-
UTM Content Security Gateway
1
-
Revision
4
-
Table of Contents
5
-
Quick Installation Guide
9
-
Hardware Installation
10
-
CS-2001 Topology:
11
-
Basic System Configuration
12
-
Figure5. The Install Wizard
14
-
Figure7. Interface Settings
15
-
Figure8. The WAN Settings
16
-
Figure9. Time Settings
17
-
Step 11. Settings complete
19
-
S.1 Overview of Functions
20
-
Chapter 1 Administration
28
-
Terms in Admin
29
-
1.1 Admin
30
-
1.2 Permitted IPs
32
-
1.3 Logout
33
-
(Figure 1-6)
34
-
1.4 Updating Software
35
-
Chapter 2 Configuration
36
-
Terms in Setting
37
-
Terms in Date / Time
39
-
Terms in Multiple Subnet
39
-
Terms in Routing Table
40
-
Terms in DHCP
43
-
Terms in Dynamic DDNS
43
-
Terms in Host Table
43
-
Terms in SNMP
44
-
Terms in Bulletin Board
45
-
2.1 Settings
46
-
Formatting the Hard Drive
48
-
2.1.5 Rebooting the CS-2001
50
-
2.2 Date / Time
51
-
2.3 Multiple Subnet
52
-
Access the Internet
52
-
(Figure 2-12)
56
-
(Figure 2-13, 2-14)
56
-
(Figure 2-15)
59
-
(Figure 2-16)
60
-
(Figure 2-17, 2-18)
60
-
(Figure 2-19)
63
-
(Figure 2-23)
65
-
2.4 Route Table
66
-
(Figure 2-28)
69
-
2.5 DHCP
70
-
CS-2001
71
-
(Figure 2-30)
72
-
Figure 2-30 DHCP Settings
73
-
2.6 DDNS
75
-
2.7 Host Table
76
-
2.8 SNMP
77
-
2.8.2 SNMP Trap Settings
78
-
2.9 Bulletin Board
79
-
DMZ/ DMZ Group
80
-
(Figure 2-41, 2-42)
82
-
2.10 Language
83
-
Interface
84
-
Chapter 3 Interface
85
-
Terms in Interface
86
-
Terms in Interface Group
94
-
3.1 Example
95
-
UI from LAN
97
-
Figure 3-5 Setting Completed
100
-
Figure 3-7 Setting Completed
101
-
Figure 3-9 Setting Completed
102
-
(Figure 3-10)
104
-
(Figure 3-11)
106
-
(Figure 3-12)
107
-
(Figure 3-13)
108
-
Note:
110
-
Interface settings
110
-
(Figure 3-15)
111
-
Internet
112
-
(Figure 3-18)
114
-
(Figure 3-19)
117
-
(Figure 3-20)
117
-
(Figure 3-21)
118
-
(Figure 3-22)
119
-
(Figure 3-23)
120
-
(Figure 3-24)
121
-
(Figure 3-25)
122
-
(Figure 3-26)
124
-
(Figure 3-27)
125
-
(Figure 3-28)
126
-
Important:
127
-
(Figure 3-31)
128
-
(Figure 3-32)
130
-
(Figure 3-36)
133
-
Policy Object
135
-
Chapter 4 Address
136
-
Terms in Address
137
-
4.1 Example
139
-
Permitting FTP Access
140
-
: Select FTP
142
-
Specific IP Address
143
-
Note:
144
-
Chapter 5 Service
147
-
Terms of Service
148
-
5.1 Example of Pre-defined
149
-
POP3, SMTP and DNS)
153
-
Chapter 6 Schedule
157
-
Terms in Schedule
158
-
6.1 Example
159
-
Chapter 7 QoS
161
-
Terms in Settings
162
-
7.1 Example
163
-
Click OK.(Figure 7-6)
165
-
Chapter 8 Authentication
167
-
Terms in Authentication
168
-
LDAP User Name
172
-
(Figure 8-5)
174
-
8.2 RADIUS Authentication
