background image

 

www.zyxel.com

Vantage CNM

Centralized Network Management

User’s Guide

Version 3.0
11/2007
Edition 1

Summary of Contents for Centralized Network Management Vantage CNM

Page 1: ...www zyxel com Vantage CNM Centralized Network Management User s Guide Version 3 0 11 2007 Edition 1...

Page 2: ......

Page 3: ...gy and the devices you want to manage Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains information on setting up and conn...

Page 4: ...ut This User s Guide Vantage CNM User s Guide 4 The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road II Science Based Industrial Park Hsinchu 300 Taiwan E mail techwriters zyxel com...

Page 5: ...Guide Product labels screen names field labels and field choices are all in bold font A key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on y...

Page 6: ...s Guide 6 Icons Used in Figures Figures in this User s Guide may use the following generic icons Device icons are not an exact representations of your devices Device example Computer Notebook computer...

Page 7: ...anced Settings 185 Device Log 209 Device Configuration Management 213 Firmware Management 235 License Management 241 VPN Management 247 VPN Community 249 Installation Report 255 VPN Monitor 257 Monito...

Page 8: ...Contents Overview Vantage CNM User s Guide 8 About Vantage CNM 321 Account Management 323 Group 325 Account 329 Troubleshooting 333 Troubleshooting 335 Appendices and Index 339...

Page 9: ...Menu Bar 36 2 2 Title Bar 37 2 3 Device Window 37 2 3 1 Topology 37 2 3 2 Device Search 45 2 4 Navigation Panel and Configuration Window 45 2 5 Security Risk Pop up Messages in Internet Explorer 7 0...

Page 10: ...Security Settings 109 6 1 Firewall 109 6 1 1 Default Rule 109 6 1 2 Rule Summary 111 6 1 3 Add Edit 113 6 1 4 Anti Probing 116 6 1 5 Threshold 117 6 1 6 Service 119 6 1 7 Add Edit Service 119 6 2 VPN...

Page 11: ...ontent Filter Policy Schedule 177 6 14 Content Filter Objects 179 6 15 Content Filtering Cache 180 6 16 X Auth 181 6 17 Local User Database 181 6 18 RADIUS 182 Chapter 7 Device Advanced Settings 185 7...

Page 12: ...le Management 224 9 5 1 Backup Restore 224 9 5 2 Signature Profile Backup Device 225 9 5 3 Signature Profile Restore Folder 226 9 5 4 Reset to Factory 227 9 6 Configuration Building Block 228 9 7 Add...

Page 13: ...Monitor 257 14 1 VPN Monitor 257 14 2 By Community 257 14 2 1 By Community Show Detail 258 14 2 2 By Community Show Detail Diagnostic 259 14 3 By Device 261 14 3 1 VPN Tunnel Status 261 14 3 2 Search...

Page 14: ...guration File Restore Report 286 18 5 Signature Profile Backup Report 288 18 6 Signature Profile Restore Report 289 Chapter 19 CNM Logs 291 19 1 Vantage CNM Logs 291 19 1 1 CNM Logs 291 Chapter 20 VRP...

Page 15: ...2 Maintenance 313 22 1 System Maintenance 313 22 1 1 Backup 314 Chapter 23 Device Owner 315 23 0 1 Add Edit a Device Owner 315 Chapter 24 Vantage CNM Software Upgrade 317 Chapter 25 License Upgrade 31...

Page 16: ...dex 339 Appendix A Product Specifications 341 Appendix B Setting up Your Computer s IP Address 345 Appendix C Pop up Windows Java Scripts and Java Permissions 361 Appendix D IP Addresses and Subnettin...

Page 17: ...r Save BB 53 Figure 22 Device Operation Device Configuration Load or Save BB Load a BB 54 Figure 23 Device Operation Device Configuration Load or Save BB Save as a BB 54 Figure 24 Device Operation Dev...

Page 18: ...e Configuration Security Firewall Threshold 117 Figure 55 Device Operation Device Configuration Security Firewall Service 119 Figure 56 Device Operation Device Configuration Security Firewall Service...

Page 19: ...ort 191 Figure 91 Device Operation Device Configuration Advanced NAT Trigger Port Edit 192 Figure 92 Device Operation Device Configuration Advanced Static Route 194 Figure 93 Device Operation Device C...

Page 20: ...232 Figure 122 Device Operation Configuration Management Building Block Component BB Add Edit Save as 233 Figure 123 Device Operation Firmware Management Firmware List 235 Figure 124 Device Operation...

Page 21: ...File Backup Restore Report Backup Report Group 284 Figure 161 Log Report Operation Report Configuration File Backup Restore Report Backup Report Group Show Detail 286 Figure 162 Log Report Operation...

Page 22: ...es 350 Figure 199 Windows XP Internet Protocol TCP IP Properties 351 Figure 200 Windows XP Advanced TCP IP Properties 352 Figure 201 Windows XP Internet Protocol TCP IP Properties 353 Figure 202 Macin...

Page 23: ...1 385 Figure 234 Certificate Import Wizard 2 385 Figure 235 Certificate Import Wizard 3 386 Figure 236 Root Certificate Store 386 Figure 237 Certificate General Information after Import 387 Figure 238...

Page 24: ...Vantage CNM User s Guide 24...

Page 25: ...P PPPoE ZyNOS ZyWALL one WAN port 72 Table 20 Device Operation Device Configuration Network WAN ISP PPTP ZyNOS ZyWALL one WAN port 75 Table 21 Device Operation Device Configuration Network WAN WAN1 2...

Page 26: ...on Device Configuration Security Anti Spam General 143 Table 56 Device Operation Device Configuration Security Anti Spam External DB 146 Table 57 Device Operation Device Configuration Security Anti Sp...

Page 27: ...iguration Advanced Remote Management 205 Table 92 Device Operation Device Configuration Device Log Log Settings 211 Table 93 Device Operation Configuration Management Synchronization 214 Table 94 Devi...

Page 28: ...e 123 VPN Management VPN Monitor By Community 257 Table 124 VPN Management VPN Monitor By Community Show Detail 258 Table 125 VPN Management VPN Monitor By Community Show Detail Diagnostic Logs 260 Ta...

Page 29: ...tem Setting Device Owner 315 Table 158 CNM System setting Device Owner Add Edit 316 Table 159 CNM System Setting License 319 Table 160 Account Management Group 326 Table 161 Account Management Group A...

Page 30: ...Vantage CNM User s Guide 30...

Page 31: ...s example you use the Vantage CNM web configurator A to access the Vantage CNM server B The Vantage CNM server is connected to the devices C and you can Monitor all the devices in the network and rece...

Page 32: ...ure and to manage Vantage CNM more effectively Change the root password Use a password that s not easy to guess and that consists of different types of characters such as numbers and letters Write dow...

Page 33: ...33 PART I Introduction Introducing Vantage CNM 31 GUI Introduction 35...

Page 34: ...34...

Page 35: ...t you use to access related submenus in the navigation panel 4 or to manage the Vantage CNM 2 Title bar Displays login user name dashboard and message center buttons 3 Device window Displays the devic...

Page 36: ...o manage VPN tunnels among ZyWALL devices and provide diagnostics for fail tunnels Click this icon to display the navigation links to screens that allow you to check device status ZLD ZyWALL Device HA...

Page 37: ...ogy in the Topology screen in the device window You can also create delete or rename a device or a folder in the Topology screen In the Topology screen you can only view the folder s or device s for y...

Page 38: ...ns one or some offline devices On_Alarm Closed This is a closed folder which contains some online devices with an alarm On_Alarm Open This is a opened folder which contains some online devices with an...

Page 39: ...window click Topology 2 Right click on a folder and click Add Folder Figure 5 Device Window Topology Right Click to Add a Folder 3 The screen displays in the configuration window as shown Enter a desc...

Page 40: ...er When you edit a folder you can rename the folder or modify its description 1 In the device window click Topology 2 Right click on the folder you want to edit and click Edit Folder 3 The screen disp...

Page 41: ...ce or right click on a device and click Edit Device Figure 10 Device Window Topology Right Click to Add Edit a Device 3 The screen displays in the configuration window as shown Not Yet Acquired This i...

Page 42: ...ter the LAN MAC address of the device without colons in this field Vantage CNM uses the MAC address to identify the device so make sure it is entered correctly Device Name Enter a unique name here for...

Page 43: ...P Select the IP address of the device s Vantage Report server or if the IP address is not in the drop down box select User Define and enter the IP address Leave the IP address blank if the device does...

Page 44: ...sociate a device from a folder log into the web configurator as root or a user who belongs to the super group 1 In the device window click Topology 2 Right click on a device and click Cut Device 3 Rig...

