CyberGuard SG300 User Manual

Browse online or download User Manual for Hardware firewalls CyberGuard SG300. CyberGuard SG300 User manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 206
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User Manual

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084 Email: [email protected]

Page 2 - Contents

Introduction 6 Note Not all the LEDs described below are present on all CyberGuard SG appliance models. Also, labels vary from model to model. Label

Page 3

Firewall 96 Configuring the UPnP Gateway The UPnP Gateway needs to be run on a pair of interfaces, the external interface and the internal interface.

Page 4

Firewall 97 In each case there are two distincts parts to a tunnel, the source half and the destination half. The source half listens for network con

Page 5 - 1. Introduction

Firewall 98 Access Control and Content Filtering Inappropriate Internet use during work hours can have a serious effect on productivity. With the Cyb

Page 6 - Figure 1-1

Firewall 99 Users without web proxy access will see a screen similar to the figure below when attempting to access external web content. Figure 6-8 N

Page 7

Firewall 100 Browser setup The example given is for Microsoft Internet Explorer 6. Instructions for other browsers should be similar, refer to their

Page 8 - Document Conventions

Firewall 101 Figure 6-10 In the row labeled HTTP, enter your CyberGuard SG appliance’s LAN IP address in the Proxy address to use column, and 81 in t

Page 9

Firewall 102 Web lists Access will be denied to any web address (URL) that contains text entered in the Block List, e.g. entering xxx will block any U

Page 10 - Rear panel

Firewall 103 Content Note Content filtering is only available after your have registered your CyberGuard SG appliance and activated your content filte

Page 11 - Enviromental features

Firewall 104 Reports Warning The correct time/date must be set on your CyberGuard SG appliance for reporting to work. The most effective way to do th

Page 12 - Front panel LEDs

105 ZoneAlarm This facility denies Internet access to machines your LAN that are not running the ZoneAlarm Pro personal firewall software. Running p

Page 13 - Front panel

Introduction 7 CyberGuard SG Gateway Appliance Features Internet link features • 10/100baseT Ethernet port (Internet/WAN) • Serial port • Front pan

Page 14 - LAN/DMZ link features

Intrusion Detection 106 7. Intrusion Detection Note Advanced Intrusion Detection is only available on SG575 models. Other models offer Basic Instrus

Page 15 - Figure 1-4

Intrusion Detection 107 The benefits of using an IDS External attackers attempting to access desktops and servers on the private network from the Inte

Page 16 - Environmental features

Intrusion Detection 108 Basic Intrusion Detection and Blocking The following figure shows the Intrusion Detection and Blocking (IDB) configuration: F

Page 17 - 2. Getting Started

Intrusion Detection 109 Several shortcut buttons also provide pre-defined lists of services to monitor. The basic button installs a bare bones select

Page 18

Intrusion Detection 110 Advanced Intrusion Detection Advanced Intrusion Detection is based on the tried and tested Snort v2 IDS. It is able to detect

Page 19

Intrusion Detection 111 Advanced Intrusion Detection configuration Figure 7-2 Check Enabled, and select the Interface/network port to monitor. This

Page 20 - Figure 2-1

Intrusion Detection 112 Note The more rule sets that are selected, the greater load is imposed on the CyberGuard SG appliance. Therefore a conservat

Page 21 - Figure 2-2

Intrusion Detection 113 Setting up the analysis server Specific open source tools are required to be installed on the Analysis server for a straightfo

Page 22

114 PHPlot graph library for charts written in PHP http://www.phplot.com/ ACID analysis console http://www.andrew.cmu.edu/~rdanyliw/snort/acid-0.9.6

Page 23 - Figure 2-3

Web Cache 115 8. Web Cache Note The web cache is only available on SG575 models. Web browsers running on PCs on your LAN can use the CyberGuard SG ap

Page 24 - Figure 2-4

Introduction 8 Your CyberGuard SG Rack Mount Appliance CyberGuard SG rack mount appliances include: • SG710 • SG710+ The following items are include

Page 25 - Direct connection

Web Cache 116 Web Cache Setup Select Web cache under Networking. A page similar to the following will be displayed. Figure 8-1 Check Enable to enabl

