Planet CS-2001 Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Komunikace Planet CS-2001. PLANET CS-2001 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 848
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
CS-2001 UTM Content Security Gateway User’s Manual
0
Users Manual
CS-2001
UTM Content Security Gateway
Zobrazit stránku 0
1 2 3 4 5 6 ... 847 848

Shrnutí obsahu

Strany 1 - UTM Content Security Gateway

CS-2001 UTM Content Security Gateway User’s Manual 0 User’s Manual CS-2001 UTM Content Security Gateway

Strany 2

9 Hardware Installation Front panel: Figure 1a. Front Panel of the CS-2001 Rear panel: Figure 1b. Rear Panel of the CS-2001  Power Indi

Strany 3

89 Figure 3-4 Configuring the Static IP Address Figure 3-5 Setting Completed

Strany 4 - Revision

90 Figure 3-6 Configuring the Dynamic IP Address Figure 3-7 Setting Completed

Strany 5 - Table of Contents

91 Figure 3-8 Configuring the PPPoE Figure 3-9 Setting Completed

Strany 6

92 Note: 1. The DNS Settings may be configured under Network > Settings. 2. When Ping, HTTP and HTTPS are enabled, the users may access the CS

Strany 7

93 3.1.3 Using CS-2001 as a Gateway for Users on Two Subnets to Access the Internet (NAT/Routing) Prerequisite Setup (Note: IP Addresses used as ex

Strany 8

94 Figure 3-10 Configuring the LAN Interface

Strany 9 - Quick Installation Guide

95 Step 2. Go to Network > Interface and then set as below:(Figure 3-11)  Click Port3’s Modify button.  Select LAN for Interface Type.  Sele

Strany 10 - Hardware Installation

96 Step 3. LAN1 and LAN2 users will connect to WAN1(61.11.11.11) and use WAN1’s IP address to access the Internet. You may create the policy to estab

Strany 11 - CS-2001 Topology:

97 3.1.4 Using CS-2001 as a Gateway for the Internal Users to Access the Internet and Configure the DMZ for the External Users to Access the Network

Strany 12 - Basic System Configuration

98 Figure 3-13 Configuring the LAN Interface

Strany 13

CS-2001 UTM Content Security Gateway User’s Manual 0 LED / Port Description WAN LAN DMZ LED1(Left) Orange Steady on indicates the port is connec

Strany 14 - Figure5. The Install Wizard

99 Step 2. Go to Network > Interface and then set as below:(Figure 3-14)  Click Port3’s Modify button.  Select DMZ for Interface Type.  Sele

Strany 15 - Figure7. Interface Settings

100 Step 3. The external users may connect to the web server (61.11.11.12) to access the network resource. The LAN users may connect to WAN1 (61.11.1

Strany 16 - Figure8. The WAN Settings

101 3.1.5 Deploying the CS-2001 between the Gateway and LAN (configuring two subnets, one using Transparent Routing, the other one using NAT/Routing

Strany 17 - Figure9. Time Settings

102 Step 1. Go to Network > Interface and then set as below:(Figure 3-16)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Strany 18

103 nterface Settings Step 3. LAN1 users (192.168.1.x/24) and LAN2 users (192.168.2.x/24) may use their original IP addresses to access the Internet

Strany 19 - Step 11. Settings complete

104 Figure 3-18 The deployment of LAN Using Transparent Routing and NAT/ Routing

Strany 20 - S.1 Overview of Functions

105 3.1.6 Deploying the CS-2001 between the Gateway and the LAN (LAN1 and DMZ1), connecting LAN1 to the user’s PC (using NAT/Routing mode) and then

Strany 21

106 Step 1. Go to Network > Interface and then set as below:(Figure 3-19)  Click Port1’s Modify button.  Select LAN for Interface Type.  Sel

Strany 22

107 Figure 3-20 DMZ Interface Settings Step 3. Go to Network > Interface Group and then set as below:(Figure 3-21)  Configure Port2(WAN1) and Po

Strany 23

108 Step 4. PCs (IP range: 172.16.x.x/16) on DMZ may use the original address to access the Internet through CS-2001. PCs on LAN will connect to WAN1

Strany 24

1 Basic System Configuration Step 1. Connect both the IT administrator’s PC and the device’s LAN port to the same hub / switch, and launch a browser

Strany 25

109 Note: 1. PCs in DMZ will access the Internet via the original firewall. 2. If Port4 is configured as WAN2 (211.22.22.22) and connected to the

Strany 26

110 3. Configure a router to connect different subnets in LAN for the PCs to access the Internet through the original firewall. PCs in DMZ may using

Strany 27

111 4. Configure two Firewall to connect the Internet and the CS-2001 and then configure a router to connect the CS-2001 and DMZ (192.168.2.1/24 and

Strany 28 - Chapter 1 Administration

112 3.1.7 Deploying CS-2001 between the Gateway and LAN (LAN1 and DMZ1) for LAN Users and DMZ Users to Access the Internet Prerequisite Setup (Note

Strany 29 - Terms in Admin

113 Step 1. Go to Network > Interface and then set as below:(Figure 3-26)  Click Port1’s Modify button.  Select WAN for Interface Type.  Sel

Strany 30 - 1.1 Admin

114 Step 2. Under Network > Interface, set as below:(Figure 3-27)  Click Port2’s Modify button.  Select LAN for Interface Type.  Select Tran

Strany 31

115 Step 3. Under Network > Interface and then set as below:(Figure 3-28)  Click Port3’s Modify button.  Select WAN for Interface Type.  Sel

Strany 32 - 1.2 Permitted IPs

116 Step 4. Under Network > Interface, set as below:(Figure 3-29)  Click Port4’s Modify button.  Select DMZ for Interface Type.  Select Tran

Strany 33 - 1.3 Logout

117 Step 6. Users connecting to Port2(LAN1) will use 192.168.1.x/24 to access the Internet. Users on Port4(DMZ1) will use the IP address that distrib

Strany 34 - (Figure 1-6)

118 3.1.8 Using the CS-2001 Device as the Gateway and Connecting it to the LAN (There are Two LAN Interface, One Use NAT/Routing, the Other One Use

Strany 35 - 1.4 Updating Software

2 Step 3. The user interface consists of the following two panels:  Menu Panel: Presents all the available system configurations in a tree direct

Strany 36 - Chapter 2 Configuration

119 Step 1. Go to Network > Interface and set as below:(Figure 3-32)  Click Port1’s Modify button.  Select WAN for Interface Type.  Select t

Strany 37 - Terms in Setting

120 Step 2. Go to Network > Interface and then set as below:(Figure 3-33)  Click Port2’s Modify button.  Select LAN for Interface Type.  Sel

Strany 38

121 Step 4. Go to Network > Interface Group and then set as below:(Figure 3-35)  Configure Port1(WAN1), Port2(LAN1) and Port3(LAN2) as Group 1.

Strany 39 - Terms in Multiple Subnet

122 Step 5. PCs under sales department (LAN1) and PCs under support department (LAN2) are on 192.168.1.x/24. They will connect to WAN1 and use WAN1’s

Strany 41

124 Policy Object

Strany 42

125 Chapter 4 Address In Address, the IT administrator may configure network settings of LAN, WAN and DMZ, as well as designate specific addresses

Strany 43 - Terms in Host Table

126 Terms in Address Name  An easily identifiable name to represent the IP address or addresses. Address type  Used to designate the IP range a

Strany 44 - Terms in SNMP

CS-2001 UTM Content Security Gateway User’s Manual 127 FQDN(Fully Qualified Domain Name)  The FQDN consists of two parts: the hostname and the dom

Strany 45 - Terms in Bulletin Board

128 4.1 Example No. Settings Scenario Page 4.1.1 LAN Using DHCP to Grant Only FTP Access to a LAN User with Specific IP Address 129 4.1.2

Strany 46 - 2.1 Settings

3 Step 4. If it’s the first time you’ve logged into the management interface, an install wizard will appear to guide you through setting some of the

Strany 47

129 4.1.1 Using DHCP to Assign an IP to a Specific User and only Permitting FTP Access Step 1. Under Policy Object > Address > LAN, set as bel

Strany 48 - Formatting the Hard Drive

130 Note: 1. To save the configured data from Policy Object > Address > WAN / LAN / DMZ as a file for storage or modification, use Export da

Strany 49

131 Step 2. Go to Policy > Outgoing and configure as below:(Figure 4-3)  Source Address: Select the source address.  Service : Select FTP. 

Strany 50 - 2.1.5 Rebooting the CS-2001

132 4.1.2 Creating a Policy for Certain Users to Connect to a Specific IP Address Step 1. Create several addresses under Policy Object > Address

Strany 51 - 2.2 Date / Time

133 Step 2. Under Policy Object > Address > LAN Group, set as below:(Figure 4-6)  Click New Entry.  Name: Designate a name for the group. 

Strany 52 - Access the Internet

134 Step 3. Go to Policy Object > Address > WAN and configure as below:(Figure 4-8)  Click New Entry.  Name: Designate a name for the group

Strany 53

135 Step 4. Go to Policy > Outgoing and configure as below:(Figure 4-10)  Source Address: Select the LAN address group.  Destination Address:

Strany 54

136 Chapter 5 Service TCP and UDP protocols provide different services. These services have an associated port number, for example Telnet = 23, FTP

Strany 55

137 Terms of Service Pre-Defined Symbol Description Any service Services using the TCP protocol: AFPoverTCP, AOL, BGP, FINGER, FTP, GOPH

Strany 56 - (Figure 2-13, 2-14)

138 5.1 Example of Pre-defined 5.1.1 Creating a Policy to Permit WAN Users Using VoIP Technology to Communicate with LAN Users (Using VoIP Port Num

Strany 57

4 Important: 1. Any data saved on the interface will be saved as the selected default character encoding if the device is unable to recognize the

Strany 58

139 Step 2. Go to Policy Object > Service > Custom and then configure as below:(Figure 5-3)  Name: Type in a name for the service.  In row

Strany 59 - (Figure 2-15)

140 Step 3. Go to Policy Object > Virtual Server > Port Mapping and use settings you created in Policy Object > Service > Custom. (Figure

Strany 60 - (Figure 2-17, 2-18)

141 Step 5. Go to Policy > Outgoing and configure as below:(Figure 5-8)  Source Address: Select the LAN group.  Service: Select the custom ser

Strany 61

142 5.2 Example of Service Group 5.2.1 Creating a Policy with a Service Group to Limit Specific LAN Users to Access Only Certain Internet Service

Strany 62

143 Figure 5-11 The Added Service Group

Strany 63 - (Figure 2-19)

144 Step 2. Go to Policy Object > Address > LAN Group and create a LAN Group of specific LAN users that are only permitted to access certain se

Strany 64

145 Figure 5-14 The Completed Policy Settings

Strany 65 - (Figure 2-23)

146 Chapter 6 Schedule Schedule is used for regulating the activation time of policies. With its help, the IT administrator may determine a specifi

Strany 66 - 2.4 Route Table

147 Terms in Schedule Name  Designates the name of the schedule. Type  Two modes are provided:  Recurring: Based upon a weekly schedule,

Strany 67

148 6.1 Example 6.1.1 Assigning Daily Internet Access Time Slots for LAN Users Step 1. Under Policy Object > Schedule > Settings, set as belo

Strany 68

5 Step 7. Configure theWAN Interface (please refer to your ISP for the settings).  Setting: Select Port2(WAN1)  Interface: Select WAN  Connecti

Strany 69 - (Figure 2-28)

149 Step 2. Under Policy > Outgoing, set as below:(Figure 6-3)  Select the pre-defined schedule for Schedule.  Click OK.(Figure 6-4) Figure 6

Strany 70 - 2.5 DHCP

150 Chapter 7 QoS QoS provides bandwidth management for LAN users accessing the Internet via the CS-2001. When applied with a Policy, it ensures us

Strany 71 - CS-2001

151 Terms in Settings Name  The name of the QoS setting. Port  The WAN port to apply QoS. Downstream Bandwidth  Determines the guaranteed ba

Strany 72 - (Figure 2-30)

152 7.1 Example 7.1.1 Creating a Policy to Limit Upload and Download Bandwidth Step 1. Under Policy Object > QoS > Settings, set as below:(F

Strany 73 - Figure 2-30 DHCP Settings

153 Figure 7-4 The Completed QoS Settings

Strany 74

154 Step 2. Under Policy > Outgoing, set as below:(Figure 7-5)  Select the pre-configured QoS setting.  Click OK.(Figure 7-6) Figure 7-5 Appl

Strany 75 - 2.6 DDNS

155 Figure 7-6 The Completed Policy Setting Note: 1. Under Policy Object > QoS > Settings, the available bandwidth range, such as G. Bandw

Strany 76 - 2.7 Host Table

156 Chapter 8 Authentication Authentication regulates users access to the Internet. CS-2001 offers five authentication modes, namely User, Group, R

Strany 77 - 2.8 SNMP

157 Terms in Authentication Authentication Management  Provides basic settings for managing authentication:  Authentication Port Number: The por

Strany 78 - 2.8.2 SNMP Trap Settings

158 Figure 8-1 Authentication Management Settings

Strany 79 - 2.9 Bulletin Board

6 Step 8. Tick the Synchronize to an NTP Server box to ensure the system is provided with the accurate time. Figure9. Time Settings Step 9. Enab

Strany 80 - DMZ/ DMZ Group

159  The authentication login screen appears after a user attempts to access a web site:(Figure 8-2) Figure 8-2 The Authentication Login Screen 

Strany 81

160 Note: 1. The Allow password modification mechanism is only applicable to authenticated users. 2. The authentication login screen appears afte

Strany 82 - (Figure 2-41, 2-42)

CS-2001 UTM Content Security Gateway User’s Manual 161 LDAP User Name Lists the LDAP User Name from LDAP server. The user name may be grouped for au

Strany 83 - 2.10 Language

162 8.1 User / Group Authentication 8.1.1 Regulating Internet Access with a Policy Step 1. Go to Policy Object > Authentication > Account, a

Strany 84 - Interface

163 Step 2. Under Policy Object > Authentication > Group, set as below:(Figure 8-5)  Click New Entry.  Group Name: Type a name for the gr

Strany 85 - Chapter 3 Interface

164 Step 3. Go to Policy > Outgoing and configure as below:(Figure 8-6)  Authentication: Select the group name that was configured in the previo

Strany 86 - Terms in Interface

165 Step 4. The authentication login screen is displayed in the web browser when a LAN user tries to access the Internet. Internet access will be ava

Strany 87

166 8.2 RADIUS Authentication 8.2.1 Regulating Internet Access with a Policy – An Example using the RADIUS Server from Windows Server 2003 ※ Th

Strany 88

167 Step 3. The Internet Authentication Service.(Figure 8-11) Figure 8-11 Selecting the Internet Authentication Service Step 4. Go to Start >

Strany 89

168 Step 5. Right-click RADIUS Clients and then click New RADIUS Client.(Figure 8-13) Figure 8-13 Adding a RADIUS Client Step 6. Type a name and th

Strany 90

7 Note: 1. Go to Policy > Outgoing and configure as below:  Source Address: Select Inside_Any  Destination Address: Select Outside_Any  S

Strany 91

169 Figure 8-14 Typing a Friendly Name and the Management Address

Strany 92

170 Step 7. Select RADIUS Standard from the Client-Vendor dorp-down list, and then configure the Shared secret and Confirm shared secret as same as t

Strany 93

171 Figure 8-16 Adding a Remote Access Policy

Strany 94 - Terms in Interface Group

172 Step 9. Select Use the wizard to set up a typical policy for a common scenario and then type a name in the Policy name field.(Figure 8-17) Figur

Strany 95 - 3.1 Example

173 Step 10. Select Ethernet.(Figure 8-18) Figure 8-18 Selecting the Access Method

Strany 96

174 Step 11. Select User.(Figure 8-19) Figure 8-19 Selecting User or Group Access Step 12. Select MD5-Challenge from the drop-down list.(Figure 8-

