Planet CS-2001 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Komunikacja Planet CS-2001. PLANET CS-2001 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 848
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
CS-2001 UTM Content Security Gateway User’s Manual
0
Users Manual
CS-2001
UTM Content Security Gateway
Przeglądanie stron 0
1 2 3 4 5 6 ... 847 848

Podsumowanie treści

Strona 1 - UTM Content Security Gateway

CS-2001 UTM Content Security Gateway User’s Manual 0 User’s Manual CS-2001 UTM Content Security Gateway

Strona 2

9 Hardware Installation Front panel: Figure 1a. Front Panel of the CS-2001 Rear panel: Figure 1b. Rear Panel of the CS-2001  Power Indi

Strona 3

89 Figure 3-4 Configuring the Static IP Address Figure 3-5 Setting Completed

Strona 4 - Revision

90 Figure 3-6 Configuring the Dynamic IP Address Figure 3-7 Setting Completed

Strona 5 - Table of Contents

91 Figure 3-8 Configuring the PPPoE Figure 3-9 Setting Completed

Strona 6

92 Note: 1. The DNS Settings may be configured under Network > Settings. 2. When Ping, HTTP and HTTPS are enabled, the users may access the CS

Strona 7

93 3.1.3 Using CS-2001 as a Gateway for Users on Two Subnets to Access the Internet (NAT/Routing) Prerequisite Setup (Note: IP Addresses used as ex

Strona 8

94 Figure 3-10 Configuring the LAN Interface

Strona 9 - Quick Installation Guide

95 Step 2. Go to Network > Interface and then set as below:(Figure 3-11)  Click Port3’s Modify button.  Select LAN for Interface Type.  Sele

Strona 10 - Hardware Installation

96 Step 3. LAN1 and LAN2 users will connect to WAN1(61.11.11.11) and use WAN1’s IP address to access the Internet. You may create the policy to estab

Strona 11 - CS-2001 Topology:

97 3.1.4 Using CS-2001 as a Gateway for the Internal Users to Access the Internet and Configure the DMZ for the External Users to Access the Network

Strona 12 - Basic System Configuration

98 Figure 3-13 Configuring the LAN Interface

Strona 13

CS-2001 UTM Content Security Gateway User’s Manual 0 LED / Port Description WAN LAN DMZ LED1(Left) Orange Steady on indicates the port is connec

Strona 14 - Figure5. The Install Wizard

99 Step 2. Go to Network > Interface and then set as below:(Figure 3-14)  Click Port3’s Modify button.  Select DMZ for Interface Type.  Sele

Strona 15 - Figure7. Interface Settings

100 Step 3. The external users may connect to the web server (61.11.11.12) to access the network resource. The LAN users may connect to WAN1 (61.11.1

Strona 16 - Figure8. The WAN Settings

101 3.1.5 Deploying the CS-2001 between the Gateway and LAN (configuring two subnets, one using Transparent Routing, the other one using NAT/Routing

Strona 17 - Figure9. Time Settings

102 Step 1. Go to Network > Interface and then set as below:(Figure 3-16)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Strona 18

103 nterface Settings Step 3. LAN1 users (192.168.1.x/24) and LAN2 users (192.168.2.x/24) may use their original IP addresses to access the Internet

Strona 19 - Step 11. Settings complete

104 Figure 3-18 The deployment of LAN Using Transparent Routing and NAT/ Routing

Strona 20 - S.1 Overview of Functions

105 3.1.6 Deploying the CS-2001 between the Gateway and the LAN (LAN1 and DMZ1), connecting LAN1 to the user’s PC (using NAT/Routing mode) and then

Strona 21

106 Step 1. Go to Network > Interface and then set as below:(Figure 3-19)  Click Port1’s Modify button.  Select LAN for Interface Type.  Sel

Strona 22

107 Figure 3-20 DMZ Interface Settings Step 3. Go to Network > Interface Group and then set as below:(Figure 3-21)  Configure Port2(WAN1) and Po

Strona 23

108 Step 4. PCs (IP range: 172.16.x.x/16) on DMZ may use the original address to access the Internet through CS-2001. PCs on LAN will connect to WAN1

Strona 24

1 Basic System Configuration Step 1. Connect both the IT administrator’s PC and the device’s LAN port to the same hub / switch, and launch a browser

Strona 25

109 Note: 1. PCs in DMZ will access the Internet via the original firewall. 2. If Port4 is configured as WAN2 (211.22.22.22) and connected to the

Strona 26

110 3. Configure a router to connect different subnets in LAN for the PCs to access the Internet through the original firewall. PCs in DMZ may using

Strona 27

111 4. Configure two Firewall to connect the Internet and the CS-2001 and then configure a router to connect the CS-2001 and DMZ (192.168.2.1/24 and

Strona 28 - Chapter 1 Administration

112 3.1.7 Deploying CS-2001 between the Gateway and LAN (LAN1 and DMZ1) for LAN Users and DMZ Users to Access the Internet Prerequisite Setup (Note

Strona 29 - Terms in Admin

113 Step 1. Go to Network > Interface and then set as below:(Figure 3-26)  Click Port1’s Modify button.  Select WAN for Interface Type.  Sel

Strona 30 - 1.1 Admin

114 Step 2. Under Network > Interface, set as below:(Figure 3-27)  Click Port2’s Modify button.  Select LAN for Interface Type.  Select Tran

Strona 31

115 Step 3. Under Network > Interface and then set as below:(Figure 3-28)  Click Port3’s Modify button.  Select WAN for Interface Type.  Sel

Strona 32 - 1.2 Permitted IPs

116 Step 4. Under Network > Interface, set as below:(Figure 3-29)  Click Port4’s Modify button.  Select DMZ for Interface Type.  Select Tran

Strona 33 - 1.3 Logout

117 Step 6. Users connecting to Port2(LAN1) will use 192.168.1.x/24 to access the Internet. Users on Port4(DMZ1) will use the IP address that distrib

Strona 34 - (Figure 1-6)

118 3.1.8 Using the CS-2001 Device as the Gateway and Connecting it to the LAN (There are Two LAN Interface, One Use NAT/Routing, the Other One Use

Strona 35 - 1.4 Updating Software

2 Step 3. The user interface consists of the following two panels:  Menu Panel: Presents all the available system configurations in a tree direct

Strona 36 - Chapter 2 Configuration

119 Step 1. Go to Network > Interface and set as below:(Figure 3-32)  Click Port1’s Modify button.  Select WAN for Interface Type.  Select t

Strona 37 - Terms in Setting

120 Step 2. Go to Network > Interface and then set as below:(Figure 3-33)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Strona 38

121 Step 4. Go to Network > Interface Group and then set as below:(Figure 3-35)  Configure Port1(WAN1), Port2(LAN1) and Port3(LAN2) as Group 1.

Strona 39 - Terms in Multiple Subnet

122 Step 5. PCs under sales department (LAN1) and PCs under support department (LAN2) are on 192.168.1.x/24. They will connect to WAN1 and use WAN1’s

Strona 41

124 Policy Object

Strona 42

125 Chapter 4 Address In Address, the IT administrator may configure network settings of LAN, WAN and DMZ, as well as designate specific addresses

Strona 43 - Terms in Host Table

126 Terms in Address Name  An easily identifiable name to represent the IP address or addresses. Address type  Used to designate the IP range a

Strona 44 - Terms in SNMP

CS-2001 UTM Content Security Gateway User’s Manual 127 FQDN(Fully Qualified Domain Name)  The FQDN consists of two parts: the hostname and the dom

Strona 45 - Terms in Bulletin Board

128 4.1 Example No. Settings Scenario Page 4.1.1 LAN Using DHCP to Grant Only FTP Access to a LAN User with Specific IP Address 129 4.1.2

Strona 46 - 2.1 Settings

3 Step 4. If it’s the first time you’ve logged into the management interface, an install wizard will appear to guide you through setting some of the

Strona 47

129 4.1.1 Using DHCP to Assign an IP to a Specific User and only Permitting FTP Access Step 1. Under Policy Object > Address > LAN, set as bel

Strona 48 - Formatting the Hard Drive

130 Note: 1. To save the configured data from Policy Object > Address > WAN / LAN / DMZ as a file for storage or modification, use Export da

Strona 49

131 Step 2. Go to Policy > Outgoing and configure as below:(Figure 4-3)  Source Address: Select the source address.  Service : Select FTP. 

Strona 50 - 2.1.5 Rebooting the CS-2001

132 4.1.2 Creating a Policy for Certain Users to Connect to a Specific IP Address Step 1. Create several addresses under Policy Object > Address

Strona 51 - 2.2 Date / Time

133 Step 2. Under Policy Object > Address > LAN Group, set as below:(Figure 4-6)  Click New Entry.  Name: Designate a name for the group. 

Strona 52 - Access the Internet

134 Step 3. Go to Policy Object > Address > WAN and configure as below:(Figure 4-8)  Click New Entry.  Name: Designate a name for the group

Strona 53

135 Step 4. Go to Policy > Outgoing and configure as below:(Figure 4-10)  Source Address: Select the LAN address group.  Destination Address:

Strona 54

136 Chapter 5 Service TCP and UDP protocols provide different services. These services have an associated port number, for example Telnet = 23, FTP

Strona 55

137 Terms of Service Pre-Defined Symbol Description Any service Services using the TCP protocol: AFPoverTCP, AOL, BGP, FINGER, FTP, GOPH

Strona 56 - (Figure 2-13, 2-14)

138 5.1 Example of Pre-defined 5.1.1 Creating a Policy to Permit WAN Users Using VoIP Technology to Communicate with LAN Users (Using VoIP Port Num

Strona 57

4 Important: 1. Any data saved on the interface will be saved as the selected default character encoding if the device is unable to recognize the

Strona 58

139 Step 2. Go to Policy Object > Service > Custom and then configure as below:(Figure 5-3)  Name: Type in a name for the service.  In row

Strona 59 - (Figure 2-15)

140 Step 3. Go to Policy Object > Virtual Server > Port Mapping and use settings you created in Policy Object > Service > Custom. (Figure

Strona 60 - (Figure 2-17, 2-18)

141 Step 5. Go to Policy > Outgoing and configure as below:(Figure 5-8)  Source Address: Select the LAN group.  Service: Select the custom ser

Strona 61

142 5.2 Example of Service Group 5.2.1 Creating a Policy with a Service Group to Limit Specific LAN Users to Access Only Certain Internet Service

Strona 62

143 Figure 5-11 The Added Service Group

Strona 63 - (Figure 2-19)

144 Step 2. Go to Policy Object > Address > LAN Group and create a LAN Group of specific LAN users that are only permitted to access certain se

Strona 64

145 Figure 5-14 The Completed Policy Settings

Strona 65 - (Figure 2-23)

146 Chapter 6 Schedule Schedule is used for regulating the activation time of policies. With its help, the IT administrator may determine a specifi

Strona 66 - 2.4 Route Table

147 Terms in Schedule Name  Designates the name of the schedule. Type  Two modes are provided:  Recurring: Based upon a weekly schedule,

Strona 67

148 6.1 Example 6.1.1 Assigning Daily Internet Access Time Slots for LAN Users Step 1. Under Policy Object > Schedule > Settings, set as belo

Strona 68

5 Step 7. Configure theWAN Interface (please refer to your ISP for the settings).  Setting: Select Port2(WAN1)  Interface: Select WAN  Connecti

Strona 69 - (Figure 2-28)

149 Step 2. Under Policy > Outgoing, set as below:(Figure 6-3)  Select the pre-defined schedule for Schedule.  Click OK.(Figure 6-4) Figure 6

Strona 70 - 2.5 DHCP

150 Chapter 7 QoS QoS provides bandwidth management for LAN users accessing the Internet via the CS-2001. When applied with a Policy, it ensures us

Strona 71 - CS-2001

151 Terms in Settings Name  The name of the QoS setting. Port  The WAN port to apply QoS. Downstream Bandwidth  Determines the guaranteed ba

Strona 72 - (Figure 2-30)

152 7.1 Example 7.1.1 Creating a Policy to Limit Upload and Download Bandwidth Step 1. Under Policy Object > QoS > Settings, set as below:(F

Strona 73 - Figure 2-30 DHCP Settings

153 Figure 7-4 The Completed QoS Settings

Strona 74

154 Step 2. Under Policy > Outgoing, set as below:(Figure 7-5)  Select the pre-configured QoS setting.  Click OK.(Figure 7-6) Figure 7-5 Appl

Strona 75 - 2.6 DDNS

155 Figure 7-6 The Completed Policy Setting Note: 1. Under Policy Object > QoS > Settings, the available bandwidth range, such as G. Bandw

Strona 76 - 2.7 Host Table

156 Chapter 8 Authentication Authentication regulates users access to the Internet. CS-2001 offers five authentication modes, namely User, Group, R

Strona 77 - 2.8 SNMP

157 Terms in Authentication Authentication Management  Provides basic settings for managing authentication:  Authentication Port Number: The por

Strona 78 - 2.8.2 SNMP Trap Settings

158 Figure 8-1 Authentication Management Settings

Strona 79 - 2.9 Bulletin Board

6 Step 8. Tick the Synchronize to an NTP Server box to ensure the system is provided with the accurate time. Figure9. Time Settings Step 9. Enab

Strona 80 - DMZ/ DMZ Group

159  The authentication login screen appears after a user attempts to access a web site:(Figure 8-2) Figure 8-2 The Authentication Login Screen 

Strona 81

160 Note: 1. The Allow password modification mechanism is only applicable to authenticated users. 2. The authentication login screen appears afte

Strona 82 - (Figure 2-41, 2-42)

CS-2001 UTM Content Security Gateway User’s Manual 161 LDAP User Name Lists the LDAP User Name from LDAP server. The user name may be grouped for au

Strona 83 - 2.10 Language

162 8.1 User / Group Authentication 8.1.1 Regulating Internet Access with a Policy Step 1. Go to Policy Object > Authentication > Account, a

Strona 84 - Interface

163 Step 2. Under Policy Object > Authentication > Group, set as below:(Figure 8-5)  Click New Entry.  Group Name: Type a name for the gr

Strona 85 - Chapter 3 Interface

164 Step 3. Go to Policy > Outgoing and configure as below:(Figure 8-6)  Authentication: Select the group name that was configured in the previo

Strona 86 - Terms in Interface

165 Step 4. The authentication login screen is displayed in the web browser when a LAN user tries to access the Internet. Internet access will be ava

Strona 87

166 8.2 RADIUS Authentication 8.2.1 Regulating Internet Access with a Policy – An Example using the RADIUS Server from Windows Server 2003 ※ Th

Strona 88

167 Step 3. The Internet Authentication Service.(Figure 8-11) Figure 8-11 Selecting the Internet Authentication Service Step 4. Go to Start >

Strona 89

168 Step 5. Right-click RADIUS Clients and then click New RADIUS Client.(Figure 8-13) Figure 8-13 Adding a RADIUS Client Step 6. Type a name and th

Strona 90

7 Note: 1. Go to Policy > Outgoing and configure as below:  Source Address: Select Inside_Any  Destination Address: Select Outside_Any  S

Strona 91

169 Figure 8-14 Typing a Friendly Name and the Management Address

Strona 92

170 Step 7. Select RADIUS Standard from the Client-Vendor dorp-down list, and then configure the Shared secret and Confirm shared secret as same as t

