Network Configurations
-
Meter
See moreThis guide outlines the steps required to establish a secure IPsec connection between Timus and Meter. Follow the configurations below to ensure a successful connection.
Timus Configuration:
Follow the guide below for an example setup. Configure the following settings:Phase 1 (Parameters):
Here is how you can configure Parameters for Phase 1 configurations on Timus
- Local Peer Identifier: Timus_Gateway_Public_IP
- Remote Peer Identifier: Meter_Public_IP
- Key Exchange Type: IKEv2
- Preshared Key: Your Preshared Key
- Authentication Algorithm: SHA256
- Encryption Algorithm: AES256
- DH Group: modp2048(14)
- Mode: Main
Phase 1 (Miscellaneous):
Here is how you can configure Miscellaneous for Phase 1 configurations on Timus
- Responder Only: False
- Margin Time: 60 seconds
- Lifetime: 28800 seconds
- Dead Peer Detection (DPD): Disabled
- DPD Delay: 10 seconds
- DPD Max Failure: 5
- NAT Traversal: Disabled
Phase 2 for Timus:
Refer to to the below image for Phase 2 setup. Use these configurations:- Authentication Algorithm: SHA256
- Encryption Algorithm: AES256
- Protocol: ESP
- Perfect Forward Secrecy (PFS): Enabled
- PFS Group: modp2048(14)
- Lifetime: 3600 seconds
- Tunnel Protocol: ALL
Meter Configuration:
To add an IPsec VPN tunnel, log into the Dashboard and click Secure Tunnels > IPSec > ‘Add IPSec Tunnel’.
Meter provides Phase 1 and Phase 2 configurations into a single panel.
- Local IP or FQDN: Meter WAN Public IP
- Remote IP or FQDN: Timus Gateway Public IP
- Initiator: Timus Gateway Public IP
- Authentication Algorithm: SHA2_256_128 HMAC (128 bit)
- Encryption Algorithm: 256 bit AES-COUNTER
- DH Group: 14
- Preshared Key: Your Preshared Key
- Remote Networks: Add the subnets from Timus. (In this case, 192.168.249.0/24)
- Local Networks: Specify the Meter local subnets.
- Bound WAN Port: Your ISP
Once all configurations are applied, the IPsec connection between Timus and Meter should be successfully established. Follow this guide step by step, referencing the provided images as needed.
Note on Static Routing and Firewall RulesStatic routing rules and firewall access rules are automatically configured by default. However, if this option is not enabled or does not occur automatically, these rules must be created manually to ensure proper communication between Timus and Meter.
-
Create Site
See moreThe ability to create a site is a key feature of the Timus Solution. This article will show you how to navigate through the process on Timus Manager.The gateway(s) you will create should meet everything you need to provide a reliable, high-performance, and secure connection to your remote offices and mobile/remote workers by utilizing the most up-to-date tunnelling protocols.- To be able to create a Site, you need to go to the Timus Manager -> Sites -> Create New.
Select a region that is closest to most of your users. We recommend that you deploy multiple gateways in different regions if your users are distributed geographically. You can allow users to connect to all the gateways or some of them in user settings. If multiple gateways are allowed for a user, then the user’s Timus Connect App can choose the closest one before attempting to connect.You cannot change the region of a gateway once it is created.This process may take around 5 to 10 minutes. -
View Site Details
See moreThis article explains how to view site details on Timus Manager.Your network consists of components such as Gateways and IPsec tunnels. These components enable your users to securely access your resources on-premises and in the cloud and can be viewed in detail on the Sites page of the Timus Manager.- To view the site details, go to Timus Manager and click on the Sites page.
- Find the site whose details you want to view and click on the ellipsis icon in the corresponding row.
- Select "View" to access the page with site details.
- This page contains a summary table titled "Connectivity." The table provides information on three parameters: Connection Health: indicates the overall status and reliability of the connections Throughput: refers to the amount of data that can be transmitted through the network within a given time frame, indicating the network's capacity. Efficiency: measures how effectively the network utilizes its resources to transmit data.
This Connectivity section helps you make informed decisions or take necessary actions to optimize network connectivity.
- The Network Statistics graph shows the Health or Throughput data for the Primary WAN over the Last 7/15 Days, Last Month, or Custom date range.
- List of the networks of the site.
- Site information widget shows the most important details about the site and has the ability to configure the site with the Edit feature at the upper right of the widget.
-
View Network Statistics
See moreThis article explains how to view network statistics to ensure network efficiency.- To access Network Statistics, start by going to Timus Manager and selecting the "Sites" page.
- From here, select the site with the network you want to view and click on the ellipsis icon located on the right side of the site row.
- Click on "View" to enter the site page, where you can find the statistics for the networks associated with that site.
- The Network Statistics section provides graphical representations of the connection status (Health) or the download/upload statistics (Throughput) for either all networks or a specific one.
- You can filter the status and statistics with the time filter as default: 7, 15, 30 days or, you can customize the date.
The Network Statistics for the Primary WAN of the site you are currently viewing in your Timus Manager are as follows:
Latency:
- They indicate the time it takes for a data packet to travel from one point to another on the network.
Jitter:
- Inconsistent arrival of packets between two endpoints, causing delays.
Loss (Packet Loss):
- Packet loss refers to when a packet fails to reach its destination, arrives in a different order than intended, or arrives after a significant delay.
Upload:
- The upload rate refers to the speed at which the customer's data is transferred to the Gateway, typically measured in bits per second.
Download:
- The download speed is the rate at which the representative receives data from the Gateway, typically measured in bits per second.
(Connection) Health:
- The performance of the session indicates the status of the established connection and is derived from the average recorded latency.
- If the Latency is less than 50 ms, the connection is defined as "PERFECT."
- Similarly, if the Latency is recorded as:
- Between 50 and 150 ms, the connection is called "GOOD."
- Between 150 and 300 ms, it is considered "AVERAGE."
