Create Ecosystem and Import Users
Goal
The first goal to achieve is to import users to Acreto so that they can start working inside the ecosystem. We need to create the Ecosystem, connect Identity Provider, and onboard users with their devices - all steps have been described below.
Prerequisite
To complete this procedure you should:
- Have an active Acreto account (How to register)
- Have knowledge about Identity Provider (IDP) used in your company - the checklist placed below may be helpful to collect the required information.
- At last one test device (computer or phone) and access to account existing in IDP.
Checklist 1: Identity Provider (IDP)
- Select user authentication server and write down the following information
- Decide on the user authentication server / identity provider to user: Okta, Azure Active Directory, Windows Server AD, LDAP
- Domain name (yourcompany.com):__________________
- Address of Authentication server (IP or FQDN) :__________________
- Write down User Base DN, Group Base DN (i.e. ou=users, dc=dev-209171, dc=okta, dc=com) : __________________
- Username / Password to authenticate against Identity provider: /
- Decide on the list of initial 10 users to invite to participate in Acreto VPN solution if you like to take a phased approach
Configuration
In the context of our use case, we will use Microsoft Azure Active Directory with 10 Users and a sample Ecosystem.
To import and onboard Users:
- Log in to Acreto Wedge.
- Create a new Ecosystem named “remote users” or use existing ones.
- Integrate into your Identity Provider Service (Okta, on-premises windows active directory, Azure A/D)
- Connect identity provider with Acreto (configure here)
- Enable optional two-factor authentication on the 3rd party Identify provider. There may be an additional license required for this feature from your identity provider.
- Invite users in A/D to connect to Acreto SASE+
- Select users from the Active directory to receive onboarding emails or manually send the onboarding URL to end-users (see how: How to Invite a User with Onboarding Portal)
- Users visit an onboarding portal found at the bottom section of the identity provider page.
- They will be instructed to download the free OpenVPN client for mobile and laptops
- They will be instructed to download a unique Profile on Laptop/Mobile
- After the last step they can simply connect
- Acreto authenticates users against MSFT Azure A/D with MSFT Authenticator MFA and assigns all users to the “remote-user” role
- Add security Policy
- Add your first policy to turn on full Threat Detection (A/V, IPS, APT, Firewall, on all traffic on “remote-user” role (see how Create Security Policy )
- Confirm connectivity to the Internet and validate threat blocking by visiting http://Wicar.org and confirm all malware is blocked. You can also confirm Adult websites are also blocked.
Goal
We already imported and secured our users - they able to connect to the Ecosystem.
To meet the assumptions of the “Work from Anywhere” idea, it is necessary to provide users with access to the data center and internal services. For this purpose, we will connect the data center with the Ecosystem.
Prerequisite
To complete this procedure you should:
- Have an active Acreto account (How to regiester)
- Finish procedure described in previous article
- Know the Data Center in your company - checklists placed below may be helpful to collect the required information.
Choose Cinnectuin Method
For maximum flexibility Acreto offers three options to connect your datacenters and applications
- Use Acreto provided software virtual gateway (vGateway) installed on a KVM or ESX virtual machine
- Use your existing branch office equipment such as your existing Cisco router, or existing firewall
- For IoT/OT/Kiosks we provide the image for a 2 port IoT gateway (e.g. RaspberryPi)
Checklist 2: Datacenter Service Connection using vGateway
This checklist includes information to connect Acreto to your internal Datacenter for private application access
Acreto Virtual Gateway method behind datacenter Firewall:
- Select a machine to run Acreto vGateway (Virtual Appliance, i.e. Hyper-V, VMware ESXi, Proxmox, OpenStack)
- Confirm Machine has access to both WAN and DataCenter LAN (setup default gateway)
- Provide an IP address for vGateway for LAN (Local Network) connection: _ _ . _ . _ . _ _ / 24
- Provide a Gateway for vGateway for LAN (Local Network) connection: _ _ . _ . _ . _ _ / 32
- Provide an IP address for vGateway for WAN connection: _ _ . _ . _ . _ _ / 24
- Provide a Gateway for vGateway for WAN connection: _ _ . _ . _ . _ _ / 32
- Provide Network IP address and Netmask for all the networks you want to connect with Acreto: _ _ . _ . _ . _ _ / _ _ _
Checklist 3: Datacenter Service Connection and Branch using existing Firewall/VPN
This checklist includes information to connect Acreto to your internal Datacenter using the existing firewall/VPN gateway
- 3rd party Firewall/VPN in Datacenter for each branch location
- Confirm existing firewall/VPN/router supports IPSEC
- Have the login and password to your existing router or firewall handy: /_
- Have the manual for your existing firewall or router handy with how to build IPSEC tunnels
- Have the existing IP address for LAN (Local Network) connection: _ _ . _ . _ . _ _ / 24
- Provide a Gateway for way for LAN (Local Network) connection: _ _ . _ . _ . _ _ /24
- Repeat this process for each branch office location
- Select user authentication server and write down the following information
- Decide on the user authentication server / identity provider to user: Okta, Azure Active Directory, Windows Server AD, LDAP
- Domain name (yourcompany.com):__________________
- Address of Authentication server (IP or FQDN) :__________________
- Write down User Base DN, Group Base DN (i.e. ou=users, dc=dev-209171, dc=okta, dc=com) : __________________
- Username / Password to authenticate against Identity provider: /
- Decide on the list of initial 10 users to invite to participate in Acreto VPN solution if you like to take a phased approach
Configuration
Using the checklist above connect Acreto your Datacenters to Acreto via IPSEC (vGateway or existing HW). The below procedure shows how to do it using the Raspberry device as a vGateway.
