Planet CS-2001 Manual do Utilizador Página 1

Consulte online ou descarregue Manual do Utilizador para Comunicação Planet CS-2001. PLANET CS-2001 User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 848
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
CS-2001 UTM Content Security Gateway User’s Manual
0
Users Manual
CS-2001
UTM Content Security Gateway
Vista de página 0
1 2 3 4 5 6 ... 847 848

Resumo do Conteúdo

Página 1 - UTM Content Security Gateway

CS-2001 UTM Content Security Gateway User’s Manual 0 User’s Manual CS-2001 UTM Content Security Gateway

Página 2

9 Hardware Installation Front panel: Figure 1a. Front Panel of the CS-2001 Rear panel: Figure 1b. Rear Panel of the CS-2001  Power Indi

Página 3

89 Figure 3-4 Configuring the Static IP Address Figure 3-5 Setting Completed

Página 4 - Revision

90 Figure 3-6 Configuring the Dynamic IP Address Figure 3-7 Setting Completed

Página 5 - Table of Contents

91 Figure 3-8 Configuring the PPPoE Figure 3-9 Setting Completed

Página 6

92 Note: 1. The DNS Settings may be configured under Network > Settings. 2. When Ping, HTTP and HTTPS are enabled, the users may access the CS

Página 7

93 3.1.3 Using CS-2001 as a Gateway for Users on Two Subnets to Access the Internet (NAT/Routing) Prerequisite Setup (Note: IP Addresses used as ex

Página 8

94 Figure 3-10 Configuring the LAN Interface

Página 9 - Quick Installation Guide

95 Step 2. Go to Network > Interface and then set as below:(Figure 3-11)  Click Port3’s Modify button.  Select LAN for Interface Type.  Sele

Página 10 - Hardware Installation

96 Step 3. LAN1 and LAN2 users will connect to WAN1(61.11.11.11) and use WAN1’s IP address to access the Internet. You may create the policy to estab

Página 11 - CS-2001 Topology:

97 3.1.4 Using CS-2001 as a Gateway for the Internal Users to Access the Internet and Configure the DMZ for the External Users to Access the Network

Página 12 - Basic System Configuration

98 Figure 3-13 Configuring the LAN Interface

Página 13

CS-2001 UTM Content Security Gateway User’s Manual 0 LED / Port Description WAN LAN DMZ LED1(Left) Orange Steady on indicates the port is connec

Página 14 - Figure5. The Install Wizard

99 Step 2. Go to Network > Interface and then set as below:(Figure 3-14)  Click Port3’s Modify button.  Select DMZ for Interface Type.  Sele

Página 15 - Figure7. Interface Settings

100 Step 3. The external users may connect to the web server (61.11.11.12) to access the network resource. The LAN users may connect to WAN1 (61.11.1

Página 16 - Figure8. The WAN Settings

101 3.1.5 Deploying the CS-2001 between the Gateway and LAN (configuring two subnets, one using Transparent Routing, the other one using NAT/Routing

Página 17 - Figure9. Time Settings

102 Step 1. Go to Network > Interface and then set as below:(Figure 3-16)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Página 18

103 nterface Settings Step 3. LAN1 users (192.168.1.x/24) and LAN2 users (192.168.2.x/24) may use their original IP addresses to access the Internet

Página 19 - Step 11. Settings complete

104 Figure 3-18 The deployment of LAN Using Transparent Routing and NAT/ Routing

Página 20 - S.1 Overview of Functions

105 3.1.6 Deploying the CS-2001 between the Gateway and the LAN (LAN1 and DMZ1), connecting LAN1 to the user’s PC (using NAT/Routing mode) and then

Página 21

106 Step 1. Go to Network > Interface and then set as below:(Figure 3-19)  Click Port1’s Modify button.  Select LAN for Interface Type.  Sel

Página 22

107 Figure 3-20 DMZ Interface Settings Step 3. Go to Network > Interface Group and then set as below:(Figure 3-21)  Configure Port2(WAN1) and Po

Página 23

108 Step 4. PCs (IP range: 172.16.x.x/16) on DMZ may use the original address to access the Internet through CS-2001. PCs on LAN will connect to WAN1

Página 24

1 Basic System Configuration Step 1. Connect both the IT administrator’s PC and the device’s LAN port to the same hub / switch, and launch a browser

Página 25

109 Note: 1. PCs in DMZ will access the Internet via the original firewall. 2. If Port4 is configured as WAN2 (211.22.22.22) and connected to the

Página 26

110 3. Configure a router to connect different subnets in LAN for the PCs to access the Internet through the original firewall. PCs in DMZ may using

Página 27

111 4. Configure two Firewall to connect the Internet and the CS-2001 and then configure a router to connect the CS-2001 and DMZ (192.168.2.1/24 and

Página 28 - Chapter 1 Administration

112 3.1.7 Deploying CS-2001 between the Gateway and LAN (LAN1 and DMZ1) for LAN Users and DMZ Users to Access the Internet Prerequisite Setup (Note

Página 29 - Terms in Admin

113 Step 1. Go to Network > Interface and then set as below:(Figure 3-26)  Click Port1’s Modify button.  Select WAN for Interface Type.  Sel

Página 30 - 1.1 Admin

114 Step 2. Under Network > Interface, set as below:(Figure 3-27)  Click Port2’s Modify button.  Select LAN for Interface Type.  Select Tran

Página 31

115 Step 3. Under Network > Interface and then set as below:(Figure 3-28)  Click Port3’s Modify button.  Select WAN for Interface Type.  Sel

Página 32 - 1.2 Permitted IPs

116 Step 4. Under Network > Interface, set as below:(Figure 3-29)  Click Port4’s Modify button.  Select DMZ for Interface Type.  Select Tran

Página 33 - 1.3 Logout

117 Step 6. Users connecting to Port2(LAN1) will use 192.168.1.x/24 to access the Internet. Users on Port4(DMZ1) will use the IP address that distrib

Página 34 - (Figure 1-6)

118 3.1.8 Using the CS-2001 Device as the Gateway and Connecting it to the LAN (There are Two LAN Interface, One Use NAT/Routing, the Other One Use

Página 35 - 1.4 Updating Software

2 Step 3. The user interface consists of the following two panels:  Menu Panel: Presents all the available system configurations in a tree direct

Página 36 - Chapter 2 Configuration

119 Step 1. Go to Network > Interface and set as below:(Figure 3-32)  Click Port1’s Modify button.  Select WAN for Interface Type.  Select t

Página 37 - Terms in Setting

120 Step 2. Go to Network > Interface and then set as below:(Figure 3-33)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Página 38

121 Step 4. Go to Network > Interface Group and then set as below:(Figure 3-35)  Configure Port1(WAN1), Port2(LAN1) and Port3(LAN2) as Group 1.

Página 39 - Terms in Multiple Subnet

122 Step 5. PCs under sales department (LAN1) and PCs under support department (LAN2) are on 192.168.1.x/24. They will connect to WAN1 and use WAN1’s

Página 41

124 Policy Object

Página 42

125 Chapter 4 Address In Address, the IT administrator may configure network settings of LAN, WAN and DMZ, as well as designate specific addresses

Página 43 - Terms in Host Table

126 Terms in Address Name  An easily identifiable name to represent the IP address or addresses. Address type  Used to designate the IP range a

Página 44 - Terms in SNMP

CS-2001 UTM Content Security Gateway User’s Manual 127 FQDN(Fully Qualified Domain Name)  The FQDN consists of two parts: the hostname and the dom

Página 45 - Terms in Bulletin Board

128 4.1 Example No. Settings Scenario Page 4.1.1 LAN Using DHCP to Grant Only FTP Access to a LAN User with Specific IP Address 129 4.1.2

Página 46 - 2.1 Settings

3 Step 4. If it’s the first time you’ve logged into the management interface, an install wizard will appear to guide you through setting some of the

Página 47

129 4.1.1 Using DHCP to Assign an IP to a Specific User and only Permitting FTP Access Step 1. Under Policy Object > Address > LAN, set as bel

Página 48 - Formatting the Hard Drive

130 Note: 1. To save the configured data from Policy Object > Address > WAN / LAN / DMZ as a file for storage or modification, use Export da

Página 49

131 Step 2. Go to Policy > Outgoing and configure as below:(Figure 4-3)  Source Address: Select the source address.  Service : Select FTP. 

Página 50 - 2.1.5 Rebooting the CS-2001

132 4.1.2 Creating a Policy for Certain Users to Connect to a Specific IP Address Step 1. Create several addresses under Policy Object > Address

Página 51 - 2.2 Date / Time

133 Step 2. Under Policy Object > Address > LAN Group, set as below:(Figure 4-6)  Click New Entry.  Name: Designate a name for the group. 

Página 52 - Access the Internet

134 Step 3. Go to Policy Object > Address > WAN and configure as below:(Figure 4-8)  Click New Entry.  Name: Designate a name for the group

Página 53

135 Step 4. Go to Policy > Outgoing and configure as below:(Figure 4-10)  Source Address: Select the LAN address group.  Destination Address:

Página 54

136 Chapter 5 Service TCP and UDP protocols provide different services. These services have an associated port number, for example Telnet = 23, FTP

Página 55

137 Terms of Service Pre-Defined Symbol Description Any service Services using the TCP protocol: AFPoverTCP, AOL, BGP, FINGER, FTP, GOPH

Página 56 - (Figure 2-13, 2-14)

138 5.1 Example of Pre-defined 5.1.1 Creating a Policy to Permit WAN Users Using VoIP Technology to Communicate with LAN Users (Using VoIP Port Num

Página 57

4 Important: 1. Any data saved on the interface will be saved as the selected default character encoding if the device is unable to recognize the

Página 58

139 Step 2. Go to Policy Object > Service > Custom and then configure as below:(Figure 5-3)  Name: Type in a name for the service.  In row

Página 59 - (Figure 2-15)

140 Step 3. Go to Policy Object > Virtual Server > Port Mapping and use settings you created in Policy Object > Service > Custom. (Figure

Página 60 - (Figure 2-17, 2-18)

141 Step 5. Go to Policy > Outgoing and configure as below:(Figure 5-8)  Source Address: Select the LAN group.  Service: Select the custom ser

Página 61

142 5.2 Example of Service Group 5.2.1 Creating a Policy with a Service Group to Limit Specific LAN Users to Access Only Certain Internet Service

Página 62

143 Figure 5-11 The Added Service Group

Página 63 - (Figure 2-19)

144 Step 2. Go to Policy Object > Address > LAN Group and create a LAN Group of specific LAN users that are only permitted to access certain se

Página 64

145 Figure 5-14 The Completed Policy Settings

Página 65 - (Figure 2-23)

146 Chapter 6 Schedule Schedule is used for regulating the activation time of policies. With its help, the IT administrator may determine a specifi

Página 66 - 2.4 Route Table

147 Terms in Schedule Name  Designates the name of the schedule. Type  Two modes are provided:  Recurring: Based upon a weekly schedule,

Página 67

148 6.1 Example 6.1.1 Assigning Daily Internet Access Time Slots for LAN Users Step 1. Under Policy Object > Schedule > Settings, set as belo

Página 68

5 Step 7. Configure theWAN Interface (please refer to your ISP for the settings).  Setting: Select Port2(WAN1)  Interface: Select WAN  Connecti

Página 69 - (Figure 2-28)

149 Step 2. Under Policy > Outgoing, set as below:(Figure 6-3)  Select the pre-defined schedule for Schedule.  Click OK.(Figure 6-4) Figure 6

Página 70 - 2.5 DHCP

150 Chapter 7 QoS QoS provides bandwidth management for LAN users accessing the Internet via the CS-2001. When applied with a Policy, it ensures us

Página 71 - CS-2001

151 Terms in Settings Name  The name of the QoS setting. Port  The WAN port to apply QoS. Downstream Bandwidth  Determines the guaranteed ba

Página 72 - (Figure 2-30)

152 7.1 Example 7.1.1 Creating a Policy to Limit Upload and Download Bandwidth Step 1. Under Policy Object > QoS > Settings, set as below:(F

Página 73 - Figure 2-30 DHCP Settings

153 Figure 7-4 The Completed QoS Settings

Página 74

154 Step 2. Under Policy > Outgoing, set as below:(Figure 7-5)  Select the pre-configured QoS setting.  Click OK.(Figure 7-6) Figure 7-5 Appl

Página 75 - 2.6 DDNS

155 Figure 7-6 The Completed Policy Setting Note: 1. Under Policy Object > QoS > Settings, the available bandwidth range, such as G. Bandw

Página 76 - 2.7 Host Table

156 Chapter 8 Authentication Authentication regulates users access to the Internet. CS-2001 offers five authentication modes, namely User, Group, R

Página 77 - 2.8 SNMP

157 Terms in Authentication Authentication Management  Provides basic settings for managing authentication:  Authentication Port Number: The por

Página 78 - 2.8.2 SNMP Trap Settings

158 Figure 8-1 Authentication Management Settings

Página 79 - 2.9 Bulletin Board

6 Step 8. Tick the Synchronize to an NTP Server box to ensure the system is provided with the accurate time. Figure9. Time Settings Step 9. Enab

Página 80 - DMZ/ DMZ Group

159  The authentication login screen appears after a user attempts to access a web site:(Figure 8-2) Figure 8-2 The Authentication Login Screen 

Página 81

160 Note: 1. The Allow password modification mechanism is only applicable to authenticated users. 2. The authentication login screen appears afte

Página 82 - (Figure 2-41, 2-42)

CS-2001 UTM Content Security Gateway User’s Manual 161 LDAP User Name Lists the LDAP User Name from LDAP server. The user name may be grouped for au

Página 83 - 2.10 Language

162 8.1 User / Group Authentication 8.1.1 Regulating Internet Access with a Policy Step 1. Go to Policy Object > Authentication > Account, a

Página 84 - Interface

163 Step 2. Under Policy Object > Authentication > Group, set as below:(Figure 8-5)  Click New Entry.  Group Name: Type a name for the gr

Página 85 - Chapter 3 Interface

164 Step 3. Go to Policy > Outgoing and configure as below:(Figure 8-6)  Authentication: Select the group name that was configured in the previo

Página 86 - Terms in Interface

165 Step 4. The authentication login screen is displayed in the web browser when a LAN user tries to access the Internet. Internet access will be ava

Página 87

166 8.2 RADIUS Authentication 8.2.1 Regulating Internet Access with a Policy – An Example using the RADIUS Server from Windows Server 2003 ※ Th

Página 88

167 Step 3. The Internet Authentication Service.(Figure 8-11) Figure 8-11 Selecting the Internet Authentication Service Step 4. Go to Start >

Página 89

168 Step 5. Right-click RADIUS Clients and then click New RADIUS Client.(Figure 8-13) Figure 8-13 Adding a RADIUS Client Step 6. Type a name and th

Página 90

7 Note: 1. Go to Policy > Outgoing and configure as below:  Source Address: Select Inside_Any  Destination Address: Select Outside_Any  S

Página 91

169 Figure 8-14 Typing a Friendly Name and the Management Address

Página 92

170 Step 7. Select RADIUS Standard from the Client-Vendor dorp-down list, and then configure the Shared secret and Confirm shared secret as same as t