- If it exceeds 300 ms, the connection is labeled "BAD."
-
Connection Health
See moreTo access the Health scale that ranks connection quality from best to worst, follow these steps:
- Go to Timus Manager > Sites page.
- Locate the site from the list on the page.
- The past 24 hours are color-coded in green, yellow, red, and gray (null) on the scale for easy identification under the Health section.
- When you hover your mouse over the scale, you will be able to see a pop-up information box showing the measurement values within that hour.
- For a more detailed overview of the connection health, click on the ellipsis icon located on the site row and select "View" from the dropdown menu.
- This will provide you with comprehensive information on the status of your connection.
- The overall values for Latency, Jitter, and Loss are presented to the right of the scale.
-
Create Site to Site IPsec Connections
See moreThe IPsec protocol suite can set up direct and encrypted connections between supported devices by offering a framework for securing data traffic between two servers.
Creating an IPsec tunnel via Timus, you can transfer the data securely between the peers of the connection.To create a site-to-site IPsec VPN gateway connection between your on-premises network and a virtual network (VNet) please follow these steps:Here are the two phases of internet key exchange (IKE) required to set up an IPsec connection using Timus.
IKE PHASE 1
General Settings
- Go to Timus Manager > Sites page.
- Click Create New in the upper right corner of the page.
- Select Connector.
- In the General tab, enter a Name of up to 30 characters.
- Select IPsec as the Tunnel Type.
-
Set the Status to Enabled.
Parameters
As shown in the sample image below of the parameters tab, there are default settings that need to be configured for the IPsec tunnel connection you are about to create in order for it to function correctly:
- Click the Parameters tab on the Connector page.
- Local Peer represents the originating gateway. Choose the Network > the Primary WAN from here.
-
Please enter the PUBLIC WAN IP of your Timus Manager in the Local Peer Identifier box located to the right of the Local Peer.
- To access the IP address and insert it into the Peer Identifier box, go to the Timus Manager -> Sites -> relevant Site's line and click on the ellipsis icon. Then, select View. On the page that opens, the Gateway's IP address is displayed in the Site information field. Copy this PUBLIC WAN IP.
- Remote Peer represents the WAN IP of the remote device. Enter the WAN IP of the device (i.e. firewall) at the other side of the tunnel.
- Peer Identifier is to facilitate communication and data exchange between peers. If your network topology does not include the local WAN IP, you might consider leaving this Peer Identifier box to the right of Local Peer blank.
- However, your device may also require Remote Peer Identifier. So even if the IPsec tunnel you want to establish ends in the PUBLIC WAN IP, you may need to enter the same IP address in the Remote Peer into Peer Identifier (Optional) box without putting network classes such as /32
- Here is an example below:
- Remote Peer: 8.8.8.8/32
- Remote Identifier: 8.8.8.8
To find your Local Primary WAN IP address,
- Go to the Timus Manager -> Sites -> relevant Site's line and click on the ellipsis icon.
-
Then, select View.
- On the page that opens, the Local Primary WAN IP address is displayed in the Networks area field at the bottom of the screen. You can use this Local Primary WAN IP Address for your Remote Peer Identifier field.
- To be able to create an IPsec with some devices, the Local Peer Identifier (optional) must be your Local Primary WAN IP address as the image below
- In the Authentication and Encryption section, you will specify the mode of Phase 1 for authentication and encryption and complete the configuration of an association that both parties agree on.
- It is recommended to choose IKEv2 as the Key Exchange Type, which provides greater efficiency and flexibility.
- Create an IPsec password as a Preshared Key. Be careful not to use simple passwords and algorithms for network security. Timus supports a maximum of 50 characters for the Preshared Key. However, due to the 18-character key restriction on certain devices, it would be useful to verify whether this limit applies to the remote peer.
- Select the Mode for negotiation, either Main or Aggressive.
- The choice between Main Mode (The default and more secure) and Aggressive Mode (This mode is faster but less secure. However, it is useful in situations where one or both devices are behind a NAT device, as NAT can interfere with the Main Mode negotiation process) depends on your specific needs and the level of security required. You should always consider the trade-off between security and speed when making this decision.
- For Authentication Algorithm, you should choose between sha1 or sha256.
- For the Encryption Algorithm, the widely used and supported AES128 algorithm is available for establishing a secure connection.
- modp1024(2) or Group 2 is the minimum acceptable group for DH Group's security algorithm. However, for higher security needs, consulting a network security professional and choosing higher groups from the list, such as modp2048(14) or modp3072(15), is recommended.
- The important point to note is that in order for tunneling to be established correctly, the values used in the Authentication and Encryption section must be exactly the same as on the peer device at the other side of the tunnel.
Miscellaneous
- You can configure the retry methods for the IPsec tunnel connection in the Miscellaneous tab.
- The recommended/default settings in this tab are displayed in the image below.
- Ensure that the same values are entered for both devices in order to establish a correct connection in this tab as well.
-
Enable NAT Traversal to ensure the proper functioning of the IPsec connection. Please note that this option should be enabled on both Timus and your IPsec device. If you do not have any options to enable it on the on-prem IPsec device/Firewall, please keep it disabled.
IKE PHASE 2
- You must create a tunnel where you will determine the traffic that will pass through the Connector you have created in the Phase 1 section.
- As in Phase 1, you must enter all the same values for the connection health of the IPsec tunnel for both devices.
- Here are the steps you need to follow to create a tunnel:
- Go to Timus Manager -> Sites page.
- The Connector you have created in the Phase 1 chapter is in the drop-down menu under the selected gateway. Use the right and down slider button icons to view the connector's line.
-
Click on the icon at the end of the Connector’s line. Then click "View."
- The page that opens is the Phase 2 table of IPsec. In the Site section on the right side of the page, you can view the Phase 1 methods you have configured.
-
Click on Create Tunnel on the page that opens.
- Enter a Name for the IPsec tunnel.