Page 45: ...tage CNM displays the device s that match any of the search criteria 2 4 Navigation Panel and Configuration Window Use this panel to navigate to and display the screens These screens are organized int...

Page 46: ...Server Auth method Certificate ISP Account SSL Application Management Log Setting Configuration Management Synchronization Configuration File Management Signature Profile Management Building Block Fir...

Page 47: ...device You also can manage UTM services license and monitor signature status for the device VPN Management VPN Community This link takes you to a screen where you can centrally manage add edit delete...

Page 48: ...his link takes you to a screen where you can backup restore Vantage CNM settings and device list Device Owner This link takes you to a screen where you can manage device owners Upgrade This link takes...

Page 49: ...to log in http your IP address 8080 vantage The value localhost cannot be used in the Common Name field 5 Enter the rest of the required information and click Apply See Section 21 7 on page 308 for m...

Page 50: ...ate file path and click Apply 9 Restart the Vantage CNM server 10 Use the IP address and log into the Vantage CNM server 11 In Internet Explorer 7 0 click View Certificates when the following screen a...

Page 51: ...ding on the device model you select See Table 8 on page 46 for the device model and the corresponding firmware version CNM supports Load or Save Building Blocks BB 53 Device General Settings 55 Device...

Page 52: ...52...

Page 53: ...elected device This menu item appears if a device is selected See Chapter 34 on page 356 for more information about building blocks To open this menu item select the device click Device Operation in t...

Page 54: ...a BB icon to save the current configuration of the selected device as a building block The following pop up screen appears Figure 23 Device Operation Device Configuration Load or Save BB Save as a BB...

Page 55: ...formation about any of these screens or fields To open this screen click Device Operation in the menu bar and click Device Configuration General System in the navigation panel Figure 24 Device Operati...

Page 56: ...vice Configuration General System continued FIELD DESCRIPTION Table 12 Device Operation Device Configuration General Time Setting LABEL DESCRIPTION Time Protocol Select the time service protocol that...

Page 57: ...pe in the o clock field depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 End Date Configure the day and time when Da...

Page 58: ...Chapter 4 Device General Settings Vantage CNM User s Guide 58...

Page 59: ...scription For ZLD based settings please see device s User s Guide for the detailed information An example is shown next Figure 26 Example Device Operation Device Configuration Network Interface ZLD 5...

Page 60: ...TCP IP configuration for the clients When set as a server fill in the IP Pool Starting Address and Pool Size fields Select Relay to have the device forward DHCP requests to another DHCP server When se...

Page 61: ...s it recognizes both formats when receiving RIP 1 is universally supported but RIP 2 carries more information RIP 1 is probably adequate for most networks unless you have an unusual network topology B...

Page 62: ...r this check box to block all NetBIOS packets going from the LAN to WAN port 2 and from WAN port 2 to the LAN Allow between LAN and DMZ Select this check box to forward NetBIOS packets from the LAN to...

Page 63: ...o have the device act as a DNS proxy The device tells the DHCP clients on the LAN that the device itself is the DNS server When a computer on the LAN sends a DNS query to the device the device forward...

Page 64: ...erence being that RIP 2B uses subnet broadcasting while RIP 2M uses multicasting Multicasting can reduce the load on non router machines since they generally do not listen to the RIP multicast address...

Page 65: ...eens Use this screen to configure logical interfaces subnets via its single physical Ethernet interface with the device itself being the gateway for each network You can also configure firewall rules...

Page 66: ...outing table periodically When set to Both or In Only it incorporates the RIP information that it receives when set to None it does not send any RIP packets and ignores any RIP packets received RIP Ve...

Page 67: ...evice Operation in the menu bar and click Device Configuration Network WAN General in the navigation panel Be careful when configuring a device s WAN as an incorrect configuration could result in the...

Page 68: ...times out The WAN connection is considered down after the device times out the number of times specified in the Fail Tolerance field Use a higher value in this field if your network is busy or conges...

Page 69: ...ets going from the WAN2 port to the DMZ port and from DMZ port to WAN2 Allow between WAN2 and WLAN Select this check box to forward NetBIOS packets from the WAN2 port to the WLAN port and from the WLA...

Page 70: ...Choose Both None In Only or Out Only When set to Both or Out Only the device will broadcast its routing table periodically When set to Both or In Only the device will incorporate RIP information that...

Page 71: ...multiple network services a function known as dynamic service selection This enables the service provider to easily create and offer new IP services for individuals Operationally PPPoE saves signific...

Page 72: ...s PPPoE Point to Point Protocol over Ethernet PPPoE is an IETF Draft standard RFC 2516 specifying how a personal computer PC interacts with a broadband modem for example xDSL cable wireless etc connec...

Page 73: ...RIP broadcast If No the route to this remote node will be propagated to other hosts through RIP broadcasts Advanced Setup RIP Direction RIP Routing Information Protocol allows a router to exchange rou...

Page 74: ...age When Select PPTP Multicast Choose None default IGMP V1 or IGMP V2 IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a Multicast group it is not use...

Page 75: ...apsulation Point to Point Tunneling Protocol PPTP is a network protocol that enables secure transfer of data from a remote client to a private server creating a Virtual Private Network VPN using TCP I...

Page 76: ...NM accepts CHAP only PAP Your Vantage CNM accepts PAP only WAN IP WAN IP Address Assignment Select Get automatically from ISP If your ISP did not assign you a fixed IP address This is the default sele...

Page 77: ...he routing data in RIP 2 format the difference being that RIP 2B uses subnet broadcasting while RIP 2M uses multicasting Multicasting can reduce the load on non router machines since they generally do...

Page 78: ...a regular Ethernet Service Type Choose from Standard RR Telstra RoadRunner Telstra authentication method RR Manager Roadrunner Manager authentication method RR Toshiba Roadrunner Toshiba authenticatio...

Page 79: ...t send any RIP packets and will ignore any RIP packets received By default RIP Direction is set to Both RIP Version The RIP Version field controls the format and the broadcasting method of the RIP pac...

Page 80: ...to let you access one of multiple network services a function known as dynamic service selection This enables the service provider to easily create and offer new IP services for individuals Operation...

Page 81: ...he user name given to you by your ISP Password Type the password associated with the user name above Retype to confirm Password Type your password again to make sure that you have entered is correctly...

Page 82: ...RIP 2B or RIP 2M RIP 1 is universally supported but RIP 2 carries more information RIP 1 is probably adequate for most networks unless you have an unusual network topology Both RIP 2B and RIP 2M send...

Page 83: ...Encapsulation Point to Point Tunneling Protocol PPTP is a network protocol that enables secure transfer of data from a remote client to a private server creating a Virtual Private Network VPN using T...

Page 84: ...omatically from ISP Select this option If your ISP did not assign you a fixed IP address This is the default selection Use fixed IP address Select this option If the ISP assigned a fixed IP address My...

Page 85: ...non router machines since they generally do not listen to the RIP multicast address and so will not receive the RIP packets However if one router uses multicasting then all routers on your network mu...

Page 86: ...your ISP Password Type the password assigned by your ISP Retype to confirm Password Type your password again to make sure that you have entered it correctly Authentication Type Use the drop down list...

Page 87: ...l of your WAN device connected to your Dial Backup port for specific AT commands Advanced Modem Setup Click Advanced to display the WAN Advanced Modem Setup screen and edit the details of your dial ba...

Page 88: ...d screen shown next Consult the manual of your WAN device connected to your dial backup port for specific AT commands Figure 41 Device Operation Device Configuration Network WAN Dial Backup Advanced Z...

Page 89: ...t sec Type a number of seconds for the device to try to set up an outgoing call before timing out stopping 60 Retry Count Type a number of times for the device to retry a busy or no answer phone numbe...

Page 90: ...translation of an Internet protocol address used within one network to a different IP address known within another network SUA Single User Account is a subset of NAT that supports two types of mapping...

Page 91: ...nd ignores any RIP packets received Both is the default RIP Version The RIP Version field controls the format and the broadcasting method of the RIP packets that the device sends it recognizes both fo...

Page 92: ...Select the method of encapsulation used by your ISP from the drop down list box Choices vary depending on the mode you select in the Mode field If you select Bridge in the Mode field select either PP...

Page 93: ...LAN to use PPPoE client software on their computers to connect to the ISP via the device Each host can have a separate account and a public WAN IP address PPPoE pass through is an alternative to NAT...

Page 94: ...will not timeout Zero Configuration Select this if you want the device to automatically try to configure the Internet connection See the device s User s Guide for more information Subnet Mask Appears...

Page 95: ...k WAN IP Address type fields Check WAN IP Address1 3 Configure this field to test your device s WAN accessibility Type the IP address of a reliable nearby computer for example your ISP s DNS server ad...