Page 26

Web Cache 117 Network Shares Typically, you will find the CyberGuard SG appliance’s web cache most useful when utilizing a Network Share for additiona

Page 27 - LAN with no DHCP server

Web Cache 118 Create the network share Figure 8-2 Launch Windows Explorer (Start -> (All) Programs -> Accessories -> Windows Explorer) and o

Page 28

Web Cache 119 Set the CyberGuard SG appliance to use the network share Check Use share. Enter the location of the network share in the format: \\H

Page 29

Web Cache 120 Peers The CyberGuard SG appliance’s web cache can be configured to share cached objects with, and access objects cached by, other web ca

Page 30 - Figure 2-6

Virtual Private Networking 121 9. Virtual Private Networking Virtual Private Networking (VPN) enables two or more locations to communicate securely

Page 31

Virtual Private Networking 122 Figure 9-1 PPTP Client Setup The PPTP client enables the CyberGuard SG appliance to establish a VPN to a remote networ

Page 32

Virtual Private Networking 123 If the remote VPN is already up and running, check Start Now to establish the connection immediately as shown in the fo

Page 33 - Figure 2-7

Virtual Private Networking 124 PPTP Server Setup The CyberGuard SG appliance includes a PPTP Server, a virtual private network server that supports up

Page 34 - Figure 2-8

Virtual Private Networking 125 Enable and configure the PPTP VPN server The following figure shows the PPTP server setup: Figure 9-3 To enable and co

Page 35 - Figure 2-9

Introduction 9 Front panel The front panel contains two 10/100 Ethernet four port switches (A and B), two 10/100 Ethernet ports (C and D) and analog/

Page 36 - Figure 2-10

Virtual Private Networking 126 The following table describes the fields in the VPN Setup screen and the options available when enabling and configurin

Page 37

Virtual Private Networking 127 Configuring user accounts for VPN server After setting up the VPN server, select Continue and to show the PPTP VPN Serv

Page 38

Virtual Private Networking 128 The field options in the Add New Account are detailed in the following table. Field Description Username Username for

Page 39

Virtual Private Networking 129 Configuring the remote VPN client The remote VPN clients can now be configured to securely access the local network. Y

Page 40

Virtual Private Networking 130 Windows 95, Windows 98 and Windows Me From the Dial-Up Networking folder, double-click Make New Connection. Type Cyber

Page 41

Virtual Private Networking 131 Click TCP/IP Settings. Confirm that the Server Assigned IP Address, Server Assigned Name Server Address, Use IP Header

Page 42 - Figure 2-12

Virtual Private Networking 132 Double-click Make New Connection from the main windows. Click Next to show the Network Connection Type window: Figure

Page 43 - CyberGuard SG PCI Appliances

Virtual Private Networking 133 Figure 9-11 Enter an appropriate name for your connection and click Finish. Your VPN client is now set up and ready to

Page 44 - Figure 2-13

Virtual Private Networking 134 Connecting the remote VPN client Verify that you are connected to the Internet, or have set up your VPN connection to a

Page 45 - Figure 2-14

Virtual Private Networking 135 IPSec Setup CyberGuard SG appliance to CyberGuard SG appliance There are many possible configurations in creating an IP

Page 46

Introduction 10 CyberGuard SG Rack Mount Appliance Features Internet link features • Two 10/100baseT Ethernet ports (C, D) • Two GbE ports (E, F – S

Page 47 - Figure 2-15

Virtual Private Networking 136 Figure 9-13 Check the Enable IPSec checkbox. Select the type of IPSec endpoint the CyberGuard SG appliance has on its

Page 48 - Figure 2-16

Virtual Private Networking 137 Warning It may be necessary to reduce the MTU of the IPSec interface if large packets of data are not being transmitte

Page 49 - Figure 2-17

Virtual Private Networking 138 Select the Internet port the IPSec tunnel is to go out on. The options will depend on what is currently configured on

Page 50 - Figure 2-18

Virtual Private Networking 139 • x.509 Certificates are used to authenticate the remote party against a Certificate Authority's (CA) certificate

Page 51 - Appliance

Virtual Private Networking 140 In this example, select the be a route to the remote party option. Click the Continue button to configure the Local End