Página 93

171 Figure 8-16 Adding a Remote Access Policy

Página 94 - Terms in Interface Group

172 Step 9. Select Use the wizard to set up a typical policy for a common scenario and then type a name in the Policy name field.(Figure 8-17) Figur

Página 95 - 3.1 Example

173 Step 10. Select Ethernet.(Figure 8-18) Figure 8-18 Selecting the Access Method

Página 96

174 Step 11. Select User.(Figure 8-19) Figure 8-19 Selecting User or Group Access Step 12. Select MD5-Challenge from the drop-down list.(Figure 8-

Página 97 - UI from LAN

175 Step 13. Right-click the newly added policy name and then click Properties.(Figure 8-21) Figure 8-21 Configuring the Properties of a Policy

Página 98

176 Step 14. Select Grant remote access permission and then remove the existing settings. Next, click Add….(Figure 8-22) Figure 8-22 Configuring th

Página 99

177 Step 15. Select Service-Type to add.(Figure 8-23) Figure 8-23 Select the Attribute Type Step 16. Select Authenticate Only and Framed from the

Página 100 - Figure 3-5 Setting Completed

178 Step 17. Click on the Edit Profile…, then click the IP tab and then tick Server settings determine IP address assignment.(Figure 8-25) Figure 8

Página 101 - Figure 3-7 Setting Completed

8 Step 11. Settings complete. Figure13. Installation Wizard Completed

Página 102 - Figure 3-9 Setting Completed

179 Step 18. Click on the Edit Profile… button then click on the Authentication tab. Tick Microsoft Encrypted Authentication version 2 (MS-CHAP v2),

Página 103

180 Step 19. Click on the Edit Profile…, click the Advanced tab and then click Add….(Figure 8-27) Figure 8-27 Configuring the Advanced Settings

Página 104 - (Figure 3-10)

181 Step 20. Select Framed-Protocol and click Add.(Figure 8-28) Figure 8-28 Adding the Attribute

Página 105

182 Step 21. For Framed-Protocol, select PPP from the Attribute value drop-down list.(Figure 8-29) Figure 8-29 Attribute Setting 1 Step 22. For S

Página 106 - (Figure 3-11)

183 Step 23. Go to Start > Settings > Control Panel > Administrative Tools, then select Computer Management.(Figure 8-31) Figure 8-31 Sele

Página 107 - (Figure 3-12)

184 Figure 8-32 Adding a User

Página 108 - (Figure 3-13)

185 Step 25. Settings completed. Step 26. Under Policy Object > Authentication > RADIUS, configure each field to be the same as the settings

Página 109

186 Step 28. Under Policy > Outgoing, set as below:(Figure 8-35)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Página 110 - Interface settings

187 8.3 POP3 Authentication 8.3.1 Regulating Internet Access with a Policy – An Example of POP3 Step 1. Under Policy Object > Authenticat

Página 111 - (Figure 3-15)

188 Figure 8-39 Adding POP3 User to an Authenticated Group

Página 112 - Internet

1 Copyright Copyright© 2012 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

Página 113

9 S.1 Overview of Functions Category Configurable Settings Description Index System Administration Admin Creates, modifies or removes adminis

Página 114 - (Figure 3-18)

189 Step 3. Under Policy > Outgoing, set as below:(Figure 8-40)  Authentication: Select the user group.  Click OK.(Figure 8-41) Figure 8-40 U

Página 115

190 8.4 LDAP Authentication 8.4.1 Regulating Internet Access with a Policy - An Example of Windows Server 2003 Built-in LDAP Server ※ The Con

Página 116

191 Step 3. In the Preliminary Steps window, click Next.(Figure 8-44) Figure 8-44 Preliminary Steps Step 4. In the Server Role window, select Dom

Página 117 - (Figure 3-20)

192 Step 5. In the Summary of Selections window, click Next.(Figure 8-46) Figure 8-46 Summary of Selections Step 6. In the Active Directory Insta

Página 118 - (Figure 3-21)

193 Step 7. In the Operating System Compatibility window, click Next.(Figure 8-48) Figure 8-48 Operating System Compatibility Step 8. In the Domain

Página 119 - (Figure 3-22)

194 Step 9. In the Create New Domain window, select Domain in a new forest and click Next.(Figure 8-50) Figure 8-50 Creating a New Domain Step 10.

Página 120 - (Figure 3-23)

195 Step 11. In the NetBIOS Domain Name window, type a Domain NetBIOS name and then click Next.(Figure 8-52) Figure 8-52 The NetBIOS Domain Name St

Página 121 - (Figure 3-24)

196 Step 13. In the Shared System Volume window, specify the Folder location and then click Next.(Figure 8-54) Figure 8-54 The Shared System Volume

Página 122 - (Figure 3-25)

197 Step 15. In the Permissions window, select Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems and then click

Página 123

198 Step 17. In the Summary window, click Next. (Figure 8-58) Figure 8-58 The Summary Step 18. Settings completed.(Figure 8-59) Figure 8-59 Sett

Página 124 - (Figure 3-26)

10 LAN and DMZ users. Installation Wizard For quick installation and configuration. Language Available languages include Traditional Chinese, Simp

Página 125 - (Figure 3-27)

199 Step 19. Go to Start > Programs > Administrative Tools > Active Directory Users and Computers.(Figure 8-60) Figure 8-60 Navigating to

Página 126 - (Figure 3-28)

200 Step 21. In the New Object–User window, apply your information to the fields, and then click Next.(Figure 8-62) Figure 8-62 New Object – User S

Página 127 - Important:

201 Step 23. User has been successfully created.(Figure 8-64) Figure 8-64 User Successfully Created Step 24. Go to Policy Object > Authenticat

Página 128 - (Figure 3-31)

202 Step 25. Go to Policy Object > Authentication > Group, then add LDAP User.(Figure 8-66) Figure 8-66 Adding the LDAP User

Página 129

203 Step 26. Under Policy > Outgoing, set as below:(Figure 8-67)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Página 130 - (Figure 3-32)

204 Chapter 9 Application Blocking Application Blocking regulates the control of Instant Messenger Login, File Transfer over IM, Peer-to-Peer Shari

Página 131

205 Terms in Application Blocking Application Signatures Settings  The application signatures are updated hourly. Alternatively, they can be manua

Página 132

206 VPN Tunneling  Regulates the online usage of VNN Client, Ultra-Surf, Tor, Hamachi, HotSpot Shield and FreeGate. Remote Controlling  Regulate

Página 133 - (Figure 3-36)

207 9.1 Example No. Example Scenario Page 9.1.1 IM Regulating the Use of IM Software ─ Messaging and File Transferring 208 9.1.2 P2P

Página 134

208 9.1.1 Regulating the Use of IM Software ─ Messaging and File Transferring Step 1. Go to Policy Object > Application Blocking > Settings

Página 135 - Policy Object

11 Web-based mail, online gaming, VPN Tunneling, and remote controlling. Virtual Server Mapped IPs Maps an internal host to an external IP address

Página 136 - Chapter 4 Address

209 Figure 9-2 Settings Completed

Página 137 - Terms in Address

210 Step 1. Under Policy > Outgoing, set as below:(Figure 9-3)  Application Blocking: Select the name of the Application Blocking setting.  Cl

Página 138

211 9.1.2 Regulating the Use of P2P Software - Downloading and Uploading Step 1. Under Policy Object > Application Blocking > Settings, set

Página 139 - 4.1 Example

212 Figure 9-6 Settings Completed

Página 140 - Permitting FTP Access

213 Step 2. Under Policy > Outgoing, set as below:(Figure 9-7)  Application Blocking: Select the name of the Application Blocking Setting.  Cl

Página 141

214 Chapter 10 Virtual Server Virtual server provides services to external users by mapping a real IP address from a WAN port on the CS-2001 to a p

Página 142 - : Select FTP

215 Terms in Virtual Server WAN IP  The real IP address of the WAN. Map to Virtual IP  The private network address of a server in the LAN.

Página 143 - Specific IP Address

216 10.1 Example No. Settings Scenario Page 10.1.1 Mapped IPs Using a Server to Provide FTP, Web and Mail Services through the Regulation of a

Página 144 - Note:

217 10.1.1 Using a Server to Provide FTP, Web and Mail Services through the Regulation of a Policy Step 1. Setup a server in the LAN which provides

Página 145

218 Step 4. Go to Policy Object > Service > Group, and create a group called Main_Service containing all of the server’s services e.g. DNS, FTP

Página 146

12 Personal Rule spam filtering is applied in the following order: Greylist Filtering > Personal Rule, Global Rule > Whitelist > Blacklist

Página 147 - Chapter 5 Service

219 Step 6. Under Policy > Outgoing, set as below: (Figure 10-6)  Source Address: Select the LAN address.  Service: Select Mail_Service.  Cl

Página 148 - Terms of Service

220 Step 7. The completed settings.(Figure 10-8) Figure 10-8 The Server Providing Multiple Services Note: 1. It is strongly recommended not to s

Página 149 - 5.1 Example of Pre-defined

221 10.1.2 Using Multiple Virtual Servers to Host a Web Site through the Regulation of a Policy Step 1. Set up multiple web servers in the LAN us

Página 150

222 Figure 10-9 Setting Virtual IP Figure 10-10 The Completed Virtual IP Settings

Página 151

223 Step 3. Under Policy > Incoming, set as below:(Figure 10-11)  Destination IP: Select the Virtual IP setting.  Service: Select HTTP(8080) 

Página 152

224 Step 4. Settings completed.(Figure 10-13) Figure 10-13 Multiple Servers Hosting a Single Website

Página 153 - POP3, SMTP and DNS)

225 10.1.3 A VoIP Session Between an External and Internal User (VoIP Ports: TCP 1720, TCP 15321-15333 and UDP 15321-15333) Step 1. Configure inter

Página 154

226 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-16)  Name : Enter the name for the Virtual IP settin

Página 155

227 Step 5. Under Policy > Incoming, set as below:(Figure 10-18)  Destination IP: Select the vitual server setting.  Service: Select the custo

Página 156

228 Step 6. Under Policy > Outgoing, set as below:(Figure 10-20)  Source IP: Select the address setting.  Service: Select the service setting.

Página 157 - Chapter 6 Schedule

13 IDP Reports Settings Provides statistics in the form of graphs and logs. Statistics can be sent to the specific recipient periodically and logs

Página 158 - Terms in Schedule

229 Step 7. A VoIP session created between an internal and external user.(Figure 10-22) Figure 10-22 The Completed VoIP Setup

Página 159 - 6.1 Example

230 10.1.4 Using Multiple Virtual Servers to Provide HTTP, POP3, SMTP and DNS Services through the Regulation of a Policy Step 1. Set up multiple s

Página 160

231 Figure 10-25 A Created Group Service

Página 161 - Chapter 7 QoS

232 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-26)  Name: Enter the name for the setting.  Server

Página 162 - Terms in Settings

233 Step 5. Go to Policy > Incoming and then set as below:(Figure 10-28)  Select the virtual server setting for Destination IP.  Select Main_S

Página 163 - 7.1 Example

234 Step 6. Go to Policy > Outgoing and set as below:(Figure 10-30)  Select the defined rule from the Source Address drop-down list.  Select M

Página 164

235 Step 7. Settings completed.(Figure 10-32) Figure 10-32 Settings Completed

Página 165 -  Click OK.(Figure 7-6)

236 Chapter 11 VPN To obtain a private and secure network link, the CS-2001 is capable of establishing VPN connections. When used in combination wi

Página 166

237 Terms in VPN Diffie-Hellman  A cryptographic protocol that allows two parties that have no perior knowledge of each other to establish a share

Página 167 - Chapter 8 Authentication

238 AH ( Authentication Header )  The Authentication Header guarantees connectionless integrity and data origin authentication of IP datagrams.

Página 168 - Terms in Authentication

14 Virus-infected IP Displays a list of IP addresses detected as having an anomaly flow. Advanced Inbound Balancing Settings For distributing inbo

Página 169

239 Extended Authentication (XAuth)  XAuth provides an additional level of authentication. It uses a Request/ Reply mechanism to provide the extend

Página 170

240 Terms in One-Step IPSec One-Step IPSec  One-Step IPSec merely takes one step to complete settings  Go to Policy Object > VPN > One-Ste

Página 171

241 Figure 11-3 The Automatically Created IPSec Policy Figure 11-4 The Corresponding Outgoing Policy Figure 11-5 The Corresponding Incoming Poli

Página 172 - LDAP User Name

242 Terms in VPN Wizard: VPN Wizard  It simplifies the settings of a VPN connection.  Under Policy Object > VPN > VPN Wizard, set as below

Página 173

243 Figure 11-9 Applying Available VPN Trunk to the Policy Figure 11-10 Setting Completed Figure 11-11 An Outgoing Policy Completed Figure 11

Página 174 - (Figure 8-5)

244 Terms in IPSec Autokey Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connect

Página 175

245 Terms in PPTP Server PPTP Server  The status of PPTP server that shows enable or disable.  The range of IP address, DNS server, WINS serve

Página 176

246 Terms in PPTP Client Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting

Página 177 - 8.2 RADIUS Authentication

247 Terms in Trunk Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting Nam

Página 178

248 Terms in Trunk Name  The description for VPN trunk. Note: the name has to be exclusive from any other. Group Member  The groups that are su

Página 179

15 Historical Top Chart Traffic Grapher WAN Traffic Displays the usage statistics from the WAN interfaces. Chapter 31 Policy-Based Traffic Displa

Página 180

249 11.1 Example No. Settings Scenario Page 11.1.1 IPSec Autokey Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets

Página 181

250 11.1.1 Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets via an IPSec VPN Connection Prerequisite Setup (Note: IP addres

Página 182

251 Step 3. Select Remote Gateway (Static IP or Hostname) for Remote Settings, and enter the management address of B Company.(Figure 11-20) Figure 1

Página 183

252 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Página 184 - (Figure 8-18)

253 Step 8. Settings completed.(Figure 11-25) Figure 11-25 IPSec Autokey Settings Completed Step 9. Under Policy Object > VPN > Trunk, set as

Página 185

254 Figure 11-26 VPN Trunk Settings Figure 11-27 VPN Trunk Created Step 10. Under Policy > Outgoing, set as below:(Figure 11-28)  Select th

Página 186 - (Figure 8-21)

255 Step 11. Under Policy > Incoming, set as below:(Figure 11-30)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-31) Figure 1

Página 187 - (Figure 8-22)

256 For B Company, set as below: Step 1. Under System > Configuration > Multiple Subnets, set as below:(Figure 11-32) Figure 11-32 Multiple S

Página 188

257 Step 5. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. ( The maximum length of Pre-Shared Key String is 10

Página 189 - (Figure 8-25)

258 Step 9. Settings completed.(Figure 11-40) Figure 11-40 IPSec Autokey Settings Completed Step 10. Under Policy Object > VPN > Trunk, clic

Página 191 - (Figure 8-27)

259 Figure 11-41 VPN Trunk Settings Figure 11-42 VPN Trunk Created

Página 192 - (Figure 8-28)

260 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-43)  Select the defined Trunk for VPN Trunk.  Click OK

Página 193

261 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-45)  Select the defined trunk for VPN Trunk.  Click OK