Strany 97 - UI from LAN

175 Step 13. Right-click the newly added policy name and then click Properties.(Figure 8-21) Figure 8-21 Configuring the Properties of a Policy

Strany 98

176 Step 14. Select Grant remote access permission and then remove the existing settings. Next, click Add….(Figure 8-22) Figure 8-22 Configuring th

Strany 99

177 Step 15. Select Service-Type to add.(Figure 8-23) Figure 8-23 Select the Attribute Type Step 16. Select Authenticate Only and Framed from the

Strany 100 - Figure 3-5 Setting Completed

178 Step 17. Click on the Edit Profile…, then click the IP tab and then tick Server settings determine IP address assignment.(Figure 8-25) Figure 8

Strany 101 - Figure 3-7 Setting Completed

8 Step 11. Settings complete. Figure13. Installation Wizard Completed

Strany 102 - Figure 3-9 Setting Completed

179 Step 18. Click on the Edit Profile… button then click on the Authentication tab. Tick Microsoft Encrypted Authentication version 2 (MS-CHAP v2),

Strany 103

180 Step 19. Click on the Edit Profile…, click the Advanced tab and then click Add….(Figure 8-27) Figure 8-27 Configuring the Advanced Settings

Strany 104 - (Figure 3-10)

181 Step 20. Select Framed-Protocol and click Add.(Figure 8-28) Figure 8-28 Adding the Attribute

Strany 105

182 Step 21. For Framed-Protocol, select PPP from the Attribute value drop-down list.(Figure 8-29) Figure 8-29 Attribute Setting 1 Step 22. For S

Strany 106 - (Figure 3-11)

183 Step 23. Go to Start > Settings > Control Panel > Administrative Tools, then select Computer Management.(Figure 8-31) Figure 8-31 Sele

Strany 107 - (Figure 3-12)

184 Figure 8-32 Adding a User

Strany 108 - (Figure 3-13)

185 Step 25. Settings completed. Step 26. Under Policy Object > Authentication > RADIUS, configure each field to be the same as the settings

Strany 109

186 Step 28. Under Policy > Outgoing, set as below:(Figure 8-35)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Strany 110 - Interface settings

187 8.3 POP3 Authentication 8.3.1 Regulating Internet Access with a Policy – An Example of POP3 Step 1. Under Policy Object > Authenticat

Strany 111 - (Figure 3-15)

188 Figure 8-39 Adding POP3 User to an Authenticated Group

Strany 112 - Internet

1 Copyright Copyright© 2012 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

Strany 113

9 S.1 Overview of Functions Category Configurable Settings Description Index System Administration Admin Creates, modifies or removes adminis

Strany 114 - (Figure 3-18)

189 Step 3. Under Policy > Outgoing, set as below:(Figure 8-40)  Authentication: Select the user group.  Click OK.(Figure 8-41) Figure 8-40 U

Strany 115

190 8.4 LDAP Authentication 8.4.1 Regulating Internet Access with a Policy - An Example of Windows Server 2003 Built-in LDAP Server ※ The Con

Strany 116

191 Step 3. In the Preliminary Steps window, click Next.(Figure 8-44) Figure 8-44 Preliminary Steps Step 4. In the Server Role window, select Dom

Strany 117 - (Figure 3-20)

192 Step 5. In the Summary of Selections window, click Next.(Figure 8-46) Figure 8-46 Summary of Selections Step 6. In the Active Directory Insta

Strany 118 - (Figure 3-21)

193 Step 7. In the Operating System Compatibility window, click Next.(Figure 8-48) Figure 8-48 Operating System Compatibility Step 8. In the Domain

Strany 119 - (Figure 3-22)

194 Step 9. In the Create New Domain window, select Domain in a new forest and click Next.(Figure 8-50) Figure 8-50 Creating a New Domain Step 10.

Strany 120 - (Figure 3-23)

195 Step 11. In the NetBIOS Domain Name window, type a Domain NetBIOS name and then click Next.(Figure 8-52) Figure 8-52 The NetBIOS Domain Name St

Strany 121 - (Figure 3-24)

196 Step 13. In the Shared System Volume window, specify the Folder location and then click Next.(Figure 8-54) Figure 8-54 The Shared System Volume

Strany 122 - (Figure 3-25)

197 Step 15. In the Permissions window, select Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems and then click

Strany 123

198 Step 17. In the Summary window, click Next. (Figure 8-58) Figure 8-58 The Summary Step 18. Settings completed.(Figure 8-59) Figure 8-59 Sett

Strany 124 - (Figure 3-26)

10 LAN and DMZ users. Installation Wizard For quick installation and configuration. Language Available languages include Traditional Chinese, Simp

Strany 125 - (Figure 3-27)

199 Step 19. Go to Start > Programs > Administrative Tools > Active Directory Users and Computers.(Figure 8-60) Figure 8-60 Navigating to

Strany 126 - (Figure 3-28)

200 Step 21. In the New Object–User window, apply your information to the fields, and then click Next.(Figure 8-62) Figure 8-62 New Object – User S

Strany 127 - Important:

201 Step 23. User has been successfully created.(Figure 8-64) Figure 8-64 User Successfully Created Step 24. Go to Policy Object > Authenticat

Strany 128 - (Figure 3-31)

202 Step 25. Go to Policy Object > Authentication > Group, then add LDAP User.(Figure 8-66) Figure 8-66 Adding the LDAP User

Strany 129

203 Step 26. Under Policy > Outgoing, set as below:(Figure 8-67)  Select the defined user group for Authentication User.  Click OK.(Figure 8-

Strany 130 - (Figure 3-32)

204 Chapter 9 Application Blocking Application Blocking regulates the control of Instant Messenger Login, File Transfer over IM, Peer-to-Peer Shari

Strany 131

205 Terms in Application Blocking Application Signatures Settings  The application signatures are updated hourly. Alternatively, they can be manua

Strany 132

206 VPN Tunneling  Regulates the online usage of VNN Client, Ultra-Surf, Tor, Hamachi, HotSpot Shield and FreeGate. Remote Controlling  Regulate

Strany 133 - (Figure 3-36)

207 9.1 Example No. Example Scenario Page 9.1.1 IM Regulating the Use of IM Software ─ Messaging and File Transferring 208 9.1.2 P2P

Strany 134

208 9.1.1 Regulating the Use of IM Software ─ Messaging and File Transferring Step 1. Go to Policy Object > Application Blocking > Settings

Strany 135 - Policy Object

11 Web-based mail, online gaming, VPN Tunneling, and remote controlling. Virtual Server Mapped IPs Maps an internal host to an external IP address

Strany 136 - Chapter 4 Address

209 Figure 9-2 Settings Completed

Strany 137 - Terms in Address

210 Step 1. Under Policy > Outgoing, set as below:(Figure 9-3)  Application Blocking: Select the name of the Application Blocking setting.  Cl

Strany 138

211 9.1.2 Regulating the Use of P2P Software - Downloading and Uploading Step 1. Under Policy Object > Application Blocking > Settings, set

Strany 139 - 4.1 Example

212 Figure 9-6 Settings Completed

Strany 140 - Permitting FTP Access

213 Step 2. Under Policy > Outgoing, set as below:(Figure 9-7)  Application Blocking: Select the name of the Application Blocking Setting.  Cl

Strany 141

214 Chapter 10 Virtual Server Virtual server provides services to external users by mapping a real IP address from a WAN port on the CS-2001 to a p

Strany 142 - : Select FTP

215 Terms in Virtual Server WAN IP  The real IP address of the WAN. Map to Virtual IP  The private network address of a server in the LAN.

Strany 143 - Specific IP Address

216 10.1 Example No. Settings Scenario Page 10.1.1 Mapped IPs Using a Server to Provide FTP, Web and Mail Services through the Regulation of a

Strany 144 - Note:

217 10.1.1 Using a Server to Provide FTP, Web and Mail Services through the Regulation of a Policy Step 1. Setup a server in the LAN which provides

Strany 145

218 Step 4. Go to Policy Object > Service > Group, and create a group called Main_Service containing all of the server’s services e.g. DNS, FTP

Strany 146

12 Personal Rule spam filtering is applied in the following order: Greylist Filtering > Personal Rule, Global Rule > Whitelist > Blacklist

Strany 147 - Chapter 5 Service

219 Step 6. Under Policy > Outgoing, set as below: (Figure 10-6)  Source Address: Select the LAN address.  Service: Select Mail_Service.  Cl

Strany 148 - Terms of Service

220 Step 7. The completed settings.(Figure 10-8) Figure 10-8 The Server Providing Multiple Services Note: 1. It is strongly recommended not to s

Strany 149 - 5.1 Example of Pre-defined

221 10.1.2 Using Multiple Virtual Servers to Host a Web Site through the Regulation of a Policy Step 1. Set up multiple web servers in the LAN us

Strany 150

222 Figure 10-9 Setting Virtual IP Figure 10-10 The Completed Virtual IP Settings

Strany 151

223 Step 3. Under Policy > Incoming, set as below:(Figure 10-11)  Destination IP: Select the Virtual IP setting.  Service: Select HTTP(8080) 

Strany 152

224 Step 4. Settings completed.(Figure 10-13) Figure 10-13 Multiple Servers Hosting a Single Website

Strany 153 - POP3, SMTP and DNS)

225 10.1.3 A VoIP Session Between an External and Internal User (VoIP Ports: TCP 1720, TCP 15321-15333 and UDP 15321-15333) Step 1. Configure inter

Strany 154

226 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-16)  Name : Enter the name for the Virtual IP settin

Strany 155

227 Step 5. Under Policy > Incoming, set as below:(Figure 10-18)  Destination IP: Select the vitual server setting.  Service: Select the custo

Strany 156

228 Step 6. Under Policy > Outgoing, set as below:(Figure 10-20)  Source IP: Select the address setting.  Service: Select the service setting.

Strany 157 - Chapter 6 Schedule

13 IDP Reports Settings Provides statistics in the form of graphs and logs. Statistics can be sent to the specific recipient periodically and logs

Strany 158 - Terms in Schedule

229 Step 7. A VoIP session created between an internal and external user.(Figure 10-22) Figure 10-22 The Completed VoIP Setup

Strany 159 - 6.1 Example

230 10.1.4 Using Multiple Virtual Servers to Provide HTTP, POP3, SMTP and DNS Services through the Regulation of a Policy Step 1. Set up multiple s

Strany 160

231 Figure 10-25 A Created Group Service

Strany 161 - Chapter 7 QoS

232 Step 4. Under Policy Object > Virtual Server > Port Mapping, set as below:(Figure 10-26)  Name: Enter the name for the setting.  Server

Strany 162 - Terms in Settings

233 Step 5. Go to Policy > Incoming and then set as below:(Figure 10-28)  Select the virtual server setting for Destination IP.  Select Main_S

Strany 163 - 7.1 Example

234 Step 6. Go to Policy > Outgoing and set as below:(Figure 10-30)  Select the defined rule from the Source Address drop-down list.  Select M

Strany 164

235 Step 7. Settings completed.(Figure 10-32) Figure 10-32 Settings Completed

Strany 165 -  Click OK.(Figure 7-6)

236 Chapter 11 VPN To obtain a private and secure network link, the CS-2001 is capable of establishing VPN connections. When used in combination wi

Strany 166

237 Terms in VPN Diffie-Hellman  A cryptographic protocol that allows two parties that have no perior knowledge of each other to establish a share

Strany 167 - Chapter 8 Authentication

238 AH ( Authentication Header )  The Authentication Header guarantees connectionless integrity and data origin authentication of IP datagrams.

Strany 168 - Terms in Authentication

14 Virus-infected IP Displays a list of IP addresses detected as having an anomaly flow. Advanced Inbound Balancing Settings For distributing inbo

Strany 169

239 Extended Authentication (XAuth)  XAuth provides an additional level of authentication. It uses a Request/ Reply mechanism to provide the extend

Strany 170

240 Terms in One-Step IPSec One-Step IPSec  One-Step IPSec merely takes one step to complete settings  Go to Policy Object > VPN > One-Ste

Strany 171

241 Figure 11-3 The Automatically Created IPSec Policy Figure 11-4 The Corresponding Outgoing Policy Figure 11-5 The Corresponding Incoming Poli

Strany 172 - LDAP User Name

242 Terms in VPN Wizard: VPN Wizard  It simplifies the settings of a VPN connection.  Under Policy Object > VPN > VPN Wizard, set as below

Strany 173

243 Figure 11-9 Applying Available VPN Trunk to the Policy Figure 11-10 Setting Completed Figure 11-11 An Outgoing Policy Completed Figure 11

Strany 174 - (Figure 8-5)

244 Terms in IPSec Autokey Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connect

Strany 175

245 Terms in PPTP Server PPTP Server  The status of PPTP server that shows enable or disable.  The range of IP address, DNS server, WINS serve

Strany 176

246 Terms in PPTP Client Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting

Strany 177 - 8.2 RADIUS Authentication

247 Terms in Trunk Status  The symbol and its description used in the VPN connection status. Symbol Description Disconnected Connecting Nam

Strany 178

248 Terms in Trunk Name  The description for VPN trunk. Note: the name has to be exclusive from any other. Group Member  The groups that are su

Strany 179

15 Historical Top Chart Traffic Grapher WAN Traffic Displays the usage statistics from the WAN interfaces. Chapter 31 Policy-Based Traffic Displa

Strany 180

249 11.1 Example No. Settings Scenario Page 11.1.1 IPSec Autokey Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets

Strany 181

250 11.1.1 Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets via an IPSec VPN Connection Prerequisite Setup (Note: IP addres

Strany 182

251 Step 3. Select Remote Gateway (Static IP or Hostname) for Remote Settings, and enter the management address of B Company.(Figure 11-20) Figure 1

Strany 183

252 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Strany 184 - (Figure 8-18)

253 Step 8. Settings completed.(Figure 11-25) Figure 11-25 IPSec Autokey Settings Completed Step 9. Under Policy Object > VPN > Trunk, set as

Strany 185

254 Figure 11-26 VPN Trunk Settings Figure 11-27 VPN Trunk Created Step 10. Under Policy > Outgoing, set as below:(Figure 11-28)  Select th

Strany 186 - (Figure 8-21)

255 Step 11. Under Policy > Incoming, set as below:(Figure 11-30)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-31) Figure 1

Strany 187 - (Figure 8-22)

256 For B Company, set as below: Step 1. Under System > Configuration > Multiple Subnets, set as below:(Figure 11-32) Figure 11-32 Multiple S

Strany 188

257 Step 5. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. ( The maximum length of Pre-Shared Key String is 10

Strany 189 - (Figure 8-25)

258 Step 9. Settings completed.(Figure 11-40) Figure 11-40 IPSec Autokey Settings Completed Step 10. Under Policy Object > VPN > Trunk, clic

Strany 191 - (Figure 8-27)

259 Figure 11-41 VPN Trunk Settings Figure 11-42 VPN Trunk Created

Strany 192 - (Figure 8-28)

260 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-43)  Select the defined Trunk for VPN Trunk.  Click OK

Strany 193

261 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-45)  Select the defined trunk for VPN Trunk.  Click OK

Strany 194

262 Step 13. Settings completed.(Figure 11-47) Figure 11-47 Deployment of IPSec VPN

Strany 195 - Figure 8-32 Adding a User

263 11.1.2 Creating an IPSec VPN Connection under Windows 2000 by a CS-2001 Device Prerequisite Setup (Note: IP addresses used as examples only) A

Strany 196

264 11-50) Figure 11-50 Remote Settings Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum

Strany 197

265 Figure 11-54 Advanced Settings of IPSec Autokey Step 8. Settings completed.(Figure 11-55) Figure 11-55 IPSec Autokey Settings Completed Ste