- Set the Status to Enabled.
- Select Authentication and Encryption Algorithms.
- Choose from the list if you want to create an IPsec tunnel over a particular protocol.
- In Phase 2, select multiple algorithms to increase security.
- To access and enter the IP to Local Network section, go to Sites-> Relevant Gateway -> View -> Networks.
- Copy the IP address you desire from under the Network heading.
- For instance, the WireGuard tunnel for IPsec is 192.168.249.0/24, and the OpenVPN tunnel for IPsec is 192.168.255.0/24 in the below picture.
- You can prioritize traffic to pass through the tunnel by enabling NAT Status for LAN.
- NAT Status: Ensuring traffic comes from a different IP block prevents you from losing network connectivity even if local networks conflict.
- In the Remote Network section, you can select the local subnet of the remote device.
- Enable or disable the PFS feature.
-
Enable Perfect Forward Secrecy (PFS) only if you are sure that PFS can be enabled on the peer device. If the peer device is old, disabling PFS may be a viable option.
- After configuring the Phase 2, click on Save.
Vendors - IPsec site-to-site configuration
-
PfSense
See moreThis article will help you establish a site-to-site IPsec connection between Timus Networks and PfSense.
IPsec tunnel between Timus - PfSense: PfSense Configuration for Timus:
Go to PfSense UI -> VPN -> IPsec.
General Information:
IKE Endpoint Configuration:
Phase 1 Proposal (Authentication):
Phase 1 Proposal (Encryption Algorithm):Expiration and Replacement:
Advanced Options:
Once you have completed the steps as shown in the images above, hit Save to complete the Phase 1 configuration on PfSense.
You need to go back to the VPN -> IPsec page again, and hit Show Phase 2 Entries or create a new one to complete the Phase 2 configuration of PfSense.In this example, we consider that the local subnet belonging to PfSense is 10.10.10.0/24 and Remove Subnet is 192.168.249.0/24 (WireGuard subnet on Timus).
Once you Add P2 or Edit the P2, you will be able to see the Phase 2 configuration of PfSense.
General Information:Networks:
Phase 2 Proposal (SA/Key Exchange):
Expiration and Replacement:
Keep Alive:
You can hit Save to complete the Phase 2 configuration of PfSense.
PfSense generally connects to the IPsec automatically. Yet, it sometimes does not connect automatically. To be able to manually trigger the IPsec connection, you need to go to Status -> IPsec as shown in the image below and hit Connect P1 and P2 button there to run it. Plus, you can disconnect the IPsec tunnel manually if needed.After completing the steps above, please add a Firewall IPsec rule on PfSense as shown in the image below to let the Phase 2 work on both Timus and PfSense.
Timus Configuration for PfSense Firewall:
- Go to the Timus Manager -> Sites -> Create New Please note that you need to have a gateway to be able to create an IPsec tunnel(Connector).
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name, which is required.
Parameters:
- Note- you now have the option to select "Create firewalls rules automatically"
Miscellaneous:
- To enable Dead Peer Detection(DPD) is highly recommended. Therefore, once the IPsec tunnel gets down for some reasons, it will automatically connect back and it will be Established/Online again.
- After configuring the Phase 1 IKE configuration of Timus, you need to hit Save.
- After saving, please extend the gateway by clicking on the arrow, and click on the 3 dots at the end of the row. After that, click on View.
- After clicking on View, you will be the page where you can add/edit the Phase 2 configuration, click on Create New Tunnel to create a Phase 2 configuration for your IPsec.
Phase 2 configuration of Timus:
- Note- you now have the option to select "Create firewalls rules automatically"
- After configuring the Phase 2, click on Save.
Important:
Make sure to turn off (uncheck) the options "Block Private Networks and Loopback Addresses" and "Block Bogon networks" under the tab Reserved Networks located on your WAN Interface. If these options are enabled, you might see an error message saying "IPsec peer is not responding." This happens because PfSense blocks IPsec traffic when these settings are on, as shown in the image below. -
Cisco Meraki
See moreThis article will help you establish a site-to-site IPsec connection between Timus Networks and Cisco Meraki.
IPsec tunnel between Timus - Cisco Meraki: Cisco Meraki Configuration for Timus:
Go to Security & SD-WAN > Configure > Site-to-site VPN and click on Add a peer.
After completing the part above, you need to click on Custom under IPsec policies as shown in the image above.
VPN Settings - Phase 2 configuration of Cisco Meraki Firewall
Timus Configuration for Meraki Firewall:
- Go to the Timus Manager -> Sites -> Create New Please note that you need to have a gateway to be able to create an IPsec tunnel(Connector)
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name, which is required.
Parameters:
- Note- you now have the option to select "Create firewalls rules automatically"
Miscellaneous:
- To enable Dead Peer Detection(DPD) is highly recommended. Therefore, once the IPsec tunnel gets down for some reasons, it will automatically connect back and it will be Established/Online again.
- After configuring the Phase 1 IKE configuration of Timus, you need to hit Save.
- After saving, please extend the gateway by clicking on the arrow, and click on the 3 dots at the end of the row. After that, click on View.
- After clicking on View, you will be the page where you can add/edit the Phase 2 configuration, click on Create New Tunnel to create a Phase 2 configuration for your IPsec.
Phase 2 configuration of Timus:
- Note- you now have the option to select "Create firewalls rules automatically"
- After configuring the Phase 2, click on Save.
-
Fortigate
See moreThis article will help you establish a site-to-site IPsec connection between Timus Networks and Fortigate.
IPsec tunnel between Timus - Fortigate: Fortigate Configuration for Timus:
After going to the New VPN Tunnel page, please use the configuration below:
Network:
- Remote Gateway: Static IP Address
- IP Address: Enter Timus Public Gateway IP
- Interface: Please select your Fortigate Public WAN Interface
- Local Gateway: Disabled
- NAT Traversal: Enabled
- Keepalive Frequency: 10
- Dead Peer Detection: Disabled
Authentication:
- Method: Pre-shared Key
- Pre-Shared Key: Enter a pre-shared key here, which should be written on the Timus side too.