It’s not the only method to reach the goal, other possibilities have been described here. As an alternative, you may use your existing branch office equipment such as your existing Cisco router, or existing firewall.
The following procedure is a summary of Linux - Automatic IPsec Configuration article - which you may want to ready if you want to know more.
To connect your Datacenter/Branch Office to Acreto:
Create new Gateway on Acreto WEDGE
- Log in to the Acreto Portal at wedge.acreto.net
- Select your ecosystem and go to Objects using the left menu.
- Click Add new Object and select Gateway.
- Fill at least:
1. Name: the name of the gateway
1. Category: IoT
1. vGateway make sure that in the right top corner Gateway is selected
1. DHCP/Static: Select DHCP
1. vGateway Local IP: IP address of RaspberryPi device in your LAN, i.e
192.168.200.1/24
1. Local Networks: - your local network addresses that should be routed through this gateway
- Save the created Gateway by pressing Add.
- Add a security policy that will allow communication from the Gateway device to the Internet.
- Commit pending changes (top of the screen)
Tip
To simplify testing, add IP addresses of all interfaces connected to your gateway as Local Networks (you can use /32 prefix for public interface). This will allow testing connectivity from the gateway through Acreto using ping, traceroute, and similar tools.
Note
To successfully test your connectivity, you also need to create a security policy that will allow traffic to go through your device.
Generate Raspberry Pi vGateway Image
To proceed with this step you should have at last one Gateway configured as vGateway in your Ecosystem. From the left menu choose Objects > Gateways to display the list of existing gateways.
To generate an image with the configuration for Raspberry Pi you need to:
- Click on the vGateway name, gear ⚙ icon, or “i” button on the vGateway panel - the details panel will appear.
- On the right side of the gateway details panel click on IoT Hardware Images images to show a list of options to generate images.
- The generation of the image may take a while, please be patient.
- When the image will be ready you may download it or copy the URL - save it on your PC.
Image installation
To proceed with this step you need to have an image file generated by Acreto or URL to the image for your vGateway.
To install the image we need to proceed with flashing the SD card.
-
Download the write_image.sh
script
Click on the button and save the script in your home directory:
Get write_image.sh
or open the terminal and download the script using the command:
wget https://kb.acreto.net/reference-material/downloads/write_image.sh
-
Take your SD card from your Raspberry device
-
Put your SD card into your computer
- Ensure it didn’t mount automatically - if it did, unmount it
-
Use write_image.sh
script to write the image to SD card
-
if you have an image file downloaded locally:
./write_image.sh image-file.zip /dev/sdb
-
if you have want to use the URL of an image directly::
./write_image.sh https://aws1-vgateway-images.s3.amazonaws.com/vgateway-raspberry-pi4.s.nAH2xOL8HyJIK1g8v4HEsNCt.img.zip /dev/sdb
where /dev/sdb
is the location of your SD card
-
Once finished, plug the SD card into your device and log in as:
- login:
acreto
- password:
acreto.io
-
Change your password after the first login
-
Test the network connectivity
More information about checking the connectivity can be found under
Connectivity Check
article where a dedicated tool is available.
Add Logging and Policies
Goal
For better cotroll you may connect Acreto to your internal Syslog Collector - all logs from event will be transferred there.
Based on the logs, you can extend the network rules, for example, those that block excessive network traffic (Youtube)
or the application that are time eaters (Facebook)
Prerequisite
To complete this procedure you should:
- Have an active Acreto account (How to register).
- Finish procedure described in previous step.
- Have knowledge about Syslog used in your company.
Phase 3: Logging and additional policies
- Acreto supports external Syslog (optional)
- Configure Acreto with the IP address of your Syslog Collector for sending logs
- Lockdown access to Office365 and other SaaS applications.
- This feature relies on the capabilities of the SaaS vendor and uses an IP lockdown feature.
For O365 is lockdown feature is called ‘conditional access.’ please follow this article for detailed instructions.
- Add additional security policies as per your organizational needs.
- Block YT/FB policy