Page 96: ...smaller the number the lower the cost Backup Gateway IP Type the IP address of your backup gateway in dotted decimal notation The device automatically forwards traffic to this IP address if the devic...

Page 97: ...ion Network WAN Backup Advanced Prestige The following table describes the fields in this screen Table 29 Device Operation Device Configuration Network WAN Backup Advanced Prestige LABEL DESCRIPTION B...

Page 98: ...outing table periodically When set to Both or In Only the device will incorporate RIP information that it receives RIP Version The RIP Version field controls the format and the broadcasting method of...

Page 99: ...and specify an idle time out in the Max Idle Timeout field Max Idle Timeout Specify an idle time out in the Max Idle Timeout field when you select Connect on Demand The default setting is 0 which mea...

Page 100: ...select this to make the ESSID visible so a station can obtain the ESSID through AP scanning Choose Channel ID The radio frequency used by IEEE 802 11a b or g wireless devices is called a channel Selec...

Page 101: ...atic WEP WPA PSK WPA 802 1x Dynamic WEP 802 1x Static WEP 802 1x No WEP No Access 802 1x Static WEP No Access 802 1x No WEP Select No Security to allow wireless stations to communicate with the access...

Page 102: ...Chapter 5 Device Network Settings Vantage CNM User s Guide 102 Figure 47 Device Operation Device Configuration Network Wireless Card Wireless Card Advanced Wireless Security Settings...

Page 103: ...es and symbols ReAuthentication Timer Seconds Specify how often wireless stations have to resend user names and passwords in order to stay connected Enter a time interval between 10 and 65535 seconds...

Page 104: ...ver if using WPA key management sends a new group key out to all clients The re keying process is the WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a per...

Page 105: ...ds The Vantage CNM automatically disconnects a wireless station from the wireless network after a period of inactivity The wireless station needs to send the username and password again before it can...

Page 106: ...sed by logging in again Authentication Databases Click Local User to go to the Local User Database screen where you can view and or edit the list of users and passwords Click RADIUS to go to the RADIU...

Page 107: ...filter action for the list of MAC addresses in the MAC Address table Select Deny Association to block access to the router MAC addresses not listed will be allowed to access the device Select Allow A...

Page 108: ...Chapter 5 Device Network Settings Vantage CNM User s Guide 108...

Page 109: ...Guide for the detailed information An example is shown next Figure 49 Example Device Operation Device Configuration VPN IPSec VPN ZLD 6 1 Firewall This section shows you how to configure the Firewall...

Page 110: ...Security Firewall Default Rule LABEL DESCRIPTION Default Rule Setup Enable Firewall Select this check box to activate the firewall The device performs access control and protects against Denial of Ser...

Page 111: ...g it From VPN To VPN means traffic that comes in through a VPN tunnel and goes out through another VPN tunnel or terminates at the device This is the case when the device is the hub in a hub and spoke...

Page 112: ...sen Log packets that don t match these rules Select the check box to create a log when the above action is taken for packets that are traveling in the selected direction and do not match any of the ru...

Page 113: ...address configured for the firewall rule Service Type This field displays the services to which this firewall rule applies Click the list box to see all service type configured for the firewall rule S...

Page 114: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 114 Figure 52 Device Operation Device Configuration Security Firewall Rule Summary Edit...

Page 115: ...nd click Delete to remove it Edit Service Available Selected Services Highlight a service from the Available Services box on the left then click the select icon to add it to the Selected Service s box...

Page 116: ...lently discard the packets without sending a TCP reset packet or an ICMP destination unreachable message to the sender Select Reject to deny the packets and send a TCP reset packet for a TCP packet or...

Page 117: ...to prevent hackers from finding the device by probing for unused ports If you select this option the device will not respond to port request s for unused ports thus leaving the unused ports and the de...

Page 118: ...umber of existing half open sessions that causes the firewall to stop deleting half open sessions The device continues to delete half open requests as necessary until the number of existing half open...

Page 119: ...een to open the screen as shown next Use this screen to configure a custom service entry not is not predefined in the device Table 45 Device Operation Device Configuration Security Firewall Service LA...

Page 120: ...x If you select Custom specify the protocol s number For example ICMP is 1 TCP is 6 UDP is 17 and so on Port Range This field is available only when you select TCP UDP TCP or UDP in the IP Protocol fi...

Page 121: ...ting up a IPSec high availability VPN tunnel the remote IPSec router Must have multiple WAN connections Only needs the configure one corresponding IPSec rule Should only have IPSec high availability s...

Page 122: ...Device Configuration Security VPN VPN Rules LABEL Description This is the VPN policy index number Name This field displays the identification name for this VPN policy Local IP Address This field displ...

Page 123: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 123 Figure 59 Device Operation Device Configuration Security VPN VPN Rules IKE Gateway Policy Add Edit...

Page 124: ...s is the IP address mapped to a specified DDNS domain name The VPN tunnel has to be rebuilt if the device s IP address changes after setup My ZyWALL IP Address This field is enabled if My ZyWALL Addre...

Page 125: ...nection to the primary remote gateway while connected to the redundant remote gateway Each gateway policy uses one or more network policies If the fall back check interval is shorter than a network po...

Page 126: ...entify this device in the local Content field Use up to 31 ASCII characters including spaces although trailing spaces are truncated The domain name or e mail address is for identification purposes onl...

Page 127: ...t Name type the subject name of the certificate the remote IPSec router will use for this VPN connection Use up to255 ASCII characters including spaces For Any the peer Content field is not available...

Page 128: ...ithms used to authenticate packet data The SHA1 algorithm is generally considered stronger than MD5 but is slower Select MD5 for minimal security and SHA 1 for maximum security SA Life Time Seconds De...

Page 129: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 129 Figure 60 Device Operation Device Configuration Security VPN VPN Rules IKE Network Policy Add Edit...

Page 130: ...e network and vice versa Select this check box to send NetBIOS packets through the VPN connection Check IPSec Tunnel Connectivity Select the check box and configure an IP address in the Ping this Addr...

Page 131: ...gured remote IP addresses When you select One to One or Many to One in the Type field enter an IP address as the translated IP address Many to one rules are only for traffic going to the remote networ...

Page 132: ...tatic IP address on the network behind the remote IPSec router Ending IP Address Subnet Mask When the Address Type field is configured to Single Address this field is N A When the Address Type field i...

Page 133: ...bit random number DH2 refers to Diffie Hellman Group 2 a 1024 bit 1Kb random number more secure yet slower Enable Replay Detection As a VPN setup is processing intensive the system is vulnerable to D...

Page 134: ...ollowing fields display the general network settings of this VPN policy Name This field displays the policy name Local Network This field displays one or a range of IP address es of the computer s beh...

Page 135: ...ote IP Address This is the IP address es of computer s on the remote network behind the remote IPSec router This field displays N A when the Remote Gateway Address field displays 0 0 0 0 In this case...

Page 136: ...wing table describes the labels in this screen Table 52 Device Operation Device Configuration Security VPN VPN Rules Manual Add Edit LABEL DESCRIPTION Property Active Select this check box to activate...

Page 137: ...configured to Single this field is N A When the Address Type field is configured to Range enter the end static IP address in a range of computers on the LAN behind the device When the Address Type fie...

Page 138: ...w the Authentication Key which can be used to generate and verify a message authentication code Select SHA1 or MD5 from the drop down list box MD5 Message Digest 5 and SHA1 Secure Hash Algorithm are h...

Page 139: ...between 30 and 3600 seconds to wait before the device checks all of the VPN connections to remote IPSec routers Enter 0 to disable this feature Gateway Domain Name Update Timer This field is applicabl...

Page 140: ...nnection s MTU Maximum Transmit Unit In most cases you should leave this set to Auto The device automatically sets the Maximum Segment Size MSS of the TCP packets that are to be encrypted by VPN based...

Page 141: ...TCP port 110 SMTP traffic using TCP port 25 Enable ZIP File Scan Select this check box to have the device scan a ZIP file with the zip gzip or gz file extension The device first decompresses the ZIP...

Page 142: ...t From VPN means traffic that came into the device through a VPN tunnel and is going to the selected to interface For example From VPN To LAN specifies the VPN traffic that is going to the LAN or term...

Page 143: ...ation Security Anti Spam General The following table describes the labels in this screen Table 55 Device Operation Device Configuration Security Anti Spam General LABEL DESCRIPTION General Setup Enabl...

Page 144: ...affic going to or from the device s VPN tunnels They do not apply to other VPN traffic for which the device is not one of the gateways VPN pass through traffic Action for Spam Mails Use this section t...

Page 145: ...that you define Action taken when mail sessions threshold is reached The anti spam feature limits the number of concurrent e mail sessions An e mail session is when an e mail client and e mail server...