Strany 198 - 8.3 POP3 Authentication

266 Figure 11-56 VPN Trunk Settings Figure 11-57 VPN Trunk Created

Strany 199

267 Step 10. Under Policy > Outgoing, set as below:(Figure 11-58)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-59) Figure 1

Strany 200

268 Step 11. Under Policy > Incoming, set as below:(Figure 11-60)  Select the defined trunk for VPN Trunk.  Click OK.(Figure 11-61) Figure 1

Strany 201 - 8.4 LDAP Authentication

17 Chapter 1 Administration This chapter mainly explains the authorization settings for accessing the CS-2001. It covers the subjects of Admin,

Strany 202

269 For B Company, set as below: Step 1. Select Start > Run on the Start menu in Windows 2000.(Figure 11-62) Figure 11-62 Selecting “Run…” o

Strany 203

270 Step 3. In the Console 1 window, click Console on the menu bar, and then click Add/Remove Snap-in.(Figure 11-64) Figure 11-64 Selecting “Add / R

Strany 204

271 Step 5. Select Local Computer, and then click Finish.(Figure 11-66) Figure 11-66 Selecting Local Computer Step 6. Settings completed.(Figure 1

Strany 205

272 Step 7. Right-click the IP Security Policies on Local Machine, and then click Create IP Security Policy.(Figure 11-68) Figure 11-68 Creating an

Strany 206

273 Step 9. Type the Name and Description and then click Next.(Figure 11-70) Figure 11-70 Name and Description Settings Step 10. Disable Activate

Strany 207

274 Step 11. In the IP Security Policy Wizard window, tick Edit properties and click Finish.(Figure 11-72) Figure 11-72 Settings Completed Step 12

Strany 208

275 Figure 11-73 VPN_B Properties

Strany 209

276 Step 13. In the New Rule Properties window, click Add.(Figure 11-74) Figure 11-74 New Rule Properties Step 14. In the IP Filter List window,

Strany 210

277 Figure 11-75 Adding an IP Filter

Strany 211

278 Step 15. In the Filter Properties window, select “A specific IP Address” for Source address, and then apply B Company’s WAN IP address “211.22.2

Strany 212 - Note :

18 Terms in Admin Admin Name  The authentication name to log in the system.  The IT administrator’s name and password are assigned as admin whic

Strany 213 - (Figure 8-66)

279 Figure 11-77 IP Filter Added

Strany 214

280 Step 17. In the New Rule Properties window, click Filter Action tab and then tick Require Security. Next, click Edit.(Figure 11-78) Figure 11-7

Strany 215

281 Figure 11-79 Ticking the “Session Key Perfect Forward Secrecy”

Strany 216

282 Step 19. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-80) Figure 11-80 Selecting a Security Method t

Strany 217

283 Figure 11-81 Modifying Security Method

Strany 218 - 9.1 Example

284 Step 21. Tick Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new k

Strany 219 - File Transferring

285 Figure 11-83 Selecting the Connection Type

Strany 220

286 Step 23. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Strany 221

287 Figure 11-85 Authentication Methods Settings

Strany 222 - and tick Select All

288 Step 25. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Strany 223

2 interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used i

Strany 224

19 1.1 Admin 1.1.1 Adding a Sub-Administrator Step 1. Go to System > Administration > Admin, set as below:(Figure 1-1)  Click the New Sub-

Strany 225 - Chapter 10 Virtual Server

289 Step 26. Click Apply, and then click Close to close the window.(Figure 11-87) Figure 11-87 Authentication Methods Settings

Strany 226 - Terms in Virtual Server

290 Step 27. Settings completed.(Figure 11-88) Figure 11-88 Settings Completed

Strany 227 - 10.1 Example

291 Step 28. In the VPN_B Properties window, disable Use Add Wizard; click Add to create the second IP security rule.(Figure 11-89) Figure 11-89 VP

Strany 228

292 Step 29. In the New Rule Properties window, click Add.(Figure 11-90) Figure 11-90 Clicking “Add…” to Add an IP Filter

Strany 229

293 Step 30. In the IP Filter List window, disable Use Add Wizard. Change the Name into “VPN_B LAN TO WAN”, and then click Add.(Figure 11-91) Figur

Strany 230 - Important:

294 Step 31. In the Filter Properties window, select “A specific IP Subnet” for Source address, and then type “192.168.10.0” as A Company‘s subnet a

Strany 231

295 Step 32. Settings completed.(Figure 11-93) Figure 11-93 IP Filter Added

Strany 232 - (Figure 10-10)

296 Step 33. In the New Rule Properties window, click Filter Action tab; tick Required Security and then click Edit.(Figure 11-94) Figure 11-94 Fil

Strany 233

297 Figure 11-95 Ticking the “Session Key Perfect Forward Secrecy”

Strany 234

298 Step 35. Select the security method (Custom / None / 3DES / MD5), and then click Edit.(Figure 11-96) Figure 11-96 Security Methods Settings St

Strany 235 - (Figure 10-13)

20 1.1.2 Modifying the Password Step 1. Go to System > Administration > Admin and then set as below:(Figure 1-2)  Click the Modify button o

Strany 236 - 15321-15333)

299 Figure 11-97 Modifying Security Method

Strany 237

300 Step 37. Check Data integrity and encryption, and select “MD5” for Integrity algorithm and “3DES” for Encryption algorithm. Tick Generate a new

Strany 238

301 Step 38. In the New Rule Properties window, click Connection Type tab and tick All network connections.(Figure 11-99) Figure 11-99 Selecting th

Strany 239

302 Step 39. In the New Rule Properties window, click Tunnel Setting tab. After that, tick The tunnel endpoint is specified by this IP Address, and

Strany 240 - (Figure 10-22)

303 Step 40. In the New Rule Properties window, click Authentication Methods tab. Next, select the method “Kerberos” and then click Edit on the righ

Strany 241

304 Step 41. Select Use this string to protect the key exchange (preshared key), and then enter the preshared key “123456789” in the field.(Figure 1

Strany 242

305 Step 42. Click Apply, and then click Close to close the window.(Figure 11-103) Figure 11-103 New Authentication Method Created

Strany 243

306 Step 43. Settings completed.(Figure 11-104) Figure 11-104 Settings Completed

Strany 244

307 Step 44. In the VPN_B Properties window, click General tab and then click Advanced.(Figure 11-105) Figure 11-105 General Settings of VPN_B Prop

Strany 245

308 Step 45. Tick Master Key Perfect Forward Secrecy and then click Methods.(Figure 11-106) Figure 11-106 Key Exchange Settings Step 46. Click Mo

Strany 246 - (Figure 10-32)

21 1.2 Permitted IPs 1.2.1 Adding a Permitted IP Step 1. Under System > Administrator > Permitted IPs, click the New Entry button and then s

Strany 247 - Chapter 11 VPN

309 Step 47. Settings completed.(Figure 11-108) Figure 11-108 IPSec VPN Settings Completed Step 48. Right-click VPN_B and move to Assign, and the

Strany 248 - Terms in VPN

310 Step 49. Select Start > Settings > Control Panel on the Start menu, and then click it. (Figure 11-110) Figure 11-110 Selecting “Control

Strany 249

311 Step 51. In the Administrative Tools window, double-click Services.(Figure 11-112) Figure 11-112 The Services Window Step 52. In the Services

Strany 250

312 Step 53. Settings completed.(Figure 11-114) Figure 11-114 Deployment of IPSec VPN Using CS-2001 and Windows 2000

Strany 251 - Terms in One-Step IPSec

313 11.1.3 Creating an IPSec VPN Connection between Two CS-2001 Devices (An Aggressive Mode Example) Prerequisite Setup (Note: IP addresses used as

Strany 252

314 and enter the management address of B Company.(Figure 11-117) Figure 11-117 Remote Settings

Strany 253 - Terms in VPN Wizard:

315 Step 4. Select “Pre-Shared Key” for Authentication Method, and enter a Pre-Shared Key String. (The maximum length of Pre-Shared Key String is 103

Strany 254

316 Step 8. Select “Aggressive mode” for Mode. Enter 11.11.11.11 in the My ID field and then enter @abc123 in the Peer ID field.(Figure 11-122) Figu

Strany 255 - Terms in IPSec Autokey

317 Step 10. Under Policy Object > VPN > Trunk, set as below:(Figure 11-124)  Name: Type a name.  Local Settings: Select “LAN”. Local IP /

Strany 256 - Terms in PPTP Server

318 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-126)  Select the defined trunk from the VPN Trunk drop-

Strany 257 - Terms in PPTP Client

22 1.3 Logout 1.3.1 Logging out the System Step 1. Click Logout to protect the system from any unauthorized modification while being away.(Figure

Strany 258 - Terms in Trunk

319 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-128)  Select the defined trunk from the VPN Trunk drop-d

Strany 259

320 For B Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click New Entry and then set as below:(Figure 11-130) Fig

Strany 260 - 11.1 Example

321 Step 5. Below Encryption and Data Integrity Algorithms, select “3DES” for Encryption Algorithm; select “SHA1” for Authentication Algorithm; selec

Strany 261

322 Step 6. Configure the settings under IPSec Algorithm. Select “3DES” for Encryption Algorithm and “MD5” for Authentication Algorithm.(Figure 11-13

Strany 262 - Figure 11-20 Remote Settings

323 Step 10. Select Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-139)  Name: Type a name.  Local Settings

Strany 263

324 Figure 11-140 VPN Trunk Created

Strany 264

325 Step 11. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-141)  Select the defined trunk for VPN Trunk.  Click O

Strany 265

326 Step 12. Under Policy > Incoming, click New Entry and then set as below:(Figure 11-143)  Select the defined trunk for VPN Trunk.  Click O

Strany 266

327 Step 13. Settings completed.(Figure 11-145) Figure 11-145 Deployment of IPSec VPN Using Aggressive Mode

Strany 267

328 11.1.4 Using Two CS-2001 Devices to Connect Outbound Load Balance with IPSec VPN (Using GRE/IPSec Package Algorithm) Prerequisite Setup (Note:

Strany 268

23 Step 2. Click OK and then the logout message appears.(Figure 1-6) Figure 1-6 The Logout Message

Strany 269

329 For A Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-146) Figure 11-146 IPS

Strany 270

330 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Strany 271

331 Step 9. Setting completed.(Figure 11-154) Figure 11-154 IPSec Autokey Settings Completed Step 10. Select Policy Object > VPN > IPSec Aut

Strany 272

332 Step 14. Under the ISAKMP Algorithm section, select “3DES” for Encryption Algorithm; select “MD5” for Authentication Algorithm; select “DH 1” fo

Strany 273 - (Figure 11-47)

333 Step 18. Settings completed.(Figure 11-163) Figure 11-163 IPSec Autokey Settings Completed Step 19. Under Policy Object > VPN > Trunk, s

Strany 274 - 2000 by a CS-2001 Device

334 Figure 11-164 VPN Trunk Settings Figure 11-165 VPN Trunk Created

Strany 275

335 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-166)  Select the defined trunk for VPN Trunk.  Click O

Strany 276

336 Step 21. Under Policy > Incoming, click New Entry and then set as below:(Figure11-168)  Select the defined trunk for VPN Trunk.  Click OK

Strany 277

337 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey, and then click New Entry.(Figure 11-170) Figure 11-170 IP

Strany 278

338 Figure 11-174 ISAKMP Algorithm Settings

Strany 279

24 1.4 Updating Software Step 1. To run a software update, go to System > Administration > Software Update and follow the steps below:  Cli

Strany 280

339 Step 6. Select Use both algorithms below the IPSec Algorithm, or tick Use authentication algorithm only. If ticked Use both algorithms, please se

Strany 281

340 Step 10. Under Policy Object > VPN > IPSec Autokey, click New Entry again. Step 11. Type VPN_02 in the Name field and then select Port3

Strany 282

341 Algorithm.(Figure 11-184) Figure 11-184 IPSec Algorithm Settings Step 16. Select “Group 1” for PFS Key Group. Enter “3600” in the ISAKMP SA Li

Strany 283

342 Step 19. Under Policy Object > VPN > Trunk, set as below: (Figure 11-188)  Name: Type a name.  Local Settings: Select “LAN”. Local IP

Strany 284

343 Step 20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-190)  Select the defined trunk for VPN Trunk.  Click O

Strany 285 - (Figure 11-73)

344 Step 21. Select Policy > Incoming, click New Entry and then set as below:(Figure 11-192)  Select the defined trunk for VPN Trunk.  Click

Strany 286

345 Step 22. Settings completed.(Figure 11-194) Figure 11-194 Deployment of IPSec VPN Using GRE/IPSec

Strany 287 - (Figure 11-75)

346 11.1.5 Establishing an IPSec VPN Connection by Three CS-2001 Devices Prerequisite Setup (Note: IP addresses used as examples only) A Company: C

Strany 288

CS-2001 UTM Content Security Gateway User’s Manual 347 For A Company, set as below: Step1. Go to Policy Object > VPN > IPSec Autokey and the

Strany 289 - (Figure 11-77)

348 Figure 11-199 Configuring the IPSec Algorithm Step6. Under the IPSec Algorithm section, select 3DES for Encryption Algorithm and then select

Strany 290 - Figure 11-77 IP Filter Added

25 Chapter 2 Configuration Configuration includes the following system settings: System Settings, Date / Time, Multiple Subnets, Route Table, DHCP,

Strany 291 - (Figure 11-79)

349 Step8. Policy Created.(Figure 11-202) Figure 11-202 Policy Created Step9. Go to Policy Object > VPN > Trunk, click New Entry and then s

Strany 292

350 Figure 11-204 First Trunk Completed Step10. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button again.(Figure

Strany 293

351 1 for Key Group.(Figure 11-209) Figure 11-209 Configuring ISAKMP Algorithm

Strany 294

352 Step15. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and MD5 for Authentication Algorithm

Strany 295 - (Figure 11-83)

353 Step18. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-213)  Type the name in the Name field.  Lo

Strany 296

354 Step19. Go to Policy Object > VPN > Trunk Group, click New Entry and then set as below:(Figure 11-215)  Type the name in the Name field.

Strany 297 - (Figure 11-85)

355 Step20. Under Policy > Outgoing, click New Entry and then set as below:(Figure 11-217)  Select the defined Trunk from the VPN Trunk drop-do

Strany 298

356 Step21. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-219)  Select the defined Trunk from the VPN Trunk drop-do

Strany 299

357 For B Company, set as below: Step 1. Go to Policy Object > VPN > IPSec Autokey and then click the New Entry button.(Figure 11-221) Figure

Strany 300 - (Figure 11-87)

358 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Strany 301

26 Terms in Setting System Settings  Allows the IT administrator to import / export system settings, perform a factory reset and format the built-

Strany 302 - (Figure 11-89)

359 Step 9. Under Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-229)  Type the name in the Name fi

Strany 303 - (Figure 11-90)

360 Step 10. Go to Policy Outgoing, click the New Entry button and then set as below:(Figure 11-231)  Select the defined Trunk from the VPN Trunk

Strany 304 - (Figure 11-91)

361 Step 11. Go to Policy > Incoming, click the New Entry button and then set as below:(Figure 11-233)  Select the defined Trunk from the VPN T

Strany 305 - (Figure 11-92)

362 For C Company, set as below: Step 1. Under Policy Object > VPN > IPSec Autokey, click the New Entry button and then set as below:(Figure 1

Strany 306 - Figure 11-93 IP Filter Added

363 Step 6. Under the IPSec Algorithm section, select Use both algorithms. Select 3DES for Encryption Algorithm and then select MD5 for Authenticatio

Strany 307 - (Figure 11-95)

364 Step 9. Go to Policy Object > VPN > Trunk, click the New Entry button and then set as below:(Figure 11-243)  Type the name in the Name fi

Strany 308

365 Step 10. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-245)  Select the defined Trunk from the VPN Trunk drop-d

Strany 309

366 Step 11. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-247)  Select the defined Trunk from the VPN Trunk drop-d

Strany 310

367 Step 12. Setting completed.(Figure 11-249) Figure 11-249 The Deployment of IPSec VPN

Strany 311

368 11.1.6 Using Two CS-2001 Devices to Establish PPTP VPN Connection (Outbound Load Balancing) Prerequisite Setup (Note: IP address used as exampl

Strany 312 - (Figure 11-99)

27 device can block their IP address for the specified amount of time. This helps to prevent any unauthorized tampering of the device.