Strona 93

171 Figure 8-16 Adding a Remote Access Policy

Strona 94 - Terms in Interface Group

172 Step 9. Select Use the wizard to set up a typical policy for a common scenario and then type a name in the Policy name field.(Figure 8-17) Figur

Strona 95 - 3.1 Example

173 Step 10. Select Ethernet.(Figure 8-18) Figure 8-18 Selecting the Access Method

Strona 96

174 Step 11. Select User.(Figure 8-19) Figure 8-19 Selecting User or Group Access Step 12. Select MD5-Challenge from the drop-down list.(Figure 8-

Strona 97 - UI from LAN

175 Step 13. Right-click the newly added policy name and then click Properties.(Figure 8-21) Figure 8-21 Configuring the Properties of a Policy

Strona 98

176 Step 14. Select Grant remote access permission and then remove the existing settings. Next, click Add….(Figure 8-22) Figure 8-22 Configuring th

Strona 99

177 Step 15. Select Service-Type to add.(Figure 8-23) Figure 8-23 Select the Attribute Type Step 16. Select Authenticate Only and Framed from the

Strona 100 - Figure 3-5 Setting Completed

178 Step 17. Click on the Edit Profile…, then click the IP tab and then tick Server settings determine IP address assignment.(Figure 8-25) Figure 8

Strona 101 - Figure 3-7 Setting Completed

8 Step 11. Settings complete. Figure13. Installation Wizard Completed

Strona 102 - Figure 3-9 Setting Completed

179 Step 18. Click on the Edit Profile… button then click on the Authentication tab. Tick Microsoft Encrypted Authentication version 2 (MS-CHAP v2),

Strona 103

180 Step 19. Click on the Edit Profile…, click the Advanced tab and then click Add….(Figure 8-27) Figure 8-27 Configuring the Advanced Settings

Strona 104 - (Figure 3-10)

181 Step 20. Select Framed-Protocol and click Add.(Figure 8-28) Figure 8-28 Adding the Attribute

Strona 105

182 Step 21. For Framed-Protocol, select PPP from the Attribute value drop-down list.(Figure 8-29) Figure 8-29 Attribute Setting 1 Step 22. For S

Strona 106 - (Figure 3-11)

183 Step 23. Go to Start > Settings > Control Panel > Administrative Tools, then select Computer Management.(Figure 8-31) Figure 8-31 Sele

Strona 107 - (Figure 3-12)

184 Figure 8-32 Adding a User

Strona 108 - (Figure 3-13)

185 Step 25. Settings completed. Step 26. Under Policy Object > Authentication > RADIUS, configure each field to be the same as the settings

Strona 109

186 Step 28. Under Policy > Outgoing, set as below:(Figure 8-35)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Strona 110 - Interface settings

187 8.3 POP3 Authentication 8.3.1 Regulating Internet Access with a Policy – An Example of POP3 Step 1. Under Policy Object > Authenticat

Strona 111 - (Figure 3-15)

188 Figure 8-39 Adding POP3 User to an Authenticated Group

Strona 112 - Internet

1 Copyright Copyright© 2012 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

Strona 113

9 S.1 Overview of Functions Category Configurable Settings Description Index System Administration Admin Creates, modifies or removes adminis

Strona 114 - (Figure 3-18)

189 Step 3. Under Policy > Outgoing, set as below:(Figure 8-40)  Authentication: Select the user group.  Click OK.(Figure 8-41) Figure 8-40 U

Strona 115

190 8.4 LDAP Authentication 8.4.1 Regulating Internet Access with a Policy - An Example of Windows Server 2003 Built-in LDAP Server ※ The Con

Strona 116

191 Step 3. In the Preliminary Steps window, click Next.(Figure 8-44) Figure 8-44 Preliminary Steps Step 4. In the Server Role window, select Dom

Strona 117 - (Figure 3-20)

192 Step 5. In the Summary of Selections window, click Next.(Figure 8-46) Figure 8-46 Summary of Selections Step 6. In the Active Directory Insta

Strona 118 - (Figure 3-21)

193 Step 7. In the Operating System Compatibility window, click Next.(Figure 8-48) Figure 8-48 Operating System Compatibility Step 8. In the Domain

Strona 119 - (Figure 3-22)

194 Step 9. In the Create New Domain window, select Domain in a new forest and click Next.(Figure 8-50) Figure 8-50 Creating a New Domain Step 10.

Strona 120 - (Figure 3-23)

195 Step 11. In the NetBIOS Domain Name window, type a Domain NetBIOS name and then click Next.(Figure 8-52) Figure 8-52 The NetBIOS Domain Name St

Strona 121 - (Figure 3-24)

196 Step 13. In the Shared System Volume window, specify the Folder location and then click Next.(Figure 8-54) Figure 8-54 The Shared System Volume

Strona 122 - (Figure 3-25)

197 Step 15. In the Permissions window, select Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems and then click

Strona 123

198 Step 17. In the Summary window, click Next. (Figure 8-58) Figure 8-58 The Summary Step 18. Settings completed.(Figure 8-59) Figure 8-59 Sett

Strona 124 - (Figure 3-26)

10 LAN and DMZ users. Installation Wizard For quick installation and configuration. Language Available languages include Traditional Chinese, Simp

Strona 125 - (Figure 3-27)

199 Step 19. Go to Start > Programs > Administrative Tools > Active Directory Users and Computers.(Figure 8-60) Figure 8-60 Navigating to

Strona 126 - (Figure 3-28)

200 Step 21. In the New Object–User window, apply your information to the fields, and then click Next.(Figure 8-62) Figure 8-62 New Object – User S

Strona 127 - Important:

201 Step 23. User has been successfully created.(Figure 8-64) Figure 8-64 User Successfully Created Step 24. Go to Policy Object > Authenticat

Strona 128 - (Figure 3-31)

202 Step 25. Go to Policy Object > Authentication > Group, then add LDAP User.(Figure 8-66) Figure 8-66 Adding the LDAP User

Strona 129

203 Step 26. Under Policy > Outgoing, set as below:(Figure 8-67)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Strona 130 - (Figure 3-32)

204 Chapter 9 Application Blocking Application Blocking regulates the control of Instant Messenger Login, File Transfer over IM, Peer-to-Peer Shari

Strona 131

205 Terms in Application Blocking Application Signatures Settings  The application signatures are updated hourly. Alternatively, they can be manua

Strona 132

206 VPN Tunneling  Regulates the online usage of VNN Client, Ultra-Surf, Tor, Hamachi, HotSpot Shield and FreeGate. Remote Controlling  Regulate

Strona 133 - (Figure 3-36)

207 9.1 Example No. Example Scenario Page 9.1.1 IM Regulating the Use of IM Software ─ Messaging and File Transferring 208 9.1.2 P2P

Strona 134

208 9.1.1 Regulating the Use of IM Software ─ Messaging and File Transferring Step 1. Go to Policy Object > Application Blocking > Settings

Strona 135 - Policy Object

11 Web-based mail, online gaming, VPN Tunneling, and remote controlling. Virtual Server Mapped IPs Maps an internal host to an external IP address

Strona 136 - Chapter 4 Address

209 Figure 9-2 Settings Completed

Strona 137 - Terms in Address

210 Step 1. Under Policy > Outgoing, set as below:(Figure 9-3)  Application Blocking: Select the name of the Application Blocking setting.  Cl

Strona 138

211 9.1.2 Regulating the Use of P2P Software - Downloading and Uploading Step 1. Under Policy Object > Application Blocking > Settings, set

Strona 139 - 4.1 Example

212 Figure 9-6 Settings Completed

Strona 140 - Permitting FTP Access

213 Step 2. Under Policy > Outgoing, set as below:(Figure 9-7)  Application Blocking: Select the name of the Application Blocking Setting.  Cl

Strona 141

214 Chapter 10 Virtual Server Virtual server provides services to external users by mapping a real IP address from a WAN port on the CS-2001 to a p

Strona 142 - : Select FTP

215 Terms in Virtual Server WAN IP  The real IP address of the WAN. Map to Virtual IP  The private network address of a server in the LAN.

Strona 143 - Specific IP Address

216 10.1 Example No. Settings Scenario Page 10.1.1 Mapped IPs Using a Server to Provide FTP, Web and Mail Services through the Regulation of a

Strona 144 - Note:

217 10.1.1 Using a Server to Provide FTP, Web and Mail Services through the Regulation of a Policy Step 1. Setup a server in the LAN which provides

Strona 145

218 Step 4. Go to Policy Object > Service > Group, and create a group called Main_Service containing all of the server’s services e.g. DNS, FTP

Strona 146

12 Personal Rule spam filtering is applied in the following order: Greylist Filtering > Personal Rule, Global Rule > Whitelist > Blacklist

Strona 147 - Chapter 5 Service

219 Step 6. Under Policy > Outgoing, set as below: (Figure 10-6)  Source Address: Select the LAN address.  Service: Select Mail_Service.  Cl

Strona 148 - Terms of Service

220 Step 7. The completed settings.(Figure 10-8) Figure 10-8 The Server Providing Multiple Services Note: 1. It is strongly recommended not to s

Strona 149 - 5.1 Example of Pre-defined

221 10.1.2 Using Multiple Virtual Servers to Host a Web Site through the Regulation of a Policy Step 1. Set up multiple web servers in the LAN us

Strona 150

222 Figure 10-9 Setting Virtual IP Figure 10-10 The Completed Virtual IP Settings

Strona 151

223 Step 3. Under Policy > Incoming, set as below:(Figure 10-11)  Destination IP: Select the Virtual IP setting.  Service: Select HTTP(8080) 

Strona 152

224 Step 4. Settings completed.(Figure 10-13) Figure 10-13 Multiple Servers Hosting a Single Website

Strona 153 - POP3, SMTP and DNS)

225 10.1.3 A VoIP Session Between an External and Internal User (VoIP Ports: TCP 1720, TCP 15321-15333 and UDP 15321-15333) Step 1. Configure inter

Strona 154

226 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-16)  Name : Enter the name for the Virtual IP settin

Strona 155

227 Step 5. Under Policy > Incoming, set as below:(Figure 10-18)  Destination IP: Select the vitual server setting.  Service: Select the custo

Strona 156

228 Step 6. Under Policy > Outgoing, set as below:(Figure 10-20)  Source IP: Select the address setting.  Service: Select the service setting.

Strona 157 - Chapter 6 Schedule

13 IDP Reports Settings Provides statistics in the form of graphs and logs. Statistics can be sent to the specific recipient periodically and logs

Strona 158 - Terms in Schedule

229 Step 7. A VoIP session created between an internal and external user.(Figure 10-22) Figure 10-22 The Completed VoIP Setup

Strona 159 - 6.1 Example

230 10.1.4 Using Multiple Virtual Servers to Provide HTTP, POP3, SMTP and DNS Services through the Regulation of a Policy Step 1. Set up multiple s

Strona 160

231 Figure 10-25 A Created Group Service

Strona 161 - Chapter 7 QoS

232 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-26)  Name: Enter the name for the setting.  Server

Strona 162 - Terms in Settings

233 Step 5. Go to Policy > Incoming and then set as below:(Figure 10-28)  Select the virtual server setting for Destination IP.  Select Main_S

Strona 163 - 7.1 Example

234 Step 6. Go to Policy > Outgoing and set as below:(Figure 10-30)  Select the defined rule from the Source Address drop-down list.  Select M

Strona 164

235 Step 7. Settings completed.(Figure 10-32) Figure 10-32 Settings Completed

Strona 165 -  Click OK.(Figure 7-6)

236 Chapter 11 VPN To obtain a private and secure network link, the CS-2001 is capable of establishing VPN connections. When used in combination wi

Strona 166

237 Terms in VPN Diffie-Hellman  A cryptographic protocol that allows two parties that have no perior knowledge of each other to establish a share

Strona 167 - Chapter 8 Authentication

238 AH ( Authentication Header )  The Authentication Header guarantees connectionless integrity and data origin authentication of IP datagrams.

Strona 168 - Terms in Authentication

14 Virus-infected IP Displays a list of IP addresses detected as having an anomaly flow. Advanced Inbound Balancing Settings For distributing inbo

Strona 169

239 Extended Authentication (XAuth)  XAuth provides an additional level of authentication. It uses a Request/ Reply mechanism to provide the extend

Strona 170

240 Terms in One-Step IPSec One-Step IPSec  One-Step IPSec merely takes one step to complete settings  Go to Policy Object > VPN > One-Ste

Strona 171

241 Figure 11-3 The Automatically Created IPSec Policy Figure 11-4 The Corresponding Outgoing Policy Figure 11-5 The Corresponding Incoming Poli

Strona 172 - LDAP User Name

242 Terms in VPN Wizard: VPN Wizard  It simplifies the settings of a VPN connection.  Under Policy Object > VPN > VPN Wizard, set as below

Strona 173

243 Figure 11-9 Applying Available VPN Trunk to the Policy Figure 11-10 Setting Completed Figure 11-11 An Outgoing Policy Completed Figure 11

Strona 174 - (Figure 8-5)

244 Terms in IPSec Autokey Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connect

Strona 175

245 Terms in PPTP Server PPTP Server  The status of PPTP server that shows enable or disable.  The range of IP address, DNS server, WINS serve

Strona 176

246 Terms in PPTP Client Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting

Strona 177 - 8.2 RADIUS Authentication

247 Terms in Trunk Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting Nam

Strona 178

248 Terms in Trunk Name  The description for VPN trunk. Note: the name has to be exclusive from any other. Group Member  The groups that are su

Strona 179

15 Historical Top Chart Traffic Grapher WAN Traffic Displays the usage statistics from the WAN interfaces. Chapter 31 Policy-Based Traffic Displa

Strona 180

249 11.1 Example No. Settings Scenario Page 11.1.1 IPSec Autokey Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets

Strona 181

250 11.1.1 Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets via an IPSec VPN Connection Prerequisite Setup (Note: IP addres

Strona 182

251 Step 3. Select Remote Gateway (Static IP or Hostname) for Remote Settings, and enter the management address of B Company.(Figure 11-20) Figure 1

Strona 183

252 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Strona 184 - (Figure 8-18)

253 Step 8. Settings completed.(Figure 11-25) Figure 11-25 IPSec Autokey Settings Completed Step 9. Under Policy Object > VPN > Trunk, set as

Strona 185

254 Figure 11-26 VPN Trunk Settings Figure 11-27 VPN Trunk Created Step 10. Under Policy > Outgoing, set as below:(Figure 11-28)  Select th

Strona 186 - (Figure 8-21)

255 Step 11. Under Policy > Incoming, set as below:(Figure 11-30)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-31) Figure 1

Strona 187 - (Figure 8-22)

256 For B Company, set as below: Step 1. Under System > Configuration > Multiple Subnets, set as below:(Figure 11-32) Figure 11-32 Multiple S

Strona 188

257 Step 5. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. ( The maximum length of Pre-Shared Key String is 10

Strona 189 - (Figure 8-25)

258 Step 9. Settings completed.(Figure 11-40) Figure 11-40 IPSec Autokey Settings Completed Step 10. Under Policy Object > VPN > Trunk, clic

Strona 191 - (Figure 8-27)

259 Figure 11-41 VPN Trunk Settings Figure 11-42 VPN Trunk Created

Strona 192 - (Figure 8-28)

260 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-43)  Select the defined Trunk for VPN Trunk.  Click OK

Strona 193

261 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-45)  Select the defined trunk for VPN Trunk.  Click OK