Page 52 - 3. Network Connections

Virtual Private Networking 141 Note This option will not be available when the CyberGuard SG appliance has a static IP address and the remote party h

Page 53 - Switch A – B, Port C – F

Virtual Private Networking 142 Other options The following options will become available on this page depending on what has been configured previousl

Page 54 - Bridged LAN

Virtual Private Networking 143 o des-md5-96 uses the encryption transform following the DES standard in Cipher-Block-Chaining mode with authenticatio

Page 55 - Internet Connection Methods

Virtual Private Networking 144 Other options The following options will become available on this page depending on what has been configured previousl

Page 56

Virtual Private Networking 145 TCGID [Siemens] Trust Center Global ID The attribute/value pairs must be of the form attribute=value and be separate

Page 57 - Bridged Internet

Introduction 11 Your CyberGuard SG PCI Appliance CyberGuard SG PCI appliances include: • PCI630 • PCI635 The following items are included with your

Page 58 - COM/Modem

Virtual Private Networking 146 Phase 1 settings Figure 9-17 Set the length of time before Phase 1 is renegotiated in the Key lifetime (m) field. The

Page 59

Virtual Private Networking 147 Warning The secret must be entered identically at each end of the tunnel. The tunnel will fail to connect if the secr

Page 60 - Services on the DMZ Network

Virtual Private Networking 148 Phase 2 settings page Figure 9-18 Set the length of time before Phase 2 is renegotiated in the Key lifetime (m) field.

Page 61

Virtual Private Networking 149 Other options The following options will become available on this page depending on what has been configured previousl

Page 62 - Bridging

Virtual Private Networking 150 Check the Enable IPSec checkbox. Select the type of IPSec endpoint the CyberGuard SG appliance has on its Internet inte

Page 63 - Internet Failover

Virtual Private Networking 151 Select the type of routing the tunnel will be used as. In this example, select the be a route to the remote party opti

Page 64 - Figure 3-6

Virtual Private Networking 152 Enter a secret in the Preshared Secret field. This must remain confidential. In this example, enter the Preshared Sec

Page 65 - Figure 3-7

Virtual Private Networking 153 Tunnel List Figure 9-20 Connection Once a tunnel has been configured, an entry with the tunnel name in the Connection

Page 66 - Route management

Virtual Private Networking 154 Click Remote Party to sort the tunnel list by the remote party ID/name/address. Status Tunnels that use Automatic Keyin

Page 67

Virtual Private Networking 155 Figure 9-21 Interfaces Loaded lists the CyberGuard SG appliance's interfaces which IPSec will use. Phase 2 Ciph

Page 68 - Figure 3-9

Introduction 12 CyberGuard SG PCI Appliance Features Network link features • 10/100baseT Ethernet port • Ethernet LEDs (link, activity) Environmenta

Page 69 - Interface aliases

Virtual Private Networking 156 Diffie Hellman Groups Loaded lists the Diffie Hellman groups and Oakley group extensions that can be configured for bo

Page 70 - QoS Traffic Shaping

Virtual Private Networking 157 • The Phase 2 proposal wanted. The line ESP algorithms wanted reads 3_000-2; pfsgroup=2. The 3_000 refers to cipher

Page 71 - 4. Dialin Setup

Virtual Private Networking 158 Certificate Management x.509 Certificates can be used to authenticate IPSec endpoints during tunnel negotiation for Aut

Page 72 - Dialin Setup

Virtual Private Networking 159 To extract the local private key certificate type, enter the following at the Windows command prompt: openssl pkcs12 -n

Page 73

Virtual Private Networking 160 4. Create the self-signed root CA certificate: openssl req -config openssl.cnf -new -x509 -keyout rootCA/ca.key -out r

Page 74 - Dialin User Accounts

Virtual Private Networking 161 Adding certificates To add certificates to the CyberGuard SG appliance, click the IPSec link on the left side of the We

Page 75 - Account list

Virtual Private Networking 162 Adding a CA or CRL certificate Click the Add new CA or CRL Certificate tab. A window similar to the following will be

Page 76 - Figure 4-3

Virtual Private Networking 163 Adding a local certificate 1 Click the Add new Local Certificate tab. A window similar to the following will be displ