Página 194

262 Step 13. Settings completed.(Figure 11-47) Figure 11-47 Deployment of IPSec VPN

Página 195 - Figure 8-32 Adding a User

263 11.1.2 Creating an IPSec VPN Connection under Windows 2000 by a CS-2001 Device Prerequisite Setup (Note: IP addresses used as examples only) A

Página 196

264 11-50) Figure 11-50 Remote Settings Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum

Página 197

265 Figure 11-54 Advanced Settings of IPSec Autokey Step 8. Settings completed.(Figure 11-55) Figure 11-55 IPSec Autokey Settings Completed Ste

Página 198 - 8.3 POP3 Authentication

266 Figure 11-56 VPN Trunk Settings Figure 11-57 VPN Trunk Created

Página 199

267 Step 10. Under Policy > Outgoing, set as below:(Figure 11-58)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-59) Figure 1

Página 200

268 Step 11. Under Policy > Incoming, set as below:(Figure 11-60)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-61) Figure 1

Página 201 - 8.4 LDAP Authentication

17 Chapter 1 Administration This chapter mainly explains the authorization settings for accessing the CS-2001. It covers the subjects of Admin,

Página 202

269 For B Company, set as below: Step 1. Select Start > Run on the Start menu in Windows 2000.(Figure 11-62) Figure 11-62 Selecting “Run…” o

Página 203

270 Step 3. In the Console 1 window, click Console on the menu bar, and then click Add/Remove Snap-in.(Figure 11-64) Figure 11-64 Selecting “Add / R

Página 204

271 Step 5. Select Local Computer, and then click Finish.(Figure 11-66) Figure 11-66 Selecting Local Computer Step 6. Settings completed.(Figure 1

Página 205

272 Step 7. Right-click the IP Security Policies on Local Machine, and then click Create IP Security Policy.(Figure 11-68) Figure 11-68 Creating an

Página 206

273 Step 9. Type the Name and Description and then click Next.(Figure 11-70) Figure 11-70 Name and Description Settings Step 10. Disable Activate

Página 207

274 Step 11. In the IP Security Policy Wizard window, tick Edit properties and click Finish.(Figure 11-72) Figure 11-72 Settings Completed Step 12

Página 208

275 Figure 11-73 VPN_B Properties

Página 209

276 Step 13. In the New Rule Properties window, click Add.(Figure 11-74) Figure 11-74 New Rule Properties Step 14. In the IP Filter List window,

Página 210

277 Figure 11-75 Adding an IP Filter

Página 211

278 Step 15. In the Filter Properties window, select “A specific IP Address” for Source address, and then apply B Company’s WAN IP address “211.22.2

Página 212 - Note :

18 Terms in Admin Admin Name  The authentication name to log in the system.  The IT administrator’s name and password are assigned as admin whic

Página 213 - (Figure 8-66)

279 Figure 11-77 IP Filter Added

Página 214

280 Step 17. In the New Rule Properties window, click Filter Action tab and then tick Require Security. Next, click Edit.(Figure 11-78) Figure 11-7

Página 215

281 Figure 11-79 Ticking the “Session Key Perfect Forward Secrecy”

Página 216

282 Step 19. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-80) Figure 11-80 Selecting a Security Method t

Página 217

283 Figure 11-81 Modifying Security Method

Página 218 - 9.1 Example

284 Step 21. Tick Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new k

Página 219 - File Transferring

285 Figure 11-83 Selecting the Connection Type

Página 220

286 Step 23. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Página 221

287 Figure 11-85 Authentication Methods Settings

Página 222 - and tick Select All

288 Step 25. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Página 223

2 interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used i

Página 224

19 1.1 Admin 1.1.1 Adding a Sub-Administrator Step 1. Go to System > Administration > Admin, set as below:(Figure 1-1)  Click the New Sub-

Página 225 - Chapter 10 Virtual Server

289 Step 26. Click Apply, and then click Close to close the window.(Figure 11-87) Figure 11-87 Authentication Methods Settings

Página 226 - Terms in Virtual Server

290 Step 27. Settings completed.(Figure 11-88) Figure 11-88 Settings Completed

Página 227 - 10.1 Example

291 Step 28. In the VPN_B Properties window, disable Use Add Wizard; click Add to create the second IP security rule.(Figure 11-89) Figure 11-89 VP

Página 228

292 Step 29. In the New Rule Properties window, click Add.(Figure 11-90) Figure 11-90 Clicking “Add…” to Add an IP Filter

Página 229

293 Step 30. In the IP Filter List window, disable Use Add Wizard. Change the Name into “VPN_B LAN TO WAN”, and then click Add.(Figure 11-91) Figur

Página 230 - Important:

294 Step 31. In the Filter Properties window, select “A specific IP Subnet” for Source address, and then type “192.168.10.0” as A Company‘s subnet a

Página 231

295 Step 32. Settings completed.(Figure 11-93) Figure 11-93 IP Filter Added

Página 232 - (Figure 10-10)

296 Step 33. In the New Rule Properties window, click Filter Action tab; tick Required Security and then click Edit.(Figure 11-94) Figure 11-94 Fil

Página 233

297 Figure 11-95 Ticking the “Session Key Perfect Forward Secrecy”

Página 234

298 Step 35. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-96) Figure 11-96 Security Methods Settings St

Página 235 - (Figure 10-13)

20 1.1.2 Modifying the Password Step 1. Go to System > Administration > Admin and then set as below:(Figure 1-2)  Click the Modify button o

Página 236 - 15321-15333)

299 Figure 11-97 Modifying Security Method

Página 237

300 Step 37. Check Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new

Página 238

301 Step 38. In the New Rule Properties window, click Connection Type tab and tick All network connections.(Figure 11-99) Figure 11-99 Selecting th

Página 239

302 Step 39. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Página 240 - (Figure 10-22)

303 Step 40. In the New Rule Properties window, click Authentication Methods tab. Next, select the method “Kerberos” and then click Edit on the righ

Página 241

304 Step 41. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Página 242

305 Step 42. Click Apply, and then click Close to close the window.(Figure 11-103) Figure 11-103 New Authentication Method Created

Página 243

306 Step 43. Settings completed.(Figure 11-104) Figure 11-104 Settings Completed

Página 244

307 Step 44. In the VPN_B Properties window, click General tab and then click Advanced.(Figure 11-105) Figure 11-105 General Settings of VPN_B Prop

Página 245

308 Step 45. Tick Master Key Perfect Forward Secrecy and then click Methods.(Figure 11-106) Figure 11-106 Key Exchange Settings Step 46. Click Mo

Página 246 - (Figure 10-32)

21 1.2 Permitted IPs 1.2.1 Adding a Permitted IP Step 1. Under System > Administrator > Permitted IPs, click the New Entry button and then s

Página 247 - Chapter 11 VPN

309 Step 47. Settings completed.(Figure 11-108) Figure 11-108 IPSec VPN Settings Completed Step 48. Right-click VPN_B and move to Assign, and the

Página 248 - Terms in VPN

310 Step 49. Select Start > Settings > Control Panel on the Start menu, and then click it. (Figure 11-110) Figure 11-110 Selecting “Control

Página 249

311 Step 51. In the Administrative Tools window, double-click Services.(Figure 11-112) Figure 11-112 The Services Window Step 52. In the Services

Página 250

312 Step 53. Settings completed.(Figure 11-114) Figure 11-114 Deployment of IPSec VPN Using CS-2001 and Windows 2000

Página 251 - Terms in One-Step IPSec

313 11.1.3 Creating an IPSec VPN Connection between Two CS-2001 Devices (An Aggressive Mode Example) Prerequisite Setup (Note: IP addresses used as

Página 252

314 and enter the management address of B Company.(Figure 11-117) Figure 11-117 Remote Settings

Página 253 - Terms in VPN Wizard:

315 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Página 254

316 Step 8. Select “Aggressive mode” for Mode. Enter 11.11.11.11 in the My ID field and then enter @abc123 in the Peer ID field.(Figure 11-122) Figu

Página 255 - Terms in IPSec Autokey

317 Step 10. Under Policy Object > VPN > Trunk, set as below:(Figure 11-124)  Name: Type a name.  Local Settings: Select “LAN”. Local IP /

Página 256 - Terms in PPTP Server

318 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-126)  Select the defined trunk from the VPN Trunk drop-

Página 257 - Terms in PPTP Client

22 1.3 Logout 1.3.1 Logging out the System Step 1. Click Logout to protect the system from any unauthorized modification while being away.(Figure

Página 258 - Terms in Trunk

319 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-128)  Select the defined trunk from the VPN Trunk drop-d

Página 259

320 For B Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click New Entry and then set as below:(Figure 11-130) Fig

Página 260 - 11.1 Example

321 Step 5. Below Encryption and Data Integrity Algorithms, select “3DES” for Encryption Algorithm; select “SHA1” for Authentication Algorithm; selec

Página 261

322 Step 6. Configure the settings under IPSec Algorithm. Select “3DES” for Encryption Algorithm and “MD5” for Authentication Algorithm.(Figure 11-13

Página 262 - Figure 11-20 Remote Settings

323 Step 10. Select Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-139)  Name: Type a name.  Local Settings

Página 263

324 Figure 11-140 VPN Trunk Created

Página 264

325 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-141)  Select the defined trunk for VPN Trunk.  Click O

Página 265

326 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-143)  Select the defined trunk for VPN Trunk.  Click O

Página 266

327 Step 13. Settings completed.(Figure 11-145) Figure 11-145 Deployment of IPSec VPN Using Aggressive Mode

Página 267

328 11.1.4 Using Two CS-2001 Devices to Connect Outbound Load Balance with IPSec VPN (Using GRE/IPSec Package Algorithm) Prerequisite Setup (Note:

Página 268

23 Step 2. Click OK and then the logout message appears.(Figure 1-6) Figure 1-6 The Logout Message

Página 269

329 For A Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-146) Figure 11-146 IPS

Página 270

330 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Página 271

331 Step 9. Setting completed.(Figure 11-154) Figure 11-154 IPSec Autokey Settings Completed Step 10. Select Policy Object > VPN > IPSec Aut

Página 272

332 Step 14. Under the ISAKMP Algorithm section, select “3DES” for Encryption Algorithm; select “MD5” for Authentication Algorithm; select “DH 1” fo

Página 273 - (Figure 11-47)

333 Step 18. Settings completed.(Figure 11-163) Figure 11-163 IPSec Autokey Settings Completed Step 19. Under Policy Object > VPN > Trunk, s

Página 274 - 2000 by a CS-2001 Device

334 Figure 11-164 VPN Trunk Settings Figure 11-165 VPN Trunk Created

Página 275

335 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-166)  Select the defined trunk for VPN Trunk.  Click O

Página 276

336 Step 21. Under Policy > Incoming, click New Entry and then set as below:(Figure11-168)  Select the defined trunk for VPN Trunk.  Click OK

Página 277

337 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-170) Figure 11-170 IP

Página 278

338 Figure 11-174 ISAKMP Algorithm Settings

Página 279

24 1.4 Updating Software Step 1. To run a software update, go to System > Administration > Software Update and follow the steps below:  Cli

Página 280

339 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Página 281

340 Step 10. Under Policy Object > VPN > IPSec Autokey, click New Entry again. Step 11. Type VPN_02 in the Name field and then select Port3

Página 282

341 Algorithm.(Figure 11-184) Figure 11-184 IPSec Algorithm Settings Step 16. Select “Group 1” for PFS Key Group. Enter “3600” in the ISAKMP SA Li

Página 283

342 Step 19. Under Policy Object > VPN > Trunk, set as below: (Figure 11-188)  Name: Type a name.  Local Settings: Select “LAN”. Local IP

Página 284

343 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-190)  Select the defined trunk for VPN Trunk.  Click O

Página 285 - (Figure 11-73)

344 Step 21. Select Policy > Incoming, click New Entry and then set as below:(Figure 11-192)  Select the defined trunk for VPN Trunk.  Click

Página 286

345 Step 22. Settings completed.(Figure 11-194) Figure 11-194 Deployment of IPSec VPN Using GRE/IPSec

Página 287 - (Figure 11-75)

346 11.1.5 Establishing an IPSec VPN Connection by Three CS-2001 Devices Prerequisite Setup (Note: IP addresses used as examples only) A Company: C

Página 288

CS-2001 UTM Content Security Gateway User’s Manual 347 For A Company, set as below: Step1. Go to Policy Object > VPN > IPSec Autokey and the

Página 289 - (Figure 11-77)

348 Figure 11-199 Configuring the IPSec Algorithm Step6. Under the IPSec Algorithm section, select 3DES for Encryption Algorithm and then select

Página 290 - Figure 11-77 IP Filter Added

25 Chapter 2 Configuration Configuration includes the following system settings: System Settings, Date / Time, Multiple Subnets, Route Table, DHCP,

Página 291 - (Figure 11-79)

349 Step8. Policy Created.(Figure 11-202) Figure 11-202 Policy Created Step9. Go to Policy Object > VPN > Trunk, click New Entry and then s

Página 292

350 Figure 11-204 First Trunk Completed Step10. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button again.(Figure

Página 293

351 1 for Key Group.(Figure 11-209) Figure 11-209 Configuring ISAKMP Algorithm

Página 294

352 Step15. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and MD5 for Authentication Algorithm

Página 295 - (Figure 11-83)

353 Step18. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-213)  Type the name in the Name field.  Lo

Página 296

354 Step19. Go to Policy Object > VPN > Trunk Group, click New Entry and then set as below:(Figure 11-215)  Type the name in the Name field.

Página 297 - (Figure 11-85)

355 Step20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-217)  Select the defined Trunk from the VPN Trunk drop-do

Página 298

356 Step21. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-219)  Select the defined Trunk from the VPN Trunk drop-do

Página 299

357 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button.(Figure 11-221) Figure

Página 300 - (Figure 11-87)

358 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Página 301

26 Terms in Setting System Settings  Allows the IT administrator to import / export system settings, perform a factory reset and format the built-

Página 302 - (Figure 11-89)

359 Step 9. Under Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-229)  Type the name in the Name fi

Página 303 - (Figure 11-90)

360 Step 10. Go to Policy Outgoing, click the New Entry button and then set as below:(Figure 11-231)  Select the defined Trunk from the VPN Trunk

Página 304 - (Figure 11-91)

361 Step 11. Go to Policy > Incoming, click the New Entry button and then set as below:(Figure 11-233)  Select the defined Trunk from the VPN T

Página 305 - (Figure 11-92)

362 For C Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click the New Entry button and then set as below:(Figure 1

Página 306 - Figure 11-93 IP Filter Added

363 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Página 307 - (Figure 11-95)

364 Step 9. Go to Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-243)  Type the name in the Name fi

Página 308

365 Step 10. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-245)  Select the defined Trunk from the VPN Trunk drop-d

Página 309

366 Step 11. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-247)  Select the defined Trunk from the VPN Trunk drop-d

Página 310

367 Step 12. Setting completed.(Figure 11-249) Figure 11-249 The Deployment of IPSec VPN

Página 311

368 11.1.6 Using Two CS-2001 Devices to Establish PPTP VPN Connection (Outbound Load Balancing) Prerequisite Setup (Note: IP address used as exampl

Página 312 - (Figure 11-99)

27 device can block their IP address for the specified amount of time. This helps to prevent any unauthorized tampering of the device.