Strany 313 - (Figure 11-100)

369 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-250)  Click the Modify button.  Tick Enable PPTP.  T

Strany 314 - (Figure 11-101)

370 3. Using RADIUS Server (refer to chapter 8 for RADIUS authentication) to establish PPTP VPN connection, go to Policy Object > VPN > PPTP S

Strany 315 - (Figure 11-102)

371 Figure 11-253 Configuring the Second PPTP Server

Strany 316 - (Figure 11-103)

372 Figure 11-254 Second PPTP Server Completed

Strany 317 - (Figure 11-104)

373 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-255)  Type the name in the Name field.  Loc

Strany 318 - Advanced.(Figure 11-105)

374 Note: 1. When Remote IP / Netmask is selected for Remote Settings, you may select only one tunnel to establish the PPTP VPN connection. Ste

Strany 319

375 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-259)  Select the defined VPN from the VPN Trunk drop-down

Strany 320

376 For B Company, set as below: Step 1. Go to Policy Object > VPN > PPTP Client and then set as below:  Click New Entry.(Figure 11-261) 

Strany 321

377 Figure 11-263 Second PPTP Client Setting Completed Figure 11-264 Second PPTP Client Setting Completed Note: 1. When CS-2001 PPTP Client es

Strany 322

378 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-265)  Enter the name in the Name field.  Lo

Strany 323 - (Figure 11-114)

28 Important: 1. If the HTTP or HTTPS port number is modified then the number has to to be appended to the management IP address, such as http://6

Strany 324

379 Figure 11-266 Settings Completed Note: 1. When Remote IP / Netmask is selected for Remote Settings, the number of the PPTP_Client tunnel sho

Strany 325 - (Figure 11-117)

380 Step 3. Go to Policy > Outgoing and then set as below:(Figure 11-267)  Select the defined Trunk from the VPN Trunk drop-down list.  Click

Strany 326

381 Step 4. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-269)  Select the defined Trunk from the VPN Trunk drop-dow

Strany 327

382 Step 5. Settings completed.(Figure 11-271) Figure 11-271 The Deployment of PPTP VPN

Strany 328

383 11.1.7 Using Two CS-2001 Devices to Establish PPTP VPN Connection Prerequisite Setup (Note: IP addresses used as examples only) A Company: Con

Strany 329

384 Step 1. Go to Policy Object >VPN > PPTP Server and then set as below:(Figure 11-272)  Click Modify.  Click Enable PPTP.  Click Encryp

Strany 330

385 Step 2. Go to Policy Object > VPN > PPTP Server, click New Entry and then set as below:(Figure 11-273)  Type PPTP_Connection in the Usern

Strany 331

386 For B Company, set as below; Step 1. Go to Policy Object > VPN > PPTP Client, click New Entry and then set as below:(Figure 11-275)  Typ

Strany 332 - (Figure 11-134)

387 Step 2. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-277)  Enter the name in the Name field.  Lo

Strany 333

388 Step 3. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-279)  Select the defined Trunk from the VPN Trunk drop-dow

Strany 334 - (Figure 11-140)

3 Before contacting customer service, please take a moment to gather the following information: ♦ UTM Content Security Gateway serial number and

Strany 335

29  Specifies the subnets IP range. Interface  Denotes in which network, i.e. LAN or DMZ, the subnet resides. VLAN ID  Permits the interface

Strany 336

389 Step 4. Setting Completed.(Figure 11-281) Figure 11-281 Deployment of PPTP VPN Connection

Strany 337

390 11.1.8 Establishing PPTP VPN Connection by One CS-2001 Device and One PC Running Windows 2000 Prerequisite Setup (Note: IP addresses used as ex

Strany 338 - (Figure 11-145)

391 Step 1. Go to Policy Object > VPN > PPTP Server and then set as below:(Figure 11-282)  Click Modify.  Click Enable PPTP.  Click Encry

Strany 339

392 3. If the external user wants to connect to IPSec VPN subnet via PPTP VPN connection, the Client IP Allocation/ IP Range must be on the LAN1 (19

Strany 340

393 Step 3. Go to Policy Object > VPN > Trunk, click New Entry and then set as below:(Figure 11-285)  Type the name in the Name field.  Loc

Strany 341

394 Note: 1. If the external users want to connect to the IPSec VPN subnet, the Local IP/ Netmask must be configured as the IPSec VPN subnet.

Strany 342

395 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 11-287)  Select the defined trunk from the VPN Trunk drop-dow

Strany 343

396 Step 5. Go to Policy > Incoming, click New Entry and then set as below:(Figure 11-289)  Select the defined Trunk from the VPN Trunk drop-dow

Strany 344

397 For B Company, set as below: Step 1. Right-click on My Network Places and then click Properties.(Figure 11-291) Figure 11-291 Selecting “Proper

Strany 345

398 Figure 11-292 Double-Clicking on “Make New Connection”

Strany 346

30 Note: 1. Dynamic Routing Protocols can be categoried into the following two categories:  Distance-Vector Routing Protocol: Uses the Bellman-F

Strany 347

399 Step 3. In the Location Information window, specify the country / region, area code and phone system accordingly, and then click OK.(Figure 11-29

Strany 348

400 Figure 11-294 Phone and Modem Options

Strany 349

401 Step 5. In the Network Connection Wizard window, click Next.(Figure 11-295) Figure 11-295 Network Connection Wizard Step 6. In the Network Conn

Strany 350

402 Step 7. In the Destination Address window, type the host name or IP address in the blank field and then click Next.(Figure 11-297) Figure 11-297

Strany 351

403 Step 9. In the Completing the New Connection Wizard window, type a Connection Name and then click Finish.(Figure 11-299) Figure 11-299 New Conne

Strany 352

404 Step 10. In the Connect Virtual Private Connection window, set as below:(Figure 11-300)  User Name: Type “PPTP_Connection”.  Password: Enter

Strany 353

405 Figure 11-302 PPTP VPN Connection Successfully Connected

Strany 354

406 Step 11. Settings completed.(Figure 11-303) Figure 11-303 Deployment of PPTP VPN

Strany 355

407 Mail Security

Strany 356 - (Figure 11-194)

408 Chapter 12 Configuration Mail configuration refers to the processing basis of mail services. In this chapter, it will be covering the functiona

Strany 357 - CS-2001 Devices

31 private purposes.  In 2007 30-bit AS numbers were introduced. These numbers are written either as simple integers, or in the form x.y, where x a

Strany 358

409 Terms in Settings Log Storage Time  Quarantined spam / virus emails can be designate a storage time and deleted when due.  You may also deci

Strany 359

410  Tag spam email’s subject with: --Spam--.  Tag virus-infected emails with: --Virus--.  Type the subject and the content of the mail notice.

Strany 360

411 Figure 12-1 Configuring the Settings of Mail Security

Strany 361

412  A notice with customized subject and message.(Figure 12-2) Figure 12-2 A Notice Shows Customized Subject and Message  An unscanned email is

Strany 362 - (Figure 11-209)

413  The spam mail’s subject tagged with warning message.(Figure 12-4) Figure 12-4 The Spam Mail’s Subject Tagged with “Spam”  The virus mail’s

Strany 363

414 Terms in Account Manager Account Learning Settings  Disabled: Accounts added manually.  Accounts added automatically: the email account will

Strany 364

415 12.1 Mail Domains 12.1.1 Using Mail Domains to Filter Emails Step 1. Apply to a local ISP for several domain names, “planet.com.tw”, “suppor

Strany 365 - Company’s subnet

416 Step 2. Under Mail Management > Configuration > Mail Domains, set as below:  Click the New Entry button to create the first entry.  Typ

Strany 366

417 Figure 12-8 Modifying the First Entry Figure 12-9 Typing the Domain Alias Figure 12-10 Settings Completed Figure 12-11 Creating the Second

Strany 367

418 Figure 12-12 The Second Entry Completed Figure 12-13 Modifying the Second Entry Figure 12-14 Typing the Domain Alias Figure 12-15 Se

Strany 368

32 Terms in DHCP Static IP Assignment  DHCP can allocate IP addresses based upon the MAC address of PCs in the LAN or DMZ. Terms in Dynamic DDN

Strany 369

419 Step 3. Emails sent to the internal account “alex”, depending on the domain name, will be handled as follows:  Emails that go to alex@planet.

Strany 370

420 12.2 Account Manager 12.2.1 Using CS-2001 to Filter Mail Accounts Step1. Go to Mail Security > Configuration > Account Manager and then

Strany 371

421 Step3. Go to Mail Security > Configuration > Account Manager, import the accounts into the system:  Click the Browse... button. In the C

Strany 372

422 Step4. Go to Mail Security > Configuration > Account Manager, add or remove the accounts.  Click the Add button.  Enter the account

Strany 373

423 Figure 12-20 Removing the Account Note: 1. Once Accounts added automatically is selected, the CS-2001 will varify the existence of the accou

Strany 374

424 Step5. Users may be given permission to access Personal Email Viewer under Mail Security > Configuration > Account Manager.  To permit

Strany 375

425 12.2.2 Accessing Personal Email Viewer Step 1. Type the management address together with the HTTP port (8080) or HTTPS port (1443) in the addre

Strany 376

426 Step 2. Users will be requested to configure user preferences during their first login.  Click Continue.(Figure 12-24)  Configure the User Pr

Strany 377

427 Figure 12-25 The User Preferences Settings Figure 12-26 User Preferences Settings Completed

Strany 378 - (Figure 11-249)

428 Step 3. Below shows the CS-2001’s user-friendly, web-based mailbox.(Figure 12-27) Figure 12-27 The Web Mail User Interface

Strany 379

33 Terms in SNMP SNMPv3  SNMP is a protocol specially designed to monitor network-attached devices such as servers, switches, routers, workstati

Strany 380

429 12.2.3 Using Whitelist and Blacklist to Filter Emails Supposed the domain name “planet.com.tw” is registered to your organization, and you ar

Strany 381

430 Figure 12-29 Creating the Second Entry of Whitelist Figure 12-30 Settings Completed

Strany 382

431 Step 2. Click Preference in the Personal Email Viewer main screen and then a pop-up window appears. Click the Blacklist button under the User Pre

Strany 383

432 Figure 12-32 Creating the Second Entry of Blacklist Figure 12-33 Blacklist Created

Strany 384

433 Step 3. When [email protected] receives an email from a yahoo account:  If the mail is from [email protected], then [email protected] will

Strany 385

434 12.3 Mail Relay 12.3.1 Using CS-2001 as a Gateway (Set the Mail Server in DMZ under Transparent Mode) Prerequisite Setup Configure Port1

Strany 386

435 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-35)  Select Sender’s IP Address.  Type the IP

Strany 387

436 12.3.2 Deploying the CS-2001 Device between the Gateway and Mail Server (Mail Server is in DMZ under Transparent Mode) Prerequisite Setup LAN

Strany 388

437 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:  Click New Entry.(Figure 12-37)  Select Sender’s IP

Strany 389 - (Figure 11-266)

438 12.3.3 Using CS-2001 as Gateway to Enable Branch’s Employees to Send Emails via Headquarters’ Mail Server (Set the Mail Server under DMZ Transpa

Strany 390

34 Auth Password  The NMS uses this password to access information from the CS-2001. Privacy Protocol  Supports the cipher Data Encryption Stan

Strany 391

439 Step 2. Go to Mail Security > Configuration > Mail Relay and then set as below:(Figure 12-40)  Select Sender’s IP Address.  Enter the I

Strany 392

440 12.4 Mail Notice 12.4.1 Retrieving Spam or Virus Emails from the Mail Notice (An Outlook Exparess Example) Step 1. All the accounts are listed

Strany 393 - (Figure 11-271)

441 Step 2. Go to Mail Security > Configuration > Mail Notice and then set as below:  Tick Notice for, then select “Both Spam and Viruses” fr

Strany 394 - Connection

442 Note: 1. Accounts in the Selected Accounts column will receive a mail notice based upon schedules when emails sent from or to them are classif

Strany 395

443 12.5 Queued Mail 12.5.1 Monitoring Email Delivery Status Step 1. Go to Mail Security > Configuration > Settings and then set as below: 

Strany 396

444 Step 2. Go to Mail Security > Configuration > Queued Mail to obtain the delivery status.  A symbol, under the Reason column, indicates

Strany 397 - PPTP Server

445 12.6 Mail Signatures Step 1. Go to Mail Security > Configuration > Mail Signatures and then set as below:  Tick Add signatures to all o

Strany 398

446 Step 2. Any email sent from the CS-2001 will now have the signature message appended to the body of the email for the recipient to view.(Figure 1

Strany 399

447 Chapter 13 Anti-Spam Users will no longer be disturbed by large influxes of spam. The Anti-Spam mechanism prevents the users from wasting their

Strany 400 - (Figure 11-281)

448 Terms in Settings Anti-Spam Filter Settings  Incoming and outgoing emails can be inspected.  Emails exceeding the threshold score can have

Strany 401

35 2.1 Settings 2.1.1 Exporting System Settings Step 1. Under System > Configuration > Settings, click next to Export System Settings und

Strany 402

449 Spam Actions (Sending)  The action of outbound spam mail can be set to delete, deliver as normal or store the quarantine. Spam Actions (Receiv

Strany 403

450  The figure below shows that an email’s subject is tagged with the score (optional).(Figure 13-3) Figure 13-3 An Email’s Subject Tagged with t

Strany 404

451 Comment  The description of the rule’s name. Classification  When Spam is selected, emails that meet the inspection criteria will be classif

Strany 405

452 “joe” typed as a pattern, it means emails from whosever email account contained the word “joe” will be considered as spam or ham.

Strany 406

453 Terms in Whitelist Email Address/ Domain Name  Used to designate specific email addresses as ham. Direction  From: Inspects emails sent fro

Strany 407

454 Training Schedule  CS-2001 can be scheduled a daily time for spam or ham training.  CS-2001 can be set to immediately train. An Overview on

Strany 408

455 The Three Key Elements of Email Transmission An email transmission is achieved by using an MUA, MTA and MDA.  MUA(Mail User Agent):Whether

Strany 409

456 How an Email is Processed Composing and sending an email:  Email delivery from an MUA to an MTA: Run a MUA client (email program) and follow t

Strany 410 - (Figure 11-294)

457  Email retrieval: signifies MUA is using POP (Post Office Protocol) to communicate with the MTA by which users may have the access to emails. C

Strany 411

458 13.1 Example No. Scenario Page 13.1.1 Detecting Whether Emails are Spam 459 13.1.2 Using CS-2001 in Accordance with Whitelist and Bla

Strany 412

36 2.1.2 Importing System Settings Step 1. Under System > Configuration > Settings, click Browse… next to Import System Settings under the Sy

Strany 413

459 13.1.1 Detecting Whether Emails are Spam Prerequisite Setup Configure Port1 as LAN1(192.168.1.1, NAT/ Routing mode) and connect it to the LAN w

Strany 414 - (Figure 11-299)

460 Step 3. Under Policy Object > Address > DMZ, set as below:(Figure 13-4) Figure 13-4 Creating an Address Setting Corresponding to the Mail

Strany 415

461 Step 5. Go to Policy > Outgoing and then set as below: (Figure 13-6)  Select the defined group (Mail_Service_02) from the Service drop-down

Strany 416

462 Figure 13-6 Configuring an Outgoing Policy with Group Service and POP3 Anti-Spam

Strany 417 - (Figure 11-303)

463 Figure 13-7 Policy Created

Strany 418 - Mail Security

464 Step 6. Under Policy > WAN to DMZ, set as below:(Figure 13-8)  Select the defined rule from the Destination Address drop-down list.  Selec

Strany 419 - Chapter 12 Configuration

465 Figure 13-9 Policy Created

Strany 420

466 Step 7. Go to Policy > DMZ to WAN and then set as below:(Figure 13-10)  Select the defined group from the Source Address drop-down list. 