- IKE Version: IKEv1
- Mode: Main(ID protection)
Phase 1 Proposal:
- Encryption: AES256
- Authentication: SHA256
- Diffie-Hellman Groups(DH Group): 14
- Key Lifetime: 28800
Please note that the other encryption and authentication entries must be deleted. Only the configuration above should be there. You can leave the other options, not mentioned above, however they are.
XAUTH: Type Disabled
Phase 2 Selectors:
- Name: Enter Phase 2 name here like Fortigate_Timus_Phase2
- Local Address (subnet): You need to enter your local subnet here like 192.168.10.0/24
- Remote Address (subnet): You need to enter Timus's WireGuard or OpenVPN subnets here. 192.168.249.0/24 is for WireGuard and 192.168.255.0/24 is for OpenVPN by default if you have not changed them from Timus Manager.
Phase 2 Proposal:
- Encryption: AES256
- Authentication: SHA256
- Key Lifetime: 3600
- Enable Perfect Forward Secrecy (PFS): Disabled
- Autokey KeepAlive: Enabled
- Policy Name: Fortigate-to-Timus
- Source Interface: internal
- Destination Interface: Ipsec1
- Source Address: 192.168.1.0/24
- Destination Address: 192.168.249.0/24
- Action: Accept
- Schedule: Always
- Service: ALL
- NAT: Disabled
- Policy Name: Timus-to-Fortigate
- Source Interface: Ipsec1
- Destination Interface: internal
- Source Address: 192.168.249.0/24
- Destination Address: 192.168.1.0/24
- Action: Accept
- Schedule: Always
- Service: ALL
- NAT: Disabled
Please note that the other encryption and authentication entries must be deleted. Only the configuration above should be there. You can leave the other options, not mentioned above, however they are.
After completing the steps above, you need to define a static routing for the connection of the local subnets:
Timus Configuration for Fortigate Firewall:
- Go to the Timus Manager -> Sites -> Create New Please note that you need to have a gateway to be able to create an IPsec tunnel(Connector)
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name, which is required.
Parameters:
- Note- you now have the option to select "Create firewalls rules automatically"
Miscellaneous:
- To enable Dead Peer Detection(DPD) is highly recommended. Therefore, once the IPsec tunnel gets down for some reasons, it will automatically connect back and it will be Established/Online again.
- After configuring the Phase 1 IKE configuration of Timus, you need to hit Save.
- After saving, please extend the gateway by clicking on the arrow, and click on the 3 dots at the end of the row. After that, click on View.
- After clicking on View, you will be the page where you can add/edit the Phase 2 configuration, click on Create New Tunnel to create a Phase 2 configuration for your IPsec.
Phase 2 configuration of Timus:
- Note- you now have the option to select "Create firewalls rules automatically"
- After configuring the Phase 2, click on Save.
-
UniFi
See moreThis article will help you establish a site-to-site IPsec connection between Timus Networks and UniFi.
IPsec tunnel between Timus - UniFi: UniFi Configuration for Timus:
Go to VPN -> Site-to-Site VPN (IPsec).
Go to Static Routing page.
- Name: Timus_Static_Routing
- Enabled: Enable this route
- Type: Static
- Network: 192.168.249.0/24 is for WireGuard or 192.168.255.0/24 is for OpenVPN subnets on Timus by default. If you have changed the subnets, please enter either WireGuard or OpenVPN subnets here.
- Distance: 10
- Static Route Type: You can either select your LAN interface or select Next Hop as the subnet belonging to your LAN like 192.168.10.0/24 here.
Hit Save after completing the configuration on UniFi - Static routing page.
Timus Configuration for UniFi:
Go to the Timus Manager -> Sites -> Create New Please note that you need to have a gateway to be able to create an IPsec tunnel(Connector)
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name, which is required.
Parameters:
- Note- you now have the option to select "Create firewalls rules automatically"
Miscellaneous:
- To enable Dead Peer Detection(DPD) is highly recommended. Therefore, once the IPsec tunnel gets down for some reasons, it will automatically connect back and it will be Established/Online again.
- After configuring the Phase 1 IKE configuration of Timus, you need to hit Save.
- After saving, please extend the gateway by clicking on the arrow, and click on the 3 dots at the end of the row. After that, click on View.
- After clicking on View, you will be the page where you can add/edit the Phase 2 configuration, click on Create New Tunnel to create a Phase 2 configuration for your IPsec.
Phase 2 configuration of Timus:
- Note- you now have the option to select "Create firewalls rules automatically"
- After configuring the Phase 2, click on Save.
-
Sonicwall
See moreThis article will help you establish a site-to-site IPsec connection between Timus Networks and Sonicwall.
IPsec tunnel between Timus - Sonicwall: Sonicwall Configuration for Timus:
Go to Object -> Match object -> Addresses -> add to create address object for Local network.
Go to Object -> Match object -> Addresses -> add to create address object for Timus Network.
Go to Network -> IPsec VPN -> Rules and Settings -> Add
General:
Network:
Proposals:
Advanced:
Dead Peer Detection should be Disabled and NAT Traversal should be Enabled on Sonicwall:
Timus Configuration for Sonicwall:
- Go to the Timus Manager -> Sites -> Create New Please note that you need to have a gateway to be able to create an IPsec tunnel(Connector)
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name, which is required.
Parameters:
- Note- you now have the option to select "Create firewalls rules automatically"
Miscellaneous:
- To enable Dead Peer Detection(DPD) is highly recommended. Therefore, once the IPsec tunnel gets down for some reasons, it will automatically connect back and it will be Established/Online again.
- After configuring the Phase 1 IKE configuration of Timus, you need to hit Save.
- After saving, please extend the gateway by clicking on the arrow, and click on the 3 dots at the end of the row. After that, click on View.
