User Manual SPRECON-E Security Editor English
User Manual SPRECON-E Security Editor English
USER MANUAL
94.2.912.45 en
Issue B
Version v2.0 SP0
11.04.2018
Build: 4/4/2019;5:35 PM
© Sprecher Automation GmbH 2018, Sprecher Automation, SPRECON®, the Sprecher Automation logo and
any alternative version thereof are trademarks and service marks of Sprecher Automation. Other names men-
tioned, registered or not, are the property of their respective companies. The reproduction, transmission or use of
this document or its contents is not permitted without express written authority. Offenders will be liable for dam-
ages. All rights, including rights created by patent grant or registration of a utility model or design, are reserved.
Chapter Preface
PREFACE
Purpose of this document This user manual describes the handling of the SPRECON-E Security
Editor.
Applicability This manual applies exclusively to the SPRECON-E Security Editor.
Target Audience Personnel concerned with planning, adjustment, checking, commissioning
and service of substation- and remote control facilities.
Exclusion of Liability The documentation contains instructions for installation, commissioning
and operation of devices of the SPRECON-Eseries. However, the manual
cannot cover all conceivable circumstances or include detailed information
on all topics. In the event of questions or specific problems, do not take any
action without proper authorization. Contact Sprecher Automation GmbH
and request the necessary information.
Any agreements, commitments, and legal relationships and any obligations
on the part of Sprecher Automation GmbH, including settlement of war-
ranties, result solely from the applicable purchase contract, which is not
affected by the contents of the documentation.
Sprecher Automation GmbH has checked the text of this manual for con-
formity with the hardware and software described. However, since devi-
ations cannot be ruled out entirely, Sprecher Automation does not accept
liability for complete conformity or for any errors or omissions.
The information in this manual is checked periodically, and necessary cor-
rections will be included in future editions. Sprecher Automation appre-
ciates any suggestions for improvement. Please direct them to
[email protected].
Sprecher Automation GmbH reserves the right for technical improvements.
Copyright © Sprecher Automation GmbH 2018. Sprecher Automation, SPRECON®,
the Sprecher Automation logo and any alternative version thereof are trade-
marks and service marks of Sprecher Automation. Other names men-
tioned, registered or not, are the property of their respective companies.
The reproduction, transmission or use of this document or its contents is
not permitted without express written authority. Offenders will be liable for
damages. All rights, including rights created by patent grant or registration
of a utility model or design, are reserved.
CONTACT ADDRESS
Fax: +43/(0)732/6908-278
www.sprecher-automation.com
- IV - 94.2.912.45 en - Issue B
Chapter Contents
CONTENTS
Preface III
Contact address IV
Contents V
1 - General 1
2 - Menu 3
2.1 - File 3
2.2 - Tunnel 3
2.3 - Help 4
3 - Settings 5
3.1 - Overview 5
3.1.1 - Target 5
3.1.2 - Overview page 6
3.2 - Certificates 7
3.3 - IPsec settings 8
3.3.1 - General IPsec settings 8
3.3.2 - Debug 9
3.4 - Tunnel settings 10
3.4.1 - "Use IP addresses as IDs" 10
3.4.2 - Remote connection 11
3.4.3 - Own connection 12
3.4.4 - IPsec IKE/ESP Settings 13
3.4.5 - Authentication settings 15
3.4.6 - Time/DPD Settings 16
3.4.7 - IPsec Expertmode 17
4 - OpenVPN 19
4.1 - Overview OpenVPN settings 19
4.2 - Tunnel settings 20
4.2.1 - "Use IP addresses as IDs" 20
4.2.2 - "Description" and "Remote IP" 20
4.2.3 - Area "Authentication" 21
4.2.4 - Area "Security" 21
4.2.5 - Area "General Settings" 22
4.2.6 - Configuration example Server – Client 24
5 - Application 27
5.1 - Create and save configuration file 27
5.2 - Integrate configuration (up to vers. 5.77 SP18) 28
5.3 - Integrate configuration (from Vers. 5.77 SP21) 31
5.4 - Process data list 32
5.5 - Analysis via Webserver 33
5.5.1 - IPsec status 34
5.5.2 - OpenVPN status 35
1 - GENERAL
IPsec is an extension of encryption- and authentication mechanisms for the
Internet Protocol (IP). With it the Internet Protocol is able to transfer IP
packets cryptographically secured via networks.
The SPRECON-E Security Editor is used to adjust the complex setting of
IPSec comfortable. It generates a compiled ipsec.cfg file, which includes
the defined parameters. Afterwards this file can be loaded along with the
process data list to the system.
Figure 1 shows the program interface of the SPRECON-E Security Editor.
The menus and the different settings are described in the following
chapters.
2 - MENU
2.1 - FILE
l Open File...
Opens an already existing IPsec configuration file (ipsec.cfg).
l Save
Saves the file.
l Save as...
