Windows Imaging in FileWave 15.5+: Secure NFS Tunneling and Fallback Options
What
In FileWave version 15.5.0, significant changes have been made to the Windows Imaging process using the Imaging Virtual Server (IVS). Previously, when imaging or capturing a Windows system, the device would mount NFS (Network File System) volumes directly over TCP/UDP port 2049. Starting with FileWave 15.5, the imaging process has been enhanced for security and reliability by establishingallowing the creation of a VPN tunnel over TCP/UDP port 20490. Over this secure VPN tunnel, the system accesses the NFS mounts, providing a more secure and efficient imaging environment.
However,This ifsecure issuesfunctionality arisewas withinitially theenabled newby VPNdefault, tunnelingbut method,from there16.2.0 onward it is adisabled fallbackby mechanismdefault that allows you to revert to the previous method of direct NFS mounting over port 2049. This ensures that imaging tasksand can continuebe withoutenabled interruption,or evendisabled ifvia thea VPN tunnel encounters problems in certain network environments.command.
When/Why
When to Use
DefaultimagingBehavior:isBysomethingdefault,youFileWavewant15.5tousesconsideraifVPNyoutunnelfrequently capture images of devices that have user data onportthem.20490 for all WindowsSecure imagingtasks.will FallbackpreventScenario:someone from grabbing an image from the IVS server. If youexperiencedon'tissuestypicallywithdoimagingthis,orandcapturingtypically use the IVS to simply capture base imagesdueandtodeployVPNthemtunnelingthenproblems,there is better performance if Secure Imaging is disabled. If you setup your IVS on version 16.2.0 then it will be disabled by default. If you were running an older IVS you mayneedseetoitrevertenabledto the direct NFS mounting method.
Secure
Why This Change Matters
Enhanced Security: Using a VPN tunnel adds an extra layer of security by encapsulating NFS traffic within a secure tunnel, protecting data during the imaging process.Improved Compatibility: The VPN tunnelbut canhelpeasilynavigatetogglenetworkitrestrictionsoff orfirewall rules that might block direct NFS traffic over port 2049.Operational Flexibility: Providing a fallback option ensures that imaging can continue smoothly, even if the new method encounters issueson incertain network configurations.
How
SwitchingEnabling toSecure the Fallback Mechanism: Direct NFS Mounting over Port 2049Imaging
IfYou youcan encounterenable issuesit with thethis default VPN tunneling method during Windows imaging, you can switch back to the previous method of direct NFS mounting. Follow these stepscommand on theFileWave Debian16.2.0 IVSor server:
Create the Fallback Flag File
Open a terminal on the IVS server and create a flag file to signal that secure tunneling should be disabled:beyond:
sudo touchimaging-control /etc/fw_insecure_nfs_mountenable secure-mount
sudo reboot
This
Disabling fileSecure tells the system to use direct NFS mounting instead of the VPN tunnel.
Update UFW Firewall RulesImaging
AllowYou trafficcan enable it with this command on portFileWave 2049,16.2.0 whichor is used by NFS:beyond:
sudo ufwimaging-control allowdisable 2049/tcpsecure-mount
sudo ufw allow 2049/udp
This updates the firewall to permit NFS communication over port 2049.
Restart Network Services
To apply the changes, restart all network-related services. The simplest method is to reboot the IVS server:
sudo reboot
Note: Rebooting ensures all services are restarted properly and the new settings take effect.
Reverting Back to Secure VPN Tunneling
Once any issues with VPN tunneling are resolved, you can switch back to the default secure method:
Remove the Fallback Flag File
Delete the flag file to re-enable secure tunneling:
sudo rm /etc/fw_insecure_nfs_mount
Remove UFW Firewall Rules for Port 2049
Close the ports that were opened for direct NFS access:
sudo ufw delete allow 2049/tcp
sudo ufw delete allow 2049/udp
This ensures that NFS traffic cannot bypass the VPN tunnel, maintaining a secure configuration.
Restart the IVS Server
Reboot the IVS server to apply the changes:
sudo reboot
This will restore the VPN tunneling over port 20490 for imaging tasks.
Important Considerations
Security Implications: Reverting to direct NFS mounting over port 2049 is less secure than using the VPN tunnel. Use this fallback option only when necessary and ensure that your network is secure.Firewall Configuration: Make sure that your network’s firewalls allow traffic over the necessary ports:
- Port 20490 for
VPNSecuretunneling (default method).Imaging. - Port 2049 for
NFSStandardif using the fallback method. Testing: After making changes, perform a test imaging task to confirm that everything is functioning as expected.Documentation: Keep a record of any changes made to the IVS server configuration for future reference and troubleshooting.Imaging.
Related Content
Digging Deeper
Secure Imaging Flag File
On FileWave less than 16.2.0 you can delete the flag file to enable Secure Imaging:
sudo rm /etc/fw_insecure_nfs_mount
sudo reboot
On FileWave less than 16.2.0 you can create the flag file to disable Secure Imaging:
sudo touch /etc/fw_insecure_nfs_mount
sudo reboot