- After clicking on View, you will be the page where you can add/edit the Phase 2 configuration, click on Create New Tunnel to create a Phase 2 configuration for your IPsec.
Phase 2 configuration of Timus:
- Note- you now have the option to select "Create firewalls rules automatically"
- After configuring the Phase 2, click on Save.
-
Split Tunnel Configuration
See moreThis article explains the process of using and managing Split Tunnelling on the Settings -> Configuration -> Tunnel Configuration page.
Split tunneling allows custom rules based on a user or team to route the client traffic through the VPN or the internet based on IP address or domain name.
- Go to Timus Manager -> Settings -> Configuration page and click the Tunnel Configuration tab.
- Click the Create New button.
- After clicking on Create New, you will be able to configure your split tunnel rules.
- You can click on Add Source or Add Destinations to add multiple sources and destinations.
Title: Name the tunnel you are about to create. It may indicate the intended use.
Tunnel Mode:
- Through Internet: Your traffic will be going over your internet by using your IP address.
- Through VPN: Your traffic will be going over the Timus Connect Application, the Timus Gateway, instead of using your IP address.
- Source: You can choose either a user or a team for selecting sources, and the split tunneling will be applied accordingly.
-
Destination: You can choose either an IP address or a domain name for selecting destinations, and the split tunneling will be applied accordingly.
- By default, all users and teams route their traffic through the Timus VPN unless you change it to 'Through Internet'.
- The split tunnel configuration works on Windows and macOS when the tunnel protocol is WireGuard.
- The domain-based split tunnel is unavailable when the tunnel protocol is OpenVPN at the moment. Yet, the IP-based split tunnel is available on the OpenVPN tunnel protocol.
- The split tunnel is unavailable for the Mobile operating systems like Android or iOS at the moment.
- This feature is currently unavailable when Timus Connect's tunneling protocol is OpenVPN or the operating systems are browsers such as Google Chrome or Safari utilize cache mechanism so when you define a domain-based split tunnel rule, you may face some issues like connecting to the website through the VPN even if you have already defined a rule Through Internet.
- macOS does not consider two rules defined on the same IP address valid and applies only one of them. The conflict may arise from Domain-Based or IP-Based split tunnel rules where these two IP addresses are considered identical.
- While defining Through Internet rules with IP ranges, you should not include the DNS addresses of WireGuard, 192.168.249.1, or OpenVPN, 192.168.255.1. Defining Through Internet rules with these can cause some connection issues such as not being able to resolve the domain names such as timusnetworks.com.
- While defining some domain-based split tunnel rules, you need to consider that some well-known platforms such as Instagram, WhatsApp or Facebook may use the same network/location/datacenter. Therefore, you may face that two different platforms have the same IP address. Due to resolving the IP addresses of the Domains, this may cause some conflicts. Here is an example below that due to the platforms having the same IP address, whatsapp.com and facebook.com will go through Internet even if you have selected the tunnel mode Through VPN. This is because in the split tunnel rule hierarchy, the one at the top takes precedence, and once a result is found, the other rules are ignored.
- If a Split Tunnel rule is defined for a specific user such as TIMUS-USER, and a separate rule is defined for All users or All teams, the rule specified for the individual user, TIMUS-USER, takes precedence and is effective over the general rule so that the rule defined for an individual user takes precedence over the rule set for All Users or All Teams.
- If you are using a roaming DNS client on your end-devices, such as ScoutDNS or Cisco Umbrella, a split tunnel that excludes localhost from passing through the gateway will be required for name resolution.
- When multiple websites utilize proxy services such as CloudFlare to enhance their security and anonymity, it can potentially result in IP address conflicting within the Split Tunnel configuration. This is because certain proxy providers, like CloudFlare, allocate the same IP address to multiple websites. For instance, if you choose to route traffic for 'test.com' through the internet using CloudFlare as a proxy provider, and simultaneously select 'test2.com' to route through a VPN also utilizing CloudFlare, you may observe that 'test.com' goes through the VPN while 'test2.com' goes through the internet. Such routing discrepancies can arise from the shared use of a proxy service, leading to conflicts between the internet and VPN routes.
- You are not allowed to set any configurations regarding the domains belonging to Timus Networks on the Split Tunnel.
Destination Tunnel Mode IP address of the platforms Domain - Instagram.com
Through Internet
157.240.0.174
Domain - whatsapp.com Through VPN 157.240.0.174 Domain - facebook.com Through VPN 157.240.0.174 -
Manage Networks
See moreIn this article, you will learn how to use the platform to manage your corporate network.The gateways you will create over the Sites screen meet everything you need to provide a reliable, high-performance, and secure WAN connection to your remote offices and mobile/remote workers by utilizing the most up-to-date tunneling protocols.- To view the networks connected to a gateway you created, follow these steps:
- Go to the Timus Manager and navigate to the Sites page.
- Choose the site you are interested in, click on the ellipsis icon at the end of the row, then select View.
- The site's page will open, displaying a list of the networks linked to the site.
- Locate the network you want to view and click on the ellipsis icon at the end of its row.
- Select Details.
-
You will find three tabs labeled General, Configuration, Miscellaneous and DNS on Primary WAN, WireGuard and OpenVPN. These tabs allow some edits the networks connected to your cloud and on-premises environments. The DNS tab is not existed on Primary WAN.
-
On the General tab of Primary WAN, WireGuard and OpenVPN, you can change the name of the network.
-
On the Miscellaneous tab of WireGuard and OpenVPN, you can enable/disable SSL Inspection. If enabled, you need to make sure that the certificate has been installed successfully.
-
On the DNS tab of WireGuard and OpenVPN, you can enter your Internal/external DNSes and Search Domains. You can enter up to 6 Internal/external DNSes and 10 Search Domains there. If you want to enter Internal/external DNSes and Search Domains, you need click on Add DNS or Add Search Domain buttons as shown in the image below.