Page 77 - Remote User Configuration

Virtual Private Networking 164 Figure 9-25 The certificate names will be displayed under the appropriate certificate type. Clicking the Delete butto

Page 78

Virtual Private Networking 165 The remote party does not have a tunnel configured correctly because: o The tunnel has not been configured. o The Pha

Page 79 - Windows 2000/XP

Getting Started 13 2. Getting Started This chapter provides step-by-step instructions for installing your CyberGuard SG appliance into your network a

Page 80 - Figure 4-8

Virtual Private Networking 166 Solution: Confirm that the remote party has IPSec and the tunnel enabled and has an Internet IP address. Ensure that t

Page 81 - Figure 4-10

Virtual Private Networking 167 Set up LMHOST files on remote hosts to resolve names to IP adresses. • Symptom: Tunnel comes up but the application

Page 82 - 5. DHCP Server

Virtual Private Networking 168 GRE The GRE configuration of the CyberGuard SG appliance allows you to build GRE tunnels to other devices that support

Page 83 - Figure 5-2

Virtual Private Networking 169 On the Brisbane end, click GRE Tunnels from the VPN menu. Enter the following details: GRE Tunnel Name: to_slough

Page 84

Virtual Private Networking 170 Click Add. Click Add/Remove under Remote Networks and enter: Remote subnet/netmask: 192.168.1.0 / 255.255.255.0 C

Page 85 - Figure 5-3

Virtual Private Networking 171 Enter the IP Address / Netmask of 10.254.0.1 / 255.255.255.255 at the Slough end, and 10.254.0.2 / 255.255.255.255 at t

Page 86 - DHCP Proxy

Virtual Private Networking 172 Create the GRE tunnel. Select GRE Tunnels from the left hand menu. For the Slough end enter the IP addresses below.

Page 87 - 6. Firewall

Virtual Private Networking 173 Troubleshooting • Symptom: Cannot ping a host on the other side of the GRE tunnel. Ensure that there is a route set u

Page 88 - Administration services

Virtual Private Networking 174 L2TP The Layer Two Tunneling Protocol was developed by Microsoft and Cisco as a multi-purpose network transport protoco

Page 89 - Figure 6-2

Virtual Private Networking 175 L2TP server The L2TP Server runs in a similar way to the PPTP Server. A range of IP addresses is allocated, and then u

Page 90 - SSL/HTTPS (Secure HTTP)

Getting Started 14 CyberGuard SG Gateway Appliances Set up a PC to Connect to the Web Management Console The CyberGuard SG appliance ships with initia

Page 91 - SSL Certificate Setup

System 176 10. System Date and Time Set date and time If you have a Javascript enabled web browser, you will be able to click the top Set Date and Ti

Page 92 - Packet Filtering

System 177 Figure 10-1 Locality Select your region then select your location within said region. The system clock will subsequently show local time.

Page 93 - Addresses

System 178 Users User accounts on a CyberGuard SG appliance allow administrative duties to be spread amongst a number of different people according to

Page 94 - Service groups

System 179 Administration A user with the administration access control is permitted to edit any configuration file on the CyberGuard SG appliance. I

Page 95 - Figure 6-6

System 180 Internet access (via access controls) A user with this access control is permitted controlled access to the web through the CyberGuard SG a

Page 96

System 181 Figure 10-3 Network tests Basic network diagnostic tests (ping, traceroute) can be accessed by clicking the Network Tests tab at the top o

Page 97 - Source NAT

System 182 Advanced The options on the Advanced page are intended for network administrators and advanced users only. Warning Altering the advanced co

Page 98 - 1-to-1 NAT

System 183 You may also upload additional configuration files from your computer to the CyberGuard SG appliance under Upload file. To backup to an enc

Page 99

System 184 The majority of Linux users will already have a TFTP server installed as part of their distribution, which must be configured and running.