Saves the file under a specified file name.
l Export as HTML
Saves a summary of the configuration as HTML file.
l Exit
Closes the SPRECON-E Security Editor.
2.2 - TUNNEL
l Add tunnel
Adds another tab for another IPsec or OpenVPN tunnel configuration
(max. four IPsec and one OpenVPN tunnel configurations possible).
l Delete tunnel
Deletes the selected tunnel configuration. The last tunnel configuration
can not be deleted, one has to be available always.
l Activate Ipsec Expertmode
Deletes the current IPsec configuration and changes to Expertmode
2.3 - HELP
l Language
Switches between German and English language.
l About
Shows the version information of the SPRECON-E Security Editor.
3 - SETTINGS
3.1 - OVERVIEW
3.1.1 - Target
3.2 - CERTIFICATES
l Add certificate...
Depending on the certificate storage the certificates can be added here;
the own certificate, the counterpart certificate, the private key and the
certification. The certificate is then available at the tunnel settings.
Note: Always consider the validity period of the certificates. This also
applies to the start date, because a system from the production starts
from year 2000.
l Delete certificate
Depending on the certificate storage the appropriate certificate is
deleted.
l View certificate
Shows the meta information of the certificate.
l Use OCSP
Activates the Online Certificate Status Protocol. This is used for check-
ing the validation of the certificates. The use of this technic must be cla-
rified, because it affects the communication directly.
o OCSP-URL:
Entry of the URL for the OCSP query
o CRL verification intervals
Declaration, how often the check shall be done (in seconds)
Certificate format:
OpenVPN: X509 certifikates in PEM format (ASCII, readable) (file exten-
sion e.g. pem,crt ,key)
IPsec: X509 certifikates in DER format (binär) or PEM format. (file exten-
sion e.g. der) The private-key must be in PEM format.
l Client Polling
This option forces an establishment of the connection. Basically, an
IPsec connection is only established if needed. At typical “Road war-
rior” constellations this option is recommended.
l Systime -Fix
When an IPsec connection is established via certificates, an incorrect
system time (year 2000)can cause connection problems while booting.
With this option enabled the certificate lifetime check is disabled tem-
porarily while booting. Thereby the connection can be established des-
pite of an incorrect system time.
After the system time has been corrected (e.g. via NTP) a lifetime
check is carried out. For this a time frame can be set (default 600 s).
If no valid system time is available after this time frame the connection
is cut.
Note:
The Systime-Fix option is especially important if the system time is set via
external sources (NTP servers), and this NTP communication to the
SPRECON is realized through an IPsec tunnel!
3.3.2 - Debug
l Level:
There are different levels which differ in the grade of possible analysis
by the user. This setting is not relevant for operation of IPsec, it is used
only for analysis.
o SILENT
Almost no analysis, but log file is not filled with too many entries.
o BASIC
Very few analysis, but log file is not filled with too many entries.
o STANDARD
Good analysis, but log file is filled with many entries.
o DEBUGGING
Detailed analysis, but log file is filled with many entries.
o RAWDUMPS
This log level includes additional raw values for deeper analysis of
protocols.
o SENSITIVE
This log level includes additional sensitive files in the log and
should be handled with care.
l Tunnel name
The name of the tunnel is set by the system and can not be changed.
l Description
Entry of a description text for the tunnel
- 10 - 94.2.912.45 en - Issue B
Chapter 3 - Settings
1Input mandatory
1Input mandatory
- 12 - 94.2.912.45 en - Issue B
Chapter 3 - Settings
l IKE Version
In this menu the version of the protocol for the security relationship and
for the exchange of authenticated keys has to be chosen. IKEv1 and
IKEv2 are supported.
l Enable Aggressive Mode
This option activates the Aggressive Mode in Phase 1 and should not
be used due to security issues.
l Type of IPsec Tunnel
o Transport
Is used typically for Peer-to-Peer (Host-to-Host) communication.
o Tunnel
Is used typically for tunneling between two networks.
o Drop
In this mode the data of the entered tunnel networks is deleted.
o Passthrough
In this mode the data of the entered tunnel networks is not pro-
cessed by IPsec.
l Force encapsulation
Forces UDP encapsulation of ESP packets, even if no NAT situation
has been detected.
l Compress
User data is compressed (IPComp).
- 14 - 94.2.912.45 en - Issue B
Chapter 3 - Settings
l Certificate
Trust model, which is accepted/signed manually/automatically.
o Own
If certificates were imported, they can be selected here for the
respective tunnel.
o Remote
If certificates were imported, they can be selected here for the
respective tunnel.
l Pre-SharedKey (PSK)
The authentication is done via a Pre-Shared-Key.
l Enable XAuth
In addition to the PSK a user name and a password can be defined.
o User
User name for XAuth
o Password
Password for XAuth
- 16 - 94.2.912.45 en - Issue B
Chapter 3 - Settings
Note:
For a data point query of an IPsec connection the connection must be
named "ipscon1". Multiple connections have to be numbered consecutively
(e.g. "ipscon2".