DNS Tooltip:Enter DNS addresses if you want to use servers different than Timus servers in this network. Maximum 6 addresses can be entered with WireGuard and 1 address can be entered with OpenVPN. If multiple DNS addresses are entered, they are tried in the sequence they are placed in the settings. If it succeeds with one address, the remaining addresses are skipped. If no address is entered, Timus DNS will be used.Search Domains Tooltip:The DNS suffixes entered here will be automatically appended to all domain names when making a DNS lookup. For example, if a company office has a server called "server1.example.com", they can announce DNS suffix "example.com" via DHCP and that server becomes accessible simply as "server1". Whenever you visit http://server1/ the system will automatically try http://server1.example.com instead. If multiple DNS suffixes are configured, the DNS suffixes are resolved in the sequence they are placed in the settings. For example, assume that the following suffixes are added in that order:- example.net
- example.org
- example.com
When an end user types "server1", the operating system attempts to resolve the FQDNs in the following sequence. If it succeeds with one suffix, the remaining suffixes are skipped. Maximum 10 suffixes can be entered.- server1.example.net
- server1.example.org
- server1.example.com
-
DNS Configuration
See moreThis article explains how to manage and configure the Domain Name Servers.
To be able to edit the DNS Configuration, you need to go to the Timus Manager -> Sites -> click on 3 dots at the end of the row belonging to the gateway, which you have.
Once you click on Edit, you will be able to see the pop-up as shown in the image below
You can configure your DNS addresses by using this page.
-
Email Customization
See moreTo Locate Customization: Settings -> Configuration -> Customization
You have the option to customize the below functions for communication and management based on company location.
Time zone settings.
Enable Customization: Activating this feature allows the company short name to be edited in the e-mail contents sent to the users by the system.
Organization Alias: You can edit the company short name in the e-mail contents sent to the users by the system.
Email Server
- This is for using the Custom SMTP Server.
- After entering the required information and choose a Connection Type as SSL, TLS, SMTP before you save.
- Please, test the connection by clicking the Connection Test button.
You can have a look at the lists on the internet for the most common SMTP parameters or contact your ISP.
-
Manage Sites
See moreThis article provides the information to manage the Gateway or Connector (Tunnel) components in your Timus network.See the actions you can take regarding the location by clicking the ellipsis icon on the right side of the site row:- View the detailed information about the connectivity, and site to monitor the network statistics.
The Throughput value is the average throughput value for the WAN interface of this site. The value is calculated with the traffic volume passing through the WAN interface every 5 minutes.
- Edit the site information, Activate/ Deactivate the Web Filter and Antivirus Services, and change the DNS configuration or Firewall mode.
- If you Allow Remote Access, Timus technical support team will be able to access the system remotely if required.
- Delete the site using the Delete feature,
Firewall rules will not be deleted automatically by the Timus Manager when a site is deleted. Even if the gateway is removed, the rules will not disappear. However, without a gateway, the rules become ineffective, and this could lead to security issues if not handled with caution. However, if a new gateway is added, the rules will be automatically reinstated.
When a new connection is established in Stateful mode, packets, and connection states begin to be monitored.
In Stateful+ICMP mode, additional monitoring is done specifically for ICMP packets.
In Stateless mode, the states of the connections are not stored, and each incoming packet is evaluated according to the data in its header information.
The main difference between Stateful and Stateless modes is that while stateful is running, precautions can be taken against some types of attacks related to connection states, while stateless is running this cannot be done. Stateful mode includes the capabilities of stateless mode. The recommended operating mode is Stateful.
- To configure your network preferences, click the ellipsis icon on the site's row and select View.
- Then, click the ellipsis icon on the network's row and select Details.
In the Network window, you can change the network Name, the status of the SSL Inspection and modify the Internal/external DNSes and Search Domains.
-
Tag Management
See moreIn this article, you will learn how to use and manage the Tag Management featureTo be able to go to the page Tag Management, you need to follow the Timus Manager -> Settings -> Tags.Dynamic tags can be assigned to users and devices, and can also be referenced in firewall rules, agent profiles, and user sign-in policies. The assignment of dynamic tags is based on the conditions that have been configured in the tag. In a dynamic tagging system, the tags are created and do not change dynamically based on the content itself or user interactions. However, the assignment of these tags will be continuously reviewed based on the conditional assessments. If the conditions for the assignment of the tags are still valid, the tags will remain applied to their assignees. If the conditions for the assignment of the tags are no longer met, the tags will be removed from them. Administrators may edit any dynamic tags they have created. This can be done at any time, with the description, assigned objects, and references all being able to be changed.Dynamic tagging is a highly specialized and crucial feature for ZTNA technologies. It creates a novel approach to micro-segmentation when utilizing ZTNA policies and firewall rules. With this feature, objects with tagging and all references where the label is used will dynamically affect all users and devices in the system as long as the previously specified conditions are met. Not only will this structure improve network security by enabling firewall rules to be added and removed from objects flexibly and dynamically, but it will also facilitate micro-segmentation and allow a large number of manual operations to be performed by the system in an automated way.You can click on Create New to create a new tag to manage or assign.- Source: This is where the tag is coming from.
- Type: This is if it is a static tag or dynamic tag.
- Users: This field will show how many users have been assigned to the Tag.
- Teams: This field will show how many teams have been assigned to the Tag.
- Devices: This field will show how many teams have been assigned to the Tag.
- References: This field will show how many Firewall rules have been assigned to the Tag.
Once you click on Create New, you will be able to see the fields below and the Type is selected as Static by default. You can select either Static or Dynamic.
Static Tagging:
- Title: This field is required. You can name your Tag by using this field.
- Description: This field is not required.
- Assign to: You can select User, Team and Device here to assign the Tag, which you are creating.
Once you edit the Static Tag(s), you will be able to see where they have been used.
Dynamic Tagging:
You can assign either Users or Devices.