Strona 194

262 Step 13. Settings completed.(Figure 11-47) Figure 11-47 Deployment of IPSec VPN

Strona 195 - Figure 8-32 Adding a User

263 11.1.2 Creating an IPSec VPN Connection under Windows 2000 by a CS-2001 Device Prerequisite Setup (Note: IP addresses used as examples only) A

Strona 196

264 11-50) Figure 11-50 Remote Settings Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum

Strona 197

265 Figure 11-54 Advanced Settings of IPSec Autokey Step 8. Settings completed.(Figure 11-55) Figure 11-55 IPSec Autokey Settings Completed Ste

Strona 198 - 8.3 POP3 Authentication

266 Figure 11-56 VPN Trunk Settings Figure 11-57 VPN Trunk Created

Strona 199

267 Step 10. Under Policy > Outgoing, set as below:(Figure 11-58)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-59) Figure 1

Strona 200

268 Step 11. Under Policy > Incoming, set as below:(Figure 11-60)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-61) Figure 1

Strona 201 - 8.4 LDAP Authentication

17 Chapter 1 Administration This chapter mainly explains the authorization settings for accessing the CS-2001. It covers the subjects of Admin,

Strona 202

269 For B Company, set as below: Step 1. Select Start > Run on the Start menu in Windows 2000.(Figure 11-62) Figure 11-62 Selecting “Run…” o

Strona 203

270 Step 3. In the Console 1 window, click Console on the menu bar, and then click Add/Remove Snap-in.(Figure 11-64) Figure 11-64 Selecting “Add / R

Strona 204

271 Step 5. Select Local Computer, and then click Finish.(Figure 11-66) Figure 11-66 Selecting Local Computer Step 6. Settings completed.(Figure 1

Strona 205

272 Step 7. Right-click the IP Security Policies on Local Machine, and then click Create IP Security Policy.(Figure 11-68) Figure 11-68 Creating an

Strona 206

273 Step 9. Type the Name and Description and then click Next.(Figure 11-70) Figure 11-70 Name and Description Settings Step 10. Disable Activate

Strona 207

274 Step 11. In the IP Security Policy Wizard window, tick Edit properties and click Finish.(Figure 11-72) Figure 11-72 Settings Completed Step 12

Strona 208

275 Figure 11-73 VPN_B Properties

Strona 209

276 Step 13. In the New Rule Properties window, click Add.(Figure 11-74) Figure 11-74 New Rule Properties Step 14. In the IP Filter List window,

Strona 210

277 Figure 11-75 Adding an IP Filter

Strona 211

278 Step 15. In the Filter Properties window, select “A specific IP Address” for Source address, and then apply B Company’s WAN IP address “211.22.2

Strona 212 - Note :

18 Terms in Admin Admin Name  The authentication name to log in the system.  The IT administrator’s name and password are assigned as admin whic

Strona 213 - (Figure 8-66)

279 Figure 11-77 IP Filter Added

Strona 214

280 Step 17. In the New Rule Properties window, click Filter Action tab and then tick Require Security. Next, click Edit.(Figure 11-78) Figure 11-7

Strona 215

281 Figure 11-79 Ticking the “Session Key Perfect Forward Secrecy”

Strona 216

282 Step 19. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-80) Figure 11-80 Selecting a Security Method t

Strona 217

283 Figure 11-81 Modifying Security Method

Strona 218 - 9.1 Example

284 Step 21. Tick Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new k

Strona 219 - File Transferring

285 Figure 11-83 Selecting the Connection Type

Strona 220

286 Step 23. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Strona 221

287 Figure 11-85 Authentication Methods Settings

Strona 222 - and tick Select All

288 Step 25. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Strona 223

2 interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used i

Strona 224

19 1.1 Admin 1.1.1 Adding a Sub-Administrator Step 1. Go to System > Administration > Admin, set as below:(Figure 1-1)  Click the New Sub-

Strona 225 - Chapter 10 Virtual Server

289 Step 26. Click Apply, and then click Close to close the window.(Figure 11-87) Figure 11-87 Authentication Methods Settings

Strona 226 - Terms in Virtual Server

290 Step 27. Settings completed.(Figure 11-88) Figure 11-88 Settings Completed

Strona 227 - 10.1 Example

291 Step 28. In the VPN_B Properties window, disable Use Add Wizard; click Add to create the second IP security rule.(Figure 11-89) Figure 11-89 VP

Strona 228

292 Step 29. In the New Rule Properties window, click Add.(Figure 11-90) Figure 11-90 Clicking “Add…” to Add an IP Filter

Strona 229

293 Step 30. In the IP Filter List window, disable Use Add Wizard. Change the Name into “VPN_B LAN TO WAN”, and then click Add.(Figure 11-91) Figur

Strona 230 - Important:

294 Step 31. In the Filter Properties window, select “A specific IP Subnet” for Source address, and then type “192.168.10.0” as A Company‘s subnet a

Strona 231

295 Step 32. Settings completed.(Figure 11-93) Figure 11-93 IP Filter Added

Strona 232 - (Figure 10-10)

296 Step 33. In the New Rule Properties window, click Filter Action tab; tick Required Security and then click Edit.(Figure 11-94) Figure 11-94 Fil

Strona 233

297 Figure 11-95 Ticking the “Session Key Perfect Forward Secrecy”

Strona 234

298 Step 35. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-96) Figure 11-96 Security Methods Settings St

Strona 235 - (Figure 10-13)

20 1.1.2 Modifying the Password Step 1. Go to System > Administration > Admin and then set as below:(Figure 1-2)  Click the Modify button o

Strona 236 - 15321-15333)

299 Figure 11-97 Modifying Security Method

Strona 237

300 Step 37. Check Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new

Strona 238

301 Step 38. In the New Rule Properties window, click Connection Type tab and tick All network connections.(Figure 11-99) Figure 11-99 Selecting th

Strona 239

302 Step 39. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Strona 240 - (Figure 10-22)

303 Step 40. In the New Rule Properties window, click Authentication Methods tab. Next, select the method “Kerberos” and then click Edit on the righ

Strona 241

304 Step 41. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Strona 242

305 Step 42. Click Apply, and then click Close to close the window.(Figure 11-103) Figure 11-103 New Authentication Method Created

Strona 243

306 Step 43. Settings completed.(Figure 11-104) Figure 11-104 Settings Completed

Strona 244

307 Step 44. In the VPN_B Properties window, click General tab and then click Advanced.(Figure 11-105) Figure 11-105 General Settings of VPN_B Prop

Strona 245

308 Step 45. Tick Master Key Perfect Forward Secrecy and then click Methods.(Figure 11-106) Figure 11-106 Key Exchange Settings Step 46. Click Mo

Strona 246 - (Figure 10-32)

21 1.2 Permitted IPs 1.2.1 Adding a Permitted IP Step 1. Under System > Administrator > Permitted IPs, click the New Entry button and then s

Strona 247 - Chapter 11 VPN

309 Step 47. Settings completed.(Figure 11-108) Figure 11-108 IPSec VPN Settings Completed Step 48. Right-click VPN_B and move to Assign, and the

Strona 248 - Terms in VPN

310 Step 49. Select Start > Settings > Control Panel on the Start menu, and then click it. (Figure 11-110) Figure 11-110 Selecting “Control

Strona 249

311 Step 51. In the Administrative Tools window, double-click Services.(Figure 11-112) Figure 11-112 The Services Window Step 52. In the Services

Strona 250

312 Step 53. Settings completed.(Figure 11-114) Figure 11-114 Deployment of IPSec VPN Using CS-2001 and Windows 2000

Strona 251 - Terms in One-Step IPSec

313 11.1.3 Creating an IPSec VPN Connection between Two CS-2001 Devices (An Aggressive Mode Example) Prerequisite Setup (Note: IP addresses used as

Strona 252

314 and enter the management address of B Company.(Figure 11-117) Figure 11-117 Remote Settings

Strona 253 - Terms in VPN Wizard:

315 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Strona 254

316 Step 8. Select “Aggressive mode” for Mode. Enter 11.11.11.11 in the My ID field and then enter @abc123 in the Peer ID field.(Figure 11-122) Figu

Strona 255 - Terms in IPSec Autokey

317 Step 10. Under Policy Object > VPN > Trunk, set as below:(Figure 11-124)  Name: Type a name.  Local Settings: Select “LAN”. Local IP /

Strona 256 - Terms in PPTP Server

318 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-126)  Select the defined trunk from the VPN Trunk drop-

Strona 257 - Terms in PPTP Client

22 1.3 Logout 1.3.1 Logging out the System Step 1. Click Logout to protect the system from any unauthorized modification while being away.(Figure

Strona 258 - Terms in Trunk

319 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-128)  Select the defined trunk from the VPN Trunk drop-d

Strona 259

320 For B Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click New Entry and then set as below:(Figure 11-130) Fig

Strona 260 - 11.1 Example

321 Step 5. Below Encryption and Data Integrity Algorithms, select “3DES” for Encryption Algorithm; select “SHA1” for Authentication Algorithm; selec

Strona 261

322 Step 6. Configure the settings under IPSec Algorithm. Select “3DES” for Encryption Algorithm and “MD5” for Authentication Algorithm.(Figure 11-13

Strona 262 - Figure 11-20 Remote Settings

323 Step 10. Select Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-139)  Name: Type a name.  Local Settings

Strona 263

324 Figure 11-140 VPN Trunk Created

Strona 264

325 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-141)  Select the defined trunk for VPN Trunk.  Click O

Strona 265

326 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-143)  Select the defined trunk for VPN Trunk.  Click O

Strona 266

327 Step 13. Settings completed.(Figure 11-145) Figure 11-145 Deployment of IPSec VPN Using Aggressive Mode

Strona 267

328 11.1.4 Using Two CS-2001 Devices to Connect Outbound Load Balance with IPSec VPN (Using GRE/IPSec Package Algorithm) Prerequisite Setup (Note:

Strona 268

23 Step 2. Click OK and then the logout message appears.(Figure 1-6) Figure 1-6 The Logout Message

Strona 269

329 For A Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-146) Figure 11-146 IPS

Strona 270

330 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Strona 271

331 Step 9. Setting completed.(Figure 11-154) Figure 11-154 IPSec Autokey Settings Completed Step 10. Select Policy Object > VPN > IPSec Aut

Strona 272

332 Step 14. Under the ISAKMP Algorithm section, select “3DES” for Encryption Algorithm; select “MD5” for Authentication Algorithm; select “DH 1” fo

Strona 273 - (Figure 11-47)

333 Step 18. Settings completed.(Figure 11-163) Figure 11-163 IPSec Autokey Settings Completed Step 19. Under Policy Object > VPN > Trunk, s

Strona 274 - 2000 by a CS-2001 Device

334 Figure 11-164 VPN Trunk Settings Figure 11-165 VPN Trunk Created

Strona 275

335 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-166)  Select the defined trunk for VPN Trunk.  Click O

Strona 276

336 Step 21. Under Policy > Incoming, click New Entry and then set as below:(Figure11-168)  Select the defined trunk for VPN Trunk.  Click OK

Strona 277

337 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-170) Figure 11-170 IP

Strona 278

338 Figure 11-174 ISAKMP Algorithm Settings

Strona 279

24 1.4 Updating Software Step 1. To run a software update, go to System > Administration > Software Update and follow the steps below:  Cli

Strona 280

339 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Strona 281

340 Step 10. Under Policy Object > VPN > IPSec Autokey, click New Entry again. Step 11. Type VPN_02 in the Name field and then select Port3

Strona 282

341 Algorithm.(Figure 11-184) Figure 11-184 IPSec Algorithm Settings Step 16. Select “Group 1” for PFS Key Group. Enter “3600” in the ISAKMP SA Li

Strona 283

342 Step 19. Under Policy Object > VPN > Trunk, set as below: (Figure 11-188)  Name: Type a name.  Local Settings: Select “LAN”. Local IP

Strona 284

343 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-190)  Select the defined trunk for VPN Trunk.  Click O

Strona 285 - (Figure 11-73)

344 Step 21. Select Policy > Incoming, click New Entry and then set as below:(Figure 11-192)  Select the defined trunk for VPN Trunk.  Click

Strona 286

345 Step 22. Settings completed.(Figure 11-194) Figure 11-194 Deployment of IPSec VPN Using GRE/IPSec

Strona 287 - (Figure 11-75)

346 11.1.5 Establishing an IPSec VPN Connection by Three CS-2001 Devices Prerequisite Setup (Note: IP addresses used as examples only) A Company: C

Strona 288

CS-2001 UTM Content Security Gateway User’s Manual 347 For A Company, set as below: Step1. Go to Policy Object > VPN > IPSec Autokey and the

Strona 289 - (Figure 11-77)

348 Figure 11-199 Configuring the IPSec Algorithm Step6. Under the IPSec Algorithm section, select 3DES for Encryption Algorithm and then select

Strona 290 - Figure 11-77 IP Filter Added

25 Chapter 2 Configuration Configuration includes the following system settings: System Settings, Date / Time, Multiple Subnets, Route Table, DHCP,

Strona 291 - (Figure 11-79)

349 Step8. Policy Created.(Figure 11-202) Figure 11-202 Policy Created Step9. Go to Policy Object > VPN > Trunk, click New Entry and then s

Strona 292

350 Figure 11-204 First Trunk Completed Step10. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button again.(Figure

Strona 293

351 1 for Key Group.(Figure 11-209) Figure 11-209 Configuring ISAKMP Algorithm

Strona 294

352 Step15. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and MD5 for Authentication Algorithm

Strona 295 - (Figure 11-83)

353 Step18. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-213)  Type the name in the Name field.  Lo

Strona 296

354 Step19. Go to Policy Object > VPN > Trunk Group, click New Entry and then set as below:(Figure 11-215)  Type the name in the Name field.

Strona 297 - (Figure 11-85)

355 Step20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-217)  Select the defined Trunk from the VPN Trunk drop-do

Strona 298

356 Step21. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-219)  Select the defined Trunk from the VPN Trunk drop-do

Strona 299

357 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button.(Figure 11-221) Figure

Strona 300 - (Figure 11-87)

358 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Strona 301

26 Terms in Setting System Settings  Allows the IT administrator to import / export system settings, perform a factory reset and format the built-

Strona 302 - (Figure 11-89)

359 Step 9. Under Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-229)  Type the name in the Name fi

Strona 303 - (Figure 11-90)

360 Step 10. Go to Policy Outgoing, click the New Entry button and then set as below:(Figure 11-231)  Select the defined Trunk from the VPN Trunk

Strona 304 - (Figure 11-91)

361 Step 11. Go to Policy > Incoming, click the New Entry button and then set as below:(Figure 11-233)  Select the defined Trunk from the VPN T

Strona 305 - (Figure 11-92)

362 For C Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click the New Entry button and then set as below:(Figure 1

Strona 306 - Figure 11-93 IP Filter Added

363 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Strona 307 - (Figure 11-95)

364 Step 9. Go to Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-243)  Type the name in the Name fi

Strona 308

365 Step 10. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-245)  Select the defined Trunk from the VPN Trunk drop-d

Strona 309

366 Step 11. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-247)  Select the defined Trunk from the VPN Trunk drop-d

Strona 310

367 Step 12. Setting completed.(Figure 11-249) Figure 11-249 The Deployment of IPSec VPN

Strona 311

368 11.1.6 Using Two CS-2001 Devices to Establish PPTP VPN Connection (Outbound Load Balancing) Prerequisite Setup (Note: IP address used as exampl

Strona 312 - (Figure 11-99)

27 device can block their IP address for the specified amount of time. This helps to prevent any unauthorized tampering of the device.

