDING ....................................................................................................................... 96
5 SSH TUNNELS & SDT CONNECTOR ..................................................................................................... 105
5.1 CONFIGURING FOR SSH TUNNELING TO HOSTS ........................................................................................... 106
5.2 SDT CONNECTOR CLIENT CONFIGURATION ................................................................................................ 106
5.3 SDT CONNECTOR TO MANAGEMENT CONSOLE .......................................................................................... 115
5.4 SDT CONNECTOR: TELNET OR SSH CONNECT TO SERIALLY ATTACHED DEVICES .................................................. 115
5.5 USING SDT CONNECTOR FOR OUT-OF-BAND CONNECTION TO THE GATEWAY .................................................... 117
5.6 IMPORTING (AND EXPORTING) PREFERENCES .............................................................................................. 118
5.7 SDT CONNECTOR PUBLIC KEY AUTHENTICATION ......................................................................................... 119
5.8 SETTING UP SDT FOR REMOTE DESKTOP ACCESS ......................................................................................... 120
5.9 SDT SSH TUNNEL FOR VNC ................................................................................................................... 121
5.10 USING SDT TO IP CONNECT TO HOSTS THAT ARE SERIALLY ATTACHED TO THE GATEWAY ...................................... 123
5.11 SSH TUNNELING USING OTHER SSH CLIENTS (E.G. PUTTY) ........................................................................... 127