177
-
(Figure 8-18)
184
-
(Figure 8-21)
186
-
(Figure 8-22)
187
-
(Figure 8-25)
189
-
(Figure 8-26)
190
-
(Figure 8-27)
191
-
(Figure 8-28)
192
-
Figure 8-32 Adding a User
195
-
8.3 POP3 Authentication
198
-
8.4 LDAP Authentication
201
-
Note :
212
-
(Figure 8-66)
213
-
9.1 Example
218
-
File Transferring
219
-
and tick Select All
222
-
Chapter 10 Virtual Server
225
-
Terms in Virtual Server
226
-
10.1 Example
227
-
Important:
230
-
(Figure 10-9)
232
-
(Figure 10-10)
232
-
(Figure 10-13)
235
-
15321-15333)
236
-
(Figure 10-22)
240
-
(Figure 10-32)
246
-
Chapter 11 VPN
247
-
Terms in VPN
248
-
Terms in One-Step IPSec
251
-
Terms in VPN Wizard:
253
-
Terms in IPSec Autokey
255
-
Terms in PPTP Server
256
-
Terms in PPTP Client
257
-
Terms in Trunk
258
-
11.1 Example
260
-
(Figure 11-20)
262
-
Figure 11-20 Remote Settings
262
-
(Figure 11-47)
273
-
2000 by a CS-2001 Device
274
-
(Figure 11-72)
285
-
(Figure 11-73)
285
-
(Figure 11-74)
287
-
(Figure 11-75)
287
-
(Figure 11-76)
289
-
(Figure 11-77)
289
-
Figure 11-77 IP Filter Added
290
-
(Figure 11-78)
291
-
(Figure 11-79)
291
-
(Figure 11-82)
295
-
(Figure 11-83)
295
-
(Figure 11-84)
297
-
Figure 11-84 Tunnel Setting
297
-
(Figure 11-85)
297
-
(Figure 11-87)
300
-
(Figure 11-89)
302
-
(Figure 11-90)
303
-
(Figure 11-91)
304
-
(Figure 11-92)
305
-
(Figure 11-93)
306
-
Figure 11-93 IP Filter Added
306
-
(Figure 11-94)
307
-
(Figure 11-95)
307
-
(Figure 11-99)
312
-
(Figure 11-100)
313
-
(Figure 11-101)
314
-
(Figure 11-102)
315
-
(Figure 11-103)
316
-
(Figure 11-104)
317
-
Advanced.(Figure 11-105)
318
-
(Figure 11-114)
323
-
(Figure 11-117)
325
-
(Figure 11-134)
332
-
(Figure 11-139)
334
-
(Figure 11-140)
334
-
(Figure 11-145)
338
-
(Figure 11-194)
356
-
CS-2001 Devices
357
-
(Figure 11-209)
362
-
Company’s subnet
365
-
(Figure 11-249)
378
-
(Figure 11-265)
389
-
(Figure 11-266)
389
-
(Figure 11-271)
393
-
Connection
394
-
PPTP Server
397
-
(Figure 11-281)
400
-
(Figure 11-293)
410
-
(Figure 11-294)
410
-
(Figure 11-299)
414
-
(Figure 11-303)
417
-
Mail Security
418
-
Chapter 12 Configuration
419
-
Click OK.(Figure 12-1)
421
-
Terms in Account Manager
425
-
Terms in Queued Mail
425
-
12.1 Mail Domains
426
-
12.2 Account Manager
431
-
(Figure 12-23)
436
-
(Figure 12-27)
439
-
12.3 Mail Relay
445
-
(Figure 12-35)
446
-
(Figure 12-36)
447
-
(Figure 12-39)
449
-
(Figure 12-40)
450
-
12.4 Mail Notice
451
-
(Figure 12-42)
452
-
12.5 Queued Mail
454
-
(Figure 12-44 Figure 12-45)
455
-
12.6 Mail Signatures
456
-
Chapter 13 Anti-Spam
458
-
(Figure 13-2)
460
-
Terms in Personal Rule
461
-