- Once you assign to Users and you select the Type as User under the Condition, you will be able to select the Attribute as 2FA Setup. The Operator will be selected as "is equal to" and the Value will be selected as Done or Not Done. This data is fetched by the Timus Manager -> Users & Teams -> Users.
- Once you assign to Users and you select the Type as Team under the Condition, you will be able to select the Attribute as Title. The Operator will be selected as "is equal to" or "is any of" and the Value will be selected as the title(s) of the teams, which you have created. Plus, a quick reminder that some Teams are created automatically if there is an IdP like Microsoft Entra.
- Once you assign to Users and you select the Type as Device under the Condition, you will be able to select the Attribute as "Timus Connect - Operating Systems". The Operator will be selected as "is equal to" or "is any of" and the Value will be selected as Windows, macOS, iOS or Android.
- Once you assign to Devices and you select the Type as Device Posture Check under the Condition, you will be able to select the Attribute as follows:
- BitDefender - Agent Outdated
- BitDefender - Agent Product Update Disabled
- BitDefender - Antivirus Agent Signature Update Disabled
- BitDefender - Antivirus Agent Signature Outdated
- BitDefender - Device Infected
- BitDefender - Malware Detected
- BitDefender - Disc Encryption
- BitDefender - Risk Score
- BitDefender - Agent Installed
- BitDefender - Operating System
- Microsoft Defender - Antivirus Engine Updated
- Microsoft Defender - Antivirus Platform Updated
- Microsoft Defender - Antivirus Signature Updated
- Microsoft Defender - Risk Score
- Microsoft Defender - Exposure Level
- Microsoft Defender - Antivirus Mode
- Microsoft Defender - Agent Installed
- Microsoft Defender - Operating System
- SentinelOne - Agent Outdated
- SentinelOne - Device Infected
- SentinelOne - Disc Encryption
- SentinelOne - Agent Installed
- SentinelOne - Operating System
The Operator will be selected as "is equal to" or "is any of" and the Value will be selected as follows:
-
- Other
- Active
- Passive
- Disabled
- EDRBlocked
- PassiveAudit
- Once you assign to Devices and you select the Type as Team under the Condition, you will be able to select the Attribute as Title. The Operator will be selected as "is equal to" or "is any of" and the Value will be selected as the title(s) of the teams, which you have created. Plus, a quick reminder that some Teams are created automatically if there is an IdP like Microsoft Entra.
- Once you assign to Devices and you select the Type as Device under the Condition, you will be able to select the Attribute as "Timus Connect - Operating Systems". The Operator will be selected as "is equal to" or "is any of" and the Value will be selected as Windows, macOS, iOS or Android.
- Conditional Tag Assignment: Unlike static tags which are manually assigned and remain constant, dynamic tags are assigned based on predefined conditions. Various attributes of the tagged entities are checked to assess whether these conditions are met. Examples of such attributes could be:
- Device attributes: Operating system type (Windows, macOS, etc.), Team and Device Posture Check attributes
- User attributes: 2FA Setup, Team, and Operating system type (Windows, macOS, etc.)
- Continuous Evaluation: Timus employs a continuous evaluation that constantly monitors the assets against the predefined conditions associated with dynamic tags. This ensures that the tags accurately reflect the current state of the assets.
Benefits of Dynamic Tagging:
- Automated Access Control: Dynamic tags automate access control decisions based on real-time asset conditions. This eliminates the need for manual configuration changes and reduces the risk of human error.
- Micro-segmentation: By dynamically assigning tags based on granular asset attributes, Timus facilitates micro-segmentation of the network. This allows for more precise control over user and device access to specific resources.
- Enhanced Security: The continuous evaluation and dynamic adjustment of access controls based on asset conditions strengthens the overall security posture of the network.
Conceptual usage scenarios:
1- Device attribute-based segmentation:
- Scenario: An organization wants to segment its network based on device operating system type to enforce different security policies.
- Implementation: Dynamic tagging automatically assigns tags to devices based on their operating system type (e.g. Windows, MacOS,).
- Result: The result is the creation of dynamic micro-segments that group devices with similar operating systems, allowing the organization to apply tailored security policies and controls to each segment.
2- User behavior-based segmentation:
- Scenario: An organization wants to segment its network based on user behavior to mitigate the risk of insider threats.
- Implementation: Dynamic tagging evaluates user behavior such as authentication patterns, access frequency, and file usage
- Outcome: By dynamically assigning tags based on user behavior, the organization can create micro-segments of users with similar behavior profiles. This enables the implementation of access controls and monitoring mechanisms tailored to the risk profile of each user segment.
3- Access privilege-based segmentation:
- Scenario: A healthcare provider needs to segment its network based on user access privileges to protect sensitive patient data.
- Implementation: Dynamic tagging evaluates user roles, permissions, and access levels within the organization's systems and applications.
- Outcome: By dynamically assigning tags based on access privileges, the organization can create micro-segments for different user roles (e.g. physicians, nurses, administrative staff). This enables the implementation of role-based access control (RBAC) and ensures that users only have access to the resources required for their role.
Example scenario:
Leveraging Device Posture Check Conditions:
- Scenario: An organization seeks to enforce security policies based on the risk status of devices seeking access to the network.
- Dynamic Tagging Implementation:
- Criteria: Device attribute: “Bitdefender - Risk Score”
-
Condition: If the Risk score is "High
-
Tag Title: "Risky Device"
-
Outcome: Devices with a high-risk status are automatically tagged with the 'Risky Device' tag, triggering actions such as network quarantine or remediation. This action may include the application of predefined firewall rules that restrict the device's access to network resources to effectively mitigate potential threats.
Real-world use cases:
Healthcare Sector:- Scenario: A hospital leverages dynamic tagging to segment its network based on user roles and patient data access requirements.
- Outcome: Granular access controls ensure that only authorized healthcare professionals can access patient records, mitigating the risk of data breaches and ensuring compliance with healthcare regulations.