Page 146: ...evice also takes this action if it receives an invalid response Here are possible reasons that would cause the device to take this action 1 The device was not able to connect to the anti spam external...

Page 147: ...ollowing table describes the labels in this screen Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh Table 56 Device Operation Device...

Page 148: ...ne becomes entry 7 Click Insert to display the screen where you edit an entry Blacklist Use Blacklist Select this check box to have the device treat e mail that matches a blacklist entry as spam This...

Page 149: ...your LAN or DMZ to speed up the device s processing of your outgoing e mail Select E Mail to have the device check e mail for a specific source e mail address or domain name You can create a whitelist...

Page 150: ...II characters In an MIME header the header is the part that comes before the colon For example if you want the whitelist or blacklist entry to check for the MIME header X MSMail Priority Normal enter...

Page 151: ...bar and then click Device Configuration Security IDP General in the navigation panel Figure 70 Device Operation Device Configuration Security IDP General The following table describes the labels in t...

Page 152: ...ce through a VPN tunnel and is going to the selected to interface For example From VPN To LAN specifies the VPN traffic that is going to the LAN or terminating at the device s LAN interface The device...

Page 153: ...dures and controls that limit or detect access Access control is used typically to control user access to network resources such as servers directories and files Scan Scan refers to all port IP or vul...

Page 154: ...network based viruses and worms The Anti Virus AV screen refers to file based viruses and worms Refer to the anti virus chapter for additional information on file based anti virus scanning in the devi...

Page 155: ...ACTION DESCRIPTION No Action The intrusion is detected but no action is taken Drop Packet The packet is silently discarded Drop Session When the firewall is enabled subsequent TCP IP packets belonging...

Page 156: ...perating systems not in your network This would speed up the IDP signature checking process Alternatively you may select or clear individual entries The check box becomes gray when you select the chec...

Page 157: ...Signature Query View The following table describes the fields in this screen Table 64 Device Operation Device Configuration Security IDP Signature Query View LABEL DESCRIPTION Back to group view Clic...

Page 158: ...identifies a specific signature targeted at a specific intrusion Click the hyperlink for more detailed information on the intrusion ID Each intrusion has a unique identification number This number ma...

Page 159: ...elect or clear individual entries The check box becomes gray when you select the check box If you edited any of the check boxes in this column on the current page use the check box in the heading row...

Page 160: ...pdate in the configuration panel Figure 75 Device Operation Device Configuration Security Signature Update The following table describes the labels in this screen Table 65 Device Operation Device Conf...

Page 161: ...e URL of the signature server from which you download signatures Update Now Click this button to begin downloading signatures from the Update Server immediately Auto Update Select the check box to con...

Page 162: ...specific computers to be included in or excluded from the content filtering configuration Figure 76 Device Operation Device Configuration Security Content Filter General The following table describes...

Page 163: ...users from accessing web pages that the external database content filtering has not categorized When the external database content filtering blocks access to a web page it displays the denied access...

Page 164: ...ered the Vantage CNM and activated the category based content filtering service Trial Active and the trial subscription expiration date display if you have registered the Vantage CNM and activated the...

Page 165: ...ion Device Configuration Security Content Filter Policy LABEL DESCRIPTION Name This is the name of the content filter policy Active This field displays whether a content filter policy is turned on Y o...

Page 166: ...delete icon to remove the content filter policy You cannot delete the default policy A window display asking you to confirm that you want to delete the policy Note that subsequent policies move up by...

Page 167: ...kies are files stored on a computer s hard drive Some web servers use them to track usage and provide service based on ID Web Proxy is a server that acts as an intermediary between a user and the Inte...

Page 168: ...ce Configuration Security Content Filter Policy External Database LABEL DESCRIPTION Policy Name This is the name of the content filter policy that you are configuring Active Select this option to appl...

Page 169: ...f other products offered Nudity Selecting this category excludes pages containing nude or seminude depictions of the human body These depictions are not necessarily sexual in intent or effect but may...

Page 170: ...t does not include pages that promote collecting weapons or groups that either support or oppose weapons use Abortion Selecting this category excludes pages that provide information or arguments in fa...

Page 171: ...that nurture cultural understanding and foster volunteerism such as 4H the Lions and Rotary Clubs Also encompasses non profit associations that cultivate philanthropic or relief efforts Sites that pr...

Page 172: ...rmation collected or reported is personal if it contains uniquely identifying data such as e mail addresses name social security number IP address etc A site is not classified as spyware if the user i...

Page 173: ...Social Networking sites Note These sites may contain offensive material in the community created content Sites in this category are also referred to as virtual communities or online communities This...

Page 174: ...s category excludes pages that are dedicated to the electronic download of software packages whether for payment or at no charge Pay to Surf Selecting this category excludes pages that pay users in th...

Page 175: ...good allowed web site addresses for this policy and bad blocked web site addresses You can also block web sites based on whether the web site s address contains a keyword Use this screen to add or re...

Page 176: ...ity Content Filter Policy Customizationl The following table describes the labels in this screen Table 70 Device Operation Device Configuration Security Content Filter Policy Customization LABEL DESCR...

Page 177: ...ct the ones to which you want to allow access in the Available list and use the arrow select button to move them to the Selected list Select an entry in the Selected list and use the arrow dselect but...

Page 178: ...such as ActiveX Java Cookies and Web Proxy are not affected Always Select this option to have content filtering active all the time Everyday from to Select this option to have content filtering active...

Page 179: ...this screen click a device click Device Operation in the menu bar and then click Device Configuration Security Content Filter Object in the navigation panel To use this screens settings in content fil...

Page 180: ...dden Web Site List Sites that you want to block access to regardless of their content rating can be allowed by adding them to this list You can enter up to 32 entries Add Forbidden Web Site Enter host...

Page 181: ...nfiguration Security Content Filter Cache The following table describes the labels in this screen 6 16 X Auth This section shows you how to configure the user authentication screens These screens may...

Page 182: ...this screen click a device click Device Operation in the menu bar and then click Device Configuration Security X Auth RADIUS in the navigation panel Table 74 Device Operation Device Configuration Sec...

Page 183: ...ructs you to do so with additional information Key Enter a password up to 31 alphanumeric characters as the key to be shared between the external authentication server and the access points The key is...

Page 184: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 184...

Page 185: ...These screens may vary depending on which model you re configuring Please see the device s User s Guide for more information about any of these screens or fields 7 1 NAT Use this screen to specify wha...

Page 186: ...he device will permit at one time Max Concurrent Sessions Per Host Use this field to set the highest number of NAT sessions that the device will permit a host to have at one time WAN1 WAN2 Use this se...

Page 187: ...want to use similar rules for the other WAN port You can use the other NAT screens to edit the NAT rules after you copy them from one WAN port to the other Port Triggering Rules Click Copy to WAN 2 or...

Page 188: ...d services NAT supports a default server A default server receives packets from ports that are not specified in this screen If you do not assign a default server IP address then all packets received f...

Page 189: ...and 255 255 255 255 as the Local End IP address This field is N A for One to One and Server mapping types Global Start IP This refers to the Inside Global IP Address IGA 0 0 0 0 is for a dynamic IP a...

Page 190: ...ress Mapping Edit LABEL DESCRIPTION Type When you select Type you can choose a server mapping set Choose the port mapping type from one of the following 1 One to One One to one mode maps one local IP...

Page 191: ...ss IGA Enter 0 0 0 0 here if you have a dynamic IP address from your ISP Global End IP This is the ending Inside Global IP Address IGA This field is N A for One to One Many to One and Server mapping t...

Page 192: ...ver on the WAN Start Port This field displays a port number or the starting port number in a range of port numbers End Port This field displays a port number or the ending port number in a range of po...

Page 193: ...peration Device Configuration Advanced Static Route IncomingStart Port Type a port number or the starting port number in a range of port numbers Incoming End Port Type a port number or the ending port...

Page 194: ...e the name and then click apply Active This field shows whether this static route is active or not Destination This parameter specifies the IP network address of the final destination Routing is alway...

Page 195: ...r the IP subnet mask here Gateway IP Address Enter the IP address of the gateway The gateway is an immediate neighbor of the device that will forward the packet to the destination On the LAN the gatew...

Page 196: ...a new address record Edit Click Edit to modify an address record for the device Remove Click Remove to delete an existing record A window display asking you to confirm that you want to delete the rec...

Page 197: ...ation Device Configuration Advanced DNS Name Server Record LABEL DESCRIPTION This is the number of an individual entry Domain Zone A domain zone is a fully qualified domain name without the host For e...

Page 198: ...ion The fields below display the read only DNS server IP address es that the ISP assigns N A displays for any DNS server IP address fields for which the ISP does not assign an IP address N A displays...