Terms in Global Rule
461
-
Terms in Whitelist
464
-
Terms in Blacklist
464
-
Terms in Training
464
-
How an Email is Processed
467
-
13.1 Example
469
-
Click OK.(Figure 13-7)
472
-
Figure 13-7 Policy Created
474
-
(Figure 13-8)
475
-
(Figure 13-9)
475
-
Figure 13-9 Policy Created
476
-
(Figure 13-10)
477
-
(Figure 13-11)
477
-
Figure 13-11 Policy Created
479
-
(Figure 13-12)
480
-
Transparent Mode)
482
-
(Figure 13-16)
484
-
(Figure 13-17)
484
-
Figure 13-17 Policy Created
485
-
Click OK.(Figure 13-19)
486
-
Figure 13-19 Policy Created
488
-
Blacklist
493
-
(Figure 13-30)
494
-
(Figure 13-31)
494
-
(Figure 13-32)
496
-
(Figure 13-33)
496
-
Click OK.(Figure 13-35)
498
-
Figure 13-35 Policy Created
500
-
(Figure 13-44)
508
-
(Figure 13-45)
508
-
(Figure 13-46)
510
-
(Figure 13-47)
510
-
(Figure 13-48)
512
-
(Figure 13-49)
512
-
(Figure 13-53)
517
-
(Figure 13-54)
517
-
(Figure 13-55)
518
-
(Figure 13-56)
518
-
(Figure 13-57)
520
-
(Figure 13-58)
520
-
(Figure 13-59)
522
-
(Figure 13-60)
522
-
(Figure 13-63)
526
-
(Figure 13-64)
527
-
(Figure 13-65)
527
-
(Figure 13-66)
530
-
(Figure 13-69)
533
-
(Figure 13-70)
533
-
Chapter 14 Anti-Virus
537
-
14.1 Example
540
-
(Figure 14-2)
541
-
(Figure 14-3)
542
-
Click OK.(Figure 14-5)
543
-
Figure 14-5 Policy Created
544
-
(Figure 14-6)
545
-
(Figure 14-7)
545
-
Figure 14-7 Policy Created
546
-
Click OK.(Figure 14-9)
547
-
Figure 14-9 Policy Created
549
-
(Figure 14-11)
551
-
(Figure 14-12)
552
-
(Figure 14-13)
552
-
(Figure 14-14)
553
-
(Figure 14-15)
554
-
(Figure 14-16)
554
-
Click OK.(Figure 14-18)
556
-
Reports > Logs
559
-
Chapter 15 Mail Reports
561
-
Terms in Logs
564
-
15.1 Statistics
570
-
15.2 Logs
571
-
Web Filter
573
-
Chapter 16 Configuration
574
-
Settings
576
-
Terms in Category
578
-
Terms in Extension
578
-
Terms in MIME/Script
579
-
16.1 Example
581
-
Blacklist and Whitelist
582
-
(Figure 16-8)
584
-
(Figure 16-9)
584
-
(Figure 16-24)
593
-
(Figure 16-25)
593
-
Chapter 17 Reports
597
-
17.1 Statistics
602
-
(Figure 17-15)
603
-
17.2 Logs
606
-
Chapter 18 Configuration
608
-
Click OK.(Figure 18-1)
610
-
(Figure 18-2, 18-3)
611
-
Pre-defined / Custom
612
-
Chapter 19 Signatures
613
-
Terms in Signatures
614
-
(Figure 19-2)
615
-
19.1 Example
619
-
(Figure 19-4)
620
-
Figure 19-4 Anomaly Settings
620
-
(Figure 19-5)
621
-
Select Enabled for IDP
623
-
Click OK.(Figure 19-9)
623
-
Chapter 20 IDP Report
626
-
20.1 Statistics
630
-
20.2 Logs
631
-
Web VPN / SSL VPN
632
-
Hardware Auth
635
-
Terms in Hardware Auth
636
-
Terms in Status
636
-
21.1 Example
637
-
(Figure 21-19)
648
-
(Figure 21-20)
