Windows Imaging in FileWave 15.5+: Secure NFS Tunneling and Fallback Options
What
In FileWave version 15.5.0, significant changes have been made to the Windows Imaging process using the Imaging Virtual Server (IVS). Previously, when imaging or capturing a Windows system, the device would mount NFS (Network File System) volumes directly over TCP/UDP port 2049. Starting with FileWave 15.5, the imaging process has been enhanced for security and reliability by establishingallowing the creation of a VPN tunnel over TCP/UDP port 20490. Over this secure VPN tunnel, the system accesses the NFS mounts, providing a more secure and efficient imaging environment.
However,This ifsecure issuesfunctionality arisewas withinitially theenabled newby VPNdefault, tunnelingbut method,from there16.2.0 onward it is adisabled fallbackby mechanismdefault that allows you to revert to the previous method of direct NFS mounting over port 2049. This ensures that imaging tasksand can continuebe withoutenabled interruption,or evendisabled ifvia thea VPN tunnel encounters problems in certain network environments.command.
When/Why
When to Use
Secure
Why This Change Matters
How
SwitchingEnabling toSecure the Fallback Mechanism: Direct NFS Mounting over Port 2049Imaging
IfYou youcan encounterenable issuesit with thethis default VPN tunneling method during Windows imaging, you can switch back to the previous method of direct NFS mounting. Follow these stepscommand on theFileWave Debian16.2.0 IVSor server:
Create the Fallback Flag File
Open a terminal on the IVS server and create a flag file to signal that secure tunneling should be disabled:beyond:
sudo touchimaging-control /etc/fw_insecure_nfs_mountenable secure-mount
sudo reboot
This
Disabling fileSecure tells the system to use direct NFS mounting instead of the VPN tunnel.
Update UFW Firewall RulesImaging
AllowYou trafficcan enable it with this command on portFileWave 2049,16.2.0 whichor is used by NFS:beyond:
sudo ufwimaging-control allowdisable 2049/tcpsecure-mount
sudo ufw allow 2049/udpThis updates the firewall to permit NFS communication over port 2049.
Restart Network Services
To apply the changes, restart all network-related services. The simplest method is to reboot the IVS server:
sudo rebootNote: Rebooting ensures all services are restarted properly and the new settings take effect.
Reverting Back to Secure VPN Tunneling
Once any issues with VPN tunneling are resolved, you can switch back to the default secure method:
Remove the Fallback Flag File
Delete the flag file to re-enable secure tunneling:
sudo rm /etc/fw_insecure_nfs_mountRemove UFW Firewall Rules for Port 2049
Close the ports that were opened for direct NFS access:
sudo ufw delete allow 2049/tcp
sudo ufw delete allow 2049/udpThis ensures that NFS traffic cannot bypass the VPN tunnel, maintaining a secure configuration.
Restart the IVS Server
Reboot the IVS server to apply the changes:
sudo rebootThis will restore the VPN tunneling over port 20490 for imaging tasks.
Important Considerations
Firewall Configuration: Make sure that your network’s firewalls allow traffic over the necessary ports:
- Port 20490 for
VPNSecuretunneling (default method).Imaging. - Port 2049 for
NFSStandardif using the fallback method.
Related Content
Digging Deeper
Secure Imaging Flag File
On FileWave less than 16.2.0 you can delete the flag file to enable Secure Imaging:
sudo rm /etc/fw_insecure_nfs_mount
sudo reboot
On FileWave less than 16.2.0 you can create the flag file to disable Secure Imaging:
sudo touch /etc/fw_insecure_nfs_mount
sudo reboot