Page 199: ...ect the check box to record the positive DNS resolutions in the cache Caching positive DNS resolutions helps speed up the device s processing of commonly queried domain names and reduces the amount of...

Page 200: ...etup Active Select this check box to use dynamic DNS User Name Enter your user name You can use up to 31 alphanumeric characters and the underscore Spaces are not allowed Password Enter the password a...

Page 201: ...DNS server may not be able to detect the proper IP address if there is an HTTP proxy server between the device and the DDNS server HA Select this check box to enable the high availability HA feature H...

Page 202: ...0 User Defined changes to None after you click Apply If you set a second choice to User Defined and enter the same IP address the second User Defined changes to None after you click Apply Select DNS...

Page 203: ...re information about any of these screens or fields 7 14 Remote MGMT Use this screen to configure the device s remote management settings To open this screen click a device click Device Operation and...

Page 204: ...SSL client to authenticate itself to the device by sending the device a certificate To do that the SSL client must have a CA signed certificate from a CA that has been imported as a trusted CA on the...

Page 205: ...device using this service Secure Client IP Address A secure client is a trusted computer that is allowed to communicate with the device using this service Select All to allow any computer to access th...

Page 206: ...ch a computer may access the device using this service Secure Client IP Address A secure client is a trusted computer that is allowed to communicate with the device using this service Select All to al...

Page 207: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 207...

Page 208: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 208...

Page 209: ...ontrol and attempted access to blocked web sites or web sites with restricted web features such as cookies active X and so on Some categories such as System Errors consist of both logs and alerts You...

Page 210: ...Chapter 8 Device Log Vantage CNM User s Guide 210...

Page 211: ...server IP address of the syslog server that will log the selected categories of logs Log Facility Select a location from the drop down list box The log facility allows you to log the messages to diffe...

Page 212: ...log Reports Setup Send Raw Traffic Statistics to Syslog Server Select the check box if you want the device to send traffic logs to Vantage Report or the specified syslog server The device generates a...

Page 213: ...device and Vantage CNM To use this screen select a device click Device Operation in the menu bar and click Configuration Management Synchronize in the navigation panel If you are not sure how to resol...

Page 214: ...ly restore that configuration file to that device even if other devices are the same model and are running the same firmware Table 93 Device Operation Configuration Management Synchronization LABEL DE...

Page 215: ...tem 9 2 1 Backup Restore Device Use this screen to back up and restore configuration files for a specific device The configuration files may be stored in the Vantage CNM server or on the computer from...

Page 216: ...This displays the name of the device that was backed up Device Type This displays the type of the device that was backed up FW Version This displays the firmware version of the device when the configu...

Page 217: ...followed by rom to this name Description Enter a descriptive note for the file Backup Time Backup Now Select this radio box to perform the backup after you click Backup Scheduled Time Select this rad...

Page 218: ...configuration files To open this screen click Backup in the Device Operation Configuration Management Configuration File Management screen for the selected folder Table 96 Device Operation Configurat...

Page 219: ...the fields in this screen Table 97 Device Operation Configuration Management Configuration File Management Backup Folder TYPE DESCRIPTION Group Backup Group File Name Enter the name of the set of con...

Page 220: ...ule is applied one time or select Weekly or Monthly to specify how often you want the backup schedule is applied periodically Select the calendar to specify a date for the backup schedule Select a tim...

Page 221: ...try Device Name This displays the name of the device that was backed up Device Type This displays the type of the device that was backed up FW Version This displays the firmware version of the device...

Page 222: ...e was set Admin This field displays the administrator who set the backup schedule Remove Click Remove to remove a scheduled backup from the Vantage CNM server Total Records This entry displays the tot...

Page 223: ...st and then click Add Figure 112 Device Operation Configuration Management Configuration File Management Schedule List Folder Add Click this to add a backup schedule for this folder Edit Click this to...

Page 224: ...set if you look at the configuration files for a specific device in the folder Vantage CNM automatically appends a string of numbers followed by rom to this name Description Type a descriptive note of...

Page 225: ...i Virus Select the service whose configuration and signatures you want to manage Page Size Select this from the list box to set up how many records you want to see in each page This is the number of a...

Page 226: ...and look at the results of this operation in the Operation Report See Section 18 6 on page 289 To open this screen select an existing profile click Restore in the Device Operation Configuration Manag...

Page 227: ...Management Signature Profile Management Reset to Factory in the navigation panel Table 104 Device Operation Configuration Management Signature Profile Management Backup Restore Restore Folder TYPE DE...

Page 228: ...formation about building blocks To open this menu item select the device click the Device Operation in the menu bar and then click Configuration Management Building Block Configuration BB in the navig...

Page 229: ...ow many records you want to see in each page This is the number of an individual entry Name This displays the name of the configuration BB Device Type This displays the type of the device that the bui...

Page 230: ...bes the fields in this screen Table 107 Device Operation Configuration Management Building Block Configuration BB Add Edit Save as TYPE DESCRIPTION Name Enter a unique name for the building block The...

Page 231: ...displays as Device Operation Device Configuration Security Signature Update after you click Create See Section 6 10 on page 159 If you select Content Filter a screen displays as Device Operation Devic...

Page 232: ...menu item to add edit or copy a building block to the selected device To open this menu item click Add Edit or Save as in the Device Operation Configuration Management Building Block Component BB scre...

Page 233: ...B Add Edit Save as TYPE DESCRIPTION Name Enter a unique name for the building block The name must be 1 32 alphanumeric characters or underscores _ It cannot include spaces The name is case sensitive C...

Page 234: ...Chapter 9 Device Configuration Management Vantage CNM User s Guide 234...

Page 235: ...e List to display the next screen Figure 123 Device Operation Firmware Management Firmware List The following table describes the fields in this screen Table 110 Device Operation Firmware Management F...

Page 236: ...release date information Besides you have to make sure the FTP information has been configurated properly in the CNM System Setting Configuration Servers Configuration See Section 21 1 on page 299 Fig...

Page 237: ...235 Table 111 Device Operation Firmware Management Scheduler List TYPE DESCRIPTION Page Size Select this from the list box to set up to how many records you want to see in each page This is the number...

Page 238: ...ich you want to upgrade firmware To open this screen select a folder in the device window click Device Operation in the menu bar and click Firmware Management Firmware Upgrade Figure 126 Device Operat...

Page 239: ...ve name for the firmware This is specified when the firmware is uploaded See Section 10 1 1 on page 236 Device Type This field displays the model You must upload firmware to the correct model Vantage...

Page 240: ...Yet Required means the device has not connected to the Vantage CNM since it was added in the Vantage CNM Rom File Operating means the device is busy for a configuration backup or restore Scheduled me...

Page 241: ...e trials for subscription services such as IDP and content filtering The Vantage CNM server must be connected to the Internet and have access to www myzyxel com To open this screen click Device Operat...

Page 242: ...e name should be from six to 20 alphanumeric characters and the underscore Spaces are not allowed Check Click this button to check with the myZyXEL com database to verify the user name you entered has...

Page 243: ...his field displays the service name available on the device Status This field displays whether a service is activated Active or not Inactive Registration Type This field displays whether you applied f...

Page 244: ...This field displays the name of the selected service s Status This field displays the current status of the license for this service on this device Active The service is currently available on the dev...

Page 245: ...ice Operation in the menu bar and then click License Management Signature Status Table 117 Device Operation License Management License Status Activate Upgrade LABEL DESCRIPTION Active to Trial This fi...

Page 246: ...es them This number increments as new signatures are added so you should refer to this number regularly Go to https mysecurity zyxel com mysecurity jsp download download jsp to see what the latest ver...

Page 247: ...sive examples of each screen not every variation for each device type and firmware version If you are unable to find a specific screen or field in this User s Guide please see the User s Guide for the...

Page 248: ...248...

Page 249: ...N community type you want to see in this screen Page Size Select this from the list box to set up to how many records you want to see in each page This is the number of an individual entry Community N...

Page 250: ...r among ZyXEL devices We know almost all VPN parameter values should be the same in peer VPN gateways This screen helps you to easily configure VPN settings in one screen and applies it to devices in...

Page 251: ...hout applying any setting Click the Save as a BB icon to save the current phase 1 or phase 2 setting as a building block The following pop up screen appears Figure 138 VPN Management VPN Community Add...

Page 252: ...y type You have to select only one device in this section Satellite Gateways This is avaialble if you select the Remote Access community type You have to select at least one device in this section Thi...

Page 253: ...n algorithms to use for the IKE SA even if they are less secure than the ones you configure for the VPN rule Clear this to have the ZyWALL use only the configured phase 1 key groups and encryption and...

Page 254: ...ld or duplicate packets to protect against replay attacks Enable replay detection by selecting this check box Enable Multiple Proposals Select this to allow the ZyWALL to use any of its phase 2 encryp...

