Wonderware - InTouch Access Anywhere Secure Gateway 2013
Wonderware - InTouch Access Anywhere Secure Gateway 2013
InTouch® Access
Anywhere Secure
Gateway
Administrator’s Manual
8/23/2013
All rights reserved. No part of this documentation shall be reproduced, stored in a retrieval
system, or transmitted by any means, electronic, mechanical, photocopying, recording, or
otherwise, without the prior written permission of Invensys Systems, Inc. No copyright or patent
liability is assumed with respect to the use of the information contained herein. Although every
precaution has been taken in the preparation of this documentation, the publisher and the author
assume no responsibility for errors or omissions. Neither is any liability assumed for damages
resulting from the use of the information contained herein.
The information in this documentation is subject to change without notice and does not represent
a commitment on the part of Invensys Systems, Inc. The software described in this
documentation is furnished under a license or nondisclosure agreement. This software may be
used or copied only in accordance with the terms of these agreements.
For comments or suggestions about the product documentation, send an e-mail message to
[email protected].
All terms mentioned in this documentation that are known to be trademarks or service marks
have been appropriately capitalized. Invensys Systems, Inc. cannot attest to the accuracy of this
information. Use of a term in this documentation should not be regarded as affecting the validity
of any trademark or service mark.
2
Table of Contents
1. OVERVIEW.................................................................................................. 7
Architecture .................................................................................................................................. 8
2. INSTALLATION........................................................................................... 9
Prerequisites ................................................................................................................................ 9
Secure Gateway Installation ...................................................................................................... 10
3
Obtaining Log Files .................................................................................................................... 41
Disabling HTTP/HTTPS filtering ................................................................................................ 42
4
ABOUT THIS DOCUMENT
This guide provides instructions on how to install, configure and use InTouch
Access Anywhere Secure Gateway. The Secure Gateway enables remote,
secure connections from clients running at unsecured locations to internal
network resources. The Secure Gateway provides authentication and
authorization services, as well as data encryption.
Follow the instructions in this manual and start enjoying the benefits of the
Secure Gateway within minutes!
This guide includes the following information:
• Overview of the Secure Gateway
• Preparation and installation procedures
• Usage instructions
• Known issues and limitations
This guide assumes that the reader has knowledge of the following:
• Wonderware InTouch™
• Enabling and configuring RDP on Windows Server operating
systems1
• Firewall configuration
• Web Server Administration
Important terminology used in this document:
• DMZ (demilitarized zone) – a physical or logical subnetwork that
contains and exposes an organization's external services to a
larger untrusted network.
• SSL – Secure Sockets Layer is a cryptographic protocol that
provides communications security over the Internet.
• RDP – Remote Desktop Protocol. A remote display protocol
developed by Microsoft. RDP is a standard component of Microsoft
Windows.
• RDP Host – a Windows system that can be remotely accessed
using Microsoft RDP, such as a Terminal Server (RDS Session
Host) or Windows workstation with remote access enabled.
1
For details on proper configuration and management of a Remote
Desktop environment for use with Wonderware InTouch, refer to the
Wonderware InTouch for Terminal Services Deployment Guide.
5
• VPN – Virtual Private Network. It enables a computer to securely
send and receive data across shared or public networks as if it
were directly connected to the private network.
• HTML5 – the current version of the HTML specification. Extends
HTML with new features and functionality for communication,
display, etc.
• WebSocket – a bi-directional, full-duplex communication
mechanism introduced in the HTML5 specification.
For more information about this and other Wonderware products, please visit
the www.wonderware.com
6
1. OVERVIEW
The InTouch Access Anywhere Secure Gateway is a complementary
component to the InTouch Access Anywhere Server, used to provide end-
users with secured remote access to InTouch applications past a firewall
through a DMZ.
7
Architecture
The Secure Gateway acts as a gateway between end users in remote locations
and applications in the control network. It may be installed in a DMZ to route
traffic between a business network and the HMI SCADA network.
The following diagram illustrates how the Secure Gateway requires just one
port to be made available for secured remote access. All communication
related web traffic and session protocols are tunneled through the SSL-based
Secure Gateway connection.
8
2. INSTALLATION
Prerequisites
The Secure Gateway must run on Windows Server 2003 or higher.
.NET Framework 4 Full Installation is required – this can be downloaded from
Microsoft’s website.
The Secure Gateway uses port 443 by default. This is a common port that is
also used by IIS so watch out for port conflicts.
The following ports need to be configured on the network.
• Port 443 is required between the External Network and the
Secure Gateway server; this value is adjustable.
• For InTouch Access Anywhere Server: Port 8080 is required
between the Secure Gateway server and the InTouch Access
Anywhere Server; this value is adjustable.