Página 313 - (Figure 11-100)

369 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-250)  Click the Modify button.  Tick Enable PPTP.  T

Página 314 - (Figure 11-101)

370 3. Using RADIUS Server (refer to chapter 8 for RADIUS authentication) to establish PPTP VPN connection, go to Policy Object > VPN > PPTP S

Página 315 - (Figure 11-102)

371 Figure 11-253 Configuring the Second PPTP Server

Página 316 - (Figure 11-103)

372 Figure 11-254 Second PPTP Server Completed

Página 317 - (Figure 11-104)

373 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-255)  Type the name in the Name field.  Loc

Página 318 - Advanced.(Figure 11-105)

374 Note: 1. When Remote IP / Netmask is selected for Remote Settings, you may select only one tunnel to establish the PPTP VPN connection. Ste

Página 319

375 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-259)  Select the defined VPN from the VPN Trunk drop-down

Página 320

376 For B Company, set as below: Step 1. Go to Policy Object > VPN > PPTP Client and then set as below:  Click New Entry.(Figure 11-261) 

Página 321

377 Figure 11-263 Second PPTP Client Setting Completed Figure 11-264 Second PPTP Client Setting Completed Note: 1. When CS-2001 PPTP Client es

Página 322

378 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-265)  Enter the name in the Name field.  Lo

Página 323 - (Figure 11-114)

28 Important: 1. If the HTTP or HTTPS port number is modified then the number has to to be appended to the management IP address, such as http://6

Página 324

379 Figure 11-266 Settings Completed Note: 1. When Remote IP / Netmask is selected for Remote Settings, the number of the PPTP_Client tunnel sho

Página 325 - (Figure 11-117)

380 Step 3. Go to Policy > Outgoing and then set as below:(Figure 11-267)  Select the defined Trunk from the VPN Trunk drop-down list.  Click

Página 326

381 Step 4. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-269)  Select the defined Trunk from the VPN Trunk drop-dow

Página 327

382 Step 5. Settings completed.(Figure 11-271) Figure 11-271 The Deployment of PPTP VPN

Página 328

383 11.1.7 Using Two CS-2001 Devices to Establish PPTP VPN Connection Prerequisite Setup (Note: IP addresses used as examples only) A Company: Con

Página 329

384 Step 1. Go to Policy Object >VPN > PPTP Server and then set as below:(Figure 11-272)  Click Modify.  Click Enable PPTP.  Click Encryp

Página 330

385 Step 2. Go to Policy Object > VPN > PPTP Server, click New Entry and then set as below:(Figure 11-273)  Type PPTP_Connection in the Usern

Página 331

386 For B Company, set as below; Step 1. Go to Policy Object > VPN > PPTP Client, click New Entry and then set as below:(Figure 11-275)  Typ

Página 332 - (Figure 11-134)

387 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-277)  Enter the name in the Name field.  Lo

Página 333

388 Step 3. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-279)  Select the defined Trunk from the VPN Trunk drop-dow

Página 334 - (Figure 11-140)

3 Before contacting customer service, please take a moment to gather the following information: ♦ UTM Content Security Gateway serial number and

Página 335

29  Specifies the subnets IP range. Interface  Denotes in which network, i.e. LAN or DMZ, the subnet resides. VLAN ID  Permits the interface

Página 336

389 Step 4. Setting Completed.(Figure 11-281) Figure 11-281 Deployment of PPTP VPN Connection

Página 337

390 11.1.8 Establishing PPTP VPN Connection by One CS-2001 Device and One PC Running Windows 2000 Prerequisite Setup (Note: IP addresses used as ex

Página 338 - (Figure 11-145)

391 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-282)  Click Modify.  Click Enable PPTP.  Click Encry

Página 339

392 3. If the external user wants to connect to IPSec VPN subnet via PPTP VPN connection, the Client IP Allocation/ IP Range must be on the LAN1 (19

Página 340

393 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-285)  Type the name in the Name field.  Loc

Página 341

394 Note: 1. If the external users want to connect to the IPSec VPN subnet, the Local IP/ Netmask must be configured as the IPSec VPN subnet.

Página 342

395 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-287)  Select the defined trunk from the VPN Trunk drop-dow

Página 343

396 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-289)  Select the defined Trunk from the VPN Trunk drop-dow

Página 344

397 For B Company, set as below: Step 1. Right-click on My Network Places and then click Properties.(Figure 11-291) Figure 11-291 Selecting “Proper

Página 345

398 Figure 11-292 Double-Clicking on “Make New Connection”

Página 346

30 Note: 1. Dynamic Routing Protocols can be categoried into the following two categories:  Distance-Vector Routing Protocol: Uses the Bellman-F

Página 347

399 Step 3. In the Location Information window, specify the country / region, area code and phone system accordingly, and then click OK.(Figure 11-29

Página 348

400 Figure 11-294 Phone and Modem Options

Página 349

401 Step 5. In the Network Connection Wizard window, click Next.(Figure 11-295) Figure 11-295 Network Connection Wizard Step 6. In the Network Conn

Página 350

402 Step 7. In the Destination Address window, type the host name or IP address in the blank field and then click Next.(Figure 11-297) Figure 11-297

Página 351

403 Step 9. In the Completing the New Connection Wizard window, type a Connection Name and then click Finish.(Figure 11-299) Figure 11-299 New Conne

Página 352

404 Step 10. In the Connect Virtual Private Connection window, set as below:(Figure 11-300)  User Name: Type “PPTP_Connection”.  Password: Enter

Página 353

405 Figure 11-302 PPTP VPN Connection Successfully Connected

Página 354

406 Step 11. Settings completed.(Figure 11-303) Figure 11-303 Deployment of PPTP VPN

Página 355

407 Mail Security

Página 356 - (Figure 11-194)

408 Chapter 12 Configuration Mail configuration refers to the processing basis of mail services. In this chapter, it will be covering the functiona

Página 357 - CS-2001 Devices

31 private purposes.  In 2007 30-bit AS numbers were introduced. These numbers are written either as simple integers, or in the form x.y, where x a

Página 358

409 Terms in Settings Log Storage Time  Quarantined spam / virus emails can be designate a storage time and deleted when due.  You may also deci

Página 359

410  Tag spam email’s subject with: --Spam--.  Tag virus-infected emails with: --Virus--.  Type the subject and the content of the mail notice.

Página 360

411 Figure 12-1 Configuring the Settings of Mail Security

Página 361

412  A notice with customized subject and message.(Figure 12-2) Figure 12-2 A Notice Shows Customized Subject and Message  An unscanned email is

Página 362 - (Figure 11-209)

413  The spam mail’s subject tagged with warning message.(Figure 12-4) Figure 12-4 The Spam Mail’s Subject Tagged with “Spam”  The virus mail’s

Página 363

414 Terms in Account Manager Account Learning Settings  Disabled: Accounts added manually.  Accounts added automatically: the email account will

Página 364

415 12.1 Mail Domains 12.1.1 Using Mail Domains to Filter Emails Step 1. Apply to a local ISP for several domain names, “planet.com.tw”, “suppor

Página 365 - Company’s subnet

416 Step 2. Under Mail Management > Configuration > Mail Domains, set as below:  Click the New Entry button to create the first entry.  Typ

Página 366

417 Figure 12-8 Modifying the First Entry Figure 12-9 Typing the Domain Alias Figure 12-10 Settings Completed Figure 12-11 Creating the Second

Página 367

418 Figure 12-12 The Second Entry Completed Figure 12-13 Modifying the Second Entry Figure 12-14 Typing the Domain Alias Figure 12-15 Se

Página 368

32 Terms in DHCP Static IP Assignment  DHCP can allocate IP addresses based upon the MAC address of PCs in the LAN or DMZ. Terms in Dynamic DDN

Página 369

419 Step 3. Emails sent to the internal account “alex”, depending on the domain name, will be handled as follows:  Emails that go to alex@planet.

Página 370

420 12.2 Account Manager 12.2.1 Using CS-2001 to Filter Mail Accounts Step1. Go to Mail Security > Configuration > Account Manager and then

Página 371

421 Step3. Go to Mail Security > Configuration > Account Manager, import the accounts into the system:  Click the Browse... button. In the C

Página 372

422 Step4. Go to Mail Security > Configuration > Account Manager, add or remove the accounts.  Click the Add button.  Enter the account

Página 373

423 Figure 12-20 Removing the Account Note: 1. Once Accounts added automatically is selected, the CS-2001 will varify the existence of the accou

Página 374

424 Step5. Users may be given permission to access Personal Email Viewer under Mail Security > Configuration > Account Manager.  To permit

Página 375

425 12.2.2 Accessing Personal Email Viewer Step 1. Type the management address together with the HTTP port (8080) or HTTPS port (1443) in the addre

Página 376

426 Step 2. Users will be requested to configure user preferences during their first login.  Click Continue.(Figure 12-24)  Configure the User Pr

Página 377

427 Figure 12-25 The User Preferences Settings Figure 12-26 User Preferences Settings Completed

Página 378 - (Figure 11-249)

428 Step 3. Below shows the CS-2001’s user-friendly, web-based mailbox.(Figure 12-27) Figure 12-27 The Web Mail User Interface

Página 379

33 Terms in SNMP SNMPv3  SNMP is a protocol specially designed to monitor network-attached devices such as servers, switches, routers, workstati

Página 380

429 12.2.3 Using Whitelist and Blacklist to Filter Emails Supposed the domain name “planet.com.tw” is registered to your organization, and you ar

Página 381

430 Figure 12-29 Creating the Second Entry of Whitelist Figure 12-30 Settings Completed

Página 382

431 Step 2. Click Preference in the Personal Email Viewer main screen and then a pop-up window appears. Click the Blacklist button under the User Pre

Página 383

432 Figure 12-32 Creating the Second Entry of Blacklist Figure 12-33 Blacklist Created

Página 384

433 Step 3. When [email protected] receives an email from a yahoo account:  If the mail is from [email protected], then [email protected] will

Página 385

434 12.3 Mail Relay 12.3.1 Using CS-2001 as a Gateway (Set the Mail Server in DMZ under Transparent Mode) Prerequisite Setup Configure Port1

Página 386

435 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-35)  Select Sender’s IP Address.  Type the IP

Página 387

436 12.3.2 Deploying the CS-2001 Device between the Gateway and Mail Server (Mail Server is in DMZ under Transparent Mode) Prerequisite Setup LAN

Página 388

437 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:  Click New Entry.(Figure 12-37)  Select Sender’s IP

Página 389 - (Figure 11-266)

438 12.3.3 Using CS-2001 as Gateway to Enable Branch’s Employees to Send Emails via Headquarters’ Mail Server (Set the Mail Server under DMZ Transpa

Página 390

34 Auth Password  The NMS uses this password to access information from the CS-2001. Privacy Protocol  Supports the cipher Data Encryption Stan

Página 391

439 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-40)  Select Sender’s IP Address.  Enter the I

Página 392

440 12.4 Mail Notice 12.4.1 Retrieving Spam or Virus Emails from the Mail Notice (An Outlook Exparess Example) Step 1. All the accounts are listed

Página 393 - (Figure 11-271)

441 Step 2. Go to Mail Security > Configuration > Mail Notice and then set as below:  Tick Notice for, then select “Both Spam and Viruses” fr

Página 394 - Connection

442 Note: 1. Accounts in the Selected Accounts column will receive a mail notice based upon schedules when emails sent from or to them are classif

Página 395

443 12.5 Queued Mail 12.5.1 Monitoring Email Delivery Status Step 1. Go to Mail Security > Configuration > Settings and then set as below: 

Página 396

444 Step 2. Go to Mail Security > Configuration > Queued Mail to obtain the delivery status.  A symbol, under the Reason column, indicates

Página 397 - PPTP Server

445 12.6 Mail Signatures Step 1. Go to Mail Security > Configuration > Mail Signatures and then set as below:  Tick Add signatures to all o

Página 398

446 Step 2. Any email sent from the CS-2001 will now have the signature message appended to the body of the email for the recipient to view.(Figure 1

Página 399

447 Chapter 13 Anti-Spam Users will no longer be disturbed by large influxes of spam. The Anti-Spam mechanism prevents the users from wasting their

Página 400 - (Figure 11-281)

448 Terms in Settings Anti-Spam Filter Settings  Incoming and outgoing emails can be inspected.  Emails exceeding the threshold score can have

Página 401

35 2.1 Settings 2.1.1 Exporting System Settings Step 1. Under System > Configuration > Settings, click next to Export System Settings und

Página 402

449 Spam Actions (Sending)  The action of outbound spam mail can be set to delete, deliver as normal or store the quarantine. Spam Actions (Receiv

Página 403

450  The figure below shows that an email’s subject is tagged with the score (optional).(Figure 13-3) Figure 13-3 An Email’s Subject Tagged with t

Página 404

451 Comment  The description of the rule’s name. Classification  When Spam is selected, emails that meet the inspection criteria will be classif

Página 405

452 “joe” typed as a pattern, it means emails from whosever email account contained the word “joe” will be considered as spam or ham.

Página 406

453 Terms in Whitelist Email Address/ Domain Name  Used to designate specific email addresses as ham. Direction  From: Inspects emails sent fro

Página 407

454 Training Schedule  CS-2001 can be scheduled a daily time for spam or ham training.  CS-2001 can be set to immediately train. An Overview on

Página 408

455 The Three Key Elements of Email Transmission An email transmission is achieved by using an MUA, MTA and MDA.  MUA(Mail User Agent):Whether

Página 409

456 How an Email is Processed Composing and sending an email:  Email delivery from an MUA to an MTA: Run a MUA client (email program) and follow t

Página 410 - (Figure 11-294)

457  Email retrieval: signifies MUA is using POP (Post Office Protocol) to communicate with the MTA by which users may have the access to emails. C

Página 411

458 13.1 Example No. Scenario Page 13.1.1 Detecting Whether Emails are Spam 459 13.1.2 Using CS-2001 in Accordance with Whitelist and Bla

Página 412

36 2.1.2 Importing System Settings Step 1. Under System > Configuration > Settings, click Browse… next to Import System Settings under the Sy

Página 413

459 13.1.1 Detecting Whether Emails are Spam Prerequisite Setup Configure Port1 as LAN1(192.168.1.1, NAT/ Routing mode) and connect it to the LAN w

Página 414 - (Figure 11-299)

460 Step 3. Under Policy Object > Address > DMZ, set as below:(Figure 13-4) Figure 13-4 Creating an Address Setting Corresponding to the Mail

Página 415

461 Step 5. Go to Policy > Outgoing and then set as below: (Figure 13-6)  Select the defined group (Mail_Service_02) from the Service drop-down

Página 416

462 Figure 13-6 Configuring an Outgoing Policy with Group Service and POP3 Anti-Spam

Página 417 - (Figure 11-303)

463 Figure 13-7 Policy Created

Página 418 - Mail Security

464 Step 6. Under Policy > WAN to DMZ, set as below:(Figure 13-8)  Select the defined rule from the Destination Address drop-down list.  Selec

Página 419 - Chapter 12 Configuration

465 Figure 13-9 Policy Created

Página 420

466 Step 7. Go to Policy > DMZ to WAN and then set as below:(Figure 13-10)  Select the defined group from the Source Address drop-down list. 

