12SEC-Stick menu

The mGuard supports the use of an SEC-Stick, which is an access protector for IT systems. The SEC-Stick is a product from team2work: www.team2work.de.

The SEC-Stick is essentially a key. The user inserts it into the USB port of a computer with an Internet connection, and can then set up an encrypted connection to the mGuard in order to securely access defined services in the office or home network. The Remote Desktop Protocol, for example, can be used within the encrypted and secure SEC-Stick connection to control a PC remotely in the office or at home, as if the user was sitting directly in front of it.

In order for this to work, access to the business PC is protected by the mGuard and the mGuard must be configured for the SEC-Stick to permit access. This is because the user of this remote computer, into which the SEC-Stick is inserted, authenticates himself/herself to the mGuard using the data and software stored on his/her SEC-Stick.

The SEC-Stick establishes an SSH connection to the mGuard. Additional tunnels can be embedded into this connection, e.g., TCP/IP connections.

12.1Global

SEC-Stick_Global_Zugriff.png

SEC-Stick >> Global >> Access

SEC-Stick Access

(This menu item is not included in the scope of functions for TC MGUARD RS2000 3G, TC MGUARD RS2000 4G, FL MGUARD RS2005 or FL MGUARD RS2000.)

Section1200610.jpg

 

 

Enable SEC-Stick ser­vice

When activated, the function specifies that the SEC-Stick being used at a remote location or its owner can log in. In this case, SEC-Stick remote access must also be enabled (next option).

 

Enable SEC-Stick remote access

When the function is activated, SEC-Stick remote access is enabled.

 

Remote SEC-Stick TCP port

Default: 22002

If this port number is changed, the new port number only ap­plies for access via the External, External 2, DMZ, GRE or VPN interface. Port number 22002 still applies for internal ac­cess.

 

Delay between requests for a sign of life

Default: 120 seconds

Values from 0 to 3600 seconds can be set. Positive values in­dicate that the mGuard is sending a request to the peer within the encrypted SSH connection to find out whether it can still be accessed. This request is sent if no activity was detected from the peer for the specified number of seconds (e.g., due to net­work traffic within the encrypted connection).

The value entered here relates to the functionality of the en­crypted SSH connection. As long as it is working properly, the SSH connection is not terminated by the mGuard as a result of this setting, even when the user does not perform any actions during this time.

As the number of simultaneously open sessions is limited (see Maximum number of cumulative concurrent sessions for all users), it is important to terminate sessions that have expired.

Therefore, the request for a sign of life is preset to 120 sec­onds for Version 7.4.0 or later. If a maximum of three requests for a sign of life are issued, this causes an expired session to be detected and removed after six minutes.

In previous versions, the preset was “0”. This means that no requests for a sign of life are sent.

Please note that sign of life requests generate additional traf­fic.

 

Maximum number of missing signs of life

Specifies the maximum number of times a sign of life request to the peer may remain unanswered. For example, if a sign of life request should be made every 15 seconds and this value is set to 3, the SEC-Stick client connection is deleted if a sign of life is not detected after approximately 45 seconds.

 

Allow SEC-Stick for­warding into VPN tun­nel

Allows SSH connections to be forwarded in a VPN tunnel (Hub & Spoke).

Concurrent Session Limits

The number of simultaneous sessions is limited for SEC-Stick connections. Approxi­mately 0.5 MB of memory are required for each session to ensure the maximum level of security.

The restriction does not affect existing sessions; it only affects newly established connec­tions.

 

Maximum number of cumulative concur­rent sessions for all users

0 to 2147483647

Specifies the number of connections that are permitted for all users simultaneously. When “0” is set, no session is permitted.

 

Maximum number of concurrent sessions for one user

0 to 2147483647

Specifies the number of connections that are permitted for one user simultaneously. When “0” is set, no session is permitted.

Allowed Networks

Lists the firewall rules that have been set up for SEC-Stick remote access

 

If multiple firewall rules are defined, these are queried starting from the top of the list of entries until an appropriate rule is found. This rule is then applied. If the list of rules con­tains further subsequent rules that could also apply, these rules are ignored.
The rules specified here only take effect if the Enable SSH remote access function has been activated. Access via Internal is also possible if this function is deactivated. A firewall rule that would deny access via Internal does therefore not apply in this case.

Multiple rules can be specified.

 

From IP

Enter the address of the computer/network from which access is permitted or forbidden in this field.

IP address: 0.0.0.0/0 means all addresses. To specify an ad­dress area, use CIDR format (see “CIDR (Classless Inter-Do­main Routing)” on page 29).

 

Interface

Internal / External / External 2 / DMZ / VPN / GRE / Dial-in1

Specifies to which interface the rule should apply.

If no rules are set or if no rule applies, the following default set­tings apply:

SEC-Stick remote access is permitted via Internal, DMZ, VPN, and Dial-in.

Access via External, External 2, and GRE is denied.

Specify the access options according to your requirements.

Section1200612.jpg

 

Action

Accept means that the data packets may pass through.

Reject means that the data packets are sent back and the sender is informed of their rejection. (In Stealth mode, Reject has the same effect as Drop.)

Drop means that the data packets are not permitted to pass through. They are discarded, which means that the sender is not informed of their whereabouts.

Name of rule sets, if defined. When a name is specified for rule sets, the firewall rules saved under this name take effect (see Rule Records tab page).

Section1200614.jpg

 

Comment

Freely selectable comment for this rule.

 

Log

For each individual firewall rule, you can specify whether the use of the rule:

Should be logged – set Log to Yes 

Should not be logged – set Log to No (default setting)

1External 2 and Dial-in are only for devices with a serial interface (see “Network >> Interfaces” on page 131).

12.2Connections

SEC-Stick_Verbindungen_01.png

SEC-Stick >> Connections >> SEC-Stick Connections

SEC-Stick Connections

List of defined SEC-Stick connections.

Section1200616.jpg

 

Enabled

To use a defined SEC-Stick connection, the Enabled option must be activated.

 

User name

An SEC-Stick connection with a uniquely assigned user name must be defined for every owner of an SEC-Stick who has au­thorized access. This user name is used to uniquely identify the defined connections.

 

A descriptive name of the user

Name of the person.

 

Company

Name of the company.

 

The following page appears when you click on the ic_mode_edit_black_48dp_2x.png Edit Row icon:

SEC-Stick_Global_Verbindungen_EDIT_Allgemein.png

 

General

Enabled

As above

 

User name

As above

 

Comment

Optional comment text.

 

Contact

Optional comment text.

 

A descriptive name of the user

Optional: name of the person (repeated)

 

Company

Optional: as above

 

SSH public key (including ssh-dss or ssh-rsa)

Enter the SSH public key belonging to the SEC-Stick in ASCII format in this field. The secret equivalent is stored on the SEC-Stick.

SSH Port Forwarding

List of allowed access and SSH port forwarding relating to the SEC-Stick of the corre­sponding user.

 

IP

IP address of the computer to which access is enabled.

 

Port

Port number to be used when accessing the computer.

SSH Remote Port Forward­ing

Port

Port that is used for SSH remote port forwarding.