The Secure Gateway includes an HTTP proxy and will listen on port 80 by
default. This can be disabled post-installation.
9
Secure Gateway Installation
To install the Secure Gateway, launch the installer (on a machine running
Windows 2003, 2008 or higher.) Authorization may be required to perform
the installation on some systems.
The dialog allows the administrator to specify the installation path by clicking
the Browse button. We recommend keeping the default installation path.
Click Next.
10
Accept the Invensys End User License Agreement
Click Next. Installation will proceed.
11
Click the Finish button.
Note: If Microsoft IIS is running on the same server, make sure there are
no port conflicts. Either change the IIS ports to values other than 80 and
443, or change the Secure Gateway port to a value other than 443 and
disable the HTTP auto redirect feature after the installation. If there is a
port conflict on either the HTTP or HTTPS port, the Secure Gateway will
not operate properly.
To use a trusted certificate that is already installed on the machine where the
Secure Gateway is being installed on, click on Select Certificate and select the
desired certificate to be used by the Secure Gateway. The trusted certificate
may also be configured post-installation.
12
The Secure Gateway runs as a service, and can be stopped and restarted
from the Microsoft Windows Services Manager:
13
3. SECURE GATEWAY POST INSTALLATION
Connecting to an InTouch Access Anywhere
Server through the Secure Gateway
For example, InTouch Access Anywhere Server is installed on Node 1 and
InTouch Access Anywhere Secure Gateway is installed on Node 2.
You want to access the InTouch Access Anywhere Server through the
InTouch Access Anywhere Secure Gateway node.
A. The InTouch Access Anywhere Secure Gateway node (Node2) has not
yet been configured to expose the InTouch applications list.
In this scenario, you will be guided to a default page. Do the following four
steps to connect to the InTouch application you want to open:
14
2. Click the Advanced button. The Advanced Settings dialog appears.
15
3. In the Program path and filename field, enter “view.exe” and the path for
the InTouch application you want to open. For example:
view.exe “c:\MyInTouchApps\newapp2”
Note that the path is enclosed within quote and separated by space with
view.exe
4. In the Start in the following folder field, enter the InTouch install path.
In this scenario, you will be directed to a page that looks similar to the start
page for accessing an InTouch Access Anywhere Server. You can select the
application you want to open in WindowViewer and click Connect.
16
Configuring the InTouch Access Anywhere
Secure Gateway Node to Expose Your InTouch
Applications
You can display a list of your InTouch applications in the InTouch Access
Anywhere Server, accessed through the Secure Gateway.
The start page can be renamed to any valid file name but for better
readability we recommend prefixing the file name with the InTouch Access
Anywhere server name. For example, if the server name is Master01, the
start page should be renamed to Master01_start.html
17
You should now be able to see the Application Name list with the InTouch
applications available at the corresponding InTouch Access Anywhere Server
node.
18
4. CONFIGURATION PORTAL
The InTouch Access Anywhere Secure Gateway includes a Configuration Portal
to allow the administrator to adjust any related settings. Most of these
settings were set during the installation process. To access the Configuration
Portal page, use a web browser and navigate to the Secure Gateway’s
configuration URL:
https://<SG-server-address>:<port-number>/admin
Login is available to members of the local Administrators group on the
InTouch Access Anywhere Secure Gateway server. All logins are audited in
the Secure Gateway log file. Remind administrators to use strong passwords
to ensure secure access.
After making changes to any settings, press the Save button. If the Save
button is not pressed, and a different page is selected, a warning dialog will
appear. Press Leave this Page to continue and cancel any changes. Press
Stay on this page to return to the current page to save changes.
19
Dashboard
The Secure Gateway Configuration Dashboard displays useful statistics related
to the Secure Gateway operation. Open this page to view server uptime, SSL
certificate status, session activity, and to restart the Secure Gateway Server
service.
20
Mail Alerts
The Secure Gateway can be configured to send e-mail alerts upon specified
system events. To configure mail alerts, enter the SMTP information of the
email server. Then check the desired parameters that will trigger the sending
of a mail alert.
Click Save or Save and Test Mail Settings to apply the configuration.
21
5. PORT AND SSL CERTIFICATE
The InTouch Access Anywhere Secure Gateway includes a self-signed
certificate. Certain web browsers may display a security warning when a self-
signed certificate is detected. To remove the warning, install a trusted
certificate. A trusted certificate must be purchased from a trusted certificate
authority (i.e. VeriSign). The signed certificate must have a private key
associated with it. A .CER file may not have a private key, use one that
includes a private key – usually has a .PFX extension.