Página 421 -  Click OK.(Figure 12-1)

467 Figure 13-10 Creating a DMZ to WAN Policy with Group Service and POP3 Anti-Spam

Página 422

468 Figure 13-11 Policy Created

Página 423

37 2.1.3 Resetting the System to Factory Default Settings and Formatting the Hard Drive Step 1. Under System > Configuration > Settings, tick

Página 424

469 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-12) Figure 13-12 Anti-Spam Filter Settings and Action Settings

Página 425 - Terms in Queued Mail

470 Note: 1. By default, Anti-Spam is enabled. Therefore, the IT administrator merely has to configure the settings under Mail Security > Confi

Página 426 - 12.1 Mail Domains

471 13.1.2 Using CS-2001 in Accordance with Whitelist and Blacklist to Filter Spam (Mail Server Is Deployed in DMZ under Transparent Mode) Prerequis

Página 427

472 Step 3. Go to Policy Object > Service > Group and then set as below:(Figure 13-15) Figure 13-15 Creating Service Groups to Include POP3, S

Página 428

473 Step 4. Go to Policy > WAN to DMZ and then set as below:(Figure 13-16)  Select the defined rule from the Destination Address drop-down list.

Página 429

474 Figure 13-17 Policy Created

Página 430

475 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-18)  Select the defined rule for Source Address.  Select the defined service (M

Página 431 - 12.2 Account Manager

476 Figure 13-18 Creating a DMZ to WAN Policy

Página 432

477 Figure 13-19 Policy Created

Página 433

478 Step 6. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 13-20) Figure 13-20 Mail Domain Settings Step 7.

Página 434

38 2.1.4 Enabling Email Alert Notification Step 1. Go to System > Configuration > Settings. Under the Name Settings section, configure the fo

Página 435

479 Step 8. Go to Mail Security > Anti-Spam > Whitelist and then set as below:  Click New Entry.  Type [email protected] in the Mail

Página 436 - (Figure 12-23)

480 Figure 13-25 Creating the Fourth Entry on Whitelist Figure 13-26 Whitelist Setting Completed Note: 1. Whitelist can be exported as a fil

Página 437

481 Step 9. Go to Mail Security > Anti-Spam > Blacklist and then set as below:  Click New Entry.  Type *yahoo* in the Mail Account fiel

Página 438

482 3. Whitelist overrides Blacklist, thus, email inspection will firstly act on Whitelist and then Blacklist. Step 10. Provided that joe@supportp

Página 439 - (Figure 12-27)

483 13.1.3 Deploying CS-2001 in between Gateway and Mail Server and Filtering Spam with Global Rule (Mail Server Is Deployed in DMZ under Transparen

Página 440

484 Figure 13-31 Creating Service Groups

Página 441

485 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 13-32)  Select the defined DMZ for Destination Address.  Select the defined servic

Página 442

486 Figure 13-33 Policy Completed

Página 443

487 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-34)  Select the defined DMZ for Source Address.  Select the defined service (Ma

Página 444

488 Figure 13-34 Creating a DMZ to WAN Policy with Service and SMTP Anti-Spam

Página 445 - 12.3 Mail Relay

4 Table of Contents Quick Installation Guide ... 8 Hardware Installation ...

Página 446 - (Figure 12-35)

39 2.1.5 Rebooting the CS-2001 Step 1. To reboot the CS-2001, go to System > Configuration > Settings. Under the Device Reboot section click

Página 447 - (Figure 12-36)

489 Figure 13-35 Policy Created

Página 448

490 Step 6. Under Mail Security > Configuration > Mail Domains, set as below:(Figure 13-36) Figure 13-36 Mail Domain Settings Step 7. Under M

Página 449 - (Figure 12-39)

491 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-38) Figure 13-38 Anti-Spam Settings Note: 1. An email th

Página 450 - (Figure 12-40)

492 Step 9. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type HamMail in the Rule Name field

Página 451 - 12.4 Mail Notice

493 Note: 1. The Action setting of a Global Rule will be unavailable if Classification selected as Ham (Non-Spam). It is because normal emails do

Página 452 - (Figure 12-42)

494 Step 10. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type SpamMail in the Rule Name fi

Página 453

495 Email header can be used as a reference when configuring Condition and Item of Global Rule. Figure 13-43 shows the header of an email. To view he

Página 454 - 12.5 Queued Mail

496 Step 11. Provided that [email protected] and [email protected] both receive an email from a Yahoo account:  If the sender’s ac

Página 455 - (Figure 12-44 Figure 12-45)

497 13.1.4 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering (An Outlook Express Example) To train spam filtering:

Página 456 - 12.6 Mail Signatures

498 Figure 13-45 Naming the Folder as Spam Mail

Página 457

40 2.2 Date / Time 2.2.1 CS-2001 Time Settings Step 1. Go to System > Configuration > Date/Time and configure the following settings:(Figu

Página 458 - Chapter 13 Anti-Spam

499 Step 2. Click Inbox in Outlook Express, and then move the spam to the Spam Mail folder:  In Inbox, select all the spam, right-click them, and t

Página 459

500 Figure 13-47 Selecting the “Spam Mail” Folder

Página 460 - (Figure 13-2)

501 Step 3. Compact the Spam Mail folder to make it easier importing spam messages onto CS-2001 for spam filtering training:  Click the Spam Mail f

Página 461 - Terms in Global Rule

502 Figure 13-49 Compacting the Spam Mail Folder

Página 462

503 Step 4. Copy the pathname of the Spam Mail folder to CS-2001 device for training use:  Right-click Spam Mail folder, and then click Propertie

Página 463

504 Figure 13-51 Copying the Pathname of the Spam Mail Folder

Página 464 - Terms in Training

505 Step 5. Go to Mail Security > Anti-Spam > Training and then configure the settings under the Spam Training Using Importing section:  Pa

Página 465

506 Step 6. Delete all spam emails in the Spam Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer: 

Página 466

507 Figure 13-54 All Spam Emails Have Been Deleted To train ham filtering: Step 7. In Outlook Express, create a new folder called “Ham Mail”: 

Página 467 - How an Email is Processed

508 Figure 13-55 Creating a New Folder Figure 13-56 Naming the Folder as Ham Mail

Página 468

41 2.3 Multiple Subnet 2.3.1 Using NAT / Routing Mode For LAN Users to Access the Internet Prerequisite Setup (Note: IP addresses used as examples

Página 469 - 13.1 Example

509 Step 8. Click Inbox in Outlook Express, and then move normal emails to the Ham Mail folder:  In Inbox, select all the hams, right-click them, a

Página 470

510 Figure 13-58 Selecting the Ham Mail Folder

Página 471

511 Step 9. Compact the Ham Mail folder for the easy of importing normal email messages onto CS-2001 for ham filtering training:  Click the Ham Mai

Página 472 -  Click OK.(Figure 13-7)

512 Figure 13-60 Compacting the Ham Mail Folder

Página 473

513 Step 10. Copy the pathname of the Ham Mail folder to CS-2001 device for training use:  Right-click the Ham Mail folder, and then click Prope

Página 474 - Figure 13-7 Policy Created

514 Figure 13-62 Copying the Pathname of the Ham Mail Folder

Página 475 - (Figure 13-9)

515 Step 11. Go to Mail Security> Anti-Spam > Training, configure the settings under the Ham Training Using Importing section.  Paste the pa

Página 476 - Figure 13-9 Policy Created

516 Step 12. Delete all emails in the Ham Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer:  In

Página 477 - (Figure 13-11)

517 Figure 13-65 All Normal Emails Have Been Deleted

Página 478

518 13.1.5 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering Step 1. On you mail server, create an email account, su

Página 479 - Figure 13-11 Policy Created

42 Figure 2-8 Configuring Multiple Subnet Figure 2-9 Settings Completed Important: 1. When the PCs’ subnets or IP addresses are not on the same

Página 480 - (Figure 13-12)

519 Step 4. In Mail Security > Anti-Spam > Training, configure the Ham Training Using Forwarded Mail setting according to the relevant informat

Página 481

520 To train spam filtering: Step 5. In Outlook Express, forward all spam emails in the Inbox as attachment to [email protected]:  In In

Página 482 - Transparent Mode)

521 Figure 13-68 Forwarding the Selected Spam Emails as Attachment

Página 483

522 To train ham filtering: Step 6. In Outlook Express, forward all normal emails in the Inbox as attachment to [email protected]:  In Inbo

Página 484 - (Figure 13-17)

523 Figure 13-70 Forwarding the Selected Normal Emails as Attachment

Página 485 - Figure 13-17 Policy Created

524 Step 7. CS-2001 will retrieve emails in [email protected] and [email protected] periodically and use them for training on schedule

Página 487

526 Chapter 14 Anti-Virus Due to its inbound and outbound email anti-virus scanning capabilities, CS-2001 guards against the extensive damage that

Página 488 - Figure 13-19 Policy Created

527 Terms in Setting Anti-Virus Settings  Scans inbound and outbound emails for viruses.  Virus definitions can be updated periodically or can b

Página 489

528 Figure 14-1 Anti-Virus Settings Note: 1. Three virus-scanning modes available for users are ClamAV, Sophos and ClamAV+Sophos.

Página 490

43 Step 2. Under Network > Interface, set as below:(Figure 2-10)  Click on Port 2’s Modify button.  For Interface Type select WAN, and enter a

Página 491

529 14.1 Example No. Scenario Page 14.1.1 Filtering Out the Virus Emails on Mail Server the Virus Emails on Mail Server 530 14.1.2 Using

Página 492

530 14.1.1 Filtering Out the Virus Emails on Mail Server Prerequisite Setup Configure Port1 as LAN1 (192.168.1.1, NAT/ Transparent Routing mode)

Página 493 - Blacklist

531 Step 4. Go to Policy Object > Service > Group, set as below:(Figure 14-3) Figure 14-3 Creating Service Groups to Include the POP3, SMTP a

Página 494 - (Figure 13-31)

532 Step 5. Under Policy > Outgoing, set as below:(Figure 14-4)  Select the defined service (Mail_Service_02) for Service.  Select POP3 for An

Página 495

533 Figure 14-4 Creating an Outgoing Policy with Service and POP3 Anti-Virus Figure 14-5 Policy Created

Página 496 - (Figure 13-33)

534 Step 6. Under Policy > WAN To DMZ, set as below:(Figure 14-6)  Select the defined DMZ for Destination Address.  Select the defined service

Página 497

535 Figure 14-7 Policy Created

Página 498 -  Click OK.(Figure 13-35)

536 Step 7. Under Policy > DMZ To WAN, set as below:(Figure 14-8)  Select the defined DMZ for Source Address.  Select the defined service (Mai

Página 499

537 Figure 14-8 Creating a DMZ to WAN Policy with Service and POP3 Anti-Virus

Página 500 - Figure 13-35 Policy Created

538 Figure 14-9 Policy Created

Página 501

CS-2001 UTM Content Security Gateway User’s Manual 44 Step 3. Under Policy Object > Address > LAN, set as below:(Figure 2-11) Figure 2-11 A

Página 502

539 Step 8. Go to Mail Security > Anti-Virus > Settings and then set as below:(Figure 14-10) Figure 14-10 Anti-Virus Settings

Página 503

540 Note: 1. By default, Anti-Virus is enabled. Therefore, the IT administrator merely has to configure the Mail Domains to scan all the incoming

Página 504

541 14.1.2 Using CS-2001 as a Gateway to Filter Out Virus Emails (Mail Server Is Deployed in LAN under NAT Mode) Prerequisite Setup Configure Port

Página 505

542 Figure 14-13 Creating Service Groups to Include POP3, SMTP and DNS Service Step 4. Under Policy Object > Virtual Server > Port Mapping, s

Página 506

543 Step 5. Under Policy > Incoming, set as below:(Figure 14-15)  Select the defined virtual server for Destination Address.  Select the defin

Página 507

544 Figure 14-16 Policy Completed

Página 508 - (Figure 13-45)

545 Step 6. Under Policy > Outgoing, set as below:(Figure 14-17)  Select the defined LAN address for Source Address.  Select the defined servi

Página 509

546 Figure 14-17 Creating an Outgoing Policy with Service and SMTP Anti-Virus

Página 510 - (Figure 13-47)

547 Figure 14-18 Settings Completed

Página 511

548 Step 7. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 14-19) Figure 14-19 Mail Domain Settings Step 8.

Página 512 - (Figure 13-49)

45 Step 4. Go to Policy > Outgoing and configure the following settings:  Click on New Entry.  Source Address: Select the name of the LAN addr

Página 513

549 Step 9. When “Joe”, an internal user at supportplanet.com.tw, receives emails from external mail accounts at yahoo.com.tw:  The virus mail from

Página 514

550 Chapter 15 Mail Reports CS-2001 provides you with email reports in the form of statistics and logs, presenting you with a thorough insight into

Página 515

551 Terms in Setting Periodic Report Scheduling Settings  It can generate and send out the periodic report to the designated recipient(s) on sched

Página 516

552 Figure 15-2 Periodical Report Sent as an Attachment

Página 517 - (Figure 13-54)

553 Terms in Logs Search  Available searching criteria are: date, sender, sender IP, recipient, attachment, subject, attribute and process. 

Página 518 - (Figure 13-56)

554 Figure 15-3 Searching for a Specific Log Note: 1. How to open an “.mbx” file (exported from quarantined or archived emails) on your local c

Página 519

555  Run IMAPSize, go to Tools > mbox2eml on the menu bar, and then click it.(Figure 15-26)  In the mbox2eml window, click the Select mbox fil

Página 520 - (Figure 13-58)

556 Figure 15-26 Navigating to Tools > Mbox2eml on the Menu Bar Figure 15-27 Locating the “.mbx” File to be Converted

Página 521

557 Figure 15-28 Converting the “.mbx” File into an “.eml” File Figure 15-29 File Conversion Completed

Página 522 - (Figure 13-60)

558 Figure 15-30 Clicking and Dragging the “.eml” File into Outlook Express to Open It

Página 523

46 Figure 2-13 The Second Outgoing Policy Settings

Página 524

559 15.1 Statistics Step 1. Mail Security > Mail Reports > Statistics shows a comprehensive statistical report. Step 2. In the upper left cor

Página 525

560 15.2 Logs Step 1. Under Mail Security > Mail Reports > Logs, it shows how emails are processed.

