Bluecoat-Proxyswg-6.5.7.6 Opentouchr2.1 Iwr Ed01
Bluecoat-Proxyswg-6.5.7.6 Opentouchr2.1 Iwr Ed01
Bluecoat-Proxyswg-6.5.7.6 Opentouchr2.1 Iwr Ed01
Inter-Working Report
Partner: Blue Coat
Application type: Reverse Proxy
Application name: ProxySWG Virtual Appliance
Alcatel-Lucent Enterprise Platform: OpenTouch
The product and release listed have been tested with the Alcatel-Lucent Enterprise Communication Platform and the
release specified hereinafter. The tests concern only the inter-working between the AAPP members product and the
Alcatel-Lucent Enterprise Communication Platform. The inter-working report is valid until the AAPP members product
issues a new major release of such product (incorporating new features or functionality), or until ALE International issues a
new major release of such Alcatel-Lucent Enterprise product (incorporating new features or functionalities), whichever first
occurs.
ALE INTERNATIONAL MAKES NO REPRESENTATIONS, WARRANTIES OR CONDITIONS WITH RESPECT TO THE
APPLICATION PARTNER PRODUCT. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, ALE
INTERNATIONAL HEREBY EXPRESSLY DISCLAIMS ANY AND ALL REPRESENTATIONS, WARRANTIES OR
CONDITIONS OF ANY NATURE WHATSOEVER AS TO THE AAPP MEMBERS PRODUCT INCLUDING WITHOUT
LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY, NON INFRINGEMENT OR FITNESS FOR A
PARTICULAR PURPOSE AND ALE INTERNATIONAL FURTHER SHALL HAVE NO LIABILITY TO AAPP MEMBER OR
ANY OTHER PARTY ARISING FROM OR RELATED IN ANY MANNER TO THIS CERTIFICATE.
Certification overview
Date of certification
September 2015
Author(s):
Reviewer(s):
Florian Residori
Claire Dechrist
Jana Whitcomb
OpenTouch BE/MS
OT 2.1 (2.1.000.093)
ProxySG V100, SGOS
6.5.7.6 SWG Edition
Security
Gateway
Collaboration & UC
Revision History
Edition 1: creation of the document September 2015
Test results
Passed
Refused
Postponed
Contact name:
Title:
Jana Whitcomb
Managing Director, Global Service Providers
Address:
Zip Code:
City:
Country:
Phone:
Fax:
Mobile Phone:
+1 206-799-2726
Web site:
Email address:
www.bluecoat.com
[email protected]
TABLE OF CONTENTS
1 INTRODUCTION ......................................................................................................................................... 6
1.1 GLOSSARY .................................................................................................................................................. 7
2 VALIDITY OF THE INTERWORKING REPORT .................................................................................. 8
3 LIMITS OF TECHNICAL SUPPORT ........................................................................................................ 9
3.1 CASE OF ADDITIONAL THIRD PARTY APPLICATIONS ................................................................................... 9
4 SUMMARY OF TEST RESULTS ............................................................................................................. 10
4.1 SUMMARY OF THE MAIN FEATURES TESTED................................................................................................. 10
4.2 SUMMARY OF PROBLEMS ........................................................................................................................... 11
4.3 SUMMARY OF LIMITATIONS........................................................................................................................ 11
4.4 NOTES, REMARKS ..................................................................................................................................... 11
5 APPLICATION INFORMATION ............................................................................................................. 12
6 TEST ENVIRONMENT ............................................................................................................................. 14
6.1 TESTS PERFORMED ................................................................................................................................... 14
6.2 GENERAL ARCHITECTURE .......................................................................................................................... 15
6.3 HARDWARE CONFIGURATION ..................................................................................................................... 16
6.4 SOFTWARE CONFIGURATION...................................................................................................................... 16
6.4.1 Alcatel-Lucent EnterpriseCommunication Platform OT ........................................................... 16
6.4.2 Partner Application ....................................................................................................................... 16
7 TEST RESULT TEMPLATE ..................................................................................................................... 17
8 TEST RESULTS .......................................................................................................................................... 18
8.1 CLIENT INITIALIZATION AND AUTHENTICATION .......................................................................................... 18
8.2 OUTGOING CALLS ..................................................................................................................................... 19
8.3 INCOMING CALLS ...................................................................................................................................... 20
8.4 FEATURES DURING CONVERSATION ............................................................................................................ 21
8.5 WEB SERVICES ......................................................................................................................................... 23
8.6 MYTEAMWORK SERVICES ........................................................................................................................... 24
9 APPENDIX A: AAPP MEMBERS APPLICATION DESCRIPTION .................................................. 25