The Secure Gateway uses the certificate in the Windows Certificate Store
(Computer Account). To add, view, or modify certificates perform the
following:
1) Run mmc.exe
2) Go to File | Add/Remove Snap-in
3) Add Certificates and select Computer account
22
4) Select Local Computer
7) If a trusted certificate will be used with the Secure Gateway, place it in the
same location as the Secure Gateway certificate (Personal | Certificates).
Secure Gateway identifies a certificate using a unique thumbprint that is
configured in the Gateway’s configuration file
EricomSecureGateway.exe.config.
<add key="CertificateThumbprint" value="<enter trusted certificate
thumbprint value here>" />
23
Manually Configuring a Trusted Certificate
There are two methods to manually configure the Secure Gateway to use a
trusted certificate.
Method 1: Run “EricomSecureGateway.exe /import_cert” to select a
certificate from Windows Store and import its thumbprint to the configuration
file.
Method 2: Add the thumbprint value to the configuration file by performing
the following:
1) Go to the Certificate Details tab and highlight the Thumbprint.
24
6) Save the file and the new Thumbprint will be used. Restarting the Secure
Gateway service will apply the new certificate immediately.
The Thumbprint can also be manually typed in.
Note: The DNS address of the Secure Gateway server must match the
certificate name. If it does not, a “Connection failed” error message will
appear upon attempting a connection.
25
Note: Maintain uptime for the servers at the front of the list to ensure the
fastest login times. If the primary server is unavailable, the end-users will
experience longer login times as the login process must wait for the
primary server to timeout before attempting to connect to a failover
server.
26
6. INTOUCH ACCESS ANYWHERE™
HTML5 CLIENT CONFIGURATION
InTouch Access Anywhere can use the Secure Gateway to provide secured
connections between HTML5 Web clients and InTouch Access Anywhere
servers in order to access InTouch applications residing there. This diagram
describes how these components work together:
27
Configuration
To enable the use of a Secure Gateway with InTouch Access Anywhere:
At the client browser, click on the Advanced button in the Connection Details
page.
Check Use InTouch Access Anywhere Secure Gateway and provide the
Gateway address:
28
7. BUILT-IN WEB SERVER
Internal Web Server
The Secure Gateway has a built-in Web server. The Web server supports the
ability to host the web pages for certain products such as InTouch Access
Anywhere. The built-in Web server cannot be disabled and always listens on
the Secure Gateway port.
To configure the Web server, open the Configuration tool and go to Web
Server.
Click on the drop down box to select the component that should be the default
URL for the built-in Web Server. Click Save. When the user goes to the root
path of the URL, the selected component will be used.
29
For example, if InTouch Access Anywhere Server is selected, when the user
navigates to https://<sg-server-address>:<port-number>/ the URL will
automatically redirect to:
https://<sg-server-address>:<port-number>/AccessAnywhere/start.html
Note: Using the Secure Gateway to proxy to pages other than InTouch
Access Anywhere is not officially supported.
30
HTTP Redirect
The InTouch Access Anywhere Secure Gateway Web server listens on port 80
by default. This is so that HTTP references to the server will automatically
redirect to the HTTPS URL.
This feature only works if the Secure Gateway is listening on port 443. If it is
configured to use any other port, the HTTP automatic redirect will not be
supported. To enable this feature, check the setting: Enabled non-secured
port for HTTPS auto-redirect:
31
Advanced Configuration
Back up the current EricomSecureGateway.exe.config file before making any
changes.
To configure the settings of the built-in Web server: open the
EricomSecureGateway.exe.config using a text editor. Each folder in the
WebServer directory may have a default document assigned for it, and may
also be restricted so that end users cannot access it.
</Folders> </internalWebServerSettings>
32
Preventing Access to Non-listed Folders
Additional subfolders folders may be added to the SG WebServer folder.
These can be accessible, even if they are not listed in the
internalWebServerSettings list. To prevent access to folders that are not
explicitly defined in the internalWebServerSettings list, uncheck Allow access
for non-listed folders (or set allow_access_for_non_listed_folders="false”).
33
8. BUILT-IN AUTHENTICATION SERVER
The Secure Gateway includes an Authentication Server. The Authentication
Server provides a layer of security by authenticating end-users before they
can contact any internal resource (i.e. InTouch Access Anywhere Server).
The Authentication Server is installed on a server that is a member of the
domain that it will use to authenticate users.
The Authentication Server can only be configured for one domain at a time.
Use the Configuration page to modify settings for the Authentication Server:
Setting Description
34
Note: When the Authentication Server is enabled, only Domain Users will
be able to authenticate. Local system users (such as Administrator) will
not be able to login through the Authentication.
35
9. ADVANCED CONFIGURATION
All configurable settings related to the Secure Gateway may be found in the
EricomSecureGateway.exe.config file. This is a text file that can be opened
with a text editor.
Changing parameter values marked as “Reloadable” do not require a service
restart. “Not Reloadable” parameters will only take effect after the next
service restart.
High Availability
To provide high availability to the Secure Gateway layer, install two or more
Secure Gateways and use a third-party redundant load balancer to manage
access to them.
The load balancer will provide one address for end users to connect to. As
requests arrive at the load balancer, they will be redirected to an available
Secure Gateway based on built-in weighting criteria. A basic round-robin load
balancer may also be used, but it may not detect whether a Secure Gateway
is active.
36
SSO Form Post
When using a third-party authentication entity (such as an SSL VPN) that
supports form Post, the user can single-sign-on into an InTouch Access
Anywhere session using the authenticated credentials. The SG is required for
this feature.
In the authentication entity, there will be a field requesting the Post URL.
Enter the SSO URL for the desired product:
AccessNow: https://sg-address/AccessAnywhere/sso
Note: The Secure Gateway will auto-redirect the request to the respective
default page (start.html).
37
Sample page to POST values
<form name="cookieform" method="post" action="/AccessNow/sso"><p>
<!-- <form name="cookieform" method="post" action="/view/sso"><p> -->
address: <input type="text" name="address"/><br/>
<!-- RDP Host: <input type="text" name="fulladdress"/><br/> -->
Username: <input type="text" name="username"/><br/>
Password: <input type="password" name="password"/><br/>
Domain: <input type="text" name="domain"/><br/>
Use Access Anywhere Secure Gateway: <input type="checkbox"
name="use_gateway" value="true"/><br/>
Gateway Address: <input type="text" name="gateway_address"/><br/>
Start Program on connection: <input type="checkbox"
name="remoteapplicationmode" value="true"/><br/>
Program Path: <input type="text" name="alternate_shell"
size="256"/><br/>
<input type="hidden" name="autostart" value="true"/>
<input type="hidden" name="esgcookieprefix" value="EAN_"/>
<input type="submit"/>
</p></form>
38
Response.Write( "Gateway Address:" & Request.Form("gateway_address") &
"<br/>")
Response.Write( "Start Program on connection: " &
Request.Form("remoteapplicationmode") & "<br/>")
Response.Write( "Program Path: " & Request.Form("alternate_shell") &
"<br/>")
%>
</body>
39
10. KNOWN BEHAVIORS AND LIMITATIONS
Common Error Messages
Most modern browsers will require that a trusted certificate be used when
establishing an encrypted session.
If the user sees an error message similar to this, there could be a problem
with the certificate on the InTouch Access Anywhere Secure Gateway server:
If this error appears, check the address that is being used for the InTouch
Access Anywhere Secure Gateway. If it is an IP address, it may pose a
problem:
Rather than using the IP address, use a domain name that matches a trusted
certificate that has been configured in the InTouch Access Anywhere Secure
Gateway.
For example, instead of using 192.168.1.111, use its domain name:
sg.test.com.
Moreover, install a trusted certificate on the InTouch Access Anywhere Secure
Gateway that matches sg.test.com or *.test.com
40
Obtaining Log Files
When requesting technical support, the Secure Gateway log files may be
requested.
The current log file is accessible using the Configuration page. Simply go to
the Download tab. The actual log detail levels may be set under the two Log
pages (Log Settings - Basic and Log Settings- Advanced).
Consult with a support engineer on which settings to enable.
The logs require a special viewer that is also downloadable using the
Download page.
41
Disabling HTTP/HTTPS filtering
Occasionally, certain types of network traffic will be blocked by firewalls. Port
443 on most firewalls are initially reserved for HTTP (and HTTPS) based
communication. Most firewalls will have a rule in place to filter out any non-
HTTP traffic. Depending on what the Secure Gateway will be routing, HTTP
filtering may need to be disabled on the firewall.
The Secure Gateway can proxy various types of traffic. Some are HTTP based
and some are not. The only configuration where HTTP filtering does not need
to be disabled is if the Web Application Portal and InTouch Access Anywhere
are used together.
42
11. TECHNICAL SUPPORT
Wonderware Technical Support consists of a global team of qualified Certified
Support Providers. If you have questions or concerns about InTouch Access
Anywhere, contact
Refer to the following web address for a local distributor or sales office in your area:
http://us.wonderware.com/aboutus/contactsales
Fax: 949-639-1545
E-mail: Customer First members, send an e-mail message to our priority address:
[email protected]
Web: Registered customers, submit your questions to our Support web site.
Refer to the following web site for instructions to register for Wonderware technical
support:
http://wwdotprod02.wonderware.com/imoo/index.aspx
43