Page 100 - Port Tunnels

185 Technical Support The System menu contains an option detailing support information for your CyberGuard SG appliance. This page provides basic tro

Page 101

Getting Started 15 Connect the supplied power adapter to the CyberGuard SG appliance. If you are using the SG530, SG550, SG570 or SG575 model, connect

Page 102 - User authentication

Appendix A – IP Address Ranges 186 Appendix A – IP Address Ranges IP ranges are fields that allow multiple IP addresses to be specified using a shor

Page 103 - Figure 6-8

Appendix B – Terminology 187 Appendix B – Terminology This section explains terms that are commonly used in this document. Term Meaning ADSL Asymmet

Page 104 - Browser setup

Appendix B – Terminology 188 Certificates A digitally signed statement that contains information about an entity and the entity's public key, th

Page 105 - IP lists

Appendix B – Terminology 189 Extranet A private network that uses the public Internet to securely share business information and operations with supp

Page 106 - Web lists

Appendix B – Terminology 190 IPSec tunnel The IPSec connection to securely link two private parties across insecure and public channels. IPSec with D

Page 107 - Content

Appendix B – Terminology 191 NAT Network Address Translation. The translation of an IP address used on one network to an IP address on another netwo

Page 108 - Categories

Appendix B – Terminology 192 Router A network device that moves packets of data. A router differs from hubs and switches because it is "intelli

Page 109 - Policy enforcement

193 x.509 Certificates An x.509 certificate includes the format of the certificate, the serial number of the certificate, the algorithm used to sign

Page 110 - 7. Intrusion Detection

Appendix C – System Log 194 Appendix C – System Log Access Logging It is possible to log any traffic that arrives at or traverses the CyberGuard SG ap

Page 111 - The benefits of using an IDS

Appendix C – System Log 195 Commonly used interfaces are: eth0 the LAN port eth1 the WAN/Internet port pppX e.g

Page 112 - Figure 7-1

Contents 1. Introduction...1 CyberGuard SG Gateway Appli

Page 113

Getting Started 16 Next, you must modify your PC’s network settings to enable it to communicate with the CyberGuard SG appliance. Click Start -> Se

Page 114 - Advanced Intrusion Detection

Appendix C – System Log 196 A typical Default Deny: will thus look similar to the following: Mar 27 09:31:19 2003 klogd: Default deny: IN=eth1 OUT=MA

Page 115 - Figure 7-2

Appendix C – System Log 197 To log permitted inbound access requests to services hosted on the CyberGuard SG appliance, the rule should look something

Page 116 - Figure 7-3

Appendix C – System Log 198 For example, to log all inbound requests from the IP address 5.6.7.8 to the mail server (port 25) on the machine flubber o

Page 117

Appendix C – System Log 199 If we just wanted to look at traffic that went out to the IPSec world, we could use: iptables -I FORWARD -j LOG -o ipsec+

Page 118

Appendix C – System Log 200 Administrative Access Logging When a user tries to log onto the Web Management Console web administration pages, one of th

Page 119 - 8. Web Cache

Appendix D – Firmware Upgrade Practices and Precautions 201 Appendix D – Firmware Upgrade Practices and Precautions Prior performing any firmware upgr

Page 120 - Web Cache Setup

Appendix D – Firmware Upgrade Practices and Precautions 202 If you encounter any problems, reset the device to its factory default settings and reconf

Page 121 - Network Shares

Getting Started 17 Select Use the following IP address and enter the following details: IP address: 192.168.0.100 Subnet mask: 255.255.255.0 Defa

Page 122 - Create the network share

Getting Started 18 Select Quick Setup Wizard from the center of the page. You will be prompted to log in. Enter the initial user name and password fo

Page 123 - Figure 8-3

Getting Started 19 The Quick Setup Wizard will display. Figure 2-3 Hostname: You may change the name the CyberGuard SG appliance knows itself by. T

Page 124

Getting Started 20 Figure 2-4 Note This page will only display if you previously selected Manual configuration. Otherwise skip to the next step. Ent

Page 125

Getting Started 21 Set up Internet Connection Settings Select your Internet connection type and click Next. Figure 2-5 Cable modem If connecting usin

Page 126 - PPTP Client Setup

Getting Started 22 Note For detailed help for each of these options, please refer to the the chapter entitled Network Connections. Once the CyberGua

Page 127 - Figure 9-2

Getting Started 23 LAN with a DHCP server Add a lease to your existing DHCP server to reserve the IP address you chose in STEP 3 for the CyberGuard SG

