Network Configuration

To implement a secure ActivID CMS system, it is important that you understand the communication dependencies between ActivID CMS and other components within the overall network system. The following figure illustrates the recommended ActivID CMS network deployment and the typical communication flows.

Recommended ActivID CMS Network Deployment

Recommended ActivID CMS Network Deployment

ActivID CMS network deployment can mean a configuration that requires connectivity with a variety of external components. The requirement for the ActivID CMS systems to be connected to and accessed by network devices and clients also potentially makes them vulnerable to various cyber-attacks to the hardware and software required to run the ActivID CMS server and services.

The best way to protect the ActivID CMS system(s) and the related dependent entities from network-based cyber-attacks requires a layered approach that is based upon the Open System Interconnection (OSI) model, which consists of 7 layers.  The layers relevant to the network communication are Layer 2 to Layer 4, specifically the Data Link, Network, and Transport layers. The following figure illustrates the 7 layers of the OSI model.

OSI Model Layers

A detailed explanation of the OSI model is beyond the scope of this documentation and the illustration of the OSI model is included for reference purposes only. HID Global assumes that the reader possesses an in-depth knowledge of the 7 layers or has access to other reference sources for this material.

Recommendations

The following are network configuration-related recommendations:

  • To prevent Layer 2 attacks, devices that are located on the same IP network should be unable to communicate with each other using the Data Link Layer. A separate network should be used for the ActivID CMS server and this network should be separated both physically and logically from any other device. 

  • In some network environments, the previously suggested level of separation is neither practical nor feasible. In such cases, the ActivID CMS server should be protected at the Data Link Layer by using private Virtual Local Area Networks (VLANs). By using private VLANs (PVLANs) or by using a separate physical network forces all communications to be routed, and thus pass through a Layer 3 device (such as a router, firewall, or a Layer 3 switch).

Note: Standard network switches operate at the Layer 2 level in the OSI model, while a Layer 3 switch is a high-performance device that performs network routing and can support the same routing protocols as network routers do
  • Every device on the network infrastructure should be configured with Access Control Lists (ACLs), including switches, firewalls, and routers. ACLs can be customized to adapt to the environment in which they are used, and should be implemented using the minimum privileges required to perform the desired tasks. The ports required for ActivID CMS communication are listed in the following table.

  • ActivID CMS servers should be deployed with two separate network interfaces—one interface which is made public for ActivID CMS operators and users—and another interface used for connections with back-end components and potential back-up systems.

  • IDS systems should be deployed on both network segments that are connected to the ActivID CMS servers and host-based Intrusion Protection Systems (IPS) should be installed on the ActivID CMS server.

To assist with the network configuration, the following table outlines the network communications that are required to and from the ActivID CMS systems for the following configurations.

Network Communications and Ports

Target

Protocol

Direction

Type

Port

Encryption

Authentication

Operator-based Systems

HTTPS

Inbound

TCP

Configurable

TLS

Mutual PKI

Client-based Systems

HTTPS

Inbound

TCP

Configurable

TLS

Server-based PKI and one additional form factor

Client-based Smartphones

HTTPS

Inbound

TCP

Configurable

TLS

Server-based PKI and Unique server-provided token

Microsoft CA

RPC (remote procedure call)

Outbound

TCP

135 (above 1024, ports are randomly-allocated)

SMB signing and NTLM encryption

Windows authentication

Symantec® / VeriSign® CA

HTTPS

Outbound

TCP

Configurable

TLS

Mutual PKI

Verizon® / UniCERT™ CA

HTTPS

Outbound

TCP

Configurable

TLS

Mutual PKI

OpenTrust®/ Keynectis CA

HTTPS

Outbound

TCP

Configurable

TLS

Mutual PKI

Entrust® CA

EASM

XAP

Outbound

TCP

Configurable/443

TLS

Mutual PKI

Directory

LDAPS

Outbound

TCP

636

TLS

Server-based PKI and LDAP Lightweight Directory Access Protocol PWD

AAA Server

HTTPS

Outbound

TCP

Configurable

TLS

Server-based PKI and AAA PWD

Microsoft SQL Database

JDBC

Outbound

TCP

1433

JDBC

JDBC PWD

Oracle® SQL Database

SQLNET

Outbound

TCP

1521

SQLNET

SQLNET PWD

Email Server

SMTP

Outbound

TCP

25

None

None

Peered ActivID CMS Servers

HTTPS

Bidirectional

TCP

Configurable

TLS

Mutual PKI

CRL Location(s)

HTTP

Outbound

TCP

80

None

None

AIA Location(s)

HTTP

Outbound

TCP

80

None

None

Note: Despite some of these network communications being available both in secure and insecure versions, this table only displays the secure version (for example, LDAP communication is available in LDAP only but the table displays the secure version, LDAPS).