- Operations Log also shows the status of the UTM profiles
- Operations updated with new function Schedule one-time update
- USC profiles for a UTM must be explicitly permitted (v12.6.1)
- Note on two-factor authentication (v12.6.0)
- Cluster licenses can now also be managed in the USC (v12.6.0)
- Updated to Redesign of the webinterface
Requirements
- At least version 12.2 is required
- A user account from the Reseller Portal is required.
In order to also be able to make changes, it is necessary to link the user access when logging into the Unified Security Portal for the first time. - The license must be clearly assignable to a UTM
- Cluster licenses must be reloaded from the reseller portal and assigned separately to the master or spare so that they are unique in the USC. notemptyNew as of: 12.6.2
- Cluster licenses must be reloaded from the reseller portal and assigned separately to the master or spare so that they are unique in the USC. notempty
- The UTM must have access via https to the Unified Security infrastructure
(Exception: The function Security Scan)
No connection is established from outside to the UTM
The UTM logs itself into the Unified Security Portal and retrieves configuration changes and commands.
The settings in the portal are therefore not executed in real time, but with a small delay.
Preparations
Enabling the control via the Unified Security Console
In order for both cluster members to be assigned to each other, special new licenses must be registered on both devices.
To do this, two licenses must be downloaded from the reseller portal.
If no license is marked as xynnnnn-SPARE in the reseller portal (matching licenses have an identical color marking on the left side of the table), please send an email to lizenzen@securepoint.de with customer name, customer number and the serial numbers of the devices or, in the case of VMs, with the license ID.
Access by then Unified Security Console must first be enabled in the UTM itself in the menu
The UTM reports to the license server after the update. Here, the availability of the service is indicated and the menu is activated.
The process can be shortened by executing the command system restrictions update on the CLI after a few minutes of runtime (the UTM must have had the opportunity to report to the license server!).
Caption | Value | Description | |
---|---|---|---|
Privacy Policy: | Yes | The privacy policy must be accepted | |
Activated: | Yes | This activates the Unified Security Console - and thus the display, configuration and access via the Securepoint Unified Security portal. | |
Apply USC profiles: notempty New as of: v.12.6.2 |
Yes | USC profiles can only be used for this UTM after activation | |
Authentication method: | Authentication method for a web session | ||
PIN: | •••••••• | As authentication for a web session, a 6-digit PIN can be selected instead of the login mask with access data.
| |
Displays the Websession PIN | |||
Creates a new PIN | |||
The entered PIN is incorrect | After 5 incorrect entries in a row, access is blocked. The block is only lifted again after correct login directly at the admin interface. | ||
Actions that can only be executed with a PIN:
| |||
USC in the portal
Note on Two-Factor Authentication
Two-factor authentication must be activated by then.
Activation of two-factor authentication
The activation of two-factor authentication depends on the type of user account:
- If the user account is linked to the reseller portal and the RSP label is visible on the user account, two-factor authentication is activated via the Resellerportal
- The wiki article Reseller Portal User Management describes the activation process of the two-factor authentication TOTP
- If the user account only exists in the portal, it is activated via User options reset password
- A redirection to the necessary 2FA activation takes place via the button in the information banner
Login to the portal
Only a few steps are necessary for end customers to log into the portal:
- Assign the × admin role to an user in the customer's tenant.
The permissions will then be assigned automatically.
If necessary, create a new user as described in User Management. - Call up the login page for the Securepoint Mobile Security Portal.
- Selection of the option Login with Securepoint Unified Security account
- Login with
can be found as part of the URL behind the word tenant. https://portal.securepoint.cloud/…-tenant-123456.sms-… → 123456.sms | |
Password forgotten? notempty New as of: 1.24 |
This link opens a dialog that allows you to reset the password. A password reset email will be sent to the user. |
No information about other customers of the reseller can be viewed.
Two-factor authentication
Call USC
The Unified Security Console is accessed via the Securepoint Unified Security Portal at https://portal.securepoint.cloud
Clicking on the device tile opens the device details.
Securepoint recommends assigning a unique name according to a clear structure.
Status Overview
Show status in tile overview:
Status | Description |
---|---|
Connected | The UTM can reach the USC portal |
Disconnected | The portal does not receive a message from the UTM |
USC active | Is active if the Unified Security Console service is enabled on the UTM in the menu. |
USR active | Unified Security Report is configured and is sent out |
Update available | There is an update on the UTM that can be installed |
Update highly recommended | There is a security update that should be installed immediately! |
Cluster a1b2 | Device belongs to a cluster license. The ID can be used to clearly identify cluster licenses that belong together. The hex number corresponds to the first 4 digits of the license_cluster_id, which can be found with the CLI command system info |
Detail display
The detail display provides an overview of the most important states and messages for the UTM:
- Hardware and software of the UTM
- Messages from the Unified Security Report (if this option has been booked in the Reseller Portal)
- An overview with information about the hardware status:
- Memory usage
- CPU utilization
- Hard disk space used
- Details on upgrade / rollback options
- Display of the device location on a map (manual collection, no tracking)
- License information
- Information from the reseller portal about the company assigned to the license
OperationsOperations | |||||||||||||||
Device | |||||||||||||||
Action | Description |
| |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reboot PIN recommended | Performs a restart of the UTM | ||||||||||||||
Shut down PIN recommended | Shuts down the UTM | ||||||||||||||
Firmware | |||||||||||||||
Restore factory settings PIN recommended | Restores the factory settings | ||||||||||||||
Rollback to version 12.x.y | Performs a rollback to the previously installed version | ||||||||||||||
Plan a one-time update notempty New as of: 1.23.1 |
A one-time firmware update can be planned Regular updates can be configured in the UTM profiles. This Wiki article describes this configuration | ||||||||||||||
ClusterCluster notemptyNew as of v12.6
| |||||||||||||||
Information on the cluster: Cluster-UUID, Status, Cluster-Version (Firmware version of the cluster partner), Synchronization status und License serial number Click on Go to other cluster UTM to go to the other cluster partner. In order for both cluster members to be assigned to each other, special new licenses must be registered on both devices. Menu Button To do this, two licenses must be downloaded from the reseller portal. If no license is marked as xynnnnn-SPARE in the reseller portal (matching licenses have an identical color marking on the left side of the table), please send an email to lizenzen@securepoint.de with customer name, customer number and the serial numbers of the devices or, in the case of VMs, with the license ID. |
|||||||||||||||
WebsessionWebsession | |||||||||||||||
Start new websession | Opens the dialog to start the administrative web interface of the UTM | ||||||||||||||
Websession with UTM up to v12.5.0notempty An update to the latest version is recommended
| |||||||||||||||
Web session with PIN notempty
Websession with PIN (UTM from v12.5.1) | |||||||||||||||
User | admin If there is no user with the name admin, a user with admin rights can be selected here with whom the web session connection is to be started.
|
||||||||||||||
PIN: |
_ _ _ _ _ _ Websession PIN (Configured on the UTM in the menu in the Unified Security Console section
After entering the PIN, the web session can be started directly using ↵ Enter. | ||||||||||||||
The entered PIN is incorrect After 5 incorrect entries in a row, access is blocked.
The block is only lifted again after correct login directly at the admin interface. | |||||||||||||||
Start new websession | Opens the admin interface of the UTM in a new tab of the used browser | ||||||||||||||
Web session with login screen notempty
Web session with login screen (UTM from v12.5.1) | |||||||||||||||
The connection is established via the interface on which the default route of the UTM is set up. | |||||||||||||||
As the web session PIN is deactivated, no automatic login can take place. Access data (user name and password) are required. | |||||||||||||||
Start new websession | Opens the admin interface of the UTM in a new tab of the used browser | ||||||||||||||
Cloud backupCloud backup | |||||||||||||||
Indication of the following values:
|
|||||||||||||||
Download | Downloads the backup locally | ||||||||||||||
Restore PIN recommended | Restores the selected configuration. In the configuration management in the admin interface of the UTM, this can then be set as the active or start configuration. | ||||||||||||||
Delete | Deletes the configuration backup | ||||||||||||||
Operations | |||||||||||||||
Opens a dialog for creating a new password | |||||||||||||||
Creates a configuration backup | |||||||||||||||
ApplicationsApplicationsShows the status of the applications on the UTM with possible actions. The chart can be sorted by application name or status by clicking on the respective column. | |||||||||||||||
Status DOWN | The application is not active | ||||||||||||||
Status UP | The application is active | ||||||||||||||
Status N/A | The application is not available on this UTM | ||||||||||||||
Start | Starts the application | ||||||||||||||
Restart | Stops the application and performs a restart | ||||||||||||||
Stop | Stops the application | ||||||||||||||
StatusStatus | |||||||||||||||
Shows utilization and consumption in the course of time for
|
|||||||||||||||
Operations logOperations log | |||||||||||||||
Log of the communication between UTM and the Unified Security infrastructure notempty New as of: 1.23.1 The status of the transmitted UTM profiles is also logged here |
|||||||||||||||
Time | Shows the date and time at which the job is executed | ||||||||||||||
Job | Displays the job that is being executed | ||||||||||||||
Profile notempty New as of: 1.23.1 |
Displays the UTM Profiles on which the job is being performed | ||||||||||||||
Direction | Indicates the direction of communication
| ||||||||||||||
Status | Displays the status of the executed job
| ||||||||||||||
Info | Displays further information on the transmitted job. If an error has occurred, the type of error is described here. | ||||||||||||||
Operations | Operations displayed here can be executed | ||||||||||||||
Security ScanSecurity Scan | |||||||||||||||
Start new scan | Starts the port scan dialog | ||||||||||||||
IP address | 192.0.2.192 Public IP address to be scanned. If multiple interfaces with public IP addresses that can be reached from outside are identified, a separate result can be displayed for each interface. | ||||||||||||||
Profile Securepoint TOP 100 (TCP) |
Clicking on the profile entry shows the list of ports that are scanned with applications and services that usually use that port. | ||||||||||||||
Show details | Displays open ports and applications and services that usually use them. | ||||||||||||||
InventoryInventory | |||||||||||||||
Here you can save information about the device and (for devices with SIM card) the contract:
|
|||||||||||||||