Page 128 - PPTP Server Setup

Getting Started 24 To manually set up each Windows PC on your network: Click Start -> Settings -> Control Panel and double click Network Connect

Page 129 - Figure 9-3

Getting Started 25 Alternatively, to activate your CyberGuard SG appliance's DHCP server: Launch Internet Explorer (or your preferred web browser

Page 130

Internet...51 Internet Connection Metho

Page 131 - Figure 9-4

Getting Started 26 Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me, TCP/IP -> [your network card name] if there are multiple

Page 132

Getting Started 27 CyberGuard SG Rack Mount Appliances Set up a PC to Connect to the Web Management Console The CyberGuard SG appliance ships with ini

Page 133 - Figure 9-5

Getting Started 28 Note It is recommended that you perform the initial setup steps with the CyberGuard SG appliance connected to a single PC only. Ho

Page 134 - Figure 9-6

Getting Started 29 Figure 2-7 Select Use the following IP address and enter the following details: IP address: 192.168.0.100 Subnet mask: 255.25

Page 135 - Windows 2000

Getting Started 30 Set up the Password and LAN Connection Settings Launch Internet Explorer (or your preferred web browser) and navigate to 192.168.0.

Page 136 - Figure 9-10

Getting Started 31 Note Before continuing, take some time to decide on which roles you will be assigning to your CyberGuard SG appliance’s network po

Page 137 - Windows XP

Getting Started 32 It is recommended that you statically configure your CyberGuard SG appliance’s LAN connection settings rather than rely on an exist

Page 138

Getting Started 33 Note Do not click Reboot Now. Rebooting your CyberGuard SG appliance at this point may cause it to become uncontactable. Set up I

Page 139 - Set up the Branch Office

Getting Started 34 Direct connection If you have a direct connection to the Internet (e.g. a leased line), enter the IP settings provided by your ISP.

Page 140 - Figure 9-13

Getting Started 35 LAN with a DHCP server Add a lease to your existing DHCP server to reserve the IP address you chose in STEP 3 for the CyberGuard SG

Page 141 - Tunnel settings page

Peers ...120 Set up LAN PCs to Use the

Page 142

Getting Started 36 To manually set up each Windows PC on your network: Click Start -> Settings -> Control Panel and double click Network Connect

Page 143

Getting Started 37 Alternatively, to activate your CyberGuard SG appliance's DHCP server: Launch Internet Explorer (or your preferred web browser

Page 144 - Local endpoint settings

Getting Started 38 Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me, TCP/IP -> [your network card name] if there are multiple

Page 145

Getting Started 39 CyberGuard SG PCI Appliances Install your CyberGuard SG Appliance in a Spare PCI Slot Power off your PC and remove its cover. Sele

Page 146 - Other options

Getting Started 40 Next, you must modify your PC’s network settings to enable it to communicate with the CyberGuard SG appliance. Click Start -> Se

Page 147 - Figure 9-16

Getting Started 41 Set up the Password and Network Connection Settings Launch Internet Explorer (or your preferred web browser) and navigate to 192.16

Page 148

Getting Started 42 Note The purpose of this step is to configure the IP address for the Web Management Console. For convenience, this will generally

Page 149

Getting Started 43 The first IP address will be used by the Web Management Console. Figure 2-15 Enter this IP address and the subnet mask for your

Page 150 - Phase 1 settings

Getting Started 44 Figure 2-16 Enter the following details: • IP address the second free IP addresses that is part of the subnet range of your LAN.

Page 151

Getting Started 45 Alternatively, to set up your CyberGuard SG appliance and PC for auto-configuration: Before continuing, ensure your DHCP server has

Page 152 - Phase 2 settings page

Introduction 1 1. Introduction This chapter provides an overview of your CyberGuard SG appliance’s features and capabilities, and explains how to ins

Page 153 - Enabling IPSec

Getting Started 46 Next, configure your PC to obtain its network settings automatically from your LAN DHCP server. Click Start -> Settings -> C

Page 154

Getting Started 47 Disabling the Reset Button on your CyberGuard SG PCI Appliance For convenience, the CyberGuard SG appliance ships with the rear pan