Strona 313 - (Figure 11-100)

369 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-250)  Click the Modify button.  Tick Enable PPTP.  T

Strona 314 - (Figure 11-101)

370 3. Using RADIUS Server (refer to chapter 8 for RADIUS authentication) to establish PPTP VPN connection, go to Policy Object > VPN > PPTP S

Strona 315 - (Figure 11-102)

371 Figure 11-253 Configuring the Second PPTP Server

Strona 316 - (Figure 11-103)

372 Figure 11-254 Second PPTP Server Completed

Strona 317 - (Figure 11-104)

373 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-255)  Type the name in the Name field.  Loc

Strona 318 - Advanced.(Figure 11-105)

374 Note: 1. When Remote IP / Netmask is selected for Remote Settings, you may select only one tunnel to establish the PPTP VPN connection. Ste

Strona 319

375 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-259)  Select the defined VPN from the VPN Trunk drop-down

Strona 320

376 For B Company, set as below: Step 1. Go to Policy Object > VPN > PPTP Client and then set as below:  Click New Entry.(Figure 11-261) 

Strona 321

377 Figure 11-263 Second PPTP Client Setting Completed Figure 11-264 Second PPTP Client Setting Completed Note: 1. When CS-2001 PPTP Client es

Strona 322

378 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-265)  Enter the name in the Name field.  Lo

Strona 323 - (Figure 11-114)

28 Important: 1. If the HTTP or HTTPS port number is modified then the number has to to be appended to the management IP address, such as http://6

Strona 324

379 Figure 11-266 Settings Completed Note: 1. When Remote IP / Netmask is selected for Remote Settings, the number of the PPTP_Client tunnel sho

Strona 325 - (Figure 11-117)

380 Step 3. Go to Policy > Outgoing and then set as below:(Figure 11-267)  Select the defined Trunk from the VPN Trunk drop-down list.  Click

Strona 326

381 Step 4. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-269)  Select the defined Trunk from the VPN Trunk drop-dow

Strona 327

382 Step 5. Settings completed.(Figure 11-271) Figure 11-271 The Deployment of PPTP VPN

Strona 328

383 11.1.7 Using Two CS-2001 Devices to Establish PPTP VPN Connection Prerequisite Setup (Note: IP addresses used as examples only) A Company: Con

Strona 329

384 Step 1. Go to Policy Object >VPN > PPTP Server and then set as below:(Figure 11-272)  Click Modify.  Click Enable PPTP.  Click Encryp

Strona 330

385 Step 2. Go to Policy Object > VPN > PPTP Server, click New Entry and then set as below:(Figure 11-273)  Type PPTP_Connection in the Usern

Strona 331

386 For B Company, set as below; Step 1. Go to Policy Object > VPN > PPTP Client, click New Entry and then set as below:(Figure 11-275)  Typ

Strona 332 - (Figure 11-134)

387 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-277)  Enter the name in the Name field.  Lo

Strona 333

388 Step 3. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-279)  Select the defined Trunk from the VPN Trunk drop-dow

Strona 334 - (Figure 11-140)

3 Before contacting customer service, please take a moment to gather the following information: ♦ UTM Content Security Gateway serial number and

Strona 335

29  Specifies the subnets IP range. Interface  Denotes in which network, i.e. LAN or DMZ, the subnet resides. VLAN ID  Permits the interface

Strona 336

389 Step 4. Setting Completed.(Figure 11-281) Figure 11-281 Deployment of PPTP VPN Connection

Strona 337

390 11.1.8 Establishing PPTP VPN Connection by One CS-2001 Device and One PC Running Windows 2000 Prerequisite Setup (Note: IP addresses used as ex

Strona 338 - (Figure 11-145)

391 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-282)  Click Modify.  Click Enable PPTP.  Click Encry

Strona 339

392 3. If the external user wants to connect to IPSec VPN subnet via PPTP VPN connection, the Client IP Allocation/ IP Range must be on the LAN1 (19

Strona 340

393 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-285)  Type the name in the Name field.  Loc

Strona 341

394 Note: 1. If the external users want to connect to the IPSec VPN subnet, the Local IP/ Netmask must be configured as the IPSec VPN subnet.

Strona 342

395 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-287)  Select the defined trunk from the VPN Trunk drop-dow

Strona 343

396 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-289)  Select the defined Trunk from the VPN Trunk drop-dow

Strona 344

397 For B Company, set as below: Step 1. Right-click on My Network Places and then click Properties.(Figure 11-291) Figure 11-291 Selecting “Proper

Strona 345

398 Figure 11-292 Double-Clicking on “Make New Connection”

Strona 346

30 Note: 1. Dynamic Routing Protocols can be categoried into the following two categories:  Distance-Vector Routing Protocol: Uses the Bellman-F

Strona 347

399 Step 3. In the Location Information window, specify the country / region, area code and phone system accordingly, and then click OK.(Figure 11-29

Strona 348

400 Figure 11-294 Phone and Modem Options

Strona 349

401 Step 5. In the Network Connection Wizard window, click Next.(Figure 11-295) Figure 11-295 Network Connection Wizard Step 6. In the Network Conn

Strona 350

402 Step 7. In the Destination Address window, type the host name or IP address in the blank field and then click Next.(Figure 11-297) Figure 11-297

Strona 351

403 Step 9. In the Completing the New Connection Wizard window, type a Connection Name and then click Finish.(Figure 11-299) Figure 11-299 New Conne

Strona 352

404 Step 10. In the Connect Virtual Private Connection window, set as below:(Figure 11-300)  User Name: Type “PPTP_Connection”.  Password: Enter

Strona 353

405 Figure 11-302 PPTP VPN Connection Successfully Connected

Strona 354

406 Step 11. Settings completed.(Figure 11-303) Figure 11-303 Deployment of PPTP VPN

Strona 355

407 Mail Security

Strona 356 - (Figure 11-194)

408 Chapter 12 Configuration Mail configuration refers to the processing basis of mail services. In this chapter, it will be covering the functiona

Strona 357 - CS-2001 Devices

31 private purposes.  In 2007 30-bit AS numbers were introduced. These numbers are written either as simple integers, or in the form x.y, where x a

Strona 358

409 Terms in Settings Log Storage Time  Quarantined spam / virus emails can be designate a storage time and deleted when due.  You may also deci

Strona 359

410  Tag spam email’s subject with: --Spam--.  Tag virus-infected emails with: --Virus--.  Type the subject and the content of the mail notice.

Strona 360

411 Figure 12-1 Configuring the Settings of Mail Security

Strona 361

412  A notice with customized subject and message.(Figure 12-2) Figure 12-2 A Notice Shows Customized Subject and Message  An unscanned email is

Strona 362 - (Figure 11-209)

413  The spam mail’s subject tagged with warning message.(Figure 12-4) Figure 12-4 The Spam Mail’s Subject Tagged with “Spam”  The virus mail’s

Strona 363

414 Terms in Account Manager Account Learning Settings  Disabled: Accounts added manually.  Accounts added automatically: the email account will

Strona 364

415 12.1 Mail Domains 12.1.1 Using Mail Domains to Filter Emails Step 1. Apply to a local ISP for several domain names, “planet.com.tw”, “suppor

Strona 365 - Company’s subnet

416 Step 2. Under Mail Management > Configuration > Mail Domains, set as below:  Click the New Entry button to create the first entry.  Typ

Strona 366

417 Figure 12-8 Modifying the First Entry Figure 12-9 Typing the Domain Alias Figure 12-10 Settings Completed Figure 12-11 Creating the Second

Strona 367

418 Figure 12-12 The Second Entry Completed Figure 12-13 Modifying the Second Entry Figure 12-14 Typing the Domain Alias Figure 12-15 Se

Strona 368

32 Terms in DHCP Static IP Assignment  DHCP can allocate IP addresses based upon the MAC address of PCs in the LAN or DMZ. Terms in Dynamic DDN

Strona 369

419 Step 3. Emails sent to the internal account “alex”, depending on the domain name, will be handled as follows:  Emails that go to alex@planet.

Strona 370

420 12.2 Account Manager 12.2.1 Using CS-2001 to Filter Mail Accounts Step1. Go to Mail Security > Configuration > Account Manager and then

Strona 371

421 Step3. Go to Mail Security > Configuration > Account Manager, import the accounts into the system:  Click the Browse... button. In the C

Strona 372

422 Step4. Go to Mail Security > Configuration > Account Manager, add or remove the accounts.  Click the Add button.  Enter the account

Strona 373

423 Figure 12-20 Removing the Account Note: 1. Once Accounts added automatically is selected, the CS-2001 will varify the existence of the accou

Strona 374

424 Step5. Users may be given permission to access Personal Email Viewer under Mail Security > Configuration > Account Manager.  To permit

Strona 375

425 12.2.2 Accessing Personal Email Viewer Step 1. Type the management address together with the HTTP port (8080) or HTTPS port (1443) in the addre

Strona 376

426 Step 2. Users will be requested to configure user preferences during their first login.  Click Continue.(Figure 12-24)  Configure the User Pr

Strona 377

427 Figure 12-25 The User Preferences Settings Figure 12-26 User Preferences Settings Completed

Strona 378 - (Figure 11-249)

428 Step 3. Below shows the CS-2001’s user-friendly, web-based mailbox.(Figure 12-27) Figure 12-27 The Web Mail User Interface

Strona 379

33 Terms in SNMP SNMPv3  SNMP is a protocol specially designed to monitor network-attached devices such as servers, switches, routers, workstati

Strona 380

429 12.2.3 Using Whitelist and Blacklist to Filter Emails Supposed the domain name “planet.com.tw” is registered to your organization, and you ar

Strona 381

430 Figure 12-29 Creating the Second Entry of Whitelist Figure 12-30 Settings Completed

Strona 382

431 Step 2. Click Preference in the Personal Email Viewer main screen and then a pop-up window appears. Click the Blacklist button under the User Pre

Strona 383

432 Figure 12-32 Creating the Second Entry of Blacklist Figure 12-33 Blacklist Created

Strona 384

433 Step 3. When [email protected] receives an email from a yahoo account:  If the mail is from [email protected], then [email protected] will

Strona 385

434 12.3 Mail Relay 12.3.1 Using CS-2001 as a Gateway (Set the Mail Server in DMZ under Transparent Mode) Prerequisite Setup Configure Port1

Strona 386

435 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-35)  Select Sender’s IP Address.  Type the IP

Strona 387

436 12.3.2 Deploying the CS-2001 Device between the Gateway and Mail Server (Mail Server is in DMZ under Transparent Mode) Prerequisite Setup LAN

Strona 388

437 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:  Click New Entry.(Figure 12-37)  Select Sender’s IP

Strona 389 - (Figure 11-266)

438 12.3.3 Using CS-2001 as Gateway to Enable Branch’s Employees to Send Emails via Headquarters’ Mail Server (Set the Mail Server under DMZ Transpa

Strona 390

34 Auth Password  The NMS uses this password to access information from the CS-2001. Privacy Protocol  Supports the cipher Data Encryption Stan

Strona 391

439 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-40)  Select Sender’s IP Address.  Enter the I

Strona 392

440 12.4 Mail Notice 12.4.1 Retrieving Spam or Virus Emails from the Mail Notice (An Outlook Exparess Example) Step 1. All the accounts are listed

Strona 393 - (Figure 11-271)

441 Step 2. Go to Mail Security > Configuration > Mail Notice and then set as below:  Tick Notice for, then select “Both Spam and Viruses” fr

Strona 394 - Connection

442 Note: 1. Accounts in the Selected Accounts column will receive a mail notice based upon schedules when emails sent from or to them are classif

Strona 395

443 12.5 Queued Mail 12.5.1 Monitoring Email Delivery Status Step 1. Go to Mail Security > Configuration > Settings and then set as below: 

Strona 396

444 Step 2. Go to Mail Security > Configuration > Queued Mail to obtain the delivery status.  A symbol, under the Reason column, indicates

Strona 397 - PPTP Server

445 12.6 Mail Signatures Step 1. Go to Mail Security > Configuration > Mail Signatures and then set as below:  Tick Add signatures to all o

Strona 398

446 Step 2. Any email sent from the CS-2001 will now have the signature message appended to the body of the email for the recipient to view.(Figure 1

Strona 399

447 Chapter 13 Anti-Spam Users will no longer be disturbed by large influxes of spam. The Anti-Spam mechanism prevents the users from wasting their

Strona 400 - (Figure 11-281)

448 Terms in Settings Anti-Spam Filter Settings  Incoming and outgoing emails can be inspected.  Emails exceeding the threshold score can have

Strona 401

35 2.1 Settings 2.1.1 Exporting System Settings Step 1. Under System > Configuration > Settings, click next to Export System Settings und

Strona 402

449 Spam Actions (Sending)  The action of outbound spam mail can be set to delete, deliver as normal or store the quarantine. Spam Actions (Receiv

Strona 403

450  The figure below shows that an email’s subject is tagged with the score (optional).(Figure 13-3) Figure 13-3 An Email’s Subject Tagged with t

Strona 404

451 Comment  The description of the rule’s name. Classification  When Spam is selected, emails that meet the inspection criteria will be classif

Strona 405

452 “joe” typed as a pattern, it means emails from whosever email account contained the word “joe” will be considered as spam or ham.

Strona 406

453 Terms in Whitelist Email Address/ Domain Name  Used to designate specific email addresses as ham. Direction  From: Inspects emails sent fro

Strona 407

454 Training Schedule  CS-2001 can be scheduled a daily time for spam or ham training.  CS-2001 can be set to immediately train. An Overview on

Strona 408

455 The Three Key Elements of Email Transmission An email transmission is achieved by using an MUA, MTA and MDA.  MUA(Mail User Agent):Whether

Strona 409

456 How an Email is Processed Composing and sending an email:  Email delivery from an MUA to an MTA: Run a MUA client (email program) and follow t

Strona 410 - (Figure 11-294)

457  Email retrieval: signifies MUA is using POP (Post Office Protocol) to communicate with the MTA by which users may have the access to emails. C

Strona 411

458 13.1 Example No. Scenario Page 13.1.1 Detecting Whether Emails are Spam 459 13.1.2 Using CS-2001 in Accordance with Whitelist and Bla

Strona 412

36 2.1.2 Importing System Settings Step 1. Under System > Configuration > Settings, click Browse… next to Import System Settings under the Sy

Strona 413

459 13.1.1 Detecting Whether Emails are Spam Prerequisite Setup Configure Port1 as LAN1(192.168.1.1, NAT/ Routing mode) and connect it to the LAN w

Strona 414 - (Figure 11-299)

460 Step 3. Under Policy Object > Address > DMZ, set as below:(Figure 13-4) Figure 13-4 Creating an Address Setting Corresponding to the Mail

Strona 415

461 Step 5. Go to Policy > Outgoing and then set as below: (Figure 13-6)  Select the defined group (Mail_Service_02) from the Service drop-down

Strona 416

462 Figure 13-6 Configuring an Outgoing Policy with Group Service and POP3 Anti-Spam

Strona 417 - (Figure 11-303)

463 Figure 13-7 Policy Created

Strona 418 - Mail Security

464 Step 6. Under Policy > WAN to DMZ, set as below:(Figure 13-8)  Select the defined rule from the Destination Address drop-down list.  Selec

Strona 419 - Chapter 12 Configuration

465 Figure 13-9 Policy Created

Strona 420

466 Step 7. Go to Policy > DMZ to WAN and then set as below:(Figure 13-10)  Select the defined group from the Source Address drop-down list. 