Page 255: ...RIPTION Page Size Select this from the list box to set up to how many records you want to see in each page This is the number of an individual entry Community Name This displays a name of the VPN comm...

Page 256: ...Refresh Now to update the information right away Community Name This field displays the name of the VPN community Page Size Select this from the list box to set up to how many records you want to see...

Page 257: ...and then click VPN Management from the menu bar and click VPN Monitor By Community in the navigation panel Figure 142 VPN Management VPN Monitor By Community The following table describes the fields i...

Page 258: ...his displays how many tunnels in total are configured in this VPN community Show Detail Click this to display a screen where you can view detailed VPN settings among the devices Total Records This ent...

Page 259: ...and finally they establish the VPN tunnel successfully Status This field displays the VPN tunnel is on connected icon or off disconnected icon display means it is a dynamic tunnel rule N A means the...

Page 260: ...device User s Guide for log message descriptions and the device CLI Reference Guide for details on using the command line interpreter to display logs Source This field lists the source IP address and...

Page 261: ...s in the navigation panel Then click Search Special Tunnel Table 126 VPN Management VPN Monitor By Device VPN Tunnel Status LABEL DESCRIPTION Page Size Select this from the list box to set up to how m...

Page 262: ...e name is equivalent to any Tunnel Name Type a partial or a full case sensitive tunnel name A blank of tunnel name is equivalent to any Search Click this to query device s or tunnel s according to the...

Page 263: ...you want to see in each page This is the number of an individual entry Device Name This displays the name of the device Device Type This displays the model of the device Up Tunnels This displays how...

Page 264: ...Chapter 14 VPN Monitor Vantage CNM User s Guide 264...

Page 265: ...265 PART IV Monitor Device Status Monitor 267 Device HA Status Monitor 269 Device Alarm 271...

Page 266: ...266...

Page 267: ...ce status Figure 149 Monitor Device Status The following table describes the labels in this screen Table 129 Monitor Device Status LABEL DESCRIPTION Page Size Select this from the list box to set up t...

Page 268: ...o the Vantage CNM server since last booted up Up Time This displays how long the device has been on since last booted up Extension Card Status Turbe Card display means a turbo card is installed in thi...

Page 269: ...nu bar and then click Device HA Status in the navigation panel You can see HA status in this screen only if you allow the Vantage CNM able to monitor the device HA status for the device Refer to Figur...

Page 270: ...device are inactive If the device is a backup deivce the possible status are Active All VRRP interfaces status on the device are active Stand By All VRRP interfaces status on the device are Stand By F...

Page 271: ...ere are four alarm severity classifications Table 131 Types of Alarms TYPE DESCRIPTION All This displays all types of alarms Device This is an alarm such as hardware failure or the network connection...

Page 272: ...panel Figure 151 Monitor Device Alarm Unresolved Alarm Table 133 Alarm States STATE DESCRIPTION Active This is the initial state of an alarm which means this alarm is new and no one has assumed respon...

Page 273: ...the alarm Category This field displays the type of alarm Severity This field displays the alarm severity Time This field displays the time the alarm occurred Message This field displays the reason the...

Page 274: ...for which you wish to view alarms Responder Select alarms based on the administrator who is supposed to respond to them Retrieve Click this to update the list of alarms based on the specified criteri...

Page 275: ...5 on page 273 Total Records This entry displays the total number of records on the current page of the list Clear All Click this to remove all of the alarms in the list from the monitor See Section 1...

Page 276: ...Chapter 17 Device Alarm Vantage CNM User s Guide 276...

Page 277: ...277 PART V Log Report Device Operation Report 279 CNM Logs 291 VRPT 293...

Page 278: ...278...

Page 279: ...that Vantage CNM signals the device to request a firmware FTP upload from Vantage CNM This report shows a summary of firmware upgrades See Section 10 3 on page 237 To open this screen click Log Report...

Page 280: ...each page This is the number of an individual entry Action Time This displays the time at which the upgrade was performed Device Name This is available if you select showing by device This displays th...

Page 281: ...ce Upgrade To This displays the firmware version the device was upgraded to Page Size Select this from the list box to set up how many records you want to see in each page This field shows the index n...

Page 282: ...You can click the label to sort by this column Action Time This is available if you select showing by group This field displays the date and time the operation was requested Device Type This displays...

Page 283: ...olumn Feature This field displays the settings that are affected by the operation You can click the label to sort by this column Operation Type This field displays the operation type of the configurat...

Page 284: ...r to Section 9 2 1 on page 215 To open this screen click Log Report in the menu bar and then Operation Report Configuration File Backup Restore Report Backup Report in the navigation panel Figure 159...

Page 285: ...ect showing by device This displays the device name for the configuration file backup File Name This is available if you select showing by device This displays the backup file name Group File Name Thi...

Page 286: ...File Name This displays the group configuration backup file name for this report Page Size Select this from the list box to set up how many records you want to see in each page This is the number of a...

Page 287: ...any records you want to see in each page This is the number of an individual entry Action Time This is available if you select showing by group This field displays the date and time the operation was...

Page 288: ...entered when this operation was created Admin This field displays the name of the administrator who performed the operation Show Detail Click this to open a screen where you can see detailed informat...

Page 289: ...of the operation You can click the label to sort by this column Result This displays the result the operation was performed You can click the label to sort by this column Description This is addional...

Page 290: ...rsion of the profile the restore was requested Type This displays the signature profile type of the operation You can click the label to sort by this column Result This displays the result the operati...

Page 291: ...to view and configure Vantage CNM system log preferences 19 1 1 CNM Logs You can view system logs for previous day the last two days or up to one week here To open this screen click Log Report in the...

Page 292: ...e message you want to view Vantage CNM logs Retrieve Click Retrieve for Vantage CNM to pull the logs from the selected device Page Size Select this from the list box to set up how many records you wan...

Page 293: ...nage monitor and gather statistics on devices located worldwide With Vantage Report you can monitor network access enhance security and anticipate future bandwidth needs A typical application is illus...

Page 294: ...in Figure 168 on page 294 but every instance of Vantage Report shares the same global configuration SMTP settings and list of customized services in Vantage CNM 20 3 Setting Up Vantage Report in Vanta...

Page 295: ...by Vantage Report and click Log Report VRPT Then you can see the device s relative reports displayed via Vantage Report in the Vantage CNM as shown next Figure 169 Log Report VRPT Vantage Report Main...

Page 296: ...Chapter 20 VRPT Vantage CNM User s Guide 296...

Page 297: ...297 PART VI CNM System Setting CNM System Setting 299 Maintenance 313 Device Owner 315 Vantage CNM Software Upgrade 317 License Upgrade 319 About Vantage CNM 321...

Page 298: ...298...

Page 299: ...notifications and reports in this screen These IP addresses will be the same as the Vantage CNM server computer if they are all on the same computer The FTP server is used for file transfers such as...

Page 300: ...this field A wrong IP address may cause inconsistent settings on the Vantage CNM and managed devices Web HTTPS Port This field displays the port number the Vantage CNM server uses for HTTPS communicat...

Page 301: ...t managed devices or restart Vantage CNM see 4a and 4b to reset the communication between Vantage CNM and devices Wait about 5 minutes until the device is ready and registers with Vantage CNM You don...

Page 302: ...ess of the FTP server You can change this value in CNM System Setting Configuration Servers Configuration See Section 21 1 on page 299 Click Check to test if the connection to the server is up Mail Se...

Page 303: ...refers to the e mail address of the device owner configured in the Device Owner screen Table 148 CNM System Setting Configuration User Access LABEL DESCRIPTION Maximum Concurrent Users Type the maximu...

Page 304: ...Setting Configuration Notification The following table describes the fields in this screen Table 149 CNM System Setting Configuration Notification LABEL DESCRIPTION Category This is the category for d...

Page 305: ...cide a threshold to indicate an alarm when a device s alarm severity is higher than the selected level You can also select what type of system logs you wish to log as shown in the following screen To...

Page 306: ...tance in Vantage CNM Click the name to test whether the connection is ok Syslog Server Address This field displays the IP address of the Vantage Report instance Version This field displays the softwar...

Page 307: ...vices to VRPT Server Click the icon and the associated devices screen appears where you can select associated device s to this VRPT server Click Add to return to the previous screen and the selected d...

Page 308: ...wn private key to encrypt a message and Tim uses Jenny s public key to decrypt the message The device uses certificates based on public key cryptology to authenticate users attempting to establish a c...

Page 309: ...which the device uses to sign imported trusted remote host certificates CERT represents a certificate issued by a certification authority Subject This field displays identifying information about the...

Page 310: ...ic characters underscores _ or dashes Common Name Type the IP address or domain name used to identify the certificate s owner You can use 1 32 printable ASCII characters Spaces are not allowed Organiz...