Strany 421 -  Click OK.(Figure 12-1)

467 Figure 13-10 Creating a DMZ to WAN Policy with Group Service and POP3 Anti-Spam

Strany 422

468 Figure 13-11 Policy Created

Strany 423

37 2.1.3 Resetting the System to Factory Default Settings and Formatting the Hard Drive Step 1. Under System > Configuration > Settings, tick

Strany 424

469 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-12) Figure 13-12 Anti-Spam Filter Settings and Action Settings

Strany 425 - Terms in Queued Mail

470 Note: 1. By default, Anti-Spam is enabled. Therefore, the IT administrator merely has to configure the settings under Mail Security > Confi

Strany 426 - 12.1 Mail Domains

471 13.1.2 Using CS-2001 in Accordance with Whitelist and Blacklist to Filter Spam (Mail Server Is Deployed in DMZ under Transparent Mode) Prerequis

Strany 427

472 Step 3. Go to Policy Object > Service > Group and then set as below:(Figure 13-15) Figure 13-15 Creating Service Groups to Include POP3, S

Strany 428

473 Step 4. Go to Policy > WAN to DMZ and then set as below:(Figure 13-16)  Select the defined rule from the Destination Address drop-down list.

Strany 429

474 Figure 13-17 Policy Created

Strany 430

475 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-18)  Select the defined rule for Source Address.  Select the defined service (M

Strany 431 - 12.2 Account Manager

476 Figure 13-18 Creating a DMZ to WAN Policy

Strany 432

477 Figure 13-19 Policy Created

Strany 433

478 Step 6. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 13-20) Figure 13-20 Mail Domain Settings Step 7.

Strany 434

38 2.1.4 Enabling Email Alert Notification Step 1. Go to System > Configuration > Settings. Under the Name Settings section, configure the fo

Strany 435

479 Step 8. Go to Mail Security > Anti-Spam > Whitelist and then set as below:  Click New Entry.  Type [email protected] in the Mail

Strany 436 - (Figure 12-23)

480 Figure 13-25 Creating the Fourth Entry on Whitelist Figure 13-26 Whitelist Setting Completed Note: 1. Whitelist can be exported as a fil

Strany 437

481 Step 9. Go to Mail Security > Anti-Spam > Blacklist and then set as below:  Click New Entry.  Type *yahoo* in the Mail Account fiel

Strany 438

482 3. Whitelist overrides Blacklist, thus, email inspection will firstly act on Whitelist and then Blacklist. Step 10. Provided that joe@supportp

Strany 439 - (Figure 12-27)

483 13.1.3 Deploying CS-2001 in between Gateway and Mail Server and Filtering Spam with Global Rule (Mail Server Is Deployed in DMZ under Transparen

Strany 440

484 Figure 13-31 Creating Service Groups

Strany 441

485 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 13-32)  Select the defined DMZ for Destination Address.  Select the defined servic

Strany 442

486 Figure 13-33 Policy Completed

Strany 443

487 Step 5. Under Policy > DMZ To WAN, set as below:(Figure 13-34)  Select the defined DMZ for Source Address.  Select the defined service (Ma

Strany 444

488 Figure 13-34 Creating a DMZ to WAN Policy with Service and SMTP Anti-Spam

Strany 445 - 12.3 Mail Relay

4 Table of Contents Quick Installation Guide ... 8 Hardware Installation ...

Strany 446 - (Figure 12-35)

39 2.1.5 Rebooting the CS-2001 Step 1. To reboot the CS-2001, go to System > Configuration > Settings. Under the Device Reboot section click

Strany 447 - (Figure 12-36)

489 Figure 13-35 Policy Created

Strany 448

490 Step 6. Under Mail Security > Configuration > Mail Domains, set as below:(Figure 13-36) Figure 13-36 Mail Domain Settings Step 7. Under M

Strany 449 - (Figure 12-39)

491 Step 8. Under Mail Security > Anti-Spam > Settings, set as below:(Figure 13-38) Figure 13-38 Anti-Spam Settings Note: 1. An email th

Strany 450 - (Figure 12-40)

492 Step 9. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type HamMail in the Rule Name field

Strany 451 - 12.4 Mail Notice

493 Note: 1. The Action setting of a Global Rule will be unavailable if Classification selected as Ham (Non-Spam). It is because normal emails do

Strany 452 - (Figure 12-42)

494 Step 10. Go to Mail Security > Anti-Spam > Global Rule and then set as below:  Click New Entry.  Type SpamMail in the Rule Name fi

Strany 453

495 Email header can be used as a reference when configuring Condition and Item of Global Rule. Figure 13-43 shows the header of an email. To view he

Strany 454 - 12.5 Queued Mail

496 Step 11. Provided that [email protected] and [email protected] both receive an email from a Yahoo account:  If the sender’s ac

Strany 455 - (Figure 12-44 Figure 12-45)

497 13.1.4 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering (An Outlook Express Example) To train spam filtering:

Strany 456 - 12.6 Mail Signatures

498 Figure 13-45 Naming the Folder as Spam Mail

Strany 457

40 2.2 Date / Time 2.2.1 CS-2001 Time Settings Step 1. Go to System > Configuration > Date/Time and configure the following settings:(Figu

Strany 458 - Chapter 13 Anti-Spam

499 Step 2. Click Inbox in Outlook Express, and then move the spam to the Spam Mail folder:  In Inbox, select all the spam, right-click them, and t

Strany 459

500 Figure 13-47 Selecting the “Spam Mail” Folder

Strany 460 - (Figure 13-2)

501 Step 3. Compact the Spam Mail folder to make it easier importing spam messages onto CS-2001 for spam filtering training:  Click the Spam Mail f

Strany 461 - Terms in Global Rule

502 Figure 13-49 Compacting the Spam Mail Folder

Strany 462

503 Step 4. Copy the pathname of the Spam Mail folder to CS-2001 device for training use:  Right-click Spam Mail folder, and then click Propertie

Strany 463

504 Figure 13-51 Copying the Pathname of the Spam Mail Folder

Strany 464 - Terms in Training

505 Step 5. Go to Mail Security > Anti-Spam > Training and then configure the settings under the Spam Training Using Importing section:  Pa

Strany 465

506 Step 6. Delete all spam emails in the Spam Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer: 

Strany 466

507 Figure 13-54 All Spam Emails Have Been Deleted To train ham filtering: Step 7. In Outlook Express, create a new folder called “Ham Mail”: 

Strany 467 - How an Email is Processed

508 Figure 13-55 Creating a New Folder Figure 13-56 Naming the Folder as Ham Mail

Strany 468

41 2.3 Multiple Subnet 2.3.1 Using NAT / Routing Mode For LAN Users to Access the Internet Prerequisite Setup (Note: IP addresses used as examples

Strany 469 - 13.1 Example

509 Step 8. Click Inbox in Outlook Express, and then move normal emails to the Ham Mail folder:  In Inbox, select all the hams, right-click them, a

Strany 470

510 Figure 13-58 Selecting the Ham Mail Folder

Strany 471

511 Step 9. Compact the Ham Mail folder for the easy of importing normal email messages onto CS-2001 for ham filtering training:  Click the Ham Mai

Strany 472 -  Click OK.(Figure 13-7)

512 Figure 13-60 Compacting the Ham Mail Folder

Strany 473

513 Step 10. Copy the pathname of the Ham Mail folder to CS-2001 device for training use:  Right-click the Ham Mail folder, and then click Prope

Strany 474 - Figure 13-7 Policy Created

514 Figure 13-62 Copying the Pathname of the Ham Mail Folder

Strany 475 - (Figure 13-9)

515 Step 11. Go to Mail Security> Anti-Spam > Training, configure the settings under the Ham Training Using Importing section.  Paste the pa

Strany 476 - Figure 13-9 Policy Created

516 Step 12. Delete all emails in the Ham Mail folder; since they have been compressed and uploaded to CS-2001, they are of no use any longer:  In

Strany 477 - (Figure 13-11)

517 Figure 13-65 All Normal Emails Have Been Deleted

Strany 478

518 13.1.5 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering Step 1. On you mail server, create an email account, su

Strany 479 - Figure 13-11 Policy Created

42 Figure 2-8 Configuring Multiple Subnet Figure 2-9 Settings Completed Important: 1. When the PCs’ subnets or IP addresses are not on the same

Strany 480 - (Figure 13-12)

519 Step 4. In Mail Security > Anti-Spam > Training, configure the Ham Training Using Forwarded Mail setting according to the relevant informat

Strany 481

520 To train spam filtering: Step 5. In Outlook Express, forward all spam emails in the Inbox as attachment to [email protected]:  In In

Strany 482 - Transparent Mode)

521 Figure 13-68 Forwarding the Selected Spam Emails as Attachment

Strany 483

522 To train ham filtering: Step 6. In Outlook Express, forward all normal emails in the Inbox as attachment to [email protected]:  In Inbo

Strany 484 - (Figure 13-17)

523 Figure 13-70 Forwarding the Selected Normal Emails as Attachment

Strany 485 - Figure 13-17 Policy Created

524 Step 7. CS-2001 will retrieve emails in [email protected] and [email protected] periodically and use them for training on schedule

Strany 487

526 Chapter 14 Anti-Virus Due to its inbound and outbound email anti-virus scanning capabilities, CS-2001 guards against the extensive damage that

Strany 488 - Figure 13-19 Policy Created

527 Terms in Setting Anti-Virus Settings  Scans inbound and outbound emails for viruses.  Virus definitions can be updated periodically or can b

Strany 489

528 Figure 14-1 Anti-Virus Settings Note: 1. Three virus-scanning modes available for users are ClamAV, Sophos and ClamAV+Sophos.

Strany 490

43 Step 2. Under Network > Interface, set as below:(Figure 2-10)  Click on Port 2’s Modify button.  For Interface Type select WAN, and enter a

Strany 491

529 14.1 Example No. Scenario Page 14.1.1 Filtering Out the Virus Emails on Mail Server the Virus Emails on Mail Server 530 14.1.2 Using

Strany 492

530 14.1.1 Filtering Out the Virus Emails on Mail Server Prerequisite Setup Configure Port1 as LAN1 (192.168.1.1, NAT/ Transparent Routing mode)

Strany 493 - Blacklist

531 Step 4. Go to Policy Object > Service > Group, set as below:(Figure 14-3) Figure 14-3 Creating Service Groups to Include the POP3, SMTP a

Strany 494 - (Figure 13-31)

532 Step 5. Under Policy > Outgoing, set as below:(Figure 14-4)  Select the defined service (Mail_Service_02) for Service.  Select POP3 for An

Strany 495

533 Figure 14-4 Creating an Outgoing Policy with Service and POP3 Anti-Virus Figure 14-5 Policy Created

Strany 496 - (Figure 13-33)

534 Step 6. Under Policy > WAN To DMZ, set as below:(Figure 14-6)  Select the defined DMZ for Destination Address.  Select the defined service

Strany 497

535 Figure 14-7 Policy Created

Strany 498 -  Click OK.(Figure 13-35)

536 Step 7. Under Policy > DMZ To WAN, set as below:(Figure 14-8)  Select the defined DMZ for Source Address.  Select the defined service (Mai

Strany 499

537 Figure 14-8 Creating a DMZ to WAN Policy with Service and POP3 Anti-Virus

Strany 500 - Figure 13-35 Policy Created

538 Figure 14-9 Policy Created

Strany 501

CS-2001 UTM Content Security Gateway User’s Manual 44 Step 3. Under Policy Object > Address > LAN, set as below:(Figure 2-11) Figure 2-11 A

Strany 502

539 Step 8. Go to Mail Security > Anti-Virus > Settings and then set as below:(Figure 14-10) Figure 14-10 Anti-Virus Settings

Strany 503

540 Note: 1. By default, Anti-Virus is enabled. Therefore, the IT administrator merely has to configure the Mail Domains to scan all the incoming

Strany 504

541 14.1.2 Using CS-2001 as a Gateway to Filter Out Virus Emails (Mail Server Is Deployed in LAN under NAT Mode) Prerequisite Setup Configure Port

Strany 505

542 Figure 14-13 Creating Service Groups to Include POP3, SMTP and DNS Service Step 4. Under Policy Object > Virtual Server > Port Mapping, s

Strany 506

543 Step 5. Under Policy > Incoming, set as below:(Figure 14-15)  Select the defined virtual server for Destination Address.  Select the defin

Strany 507

544 Figure 14-16 Policy Completed

Strany 508 - (Figure 13-45)

545 Step 6. Under Policy > Outgoing, set as below:(Figure 14-17)  Select the defined LAN address for Source Address.  Select the defined servi

Strany 509

546 Figure 14-17 Creating an Outgoing Policy with Service and SMTP Anti-Virus

Strany 510 - (Figure 13-47)

547 Figure 14-18 Settings Completed

Strany 511

548 Step 7. Go to Mail Security > Configuration > Mail Domains and then set as below:(Figure 14-19) Figure 14-19 Mail Domain Settings Step 8.

Strany 512 - (Figure 13-49)

45 Step 4. Go to Policy > Outgoing and configure the following settings:  Click on New Entry.  Source Address: Select the name of the LAN addr

Strany 513

549 Step 9. When “Joe”, an internal user at supportplanet.com.tw, receives emails from external mail accounts at yahoo.com.tw:  The virus mail from

Strany 514

550 Chapter 15 Mail Reports CS-2001 provides you with email reports in the form of statistics and logs, presenting you with a thorough insight into

Strany 515

551 Terms in Setting Periodic Report Scheduling Settings  It can generate and send out the periodic report to the designated recipient(s) on sched

Strany 516

552 Figure 15-2 Periodical Report Sent as an Attachment

Strany 517 - (Figure 13-54)

553 Terms in Logs Search  Available searching criteria are: date, sender, sender IP, recipient, attachment, subject, attribute and process. 

Strany 518 - (Figure 13-56)

554 Figure 15-3 Searching for a Specific Log Note: 1. How to open an “.mbx” file (exported from quarantined or archived emails) on your local c

Strany 519

555  Run IMAPSize, go to Tools > mbox2eml on the menu bar, and then click it.(Figure 15-26)  In the mbox2eml window, click the Select mbox fil

Strany 520 - (Figure 13-58)

556 Figure 15-26 Navigating to Tools > Mbox2eml on the Menu Bar Figure 15-27 Locating the “.mbx” File to be Converted

Strany 521

557 Figure 15-28 Converting the “.mbx” File into an “.eml” File Figure 15-29 File Conversion Completed

Strany 522 - (Figure 13-60)

558 Figure 15-30 Clicking and Dragging the “.eml” File into Outlook Express to Open It

Strany 523

46 Figure 2-13 The Second Outgoing Policy Settings

Strany 524

559 15.1 Statistics Step 1. Mail Security > Mail Reports > Statistics shows a comprehensive statistical report. Step 2. In the upper left cor

Strany 525

560 15.2 Logs Step 1. Under Mail Security > Mail Reports > Logs, it shows how emails are processed.