4 - OPENVPN
4.1 - OVERVIEW OPENVPN SETTINGS
l Tunnel name
The name of the tunnel is set by the system and can not be changed.
l Description
Entry of a description text for the tunnel
- 20 - 94.2.912.45 en - Issue B
Chapter 4 - OpenVPN
Remark:
The Remote IP (server) must verify the password. For this purpose server
setting must be "--client-cert-not-required" or "--verify-client-cert none"
(from OpenVPN 2.4).
Note:
Yellow coloured algorithm (Cipher, HMAC) support legacy systems and
are not recommended.
- 22 - 94.2.912.45 en - Issue B
Chapter 4 - OpenVPN
l Keepalive
o ping-intervall: Count how often a ping packet is sent to counterpart.
o timeout-restart: Triggers a restart, if no packet is received after
defined time.
For detecting connection problems at UDP, a ping-intervall must be
set.
Pushed values for ping and ping-restart by the server have higher pri-
ority than local values .
l Logging
If a webserver is configured, adaption of the Logging value is possible
while operation (only with appropriate permission). After a restart the
value will be reset to the configured value.
o Standard 1 adjustable values:
n SILENT (0) : Only report of fatal errors
n DEFAULT (1) : Primary report of errors
n BASIC (3) : Standard informationen and report of errors
n DEBUG_RW (5) : Output of read und write packets
n DEBUG (6) : e.g. additional TUN/TAP driver informationen
n DEBUG_SENSITIV (7) : e.g. Encryption Keys
n DEBUG_ALL (11) : Recommended only for experts
l Nobind
No link to local addresse and port.
l Renegotiate Interval
New determination of data channel keys (in sekonds)
Standard: 3600s
l Float
Permission for counterpart for changing its IP address and / or port num-
ber
Useful at DHCP or mobile connections
l Use Notify on Exit
A message is sent if tunnel was restarted or connection was disrupted.
l Redirect-Gateway (def1)
Forces outgoing data of the IP to be on the way through the tunnel.
This can be set at server too: push "redirect-gateway def1"
The advantage is that changes can be cancelled easier.
Example:
@echo off
IF "%username%" == "User1" IF "%password%" == "User1Pwd!" (
EXIT 0
)
EXIT 1
- 24 - 94.2.912.45 en - Issue B
Chapter 4 - OpenVPN
Adapted client:
Notes:
l Certifikates can be generated e.g. with OpenVPN program „EasyRSA“
l A static key for „TLS-Crypt“ can be generated with the following com-
mand: „openvpn --secret mystatic.key --genkey“
5 - APPLICATION
5.1 - CREATE AND SAVE CONFIGURATION FILE
After successful configuration the parameter file hast to be saved to the
parameter storage path of the SPRECON-E Engineering Center (example:
folder “des” -> folder “S01*”). "S01” stands for the system number used in
the project.
Afterwards the context menu hast to be opened by right click on the wanted
component in the system configuration and the settings must be opened in
the process data list.
- 28 - 94.2.912.45 en - Issue B
Chapter 5 - Application
- 30 - 94.2.912.45 en - Issue B
Chapter 5 - Application
Afterwards it must be loaded into the system via the SPRECON-E Service
Program. After successful startup and activation all configuration actions
for the operation with IPsec at the SPRECON-E system are finished.
The IPsec configuration file is deleted with the same procedure as it was
added. Via new generation and loading of the process data list without
“ipsec.cfg” the IPsec function is deactivated.
- 32 - 94.2.912.45 en - Issue B
Chapter 5 - Application
After successful login the state of the IPsec connection can be found under
Network -> IPsec.
- 34 - 94.2.912.45 en - Issue B
Chapter 5 - Application
94.2.912.45 en
Issue B
Version v2.0 SP0
11.04.2018
HEADQUARTERS LOCATIONS
Sprecher Automation GmbH AUSTRIA POLAND
Sprecher Automation GmbH Sprecher Automation Polska Sp z o.o.
Franckstraße 51 (Linz, Wien) (Łódź, Świdnica)
4020 Linz
Austria
T: +43 732 6908-0 GERMANY SWITZERLAND
F: +43 732 6908-278 Sprecher Automation Deutschland GmbH Sprecher Automation Schweiz AG
(Berlin, Erfurt, Dortmund, München) (Aarau)
[email protected]
NETHERLANDS SLOVAKIA
Sprecher Automation Nederland B.V. Sprecher Automation spol. s r.o.
(Oud Gastel) (Bratislava)
Any liability regarding the correctness and completeness of any information and/or specifications in the brochure is excluded. All rights are reserved
to alter specifications, make modifications, or terminate models without prior notice. The specifications of a model may vary from country to country.