9.1 SECURE WEB GATEWAY WITH THE FLEXIBILITY OF VIRTUALIZATION .............................. 25
10 APPENDIX B: CONFIGURATION REQUIREMENTS OF THE AAPP MEMBERS
APPLICATION .............................................................................................................................................. 27
10.1 IMPORTING A ROOT CA CERTIFICATE ..................................................................................................... 28
10.2 CREATING CERTIFICATE LIST .................................................................................................................. 30
10.3 CREATING A PROXYSG CERTIFICATE ....................................................................................................... 31
10.3.1 Creating ProxySG keyring ......................................................................................................... 31
10.3.2 Creating a Certificate Signing Request .................................................................................... 32
10.3.3 Importing your certificate ......................................................................................................... 33
10.4 CREATING THE PROXY SERVICES ............................................................................................................. 34
10.5 CREATING HTTPS 443 PROXY SERVICE ................................................................................................. 35
10.5.1 Creating HTTPS 443 Proxy Service for LDAP based authentication ............................................ 35
10.5.2 Creating HTTPS 443 Proxy Service for certificate based authentication ...................................... 37
10.6 CREATING HTTPS 8016 PROXY SERVICE ............................................................................................... 39
10.7 CREATING THE FORWARDING HOSTS ...................................................................................................... 41
10.7.1 Host1: OT_443 ........................................................................................................................... 42
10.7.2 Host2: OT_8016 ......................................................................................................................... 43
10.8 CONFIGURING CLIENT EXTERNAL AUTHENTICATION .............................................................................. 44
10.8.1 Configuring LDAP external authentication ................................................................................... 44
10.8.2 Configuring Certificate authentication .......................................................................................... 48
10.9 CREATING POLICY .................................................................................................................................. 52
Alcatel-Lucent Application Partner Program Inter-working report
Copyright 2015 ALE International 2015
10.9.1
10.9.2
10.9.3
10.9.4
10.9.5
1 Introduction
This document is the result of the certification tests performed between the AAPP members
application and Alcatel-Lucent Enterprises platform.
It certifies proper inter-working with the AAPP members application.
Information contained in this document is believed to be accurate and reliable at the time of printing.
However, due to ongoing product improvements and revisions, ALE International cannot guarantee
accuracy of printed material after the date of certification nor can it accept responsibility for errors or
omissions. Updates to this document can be viewed on:
-
1.1 Glossary
API
AAA
CA
DMS
CSR
Certificate Signing Request. This is file generated by a server to get signed by a
CA which will deliver a signed certificate.
DN
Distinguished Name
DNS
EVS
Event server
FQDN
Fully Qualified Domain Name. A domain name that specifies its exact location in
the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels,
including the top-level domain, relative to the root domain. Ex: myhost.mydomain.com
IM
LDAP
Lightweight Directory Access Protocol. This is a directory that can be used as an
authentication server.
OTES
PLMN
PKI
Public Key Infrastructure. It provides digital certificates that can identify an
individual or an organization and directory services that can store and, when necessary,
revoke the certificates.
RP
Reverse Proxy
SBC
SSL TLS
Transport Layer Security (formerly Secure Socket Layer). It allows
client/server applications to communicate across a network in a way designed to prevent
eavesdropping, tampering, and message forgery. TLS provides endpoint authentication and
communications confidentiality over the Internet using cryptography.
Instant Messaging
For details on all cases (3 party application certified or not, request outside the scope of this IWR,
etc.), please refer to Appendix F AAPP Escalation Process.
Feature
N/A
OK
OK
But
NOK
5 Application information
Application commercial name:
Application version:
Interface type:
Blue Coat ProxySG appliances offer a comprehensive foundation for the Blue Coat Secure Web
Gateway solution and advanced WAN Optimization feature sets. ProxySG appliances combine highperformance hardware with Blue Coat SGOS, a custom, object-based operating system that enables
flexible policy control over content, users, applications and protocols.Blue Coat ProxySG appliances
enable enterprise customers to:
Protect internal users and networks from spyware and other attacks.
Accelerate application performance for files, email, Web, SSL, and rich media applications.
Intranet Portal
Software Distribution
Secure Custom OS
Fast end user Response
Easily Manageable/Scalable Solution
SSL Termination
SSO
The following list details the Blue Coat ProxySG Reverse Proxy Deployment features that are
used for the Alcatel-Lucent solution deployment:
The following diagram describes a typical redirection policy implemented on the Blue Coat ProxySG
for the Alcatel-Lucent solution.