Strona 421 -  Click OK.(Figure 12-1)

467 Figure 13-10 Creating a DMZ to WAN Policy with Group Service and POP3 Anti-Spam

Strona 422

468 Figure 13-11 Policy Created

Strona 423

37 2.1.3 Resetting the System to Factory Default Settings and Formatting the Hard Drive Step 1. Under System > Configuration > Settings, tick

Strona 424

469 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-12) Figure 13-12 Anti-Spam Filter Settings and Action Settings

Strona 425 - Terms in Queued Mail

470 Note: 1. By default, Anti-Spam is enabled. Therefore, the IT administrator merely has to configure the settings under Mail Security > Confi

Strona 426 - 12.1 Mail Domains

471 13.1.2 Using CS-2001 in Accordance with Whitelist and Blacklist to Filter Spam (Mail Server Is Deployed in DMZ under Transparent Mode) Prerequis

Strona 427

472 Step 3. Go to Policy Object > Service > Group and then set as below:(Figure 13-15) Figure 13-15 Creating Service Groups to Include POP3, S

Strona 428

473 Step 4. Go to Policy > WAN to DMZ and then set as below:(Figure 13-16)  Select the defined rule from the Destination Address drop-down list.

Strona 429

474 Figure 13-17 Policy Created

Strona 430

475 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-18)  Select the defined rule for Source Address.  Select the defined service (M

Strona 431 - 12.2 Account Manager

476 Figure 13-18 Creating a DMZ to WAN Policy

Strona 432

477 Figure 13-19 Policy Created

Strona 433

478 Step 6. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 13-20) Figure 13-20 Mail Domain Settings Step 7.

Strona 434

38 2.1.4 Enabling Email Alert Notification Step 1. Go to System > Configuration > Settings. Under the Name Settings section, configure the fo

Strona 435

479 Step 8. Go to Mail Security > Anti-Spam > Whitelist and then set as below:  Click New Entry.  Type [email protected] in the Mail

Strona 436 - (Figure 12-23)

480 Figure 13-25 Creating the Fourth Entry on Whitelist Figure 13-26 Whitelist Setting Completed Note: 1. Whitelist can be exported as a fil

Strona 437

481 Step 9. Go to Mail Security > Anti-Spam > Blacklist and then set as below:  Click New Entry.  Type *yahoo* in the Mail Account fiel

Strona 438

482 3. Whitelist overrides Blacklist, thus, email inspection will firstly act on Whitelist and then Blacklist. Step 10. Provided that joe@supportp

Strona 439 - (Figure 12-27)

483 13.1.3 Deploying CS-2001 in between Gateway and Mail Server and Filtering Spam with Global Rule (Mail Server Is Deployed in DMZ under Transparen

Strona 440

484 Figure 13-31 Creating Service Groups

Strona 441

485 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 13-32)  Select the defined DMZ for Destination Address.  Select the defined servic

Strona 442

486 Figure 13-33 Policy Completed

Strona 443

487 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-34)  Select the defined DMZ for Source Address.  Select the defined service (Ma

Strona 444

488 Figure 13-34 Creating a DMZ to WAN Policy with Service and SMTP Anti-Spam

Strona 445 - 12.3 Mail Relay

4 Table of Contents Quick Installation Guide ... 8 Hardware Installation ...

Strona 446 - (Figure 12-35)

39 2.1.5 Rebooting the CS-2001 Step 1. To reboot the CS-2001, go to System > Configuration > Settings. Under the Device Reboot section click

Strona 447 - (Figure 12-36)

489 Figure 13-35 Policy Created

Strona 448

490 Step 6. Under Mail Security > Configuration > Mail Domains, set as below:(Figure 13-36) Figure 13-36 Mail Domain Settings Step 7. Under M

Strona 449 - (Figure 12-39)

491 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-38) Figure 13-38 Anti-Spam Settings Note: 1. An email th

Strona 450 - (Figure 12-40)

492 Step 9. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type HamMail in the Rule Name field

Strona 451 - 12.4 Mail Notice

493 Note: 1. The Action setting of a Global Rule will be unavailable if Classification selected as Ham (Non-Spam). It is because normal emails do

Strona 452 - (Figure 12-42)

494 Step 10. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type SpamMail in the Rule Name fi

Strona 453

495 Email header can be used as a reference when configuring Condition and Item of Global Rule. Figure 13-43 shows the header of an email. To view he

Strona 454 - 12.5 Queued Mail

496 Step 11. Provided that [email protected] and [email protected] both receive an email from a Yahoo account:  If the sender’s ac

Strona 455 - (Figure 12-44 Figure 12-45)

497 13.1.4 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering (An Outlook Express Example) To train spam filtering:

Strona 456 - 12.6 Mail Signatures

498 Figure 13-45 Naming the Folder as Spam Mail

Strona 457

40 2.2 Date / Time 2.2.1 CS-2001 Time Settings Step 1. Go to System > Configuration > Date/Time and configure the following settings:(Figu

Strona 458 - Chapter 13 Anti-Spam

499 Step 2. Click Inbox in Outlook Express, and then move the spam to the Spam Mail folder:  In Inbox, select all the spam, right-click them, and t

Strona 459

500 Figure 13-47 Selecting the “Spam Mail” Folder

Strona 460 - (Figure 13-2)

501 Step 3. Compact the Spam Mail folder to make it easier importing spam messages onto CS-2001 for spam filtering training:  Click the Spam Mail f

Strona 461 - Terms in Global Rule

502 Figure 13-49 Compacting the Spam Mail Folder

Strona 462

503 Step 4. Copy the pathname of the Spam Mail folder to CS-2001 device for training use:  Right-click Spam Mail folder, and then click Propertie

Strona 463

504 Figure 13-51 Copying the Pathname of the Spam Mail Folder

Strona 464 - Terms in Training

505 Step 5. Go to Mail Security > Anti-Spam > Training and then configure the settings under the Spam Training Using Importing section:  Pa

Strona 465

506 Step 6. Delete all spam emails in the Spam Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer: 

Strona 466

507 Figure 13-54 All Spam Emails Have Been Deleted To train ham filtering: Step 7. In Outlook Express, create a new folder called “Ham Mail”: 

Strona 467 - How an Email is Processed

508 Figure 13-55 Creating a New Folder Figure 13-56 Naming the Folder as Ham Mail

Strona 468

41 2.3 Multiple Subnet 2.3.1 Using NAT / Routing Mode For LAN Users to Access the Internet Prerequisite Setup (Note: IP addresses used as examples

Strona 469 - 13.1 Example

509 Step 8. Click Inbox in Outlook Express, and then move normal emails to the Ham Mail folder:  In Inbox, select all the hams, right-click them, a

Strona 470

510 Figure 13-58 Selecting the Ham Mail Folder

Strona 471

511 Step 9. Compact the Ham Mail folder for the easy of importing normal email messages onto CS-2001 for ham filtering training:  Click the Ham Mai

Strona 472 -  Click OK.(Figure 13-7)

512 Figure 13-60 Compacting the Ham Mail Folder

Strona 473

513 Step 10. Copy the pathname of the Ham Mail folder to CS-2001 device for training use:  Right-click the Ham Mail folder, and then click Prope

Strona 474 - Figure 13-7 Policy Created

514 Figure 13-62 Copying the Pathname of the Ham Mail Folder

Strona 475 - (Figure 13-9)

515 Step 11. Go to Mail Security> Anti-Spam > Training, configure the settings under the Ham Training Using Importing section.  Paste the pa

Strona 476 - Figure 13-9 Policy Created

516 Step 12. Delete all emails in the Ham Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer:  In

Strona 477 - (Figure 13-11)

517 Figure 13-65 All Normal Emails Have Been Deleted

Strona 478

518 13.1.5 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering Step 1. On you mail server, create an email account, su

Strona 479 - Figure 13-11 Policy Created

42 Figure 2-8 Configuring Multiple Subnet Figure 2-9 Settings Completed Important: 1. When the PCs’ subnets or IP addresses are not on the same

Strona 480 - (Figure 13-12)

519 Step 4. In Mail Security > Anti-Spam > Training, configure the Ham Training Using Forwarded Mail setting according to the relevant informat

Strona 481

520 To train spam filtering: Step 5. In Outlook Express, forward all spam emails in the Inbox as attachment to [email protected]:  In In

Strona 482 - Transparent Mode)

521 Figure 13-68 Forwarding the Selected Spam Emails as Attachment

Strona 483

522 To train ham filtering: Step 6. In Outlook Express, forward all normal emails in the Inbox as attachment to [email protected]:  In Inbo

Strona 484 - (Figure 13-17)

523 Figure 13-70 Forwarding the Selected Normal Emails as Attachment

Strona 485 - Figure 13-17 Policy Created

524 Step 7. CS-2001 will retrieve emails in [email protected] and [email protected] periodically and use them for training on schedule

Strona 487

526 Chapter 14 Anti-Virus Due to its inbound and outbound email anti-virus scanning capabilities, CS-2001 guards against the extensive damage that

Strona 488 - Figure 13-19 Policy Created

527 Terms in Setting Anti-Virus Settings  Scans inbound and outbound emails for viruses.  Virus definitions can be updated periodically or can b

Strona 489

528 Figure 14-1 Anti-Virus Settings Note: 1. Three virus-scanning modes available for users are ClamAV, Sophos and ClamAV+Sophos.

Strona 490

43 Step 2. Under Network > Interface, set as below:(Figure 2-10)  Click on Port 2’s Modify button.  For Interface Type select WAN, and enter a

Strona 491

529 14.1 Example No. Scenario Page 14.1.1 Filtering Out the Virus Emails on Mail Server the Virus Emails on Mail Server 530 14.1.2 Using

Strona 492

530 14.1.1 Filtering Out the Virus Emails on Mail Server Prerequisite Setup Configure Port1 as LAN1 (192.168.1.1, NAT/ Transparent Routing mode)

Strona 493 - Blacklist

531 Step 4. Go to Policy Object > Service > Group, set as below:(Figure 14-3) Figure 14-3 Creating Service Groups to Include the POP3, SMTP a

Strona 494 - (Figure 13-31)

532 Step 5. Under Policy > Outgoing, set as below:(Figure 14-4)  Select the defined service (Mail_Service_02) for Service.  Select POP3 for An

Strona 495

533 Figure 14-4 Creating an Outgoing Policy with Service and POP3 Anti-Virus Figure 14-5 Policy Created

Strona 496 - (Figure 13-33)

534 Step 6. Under Policy > WAN To DMZ, set as below:(Figure 14-6)  Select the defined DMZ for Destination Address.  Select the defined service

Strona 497

535 Figure 14-7 Policy Created

Strona 498 -  Click OK.(Figure 13-35)

536 Step 7. Under Policy > DMZ To WAN, set as below:(Figure 14-8)  Select the defined DMZ for Source Address.  Select the defined service (Mai

Strona 499

537 Figure 14-8 Creating a DMZ to WAN Policy with Service and POP3 Anti-Virus

Strona 500 - Figure 13-35 Policy Created

538 Figure 14-9 Policy Created

Strona 501

CS-2001 UTM Content Security Gateway User’s Manual 44 Step 3. Under Policy Object > Address > LAN, set as below:(Figure 2-11) Figure 2-11 A

Strona 502

539 Step 8. Go to Mail Security > Anti-Virus > Settings and then set as below:(Figure 14-10) Figure 14-10 Anti-Virus Settings

Strona 503

540 Note: 1. By default, Anti-Virus is enabled. Therefore, the IT administrator merely has to configure the Mail Domains to scan all the incoming

Strona 504

541 14.1.2 Using CS-2001 as a Gateway to Filter Out Virus Emails (Mail Server Is Deployed in LAN under NAT Mode) Prerequisite Setup Configure Port

Strona 505

542 Figure 14-13 Creating Service Groups to Include POP3, SMTP and DNS Service Step 4. Under Policy Object > Virtual Server > Port Mapping, s

Strona 506

543 Step 5. Under Policy > Incoming, set as below:(Figure 14-15)  Select the defined virtual server for Destination Address.  Select the defin

Strona 507

544 Figure 14-16 Policy Completed

Strona 508 - (Figure 13-45)

545 Step 6. Under Policy > Outgoing, set as below:(Figure 14-17)  Select the defined LAN address for Source Address.  Select the defined servi

Strona 509

546 Figure 14-17 Creating an Outgoing Policy with Service and SMTP Anti-Virus

Strona 510 - (Figure 13-47)

547 Figure 14-18 Settings Completed

Strona 511

548 Step 7. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 14-19) Figure 14-19 Mail Domain Settings Step 8.

Strona 512 - (Figure 13-49)

45 Step 4. Go to Policy > Outgoing and configure the following settings:  Click on New Entry.  Source Address: Select the name of the LAN addr

Strona 513

549 Step 9. When “Joe”, an internal user at supportplanet.com.tw, receives emails from external mail accounts at yahoo.com.tw:  The virus mail from

Strona 514

550 Chapter 15 Mail Reports CS-2001 provides you with email reports in the form of statistics and logs, presenting you with a thorough insight into

Strona 515

551 Terms in Setting Periodic Report Scheduling Settings  It can generate and send out the periodic report to the designated recipient(s) on sched

Strona 516

552 Figure 15-2 Periodical Report Sent as an Attachment

Strona 517 - (Figure 13-54)

553 Terms in Logs Search  Available searching criteria are: date, sender, sender IP, recipient, attachment, subject, attribute and process. 

Strona 518 - (Figure 13-56)

554 Figure 15-3 Searching for a Specific Log Note: 1. How to open an “.mbx” file (exported from quarantined or archived emails) on your local c

Strona 519

555  Run IMAPSize, go to Tools > mbox2eml on the menu bar, and then click it.(Figure 15-26)  In the mbox2eml window, click the Select mbox fil

Strona 520 - (Figure 13-58)

556 Figure 15-26 Navigating to Tools > Mbox2eml on the Menu Bar Figure 15-27 Locating the “.mbx” File to be Converted

Strona 521

557 Figure 15-28 Converting the “.mbx” File into an “.eml” File Figure 15-29 File Conversion Completed

Strona 522 - (Figure 13-60)

558 Figure 15-30 Clicking and Dragging the “.eml” File into Outlook Express to Open It

Strona 523

46 Figure 2-13 The Second Outgoing Policy Settings

Strona 524

559 15.1 Statistics Step 1. Mail Security > Mail Reports > Statistics shows a comprehensive statistical report. Step 2. In the upper left cor

Strona 525

560 15.2 Logs Step 1. Under Mail Security > Mail Reports > Logs, it shows how emails are processed.

