Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia.

Slides:



Advertisements
Similar presentations
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Advertisements

Novell eDirectory™ Deployment at Hydro Quebec Richard Cabana Enterprise Technology Account Manager Novell Canada Ltd.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Module 5: Configuring Access for Remote Clients and Networks.
Novell iChain ® 2.x Configuration Using the Web Server Accelerator Wizard Cary Andrews Senior Software Engineer Novell, Inc.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Integrating ISA Server and Exchange Server. 2 How works.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Course 201 – Administration, Content Inspection and SSL VPN
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Using Windows Firewall and Windows Defender
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Chapter 6: Packet Filtering
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
70-411: Administering Windows Server 2012
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Advisor.com GroupWise Consulting Success Tricks of the Trade Author: Gregg A. Hinchman Company: Hinchman Consulting SNG208.
Novell GroupWise ® 6 Deployment and Best Practices Howard Tayler GroupWise Product Manager Steve Whitehouse Systems Engineer.
Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc.
Module 6 Planning and Deploying Messaging Security.
iChain ® 2.1: Introduction and Overview Lee Howarth Product Manager Novell, Inc.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Upgrading Legacy Novell Directory Services ® to Novell eDirectory ™ 8.6 Rick Killpack WSS Engineer Novell, Inc. Connie.
Using Novell GroupWise ® 6 Monitor Duane Kuehne Software Engineer Novell, Inc. Danita Zanre Senior Consultant NSC Sysop,
Keeping Your Business Online with eDirectory ™ Backup and Restore Brian Hawkins Software Engineer Novell, Inc. Roger.
Introduction to Novell GroupWise ® Administrative Object API Glade Monson Software Engineer Novell, Inc.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
How To Implement GroupWise ® Document Management Gregg Hinchman Consultant Hinchman Consulting Jerry Winkel.
Securing GroupWise ® end-to-end with SSL Mike Bills ATT Engineer, Novell Inc.
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 9 Securing internet messaging.
POP - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Creating Custom User Management Plug-ins for iManager Eugene Baron Consultant III Novell, Inc. Adam Ruth Senior Software.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Security fundamentals
Intermediate Programming with GroupWise® C3POs™
Programming with NetWare® XPlat APIs
Novell Account Management Introduction and Overview
Creating Novell Portal Services Gadgets: An Architectural Overview
Novell BrainShare 2002 Success in the City: Implementing Novell Solutions at the City of Los Angeles Bob Gillette Information Systems Manager City of Los.
Securing the Net: Web Authentication Using SecureLogin
Novell BorderManager® 3.7: Technical Overview
Small Business: Implementing GroupWise® 6
Novell iPrint Deployment Strategies
Introducing Novell IPv6 Stack
It’s one Net for Mac Users Too
Automating Mainframe Authentication Using SecureLogin
IIS.
Introduction to Novell GroupWise® Token API
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia Network Consulting Michael Bell Software Developer Armana Software

Vision…one Net A world where networks of all types—corporate and public, intranets, extranets, and the Internet—work together as one Net and securely connect employees, customers, suppliers, and partners across organizational boundaries Mission To solve complex business and technical challenges with Net business solutions that enable people, processes, and systems to work together and our customers to profit from the opportunities of a networked world

Session Objectives Understand pre-requisites and configuration for: SSL  WebAccess, GWIA, MTP, MTA/POA HTTP Server certificates  Generating CSRs, obtaining certificates—third-party or Novell Certificate Server GWIA  Securing connections  Preventing GWIA from being an open relay

Session Objectives (cont.) Securing Internet post offices without a VPN  Reduce infrastructure costs without sacrificing security Antivirus/content filtering  Protect your system from the flood of viruses LDAP authentication to the GroupWise ® mailbox  Single password for Novell eDirectory ™, the GroupWise Client, and WebAccess

SSL and Certificates GroupWise agents use OpenSSL implementation Generating Certificate Signing Request (CSR)  GWCSRGEN.EXE with GroupWise 6 SP1  OpenSSL—create CSR or self-signed certificates Obtaining certificates  Third-party Certificate Authorities Verisign, Thawte  Novell Certificate Server

Using GWSCRGEN * Note: All fields MUST be filled in Filenames must be 8.3 format Use 2 char abbreviation Do not use abbreviation Fully qualified DNS hostname of server

Novell Certificate Server

Novell Certificate Server (cont.)