Page 155 - Phase 1 settings page

Network Connections 48 3. Network Connections This chapter describes the Network Setup section of the Web Management Console. Here you can configure

Page 156

Network Connections 49 If a port is experiencing difficulties auto-negotiating with another device, Ethernet speed and duplex may be set manually by s

Page 157 - Tunnel List

Network Connections 50 LAN Network settings for the LAN network port may be assigned statically, or dynamically by a DHCP server (Direct LAN). Altern

Page 158

Network Connections 51 Internet The CyberGuard SG appliance can connect to the Internet using an external dialup analog modem, an ISDN modem, a perman

Page 159 - Figure 9-21

Network Connections 52 Cable Select your cable ISP from the list and click Next. If your provider does not appear, select Generic Cable Modem Provide

Page 160

Network Connections 53 Direct Internet If you have a direct connection to the Internet, select this option. Typically your ISP will have provided you

Page 161 - Dynamic DNS Support

Network Connections 54 Failover Direct/Cable/ADSL Internet Refer to the section entitled Internet Failover later in this chapter. COM/Modem With a mo

Page 162 - Certificate Management

Network Connections 55 The following table describes the fields and explains how to configure the dial up connection to your ISP. Field Description N

Page 163 - Creating certificates

Introduction 2 The following figure shows how your CyberGuard SG appliance interconnects. Figure 1-1 CyberGuard SG Rack Mount Appliances The CyberGua

Page 164

Network Connections 56 Dialin access Select Dialin Access to use this port as a dialin server to allow remote users to connect to your local network.

Page 165 - Adding certificates

Network Connections 57 If the servers on the DMZ have public IP addresses, you need to add packet filtering rules to allow access to the services. Se

Page 166 - Figure 9-23

Network Connections 58 Bridging The CyberGuard SG may be configured as a network bridge. You may bridge between network ports (e.g. Internet – LAN) o

Page 167 - Adding a local certificate

Network Connections 59 Warning The unit may take up to 30 seconds longer than normal to reboot after bridging has been enabled. Load Balancing If you

Page 168 - Troubleshooting

Network Connections 60 Enable the primary connection for failover Set up your primary broadband Internet connection as described in the Internet secti

Page 169

Network Connections 61 Note The Failover Cable/DSL/Direct/Dialout Internet option will not appear as an available Configuration until a primary Intern

Page 170

Network Connections 62 Routes Additional routes The Additional routes feature allows expert users to add additional static routes for the CyberGuard S

Page 171

Network Connections 63 Advanced The following figure shows the advanced IP configuration: Figure 3-8 Hostname The Hostname is a descriptive name for

Page 172 - Setting up a GRE tunnel

Network Connections 64 Figure 3-9 Network Address Translation (NAT/masquerading) The CyberGuard SG appliance can utilize IP Masquerading (a simple fo

Page 173 - Figure 9-26

Network Connections 65 Dynamic DNS A dynamic DNS service is useful when you don’t have a static Internet IP address, but need to remain contactable by

Page 174 - GRE over IPSec

Introduction 3 It provides central sites the capacity to securely connect hundreds of mobile and remote employees. The SG710 includes a high-performa

Page 175 - Figure 9-28

Network Connections 66 Change MAC address On rare occasions it may be necessary to change the Ethernet hardware or MAC Address of your CyberGuard SG a

Page 176 - Figure 9-29

Dialin Setup 67 4. Dialin Setup CyberGuard SG appliance enables remote and secure access to your office network. This chapter shows how to set up th

Page 177

Dialin Setup 68 Dialin Setup Once an analog modem or phone line has been attached, enable the CyberGuard SG appliance’s COM port or internal modem for

Page 178 - L2TP VPN client

Dialin Setup 69 The following table describes the fields on the Dial-In Setup page: Field Description IP Address for Dialin clients Dialin users

Page 179 - L2TP server

Dialin Setup 70 Dialin User Accounts User accounts must be set up before remote users can dialinto the CyberGuard SG appliance. The following figure

Page 180 - 10. System

Dialin Setup 71 The following figure shows the user maintenance screen: Figure 4-3 Account list As new dialin user accounts are added, they are displ