Página 526 - (Figure 13-63)

561 The symbols used in Logs:  Attribute: Symbol Description Regular Spam Virus Unscanned  Process: Symbol Description Deleted Notif

Página 528

563 Chapter 16 Configuration Regulating the websites that employees may access improves profuctivity, and protects the network from the damage caus

Página 529

564 Terms in Setting URL Blocking License  To activate the Category feature for URL Blocking, the license key must be imported into the device her

Página 530 - (Figure 13-66)

565 Figure 16-1 Web Filter Settings Note: 1. Before enabling syslog, please configure the syslog setting under System > Configuration > Se

Página 531

566  The alert message displays when an internal user tries to access the blocked web page.(Figure 16-2) Figure 16-2 The Alert Message Terms in W

Página 532

567 URL  Specifies any URLs required to be blocked.  The asterisk character (“*”) blocks any websites. Terms in Category Name  The name for

Página 533 - (Figure 13-70)

568 Terms in MIME/Script Name  The name of MIME/Script. Script  Window Popup:Blocking the popup window.  Microsoft ActiveX:Disallowing the

Página 534

47 Figure 2-14 Policy Settings Completed

Página 535

569  video/mpeg  application/octet-stream  application/pdf  application/msword Important: 1. To apply the Whitelist, Blacklist, Category,

Página 536

570 16.1 Example No. Settings Scenario Page 16.1.1 Whitelist Blacklist Group Regulating User’s Access to Specific Websites Using Blacklist an

Página 537 - Chapter 14 Anti-Virus

571 16.1.1 Regulating User’s Access to Specific Websites Using Blacklist and Whitelist Step 1. Go to Web Filter > Configuration > Whitelist a

Página 538

572 Note: 1. Whitelist can be exported as a file for storage, which can be used for restoring the list later on. Step 2. Go to Web Filter > C

Página 539

573 Step 3. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-8)  Type the name in the Name field. 

Página 540 - 14.1 Example

574 Figure 16-8 Group Settings for URL Blocking

Página 541 - (Figure 14-2)

575 Figure 16-9 The Completed Group Settings

Página 542 - (Figure 14-3)

576 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-10)  Select the defined group from the Web Filter drop-dow

Página 543 -  Click OK.(Figure 14-5)

577 16.1.2 Regulating User’s access to Specific Website, Downloading or Uploading Specific File Extension via HTTP or FTP or the Access to Specific

Página 544 - Figure 14-5 Policy Created

578 Step 2. Go to Web Filter > Configuration > File Extensions, click New Entry and then set as below:(Figure 16-14)  Type the name in the Na

Página 545 - (Figure 14-7)

48 Step 5. The configuration of LAN1 to the Internet is now complete.(Figure 2-15) Figure 2-15 The LAN Configured Using Multiple Subnet Note: 1

Página 546 - Figure 14-7 Policy Created

579 Figure 16-16 Adding a New Extension Figure 16-17 Typing a New Extension Figure 16-18 File Extension Added

Página 547 -  Click OK.(Figure 14-9)

580 Step 3. Go to Web Filter > Configuration > MIME/Script, click New Entry and then set as below:(Figure 16-19)  Type the name in the Name f

Página 548

581  Click Modify and then click Add.(Figure 16-21)  Enter the MIME Types in the field.  Click OK.(Figure 16-22, 16-23) Figure 16-21 Configuri

Página 549 - Figure 14-9 Policy Created

582 Step 4. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-24)  Type the name in the Name field.

Página 550

583 Figure 16-24 Configuring the URL Group

Página 551 - (Figure 14-11)

584 Figure 16-25 Setting Completed

Página 552 - (Figure 14-13)

585 Step 5. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-26)  Select the defined group from the Web Filter drop-dow

Página 553 - (Figure 14-14)

586 Chapter 17 Reports Reports delivers the IT administrator with detailed statistics and logs regarding the access of websites made by users.

Página 554 - (Figure 14-16)

587 Terms in Setting Periodic Report Scheduling Settings  Generates and sends out a periodic report to the designated recipient(s) based on a sc

Página 555

588 Figure 17-2 A Daily Report Sent through an Email Message

Página 556 -  Click OK.(Figure 14-18)

5 8.2 RADIUS Authentication ... 166 8.3 POP3 Authentication ...

Página 557

49 2.3.2 Using Multiple Subnets to Establish a VLAN Gateway to Regulate VLAN Users to Access the Internet Prerequisite Setup (Note: IP addresses

Página 558

589 Terms in Logs Search  Category: Available searching criteria are time, souce IP address, website, classification and action.  Upload: Availa

Página 559 - Reports > Logs

590 Figure 17-13 Searching for the Specific Logs Note: 1. Under Web Filter > Reports > Logs, the Category reports can be sorted by the t

Página 560

591 17.1 Statistics Step 1. Under Web Filter > Reports > Statistics, bar charts shows the report of URL blocking. Step 2. In the upper left c

Página 561 - Chapter 15 Mail Reports

592 Step 4. Below it shows the statistics report.(Figure 17-15)  Y-axis indicates the amount of scanned URL.  X-axis indicates the time.

Página 563

594 Figure 17-15 Statistics Report

Página 564 - Terms in Logs

595 17.2 Logs Step 1. Under Web Filter > Reports > Logs, there it shows the URL blocking logs.(Figure 17-16) Figure 17-16 URL Blocking Logs

Página 566

597 Chapter 18 Configuration In order to protect your network from various security threats, the device produces timely alerts and blocking mecha

Página 567

598 Terms in Settings IDP Settings  IDP signature definitions update automatically everyday or updated by the IT administrator manually. After eac

Página 568

50 Figure 2-16 First Multiple Subnet Setting

Página 569

599  Type 60 in the Storage Lifetime field.  Click OK.(Figure 18-1) Figure 18-1 IDP Settings Note: 1. To enable Syslog, the IT administr

Página 570 - 15.1 Statistics

600  When detecting attacks, the IT administrator will receive both an email notification and a NetBIOS Notification, Also, a corresponding log wil

Página 571 - 15.2 Logs

601 Note: 1. The IDP log is generated upon the “Log”setting under IDP > Signatures > Anomaly / Pre-defined / Custom.

Página 572

602 Chapter 19 Signatures To protect your company's network from malicious intrusions and attacks, the CS-2001 provides alerts and blocking me

Página 573 - Web Filter

603 Terms in Signatures Anomaly  Available signatures are syn flood, udp flood, icmp flood, portscan and http insptct.(Figure 19-1)  You may s

Página 574 - Chapter 16 Configuration

604 Pre-defined  Available signatures are Attack Responses, Backdoor, Bad Traffic, Chat, DDoS, DNS, DoS, Exploit, Finger, FTP, ICMP, IMAP, Info, Mi

Página 575

605 Figure 19-2 Pre-Defined Settings

Página 576 - Settings

606 Note: 1. All the signatures under the IDP > Signatures > Pre-defined are processed according to the Default Settings for Each Risk Lev

Página 577

607 Name  The name of the signature. Protocol  Determine of which IP Version (IPv4, IPv6) and Communication Protocol to detect and protect. S

Página 578 - Terms in Extension

608 19.1 Example 19.1.1 Adopting Packets Inspection along with Custom and Pre-Defined Signatures to Detect and Prevent the Intrusion Step 1. Under

Página 579 - Terms in MIME/Script

51 Figure 2-17 Second Multiple Subnet Setting Figure 2-18 Multiple Subnet Settings Completed Note: 1. The device’s interface settings permits

Página 580

609 Step 2. Go to IDP > Signatures > Anomaly and then set as below:(Figure 19-4)  Enable the signatures and configure the settings.  Click

Página 581 - 16.1 Example

610 Step 3. Under IDP > Signatures > Pre-defined, set as below:(Figure 19-5)  Select the signatures.  Click OK. Figure 19-5 Pre-Defined Se

Página 582 - Blacklist and Whitelist

611 Step 4. Go to IDP > Signatures > Custom and set as below:(Figure 19-6)  Type the name in the Name field.  Select IPv4 for IP Version an

Página 583

612 Note: 1. You may type a word string in the Content Pattern field; or convert it to hexadecimal ASCII code and then paste it into the field.

Página 584 - (Figure 16-9)

613 Figure 19-8 Applying the IDP to the Policy

Página 585

614 Figure 19-9 Policy Created

Página 586

615 Chapter 20 IDP Report CS-2001 provides you with a comprehensive IDP report in both statistics and logs. With the help of them, you could have a

Página 587

616 Terms in Settings Periodic Report Scheduling Settings  It can generates and send out the periodic report to the designated recipient(s) on sch

Página 588

617 Figure 20-2 Periodic Report Received

Página 589

618 Terms in Logs Search  Available search criteria are date, event, signature category, attacker IP, victim IP, interface and risk level.  G

Página 590

52 Step 2. Go to Policy Object > Address > LAN, and set as below:(Figure 2-19) Figure 2-19 Address Settings for the LAN

Página 591

CS-2001 UTM Content Security Gateway User’s Manual 619 20.1 Statistics Step 1. Go to IDP > IDP Reports > Statistics, to view a full-scale ID

Página 592

620 20.2 Logs Under IDP > IDP Reports > Logs, it shows the IDP status. Note: 1. The symbol used in Logs:  Process: Symbol Description

Página 594

622 Chapter 21 Web VPN / SSL VPN Since the Internet is in widespread use these days, the demand for secure remote connections is increasing. To mee

Página 595

623 Terms in VPN DES  DES, an acronym for Data Encryption Standard, is a cipher that was selected by NIST (National Institute of Standard and Te

Página 596

624 Hardware Auth.  The IT administrator may enable the PCs listed under Web VPN/ SSL VPN > Hardware Auth by adding them to the Selected Hardw

Página 597 - Chapter 17 Reports

625 Terms in Hardware Auth Hardware Authentication Users  The list of the devices that have been established SSL VPN connection to the CS-2001 d

Página 598

626 21.1 Example 21.1.1 Configuring Web / SSL VPN Connection settings for External Clients Step 1. Go to Interface > WAN, activate the HTTPS fu

Página 599

627 Figure 21-4 User Group Entries

Página 600

628 Step 3. Go to Web VPN / SSL VPN > Settings and then set as below:  Click Modify.(Figure 21-5)  Tick Enable Web VPN / SSL VPN.  Select th

Página 601

53 Step 3. Go to Policy Object > Address > LAN Group and then set as below: (Figure 2-20) Figure 2-20 LAN Group Settings Step 4. Go to Poli

Página 602 - 17.1 Statistics

629 Figure 21-6 Web VPN / SSL VPN Setting Completed

Página 603 - (Figure 17-15)

630 Figure 21-7 Web VPN / SSL VPN Authentication Settings Figure 21-8 Web VPN / SSL VPN Authentication Completed

Página 604

631 Step 4. Go to Policy > Incoming and then set as below:(Figure 21-9)  Select the defined Web VPN / SSL VPN from the VPN Trunk drop-down list.

Página 605

632 Step 5. Configure the setting from a browser:  In the URL field, type the CS-2001 interface address plus sslvpn or webvpn. For example, https:/

Página 606 - 17.2 Logs

633 Figure 21-12 Warning-Security Window

Página 607

634 Figure 21-13 Warning-Security Window Figure 21-14 The Authentication Window Figure 21-15 Web VPN / SSL VPN Connection

Página 608 - Chapter 18 Configuration

635 Figure 21-16 Web VPN / SSL VPN Connection Established

Página 609

636 Step 6. Under Web VPN/ SSL VPN > Status, it shows the connection status: (Figure 21-17) Figure 21-17 Web VPN / SSL VPN Connection Status S

Página 610 -  Click OK.(Figure 18-1)

637 Step 8. Go to Web VPN / SSL VPN > Settings and then set as below:(Figure 21-19)  Click Modify.  Move the hardware from the Available Hardw

Página 611 - (Figure 18-2, 18-3)

638 Figure 21-20 Setting Completed Step 9. When a user establishes an SSL VPN connection through the CS-2001, their hardware can be directly authen

Página 612 - Pre-defined / Custom

54 Step 5. The internal network’s VLAN. (Figure 2-23) Figure 2-23 The Completed Mulitple Subnet VLAN Settings

Página 613 - Chapter 19 Signatures

639 Note: 1. When hardware authentication and user/group authentication are both enabled, the device will first try to authenticate by hardware au

Página 614 - Terms in Signatures

640 Figure 21-22 Installing Java Runtime Environment Plug-in

Página 615 - (Figure 19-2)

CS-2001 UTM Content Security Gateway User’s Manual 641 IM Recording

Página 616

642 Chapter 22 Configuration IM Recording can help you record and monitor the use of MSN and QQ messenger. This can prevent productivity losses fro

Página 617

643 Terms in QQ Account Manager IM Logging Setting  Configures the storage lifetime of IM logging. Enable Block QQ access with an invalid passwor

Página 618

644 22.1 Example 22.1.1 Recording the Use of MSN / QQ Messenger Step 1. Users may log into the Web User Interface to add their own account. (Enter

Página 619 - 19.1 Example

645 Figure 22-2 Account Added Note: 1. IT administrator may add new users under IM Recording > Configuration > QQ Account Manager.

Página 620 - Figure 19-4 Anomaly Settings

646 Step 2. The added user is listed under IM Recording > Configuration > QQ Account Manager:  Tick Block QQ access with an invalid password.

Página 621 - (Figure 19-5)

647 Note: 1. Users may go to the Web user interface to change their password on their own. (Enter the management IP address appended with qq. E.g.

Página 622

648 Step 3. Go to Policy > Outgoing and set as below:(Figure 22-6)  Enable IM Recording.  Click OK.(Figure 22-7) Figure 22-6 Creating an Outg

Página 623 -  Click OK.(Figure 19-9)

55 2.4 Route Table 2.4.1 Enabling Two Networks Connected by a Router to Access the Internet via the CS-2001 Prerequisite Setup (Note: IP addresses

Página 624

649 Figure 22-7 Policy Created

Página 625

650 Chapter 23 Reports The records of MSN and QQ messengers are shown in the form of easy-to-read log and statistics. Terms in Settings Periodic Re

Página 626 - Chapter 20 IDP Report

651 Figure 23-1 Periodic Report Settings Figure 23-2 Daily IM Statistics Report

Página 627

652 Figure 23-3 Daily IM Statistics Report Figure 23-4 Historical Report Scheduling Settings

Página 628

653 Figure 23-5 Historical Report Received

Página 629

654 Figure 23-6 Weekly IM Statistics Report Terms in Message History Search  Available search criteria are date, time range, IM type, username,

Página 630 - 20.1 Statistics

655  Click Search.(Figure 23-7)  Click Send Report.  The report is sent to the designated recipient(s). (Figure 23-8, 23-9)  To store the se

Página 631 - 20.2 Logs

CS-2001 UTM Content Security Gateway User’s Manual 656 Figure 23-8 Receiving the Search Results Figure 23-9 The Searching Results Note: You m

Página 632 - Web VPN / SSL VPN

657 Figure 23-10 Downloading the Searching Results 23.1 Statistics Step 1. IM Recording > Reports > Statistics shows a comprehensive stat

Página 633

658 Figure 23-11 IM Recording Statistical Report

Página 634

56 Step 1. Go to System > Configuration > Route Table and set as below:  Click on New Entry.  IP Version : Select IPv4.  IP Address: Ty

Página 635 - Hardware Auth

659 23.2 Message History Step 1. IM Recording > Reports > Message History shows the logs of users’ conversation.(Figure 23-12) Figure 23-12

Página 636 - Terms in Status

660 Chapter 24 Policy CS-2001 inspects each packet passing through the device to see if it meets the criteria of any policy. Every packet is proces

Página 637 - 21.1 Example

661  DMZ to LAN : The packet is from the DMZ and heading to the LAN. IT administrators can customize the policy for DMZ-to-LAN packets.  LAN to L