6 Test environment
6.1 Tests performed
This document describes the tests of homeworker scenario using Blue Coat ProxySG and
Opentouch client applications in the context of OT solution
Blue Coat ProxySG has been virtualized on Vmware eSXI 5.1 environment.
Clients tested in this report are:
For OT users:
OTCV PC
OTCV iPad
OTCV iPhone
OTCV Android smartphone
OTCV Android tablet
For OXE users:
OTCT PC
OTCT iPhone
OTCT Android
OpenTouch PC clients use an internet connection on the WAN. Remote user is connected to the
enterprise network through the RP in HTTPS and to a SBC in SIP without media encryption.
OpenTouch users have several devices: at least an OTCv PC or OTCv Android smartphone and a
SIP desktop phone (8088).
The way to configure OpenTouch server, OpenTouch clients and BlueCoat ProxySG is described in
the Appendix.
OpenTouch clients send web requests to OT server through Blue Coat reverse proxy which forwards
the requests to the OT OpenTouch located in the trusted zone.
Users can be authenticated by the RP using LDAP authentication.
Blue Coat ProxySG Deployment:
Public fqdn: https://opentouch2.aapp-etesting.com
Public IP address: 83.206.62.68
Internal fqdn: rp.etesting.lab
Internal IP address: 10.1.2.23
Operating system: SGOS 6.5.7.6 SWG Edition
Alcatel-Lucent Enterprise Communication Platform:
IP address: 10.1.2.85
fqdn: ice2.etesting.lab
DNS: 10.1.2.15
OT version 2.1.0.93
OTC Iphone version 2.10.23.2
OTC Android smartphone version 2.10.23.2
OTC Ipad version 2.1.052.000
OTC Android tablet version 2.1.43.3
Test Case
N/A
OK
NOK
Comment
Test case 1
Action
Expected result
Test case 2
Action
Expected result
Test case 3
Action
Expected result
Test case 4
Action
Expected result
Test Case Id: a feature testing may comprise multiple steps depending on its complexity. Each
step has to be completed successfully in order to conform to the test.
Test Case: describes the test case with the detail of the main steps to be executed the and the
expected result
N/A: when checked, means the test case is not applicable in the scope of the application
OK: when checked, means the test case performs as expected
NOK: when checked, means the test case has failed. In that case, describe in the field Comment
the reason for the failure and the reference number of the issue either on ALE International side or
on AAPP member side
Comment: to be filled in with any relevant comment. Mandatory in case a test has failed especially
the reference number of the issue.
8 Test Results
In all following sections, the SIP client under test is an external user; It has been declared on the
public side of the RP.
Test
Case
Id
1
Test Case
N/A
OK
NOK
Comment
Application initialization
OTC client connection to the OT through
reverse proxy using HTTP basic authentication
OTC
Android
Smartphone,
OTC
Ipad
Not supported on
OTCv/t PC, OTCv
Android Tablet
Application exit
Stop OTC client.
A
OTC user is unregistered.
Test
Case
Id
1
Test Case
N/A
OK
NOK
Comment
Test
Case
Id
1
Test Case
N/A
OK
NOK
Comment
Not possible to
receive a second call.
The 2nd call is routed
to the other users
devices or to the voice
mail.
Test Case
Comment
NOK
OK
Hold/Resume
Call from User A (OTC Client) to User B and
establish the call.
Put User B on hold.
N/A
Test
Case
Id
4
Test Case
OK
NOK
Comment
N/A
OTCv PC , OTCv
Android Tablet: Not
possible to make a
second call, the
application is not
multi-line
OTCt PC, OTCv ipad:
the call can only be
transfered blindly to
one of the configured
numbers (home
phone, mobile,...). It
is not possible to start
a consultation call.
OTC Android, OTCv
iphone
User picture
Call from User B to User A (OTC Client)
Check that the callers picture is correctly presented
Test
Case
Id
1
Test Case
N/A
OK
NOK
Comment
Event notifications
Missed call event
From another user or station, call OTC Client
user but do not answer.
Test Case
IM
Presention/doc sharing
N/A
OK
NOK
Comment
OTC Android
smartphone, OTC
iphone, OTCt PC,:
Feature not available
Forwarding Layer: defines the mapping between the requests received by the ProxySG RP
and those forwarded to the backend servers.
Web Authentication Layer: defines the authentication method used at the ProxySG RP.
Enter the CA Name (for example CA_etesting) and the paste the certificate in the CA Certificate
PEM field.