Strona 526 - (Figure 13-63)

561 The symbols used in Logs:  Attribute: Symbol Description Regular Spam Virus Unscanned  Process: Symbol Description Deleted Notif

Strona 528

563 Chapter 16 Configuration Regulating the websites that employees may access improves profuctivity, and protects the network from the damage caus

Strona 529

564 Terms in Setting URL Blocking License  To activate the Category feature for URL Blocking, the license key must be imported into the device her

Strona 530 - (Figure 13-66)

565 Figure 16-1 Web Filter Settings Note: 1. Before enabling syslog, please configure the syslog setting under System > Configuration > Se

Strona 531

566  The alert message displays when an internal user tries to access the blocked web page.(Figure 16-2) Figure 16-2 The Alert Message Terms in W

Strona 532

567 URL  Specifies any URLs required to be blocked.  The asterisk character (“*”) blocks any websites. Terms in Category Name  The name for

Strona 533 - (Figure 13-70)

568 Terms in MIME/Script Name  The name of MIME/Script. Script  Window Popup:Blocking the popup window.  Microsoft ActiveX:Disallowing the

Strona 534

47 Figure 2-14 Policy Settings Completed

Strona 535

569  video/mpeg  application/octet-stream  application/pdf  application/msword Important: 1. To apply the Whitelist, Blacklist, Category,

Strona 536

570 16.1 Example No. Settings Scenario Page 16.1.1 Whitelist Blacklist Group Regulating User’s Access to Specific Websites Using Blacklist an

Strona 537 - Chapter 14 Anti-Virus

571 16.1.1 Regulating User’s Access to Specific Websites Using Blacklist and Whitelist Step 1. Go to Web Filter > Configuration > Whitelist a

Strona 538

572 Note: 1. Whitelist can be exported as a file for storage, which can be used for restoring the list later on. Step 2. Go to Web Filter > C

Strona 539

573 Step 3. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-8)  Type the name in the Name field. 

Strona 540 - 14.1 Example

574 Figure 16-8 Group Settings for URL Blocking

Strona 541 - (Figure 14-2)

575 Figure 16-9 The Completed Group Settings

Strona 542 - (Figure 14-3)

576 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-10)  Select the defined group from the Web Filter drop-dow

Strona 543 -  Click OK.(Figure 14-5)

577 16.1.2 Regulating User’s access to Specific Website, Downloading or Uploading Specific File Extension via HTTP or FTP or the Access to Specific

Strona 544 - Figure 14-5 Policy Created

578 Step 2. Go to Web Filter > Configuration > File Extensions, click New Entry and then set as below:(Figure 16-14)  Type the name in the Na

Strona 545 - (Figure 14-7)

48 Step 5. The configuration of LAN1 to the Internet is now complete.(Figure 2-15) Figure 2-15 The LAN Configured Using Multiple Subnet Note: 1

Strona 546 - Figure 14-7 Policy Created

579 Figure 16-16 Adding a New Extension Figure 16-17 Typing a New Extension Figure 16-18 File Extension Added

Strona 547 -  Click OK.(Figure 14-9)

580 Step 3. Go to Web Filter > Configuration > MIME/Script, click New Entry and then set as below:(Figure 16-19)  Type the name in the Name f

Strona 548

581  Click Modify and then click Add.(Figure 16-21)  Enter the MIME Types in the field.  Click OK.(Figure 16-22, 16-23) Figure 16-21 Configuri

Strona 549 - Figure 14-9 Policy Created

582 Step 4. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-24)  Type the name in the Name field.

Strona 550

583 Figure 16-24 Configuring the URL Group

Strona 551 - (Figure 14-11)

584 Figure 16-25 Setting Completed

Strona 552 - (Figure 14-13)

585 Step 5. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-26)  Select the defined group from the Web Filter drop-dow

Strona 553 - (Figure 14-14)

586 Chapter 17 Reports Reports delivers the IT administrator with detailed statistics and logs regarding the access of websites made by users.

Strona 554 - (Figure 14-16)

587 Terms in Setting Periodic Report Scheduling Settings  Generates and sends out a periodic report to the designated recipient(s) based on a sc

Strona 555

588 Figure 17-2 A Daily Report Sent through an Email Message

Strona 556 -  Click OK.(Figure 14-18)

5 8.2 RADIUS Authentication ... 166 8.3 POP3 Authentication ...

Strona 557

49 2.3.2 Using Multiple Subnets to Establish a VLAN Gateway to Regulate VLAN Users to Access the Internet Prerequisite Setup (Note: IP addresses

Strona 558

589 Terms in Logs Search  Category: Available searching criteria are time, souce IP address, website, classification and action.  Upload: Availa

Strona 559 - Reports > Logs

590 Figure 17-13 Searching for the Specific Logs Note: 1. Under Web Filter > Reports > Logs, the Category reports can be sorted by the t

Strona 560

591 17.1 Statistics Step 1. Under Web Filter > Reports > Statistics, bar charts shows the report of URL blocking. Step 2. In the upper left c

Strona 561 - Chapter 15 Mail Reports

592 Step 4. Below it shows the statistics report.(Figure 17-15)  Y-axis indicates the amount of scanned URL.  X-axis indicates the time.

Strona 563

594 Figure 17-15 Statistics Report

Strona 564 - Terms in Logs

595 17.2 Logs Step 1. Under Web Filter > Reports > Logs, there it shows the URL blocking logs.(Figure 17-16) Figure 17-16 URL Blocking Logs

Strona 565

596 IDP

Strona 566

597 Chapter 18 Configuration In order to protect your network from various security threats, the device produces timely alerts and blocking mecha

Strona 567

598 Terms in Settings IDP Settings  IDP signature definitions update automatically everyday or updated by the IT administrator manually. After eac

Strona 568

50 Figure 2-16 First Multiple Subnet Setting

Strona 569

599  Type 60 in the Storage Lifetime field.  Click OK.(Figure 18-1) Figure 18-1 IDP Settings Note: 1. To enable Syslog, the IT administr

Strona 570 - 15.1 Statistics

600  When detecting attacks, the IT administrator will receive both an email notification and a NetBIOS Notification, Also, a corresponding log wil

Strona 571 - 15.2 Logs

601 Note: 1. The IDP log is generated upon the “Log”setting under IDP > Signatures > Anomaly / Pre-defined / Custom.

Strona 572

602 Chapter 19 Signatures To protect your company's network from malicious intrusions and attacks, the CS-2001 provides alerts and blocking me

Strona 573 - Web Filter

603 Terms in Signatures Anomaly  Available signatures are syn flood, udp flood, icmp flood, portscan and http insptct.(Figure 19-1)  You may s

Strona 574 - Chapter 16 Configuration

604 Pre-defined  Available signatures are Attack Responses, Backdoor, Bad Traffic, Chat, DDoS, DNS, DoS, Exploit, Finger, FTP, ICMP, IMAP, Info, Mi

Strona 575

605 Figure 19-2 Pre-Defined Settings

Strona 576 - Settings

606 Note: 1. All the signatures under the IDP > Signatures > Pre-defined are processed according to the Default Settings for Each Risk Lev

Strona 577

607 Name  The name of the signature. Protocol  Determine of which IP Version (IPv4, IPv6) and Communication Protocol to detect and protect. S

Strona 578 - Terms in Extension

608 19.1 Example 19.1.1 Adopting Packets Inspection along with Custom and Pre-Defined Signatures to Detect and Prevent the Intrusion Step 1. Under

Strona 579 - Terms in MIME/Script

51 Figure 2-17 Second Multiple Subnet Setting Figure 2-18 Multiple Subnet Settings Completed Note: 1. The device’s interface settings permits

Strona 580

609 Step 2. Go to IDP > Signatures > Anomaly and then set as below:(Figure 19-4)  Enable the signatures and configure the settings.  Click

Strona 581 - 16.1 Example

610 Step 3. Under IDP > Signatures > Pre-defined, set as below:(Figure 19-5)  Select the signatures.  Click OK. Figure 19-5 Pre-Defined Se

Strona 582 - Blacklist and Whitelist

611 Step 4. Go to IDP > Signatures > Custom and set as below:(Figure 19-6)  Type the name in the Name field.  Select IPv4 for IP Version an

Strona 583

612 Note: 1. You may type a word string in the Content Pattern field; or convert it to hexadecimal ASCII code and then paste it into the field.

Strona 584 - (Figure 16-9)

613 Figure 19-8 Applying the IDP to the Policy

Strona 585

614 Figure 19-9 Policy Created

Strona 586

615 Chapter 20 IDP Report CS-2001 provides you with a comprehensive IDP report in both statistics and logs. With the help of them, you could have a

Strona 587

616 Terms in Settings Periodic Report Scheduling Settings  It can generates and send out the periodic report to the designated recipient(s) on sch

Strona 588

617 Figure 20-2 Periodic Report Received

Strona 589

618 Terms in Logs Search  Available search criteria are date, event, signature category, attacker IP, victim IP, interface and risk level.  G

Strona 590

52 Step 2. Go to Policy Object > Address > LAN, and set as below:(Figure 2-19) Figure 2-19 Address Settings for the LAN

Strona 591

CS-2001 UTM Content Security Gateway User’s Manual 619 20.1 Statistics Step 1. Go to IDP > IDP Reports > Statistics, to view a full-scale ID

Strona 592

620 20.2 Logs Under IDP > IDP Reports > Logs, it shows the IDP status. Note: 1. The symbol used in Logs:  Process: Symbol Description

Strona 593 - (Figure 16-25)

621 Web VPN / SSL VPN

Strona 594

622 Chapter 21 Web VPN / SSL VPN Since the Internet is in widespread use these days, the demand for secure remote connections is increasing. To mee

Strona 595

623 Terms in VPN DES  DES, an acronym for Data Encryption Standard, is a cipher that was selected by NIST (National Institute of Standard and Te

Strona 596

624 Hardware Auth.  The IT administrator may enable the PCs listed under Web VPN/ SSL VPN > Hardware Auth by adding them to the Selected Hardw

Strona 597 - Chapter 17 Reports

625 Terms in Hardware Auth Hardware Authentication Users  The list of the devices that have been established SSL VPN connection to the CS-2001 d

Strona 598

626 21.1 Example 21.1.1 Configuring Web / SSL VPN Connection settings for External Clients Step 1. Go to Interface > WAN, activate the HTTPS fu

Strona 599

627 Figure 21-4 User Group Entries

Strona 600

628 Step 3. Go to Web VPN / SSL VPN > Settings and then set as below:  Click Modify.(Figure 21-5)  Tick Enable Web VPN / SSL VPN.  Select th

Strona 601

53 Step 3. Go to Policy Object > Address > LAN Group and then set as below: (Figure 2-20) Figure 2-20 LAN Group Settings Step 4. Go to Poli

Strona 602 - 17.1 Statistics

629 Figure 21-6 Web VPN / SSL VPN Setting Completed

Strona 603 - (Figure 17-15)

630 Figure 21-7 Web VPN / SSL VPN Authentication Settings Figure 21-8 Web VPN / SSL VPN Authentication Completed

Strona 604

631 Step 4. Go to Policy > Incoming and then set as below:(Figure 21-9)  Select the defined Web VPN / SSL VPN from the VPN Trunk drop-down list.

Strona 605

632 Step 5. Configure the setting from a browser:  In the URL field, type the CS-2001 interface address plus sslvpn or webvpn. For example, https:/

Strona 606 - 17.2 Logs

633 Figure 21-12 Warning-Security Window

Strona 607

634 Figure 21-13 Warning-Security Window Figure 21-14 The Authentication Window Figure 21-15 Web VPN / SSL VPN Connection

Strona 608 - Chapter 18 Configuration

635 Figure 21-16 Web VPN / SSL VPN Connection Established

Strona 609

636 Step 6. Under Web VPN/ SSL VPN > Status, it shows the connection status: (Figure 21-17) Figure 21-17 Web VPN / SSL VPN Connection Status S

Strona 610 -  Click OK.(Figure 18-1)

637 Step 8. Go to Web VPN / SSL VPN > Settings and then set as below:(Figure 21-19)  Click Modify.  Move the hardware from the Available Hardw

Strona 611 - (Figure 18-2, 18-3)

638 Figure 21-20 Setting Completed Step 9. When a user establishes an SSL VPN connection through the CS-2001, their hardware can be directly authen

Strona 612 - Pre-defined / Custom

54 Step 5. The internal network’s VLAN. (Figure 2-23) Figure 2-23 The Completed Mulitple Subnet VLAN Settings

Strona 613 - Chapter 19 Signatures

639 Note: 1. When hardware authentication and user/group authentication are both enabled, the device will first try to authenticate by hardware au

Strona 614 - Terms in Signatures

640 Figure 21-22 Installing Java Runtime Environment Plug-in

Strona 615 - (Figure 19-2)

CS-2001 UTM Content Security Gateway User’s Manual 641 IM Recording

Strona 616

642 Chapter 22 Configuration IM Recording can help you record and monitor the use of MSN and QQ messenger. This can prevent productivity losses fro

Strona 617

643 Terms in QQ Account Manager IM Logging Setting  Configures the storage lifetime of IM logging. Enable Block QQ access with an invalid passwor

Strona 618

644 22.1 Example 22.1.1 Recording the Use of MSN / QQ Messenger Step 1. Users may log into the Web User Interface to add their own account. (Enter

Strona 619 - 19.1 Example

645 Figure 22-2 Account Added Note: 1. IT administrator may add new users under IM Recording > Configuration > QQ Account Manager.

Strona 620 - Figure 19-4 Anomaly Settings

646 Step 2. The added user is listed under IM Recording > Configuration > QQ Account Manager:  Tick Block QQ access with an invalid password.

Strona 621 - (Figure 19-5)

647 Note: 1. Users may go to the Web user interface to change their password on their own. (Enter the management IP address appended with qq. E.g.

Strona 622

648 Step 3. Go to Policy > Outgoing and set as below:(Figure 22-6)  Enable IM Recording.  Click OK.(Figure 22-7) Figure 22-6 Creating an Outg

Strona 623 -  Click OK.(Figure 19-9)

55 2.4 Route Table 2.4.1 Enabling Two Networks Connected by a Router to Access the Internet via the CS-2001 Prerequisite Setup (Note: IP addresses

Strona 624

649 Figure 22-7 Policy Created

Strona 625

650 Chapter 23 Reports The records of MSN and QQ messengers are shown in the form of easy-to-read log and statistics. Terms in Settings Periodic Re

Strona 626 - Chapter 20 IDP Report

651 Figure 23-1 Periodic Report Settings Figure 23-2 Daily IM Statistics Report

Strona 627

652 Figure 23-3 Daily IM Statistics Report Figure 23-4 Historical Report Scheduling Settings

Strona 628

653 Figure 23-5 Historical Report Received

Strona 629

654 Figure 23-6 Weekly IM Statistics Report Terms in Message History Search  Available search criteria are date, time range, IM type, username,

Strona 630 - 20.1 Statistics

655  Click Search.(Figure 23-7)  Click Send Report.  The report is sent to the designated recipient(s). (Figure 23-8, 23-9)  To store the se

Strona 631 - 20.2 Logs

CS-2001 UTM Content Security Gateway User’s Manual 656 Figure 23-8 Receiving the Search Results Figure 23-9 The Searching Results Note: You m

Strona 632 - Web VPN / SSL VPN

657 Figure 23-10 Downloading the Searching Results 23.1 Statistics Step 1. IM Recording > Reports > Statistics shows a comprehensive stat

Strona 633

658 Figure 23-11 IM Recording Statistical Report

Strona 634

56 Step 1. Go to System > Configuration > Route Table and set as below:  Click on New Entry.  IP Version : Select IPv4.  IP Address: Ty

Strona 635 - Hardware Auth

659 23.2 Message History Step 1. IM Recording > Reports > Message History shows the logs of users’ conversation.(Figure 23-12) Figure 23-12

Strona 636 - Terms in Status

660 Chapter 24 Policy CS-2001 inspects each packet passing through the device to see if it meets the criteria of any policy. Every packet is proces

Strona 637 - 21.1 Example

661  DMZ to LAN : The packet is from the DMZ and heading to the LAN. IT administrators can customize the policy for DMZ-to-LAN packets.  LAN to L