Página 638

662 Terms in Policy Source Address & Destination Address  Source address and Destination address is based around using the device as a point o

Página 639

663 Authentication  This requires users to be authenticated to create a connection. VPN Trunk  This is where you apply the policy to regulate th

Página 640

CS-2001 UTM Content Security Gateway User’s Manual 664 Web App Firewall  It can regulate and filter all the web application. Anti-Virus  It

Página 641

665 Note: 1. Max. Concurrent Sessions overrides Max. Concurrent Sessions per IP in a policy. When the setting value of Max. Concurrent Sessions ex

Página 642

666 24.1 Example No. Settings Scenario Page 24.1.1 Outgoing Creating a Policy to Monitor the Internet Access of LAN User 667 24.1.2 Ou

Página 643

667 24.1.1 Creating a Policy to Monitor the Internet Access of LAN Users Step 1. Go to Policy > Outgoing and then set as below:(Figure 22-1) 

Página 644

668 Step 2. Click the Log icon of a policy to see the log.(Figure 22-3)  In the upper-left corner, click the Refresh button or select a refresh

Página 645

57 Figure 2-26 Static Route Setttings Figure 2-27 The Completed Static Route Settings Important: 1. To enable the LAN to LAN connection, go to

Página 646

669 Figure 22-4 Traffic Shown in Log Screen

Página 647

670 Step 3. Under Monitoring > Traffic Grapher > Policy-Based Traffic, the traffic flow is displayed in graphics, giving you an instant insight

Página 649

672 Figure 22-5 Statistics Screen

Página 650 - (Figure 21-21, 21-22)

673 24.1.2 Creating a Policy to Restrict the Access to Specific Web Sites Step 1. Go to Web Filter > Configuration > Whitelist/ Blacklist/ Fi

Página 651

674 Figure 22-9 MIME / Script Settings Figure 22-10 Group Settings

Página 652

675 Step 2. Go to Policy Object > Application Blocking > Settings and then set as below:(Figure 22-11, 22-12) Figure 22-11 Application Blockin

Página 653 - Chapter 22 Configuration

676 2. Application Blocking is used for blocking Instant Messenger, Peer-to-Peer Application, Video/ Audio Application, Webmail, Game Application, T

Página 654 - Terms in QQ Account Manager

677 Step 3. Go to Policy Object > Address > WAN / WAN Group and then set as below:(Figure 22-13, 22-14) Figure 22-13 WAN Interface Setting F

Página 655 - 22.1 Example

678 Step 4. Go to Policy > Outgoing and then set as below:(Figure 22-15)  Select the defined group from the Destination Address field.  Select

Página 656 - Manager

58 Step 2. The subnets 192.168.10.x/24,192.168.20.x/24 and 192.168.1.x/24 can now communicate with each other. In addition, these subnets may also ac

Página 657

679 Step 5. Go to Policy > Outgoing and then set as below:(Figure 22-16)  Select the defined group from the Web Filter drop-down list.  Select

Página 658

680 24.1.3 Creating a Policy to Grant Internet Access to Only Authenticated Users on Schedule Step 1. Go to Policy Object > Schedule > Settin

Página 659 -  Click OK.(Figure 22-7)

681 Figure 22-20 Applying the Schedule and Authentication to the Policy Figure 22-21 Policy Completed

Página 660 - Figure 22-7 Policy Created

682 24.1.4 Creating a Policy to Enable a Remote User to Control a LAN PC with Remote Control Software (pcAnywhere) Step 1. Set up a computer to be

Página 661 - Chapter 23 Reports

683 Step 3. Under Policy > Incoming, set as below:(Figure 22-23)  Select the defined Virtual Server for Destination Address.  Select PC-Anywhe

Página 662

684 24.1.5 Creating a Policy to Limit the Bandwidth, Daily Total Traffic Amount and Maximum Concurrent Sessions of an Incoming Session to a FTP Serv

Página 663

685 Step 4. Go to Policy > WAN to DMZ and then set as below(Figure 22-27)  Select the defined rule from the Destination Address drop-down list.

Página 664

686 Figure 22-28 A WAN-to-DMZ Policy Created

Página 665 - Terms in Message History

687 24.1.6 Creating a Policy to Enable LAN / WAN Users to Have Email Access (A Transparent Mode Example) Step 1. Set up a mail server in DMZ. Next,

Página 666

688 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 22-31)  Select the defined DMZ rule for Destination Address.  Select the defined s

Página 667

6 Chapter 21 Web VPN / SSL VPN ... 622 21.1 Example ...

Página 668 - 23.1 Statistics

59 2.5 DHCP 2.5.1 Using an External DHCP Server to Allocate IP Addresses to Internal PCs Step 1. Go to System > Configuration > DHCP, and se

Página 669

689 Step 5. Under Policy > LAN To DMZ, set as below:(Figure 22-33)  Select the defined DMZ entry for Destination Address.  Select the defined

Página 670 - 23.2 Message History

690 Step 6. Under Policy > DMZ To WAN, set as below:(Figure 22-35)  Select the defined rule for Source Address.  Select the defined rule for S

Página 672

692 Chapter 25 Anomaly Flow IP Once an anomaly traffic flow is detected, CS-2001 will take action to block the flow of packets. This protection ens

Página 673 - Terms in Policy

693 25.1 Example 25.1.1 Configuration for Alerts and the Blocking of Internal DDoS Attacks Step 1. Go to System > Configuration > Settings

Página 674

694 Step 3. Go to Anomaly Flow IP > Settings and then set as below:(Figure 23-2)  Enter the Traffic Threshold per IP. (The default value is 100)

Página 675

695 Step 4. When a DDoS attack occurs, CS-2001 generates a corresponding log under Anomaly Flow IP > Virus-infected IP, and if NetBIOS Notificatio

Página 676

696 Step 6. Internal users will see an alert message upon opening a web browser after being infected by a computer virus. CS-2001 limits virus-infect

Página 678

698 Chapter 26 Inbound Balancing The CS-2001 provides enterprises with Inbound Load Balancing. It ensures uninterrupted access for external users t

Página 679 - (Figure 22-4)

60 Note: 1. When Enable DHCP Relay Support is enabled, internal PCs can obtain an IP address from the server through the specified interface (WAN1

Página 680

699 Terms in Inbound Balancing Domain Name  Refers to an address that is registered at an ISP. An IP address like 198.68.20.78 is not easy to me

Página 681 - (Figure 22-5)

700 Domain Name Type IP Address host1.nu.net.tw A 61.11.11.12 host2.nu.net.tw A 61.11.11.13 host2.nu.net.tw A 211.22.22.23 Table 24-1 Domain Name

Página 682

701  Supposing a user wants to send an email to [email protected]. The user is using test.com.tw as its SMTP server. The DNS records will be quer

Página 683

702 pointer records of the reverse database, this IP address is stored as the domain name 12.11.11.61.in-addr.arpa pointing back to its designated ho

Página 684

703  IPv6 uses PTR record as well. For example, host33.nu.net.tw points to FEC0::2AA:FF:FE3F:2A1C (FEC0:0000:0000:0000:02AA:00FF:FE3F:2A1C), in poi

Página 685 - Figure 22-10 Group Settings

704 Further Description DNS pointers are used to indicate which DNS server holds all the associated DNS records for a domain. Any specific informati

Página 686

705 Note: 1. The DNS must point to the fixed IPs.

Página 687

706 Under Advance > Inbound Balancing > Settings, configure DNS settings as listed below:(Table 24-6) Domain Name Type IP Address Reverse

Página 688 - (Figure 22-13, 22-14)

707 Configure DNS settings as listed below:(Table 24-7) Domain Name Type IP Address Weighting Priority web.nu.net.tw A 61.11.11.11 1 1 web.nu

Página 689 - (Figure 22-15)

708 As seen from table 24-7, it can be inferred that when browsing www.nu.net.tw, visitors are directed to different servers according to their brows

Página 690

61 2.5.2 Using the CS-2001 to Allocate IP Addresses to LAN PCs Step 1. Go to System > Configuration > DHCP and set as below:(Figure 2-30) 

Página 691

709 26.1 Example No. Application Environment Page 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode 710 26.1.2

Página 692

710 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode Step 1. Go to Advance > Inbound Balancing > Settings and p

Página 693 - (Figure 22-22)

711 Figure 24-3 The First Inbound Balance Configuration

Página 694

712 Figure 24-4 The Second Inbound Balance Configuration Figure 24-5 The Completed Settings Note: 1. If @ is entered in the Hostname field, th

Página 695

713 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-6, 24-7) Figure 24-6 Server 1 Settings Figu

Página 696 - (Figure 22-28)

714 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-8)  For Destination Address select [Virtual Server IP]

Página 697

715 Figure 24-9 Configuring the First Settings of an Incoming Policy Settings Figure 24-10 The Completed Policy Settings

Página 698

716 Step 4. Settings complete. If WAN 1 goes down, WAN 2 ensures user’s access to the web server remains uninterrupted.(Figure 24-11) Figure 24-11 W

Página 699

717 26.1.2 Creating an A Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Página 700

718 Figure 24-13 The First Inbound Balance Settings Figure 24-14 The Second Inbound Balance Configuration Figure 24-15 Setting Completed

Página 701

62 Figure 2-30 DHCP Settings

Página 702 - Anomaly Flow IP

719 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-16, 24-17) Figure 24-16 Server 1 Settings Fi

Página 703 - Chapter 25 Anomaly Flow IP

720 Step 3. Go to Policy > Incoming and proceed with the following settings:  Click New Entry.(Figure 24-18)  Select the defined rule ([Virtua

Página 704 - 25.1 Example

721 Figure 24-19 Configuring the Second Policy Settings Figure 24-20 Policy Completed

Página 705

722 Step 4. Setting completed.(Figure 24-21) Figure 24-21 The Round-Robin Deployment Note: 1. Inbound Balance Settings:(Table 24-9) Name Type

Página 706

723 cycle restarted)  The 5th user accesses the server via 211.22.22.22.  The 6th user accesses the server via 211.22.22.22.

Página 707 - (Figure 23-8)

724 26.1.3 Creating a CNAME Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settin

Página 708 - Advance

725 Figure 24-23 The First Inbound Balance Settings Figure 24-24 The Second Inbound Balance Settings Figure 24-25 CNAME(Alias) Settings

Página 709

726 Figure 24-26 Completed CNAME(Alias) Settings

Página 710 - Terms in Inbound Balancing

727 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-27, 24-28) Figure 24-27 Server 1 Settings F

Página 711

728 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-29)  Select the defined rule ([Virtual IP]Web_Server(61

Página 712

63 Note: 1. Enabling Obtain DNS server address automatically is intended for LAN users whom access the Internet via the device’s authentication me

Página 713

729 Figure 24-30 Configuring the Second Policy Settings Figure 24-31 Adding the Second Policy

Página 714

730 Step 4. Setup completed.(Figure 24-32) Figure 24-32 Web Server Deployment Using CNAME Note: 1. The settings for Inbound Balancing:(Table 24-

Página 715

731  The 4th user accesses the server via 61.11.11.11 (Round-Robin priority distribution cycle has restarted)  The 5th user accesses the server v

Página 716

732 26.1.4 Creating a MX Record to Load Balance a Mail Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Página 717 - (Table 24-6)

733 Figure 24-34 The First Inbound Balance Settings Figure 24-35 The Second Inbound Balance Settings Figure 24-36 The MX(Mail eXchanger) Setting

Página 718 - (Table 24-7)

734 Figure 24-37 MX(Mail eXchanger) Settings Completed

Página 719 - (Table 24-8)

735 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-38, 24-39, 24-40, 24-41) Figure 24-38 The Fir

Página 720 - 26.1 Example

736 Figure 24-40 The Third Setting of Server Figure 24-41 The Fourth Setting of Server

Página 721 - Using the Backup Mode

737 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-42)  Select the defined rule ([Virtual IP]Mail_Server_P

Página 722

738 Figure 24-43 The Second Policy Settings Figure 24-44 The Third Policy Settings

Página 723

64 2.6 DDNS Step 1. Go to System > Configuration > Dynamic DNS, and set as below:(Figure 2-31)  Click New Entry. Select a Service Provider

Página 724 - (Figure 24-6, 24-7)

739 Figure 24-45 The Fourth Policy Settings Figure 24-46 Policy Completed

Página 725

740 Step 4. Setup Completed.(Figure 24-47) Figure 24-47 The Mail Server Deployment Note: 1. Settings for Inbound Balancing: (Table 24-11) Name

Página 726

741  The 2nd user accesses the server via 211.22.22.22.  The 3rd user accesses the server via 211.22.22.22 (Round-Robin priority distribution cyc

Página 727 - (Figure 24-11)

742 Chapter 27 High Availability When two CS-2001 devices are deployed in the network, the two devices can operate in active / standby mode. The ma

Página 728 - Using the Round-Robin Mode

743 Terms in High Availability HA Mode  This mode is used to determine if the device will serve as the master or backup. Data Transmission P

Página 729

744 27.1 Example 27.1.1 High Availability Deployment Preparation Configure Port1 as LAN1 (192.168.1.1, NAT/ Routing mode) and connect it to the L

Página 730 - (Figure 24-16, 24-17)

745 Step 1. Assign one CS-2001 device as the master and connect it to the same switch that the LAN is connected to.(Figure 25-1) Figure 25-1 The Dep

Página 731

746 Step 2. Using the master device, configure the following High Availability settings under Network > Interface.(Figure 25-2) Figure 25-2 The

Página 732

747 Step 3. Using the master device, configure the following High Availability settings under Advance > High Availability > Settings:  Tick E

Página 733 - (Figure 24-21)

748 Step 4. To set up the backup device, be sure the backup device is turned off and then configure the interface. Backup device’s LAN port, WAN port

Página 734

65 2.7 Host Table Step 1. Go to System > Configuration > Host Table and set as below:(Figure 2-33)  Configure the Host Name accordingly. 