Strany 526 - (Figure 13-63)

561 The symbols used in Logs:  Attribute: Symbol Description Regular Spam Virus Unscanned  Process: Symbol Description Deleted Notif

Strany 528

563 Chapter 16 Configuration Regulating the websites that employees may access improves profuctivity, and protects the network from the damage caus

Strany 529

564 Terms in Setting URL Blocking License  To activate the Category feature for URL Blocking, the license key must be imported into the device her

Strany 530 - (Figure 13-66)

565 Figure 16-1 Web Filter Settings Note: 1. Before enabling syslog, please configure the syslog setting under System > Configuration > Se

Strany 531

566  The alert message displays when an internal user tries to access the blocked web page.(Figure 16-2) Figure 16-2 The Alert Message Terms in W

Strany 532

567 URL  Specifies any URLs required to be blocked.  The asterisk character (“*”) blocks any websites. Terms in Category Name  The name for

Strany 533 - (Figure 13-70)

568 Terms in MIME/Script Name  The name of MIME/Script. Script  Window Popup:Blocking the popup window.  Microsoft ActiveX:Disallowing the

Strany 534

47 Figure 2-14 Policy Settings Completed

Strany 535

569  video/mpeg  application/octet-stream  application/pdf  application/msword Important: 1. To apply the Whitelist, Blacklist, Category,

Strany 536

570 16.1 Example No. Settings Scenario Page 16.1.1 Whitelist Blacklist Group Regulating User’s Access to Specific Websites Using Blacklist an

Strany 537 - Chapter 14 Anti-Virus

571 16.1.1 Regulating User’s Access to Specific Websites Using Blacklist and Whitelist Step 1. Go to Web Filter > Configuration > Whitelist a

Strany 538

572 Note: 1. Whitelist can be exported as a file for storage, which can be used for restoring the list later on. Step 2. Go to Web Filter > C

Strany 539

573 Step 3. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-8)  Type the name in the Name field. 

Strany 540 - 14.1 Example

574 Figure 16-8 Group Settings for URL Blocking

Strany 541 - (Figure 14-2)

575 Figure 16-9 The Completed Group Settings

Strany 542 - (Figure 14-3)

576 Step 4. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-10)  Select the defined group from the Web Filter drop-dow

Strany 543 -  Click OK.(Figure 14-5)

577 16.1.2 Regulating User’s access to Specific Website, Downloading or Uploading Specific File Extension via HTTP or FTP or the Access to Specific

Strany 544 - Figure 14-5 Policy Created

578 Step 2. Go to Web Filter > Configuration > File Extensions, click New Entry and then set as below:(Figure 16-14)  Type the name in the Na

Strany 545 - (Figure 14-7)

48 Step 5. The configuration of LAN1 to the Internet is now complete.(Figure 2-15) Figure 2-15 The LAN Configured Using Multiple Subnet Note: 1

Strany 546 - Figure 14-7 Policy Created

579 Figure 16-16 Adding a New Extension Figure 16-17 Typing a New Extension Figure 16-18 File Extension Added

Strany 547 -  Click OK.(Figure 14-9)

580 Step 3. Go to Web Filter > Configuration > MIME/Script, click New Entry and then set as below:(Figure 16-19)  Type the name in the Name f

Strany 548

581  Click Modify and then click Add.(Figure 16-21)  Enter the MIME Types in the field.  Click OK.(Figure 16-22, 16-23) Figure 16-21 Configuri

Strany 549 - Figure 14-9 Policy Created

582 Step 4. Go to Web Filter > Configuration > Group, click New Entry and then set as below:(Figure 16-24)  Type the name in the Name field.

Strany 550

583 Figure 16-24 Configuring the URL Group

Strany 551 - (Figure 14-11)

584 Figure 16-25 Setting Completed

Strany 552 - (Figure 14-13)

585 Step 5. Go to Policy > Outgoing, click New Entry and then set as below:(Figure 16-26)  Select the defined group from the Web Filter drop-dow

Strany 553 - (Figure 14-14)

586 Chapter 17 Reports Reports delivers the IT administrator with detailed statistics and logs regarding the access of websites made by users.

Strany 554 - (Figure 14-16)

587 Terms in Setting Periodic Report Scheduling Settings  Generates and sends out a periodic report to the designated recipient(s) based on a sc

Strany 555

588 Figure 17-2 A Daily Report Sent through an Email Message

Strany 556 -  Click OK.(Figure 14-18)

5 8.2 RADIUS Authentication ... 166 8.3 POP3 Authentication ...

Strany 557

49 2.3.2 Using Multiple Subnets to Establish a VLAN Gateway to Regulate VLAN Users to Access the Internet Prerequisite Setup (Note: IP addresses

Strany 558

589 Terms in Logs Search  Category: Available searching criteria are time, souce IP address, website, classification and action.  Upload: Availa

Strany 559 - Reports > Logs

590 Figure 17-13 Searching for the Specific Logs Note: 1. Under Web Filter > Reports > Logs, the Category reports can be sorted by the t

Strany 560

591 17.1 Statistics Step 1. Under Web Filter > Reports > Statistics, bar charts shows the report of URL blocking. Step 2. In the upper left c

Strany 561 - Chapter 15 Mail Reports

592 Step 4. Below it shows the statistics report.(Figure 17-15)  Y-axis indicates the amount of scanned URL.  X-axis indicates the time.

Strany 563

594 Figure 17-15 Statistics Report

Strany 564 - Terms in Logs

595 17.2 Logs Step 1. Under Web Filter > Reports > Logs, there it shows the URL blocking logs.(Figure 17-16) Figure 17-16 URL Blocking Logs

Strany 565

596 IDP

Strany 566

597 Chapter 18 Configuration In order to protect your network from various security threats, the device produces timely alerts and blocking mecha

Strany 567

598 Terms in Settings IDP Settings  IDP signature definitions update automatically everyday or updated by the IT administrator manually. After eac

Strany 568

50 Figure 2-16 First Multiple Subnet Setting

Strany 569

599  Type 60 in the Storage Lifetime field.  Click OK.(Figure 18-1) Figure 18-1 IDP Settings Note: 1. To enable Syslog, the IT administr

Strany 570 - 15.1 Statistics

600  When detecting attacks, the IT administrator will receive both an email notification and a NetBIOS Notification, Also, a corresponding log wil

Strany 571 - 15.2 Logs

601 Note: 1. The IDP log is generated upon the “Log”setting under IDP > Signatures > Anomaly / Pre-defined / Custom.

Strany 572

602 Chapter 19 Signatures To protect your company's network from malicious intrusions and attacks, the CS-2001 provides alerts and blocking me

Strany 573 - Web Filter

603 Terms in Signatures Anomaly  Available signatures are syn flood, udp flood, icmp flood, portscan and http insptct.(Figure 19-1)  You may s

Strany 574 - Chapter 16 Configuration

604 Pre-defined  Available signatures are Attack Responses, Backdoor, Bad Traffic, Chat, DDoS, DNS, DoS, Exploit, Finger, FTP, ICMP, IMAP, Info, Mi

Strany 575

605 Figure 19-2 Pre-Defined Settings

Strany 576 - Settings

606 Note: 1. All the signatures under the IDP > Signatures > Pre-defined are processed according to the Default Settings for Each Risk Lev

Strany 577

607 Name  The name of the signature. Protocol  Determine of which IP Version (IPv4, IPv6) and Communication Protocol to detect and protect. S

Strany 578 - Terms in Extension

608 19.1 Example 19.1.1 Adopting Packets Inspection along with Custom and Pre-Defined Signatures to Detect and Prevent the Intrusion Step 1. Under

Strany 579 - Terms in MIME/Script

51 Figure 2-17 Second Multiple Subnet Setting Figure 2-18 Multiple Subnet Settings Completed Note: 1. The device’s interface settings permits

Strany 580

609 Step 2. Go to IDP > Signatures > Anomaly and then set as below:(Figure 19-4)  Enable the signatures and configure the settings.  Click

Strany 581 - 16.1 Example

610 Step 3. Under IDP > Signatures > Pre-defined, set as below:(Figure 19-5)  Select the signatures.  Click OK. Figure 19-5 Pre-Defined Se

Strany 582 - Blacklist and Whitelist

611 Step 4. Go to IDP > Signatures > Custom and set as below:(Figure 19-6)  Type the name in the Name field.  Select IPv4 for IP Version an

Strany 583

612 Note: 1. You may type a word string in the Content Pattern field; or convert it to hexadecimal ASCII code and then paste it into the field.

Strany 584 - (Figure 16-9)

613 Figure 19-8 Applying the IDP to the Policy

Strany 585

614 Figure 19-9 Policy Created

Strany 586

615 Chapter 20 IDP Report CS-2001 provides you with a comprehensive IDP report in both statistics and logs. With the help of them, you could have a

Strany 587

616 Terms in Settings Periodic Report Scheduling Settings  It can generates and send out the periodic report to the designated recipient(s) on sch

Strany 588

617 Figure 20-2 Periodic Report Received

Strany 589

618 Terms in Logs Search  Available search criteria are date, event, signature category, attacker IP, victim IP, interface and risk level.  G

Strany 590

52 Step 2. Go to Policy Object > Address > LAN, and set as below:(Figure 2-19) Figure 2-19 Address Settings for the LAN

Strany 591

CS-2001 UTM Content Security Gateway User’s Manual 619 20.1 Statistics Step 1. Go to IDP > IDP Reports > Statistics, to view a full-scale ID

Strany 592

620 20.2 Logs Under IDP > IDP Reports > Logs, it shows the IDP status. Note: 1. The symbol used in Logs:  Process: Symbol Description

Strany 593 - (Figure 16-25)

621 Web VPN / SSL VPN

Strany 594

622 Chapter 21 Web VPN / SSL VPN Since the Internet is in widespread use these days, the demand for secure remote connections is increasing. To mee

Strany 595

623 Terms in VPN DES  DES, an acronym for Data Encryption Standard, is a cipher that was selected by NIST (National Institute of Standard and Te

Strany 596

624 Hardware Auth.  The IT administrator may enable the PCs listed under Web VPN/ SSL VPN > Hardware Auth by adding them to the Selected Hardw

Strany 597 - Chapter 17 Reports

625 Terms in Hardware Auth Hardware Authentication Users  The list of the devices that have been established SSL VPN connection to the CS-2001 d

Strany 598

626 21.1 Example 21.1.1 Configuring Web / SSL VPN Connection settings for External Clients Step 1. Go to Interface > WAN, activate the HTTPS fu

Strany 599

627 Figure 21-4 User Group Entries

Strany 600

628 Step 3. Go to Web VPN / SSL VPN > Settings and then set as below:  Click Modify.(Figure 21-5)  Tick Enable Web VPN / SSL VPN.  Select th

Strany 601

53 Step 3. Go to Policy Object > Address > LAN Group and then set as below: (Figure 2-20) Figure 2-20 LAN Group Settings Step 4. Go to Poli

Strany 602 - 17.1 Statistics

629 Figure 21-6 Web VPN / SSL VPN Setting Completed

Strany 603 - (Figure 17-15)

630 Figure 21-7 Web VPN / SSL VPN Authentication Settings Figure 21-8 Web VPN / SSL VPN Authentication Completed

Strany 604

631 Step 4. Go to Policy > Incoming and then set as below:(Figure 21-9)  Select the defined Web VPN / SSL VPN from the VPN Trunk drop-down list.

Strany 605

632 Step 5. Configure the setting from a browser:  In the URL field, type the CS-2001 interface address plus sslvpn or webvpn. For example, https:/

Strany 606 - 17.2 Logs

633 Figure 21-12 Warning-Security Window

Strany 607

634 Figure 21-13 Warning-Security Window Figure 21-14 The Authentication Window Figure 21-15 Web VPN / SSL VPN Connection

Strany 608 - Chapter 18 Configuration

635 Figure 21-16 Web VPN / SSL VPN Connection Established

Strany 609

636 Step 6. Under Web VPN/ SSL VPN > Status, it shows the connection status: (Figure 21-17) Figure 21-17 Web VPN / SSL VPN Connection Status S

Strany 610 -  Click OK.(Figure 18-1)

637 Step 8. Go to Web VPN / SSL VPN > Settings and then set as below:(Figure 21-19)  Click Modify.  Move the hardware from the Available Hardw

Strany 611 - (Figure 18-2, 18-3)

638 Figure 21-20 Setting Completed Step 9. When a user establishes an SSL VPN connection through the CS-2001, their hardware can be directly authen

Strany 612 - Pre-defined / Custom

54 Step 5. The internal network’s VLAN. (Figure 2-23) Figure 2-23 The Completed Mulitple Subnet VLAN Settings

Strany 613 - Chapter 19 Signatures

639 Note: 1. When hardware authentication and user/group authentication are both enabled, the device will first try to authenticate by hardware au

Strany 614 - Terms in Signatures

640 Figure 21-22 Installing Java Runtime Environment Plug-in

Strany 615 - (Figure 19-2)

CS-2001 UTM Content Security Gateway User’s Manual 641 IM Recording

Strany 616

642 Chapter 22 Configuration IM Recording can help you record and monitor the use of MSN and QQ messenger. This can prevent productivity losses fro

Strany 617

643 Terms in QQ Account Manager IM Logging Setting  Configures the storage lifetime of IM logging. Enable Block QQ access with an invalid passwor

Strany 618

644 22.1 Example 22.1.1 Recording the Use of MSN / QQ Messenger Step 1. Users may log into the Web User Interface to add their own account. (Enter

Strany 619 - 19.1 Example

645 Figure 22-2 Account Added Note: 1. IT administrator may add new users under IM Recording > Configuration > QQ Account Manager.

Strany 620 - Figure 19-4 Anomaly Settings

646 Step 2. The added user is listed under IM Recording > Configuration > QQ Account Manager:  Tick Block QQ access with an invalid password.

Strany 621 - (Figure 19-5)

647 Note: 1. Users may go to the Web user interface to change their password on their own. (Enter the management IP address appended with qq. E.g.