Strona 638

662 Terms in Policy Source Address & Destination Address  Source address and Destination address is based around using the device as a point o

Strona 639

663 Authentication  This requires users to be authenticated to create a connection. VPN Trunk  This is where you apply the policy to regulate th

Strona 640

CS-2001 UTM Content Security Gateway User’s Manual 664 Web App Firewall  It can regulate and filter all the web application. Anti-Virus  It

Strona 641

665 Note: 1. Max. Concurrent Sessions overrides Max. Concurrent Sessions per IP in a policy. When the setting value of Max. Concurrent Sessions ex

Strona 642

666 24.1 Example No. Settings Scenario Page 24.1.1 Outgoing Creating a Policy to Monitor the Internet Access of LAN User 667 24.1.2 Ou

Strona 643

667 24.1.1 Creating a Policy to Monitor the Internet Access of LAN Users Step 1. Go to Policy > Outgoing and then set as below:(Figure 22-1) 

Strona 644

668 Step 2. Click the Log icon of a policy to see the log.(Figure 22-3)  In the upper-left corner, click the Refresh button or select a refresh

Strona 645

57 Figure 2-26 Static Route Setttings Figure 2-27 The Completed Static Route Settings Important: 1. To enable the LAN to LAN connection, go to

Strona 646

669 Figure 22-4 Traffic Shown in Log Screen

Strona 647

670 Step 3. Under Monitoring > Traffic Grapher > Policy-Based Traffic, the traffic flow is displayed in graphics, giving you an instant insight

Strona 649

672 Figure 22-5 Statistics Screen

Strona 650 - (Figure 21-21, 21-22)

673 24.1.2 Creating a Policy to Restrict the Access to Specific Web Sites Step 1. Go to Web Filter > Configuration > Whitelist/ Blacklist/ Fi

Strona 651

674 Figure 22-9 MIME / Script Settings Figure 22-10 Group Settings

Strona 652

675 Step 2. Go to Policy Object > Application Blocking > Settings and then set as below:(Figure 22-11, 22-12) Figure 22-11 Application Blockin

Strona 653 - Chapter 22 Configuration

676 2. Application Blocking is used for blocking Instant Messenger, Peer-to-Peer Application, Video/ Audio Application, Webmail, Game Application, T

Strona 654 - Terms in QQ Account Manager

677 Step 3. Go to Policy Object > Address > WAN / WAN Group and then set as below:(Figure 22-13, 22-14) Figure 22-13 WAN Interface Setting F

Strona 655 - 22.1 Example

678 Step 4. Go to Policy > Outgoing and then set as below:(Figure 22-15)  Select the defined group from the Destination Address field.  Select

Strona 656 - Manager

58 Step 2. The subnets 192.168.10.x/24,192.168.20.x/24 and 192.168.1.x/24 can now communicate with each other. In addition, these subnets may also ac

Strona 657

679 Step 5. Go to Policy > Outgoing and then set as below:(Figure 22-16)  Select the defined group from the Web Filter drop-down list.  Select

Strona 658

680 24.1.3 Creating a Policy to Grant Internet Access to Only Authenticated Users on Schedule Step 1. Go to Policy Object > Schedule > Settin

Strona 659 -  Click OK.(Figure 22-7)

681 Figure 22-20 Applying the Schedule and Authentication to the Policy Figure 22-21 Policy Completed

Strona 660 - Figure 22-7 Policy Created

682 24.1.4 Creating a Policy to Enable a Remote User to Control a LAN PC with Remote Control Software (pcAnywhere) Step 1. Set up a computer to be

Strona 661 - Chapter 23 Reports

683 Step 3. Under Policy > Incoming, set as below:(Figure 22-23)  Select the defined Virtual Server for Destination Address.  Select PC-Anywhe

Strona 662

684 24.1.5 Creating a Policy to Limit the Bandwidth, Daily Total Traffic Amount and Maximum Concurrent Sessions of an Incoming Session to a FTP Serv

Strona 663

685 Step 4. Go to Policy > WAN to DMZ and then set as below(Figure 22-27)  Select the defined rule from the Destination Address drop-down list.

Strona 664

686 Figure 22-28 A WAN-to-DMZ Policy Created

Strona 665 - Terms in Message History

687 24.1.6 Creating a Policy to Enable LAN / WAN Users to Have Email Access (A Transparent Mode Example) Step 1. Set up a mail server in DMZ. Next,

Strona 666

688 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 22-31)  Select the defined DMZ rule for Destination Address.  Select the defined s

Strona 667

6 Chapter 21 Web VPN / SSL VPN ... 622 21.1 Example ...

Strona 668 - 23.1 Statistics

59 2.5 DHCP 2.5.1 Using an External DHCP Server to Allocate IP Addresses to Internal PCs Step 1. Go to System > Configuration > DHCP, and se

Strona 669

689 Step 5. Under Policy > LAN To DMZ, set as below:(Figure 22-33)  Select the defined DMZ entry for Destination Address.  Select the defined

Strona 670 - 23.2 Message History

690 Step 6. Under Policy > DMZ To WAN, set as below:(Figure 22-35)  Select the defined rule for Source Address.  Select the defined rule for S

Strona 672

692 Chapter 25 Anomaly Flow IP Once an anomaly traffic flow is detected, CS-2001 will take action to block the flow of packets. This protection ens

Strona 673 - Terms in Policy

693 25.1 Example 25.1.1 Configuration for Alerts and the Blocking of Internal DDoS Attacks Step 1. Go to System > Configuration > Settings

Strona 674

694 Step 3. Go to Anomaly Flow IP > Settings and then set as below:(Figure 23-2)  Enter the Traffic Threshold per IP. (The default value is 100)

Strona 675

695 Step 4. When a DDoS attack occurs, CS-2001 generates a corresponding log under Anomaly Flow IP > Virus-infected IP, and if NetBIOS Notificatio

Strona 676

696 Step 6. Internal users will see an alert message upon opening a web browser after being infected by a computer virus. CS-2001 limits virus-infect

Strona 678

698 Chapter 26 Inbound Balancing The CS-2001 provides enterprises with Inbound Load Balancing. It ensures uninterrupted access for external users t

Strona 679 - (Figure 22-4)

60 Note: 1. When Enable DHCP Relay Support is enabled, internal PCs can obtain an IP address from the server through the specified interface (WAN1

Strona 680

699 Terms in Inbound Balancing Domain Name  Refers to an address that is registered at an ISP. An IP address like 198.68.20.78 is not easy to me

Strona 681 - (Figure 22-5)

700 Domain Name Type IP Address host1.nu.net.tw A 61.11.11.12 host2.nu.net.tw A 61.11.11.13 host2.nu.net.tw A 211.22.22.23 Table 24-1 Domain Name

Strona 682

701  Supposing a user wants to send an email to [email protected]. The user is using test.com.tw as its SMTP server. The DNS records will be quer

Strona 683

702 pointer records of the reverse database, this IP address is stored as the domain name 12.11.11.61.in-addr.arpa pointing back to its designated ho

Strona 684

703  IPv6 uses PTR record as well. For example, host33.nu.net.tw points to FEC0::2AA:FF:FE3F:2A1C (FEC0:0000:0000:0000:02AA:00FF:FE3F:2A1C), in poi

Strona 685 - Figure 22-10 Group Settings

704 Further Description DNS pointers are used to indicate which DNS server holds all the associated DNS records for a domain. Any specific informati

Strona 686

705 Note: 1. The DNS must point to the fixed IPs.

Strona 687

706 Under Advance > Inbound Balancing > Settings, configure DNS settings as listed below:(Table 24-6) Domain Name Type IP Address Reverse

Strona 688 - (Figure 22-13, 22-14)

707 Configure DNS settings as listed below:(Table 24-7) Domain Name Type IP Address Weighting Priority web.nu.net.tw A 61.11.11.11 1 1 web.nu

Strona 689 - (Figure 22-15)

708 As seen from table 24-7, it can be inferred that when browsing www.nu.net.tw, visitors are directed to different servers according to their brows

Strona 690

61 2.5.2 Using the CS-2001 to Allocate IP Addresses to LAN PCs Step 1. Go to System > Configuration > DHCP and set as below:(Figure 2-30) 

Strona 691

709 26.1 Example No. Application Environment Page 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode 710 26.1.2

Strona 692

710 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode Step 1. Go to Advance > Inbound Balancing > Settings and p

Strona 693 - (Figure 22-22)

711 Figure 24-3 The First Inbound Balance Configuration

Strona 694

712 Figure 24-4 The Second Inbound Balance Configuration Figure 24-5 The Completed Settings Note: 1. If @ is entered in the Hostname field, th

Strona 695

713 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-6, 24-7) Figure 24-6 Server 1 Settings Figu

Strona 696 - (Figure 22-28)

714 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-8)  For Destination Address select [Virtual Server IP]

Strona 697

715 Figure 24-9 Configuring the First Settings of an Incoming Policy Settings Figure 24-10 The Completed Policy Settings

Strona 698

716 Step 4. Settings complete. If WAN 1 goes down, WAN 2 ensures user’s access to the web server remains uninterrupted.(Figure 24-11) Figure 24-11 W

Strona 699

717 26.1.2 Creating an A Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Strona 700

718 Figure 24-13 The First Inbound Balance Settings Figure 24-14 The Second Inbound Balance Configuration Figure 24-15 Setting Completed

Strona 701

62 Figure 2-30 DHCP Settings

Strona 702 - Anomaly Flow IP

719 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-16, 24-17) Figure 24-16 Server 1 Settings Fi

Strona 703 - Chapter 25 Anomaly Flow IP

720 Step 3. Go to Policy > Incoming and proceed with the following settings:  Click New Entry.(Figure 24-18)  Select the defined rule ([Virtua

Strona 704 - 25.1 Example

721 Figure 24-19 Configuring the Second Policy Settings Figure 24-20 Policy Completed

Strona 705

722 Step 4. Setting completed.(Figure 24-21) Figure 24-21 The Round-Robin Deployment Note: 1. Inbound Balance Settings:(Table 24-9) Name Type

Strona 706

723 cycle restarted)  The 5th user accesses the server via 211.22.22.22.  The 6th user accesses the server via 211.22.22.22.

Strona 707 - (Figure 23-8)

724 26.1.3 Creating a CNAME Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settin

Strona 708 - Advance

725 Figure 24-23 The First Inbound Balance Settings Figure 24-24 The Second Inbound Balance Settings Figure 24-25 CNAME(Alias) Settings

Strona 709

726 Figure 24-26 Completed CNAME(Alias) Settings

Strona 710 - Terms in Inbound Balancing

727 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-27, 24-28) Figure 24-27 Server 1 Settings F

Strona 711

728 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-29)  Select the defined rule ([Virtual IP]Web_Server(61

Strona 712

63 Note: 1. Enabling Obtain DNS server address automatically is intended for LAN users whom access the Internet via the device’s authentication me

Strona 713

729 Figure 24-30 Configuring the Second Policy Settings Figure 24-31 Adding the Second Policy

Strona 714

730 Step 4. Setup completed.(Figure 24-32) Figure 24-32 Web Server Deployment Using CNAME Note: 1. The settings for Inbound Balancing:(Table 24-

Strona 715

731  The 4th user accesses the server via 61.11.11.11 (Round-Robin priority distribution cycle has restarted)  The 5th user accesses the server v

Strona 716

732 26.1.4 Creating a MX Record to Load Balance a Mail Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Strona 717 - (Table 24-6)

733 Figure 24-34 The First Inbound Balance Settings Figure 24-35 The Second Inbound Balance Settings Figure 24-36 The MX(Mail eXchanger) Setting

Strona 718 - (Table 24-7)

734 Figure 24-37 MX(Mail eXchanger) Settings Completed

Strona 719 - (Table 24-8)

735 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-38, 24-39, 24-40, 24-41) Figure 24-38 The Fir

Strona 720 - 26.1 Example

736 Figure 24-40 The Third Setting of Server Figure 24-41 The Fourth Setting of Server

Strona 721 - Using the Backup Mode

737 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-42)  Select the defined rule ([Virtual IP]Mail_Server_P

Strona 722

738 Figure 24-43 The Second Policy Settings Figure 24-44 The Third Policy Settings

Strona 723

64 2.6 DDNS Step 1. Go to System > Configuration > Dynamic DNS, and set as below:(Figure 2-31)  Click New Entry. Select a Service Provider

Strona 724 - (Figure 24-6, 24-7)

739 Figure 24-45 The Fourth Policy Settings Figure 24-46 Policy Completed

Strona 725

740 Step 4. Setup Completed.(Figure 24-47) Figure 24-47 The Mail Server Deployment Note: 1. Settings for Inbound Balancing: (Table 24-11) Name

Strona 726

741  The 2nd user accesses the server via 211.22.22.22.  The 3rd user accesses the server via 211.22.22.22 (Round-Robin priority distribution cyc

Strona 727 - (Figure 24-11)

742 Chapter 27 High Availability When two CS-2001 devices are deployed in the network, the two devices can operate in active / standby mode. The ma

Strona 728 - Using the Round-Robin Mode

743 Terms in High Availability HA Mode  This mode is used to determine if the device will serve as the master or backup. Data Transmission P

Strona 729

744 27.1 Example 27.1.1 High Availability Deployment Preparation Configure Port1 as LAN1 (192.168.1.1, NAT/ Routing mode) and connect it to the L

Strona 730 - (Figure 24-16, 24-17)

745 Step 1. Assign one CS-2001 device as the master and connect it to the same switch that the LAN is connected to.(Figure 25-1) Figure 25-1 The Dep

Strona 731

746 Step 2. Using the master device, configure the following High Availability settings under Network > Interface.(Figure 25-2) Figure 25-2 The

Strona 732

747 Step 3. Using the master device, configure the following High Availability settings under Advance > High Availability > Settings:  Tick E

Strona 733 - (Figure 24-21)

748 Step 4. To set up the backup device, be sure the backup device is turned off and then configure the interface. Backup device’s LAN port, WAN port

Strona 734

65 2.7 Host Table Step 1. Go to System > Configuration > Host Table and set as below:(Figure 2-33)  Configure the Host Name accordingly. 

