+

Search Tips  |   Advanced Search

Frequently Asked Questions

FAQs for Secure Gateway might include questions about automation or logs. To find all FAQs for IBM Cloud, see our FAQ library. {: shortdesc}


What layer of the OSI model does the Secure Gateway service represent?

The Secure Gateway service represents layer 4 of the OSI model.


What version of TLS does the Secure Gateway service support?

The Secure Gateway service supports TLS version 1.2.


Why would I disable my gateway or destination?

You might want to disable a destination or gateway for one of the following reasons:

For more information on disabling a gateway or a destination, see how to manage your Secure Gateway service instance.


What is the recommended approach to creation automation across multiple spaces?

For example, your environment has one org and three spaces. One space is for development, another for staging, and the final one for production. Should you create a single Secure Gateway instance or multiple (that is, one for each space)? If we can create multiple gateways, are there any considerations for reusing a Node.js application to create a gateway and destination in each space?

The approach is as follows:


What is the recommended approach to creation automation across multiple orgs?

Consider an environment that has three orgs: one for development, one for staging, and one for production. Is a Secure Gateway service instance required for each org and is the configuration available to all spaces within that org?

For automation across orgs, the approach is as follows:


Does my app need to be in the same space?

Do I need to run the Node.js app in the same IBM Cloud space as the Secure Gateway service? No, you do not need to run your app in the same IBM Cloud space as the Secure Gateway service.


Can a Secure Gateway client handle two gateways on the same machine?

Yes. For a client to handle two gateways, you can specify multiple connections through the command line as shown in this excerpt from Startup Argument Examples:

node lib/secgwclient.js <gateway_id_1> <gateway_id_2> -t <security_token_1>--<security_token_2>


Can I retrieve error level logs for the Secure Gateway server?

Error level logs on the server cannot be retrieved. Only errors that are made at the time of the request can be seen.


Where can I find the client logs for the Secure Gateway client?

By default, the client logs can be found at the following locations:

We can change the location by using the -p option when starting the Secure Gateway client. See also Startup Arguments and Options.


What are the functional states of Secure Gateway?

The different lifecycle states of gateways and destinations are as follows:


Non-functional State

The 1.7.0 release introduced a new tiered plan pricing model. With this model came the ability to mark both Gateways and Destinations as 'Active' or 'Inactive'. Part of the new plan billing structure charges the user for the number of Gateways and Destinations that they have.

When you downgrade the plan, it will update all gateways to be inactive, all provisioned cloud port of the destinations will be reset. If you want to reactivate your gateway, you can click the wrench button in the gateway panel to configure the Non-functional State. For details, see Reactivate gateway.


Functional States

When a gateway or destination is marked active it will be billed. Active states for Gateways and Destinations are below:


How do I know the data activities on the Secure Gateway Client?

On SecureGateway Client, change the log level to TRACE to know the data activities on the client. The following information will be displayed after requests are sent.

Data size sent from request application:

[TRACE] Connection #<connection ID> transmitted data: <size> bytes

Data size sent from destination:

[TRACE] Connection #<connection ID> received data: <size> bytes


How do I get the amount of the real-time connections on Secure Gateway?


To get connections information such as the amount of the real-time connections, the data size sent and received from Secure Gateway Client, do the following:

The following connection statistics would be displayed:

Note: This connections information is on Client level, not in Gateway level. If you need connections information in Gateway level, please check each Client which connected to that Gateway.


How many concurrent connections can Secure Gateway handle?

If the connections are being rejected or having latency, the connections might be exceeding concurrent connections limit.

The Secure Gateway can handle only 250 concurrent connections. For details, see Limitations.

For SG client v186 and later, there will be error shown in SG client log in each 30 seconds when the concurrent connections exceed the limit on cloud side.


What are the recommended configurations to make my connections more secure?

Set these configuations to make connections more secure:


Reject unauthorized

To protect against Man-in-the-middle attack, reject connections to the resource which is not authorized with the list of supplied CAs. On the Resource Authentication, check the box Reject unauthorized, then upload the certificate if the certificate of the resource is self-signed. Please see Cloud/On-Premises Authentication for more information.