Strany 622

648 Step 3. Go to Policy > Outgoing and set as below:(Figure 22-6)  Enable IM Recording.  Click OK.(Figure 22-7) Figure 22-6 Creating an Outg

Strany 623 -  Click OK.(Figure 19-9)

55 2.4 Route Table 2.4.1 Enabling Two Networks Connected by a Router to Access the Internet via the CS-2001 Prerequisite Setup (Note: IP addresses

Strany 624

649 Figure 22-7 Policy Created

Strany 625

650 Chapter 23 Reports The records of MSN and QQ messengers are shown in the form of easy-to-read log and statistics. Terms in Settings Periodic Re

Strany 626 - Chapter 20 IDP Report

651 Figure 23-1 Periodic Report Settings Figure 23-2 Daily IM Statistics Report

Strany 627

652 Figure 23-3 Daily IM Statistics Report Figure 23-4 Historical Report Scheduling Settings

Strany 628

653 Figure 23-5 Historical Report Received

Strany 629

654 Figure 23-6 Weekly IM Statistics Report Terms in Message History Search  Available search criteria are date, time range, IM type, username,

Strany 630 - 20.1 Statistics

655  Click Search.(Figure 23-7)  Click Send Report.  The report is sent to the designated recipient(s). (Figure 23-8, 23-9)  To store the se

Strany 631 - 20.2 Logs

CS-2001 UTM Content Security Gateway User’s Manual 656 Figure 23-8 Receiving the Search Results Figure 23-9 The Searching Results Note: You m

Strany 632 - Web VPN / SSL VPN

657 Figure 23-10 Downloading the Searching Results 23.1 Statistics Step 1. IM Recording > Reports > Statistics shows a comprehensive stat

Strany 633

658 Figure 23-11 IM Recording Statistical Report

Strany 634

56 Step 1. Go to System > Configuration > Route Table and set as below:  Click on New Entry.  IP Version : Select IPv4.  IP Address: Ty

Strany 635 - Hardware Auth

659 23.2 Message History Step 1. IM Recording > Reports > Message History shows the logs of users’ conversation.(Figure 23-12) Figure 23-12

Strany 636 - Terms in Status

660 Chapter 24 Policy CS-2001 inspects each packet passing through the device to see if it meets the criteria of any policy. Every packet is proces

Strany 637 - 21.1 Example

661  DMZ to LAN : The packet is from the DMZ and heading to the LAN. IT administrators can customize the policy for DMZ-to-LAN packets.  LAN to L

Strany 638

662 Terms in Policy Source Address & Destination Address  Source address and Destination address is based around using the device as a point o

Strany 639

663 Authentication  This requires users to be authenticated to create a connection. VPN Trunk  This is where you apply the policy to regulate th

Strany 640

CS-2001 UTM Content Security Gateway User’s Manual 664 Web App Firewall  It can regulate and filter all the web application. Anti-Virus  It

Strany 641

665 Note: 1. Max. Concurrent Sessions overrides Max. Concurrent Sessions per IP in a policy. When the setting value of Max. Concurrent Sessions ex

Strany 642

666 24.1 Example No. Settings Scenario Page 24.1.1 Outgoing Creating a Policy to Monitor the Internet Access of LAN User 667 24.1.2 Ou

Strany 643

667 24.1.1 Creating a Policy to Monitor the Internet Access of LAN Users Step 1. Go to Policy > Outgoing and then set as below:(Figure 22-1) 

Strany 644

668 Step 2. Click the Log icon of a policy to see the log.(Figure 22-3)  In the upper-left corner, click the Refresh button or select a refresh

Strany 645

57 Figure 2-26 Static Route Setttings Figure 2-27 The Completed Static Route Settings Important: 1. To enable the LAN to LAN connection, go to

Strany 646

669 Figure 22-4 Traffic Shown in Log Screen

Strany 647

670 Step 3. Under Monitoring > Traffic Grapher > Policy-Based Traffic, the traffic flow is displayed in graphics, giving you an instant insight

Strany 649

672 Figure 22-5 Statistics Screen

Strany 650 - (Figure 21-21, 21-22)

673 24.1.2 Creating a Policy to Restrict the Access to Specific Web Sites Step 1. Go to Web Filter > Configuration > Whitelist/ Blacklist/ Fi

Strany 651

674 Figure 22-9 MIME / Script Settings Figure 22-10 Group Settings

Strany 652

675 Step 2. Go to Policy Object > Application Blocking > Settings and then set as below:(Figure 22-11, 22-12) Figure 22-11 Application Blockin

Strany 653 - Chapter 22 Configuration

676 2. Application Blocking is used for blocking Instant Messenger, Peer-to-Peer Application, Video/ Audio Application, Webmail, Game Application, T

Strany 654 - Terms in QQ Account Manager

677 Step 3. Go to Policy Object > Address > WAN / WAN Group and then set as below:(Figure 22-13, 22-14) Figure 22-13 WAN Interface Setting F

Strany 655 - 22.1 Example

678 Step 4. Go to Policy > Outgoing and then set as below:(Figure 22-15)  Select the defined group from the Destination Address field.  Select

Strany 656 - Manager

58 Step 2. The subnets 192.168.10.x/24,192.168.20.x/24 and 192.168.1.x/24 can now communicate with each other. In addition, these subnets may also ac

Strany 657

679 Step 5. Go to Policy > Outgoing and then set as below:(Figure 22-16)  Select the defined group from the Web Filter drop-down list.  Select

Strany 658

680 24.1.3 Creating a Policy to Grant Internet Access to Only Authenticated Users on Schedule Step 1. Go to Policy Object > Schedule > Settin

Strany 659 -  Click OK.(Figure 22-7)

681 Figure 22-20 Applying the Schedule and Authentication to the Policy Figure 22-21 Policy Completed

Strany 660 - Figure 22-7 Policy Created

682 24.1.4 Creating a Policy to Enable a Remote User to Control a LAN PC with Remote Control Software (pcAnywhere) Step 1. Set up a computer to be

Strany 661 - Chapter 23 Reports

683 Step 3. Under Policy > Incoming, set as below:(Figure 22-23)  Select the defined Virtual Server for Destination Address.  Select PC-Anywhe

Strany 662

684 24.1.5 Creating a Policy to Limit the Bandwidth, Daily Total Traffic Amount and Maximum Concurrent Sessions of an Incoming Session to a FTP Serv

Strany 663

685 Step 4. Go to Policy > WAN to DMZ and then set as below(Figure 22-27)  Select the defined rule from the Destination Address drop-down list.

Strany 664

686 Figure 22-28 A WAN-to-DMZ Policy Created

Strany 665 - Terms in Message History

687 24.1.6 Creating a Policy to Enable LAN / WAN Users to Have Email Access (A Transparent Mode Example) Step 1. Set up a mail server in DMZ. Next,

Strany 666

688 Step 4. Under Policy > WAN To DMZ, set as below:(Figure 22-31)  Select the defined DMZ rule for Destination Address.  Select the defined s

Strany 667

6 Chapter 21 Web VPN / SSL VPN ... 622 21.1 Example ...

Strany 668 - 23.1 Statistics

59 2.5 DHCP 2.5.1 Using an External DHCP Server to Allocate IP Addresses to Internal PCs Step 1. Go to System > Configuration > DHCP, and se

Strany 669

689 Step 5. Under Policy > LAN To DMZ, set as below:(Figure 22-33)  Select the defined DMZ entry for Destination Address.  Select the defined

Strany 670 - 23.2 Message History

690 Step 6. Under Policy > DMZ To WAN, set as below:(Figure 22-35)  Select the defined rule for Source Address.  Select the defined rule for S

Strany 672

692 Chapter 25 Anomaly Flow IP Once an anomaly traffic flow is detected, CS-2001 will take action to block the flow of packets. This protection ens

Strany 673 - Terms in Policy

693 25.1 Example 25.1.1 Configuration for Alerts and the Blocking of Internal DDoS Attacks Step 1. Go to System > Configuration > Settings

Strany 674

694 Step 3. Go to Anomaly Flow IP > Settings and then set as below:(Figure 23-2)  Enter the Traffic Threshold per IP. (The default value is 100)

Strany 675

695 Step 4. When a DDoS attack occurs, CS-2001 generates a corresponding log under Anomaly Flow IP > Virus-infected IP, and if NetBIOS Notificatio

Strany 676

696 Step 6. Internal users will see an alert message upon opening a web browser after being infected by a computer virus. CS-2001 limits virus-infect

Strany 678

698 Chapter 26 Inbound Balancing The CS-2001 provides enterprises with Inbound Load Balancing. It ensures uninterrupted access for external users t

Strany 679 - (Figure 22-4)

60 Note: 1. When Enable DHCP Relay Support is enabled, internal PCs can obtain an IP address from the server through the specified interface (WAN1

Strany 680

699 Terms in Inbound Balancing Domain Name  Refers to an address that is registered at an ISP. An IP address like 198.68.20.78 is not easy to me

Strany 681 - (Figure 22-5)

700 Domain Name Type IP Address host1.nu.net.tw A 61.11.11.12 host2.nu.net.tw A 61.11.11.13 host2.nu.net.tw A 211.22.22.23 Table 24-1 Domain Name

Strany 682

701  Supposing a user wants to send an email to [email protected]. The user is using test.com.tw as its SMTP server. The DNS records will be quer

Strany 683

702 pointer records of the reverse database, this IP address is stored as the domain name 12.11.11.61.in-addr.arpa pointing back to its designated ho

Strany 684

703  IPv6 uses PTR record as well. For example, host33.nu.net.tw points to FEC0::2AA:FF:FE3F:2A1C (FEC0:0000:0000:0000:02AA:00FF:FE3F:2A1C), in poi

Strany 685 - Figure 22-10 Group Settings

704 Further Description DNS pointers are used to indicate which DNS server holds all the associated DNS records for a domain. Any specific informati

Strany 686

705 Note: 1. The DNS must point to the fixed IPs.

Strany 687

706 Under Advance > Inbound Balancing > Settings, configure DNS settings as listed below:(Table 24-6) Domain Name Type IP Address Reverse

Strany 688 - (Figure 22-13, 22-14)

707 Configure DNS settings as listed below:(Table 24-7) Domain Name Type IP Address Weighting Priority web.nu.net.tw A 61.11.11.11 1 1 web.nu

Strany 689 - (Figure 22-15)

708 As seen from table 24-7, it can be inferred that when browsing www.nu.net.tw, visitors are directed to different servers according to their brows

Strany 690

61 2.5.2 Using the CS-2001 to Allocate IP Addresses to LAN PCs Step 1. Go to System > Configuration > DHCP and set as below:(Figure 2-30) 

Strany 691

709 26.1 Example No. Application Environment Page 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode 710 26.1.2

Strany 692

710 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode Step 1. Go to Advance > Inbound Balancing > Settings and p

Strany 693 - (Figure 22-22)

711 Figure 24-3 The First Inbound Balance Configuration

Strany 694

712 Figure 24-4 The Second Inbound Balance Configuration Figure 24-5 The Completed Settings Note: 1. If @ is entered in the Hostname field, th

Strany 695

713 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-6, 24-7) Figure 24-6 Server 1 Settings Figu

Strany 696 - (Figure 22-28)

714 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-8)  For Destination Address select [Virtual Server IP]

Strany 697

715 Figure 24-9 Configuring the First Settings of an Incoming Policy Settings Figure 24-10 The Completed Policy Settings

Strany 698

716 Step 4. Settings complete. If WAN 1 goes down, WAN 2 ensures user’s access to the web server remains uninterrupted.(Figure 24-11) Figure 24-11 W

Strany 699

717 26.1.2 Creating an A Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Strany 700

718 Figure 24-13 The First Inbound Balance Settings Figure 24-14 The Second Inbound Balance Configuration Figure 24-15 Setting Completed

Strany 701

62 Figure 2-30 DHCP Settings

Strany 702 - Anomaly Flow IP

719 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-16, 24-17) Figure 24-16 Server 1 Settings Fi

Strany 703 - Chapter 25 Anomaly Flow IP

720 Step 3. Go to Policy > Incoming and proceed with the following settings:  Click New Entry.(Figure 24-18)  Select the defined rule ([Virtua

Strany 704 - 25.1 Example

721 Figure 24-19 Configuring the Second Policy Settings Figure 24-20 Policy Completed

Strany 705

722 Step 4. Setting completed.(Figure 24-21) Figure 24-21 The Round-Robin Deployment Note: 1. Inbound Balance Settings:(Table 24-9) Name Type

Strany 706

723 cycle restarted)  The 5th user accesses the server via 211.22.22.22.  The 6th user accesses the server via 211.22.22.22.

Strany 707 - (Figure 23-8)

724 26.1.3 Creating a CNAME Record to Load Balance a Web Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settin

Strany 708 - Advance

725 Figure 24-23 The First Inbound Balance Settings Figure 24-24 The Second Inbound Balance Settings Figure 24-25 CNAME(Alias) Settings

Strany 709

726 Figure 24-26 Completed CNAME(Alias) Settings

Strany 710 - Terms in Inbound Balancing

727 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-27, 24-28) Figure 24-27 Server 1 Settings F

Strany 711

728 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-29)  Select the defined rule ([Virtual IP]Web_Server(61

Strany 712

63 Note: 1. Enabling Obtain DNS server address automatically is intended for LAN users whom access the Internet via the device’s authentication me

Strany 713

729 Figure 24-30 Configuring the Second Policy Settings Figure 24-31 Adding the Second Policy

Strany 714

730 Step 4. Setup completed.(Figure 24-32) Figure 24-32 Web Server Deployment Using CNAME Note: 1. The settings for Inbound Balancing:(Table 24-

Strany 715

731  The 4th user accesses the server via 61.11.11.11 (Round-Robin priority distribution cycle has restarted)  The 5th user accesses the server v

Strany 716

732 26.1.4 Creating a MX Record to Load Balance a Mail Server Using the Round-Robin Mode Step 1. Go to Advance > Inbound Balancing > Settings

Strany 717 - (Table 24-6)

733 Figure 24-34 The First Inbound Balance Settings Figure 24-35 The Second Inbound Balance Settings Figure 24-36 The MX(Mail eXchanger) Setting

Strany 718 - (Table 24-7)

734 Figure 24-37 MX(Mail eXchanger) Settings Completed

Strany 719 - (Table 24-8)

735 Step 2. Go to Policy Object > Virtual Server > Port Mapping and then set as below:(Figure 24-38, 24-39, 24-40, 24-41) Figure 24-38 The Fir

Strany 720 - 26.1 Example

736 Figure 24-40 The Third Setting of Server Figure 24-41 The Fourth Setting of Server

Strany 721 - Using the Backup Mode

737 Step 3. Go to Policy > Incoming and then set as below:  Click New Entry.(Figure 24-42)  Select the defined rule ([Virtual IP]Mail_Server_P

Strany 722

738 Figure 24-43 The Second Policy Settings Figure 24-44 The Third Policy Settings

Strany 723

64 2.6 DDNS Step 1. Go to System > Configuration > Dynamic DNS, and set as below:(Figure 2-31)  Click New Entry. Select a Service Provider

Strany 724 - (Figure 24-6, 24-7)

739 Figure 24-45 The Fourth Policy Settings Figure 24-46 Policy Completed

Strany 725

740 Step 4. Setup Completed.(Figure 24-47) Figure 24-47 The Mail Server Deployment Note: 1. Settings for Inbound Balancing: (Table 24-11) Name

Strany 726

741  The 2nd user accesses the server via 211.22.22.22.  The 3rd user accesses the server via 211.22.22.22 (Round-Robin priority distribution cyc

Strany 727 - (Figure 24-11)

742 Chapter 27 High Availability When two CS-2001 devices are deployed in the network, the two devices can operate in active / standby mode. The ma

Strany 728 - Using the Round-Robin Mode

743 Terms in High Availability HA Mode  This mode is used to determine if the device will serve as the master or backup. Data Transmission P

Strany 729

744 27.1 Example 27.1.1 High Availability Deployment Preparation Configure Port1 as LAN1 (192.168.1.1, NAT/ Routing mode) and connect it to the L

Strany 730 - (Figure 24-16, 24-17)

745 Step 1. Assign one CS-2001 device as the master and connect it to the same switch that the LAN is connected to.(Figure 25-1) Figure 25-1 The Dep

Strany 731

746 Step 2. Using the master device, configure the following High Availability settings under Network > Interface.(Figure 25-2) Figure 25-2 The

Strany 732

747 Step 3. Using the master device, configure the following High Availability settings under Advance > High Availability > Settings:  Tick E

Strany 733 - (Figure 24-21)

748 Step 4. To set up the backup device, be sure the backup device is turned off and then configure the interface. Backup device’s LAN port, WAN port

Strany 734

65 2.7 Host Table Step 1. Go to System > Configuration > Host Table and set as below:(Figure 2-33)  Configure the Host Name accordingly. 