648
-
(Figure 21-21, 21-22)
650
-
Chapter 22 Configuration
653
-
Terms in QQ Account Manager
654
-
22.1 Example
655
-
Manager
656
-
Enable IM Recording
659
-
Click OK.(Figure 22-7)
659
-
Figure 22-7 Policy Created
660
-
Chapter 23 Reports
661
-
Terms in Message History
665
-
23.1 Statistics
668
-
23.2 Message History
670
-
Chapter 24 Policy
671
-
Terms in Policy
673
-
24.1 Example
677
-
(Figure 22-3)
679
-
(Figure 22-4)
679
-
(Figure 22-5)
681
-
Figure 22-10 Group Settings
685
-
(Figure 22-13, 22-14)
688
-
(Figure 22-15)
689
-
(Figure 22-22)
693
-
(Figure 22-27)
696
-
(Figure 22-28)
696
-
Anomaly Flow IP
702
-
Chapter 25 Anomaly Flow IP
703
-
25.1 Example
704
-
(Figure 23-8)
707
-
Advance
708
-
Terms in Inbound Balancing
710
-
(Table 24-6)
717
-
(Table 24-7)
718
-
(Table 24-8)
719
-
26.1 Example
720
-
Using the Backup Mode
721
-
(Figure 24-6, 24-7)
724
-
(Figure 24-11)
727
-
Using the Round-Robin Mode
728
-
(Figure 24-16, 24-17)
730
-
(Figure 24-21)
733
-
(Figure 24-27, 24-28)
738
-
(Figure 24-32)
741
-
(Figure 24-47)
751
-
Terms in High Availability
754
-
27.1 Example
755
-
(Figure 25-1)
756
-
(Figure 25-2)
757
-
(Figure 25-3)
758
-
(Figure 25-4)
759
-
Terms in Core Switch
763
-
28.1 Example
765
-
Monitoring
770
-
Chapter 29 Logs
771
-
Terms in Traffic
772
-
Terms in Events
775
-
Terms in Connection
776
-
Terms in Virus
778
-
Terms in Concurrent Sessions
778
-
Terms in Quota
778
-
29.1 Traffic
779
-
(Figure 27-7)
780
-
Figure 27-7 Traffic Log
780
-
(Figure 27-8)
780
-
(Figure 27-9)
782
-
29.2 Event
783
-
29.3 Connection
785
-
(Figure 27-13)
786
-
29.4 Viruses
787
-
29.5 Application Blocking
791
-
29.6 Concurrent Sessions
793
-
29.7 Quota
796
-
29.8 Log Backup
799
-
(Figure 27-27)
800
-
Terms in Flow Analysis
803
-
Terms in Today Top-N
804
-
Historical Top Chart
804
-
30.1 Flow Analysis
808
-
30.2 Today’s Top Chart
809
-
Figure 28-6 Today Top-N
810
-
(Figure 28-7)
811
-
(Figure 28-8)
813
-
(Figure 28-9)
813
-
(Figure 28-10)
815
-
30.3 Historical Top Chart
816
-
Chapter 31 Traffic Grapher
817
-
Traffic Grapher
818
-
31.1 WAN Traffic
819
-
(Figure 29-2)
820
-
31.2 Policy-Based Traffic
823
-
(Figure 29-4)
824
-
Chapter 32 Diagnostic Tools
827
-
32.1 Ping
828
-
Figure 30-2 Ping Result
829
-
32.2 Traceroute
831
-
32.3 Packet Capture
833
-
Chapter 33 Wake-On-LAN
834
-
33.1 Example
835
-
Chapter 34 Status
836
-
34.1 Interface
837
-
34.2 System Info
839
-
34.3 Authentication
841
-
34.4 ARP Table
842
-
34.5 Sessions Info
845
-
(Figure 32-10)
846
-
Figure 32-10 The System Info
846
-
34.6 DHCP Clients
847
-
34.7 Host Info
848
Komentáře k této Příručce