Strona 735

749 Important: 1. After the high availability deployment, if the first time synchronization between the master device and backup device is interr

Strona 736

750 Figure 25-6 Backup Device Taking Over Operations When Master Device Fails 6. Note:  During backup, if the WAN port is using a dynamic IP a

Strona 737

751 Chapter 28 Co-Defense System The CS-2001 can work in cooperation with the network’s switch, to provide instant monitoring of the internal net

Strona 738 - (Figure 24-27, 24-28)

752 Terms in Core Switch Name  The name used to identify the switch. Switch Model  The switch model can be selected or it can be customized. I

Strona 739

753 Remove Blocking Command  This command instructs the core switch to discontinue blocking an IP/MAC address. Show Blocking Commands  This comm

Strona 740

754 28.1 Example 28.1.1 Quickly Isolating Any Anomaly Flow in the Internal Network by Utilizing the Core and Edge Switch Step 1. Go to Anomaly

Strona 741 - (Figure 24-32)

755 Step 2. Under Advance > Co-Defense System > Core Switch, set as below:(Figure 26-3)  Enter the name to identify the switch.  Select the

Strona 742

756 Figure 26-4 Core Switch Settings Completed

Strona 743

757 Step 3. Under Advance > Co-Defense System > Edge Switch, click New Entry and then set as below:(Figure 26-9)  Type the name in the Name f

Strona 744

758 Step 4. Go to Advance > Co-Defense System > MAC ADDR Table. Using SNMP, the CS-2001 can obtain the MAC addresses of any packets that pass t

Strona 745

66 2.8 SNMP 2.8.1 SNMP Agent Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Agent Settings section configure the fol

Strona 746

759 Monitoring

Strona 747

760 Chapter 29 Logs Log comprises logs of Traffic, Events, Connections, Viruses, Application Blocking, Concurrent Sessions and Quota. The system ma

Strona 748

761 Terms in Settings Logging Settings  Logs are sent to the designated recipient once the file size reaches 300 KB.  Logs can be backed up onto

Strona 749

762 Figure 27-1 Searching for a Specific Log

Strona 750

763 Figure 27-2 Downloading the Search Results

Strona 751 - (Figure 24-47)

764 Terms in Events Search  Available search criteria are date, admin name, IP address, event type and event log with detailed content.  Unde

Strona 752

765 Terms in Connection Search  PPPoE : Available search criteria are date and keyword.  Dynamic IP Address: Available search criteria are date

Strona 753

766 Figure 27-4 Searching for a Specific Log

Strona 754 - Terms in High Availability

767 Terms in Virus Search  Available search criteria are date, source IP, destination IP, application, infected file and virus name.  Under Mo

Strona 755 - 27.1 Example

768 29.1 Traffic 29.1.1 Viewing the Protocols and Port Numbers Used during an Access to CS-2001 Step 1. Go to Policy> DMZ To WAN and set as bel

Strona 756 - (Figure 25-1)

67 2.8.2 SNMP Trap Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Trap Settings section, configure the following settin

Strona 757 - (Figure 25-2)

769 Step 2. Under Monitoring > Logs > Traffic, it shows the traffic status of a policy.(Figure 27-7) Figure 27-7 Traffic Log Step 3. Click an

Strona 758 - (Figure 25-3)

770 Figure 27-8Monitoring the Traffic Flow of Each IP Address

Strona 759 - (Figure 25-4)

771 Step 4. To clear the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-9) Figure 27-9 Deleting all the Traffi

Strona 760

772 29.2 Event 29.2.1 Viewing System History Access and the Status of WAN Step 1. Under Monitoring > Logs > Events, there it shows the sys

Strona 761

773 Figure 27-11 Specific Details of a History Event

Strona 762

774 29.3 Connection 29.3.1 Viewing the Connection Logs of WAN Interface Step 1. Under Monitoring > Logs > Connections, it shows the logs o

Strona 763 - Terms in Core Switch

775 Step 2. To delete the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-13) Figure 27-13 Deleting all the Con

Strona 764

776 29.4 Viruses 29.4.1 Viewing the Detected Viruses from Internal Users Using HTTP / Web Mail / FTP Protocol to Transfer Files Step 1. Go to Po

Strona 765 - 28.1 Example

777 Figure 27-14 A Policy with HTTP/ WebMail and FTP

Strona 766

778 Figure 27-15 Policy Completed

Strona 767

CS-2001 UTM Content Security Gateway User’s Manual 68 2.9 Bulletin Board 2.9.1 Using CS-2001 to Announce the Information to LAN Users and DMZ User

Strona 768

779 Step 2. Under Monitoring > Logs > Viruses, it shows the logs of detected virus from the Internal users using HTTP/ WebMail and FTP protocol

Strona 769

780 29.5 Application Blocking 29.5.1 Viewing the Logs Step 1. Under Policy > Outgoing, set as below: (Figure 27-16)  Select the defin

Strona 770 - Monitoring

781 Step 2. Under Monitoring > Logs > Application Blocking, it shows the logs of applicatons that have been blocked.(Figure 27-18) Figure 27-1

Strona 771 - Chapter 29 Logs

782 29.6 Concurrent Sessions 29.6.1 Viewing the Logs of Concurrent Sessions that have been Exceeded the Configured Value Step 1. Go to Policy &g

Strona 772 - Terms in Traffic

783 Figure 27-20 A Policy with Limitation of Concurrent Sessions

Strona 773

784 Figure 27-21 Policy Completed Step 2. Under Monitoring > Logs > Concurrent Sessions, it shows the logs of the concurrent sessions that ha

Strona 774

785 29.7 Quota 29.7.1 Viewing the Logs of Quota that Has Been Reached Step 1. Go to Policy > Outgoing and then set as below:(Figure 27-22) 

Strona 775 - Terms in Events

786 Figure 27-22 A Policy with Limitation of Quota per Source IP

Strona 776 - Terms in Connection

787 Figure 27-23 Policy Completed Step 2. Under Monitoring > Logs > Quota, it shows the logs of the quota that have reached the configured va

Strona 777

788 29.8 Log Backup 29.8.1 Archiving or Retrieving Logs Generated by CS-2001 Step 1. Go to System > Configuration > Settings and then set as

Strona 778 - Terms in Quota

7 Chapter 32 Diagnostic Tools ... 816 32.1 Ping ...

Strona 779 - 29.1 Traffic

69 Step 2. Under System > Configuration > Bulletin Board, configure the settings in the Bulletin Board Announcements section.  Click New Entr

Strona 780 - (Figure 27-8)

789 Step 3. Go to Monitor > Log > Settings and then set as below:(Figure 27-27) Figure 27-27 Monitoring Settings

Strona 781

790 Note: 1. Once Email Notification is enabled, the logs will be sent to the IT administrator when the files size reaches 300KB. 2. When syslog

Strona 782 - (Figure 27-9)

CS-2001 UTM Content Security Gateway User’s Manual 791 Chapter 30 Accounting Reports Accounting report gives the IT administrator an insight into

Strona 783 - 29.2 Event

792 Terms in Setting Accounting Report Settings  The configuration to enable or disable the recording of inbound and outbound data access and co

Strona 784

793 Terms in Today Top-N Time Slider  Drag the two sliders to adjust the statistics’ time interval (represented by the red portion.) So

Strona 785 - 29.3 Connection

794 Figure 28-2 Searching for the Specific Log

Strona 786 - (Figure 27-13)

795 Figure 28-3 Downloading the Accounting Reports

Strona 787 - 29.4 Viruses

796 Figure 28-4 Deleting the Accounting Reprots

Strona 788

797 30.1 Flow Analysis Step 1. Under Monitoring > Accounting Reports > Flow Analysis, it shows the traffic of source IP and service through C

Strona 789

798 30.2 Today’s Top Chart Step 1. Under Monitoring > Accounting Reports > Today’s Top Chart, it shows the traffic from the source IP, destin

Strona 790

70 Step 3. The LAN users and DMZ users will see the announcement when they access the Internet.(Figure 2-39, 2-40) Figure 2-39 Clicking the Button

Strona 791 - 29.5 Application Blocking

799 Figure 28-6 Today Top-N

Strona 792

800 Step 2. You may drag the two sliders to adjust the statistics’ time interval. The left one is the start time slider, the right one is the end tim

Strona 793 - 29.6 Concurrent Sessions

801 Figure 28-7 Today Top-N Report according to the Time Interval

Strona 794

802 Step 3. By clicking any source IP, a pop-up window will show its destination IP and service.(Figure 28-8) Figure 28-8 The Destination IP and Ser

Strona 795

803 Figure 28-9 The Source IP and Service

Strona 796 - 29.7 Quota

804 Step 5. By clicking any service, it will show its source IP and destination IP. (Figure 28-10) Figure 28-10 The Source IP and Destination IP

Strona 797

805 30.3 Historical Top Chart Step 1. Under Monitoring > Accounting Reports > Historical Top Chart, you may see the traffic of the source IP,

Strona 798

806 Chapter 31 Traffic Grapher Statistics delivers comprehensive information regarding network traffic, enabling the IT administrator to gain a tho

Strona 799 - 29.8 Log Backup

807 Traffic Grapher Charts  Vertical axis indicates the network traffic.  Horizontal axis indicates time. Type/ Source/ Destination/ Service/ A

Strona 800 - (Figure 27-27)

808 31.1 WAN Traffic Step 1. In Monitoring > Traffic Grapher > WAN Traffic, it shows the statistics of upstream / downstream packets over the

Strona 801

71 172.19.1.254. You may enter http://172.19.1.254:84 in the web browser. (Figure 2-41, 2-42) Figure 2-41 Logging in the Bulletin Board Setting Pa

Strona 802

809 Step 2. Statistic charts(Figure 29-2)  Vertical axis indicates network stream.  Horizontal axis indicates time.

Strona 804 - Historical Top Chart

811 Figure 29-2 The Network Stream Chart Note: 1. You may configure the time duration to search for the statistics in a certain period of time.

Strona 805

812 31.2 Policy-Based Traffic Step 1. When creating a new policy, if the Statistics is enabled, the Policy statistics charts in the path of Monitor

Strona 806

813 Step 2. Statistics charts.(Figure 29-4)  Vertical axis indicates network traffic.  Horizontal axis indicates time.

Strona 808 - 30.1 Flow Analysis

815 Figure 29-4 Viewing the Policy Statistics Chart Note: 1. You may see the statistics of a certain time by using the time searching.

Strona 809 - 30.2 Today’s Top Chart

816 Chapter 32 Diagnostic Tools The device provides ping and traceroute utilities to help diagnose network issues with particular external nodes.

Strona 810 - Figure 28-6 Today Top-N

817 32.1 Ping Step 1. To test whether a host is reachable across an IP network, go to Monitoring > Diagnostic Tools > Ping and then configure

Strona 811 - (Figure 28-7)

818 Figure 30-2 Ping Result Note: 1. If VPN is selected from the Interface drop-down list, the user must enter the local LAN IP address in the I

Strona 812

72 2.10 Language 2.10.1 Changing the Language Step 1. Under System > Configuration > Language, you may change the language of the user inter

Strona 813 - (Figure 28-9)

819 Figure 30-3 Ping Results for a VPN Connection

Strona 814

820 32.2 Traceroute Step 1. Under Monitoring > Diagnostic Tools> Traceroute the Traceroute command can be used by the CS-2001 to send out pac

Strona 815 - (Figure 28-10)

821 Figure 30-5 Traceroute Results

Strona 816 - 30.3 Historical Top Chart

CS-2001 UTM Content Security Gateway User’s Manual 822 32.3 Packet Capture Capture packetfor debugging Step 1. Under Monitoring > Diagnostic T

Strona 817 - Chapter 31 Traffic Grapher

823 Chapter 33 Wake-On-LAN Any wake-on-LAN supported PC can be remotely turned on by a “wake-up” packet sent from the CS-2001. By utilizing remote

Strona 818 - Traffic Grapher

824 33.1 Example 33.1.1 Remote Controlling a PC Step 1. Supposing the MAC address of the PC that is desired to be remotely controlled is 00:0C:76:

Strona 819 - 31.1 WAN Traffic

825 Chapter 34 Status Status provides current information about the device and the network including Interface, System Info, Authentication, ARP Ta

Strona 820 - (Figure 29-2)

826 34.1 Interface Step 1. Under Monitoring > Status > Interface, it shows the status of all interface.(Figure 32-2) Figure 32-2 Status In

Strona 821

827 8. PPPoE / Dynamic IP Uptime: when the interface is connected using PPPoE, it displays the connection uptime. 9. MAC Address: displays the MAC

Strona 822

828 34.2 System Info Step 1. Under Monitoring > Status > System Info, it shows the current system information, such as CPU utilization, hard

Strona 824 - (Figure 29-4)

829 Figure 32-3 System Information

Strona 825

830 34.3 Authentication Step 1. Under Monitoring > Status > Authentication, it shows the authentication status of the device.(Figure 32-4) F

Strona 826

831 34.4 ARP Table Step 1. Under Monitoring > Status > ARP Table, it shows NetBIOS Name, IP Address, MAC Address and Interface of any compute

Strona 827 - Chapter 32 Diagnostic Tools

832 Figure 32-6 Downloading the Anti-ARP Virus Software Figure 32-7 The Result of Executng the Anti-ARP Virus Software

Strona 828 - 32.1 Ping

833 Figure 32-8 The Anti-ARP Virus Software will Automatically Run when the System Startups

Strona 829 - Figure 30-2 Ping Result

834 34.5 Sessions Info Step 1. Under Monitoring > Status > Sessions Info, it provides a list of all the sessions that have connected to the d

Strona 830

835 Step 2. By clicking on any source IP, it shows the port number and the traffic.(Figure 32-10) Figure 32-10 The System Info

Strona 831 - 32.2 Traceroute

836 34.6 DHCP Clients Step 1. Under Monitoring > Status > DHCP Clients, it shows the status of IP address distributed by the device’s DHCP se

Strona 832

CS-2001 UTM Content Security Gateway User’s Manual 837 34.7 Host Info Step1. Under Monitoring > Status > Host Info, the IT administrator ma

Strona 833 - 32.3 Packet Capture

74 Chapter 3 Interface The Interface configuration allows you to configure the connection parameters separately for LAN, WAN and DMZ interfaces as

Strona 834 - Chapter 33 Wake-On-LAN

75 Terms in Settings DNS Settings  The DNS servers used for resolving domain names to IP addresses. MTU Setting  The Maximum Transmission Unit

Strona 835 - 33.1 Example

76 Interface Designation  The system-assigned name based on the network interface type selected. Interface Type  The network interface is catego

Strona 836 - Chapter 34 Status

77  IPv6 address represent itself as text string using the following three conventional forms:  Colon-hexadecimal form: This is the preferred for

Strona 837 - 34.1 Interface

78  The IPv6 prefix is the part of the address that indicates the bits that have fixed values. If it happens not to be a multiple of four such as 2

Strona 838

8 Quick Installation Guide

Strona 839 - 34.2 System Info

79  The result, 02-AA-00-FF-FE-3F-2A-1C, is converted to colon-hexadecimal notation, yielding the interface identifier 2AA:FF:FE3F:2A1C. Thus, in t

Strona 840

80 SSH  When ticked, the management interface is available for access via SSH protocol. Connection Type (As Interface Type set to WAN)  It has t

Strona 841 - 34.3 Authentication

81 NAT Redirection  Translates private IP addresses into public addresses.  Auto-configuration: The public address is automatically designated b

Strona 842 - 34.4 ARP Table

82 Detection Mode  When Round-Robin or Active-Backup is selected for Bonding Mode, ARP detect can be selected to detect the connection. Saturate

Strona 843

83 Terms in Interface Group Interface Group  Allows you to group network interface while each group is isolated from one another. Note: This requ

Strona 844

84 3.1 Example No. Scenario Page 3.1.1 Modifying the LAN Interface (NAT / Routing) 85 3.1.2 Configuring the WAN Interface 87 3.1.3 Using

Strona 845 - 34.5 Sessions Info

85 3.1.1 Modifying the LAN Interface (NAT / Routing) Prerequisite Setup (Note: IP addresses used as examples only) Port1 is configured as LAN1 by

Strona 846 - Figure 32-10 The System Info

86 2. Do not disable HTTP and HTTPS before configuring the settings under System > Administration > Permitted IPs, or the IT administrator may

Strona 847 - 34.6 DHCP Clients

87 3.1.2 Configuring the WAN Interface Step 1. Go to Network > Interface and then click Port2’s Modify button. Select WAN for Interface Type. St

Strona 848 - 34.7 Host Info

88 Step 3. Select WAN for Interface Type:  Static IP Address:(Figure 3-4)  Enter the IP Address, Netmask and Default Gateway.  Enter the Max. D

Komentarze do niniejszej Instrukcji

Brak uwag