Strany 735

749 Important: 1. After the high availability deployment, if the first time synchronization between the master device and backup device is interr

Strany 736

750 Figure 25-6 Backup Device Taking Over Operations When Master Device Fails 6. Note:  During backup, if the WAN port is using a dynamic IP a

Strany 737

751 Chapter 28 Co-Defense System The CS-2001 can work in cooperation with the network’s switch, to provide instant monitoring of the internal net

Strany 738 - (Figure 24-27, 24-28)

752 Terms in Core Switch Name  The name used to identify the switch. Switch Model  The switch model can be selected or it can be customized. I

Strany 739

753 Remove Blocking Command  This command instructs the core switch to discontinue blocking an IP/MAC address. Show Blocking Commands  This comm

Strany 740

754 28.1 Example 28.1.1 Quickly Isolating Any Anomaly Flow in the Internal Network by Utilizing the Core and Edge Switch Step 1. Go to Anomaly

Strany 741 - (Figure 24-32)

755 Step 2. Under Advance > Co-Defense System > Core Switch, set as below:(Figure 26-3)  Enter the name to identify the switch.  Select the

Strany 742

756 Figure 26-4 Core Switch Settings Completed

Strany 743

757 Step 3. Under Advance > Co-Defense System > Edge Switch, click New Entry and then set as below:(Figure 26-9)  Type the name in the Name f

Strany 744

758 Step 4. Go to Advance > Co-Defense System > MAC ADDR Table. Using SNMP, the CS-2001 can obtain the MAC addresses of any packets that pass t

Strany 745

66 2.8 SNMP 2.8.1 SNMP Agent Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Agent Settings section configure the fol

Strany 746

759 Monitoring

Strany 747

760 Chapter 29 Logs Log comprises logs of Traffic, Events, Connections, Viruses, Application Blocking, Concurrent Sessions and Quota. The system ma

Strany 748

761 Terms in Settings Logging Settings  Logs are sent to the designated recipient once the file size reaches 300 KB.  Logs can be backed up onto

Strany 749

762 Figure 27-1 Searching for a Specific Log

Strany 750

763 Figure 27-2 Downloading the Search Results

Strany 751 - (Figure 24-47)

764 Terms in Events Search  Available search criteria are date, admin name, IP address, event type and event log with detailed content.  Unde

Strany 752

765 Terms in Connection Search  PPPoE : Available search criteria are date and keyword.  Dynamic IP Address: Available search criteria are date

Strany 753

766 Figure 27-4 Searching for a Specific Log

Strany 754 - Terms in High Availability

767 Terms in Virus Search  Available search criteria are date, source IP, destination IP, application, infected file and virus name.  Under Mo

Strany 755 - 27.1 Example

768 29.1 Traffic 29.1.1 Viewing the Protocols and Port Numbers Used during an Access to CS-2001 Step 1. Go to Policy> DMZ To WAN and set as bel

Strany 756 - (Figure 25-1)

67 2.8.2 SNMP Trap Settings Step 1. Go to System > Configuration > SNMP. Under the SNMP Trap Settings section, configure the following settin

Strany 757 - (Figure 25-2)

769 Step 2. Under Monitoring > Logs > Traffic, it shows the traffic status of a policy.(Figure 27-7) Figure 27-7 Traffic Log Step 3. Click an

Strany 758 - (Figure 25-3)

770 Figure 27-8Monitoring the Traffic Flow of Each IP Address

Strany 759 - (Figure 25-4)

771 Step 4. To clear the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-9) Figure 27-9 Deleting all the Traffi

Strany 760

772 29.2 Event 29.2.1 Viewing System History Access and the Status of WAN Step 1. Under Monitoring > Logs > Events, there it shows the sys

Strany 761

773 Figure 27-11 Specific Details of a History Event

Strany 762

774 29.3 Connection 29.3.1 Viewing the Connection Logs of WAN Interface Step 1. Under Monitoring > Logs > Connections, it shows the logs o

Strany 763 - Terms in Core Switch

775 Step 2. To delete the logs, click the Clear button and then click OK in the confirmation window.(Figure 27-13) Figure 27-13 Deleting all the Con

Strany 764

776 29.4 Viruses 29.4.1 Viewing the Detected Viruses from Internal Users Using HTTP / Web Mail / FTP Protocol to Transfer Files Step 1. Go to Po

Strany 765 - 28.1 Example

777 Figure 27-14 A Policy with HTTP/ WebMail and FTP

Strany 766

778 Figure 27-15 Policy Completed

Strany 767

CS-2001 UTM Content Security Gateway User’s Manual 68 2.9 Bulletin Board 2.9.1 Using CS-2001 to Announce the Information to LAN Users and DMZ User

Strany 768

779 Step 2. Under Monitoring > Logs > Viruses, it shows the logs of detected virus from the Internal users using HTTP/ WebMail and FTP protocol

Strany 769

780 29.5 Application Blocking 29.5.1 Viewing the Logs Step 1. Under Policy > Outgoing, set as below: (Figure 27-16)  Select the defin

Strany 770 - Monitoring

781 Step 2. Under Monitoring > Logs > Application Blocking, it shows the logs of applicatons that have been blocked.(Figure 27-18) Figure 27-1

Strany 771 - Chapter 29 Logs

782 29.6 Concurrent Sessions 29.6.1 Viewing the Logs of Concurrent Sessions that have been Exceeded the Configured Value Step 1. Go to Policy &g

Strany 772 - Terms in Traffic

783 Figure 27-20 A Policy with Limitation of Concurrent Sessions

Strany 773

784 Figure 27-21 Policy Completed Step 2. Under Monitoring > Logs > Concurrent Sessions, it shows the logs of the concurrent sessions that ha

Strany 774

785 29.7 Quota 29.7.1 Viewing the Logs of Quota that Has Been Reached Step 1. Go to Policy > Outgoing and then set as below:(Figure 27-22) 

Strany 775 - Terms in Events

786 Figure 27-22 A Policy with Limitation of Quota per Source IP

Strany 776 - Terms in Connection

787 Figure 27-23 Policy Completed Step 2. Under Monitoring > Logs > Quota, it shows the logs of the quota that have reached the configured va

Strany 777

788 29.8 Log Backup 29.8.1 Archiving or Retrieving Logs Generated by CS-2001 Step 1. Go to System > Configuration > Settings and then set as

Strany 778 - Terms in Quota

7 Chapter 32 Diagnostic Tools ... 816 32.1 Ping ...

Strany 779 - 29.1 Traffic

69 Step 2. Under System > Configuration > Bulletin Board, configure the settings in the Bulletin Board Announcements section.  Click New Entr

Strany 780 - (Figure 27-8)

789 Step 3. Go to Monitor > Log > Settings and then set as below:(Figure 27-27) Figure 27-27 Monitoring Settings

Strany 781

790 Note: 1. Once Email Notification is enabled, the logs will be sent to the IT administrator when the files size reaches 300KB. 2. When syslog

Strany 782 - (Figure 27-9)

CS-2001 UTM Content Security Gateway User’s Manual 791 Chapter 30 Accounting Reports Accounting report gives the IT administrator an insight into

Strany 783 - 29.2 Event

792 Terms in Setting Accounting Report Settings  The configuration to enable or disable the recording of inbound and outbound data access and co

Strany 784

793 Terms in Today Top-N Time Slider  Drag the two sliders to adjust the statistics’ time interval (represented by the red portion.) So

Strany 785 - 29.3 Connection

794 Figure 28-2 Searching for the Specific Log

Strany 786 - (Figure 27-13)

795 Figure 28-3 Downloading the Accounting Reports

Strany 787 - 29.4 Viruses

796 Figure 28-4 Deleting the Accounting Reprots

Strany 788

797 30.1 Flow Analysis Step 1. Under Monitoring > Accounting Reports > Flow Analysis, it shows the traffic of source IP and service through C

Strany 789

798 30.2 Today’s Top Chart Step 1. Under Monitoring > Accounting Reports > Today’s Top Chart, it shows the traffic from the source IP, destin

Strany 790

70 Step 3. The LAN users and DMZ users will see the announcement when they access the Internet.(Figure 2-39, 2-40) Figure 2-39 Clicking the Button

Strany 791 - 29.5 Application Blocking

799 Figure 28-6 Today Top-N

Strany 792

800 Step 2. You may drag the two sliders to adjust the statistics’ time interval. The left one is the start time slider, the right one is the end tim

Strany 793 - 29.6 Concurrent Sessions

801 Figure 28-7 Today Top-N Report according to the Time Interval

Strany 794

802 Step 3. By clicking any source IP, a pop-up window will show its destination IP and service.(Figure 28-8) Figure 28-8 The Destination IP and Ser

Strany 795

803 Figure 28-9 The Source IP and Service

Strany 796 - 29.7 Quota

804 Step 5. By clicking any service, it will show its source IP and destination IP. (Figure 28-10) Figure 28-10 The Source IP and Destination IP

Strany 797

805 30.3 Historical Top Chart Step 1. Under Monitoring > Accounting Reports > Historical Top Chart, you may see the traffic of the source IP,

Strany 798

806 Chapter 31 Traffic Grapher Statistics delivers comprehensive information regarding network traffic, enabling the IT administrator to gain a tho

Strany 799 - 29.8 Log Backup

807 Traffic Grapher Charts  Vertical axis indicates the network traffic.  Horizontal axis indicates time. Type/ Source/ Destination/ Service/ A

Strany 800 - (Figure 27-27)

808 31.1 WAN Traffic Step 1. In Monitoring > Traffic Grapher > WAN Traffic, it shows the statistics of upstream / downstream packets over the

Strany 801

71 172.19.1.254. You may enter http://172.19.1.254:84 in the web browser. (Figure 2-41, 2-42) Figure 2-41 Logging in the Bulletin Board Setting Pa

Strany 802

809 Step 2. Statistic charts(Figure 29-2)  Vertical axis indicates network stream.  Horizontal axis indicates time.

Strany 804 - Historical Top Chart

811 Figure 29-2 The Network Stream Chart Note: 1. You may configure the time duration to search for the statistics in a certain period of time.

Strany 805

812 31.2 Policy-Based Traffic Step 1. When creating a new policy, if the Statistics is enabled, the Policy statistics charts in the path of Monitor

Strany 806

813 Step 2. Statistics charts.(Figure 29-4)  Vertical axis indicates network traffic.  Horizontal axis indicates time.

Strany 808 - 30.1 Flow Analysis

815 Figure 29-4 Viewing the Policy Statistics Chart Note: 1. You may see the statistics of a certain time by using the time searching.

Strany 809 - 30.2 Today’s Top Chart

816 Chapter 32 Diagnostic Tools The device provides ping and traceroute utilities to help diagnose network issues with particular external nodes.

Strany 810 - Figure 28-6 Today Top-N

817 32.1 Ping Step 1. To test whether a host is reachable across an IP network, go to Monitoring > Diagnostic Tools > Ping and then configure

Strany 811 - (Figure 28-7)

818 Figure 30-2 Ping Result Note: 1. If VPN is selected from the Interface drop-down list, the user must enter the local LAN IP address in the I

Strany 812

72 2.10 Language 2.10.1 Changing the Language Step 1. Under System > Configuration > Language, you may change the language of the user inter

Strany 813 - (Figure 28-9)

819 Figure 30-3 Ping Results for a VPN Connection

Strany 814

820 32.2 Traceroute Step 1. Under Monitoring > Diagnostic Tools> Traceroute the Traceroute command can be used by the CS-2001 to send out pac

Strany 815 - (Figure 28-10)

821 Figure 30-5 Traceroute Results

Strany 816 - 30.3 Historical Top Chart

CS-2001 UTM Content Security Gateway User’s Manual 822 32.3 Packet Capture Capture packetfor debugging Step 1. Under Monitoring > Diagnostic T

Strany 817 - Chapter 31 Traffic Grapher

823 Chapter 33 Wake-On-LAN Any wake-on-LAN supported PC can be remotely turned on by a “wake-up” packet sent from the CS-2001. By utilizing remote

Strany 818 - Traffic Grapher

824 33.1 Example 33.1.1 Remote Controlling a PC Step 1. Supposing the MAC address of the PC that is desired to be remotely controlled is 00:0C:76:

Strany 819 - 31.1 WAN Traffic

825 Chapter 34 Status Status provides current information about the device and the network including Interface, System Info, Authentication, ARP Ta

Strany 820 - (Figure 29-2)

826 34.1 Interface Step 1. Under Monitoring > Status > Interface, it shows the status of all interface.(Figure 32-2) Figure 32-2 Status In

Strany 821

827 8. PPPoE / Dynamic IP Uptime: when the interface is connected using PPPoE, it displays the connection uptime. 9. MAC Address: displays the MAC

Strany 822

828 34.2 System Info Step 1. Under Monitoring > Status > System Info, it shows the current system information, such as CPU utilization, hard

Strany 824 - (Figure 29-4)

829 Figure 32-3 System Information

Strany 825

830 34.3 Authentication Step 1. Under Monitoring > Status > Authentication, it shows the authentication status of the device.(Figure 32-4) F

Strany 826

831 34.4 ARP Table Step 1. Under Monitoring > Status > ARP Table, it shows NetBIOS Name, IP Address, MAC Address and Interface of any compute

Strany 827 - Chapter 32 Diagnostic Tools

832 Figure 32-6 Downloading the Anti-ARP Virus Software Figure 32-7 The Result of Executng the Anti-ARP Virus Software

Strany 828 - 32.1 Ping

833 Figure 32-8 The Anti-ARP Virus Software will Automatically Run when the System Startups

Strany 829 - Figure 30-2 Ping Result

834 34.5 Sessions Info Step 1. Under Monitoring > Status > Sessions Info, it provides a list of all the sessions that have connected to the d

Strany 830

835 Step 2. By clicking on any source IP, it shows the port number and the traffic.(Figure 32-10) Figure 32-10 The System Info

Strany 831 - 32.2 Traceroute

836 34.6 DHCP Clients Step 1. Under Monitoring > Status > DHCP Clients, it shows the status of IP address distributed by the device’s DHCP se

Strany 832

CS-2001 UTM Content Security Gateway User’s Manual 837 34.7 Host Info Step1. Under Monitoring > Status > Host Info, the IT administrator ma

Strany 833 - 32.3 Packet Capture

74 Chapter 3 Interface The Interface configuration allows you to configure the connection parameters separately for LAN, WAN and DMZ interfaces as

Strany 834 - Chapter 33 Wake-On-LAN

75 Terms in Settings DNS Settings  The DNS servers used for resolving domain names to IP addresses. MTU Setting  The Maximum Transmission Unit

Strany 835 - 33.1 Example

76 Interface Designation  The system-assigned name based on the network interface type selected. Interface Type  The network interface is catego

Strany 836 - Chapter 34 Status

77  IPv6 address represent itself as text string using the following three conventional forms:  Colon-hexadecimal form: This is the preferred for

Strany 837 - 34.1 Interface

78  The IPv6 prefix is the part of the address that indicates the bits that have fixed values. If it happens not to be a multiple of four such as 2

Strany 838

8 Quick Installation Guide

Strany 839 - 34.2 System Info

79  The result, 02-AA-00-FF-FE-3F-2A-1C, is converted to colon-hexadecimal notation, yielding the interface identifier 2AA:FF:FE3F:2A1C. Thus, in t

Strany 840

80 SSH  When ticked, the management interface is available for access via SSH protocol. Connection Type (As Interface Type set to WAN)  It has t

Strany 841 - 34.3 Authentication

81 NAT Redirection  Translates private IP addresses into public addresses.  Auto-configuration: The public address is automatically designated b

Strany 842 - 34.4 ARP Table

82 Detection Mode  When Round-Robin or Active-Backup is selected for Bonding Mode, ARP detect can be selected to detect the connection. Saturate

Strany 843

83 Terms in Interface Group Interface Group  Allows you to group network interface while each group is isolated from one another. Note: This requ

Strany 844

84 3.1 Example No. Scenario Page 3.1.1 Modifying the LAN Interface (NAT / Routing) 85 3.1.2 Configuring the WAN Interface 87 3.1.3 Using

Strany 845 - 34.5 Sessions Info

85 3.1.1 Modifying the LAN Interface (NAT / Routing) Prerequisite Setup (Note: IP addresses used as examples only) Port1 is configured as LAN1 by

Strany 846 - Figure 32-10 The System Info

86 2. Do not disable HTTP and HTTPS before configuring the settings under System > Administration > Permitted IPs, or the IT administrator may

Strany 847 - 34.6 DHCP Clients

87 3.1.2 Configuring the WAN Interface Step 1. Go to Network > Interface and then click Port2’s Modify button. Select WAN for Interface Type. St

Strany 848 - 34.7 Host Info

88 Step 3. Select WAN for Interface Type:  Static IP Address:(Figure 3-4)  Enter the IP Address, Netmask and Default Gateway.  Enter the Max. D

Komentáře k této Příručce

Žádné komentáře