CyberArmor is a really excellent personal firewall. The CyberArmor suite consists of a Policy Server (and Policy Manager) used to create policies, a CyberServer (used to capture logs and alarms, optional), a Secure Ping Server (optional) and an MSDE back-end. More information can be found at http://www.infoexpress.com/security_products/firewall_overview.php
The product runs on Windows platforms and allows for centralized management (including updating rulesets) of personal firewalls. The nice thing about CyberArmor is that it allows a lot of flexibility in terms of determining where a computer is located, and the ability to apply different rulesets based on the location. This location awareness is the core foundation of the tool, and goes much further than the location awareness found in products such as Symantec or Microsoft. Futhermore, the tool does not only block or allow traffic based on rules, but it also contains application filtering, and intrusion prevention.
You’ll need a Windows server (2003 R2 in my case), with IIS installed. You’ll need a web server certificate (but you can generate a certificate with SelfSSL from the IIS resource kit if you don’t have access to a CA).
Before you begin, make sure NOT to put the server in a domain. CyberArmor suite 3.5 doesn’t support servers that are member of a domain, so make sure not to put in in a domain. Ever.
Second, make sure to turn off DEP. Edit the boot.ini of the server and change /noexecute=optin to /noexecute=AlwaysOff
Reboot before you start installing.
In my environment, the installation of CyberArmor Suite 3.5 failed on Windows 2003 R2, so I had to install 3.2 and then upgraded to 3.5, which did the trick just fine.
The installation for both 3.2 and 3.5 goes as follows :
Now do the same for CyberArmor Suite v3.5
Once you have v3.5 installed, log on to the policy manager. You’ll see the 3 default End User Systems. If you are installing a new system, the first thing you should do now is create a Region and bind a End User System to a region (or create a new end user system and bind it to a region). You’ll have to "check out" before you can modify settings. Don’t forget to check in again when you have finished editing. When you have created the policies and tested the policy, you can deploy a new policy. This will create a folder under c:\inetpub\wwwroot\cyberarmor containing the current date/time of deployment, the region, the end user system, and then the installation packages. You can install new clients using pcainst.exe (Win2K/XP) or pcamsiinst.exe (Vista) from this folder. Once the clients have been installed (and when you’ve configured automatic updates), your clients will automatically pull down updates when new versions have been deployed.
That’s it – in a nutshell.
When you are installing a new CyberArmor server and you want to import the settings from another machine (because of a migration, or disaster recovery), this is what you should do
When the import has completed, you should now see the Region and End User system that was created on the old machine.
Next, "check out" and go to "Rules" – "Others"
Edit the "group" variable, remove the hash, and replace the hash with <? echo "$GROUP\r\n"; ?>
Check in again, save the changes, and you are now ready to deploy again.
Note on deploying : You’ll see various "Engine" versions in the deploy window. This is what these versions mean : Pre 3.5 Clients : – R = Regular Engine (will require reboot before upgrade takes place) – NB = No Boot Version – NC = No Encryption Version – B = Big Version support – S = SSL Version
3.5 and later clients : – ST = Standard Client, does not require user intervention – V = Verbose Client, requires user interaction.
In my opinion, the ST version is the way to go.
If you have questions on how to create policies or set up the location awareness, drop me an email at peter.ve@telenet.be
Tags:
© Corelan Consulting BV. All rights reserved. The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission. See the Terms of Use and Privacy Policy for details.