LSMS Technical Specifications
2
1.Mode of Operation
Centralizes firewall, virtual firewall, VLAN, VPN and QoS
policy management
Proactively monitors all VPN Firewall Bricks™ and IPSec Client users
Provides real-time monitoring, log collection, reporting and
alarm generation
Supports network-based and premises-based deployments
2.Performance and Capacity
Supports 1,000 customer groups each with hundreds of
unique policies
Manages 1,000 VPN Firewall Bricks™ and 10,000 IPSec
Client users
Centrally collects up to 15,000 log records per second
Supports 100 simultaneous administrators
3.Policy Management
Uses a group-based model to manage a collection of devices,
security policies, VPN tunnels, and user authentication
components as a single entity
Controls policies at the global, customer, device, interface,
VLAN and IP address range level
Includes preconfigured typical security and VPN policy
templates that can be tailored to suit unique requirements
Uses user-definable Host Groups, Service Groups, Application
Filters and User Groups
Supports global and nested policy objects
4.Role-based Administration
Uses two administrative classes:
LSMS Administrators – full privileges over all groups, devices,
policies and users
Group Administrators – restricted privileges and access only
to assigned group(s)
Supports shared administration with customers
Local and remote administration via LSMS Remote Navigator
utility (included); provides secure access to all LSMS utilities
Allows concurrent administrators to exchange messages via a
real-time messenger service
5.Secure 3-Tier Architecture
LSMS to VPN Firewall Brick™ communications secured with
Diffie-Helman and 3DES encryption, SHA-1 authentication and
integrity, and digital certificates for VPN Firewall Brick™ to
LSMS authentication
LSMS Remote Navigator to LSMS communications secured with
3DES encryption and SHA-1 authentication and integrity, and
either local password or external database authentication with
SecurID or RADIUS servers
Transfers logs in real-time over reliable and secured connections
6.Authentication
Built-in internal database – 10,000 users
Browser-based authentication allows authentication of any
user protocol
Local passwords, RADIUS, SecurID, X.509 digital certificates
with Entrust CA PKI
PKI Certificate requests (PKCS 12)
Automatic LDAP certificate retrieval
User assignable RADIUS attributes
7.Remote Access VPN Tunnel Management
Fully integrates remote access VPN support, including Lucent
IPSec Client software distribution and updates
Centralizes management of all IPSec Client configurations,
including personal firewall settings
Allows any combination of authentication methods;
configurable per user, user group or application
Supports virtual addresses for tunnel end points
Allows administrator to terminate specific tunnels when
necessary, or terminate all tunnels in a single action
8.Site-to-Site VPN Tunnel Management
Provides SLA probes for real-time round trip delay statistics and
tunnel status indicators to verify tunnel availability in real-time;
configurable with alarm notifications
Supports virtual addresses for tunnel end points
Configurable tunnel default settings
Includes preconfigured VPN policy templates
Fully integrated with firewall policy
9.High Availability/Redundancy
Supports active/active management with geographically
distributed servers and real-time database replication
Internal database automatically backs up to a local and remote
disk daily; additional backups can be scheduled at any time
Backup file contains ALL policy, configuration, and security
information for ALL configured devices and policies
10.Central Staging with Secure Upgrades
Securely pushes the VPN Firewall Brick™ operating system to
each device with no truck-rolls or on-site hardware support;
maintains ALL sessions during an OS upgrade with a failover
pair of VPN Firewall Bricks™
11.Application Programming Interfaces (APIs)
Scriptable command line interface
Parsable ASCII log files (for per-customer reporting)
Supports SNMP GET v2c (read-only) and SNMP traps v1 and v2c
12.Audit Log Management
Four categories of audit logs created daily:
Firewall Session Logs
Administrative Event Logs
User Authentication Logs
Proactive Monitoring Statistic Logs
Real time logs viewable with Log Viewer; historical logs
viewable with Log Viewer or Reporting System (see below).
Log viewing and manipulation follows administrative
permissions model
Configurable log file disk management
Automated log scheduling and forwarding for post-processing
13.Real-time Log Viewer
Displays log records as received from all VPN Firewall Bricks™;
messages can be filtered, sorted and highlighted
Includes historical record search capabilities with specified
time parameters