Financial Services Industry:
- Scenario: A financial institution employs dynamic tagging to segment its network according to user privileges and transaction types.
- Outcome: By dynamically adjusting access privileges based on transaction risk levels, the organization fortifies its security posture and safeguards sensitive financial data from unauthorized access or fraudulent activities.
Educational Institutions:
- Scenario: A university utilizes dynamic tagging to segment its network based on student, faculty, and administrative roles.
- Outcome: Micro-segmentation facilitated by dynamic tagging enables the university to enforce role-based access controls, ensuring that academic resources are accessed only by authorized users while minimizing the risk of data breaches or cyberattacks targeting sensitive research data.
-
Trusted Networks
See moreThis article explains how to manage and configure the Trusted Network.When you define a Trusted Network, the Timus Connect Application is going to disconnect from the gateway automatically once any Trusted Networks have been detected. Once you switch to other Networks, which are not trusted, the Timus Connect is going to reconnect to the gateway automatically.- You can go to the Timus Manager -> Settings -> Configuration -> Trusted Network.
- Once you click on Create New, you will be able to see the configuration page of the Trusted Network.
- You can select the Network Type either Wired or Wireless.
- Once you select the Network Type as Wired, you need to set the Source MAC address.
- When you select the Network Type as Wireless, you need to set the BSSID.
- To be able to find the MAC addresses, you can use the scripts on both Windows or macOS.
Windows (The script must be run over PowerShell as administrator):
$string = (Get-NetAdapter | Select-Object InterfaceDescription, MediaType, ifIndex, Status | Where-Object { $_.Status -eq "Up" }| Sort-Object -Property ifIndex | Select -First 1).MediaType
if ($string -like "*.11*") {
$bssidOutput = netsh wlan show interfaces | Select-String "BSSID"
if ($bssidOutput.Count -gt 0){
$address=[regex]::Match($bssidOutput, '([0-9a-fA-F]{2}:){5}[0-9a-fA-F]{2}').Value
Write-Host("wireless",$address)
}else{
Write-Host("Error","Interface details not found for Wifi adaptor.")
}
}else{
$gateways = (Get-WmiObject -Class Win32_NetworkAdapterConfiguration | Where-Object { $_.IPEnabled -eq $true } | Select-Object -ExpandProperty DefaultIPGateway)
$arpOutput = 0
if ($gateways.Count -eq 1) {
$arpOutput = arp -a | Select-String -Pattern "^\s*$gateways\s+([0-9A-Fa-f]{2}-){5}[0-9A-Fa-f]{2}"
} elseif ($gateways.Count -gt 1) {
$gateway=$gateways[0]
$arpOutput = arp -a | Select-String -Pattern "^\s*$gateway\s+([0-9A-Fa-f]{2}-){5}[0-9A-Fa-f]{2}"
}
else {
Write-Host("Error","Gateways not found")
}
if ($arpOutput -ne 0){
if ($arpOutput.Count -eq 1) {
$address=[regex]::Match($arpOutput[0].ToString().Trim(), '([0-9a-fA-F]{2}-){5}[0-9a-fA-F]{2}').Value
Write-Host("wired",$address)
} elseif($arpOutput.Count -gt 1) {
$address=[regex]::Match($arpOutput[1].ToString().Trim(), '([0-9a-fA-F]{2}-){5}[0-9a-fA-F]{2}').Value
Write-Host("wired",$address)
} else {
Write-Host("Error","ARP details not found for the gateway.")
}
}
}macOS (the script must be run over Terminal):
- on macOS devices, sometimes, the script above may not work as expected and the result may be empty, this can be about EPP or AV. Therefore, you may consider using 2 different alternative scripts, which must be run over Terminal as well, below:
-
Once you run one of the scripts above you will find the MAC address, which you need,
- You need to enter it to the related field on the Trusted Network. Then, hit the Save button. enter the MAC address to the related field on the Trusted Network. Then, hit the Save button.
- As a final step, You need to enable the Trusted Network feature on the Agent Profiles as shown in the image below and click Confirm. Please note that this feature can be enabled on both Windows and macOS.
- If you created a new agent profile, It's important to note that when a new agent profile is created, the agent profile needs to be manually reordered and applied (dragged and dropped) in the hierarchy to ensure the new agent profile is applied.
Note: As part of the recent changes in macOS Sonoma, Apple has restricted access to the BSSID necessary for defining Wireless Trusted Networks. The Sonoma update now requires Location Services to be enabled to access BSSID information. This change has impacted how Trusted Networks are managed on macOS devices.
Consequently, for macOS Sonoma and later versions, the Trusted Network feature in Timus Connect will now utilize the SSID instead of BSSID. This change ensures compliance with Apple's updated privacy and security guidelines.
We recommend all macOS users and administrators to update their settings to use SSID for defining Trusted Networks. Although it is technically possible to enable Location Services to access BSSID, we are currently evaluating the potential legal and privacy implications of requesting such permissions.
For more details on how Apple's changes affect network management, please refer to discussions in the Apple Developer Forums, where even Apple engineers have acknowledged these changes.
You can find more details here: Apple Developer Forums. -
Custom Web Filter Ports
See moreThis article provides instructions on how to manage and configure the Custom Web Filter Ports.- To be able to manage and configure the Web Filter Ports, you need to go to the Timus Manager -> Sites -> hit the 3 dots at the end of the Gateway, of which web filter port numbers you would like to change.
- Once you click on 3 dots, you will be able to see the View page of the gateway, and you need to click on 3 dots at the right top of the page and follow the Custom Ports in order to manage the Web Filter ports.
- The Protocol can be either Custom HTTP or Custom HTTPS. By default, the HTTP port is 80 TCP and HTTPS port is 443 TCP.
- You are not allowed to delete the default ports, 80 TCP and 443 TCP, running over the Web Filter. However, you are fully allowed to customize and add more port numbers for both HTTP and HTTPS.