Page 311: ...keystore file to use Choices are PKCS 12 PKCS12 and Java Key Store JKS PKCS 12 is a common standard for X 509 certificates Java Key Store may be used by standalone Java clients using SSL communication...

Page 312: ...Chapter 21 CNM System Setting Vantage CNM User s Guide 312...

Page 313: ...e System The following table describes the fields in this screen Table 155 CNM System Setting Maintenance System LABEL DESCRIPTION This is the number of an individual entry Name This field displays th...

Page 314: ...schedule before a system backup Figure 181 CNM System Setting Maintenance System Backup The following table describes the fields in this screen Restore Click this to restore a system backup file Note...

Page 315: ...ing Device Owner The following table describes the labels in this screen 23 0 1 Add Edit a Device Owner Use this screen to add or edit an entry in the address book To open this screen click Add to cre...

Page 316: ...ress Line2 Type the additional address information if the Address Line1 field is not long enough for the whole mailling address City Type the city name where this person is located State Type the stat...

Page 317: ...tware Upgrade Use this screen to view the current Vantage CNM software version or perform a software upgrade To open this screen click CNM System Setting in the menu bar and then click Upgrade in the...

Page 318: ...Chapter 24 Vantage CNM Software Upgrade Vantage CNM User s Guide 318...

Page 319: ...n the trial period Trial or in the licensed period Standard Account on myZyXEL com This is the account you used to register the Vantage CNM Authenitcation Code AC This is an automatically generated co...

Page 320: ...ecific number of ZyXEL devices It can be found in the iCard Type a license key to the License Key field and click Apply to increase the maximum device number the Vantage CNM is allowed to manage Click...

Page 321: ...out Vantage CNM Use this screen to see Vantage CNM s software version release date and the copyright To open this screen click CNM System Setting in the menu bar and then click About in the navigation...

Page 322: ...Chapter 26 About Vantage CNM Vantage CNM User s Guide 322...

Page 323: ...323 PART VII Account Management Group 325 Account 329...

Page 324: ...324...

Page 325: ...Vantage CNM The user is an administrator who uses one user account to login the Vantage CNM and perform tasks in Vantage CNM 27 1 User Groups A user group is a pre defined set of administrator permiss...

Page 326: ...nt Group screen Figure 189 Account Management Group Add Table 160 Account Management Group LABEL DESCRIPTION This is the number of an individual entry Group Name This field displays the group name Cre...

Page 327: ...to access the functions associated to the Device Operation and VPN Management menus in the menu bar Monitor Select this to allow the administrator to access the functions associated to the Monitor men...

Page 328: ...Chapter 27 Group Vantage CNM User s Guide 328...

Page 329: ...ot administrator can exist 2 Only root can change his her own personal information except for UID User Identification 3 Only root can see all other Administrators Other Administrators can only see Adm...

Page 330: ...ION This is the number of an individual entry Username This is the administrator name for identification purposes Group Name This is the group name the user belongs to Status This field displays if th...

Page 331: ...r this Administrator Administration Group Select the group for this Administrator belongs to Address Line1 Type up to 64 charactors of a mailing address for this person Address Line2 Type the addition...

Page 332: ...Chapter 28 Account Vantage CNM User s Guide 332...

Page 333: ...333 PART VIII Troubleshooting Troubleshooting 335...

Page 334: ...334...

Page 335: ...ur Internet browser does not block pop up windows and has Java Scripts and Java enabled See Appendix C on page 361 2 Make sure you are using the correct IP address 3 If the problem continues contact y...

Page 336: ...es or Vantage CNM server to reset the connections See the procedure to change this IP address in the Section 21 1 1 on page 301 3 Device firmware backup restore or configuration file backup restore on...

Page 337: ...the amount of available disk space on the Vantage Report server If it is less than the value in Appendix A on page 341 the Vantage Report server stops receiving log entries 4 Make sure your devices su...

Page 338: ...Chapter 29 Troubleshooting Vantage CNM User s Guide 338...

Page 339: ...omputer s IP Address 345 Pop up Windows Java Scripts and Java Permissions 361 IP Addresses and Subnetting 367 IP Address Assignment Conflicts 375 Common Services 379 Importing Certificates 383 Open So...

Page 340: ...340...

Page 341: ...pository Domain Administration One domain per administrator Multiple administrators per domain Different privileges for each administrator Device Configuration Vantage CNM s Configuration menu Device...

Page 342: ...2 01 or later ZyWALL USG 300 1000 2 01 or later P 662H W D1 P 662H W 61 P 662HW 63 P 653HWI 17 3 40 Table 167 Trusted CAs Keystore type jks Keystore provider SUN CA DATE MD5 FINGERPRINT equifaxsecure...

Page 343: ...E7 68 0D equifaxsecureca Jul 19 2003 67 CB 9D C0 13 24 8A 82 9B B2 17 1E D1 1B EC D4 verisignclass3g2ca Mar 26 2004 A2 33 9B 4C 74 78 73 D4 6C E7 C1 F3 8D CB 5C E9 thawtepremiumserverca Feb 13 1999 06...

Page 344: ...e 168 Port Number Specifications FEATURE SPECIFICATION MySQL port number 3316 Table 169 System Notifications Specifications FEATURE SPECIFICATION Maximum number of records in any table in the database...

Page 345: ...f a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components a...

Page 346: ...en click Add 3 Select the manufacturer and model of your network adapter and then click OK If you need TCP IP 1 In the Network window click Add 2 Select Protocol and then click Add 3 Select Microsoft...

Page 347: ...elect Obtain an IP address automatically If you have a static IP address select Specify an IP address and type your information into the IP Address and Subnet Mask fields Figure 193 Windows 95 98 Me T...

Page 348: ...ose the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your device and restart your computer when prompted Verifying Settings 1 Click Start...

Page 349: ...NM User s Guide 349 Figure 195 Windows XP Start Menu 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 196 Windows XP Control Panel 3 Ri...

Page 350: ...b in Win XP and then click Properties Figure 198 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP If you have a dynamic...

Page 351: ...dd In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure additional default ga...

Page 352: ...he General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know your DNS server IP address es click Use the following DNS server...

Page 353: ...ork Connections window Network and Dial up Connections in Windows 2000 NT 11 Turn on your device and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and the...

Page 354: ...acintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via list Figure 203 Macintosh OS 8 9 TCP IP 3 For dynamically assigned settings select Using DHCP Server from the Configure list...

Page 355: ...nfiguration 7 Turn on your device and restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Macintosh OS X 1 Click the Apple menu and cli...

Page 356: ...t mask in the Subnet mask box Type the IP address of your device in the Router address box 5 Click Apply Now and close the window 6 Turn on your device and restart your computer if prompted Verifying...

Page 357: ...ow to configure your computer IP address using the KDE 1 Click the Red Hat button located on the bottom left corner select System Setting and click Network Figure 206 Red Hat 9 0 KDE Network Configura...

Page 358: ...0 KDE Network Configuration DNS 5 Click the Devices tab 6 Click the Activate button to apply the changes The following screen displays Click Yes to save the changes in all screens Figure 209 Red Hat 9...

Page 359: ...n the etc directory The following figure shows an example where two DNS server IP addresses are specified Figure 212 Red Hat 9 0 DNS Settings in resolv conf 3 After you edit and save the configuration...

Page 360: ...s root localhost ifconfig eth0 Link encap Ethernet HWaddr 00 50 BA 72 5B 44 inet addr 10 1 19 129 Bcast 10 1 19 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 717 e...

Page 361: ...ernet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blockin...

Page 362: ...web pop up blockers you may have enabled Figure 216 Internet Options Privacy 3 Click Apply to save this setting Enable pop up Blockers with Exceptions Alternatively if you only want to allow pop up w...

Page 363: ...ide 363 Figure 217 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 4 Click Add to mo...

Page 364: ...play properly in Internet Explorer check that Java Scripts are allowed 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 219 Internet Options Security 2 Click the Cu...

Page 365: ...tings Java Scripting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 Under Java permiss...

Page 366: ...Permissions Vantage CNM User s Guide 366 JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected 3 C...

Page 367: ...hare a common street name the hosts on a network share a common network number Similarly as each house has its own house number each host on the network has its own unique identifying number the host...

Page 368: ...s part of the host ID The following example shows a subnet mask identifying the network number in bold text and host ID of an IP address 192 168 1 2 in decimal By convention subnet masks always consis...

Page 369: ...by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet This is usually specified by writing a follow...

Page 370: ...ows the company network before subnetting Figure 224 Subnetting Example Before Subnetting You can borrow one of the host ID bits to divide the network 192 168 1 0 into two separate sub networks The su...