Click on Close
Click on Apply
Reedit your Keyring.
Copy your CSR to text file and make it signed by your PKI (CA_etesting in our case).
10.5.2 Creating HTTPS 443 Proxy Service for certificate based authentication
Create two services as follows:
Click on New
In Name: Choose HTTPS_443
In service group, you can select OT_SERVICES group
In Proxy Settings: select HTTPS Reverse Proxy
For Primary server host: enter the name of your LDAP server.
Go to LDAP DN tab
Click on New
In Add Base DNs: type in something like: dc=etesting,dc=lab
Username : $(CN.1)
Go to Autorization tab
Enter the following values:
Go to Autorization tab
Uncheck Use persistent cookies and Verify the IP address in the cookies
Right-click on Action
Select New
Select Forwarding
Name: Forwarding_OT_443
Check Forward To:
And choose OT_443
Name: OT_8016
Check Advanced Match
Scheme: HTTPS
Host: enter the OT FQDN
Port: 8016
Click on OK
Right-click on Action
Select New
Select Forwarding
Name: Forwarding_OT_8016
Check Forward To:
And choose OT_8016
Click on Policy in tool bar, right click on Add Web Authentication Layer --> a new Tab is
added
Name it adequately e.g. Authenticate_LDAP
While still selected, Click on Add rule
Right-click in Action row, Set
New , Authenticate object
Click on Policy in tool bar, right click on Add Web Authentication Layer --> a new Tab is
added
Name it adequately e.g. Authenticate_certificate
While still selected, Click on Add rule
Right-click in Action row, Set
New , Authenticate object
Click on OK.
10.9.4.2 Configuring the CPL Layer for certificate based authentication method
Click on Policy in tool bar, right click on Add CPL Layer --> a new Tab is added
Enter the following text:
<Proxy> ssl.proxy_mode = https-reverse-proxy
authenticate(Certificate_Realm)
Professional
Services
Training
Services
Purchase
Support
Renew
Support
K9 Web
Protection
Web site
The Application Partner Portal is a website dedicated to the AAPP program and where the
InterWorking Reports can be consulted. Its access is free at
http://applicationpartner.alcatel-lucent.com
13.2 Enterprise.Alcatel-Lucent.com
You can access the Alcatel-Lucent Enterprise website at this URL: http://www.enterprise.alcatellucent.com/
(*) The Application Partner Business Partner can be a Third-Party company or the ALE
International Business Partner itself
The Application Partner shall be contacted first by the Business Partner (responsible for
the application, see figure in previous page) for an analysis of the problem.
The ALE International Business Partner will escalate the problem to the ALE
International Support Center only if the Application Partner has demonstrated with
traces a problem on the ALE International side or if the Application Partner (not the
Business Partner) needs the involvement of ALE International
In that case, the ALE International Business Partner must provide the reference of the Case
Number on the Application Partner side. The Application Partner must provide to ALE
International the results of its investigations, traces, etc, related to this Case Number.
ALE International reserves the right to close the case opened on his side if the
investigations made on the Application Partner side are insufficient or do not exist.
Note: Known problems or remarks mentioned in the IWR will not be taken into account.
For any issue reported by a Business Partner outside the scope of the IWR, ALE International offers
the On Demand Diagnostic service where ALE International will provide 8 hours assistance
against payment .
IMPORTANT NOTE 1: The possibility to configure the Alcatel-Lucent Enterprise PBX with ACTIS
quotation tool in order to interwork with an external application is not
the guarantee of the availability and the support of the solution. The reference remains the
existence of a valid InterWorking Report.
Please check the availability of the Inter-Working Report on the AAPP (URL:
https://private.applicationpartner.alcatel-lucent.com) or Enterprise Business Portal (Url: Enterprise
Business Portal) web sites.
IMPORTANT NOTE 2: Involvement of the ALE International Business Partner is mandatory, the
access to the Alcatel-Lucent Enterprise platform (remote access, login/password) being the
Business Partner responsibility.
Supported language
France
Belgium
French
Luxembourg
Germany
Austria
German
Switzerland
United Kingdom
Italy
Australia
Denmark
Ireland
Netherlands
+800-00200100
South Africa
Norway
Poland
English
Sweden
Czech Republic
Estonia
Finland
Greece
Slovakia
Portugal
Spain
For other countries:
English answer:
French answer:
German answer:
Spanish answer:
Spanish
END OF DOCUMENT
Alcatel-Lucent Application Partner Program Inter-working report
Copyright 2015 ALE International 2015