F5 FirePass AuthMan6.0
F5 FirePass AuthMan6.0
Partner Information
Product Information
Partner Name F5 Networks
Web Site http://www.f5.com/
Product Name FirePass
Version & Platform v5.4.1
Product Description F5's FirePass controller enables enterprises to provide secure, reliable and
intuitive remote access to corporate applications and data using standard
web browser technology, without the headaches associated with time-
consuming client software installation and configuration, or changes to
server-side applications.
It also offers the only open API and SDK that enables 3rd party application
vendors to build seamless, secure remote access into their client
applications.
Product Category Perimeter Devices (Firewalls, VPNs and ID)
1
Solution Summary
The FirePass controller features broad, flexible authentication options. The FirePass device can easily be
configured to work with RADIUS, and its Native Protocol support for RSA SecurID Authentication allows
the FirePass to be deployed without requiring configuration changes on the existing authentication
deployment. The FirePass controller also supports RSA advanced features. Organizations using the
FirePass controller with RSA SecurID benefit from increased security, easier management, and a lower
total cost of ownership.
2
Product Requirements
Partner Product Requirements: FirePass Appliance
Firmware Version 5.4.1
3
Agent Host Configuration
To facilitate communication between the FirePass Appliance and the RSA Authentication Manager / RSA
SecurID Appliance, an Agent Host record must be added to the RSA Authentication Manager database.
The Agent Host record identifies the FirePass Appliance within its database and contains information
about communication and encryption.
To create the Agent Host record, you will need the following information.
• Hostname
• IP Addresses for all network interfaces
• RADIUS Secret (When using RADIUS Authentication Protocol)
When adding the Agent Host Record, you should configure the FirePass Appliance as a Communication
Server. This setting is used by the RSA Authentication Manager to determine how communication with
the FirePass Appliance will occur.
Please refer to the appropriate RSA Security documentation for additional information about Creating,
Modifying and Managing Agent Host records.
4
Partner Authentication Agent Configuration
11. If applicable to your configuration, click a check in the Use a secondary RADIUS server box to configure a
secondary RADIUS server. After configuring the secondary server, you can also click Use a tertiary RADIUS
server to configure a tertiary RADIUS server.
After successfully configuring the server, RADIUS authentication is enabled. Users who are configured to
use RADIUS authentication can sign in with their username and password.
5
Native RSA SecurID Authentication Support
Configure the FirePass controller to use the Authentication Manager.
1. From the RSA Authentication Manger, locate and save the sdconf.rec file to a location you can access from the
FirePass device.
2. Log into the FirePass Administrator Console. The administrator console can be reached using the following
syntax: https://firepass.mycompany.xyz/admin/.
3. From the left navigation, click Device Management > Configuration > RSA SecurID screen. The Configure a
New Ace Server screen opens.
4. In the Name box, type a name for identifying the RSA Authentication Manager configuration on the FirePass
controller.
5. In the Configuration file box, click the Browse button to locate the RSA Authentication Manger configuration file
(by default named sdconf.rec), in the location you saved it to in Step 1.
6. In the Source IP section, specify the Source IP address to be used for communicating with RSA Authentication
Manager.
Note: In all cases, this IP address must match the Source IP address in
the IP packets received by the RSA Authentication Manager.
6
8. From the left navigation, click Users > Groups > Master Groups, and then click the Create New Group button.
The Create New Group screen opens.
9. In the Name box, type a name for this group.
10. From the Users in Group list, select the setting appropriate for your configuration. For this guide, we select
External.
11. From the Authentication method list, select Native Ace.
12. Leave the Copy settings from list at the Do not copy option. Click the Create button.
The Master Group configuration screen opens.
After successfully configuring the server, RSA SecurID Authentication is enabled on the FirePass
controller. The server does not have to be restarted. The users configured to use RSA SecurID
Authentication can login with their username and their SecurID PASSCODE, accordingly.
7
Authentication Examples
Login Screenshot
8
9
New PIN Mode – User Generated PIN Screenshots
10
Next Tokencode Mode Screenshot
11
Certification Checklist
Date Tested: April 7, 2005
Certification Environment
Product Name Version Information Operating System
RSA Authentication Manager 6.0 Windows 2003 Server
F5 FirePass 5.4.1 Release Integrated IOS
Mandatory Functionality
RSA Native Protocol RADIUS Protocol
New PIN Mode
Force Authentication After New PIN Force Authentication After New PIN
System Generated PIN System Generated PIN
User Defined (4-8 Alphanumeric) User Defined (4-8 Alphanumeric)
User Defined (5-7 Numeric) User Defined (5-7 Numeric)
User Selectable User Selectable
Deny 4 and 8 Digit PIN Deny 4 and 8 Digit PIN
Deny Alphanumeric PIN Deny Alphanumeric PIN
PASSCODE
16 Digit PASSCODE 16 Digit PASSCODE
4 Digit Password 4 Digit Password
Next Tokencode Mode
Next Tokencode Mode Next Tokencode Mode
Load Balancing / Reliability Testing
Failover (3-10 Replicas) Failover
Name Locking Enabled Name Locking Enabled
No RSA Authentication Manager No RSA Authentication Manager
Additional Functionality
RSA Software Token API Functionality
System Generated PIN N/A System Generated PIN N/A
User Defined (8 Digit Numeric) N/A User Defined (8 Digit Numeric) N/A
User Selectable N/A User Selectable N/A
Next Tokencode Mode N/A Next Tokencode Mode N/A
Domain Credential Functionality
Determine Cached Credential State N/A Determine Cached Credential State
Set Domain Credential N/A Set Domain Credential
Retrieve Domain Credential N/A Retrieve Domain Credential
12
Known Issues
FirePass supports one primary and two back-up RADIUS servers. If the primary server is not available,
first the secondary server, and then tertiary server, will be used.
13