Configuring Access Control Service Trustzones

Configuring Access Control Service Trustzones

Each Access Control service is assigned to a trustzone. All Access Control Services within the same trustzone share the same set of security policies and signing key, so that the trust relationship can be established. Each trustzone contains three policy rulesets:

  • Local Machine – Used to determine a policy for a connecting machine. A connecting machine is an endpoint system that does not request user authentication.

  • Current User – Used for policy matching when the connecting client requests user authentication.

  • VPN – Adopted if an intermittent VPN service mediates the connection attempt.

Each policy ruleset contains policy rules that are processed from top to bottom. The policy set in the first matching rule is executed. If none of the rules match, the no-rule-exception policy is applied. The client is then considered to be untrusted. 

To prevent the status of clients from being 'untrusted' due to missing policies, you must define a 'catch-all' policy rule and assign a rule set in that rule. This will allow you to receive more information on the client health state and also enable server-side visualization.

Each policy rule consists of three parts:

  • Identity Matching – An identity-related part that defines the applicable matching policy and criteria.

  • Required Health State – A health policy part is used to determine the health state by comparing the status information sent by the client with the specified required status. There are only three health states: healthy, unhealthy, and untrusted.

  • Policy Assignments – Contains firewall rule sets, messages, pictures, and network access policies that are assigned to a healthy client.

Trustzones can be created on a stand-alone CloudGen Firewall or in a global-, range-, or cluster-level configuration in the Control Center.

Create a Policy Rule

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > Access Control Service > Access Control Service Trustzone.

  2. Click Lock 

  3. Click on the Local Machine, VPN, or Current User tab to select the ruleset the policy rule is created in.

  4. Right-click in the main area and select Add. The Create Policy Rule window opens.

  5. Configure Identity Matching:

    1. Enter a Policy Name.

    2. Configure Basic Matching:

      • Client Connection

        •  

          • External – Effects that this policy rule is ignored for internal connections (connections to an IP address not defined in Access Control Service Settings > System Health-Validator > External IPs).

          • Ignore – Means that the policy rule is neither ignored for internal nor external connections.

          • Internal – Effects that this policy rule is ignored for external connections (connections to an IP address defined in Access Control Service Settings > System Health-Validator > External IPs).

      • Time Restriction –  Each policy rule can be assigned with a date and time restriction. The date restriction consists of a Start Date and an End Date. Outside that time period, this policy rule will be ignored. The granularity of the time restriction is 1 hour on a weekly base. A rule is allowed at all times by default; that is, all check boxes in the Time Interval window are cleared. Selecting a check box denies a rule for the given time.

        • Click the respective icon to configure allowed and disallowed time intervals simultaneously.

        • Click the respective icon to clear selected check boxes.

        • Click the respective icon to configure disallowed time intervals.

      • Select Continue if Mismatch to proceed the health evaluation within the policy ruleset with the next rule (default).
        Select Block if Mismatch to stop the health evaluation process and set the client to "unhealthy" immediately.

    3. Configure Policy Matching settings:

      • Policy Matching – Set this to All-of-following if all of the identity-matching parameters (basic and advanced), except the empty ones, must match for a successful identity verification. If just one field does not match, the identity is not verified successfully within this policy rule and the health match process will proceed with the next policy rule in the policy ruleset. Set this to One-of-following to let the identity verification succeed if just one field matches.

        For the pattern to match, at least one user group must match at least one defined group pattern.

      • Group Patterns – At least one user group must match at least one of these patterns for successful identity verification. Ensure that you are using the accurate syntax for the group patterns. For example, MSAD groups must be entered as distinguished name as follows: CN=group-*, OU=my-unit,CD=mycompany,DC=at

      • Allowed Client Versions

        • Version – Select one of the listed Microsoft Windows Versions. The minimum build number must be the OS build number and is checked only if Policy on Client is set to This major version, ignore minor.

        • Policy – Select whether you want to allow or deny the selected version.

      • Possible values for Policy on Client are:

        • Exactly this one – The client OS must match the selected version and service pack number.

        • Explicitly deny this version – If the client OS matches the selected version, the current policy rule will be ignored for the current match, and health evaluation processing proceeds with the next policy rule in the policy ruleset.

        • This major version, ignore minor – The client OS must be identically equal to the selected client version. The service pack, if selected, must be equal to or greater than defined.

           

    4. (optional) In the Identity section of the left menu, click Advanced and configure the following settings:

      • Advanced Identity Matching

        • MAC Addresses – Patterns may be used.

        • Microsoft Machine SIDs – A SID is a globally unique machine identifier generated by Microsoft operating systems. It is visualized in the Access Control Server’s access cache. Patterns may be used.

      • Certificate Conditions

        • x509 Subject – The X.509 subject of the client's authentication certificate must match at least one of these patterns. For example: CN=name-*, O=my-company

        • x509 Issuer – The subject of the issuer of the client's certificate must match at least one of these patterns. For example: CN=name-*, O=my-company

        • x509 Altnames – The subject alternative name of the client's authentication certificate must match at least one of these patterns. For example: IP:10.0.10.*

      • Allowed OS Versions

        • OS Versions – Must be one of the listed Microsoft Windows Versions.

        • OS Version / Service Pack Major Number – Select the version and service pack major number if applicable.

        • OS Version / Service Pack Minor Number – Select the version and service pack minor number if applicable.

        • Minimum Build Number – Must be the OS build number and is checked only if Policy on OS is set to This major version, ignore minor.

        • OS Product Type – Select the OS platform if applicable.

        • Platform – Select Client or Server (explicit).

      • Possible values for Policy on OS are:

        • Exactly this one – The client OS must match OS Versions, Service Pack Major Number, and Service Pack Minor Number.

        • Explicitly deny this version – If the client OS matches OS Versions, Service Pack Major Number, and Service Pack Minor Number, the current policy rule will be ignored for the current match, and health evaluation processing  proceeds with the next policy rule in the policy ruleset.

        • This major version, ignore minor – The client OS must be identically equal to OS Versions. The client Service Pack Major Number and Service Pack Minor Number need to be equal to or greater than those defined here.

  6. Configure Required Health State criteria:

    1. Configure Service Settings:

      • Personal Firewall On

        • Required

        • Required <Auto-Remediation>

        • Not Required (default) – Set to Required if a client must have the Personal Firewall up and running to be healthy. If the client does not meet this requirement, the user will be advised to turn on the firewall.

      • Continue Match

        • STOP on Health Mismatch (default)

        • Continue on Health Mismatch

          Set this to Continue on Health Mismatch if the health validation should continue with the next policy rule in the policy ruleset in cases where the health evaluation in the current rule returned that the client is not healthy.
          Set this to STOP on Health Mismatch if health validation should not continue with the next policy rule in the policy ruleset if the client is not healthy. In this case, the policy attributes of the current rule are assigned to the client and the client is advised to heal itself.

      • Registry Check Rules – Select a registry check object. The client’s registry entries must match those of the selected registry check object to be healthy.

      • Windows Security Center Settings – Select which Windows Security Center states to query.

      • Allowed Health Suite – Select the client OS Version and Policy. For more information, see the above Identity section.

      • Required Security Updates –  Click + to add IDs for the required Microsoft hotfixes in KB123456 format.

  7. Configure Policy Assignments:

    • Configure the Policy Assignment Attributes:

      • Personal Firewall Settings

        • Ruleset Name – Select one of the created Personal Firewall Rule objects. If the client does not already have this ruleset installed, the health state will be set to a value other than healthy and the client will be advised to update the personal firewall ruleset from the remediation server. Implicit policy roles are: unhealthy, healthy, probationand untrusted

      • Client Action Attributes – Select one of the created Welcome Message objects. If the client does not already have this message, it will be advised to get the message from the remediation server.

        • Limited Access

        • Ruleset Name

        • Message

        • Client Emerg. Quarantine Time (s)

        • Configure the quarantine ruleset. Assignment of Limited Access rulesets and messages is only available for the Local Machine ruleset.

      • Policy Roles – Add implicit policy rolesFor more information, see Example - Barracuda Network Access Client Configuration in the NAC Client documentation.

    • (optional) Configure Policy Assignment Exceptions:

    • Software Update Required

      • Yes

      • No (default)

      • Yes-Even-Major
        Change this to Yes for the client to automatically perform software updates if a new software minor version is available on the CC.
        Yes-Even-Major will cause the client to also perform major version updates.

    • User Authentication Required

      • Yes

      • No

      • Like Service Settings (default)
        Only available for the local machine ruleset. If this is set to No, user authentication is not performed even if a user logs in.

  8. Click OK.

  9. Click Send Changes and Activate.