Página 735

749 Important: 1. After the high availability deployment, if the first time synchronization between the master device and backup device is interr

Página 736

750 Figure 25-6 Backup Device Taking Over Operations When Master Device Fails 6. Note:  During backup, if the WAN port is using a dynamic IP a

Página 737

751 Chapter 28 Co-Defense System The CS-2001 can work in cooperation with the network’s switch, to provide instant monitoring of the internal net

Página 738 - (Figure 24-27, 24-28)

752 Terms in Core Switch Name  The name used to identify the switch. Switch Model  The switch model can be selected or it can be customized. I

Página 739

753 Remove Blocking Command  This command instructs the core switch to discontinue blocking an IP/MAC address. Show Blocking Commands  This comm

Página 740

754 28.1 Example 28.1.1 Quickly Isolating Any Anomaly Flow in the Internal Network by Utilizing the Core and Edge Switch Step 1. Go to Anomaly

Página 741 - (Figure 24-32)

755 Step 2. Under Advance > Co-Defense System > Core Switch, set as below:(Figure 26-3)  Enter the name to identify the switch.  Select the

Página 742

756 Figure 26-4 Core Switch Settings Completed

Página 743

757 Step 3. Under Advance > Co-Defense System > Edge Switch, click New Entry and then set as below:(Figure 26-9)  Type the name in the Name f

Página 744

758 Step 4. Go to Advance > Co-Defense System > MAC ADDR Table. Using SNMP, the CS-2001 can obtain the MAC addresses of any packets that pass t

Página 745

66 2.8 SNMP 2.8.1 SNMP Agent Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Agent Settings section configure the fol

Página 746

759 Monitoring

Página 747

760 Chapter 29 Logs Log comprises logs of Traffic, Events, Connections, Viruses, Application Blocking, Concurrent Sessions and Quota. The system ma

Página 748

761 Terms in Settings Logging Settings  Logs are sent to the designated recipient once the file size reaches 300 KB.  Logs can be backed up onto

Página 749

762 Figure 27-1 Searching for a Specific Log

Página 750

763 Figure 27-2 Downloading the Search Results

Página 751 - (Figure 24-47)

764 Terms in Events Search  Available search criteria are date, admin name, IP address, event type and event log with detailed content.  Unde

Página 752

765 Terms in Connection Search  PPPoE : Available search criteria are date and keyword.  Dynamic IP Address: Available search criteria are date

Página 753

766 Figure 27-4 Searching for a Specific Log

Página 754 - Terms in High Availability

767 Terms in Virus Search  Available search criteria are date, source IP, destination IP, application, infected file and virus name.  Under Mo

Página 755 - 27.1 Example

768 29.1 Traffic 29.1.1 Viewing the Protocols and Port Numbers Used during an Access to CS-2001 Step 1. Go to Policy> DMZ To WAN and set as bel

Página 756 - (Figure 25-1)

67 2.8.2 SNMP Trap Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Trap Settings section, configure the following settin

Página 757 - (Figure 25-2)

769 Step 2. Under Monitoring > Logs > Traffic, it shows the traffic status of a policy.(Figure 27-7) Figure 27-7 Traffic Log Step 3. Click an

Página 758 - (Figure 25-3)

770 Figure 27-8Monitoring the Traffic Flow of Each IP Address

Página 759 - (Figure 25-4)

771 Step 4. To clear the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-9) Figure 27-9 Deleting all the Traffi

Página 760

772 29.2 Event 29.2.1 Viewing System History Access and the Status of WAN Step 1. Under Monitoring > Logs > Events, there it shows the sys

Página 761

773 Figure 27-11 Specific Details of a History Event

Página 762

774 29.3 Connection 29.3.1 Viewing the Connection Logs of WAN Interface Step 1. Under Monitoring > Logs > Connections, it shows the logs o

Página 763 - Terms in Core Switch

775 Step 2. To delete the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-13) Figure 27-13 Deleting all the Con

Página 764

776 29.4 Viruses 29.4.1 Viewing the Detected Viruses from Internal Users Using HTTP / Web Mail / FTP Protocol to Transfer Files Step 1. Go to Po

Página 765 - 28.1 Example

777 Figure 27-14 A Policy with HTTP/ WebMail and FTP

Página 766

778 Figure 27-15 Policy Completed

Página 767

CS-2001 UTM Content Security Gateway User’s Manual 68 2.9 Bulletin Board 2.9.1 Using CS-2001 to Announce the Information to LAN Users and DMZ User

Página 768

779 Step 2. Under Monitoring > Logs > Viruses, it shows the logs of detected virus from the Internal users using HTTP/ WebMail and FTP protocol

Página 769

780 29.5 Application Blocking 29.5.1 Viewing the Logs Step 1. Under Policy > Outgoing, set as below: (Figure 27-16)  Select the defin

Página 770 - Monitoring

781 Step 2. Under Monitoring > Logs > Application Blocking, it shows the logs of applicatons that have been blocked.(Figure 27-18) Figure 27-1

Página 771 - Chapter 29 Logs

782 29.6 Concurrent Sessions 29.6.1 Viewing the Logs of Concurrent Sessions that have been Exceeded the Configured Value Step 1. Go to Policy &g

Página 772 - Terms in Traffic

783 Figure 27-20 A Policy with Limitation of Concurrent Sessions

Página 773

784 Figure 27-21 Policy Completed Step 2. Under Monitoring > Logs > Concurrent Sessions, it shows the logs of the concurrent sessions that ha

Página 774

785 29.7 Quota 29.7.1 Viewing the Logs of Quota that Has Been Reached Step 1. Go to Policy > Outgoing and then set as below:(Figure 27-22) 

Página 775 - Terms in Events

786 Figure 27-22 A Policy with Limitation of Quota per Source IP

Página 776 - Terms in Connection

787 Figure 27-23 Policy Completed Step 2. Under Monitoring > Logs > Quota, it shows the logs of the quota that have reached the configured va

Página 777

788 29.8 Log Backup 29.8.1 Archiving or Retrieving Logs Generated by CS-2001 Step 1. Go to System > Configuration > Settings and then set as

Página 778 - Terms in Quota

7 Chapter 32 Diagnostic Tools ... 816 32.1 Ping ...

Página 779 - 29.1 Traffic

69 Step 2. Under System > Configuration > Bulletin Board, configure the settings in the Bulletin Board Announcements section.  Click New Entr

Página 780 - (Figure 27-8)

789 Step 3. Go to Monitor > Log > Settings and then set as below:(Figure 27-27) Figure 27-27 Monitoring Settings

Página 781

790 Note: 1. Once Email Notification is enabled, the logs will be sent to the IT administrator when the files size reaches 300KB. 2. When syslog

Página 782 - (Figure 27-9)

CS-2001 UTM Content Security Gateway User’s Manual 791 Chapter 30 Accounting Reports Accounting report gives the IT administrator an insight into

Página 783 - 29.2 Event

792 Terms in Setting Accounting Report Settings  The configuration to enable or disable the recording of inbound and outbound data access and co

Página 784

793 Terms in Today Top-N Time Slider  Drag the two sliders to adjust the statistics’ time interval (represented by the red portion.) So

Página 785 - 29.3 Connection

794 Figure 28-2 Searching for the Specific Log

Página 786 - (Figure 27-13)

795 Figure 28-3 Downloading the Accounting Reports

Página 787 - 29.4 Viruses

796 Figure 28-4 Deleting the Accounting Reprots

Página 788

797 30.1 Flow Analysis Step 1. Under Monitoring > Accounting Reports > Flow Analysis, it shows the traffic of source IP and service through C

Página 789

798 30.2 Today’s Top Chart Step 1. Under Monitoring > Accounting Reports > Today’s Top Chart, it shows the traffic from the source IP, destin

Página 790

70 Step 3. The LAN users and DMZ users will see the announcement when they access the Internet.(Figure 2-39, 2-40) Figure 2-39 Clicking the Button

Página 791 - 29.5 Application Blocking

799 Figure 28-6 Today Top-N

Página 792

800 Step 2. You may drag the two sliders to adjust the statistics’ time interval. The left one is the start time slider, the right one is the end tim

Página 793 - 29.6 Concurrent Sessions

801 Figure 28-7 Today Top-N Report according to the Time Interval

Página 794

802 Step 3. By clicking any source IP, a pop-up window will show its destination IP and service.(Figure 28-8) Figure 28-8 The Destination IP and Ser

Página 795

803 Figure 28-9 The Source IP and Service

Página 796 - 29.7 Quota

804 Step 5. By clicking any service, it will show its source IP and destination IP. (Figure 28-10) Figure 28-10 The Source IP and Destination IP

Página 797

805 30.3 Historical Top Chart Step 1. Under Monitoring > Accounting Reports > Historical Top Chart, you may see the traffic of the source IP,

Página 798

806 Chapter 31 Traffic Grapher Statistics delivers comprehensive information regarding network traffic, enabling the IT administrator to gain a tho

Página 799 - 29.8 Log Backup

807 Traffic Grapher Charts  Vertical axis indicates the network traffic.  Horizontal axis indicates time. Type/ Source/ Destination/ Service/ A

Página 800 - (Figure 27-27)

808 31.1 WAN Traffic Step 1. In Monitoring > Traffic Grapher > WAN Traffic, it shows the statistics of upstream / downstream packets over the

Página 801

71 172.19.1.254. You may enter http://172.19.1.254:84 in the web browser. (Figure 2-41, 2-42) Figure 2-41 Logging in the Bulletin Board Setting Pa

Página 802

809 Step 2. Statistic charts(Figure 29-2)  Vertical axis indicates network stream.  Horizontal axis indicates time.

Página 804 - Historical Top Chart

811 Figure 29-2 The Network Stream Chart Note: 1. You may configure the time duration to search for the statistics in a certain period of time.

Página 805

812 31.2 Policy-Based Traffic Step 1. When creating a new policy, if the Statistics is enabled, the Policy statistics charts in the path of Monitor

Página 806

813 Step 2. Statistics charts.(Figure 29-4)  Vertical axis indicates network traffic.  Horizontal axis indicates time.

Página 808 - 30.1 Flow Analysis

815 Figure 29-4 Viewing the Policy Statistics Chart Note: 1. You may see the statistics of a certain time by using the time searching.

Página 809 - 30.2 Today’s Top Chart

816 Chapter 32 Diagnostic Tools The device provides ping and traceroute utilities to help diagnose network issues with particular external nodes.

Página 810 - Figure 28-6 Today Top-N

817 32.1 Ping Step 1. To test whether a host is reachable across an IP network, go to Monitoring > Diagnostic Tools > Ping and then configure

Página 811 - (Figure 28-7)

818 Figure 30-2 Ping Result Note: 1. If VPN is selected from the Interface drop-down list, the user must enter the local LAN IP address in the I

Página 812

72 2.10 Language 2.10.1 Changing the Language Step 1. Under System > Configuration > Language, you may change the language of the user inter

Página 813 - (Figure 28-9)

819 Figure 30-3 Ping Results for a VPN Connection

Página 814

820 32.2 Traceroute Step 1. Under Monitoring > Diagnostic Tools> Traceroute the Traceroute command can be used by the CS-2001 to send out pac

Página 815 - (Figure 28-10)

821 Figure 30-5 Traceroute Results

Página 816 - 30.3 Historical Top Chart

CS-2001 UTM Content Security Gateway User’s Manual 822 32.3 Packet Capture Capture packetfor debugging Step 1. Under Monitoring > Diagnostic T

Página 817 - Chapter 31 Traffic Grapher

823 Chapter 33 Wake-On-LAN Any wake-on-LAN supported PC can be remotely turned on by a “wake-up” packet sent from the CS-2001. By utilizing remote

Página 818 - Traffic Grapher

824 33.1 Example 33.1.1 Remote Controlling a PC Step 1. Supposing the MAC address of the PC that is desired to be remotely controlled is 00:0C:76:

Página 819 - 31.1 WAN Traffic

825 Chapter 34 Status Status provides current information about the device and the network including Interface, System Info, Authentication, ARP Ta

Página 820 - (Figure 29-2)

826 34.1 Interface Step 1. Under Monitoring > Status > Interface, it shows the status of all interface.(Figure 32-2) Figure 32-2 Status In

Página 821

827 8. PPPoE / Dynamic IP Uptime: when the interface is connected using PPPoE, it displays the connection uptime. 9. MAC Address: displays the MAC

Página 822

828 34.2 System Info Step 1. Under Monitoring > Status > System Info, it shows the current system information, such as CPU utilization, hard

Página 824 - (Figure 29-4)

829 Figure 32-3 System Information

Página 825

830 34.3 Authentication Step 1. Under Monitoring > Status > Authentication, it shows the authentication status of the device.(Figure 32-4) F

Página 826

831 34.4 ARP Table Step 1. Under Monitoring > Status > ARP Table, it shows NetBIOS Name, IP Address, MAC Address and Interface of any compute

Página 827 - Chapter 32 Diagnostic Tools

832 Figure 32-6 Downloading the Anti-ARP Virus Software Figure 32-7 The Result of Executng the Anti-ARP Virus Software

Página 828 - 32.1 Ping

833 Figure 32-8 The Anti-ARP Virus Software will Automatically Run when the System Startups

Página 829 - Figure 30-2 Ping Result

834 34.5 Sessions Info Step 1. Under Monitoring > Status > Sessions Info, it provides a list of all the sessions that have connected to the d

Página 830

835 Step 2. By clicking on any source IP, it shows the port number and the traffic.(Figure 32-10) Figure 32-10 The System Info

Página 831 - 32.2 Traceroute

836 34.6 DHCP Clients Step 1. Under Monitoring > Status > DHCP Clients, it shows the status of IP address distributed by the device’s DHCP se

Página 832

CS-2001 UTM Content Security Gateway User’s Manual 837 34.7 Host Info Step1. Under Monitoring > Status > Host Info, the IT administrator ma

Página 833 - 32.3 Packet Capture

74 Chapter 3 Interface The Interface configuration allows you to configure the connection parameters separately for LAN, WAN and DMZ interfaces as

Página 834 - Chapter 33 Wake-On-LAN

75 Terms in Settings DNS Settings  The DNS servers used for resolving domain names to IP addresses. MTU Setting  The Maximum Transmission Unit

Página 835 - 33.1 Example

76 Interface Designation  The system-assigned name based on the network interface type selected. Interface Type  The network interface is catego

Página 836 - Chapter 34 Status

77  IPv6 address represent itself as text string using the following three conventional forms:  Colon-hexadecimal form: This is the preferred for

Página 837 - 34.1 Interface

78  The IPv6 prefix is the part of the address that indicates the bits that have fixed values. If it happens not to be a multiple of four such as 2

Página 838

8 Quick Installation Guide

Página 839 - 34.2 System Info

79  The result, 02-AA-00-FF-FE-3F-2A-1C, is converted to colon-hexadecimal notation, yielding the interface identifier 2AA:FF:FE3F:2A1C. Thus, in t

Página 840

80 SSH  When ticked, the management interface is available for access via SSH protocol. Connection Type (As Interface Type set to WAN)  It has t

Página 841 - 34.3 Authentication

81 NAT Redirection  Translates private IP addresses into public addresses.  Auto-configuration: The public address is automatically designated b

Página 842 - 34.4 ARP Table

82 Detection Mode  When Round-Robin or Active-Backup is selected for Bonding Mode, ARP detect can be selected to detect the connection. Saturate

Página 843

83 Terms in Interface Group Interface Group  Allows you to group network interface while each group is isolated from one another. Note: This requ

Página 844

84 3.1 Example No. Scenario Page 3.1.1 Modifying the LAN Interface (NAT / Routing) 85 3.1.2 Configuring the WAN Interface 87 3.1.3 Using

Página 845 - 34.5 Sessions Info

85 3.1.1 Modifying the LAN Interface (NAT / Routing) Prerequisite Setup (Note: IP addresses used as examples only) Port1 is configured as LAN1 by

Página 846 - Figure 32-10 The System Info

86 2. Do not disable HTTP and HTTPS before configuring the settings under System > Administration > Permitted IPs, or the IT administrator may

Página 847 - 34.6 DHCP Clients

87 3.1.2 Configuring the WAN Interface Step 1. Go to Network > Interface and then click Port2’s Modify button. Select WAN for Interface Type. St

Página 848 - 34.7 Host Info

88 Step 3. Select WAN for Interface Type:  Static IP Address:(Figure 3-4)  Enter the IP Address, Netmask and Default Gateway.  Enter the Max. D

Comentários a estes Manuais

Sem comentários