Reducing Your Network Costs WAN $$Corporate network

Reducing Your Network Costs (cont.) GroupWise 6 Internet Corporate network

Securely Using the Internet as a WAN: Prerequisites GroupWise 6 SP1 agents at all WAN nodes  MTA-MTA (Domain-to-Domain)  MTA-POA (Domain-to-Post Office) Signed certificates imported to all WAN node agents  GWCSRGEN.EXE available for generating CSRs Agent with certificate is now SSL-enabled for message transfer

SSL-Enabling the MTA* required recommended * the POA is done exactly the same way…

GWIA—Securing Your Connections Secure SMTP transactions using STARTTLS  Connecting SMTP host must also support STARTTLS  (you can test by sending to myrealbox.com) Secure POP3/IMAP4  Support on ports 995 (POP3) and 993 (IMAP4)  Also support STARTTLS method with ports 110 and 143 HTTPS connection for HTTP monitoring

GWIA—Preventing Relaying GWIA 6  Relaying is disabled by default  Relaying is now denied at a SMTP daemon level  Relay exceptions can be IP addresses or address range  Added SMTP AUTH, if POP/IMAP clients use authentication on outbound SMTP, relay access control is bypassed GWIA 5.5 and 5.5EP  Apply latest support pack or FTF to eliminate from being relayed

Anti-Virus—Spam Control Anti-virus solutions  Protection available at GWIA MTA Desktop

GWIA Anti-Virus Solutions Use of SMTP home directory (Third-party directory)  Intercepts all incoming and outgoing  See TID for configuration details  Two products available Guinevere— FootNote—

GWIA Anti-Virus Solutions Other anti-virus solutions using relay host  Not specific to GroupWise  GWIA relays third-party host for virus checking  MX record references virus checking host, relays inbound messages to GWIA  Products include Symantec—Norton Anti-Virus for Gateways McAfee—Webshield Trend Micro—Interscan MailSweeper for SMTP

MTA Anti-Virus Solution MTA level virus protection  Intercepts all mail routed through the domain  Gateway messages, except WebAccess  All inter-post office traffic Product: GWAVA  Related Session: TUT225

Securing WebAccess No WebAccess specific steps needed Enable WebServer for SSL connection  NES—Uses Novell Server Certificate  IIS—Uses NT/2000 Certificate  Apache—Open SSL certificate

LDAP Authentication To GroupWise Post Office agent GroupWise 6 SP1 LDAP server eDirectory 8.5 (or any LDAP v3 Directory) Login request Credentials Results GroupWise client GroupWise WebAccess Results

LDAP Authentication: Prerequisites And Limitations GroupWise 6 SP1 POA, WebAccess, and Client  (Client and WebAccess required for interface support of password expiration dialogs) eDirectory 8.5 LDAP Server, with GroupWise users in the eDirectory 8.5 tree  OR User object MAIL attribute synchronization between GroupWise and the LDAP server of choice For full password expiration functionality, the POA must be forced to BIND

LDAP Authentication: Post Office Configuration required recommended leave blank 636

LDAP Configuration: Why Leave the LDAP User Name Blank? Credential behavior with the LDAP user name and password  POA will use this user name and password to connect, and then do a ‘compare’ of the user-provided credentials against the LDAP directory  ‘Compare’ does not support expiration of passwords Credential behavior without the LDAP user name and password  POA will use the user-provided credentials to attempt to bind to the LDAP server  Password expiration is supported for a BIND connection

LDAP Configuration: SSL Certificate Use and Requirements Why Use SSL?  Without SSL, LDAP credentials are passed in the clear This is unacceptable, even within your firewall SSL certificate must be a Trusted Root Certificate for the LDAP directory  This is the way the standard is written—it’s an LDAP requirement The LDAP SSL port is 636

Exporting the Trusted Root Cert Detail screen of a server certificate object, Trusted Root Cert Export the Trusted Root in.DER format

Exporting the Trusted Root Cert (cont.)