Page 181 - Locality

Dialin Setup 72 If the change is unsuccessful, an error is reported as shown in the following figure: Figure 4-3 When you have finished adding and mo

Page 182 - Figure 10-2

Dialin Setup 73 Remote User Configuration Remote users can dialin using the CyberGuard SG appliance using the standard Windows Dial-Up Networking soft

Page 183 - User settings

Dialin Setup 74 Check the Log on to network and Enable software compression checkboxes. If your CyberGuard SG appliance dialin server requires MSCHAP

Page 184 - Diagnostics

Dialin Setup 75 Windows 2000/XP To configure a remote access connection on a PC running Windows 2000/XP, click Start, Settings, Network and Dial-up Co

Page 185 - Network tests

Introduction 4 Bridged mode By default, the CyberGuard SG PCI appliance operates in bridged mode. This is distinctly different from the NAT/masquerad

Page 186 - Advanced

Dialin Setup 76 Figure 4-7 Tick Use dialing rules to enable you to select a country code and area code. This feature is useful when using remote acc

Page 187 - Flash upgrade

77 Figure 4-9 Enter a name for the connection and click Finish to complete the configuration. By ticking Add a shortcut to my desktop, an icon for

Page 188 - Reset button

DHCP Server 78 5. DHCP Server Your CyberGuard SG appliance can act as a DHCP server for machines on your local network. To configure your CyberGuard

Page 189 - Technical Support

DHCP Server 79 To configure the DHCP Server, follow these instructions. • Check the Enable DHCP Server checkbox. • Enter the Subnet and netmask of t

Page 190

DHCP Server 80 Subnet List The Subnet List will display the status of the DHCP server. Interface Once a subnet has been configured, the port which th

Page 191 - Appendix B – Terminology

DHCP Server 81 Figure 5-3 For each IP address that the DHCP server services, the Status, Hostname, MAC Address will be shown. There is also be an opt

Page 192

82 DHCP Proxy The DHCP proxy allows the CyberGuard SG appliance to forward DHCP requests from the LAN to an external server for resolution. This all

Page 193

Firewall 83 6. Firewall The CyberGuard SG appliance is equipped with a fully featured, stateful firewall. The firewall allows you to control both in

Page 194

Firewall 84 Administration services The following figure shows the Administration Services page: Figure 6-1 By default the CyberGuard SG appliance ru

Page 195

Firewall 85 CyberGuard SG Administrative Web Server Clicking the CyberGuard SG Web Server tab takes you to the page to configure the administrative we

Page 196

Introduction 5 Your CyberGuard SG Gateway Appliance CyberGuard SG gateway appliances include: • SG300 • SG530 • SG550 • SG570 • SG575 The followi

Page 197

Firewall 86 The Web Management Console is usually accessed on the default HTTP port (i.e. 80). After changing the web server port number, you must inc

Page 198 - Appendix C – System Log

Firewall 87 Once valid SSL certificates have been uploaded, the CyberGuard SG administrative web server can operate in one of one of 3 different modes

Page 199

Firewall 88 Packet Filtering By default, your CyberGuard SG appliance allows network traffic as shown in the following table: You can configure y

Page 200 - Creating Custom Log Rules

Firewall 89 Before configuring a filter or NAT rule, you need to define the addresses and service groups. Addresses Click the Addresses tab. Any addr

Page 201

Firewall 90 Service groups Click the Service Groups tab. Any addresses that have already been defined will be displayed. Click New to add a new serv

Page 202

Firewall 91 Rules Once addresses and services have been defined, you can create filter rules. Click Rules. Any rules that have already been defined

Page 203 - Rate Limiting

Firewall 92 The Incoming Interface is the interface/network port that the CyberGuard SG appliance received the network traffic on. The Outgoing Interf

Page 204 - Boot Log Messages

Firewall 93 Source Address The address from which the request originated (for port forwarding you may specify this to restrict the internal service t

Page 205 - Practices and Precautions

Firewall 94 Source Address The address from which the request originated (for masquerading this will typically be a private LAN or DMZ address) Outgo

Page 206

Firewall 95 Warning Leaving Create a corresponding ACCEPT firewall rule will allow all traffic into and out from the specified private address, i.e.

Comments to this Manuals

No comments