Use Mutual Authentication

Enable Mutual Authentication for both sides of on-premise destinations makes Secure Gateway more secure. On User Authentication side, enable mutual authentication to restrict the access of Secure Gateway cloud node by authenticating using a client certificate when the request is over TLS/HTTPS. On Resource Authentication side, enable mutual authentication to provide appropriate credential when connecting to destination endpoint, and ensure secure/encrypted access to on-premise resource. Please see Configuring Mutual Authentication and Node.js TLS Mutual Authentication for more information.


Set IP Table Rules (For on-premises destination)

The Secure Gateway cloud host and port of an on-premises destination is in the public space; therefore it is allowed everyone to access by default. To control the traffic accessing on Secure Gateway, set iptables rules to only allow access by a specific range of IPs and ports to secure on-premises resources. Please see IP Table Rules for more information about how to configure the iptables rules on Secure Gateway.


Configure Access Control List (For on-premises destination)

Configure Access Control List support to allow or restrict access to on-premises resources would make the on-premises destinations more secure by specifying the access right on the specific destination host and port. It is recommended to define the allowed or restricted HTTP/S routes on the ACL entries as well to enhance the security of on-premises destination. Please see Access Control List and HTTP/S Route Control using the ACL for more information.


Set password on the Secure Gateway Client UI

It is recommended to set the UI password to restrict the access of the Secure Gateway Client UI. Please see Interacting with the Client for more details about how to set the password using startup configuration or interactive commands on Secure Gateway Client terminal command line.


What is gateway migration? Why is the domain changed after 2018 December?

After 2018 December maintenance, the cloud host of Secure Gateway is getting renamed to use the securegateway.appdomain.cloud instead of integration.ibmcloud.com, and use the securegateway.cloud.ibm.com for gateway authentication instead of bluemix.net. For backward compatibility, the existing gateway will keep using the old domain until the gateway is migrated, and the SG client v180fp9 and former will keep using bluemix.net for gateway authentication. To support this change, there is a migrate button on the gateway panel.

After the migration, the cloud host of the on-premises destinations will change to use the new domain, the users/applications will need to update to send the request to the new cloud host.

Currently the migration is not mandatory and there is not an exact date about when the old domain will be out of support, but once this is settled, the customer who are still using the old domain name will be notified.


Where can I receive Secure Gateway notifications, especially for disruptive maintenance?

We can get notifications via our status page.

When the Secure Gateway client disconnected unexpectedly, please go to the status page to check whether there is disruptive maintenance at that time.


How can we avoid manually restart after the disruptive maintenance?

If the maintenance needs to have disruption over 10 minutes, then you might need to manually restart the Secure Gateway client to reconnect to the Secure Gateway server after the maintenance. In this case, you can use the startup options --service when starting up the Secure Gateway client, such that the parent process of the Secure Gateway client will restart within 60s if all child clients are terminated. Beside that, you can also use the startup options --reconnect to define the reconnect attempts after the connection between Secure Gateway client and Secure Gateway server drop.

Normally, the service downtime will be equal to or less than 10 minutes, the Secure Gateway client (after version v180) should be able to reconnect to the Secure Gateway server automatically.


How do I run the Secure Gateway client as a daemon on AIX?

To run the Secure Gateway client as a daemon, you use forever along with a script to start the Secure Gateway client as a background process on AIX. Steps and details are in the AIX section of Configuring Auto-start for the Client.


How can I capture the Secure Gateway Client logs on DataPower?

The event category of Secure Gateway Client logs is sgclient. We can create a log target to write the logs with specific event category to a file on DataPower. Following is an example:


Which ports does the Secure Gateway client use?

The Secure Gateway Client uses outbound port 443 and port 9000 to connect to npm registry and the IBM Cloud environment. See Network requirements for details.


Does the Secure Gateway server support High Availability?

The server does not support High Availability (HA) nor provide redundancy. To avoid interruption during planned maintenance or outages, you could use the gateway server in another region. We can achieve HA with multiple client connections to the same gateway ID as allowed by your Secure Gateway Service Plan. For additional information, see High Availability.


What should I do when the security token is expired?

The security token could be regenerated in the edit board of the gateway panel, you can click the link Regenerate Token which next to Token Expiration to regenerate the token. The Save button cannot be used to regenerate the token. For additional information, see Regenerate security token