Page 371: ...8 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask to divide a 24 bit address into two subnets Similarly to divide a 24 bit address into four subnets you need to...

Page 372: ...bnet 3 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet A...

Page 373: ...T BITS SUBNET MASK NO SUBNETS NO HOSTS PER SUBNET 1 255 255 255 128 25 2 126 2 255 255 255 192 26 4 62 3 255 255 255 224 27 8 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 6 255 255 255 252...

Page 374: ...d You don t need to change the subnet mask computed by the device unless you are instructed to do otherwise Private IP Addresses Every machine on the Internet must have a unique address If your networ...

Page 375: ...of a computer on the LAN Figure 226 IP Address Conflicts Case A You must set the device to use different LAN and WAN IP addresses on different subnets if you enable DHCP server on the device For exam...

Page 376: ...if you enable DHCP server on the device For example you set the WAN IP address to 192 59 1 1 and the LAN IP address to 10 59 1 1 Otherwise It is recommended the device uses a public WAN IP address Cas...

Page 377: ...Address Assignment Conflicts Vantage CNM User s Guide 377 Figure 229 IP Address Conflicts Case D This problem can be solved by adding a VLAN enabled switch or set the computers to obtain IP addresses...

Page 378: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 378...

Page 379: ...is USER this is the IP protocol number Description This is a brief explanation of the applications that use this service or the situations in which this service is used Table 183 Commonly Used Service...

Page 380: ...ram NEWS TCP 144 A protocol for news groups NFS UDP 2049 Network File System NFS is a client server distributed file service that provides transparent file sharing for network environments NNTP TCP 11...

Page 381: ...idrange systems UNIX systems and network servers SSH TCP UDP 22 Secure Shell Remote Login Program STRM WORKS UDP 1558 Stream Works Protocol SYSLOG UDP 514 Syslog allows you to send system logs to a UN...

Page 382: ...Appendix F Common Services Vantage CNM User s Guide 382...

Page 383: ...ng the Vantage CNM s Certificate into Internet Explorer For Internet Explorer to trust a self signed certificate from Vantage CNM simply import the self signed certificate into your operating system a...

Page 384: ...s Vantage CNM User s Guide 384 Figure 231 Login Screen 2 Click Install Certificate to open the Install Certificate wizard Figure 232 Certificate General Information before Import 3 Click Next to begin...

Page 385: ...ntage CNM User s Guide 385 Figure 233 Certificate Import Wizard 1 4 Select where you would like to store the certificate and then click Next Figure 234 Certificate Import Wizard 2 5 Click Finish to co...

Page 386: ...Appendix G Importing Certificates Vantage CNM User s Guide 386 Figure 235 Certificate Import Wizard 3 6 Click Yes to add the Vantage CNM certificate to the root store Figure 236 Root Certificate Store...

Page 387: ...eds a certificate if Authenticate Client Certificates is selected on the device You must have imported at least one trusted CA to the device in order for the Authenticate Client Certificates to be act...

Page 388: ...ed CA Screen The CA sends you a package containing the CA s trusted certificate s your personal certificate s and a password to install the personal certificate s Installing the CA s Certificate 1 Dou...

Page 389: ...r in this appendix Installing Your Personal Certificate s You need a password in advance The CA may issue the password or you may have to specify it during the enrollment Double click the personal cer...

Page 390: ...box Click Browse if you wish to import a different certificate Figure 241 Personal Certificate Import Wizard 2 3 Enter the password given to you by the CA Figure 242 Personal Certificate Import Wizar...

Page 391: ...tificate Import Wizard 4 5 Click Finish to complete the wizard and begin the import process Figure 244 Personal Certificate Import Wizard 5 6 You should see the following screen when the certificate i...

Page 392: ...browser s web address field Figure 246 Access the Device Via HTTPS 2 When Authenticate Client Certificates is selected on the device the following screen asks you to select a personal certificate to...

Page 393: ...he distribution 3 The name ExoLab must not be used to endorse or promote products derived from this Software without prior written permission of ExoLab Group For written permission please contact info...

Page 394: ...entation and conversions to other media types Work shall mean the work of authorship whether in Source or Object form made available under the License as indicated by a copyright notice that is includ...

Page 395: ...c You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark and attribution notices from the Source form of the Work excluding those notices that d...

Page 396: ...of such damages 9 Accepting Warranty or Additional Liability While redistributing the Work or Derivative Works thereof You may choose to offer and charge a fee for acceptance of support warranty inde...

Page 397: ...opyright C 2002 Lee David Painter All right reserved GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA...

Page 398: ...to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free prog...

Page 399: ...ricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends...

Page 400: ...er Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distr...

Page 401: ...on is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsec...

Page 402: ...ies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held...

Page 403: ...ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGE...

Page 404: ...ed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or othe...

Page 405: ...of a storage or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or exe...

Page 406: ...ndirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenf...

Page 407: ...LDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF...

Page 408: ...un desires that Doug Lea utilize certain Java Software technologies in the util concurrent technology Therefore the parties agree as follows effective May 31 2002 Java Software technologies means clas...

Page 409: ...form of the Software complete and unmodified for the sole purpose of designing developing testing and running your Java applets and applications intended to run on Java enabled general purpose deskto...

Page 410: ...nditions are not presented on installation the Software Updates will be considered part of the Software and subject to the terms and conditions of the Agreement 6 Notice of Automatic Downloads You ack...

Page 411: ...ries please contact Sun Microsystems Inc 4150 Network Circle Santa Clara California 95054 U S A LFI 134402 Form ID 011801 This Product includes Spring 2 0 version under Spring license Revision 62 1 5...

Page 412: ...ALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM IF YOU DO NOT AGREE TO THESE TERMS THEN ZyXEL INC IS UNWILLING TO LICENSE THE SOFTWARE TO YOU IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOF...

Page 413: ...tain the confidentiality of your own most confidential information You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into...

Page 414: ...ERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT 10 Termination This License Agreement is effective until it is terminated Y...

Page 415: ...ve if it is in writing and signed by both parties hereto If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction the remainder of this License Agre...

Page 416: ...Appendix H Open Software Announcements Vantage CNM User s Guide 416...

Page 417: ...ZyXEL Network Operating System is a registered trademark of ZyXEL Communications Inc Other trademarks mentioned in this publication are used for identification purposes only and may be properties of t...

Page 418: ...rization number RMA Products must be returned Postage Prepaid It is recommended that the unit be insured when shipped Any returned products without proof of purchase or those with an out dated warrant...

Page 419: ...mail support zyxel com tw Sales E mail sales zyxel com tw Telephone 886 3 578 3942 Fax 886 3 578 2439 Web www zyxel com www europe zyxel com FTP ftp zyxel com ftp europe zyxel com Regular Mail ZyXEL...

Page 420: ...448 Web www zyxel fi Regular Mail ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland France E mail info zyxel fr Telephone 33 4 72 52 97 97 Fax 33 4 72 52 19 20 Web www zyxel fr Regular Mai...

Page 421: ...agawa ku Tokyo 141 0022 Japan Kazakhstan Support http zyxel kz support Sales E mail sales zyxel kz Telephone 7 3272 590 698 Fax 7 3272 590 689 Web www zyxel kz Regular Mail ZyXEL Kazakhstan 43 Dostyk...

Page 422: ...Okrzei 1A 03 715 Warszawa Poland Russia Support http zyxel ru support Sales E mail sales zyxel ru Telephone 7 095 542 89 29 Fax 7 095 542 89 25 Web www zyxel ru Regular Mail ZyXEL Russia Ostrovityanov...

Page 423: ...il ZyXEL Thailand Co Ltd 1 1 Moo 2 Ratchaphruk Road Bangrak Noi Muang Nonthaburi 11000 Thailand Ukraine Support E mail support ua zyxel com Sales E mail sales ua zyxel com Telephone 380 44 247 69 78 F...

Page 424: ...Appendix J Customer Support Vantage CNM User s Guide 424...

Page 425: ...ion 419 copyright 417 create a group folder 39 customer support 419 D delete a device group 40 device owners alarms 303 304 notifications 303 304 storing in address book 315 device search 45 device wi...

Page 426: ...cations 303 304 SMTP server 299 O object pane devices 40 P product registration 418 R registration product 418 related documentation 3 Remote Access 251 252 remove a group folder 40 report window 35 r...

Page 427: ...44 User Lockout 303 V Vantage Report 306 in Vantage CNM 294 opening in Vantage CNM 295 setting up 294 setting up devices for 307 setting up instances of 306 typical application 293 views icons 38 VPN...

Page 428: ...Index Vantage CNM User s Guide 428...

Page 429: ...Index Vantage CNM User s Guide 429...

Page 430: ...Index Vantage CNM User s Guide 430...

Reviews: