background image

 

376

STEP 4

Enter the following setting in

 Server1 

in 

Virtual Server 

function: 

(Figure15-11)

 

 

 

Figure15-11 Virtual Server Setting WebUI 

 

STEP 5

Enter the following setting in 

Incoming Policy

: (Figure15-12)

 

 

 

Figure15-12 Incoming Policy Setting 

 

STEP 6

Enter the following setting in 

Outgoing Policy

: (Figure15-13)

 

 

 

Figure15-13 Outgoing Policy Setting 

Содержание ALL7008

Страница 1: ...ALL7008 User s Manual...

Страница 2: ...mitted IPs 9 Logout 10 Software Update 11 Chapter 2 Configure 13 Setting 18 Date Time 23 Multiple Subnet 24 Route Table 27 DHCP 36 DDNS 38 Host Table 40 Language 41 Interface Chapter 3 Interface 43 LA...

Страница 3: ...Example 87 Chapter 8 Authentication 91 Auth User 97 Auth User Group 101 RADIUS 105 POP3 Server 126 Chapter 9 Content Blocking 129 URL 133 Script 136 P2P 138 IM 140 Download 142 Chapter10 Virtual Serve...

Страница 4: ...365 Example 371 Anti Attack Chapter16 Alert Setting 381 Internal Alert 386 Chapter17 Atack Alarm 391 Internal Alarm 393 External Alarm 394 Monitor Chapter18 LOG 397 Traffic Log 399 Event Log 404 Conn...

Страница 5: ...4 Chapter21 Status 423 Interface 424 Authentication 426 ARP Table 427 DHCP Clients 428...

Страница 6: ...ackets that pass through the ALL7008 and monitoring controls The System Administrators can manage monitor and configure the ALL7008 settings But all configurations are read only for all users other th...

Страница 7: ...inistrators Admin or Sub Admin The username of the main Administrator is Administrator with reading writing privilege Administrator also can change the system setting log system status and to increase...

Страница 8: ...button to create a new Sub Administrator STEP 2 In the Add New Sub Administrator WebUI Figure 1 1 and enter the following setting Sub Admin Name sub_admin Password 12345 Confirm Password 12345 STEP 3...

Страница 9: ...you want to edit and click on Modify in the Configure field STEP 2 The Modify Administrator Password WebUI will appear Enter the following information Password admin New Password 52364 Confirm Passwo...

Страница 10: ...ew permitted IPs Figure1 4 Figure1 3 Setting Permitted IPs WebUI Figure1 4 Complete Add New Permitted Ips To make Permitted IPs be effective it must cancel the Ping and WebUI selection in the WebUI of...

Страница 11: ...Click Logout in System to protect the system while Administrator are away Figure1 5 Figure1 5 Confirm Logout WebUI STEP 2 Click OK and the logout message will appear in WebUI Figure1 6 Figure1 6 Logo...

Страница 12: ...C which manage the ALL7008 Click Browse and choose the latest software version file Click OK and the system will update automatically Figure1 7 Figure1 7 Software Update It takes 3 minutes to update s...

Страница 13: ...12...

Страница 14: ...er 2 Configure The Configure is according to the basic setting of the ALL7008 In this chapter the definition is Setting Date Time Multiple Subnet Route Table DHCP Dynamic DNS Hosts Table and Language...

Страница 15: ...hackers or when emergency conditions occur It can be set from Settings Hacker Alert in System to detect Hacker Attacks Web Management WAN Interface The System Manager can change the port number used...

Страница 16: ...h the System Clock The administrator can configure the ALL7008 s date and time by either syncing to an Internet Network Time Server NTP or by syncing to your computer s clock GMT International Standar...

Страница 17: ...t department subnet 192 168 4 1 24 LAN 168 85 88 250 WAN 5 Accounting department subnet 192 168 5 1 24 LAN 168 85 88 249 WAN The first department R D department had set while setting interface IP the...

Страница 18: ...S Domain Name The domain name that provided by DDNS WAN IP Address The WAN IP Address which the domain name corresponds to Define the required fields of Host Table Domain Name It can be set by System...

Страница 19: ...Settings to Client STEP 2 When the File Download pop up window appears choose the destination place where to save the exported file and click on Save The setting value of ALL7008 will copy to the app...

Страница 20: ...ngs from Client When the Choose File pop up window appears select the file to which contains the saved ALL7008 Settings then click OK Figure2 2 STEP 2 Click OK to import the file into the ALL7008 Figu...

Страница 21: ...actory Default Settings STEP 1 Select Reset Factory Settings in ALL7008 Configuration WebUI STEP 2 Click OK at the bottom right of the page to restore the factory settings Figure2 4 Figure2 4 Reset Fa...

Страница 22: ...s STEP 4 E Mail Address 1 Enter the e mail address of the first user to be notified STEP 5 E Mail Address 2 Enter the e mail address of the second user to be notified Optional STEP 6 Click OK on the b...

Страница 23: ...1 Reboot ALL7008 Click Reboot button next to Reboot ALL7008 Appliance STEP 2 A confirmation pop up page will appear STEP 3 Follow the confirmation pop up page click OK to restart ALL7008 Figure2 6 Fi...

Страница 24: ...T STEP 3 Enter the Server IP Name with which you want to synchronize STEP 4 Set the interval time to synchronize with outside servers Figure2 7 System Time Setting Click on the Sync button and then th...

Страница 25: ...AT or Routing Mode by the IP address that set by the LAN user s network card Preparation ALL7008 WAN1 10 10 10 1 connect to the ISP Router 10 10 10 2 and the subnet that provided by ISP is 162 172 50...

Страница 26: ...ry Alias IP of LAN Interface Enter 162 172 50 1 Netmask Enter 255 255 255 0 WAN1 Enter Interface IP 10 10 10 1 and choose Routing in Forwarding Mode WAN2 Enter Interface IP 211 22 22 22 and choose NAT...

Страница 27: ...access to Internet by WAN2 If by WAN1 Routing mode then it cannot access to Internet by its virtual IP 162 172 50 xx it uses Routing mode through WAN1 The Internet Server can see your IP 162 172 50 x...

Страница 28: ...1 connects with ATUR to Internet WAN2 211 22 22 22 connects with ATUR to Internet LAN subnet 192 168 1 1 24 The Router1 which connect with LAN 10 10 10 1 support RIPv2 its LAN subnet is 192 168 10 1 2...

Страница 29: ...55 0 Gateway Enter 192 168 1 252 Interface Select LAN Click OK Figure 2 10 Figure2 10 Add New Static Route1 STEP 2 Enter the following settings in Route Table in System function Destination IP Enter 1...

Страница 30: ...he following setting in Route Table in System function Destination IP Enter 10 10 10 0 Netmask Enter 255 255 255 0 Gateway Enter 192 168 1 252 Interface Select LAN Click OK Figure 2 12 Figure2 12 Add...

Страница 31: ...EP 4 Adding successful At this time the computer of 192 168 10 1 24 192 168 20 1 24 and 192 168 1 1 24 can connect with each other and connect to Internet by NAT Figure 2 13 Figure 2 13 Route Table Se...

Страница 32: ...1 11 11 LAN IP 192 168 10 X Multiple Subnet 192 168 85 X Company B WAN IP 211 22 22 22 LAN IP 192 168 20 X This example takes two ALL7008 as flattop Suppose Company B 192 168 20 100 is going to have V...

Страница 33: ...STEP 1 Enter the following setting in PPTP Server of VPN function in the ALL7008 of Company A Figure 2 14 2 15 Figure 2 14 PPTP VPN Server Connection Setting Figure 2 15 Complete PPTP VPN Server Setti...

Страница 34: ...33 STEP 2 Add the following settings in PPTP Server of VPN function in the ALL7008 of Company B Figure2 16 2 17 Figure 2 16 PPTP VPN Client Setting Figure 2 17 Complete PPTP VPN Client Setting...

Страница 35: ...le in Configure function in ALL7008 of Company B Destination IP Enter 192 168 85 0 Netmask Enter 255 255 255 0 Gateway Enter nothing Interface LAN Click OK Figure 2 18 2 19 Figure2 18 Add New Static R...

Страница 36: ...35 STEP 4 Complete PPTP VPN Connection Figure 2 20 Figure 2 20 PPTP VPN Connection Setting...

Страница 37: ...Range 1 Enter the starting and the ending IP address dynamically assigning to DHCP clients The default value is 192 168 1 2 to 192 168 1 254 it must be in the same subnet Client IP Address Range 2 En...

Страница 38: ...Automatically Get DNS the DNS Server will lock it as LAN Interface IP Using Occasion When the system Administrator starts Authentication the users first DNS Server must be the same as LAN Interface I...

Страница 39: ...ders Select service providers Automatically fill in the WAN 1 2 IP Check to automatically fill in the WAN 1 2 IP User Name Enter the registered user name Password Enter the password Domain name Enter...

Страница 40: ...er Unknown error If System Administrator had not registered a DDNS account click on Sign up then can enter the website of the provider If you do not select Automatically fill in the WAN IP and then yo...

Страница 41: ...domain name of the server Virtual IP Address The virtual IP address respective to Host Table Click OK to add Host Table Figure2 24 Figure2 24 Add New Host Table To use Host Table the user PC s first...

Страница 42: ...41 Language Select the Language version English Version Traditional Chinese Version or Simplified Chinese Version and click OK Figure2 25 Figure2 25 Language Setting WebUI...

Страница 43: ...42...

Страница 44: ...dministrator can set up the IP addresses for the office network The Administrator may configure the IP addresses of the LAN network the WAN 1 2 network and the DMZ network The netmask and gateway IP a...

Страница 45: ...t the WAN 1 2 utility rate automatically according to the downstream upstream of WAN For users who are using various download bandwidth Round Robin The ALL7008 distributes the WAN 1 2 download bandwid...

Страница 46: ...to Internet or not The testing ways are as following ICMP To test if the connection is successful or not by the Ping IP you set DNS To test if the connection is successful or not by checking Domain Na...

Страница 47: ...DMZ network The DMZ includes NAT Mode In this mode the DMZ is an independent virtual subnet This virtual subnet can be set by the Administrator but cannot be the same as LAN Interface Transparent Mode...

Страница 48: ...s in this chapter No Suitable Situation Example Page Ex1 LAN Modify LAN Interface Settings 48 Ex2 WAN Setting WAN Interface Address 49 Ex3 DMZ Setting DMZ Interface Address NAT Mode 57 Ex4 DMZ Setting...

Страница 49: ...N Interface WebUI The default LAN IP Address is 192 168 1 1 After the Administrator setting the new LAN IP Address on the computer he she have to restart the System to make the new IP address effectiv...

Страница 50: ...ce and click Modify in WAN1 Interface The setting of WAN2 Interface is almost the same as WAN1 The difference is that WAN2 has a selection of Disable The System Administrator can close WAN2 Interface...

Страница 51: ...n Name can select from Assist Figure3 4 Setting time of seconds between sending alive packet Figure3 3 ICMP Connection Figure 3 4 DNS Service Connection test is used for ALL7008 to detect if the WAN c...

Страница 52: ...nt 3 Enter Password as the password 4 Select Dynamic or Fixed in IP Address provided by ISP If you select Fixed please enter IP Address Netmask and Default Gateway 5 Enter Max Downstream Bandwidth and...

Страница 53: ...nection Figure3 6 Complete PPPoE Connection Setting If the connection is PPPoE you can choose Service On Demand for WAN Interface to connect automatically when disconnect or to set up Auto Disconnect...

Страница 54: ...Address to obtain MAC IP automatically 4 Hostname Enter the hostname provided by ISP 5 Domain Name Enter the domain name provided by ISP 6 User Name and Password are the IP distribution method accordi...

Страница 55: ...54 Figure3 8 Complete Dynamic IP Connection Setting...

Страница 56: ...provided by ISP 3 Enter DNS Server1 and DNS Server2 In WAN2 the connecting of Static IP Address does not need to set DNS Server 4 Enter Max Downstream Bandwidth and Max Upstream Bandwidth According to...

Страница 57: ...etwork Interface users will be able to ping the ALL7008 and enter the WebUI WAN network It may influence network security The suggestion is to Cancel Ping and WebUI after all the settings have finishe...

Страница 58: ...ode STEP 1 Click DMZ Interface STEP 2 Select NAT Mode in DMZ Interface Select NAT in DMZ Interface Enter IP Address and Netmask STEP 3 Select Ping and HTTP STEP 4 Click OK Figure3 11 Figure3 11 Settin...

Страница 59: ...ect Transparent Mode in DMZ Interface Select DMZ_Transparent in DMZ Interface STEP 1 Select Ping and HTTP STEP 2 Click OK Figure3 12 Figure 3 12 Setting DMZ Interface Address Transparent Mode WebUI In...

Страница 60: ...create a control policy for packets of different IP addresses he can first add a new group in the LAN Group or the WAN Group and assign those IP addresses into the newly created group Using group addr...

Страница 61: ...should be set as 255 255 255 255 When correspond to several IP of a specific Domain Take 192 168 100 1 C Class subnet as an example it should be set as 255 255 255 0 MAC Address Correspond a specific...

Страница 62: ...n Example Page Ex1 LAN Under DHCP circumstances assign the specific IP to static users and restrict them to access FTP net service only through policy 62 Ex2 LAN Group WAN Set up a policy that only al...

Страница 63: ...ess and enter the following settings Click New Entry button Figure4 1 Name Enter Rayearth IP Address Enter 192 168 3 2 Netmask Enter 255 255 255 255 MAC Address Enter the user s MAC Address 00 B0 18 2...

Страница 64: ...y of Restricting the Specific IP to Access to Internet STEP 3 Complete assigning the specific IP to static users in Outgoing Policy and restrict them to access FTP net service only through policy Figu...

Страница 65: ...matically In LAN of Address function the ALL7008 will default an Inside Any address represents the whole LAN network automatically Others like WAN DMZ also have the Outside Any and DMZ Any default add...

Страница 66: ...65 Setup a policy that only allows partial users to connect with specific IP External Specific IP STEP 1 Setting several LAN network Address Figure4 5 Figure4 5 Setting Several LAN Network Address...

Страница 67: ...gure 4 6 Enter the Name of the group Select the users in the Available Address column and click Add Click OK Figure 4 7 Figure4 6 Add New LAN Address Group Figure4 7 Complete Adding LAN Address Group...

Страница 68: ...e following settings in WAN of Address function Click New Entry Figure4 8 Enter the following data Name IP Address Netmask Click OK Figure4 9 Figure4 8 Add New WAN Address Figure4 9 Complete the Setti...

Страница 69: ...STEP 4 To exercise STEP1 3 in Policy Figre4 10 4 11 Figure4 10 To Exercise Address Setting in Policy Figure4 11 Complete the Policy Setting The Address function really take effect only if use with Pol...

Страница 70: ...er Service which are Pre defined Custom and Group The Administrator can simply follow the instructions below to define the protocols and port numbers for network communication applications Users then...

Страница 71: ...ET VDO Live WAIS WINFRAME X WINDOWS etc UDP Service For example IKE DNS NTP IRC RIP SNMP SYSLOG TALK TFTP UDP ANY UUCP etc ICMP Service Foe example PING TRACEROUTE etc New Service Name The System Mana...

Страница 72: ...ow external user to communicate with internal user by VoIP through policy VoIP Port TCP 1720 TCP 15325 15333 UDP 15325 15333 72 Ex2 Group Setting service group and restrict the specific users only can...

Страница 73: ...ernal user by VoIP through policy VoIP Port TCP 1720 TCP 15328 15333 UDP 15328 15333 STEP 1 Set LAN and LAN Group in Address function as follows Figure5 1 5 2 Figure5 1 Setting LAN Address Book WebUI...

Страница 74: ...change the Client Port and set the Server Port as 1720 1720 Protocol 2 select TCP need not to change the Client Port and set the Server Port as 15328 15333 Protocol 3 select UDP need not to change th...

Страница 75: ...suggested If the port numbers that enter in the two spaces are different port number then enable the port number under the range between the two different port numbers for example 15328 15333 And if t...

Страница 76: ...e5 6 Complete the Policy for External VoIP to Connect with Internal VoIP STEP 5 In Outgoing Policy complete the setting of internal users using VoIP to connect with external network VoIP Figure5 7 Fig...

Страница 77: ...urce that provided by this group through policy Group HTTP POP3 SMTP DNS STEP 1 Enter the following setting in Group of Service Click New Entry Figure 5 8 Name Enter Main_Service Select HTTP POP3 SMTP...

Страница 78: ...77 Figure5 9 Complete the setting of Adding Service Group If you want to remove the service you choose from Selected Service choose the service you want to delete and click Remove...

Страница 79: ...Address function Setting an Address Group that can include the service of access to Internet Figure5 10 Figure5 10 Setting Address Book Group STEP 3 Compare Service Group to Outgoing Policy Figure5 11...

Страница 80: ...e Administrator can set the start time and stop time or VPN connection in Policy or VPN By using the Schedule function the Administrator can save a lot of management time and make the network system m...

Страница 81: ...access to Internet in a day STEP 1 Enter the following in Schedule Click New Entry Figure6 1 Enter Schedule Name Set up the working time of Schedule for each day Click OK Figure6 2 Figure6 1 Setting S...

Страница 82: ...omplete the Setting of Comparing Schedule with Policy The Schedule must compare with Policy or VPN Figure6 4 6 5 6 6 Figure6 4 Compare Policy with VPN or IPSec Autokey Figure6 5 Compare Schedule with...

Страница 83: ...82...

Страница 84: ...ream Bandwidth To configure the Guaranteed Bandwidth and Maximum Bandwidth QoS Priority To configure the priority of distributing Upstream Downstream and unused bandwidth The ALL7008 configures the ba...

Страница 85: ...84 Figure7 2 the Flow After Using QoS Max Bandwidth 400Kbps Guaranteed Bandwidth 200Kbps...

Страница 86: ...ximum Bandwidth according to the bandwidth range you apply from ISP Priority To configure the priority of distributing Upstream Downstream and unused bandwidth Guaranteed Bandwidth The basic bandwidth...

Страница 87: ...in this chapter No Suitable Situation Example Page Ex1 QoS Setting a policy that can restrict the user s downstream and upstream bandwidth 87 Ex2 QoS Setting a connection of IPSec Autokey in VPN that...

Страница 88: ...tream bandwidth STEP 1 Enter the following settings in QoS Click New Entry Figure7 3 Name The name of the QoS you want to configure Enter the bandwidth in WAN1 WAN2 Select QoS Priority Click OK Figure...

Страница 89: ...88 STEP 2 Use the QoS that set by STEP1 in Outgoing Policy Figure7 5 7 6 Figure7 5 Setting the QoS in Policy Figure7 6 Complete Policy Setting...

Страница 90: ...the following in QoS Click New Entry Figure7 7 Name The name of the QoS you want to configure Enter the bandwidth you want to restrict in Downstream Bandwidth and Upstream Bandwidth QoS Priority Selec...

Страница 91: ...Setting of IPSec When the administrator are setting QoS the bandwidth range that can be set is the value that system administrator set in the WAN of Interface So when the System Administrator sets the...

Страница 92: ...by VPN and IPSec connection authority The user has to pass the authentication to access to Internet The ALL7008 configures the authentication of LAN s user by setting account and password to identify...

Страница 93: ...authentication If idle time exceeds the time you setup the authentication will be invalid The default value is 30 minutes URL to redirect when authentication succeed The user who had passes Authentica...

Страница 94: ...93 z When the user connect to external network by Authentication the following page will be displayed Figure8 2 Figure8 2 Authentication Login WebUI...

Страница 95: ...passing Authentication Figure8 3 Figure8 3 Connecting to the Appointed Website After Authentication If the user ask for authentication positively can enter the LAN IP by the Authentication port number...

Страница 96: ...et Password The password when setting up Authentication Confirm Password Enter the password that correspond to Password Shared Secret The password for authentication of the ALL7008 and RADIUS Server 8...

Страница 97: ...to connect with internal network only before passing the authentication of VPN IPSec Autokey Adopt the built in Auth User Group Function 101 Ex3 RADIUS Setting the users to connect with external netwo...

Страница 98: ...authentication of policy Adopt the built in Auth User Function STEP 1 Setting the user s Address in LAN of Address function Figure8 4 Figure8 4 LAN Address Setting To use Authentication the DNS Server...

Страница 99: ...owing setting in Auth of Authentication function Click New User Auth User Name Enter guest Password Enter 1234 Confirm Password Enter 1234 Click OK Complete Authentication Setting Figure8 5 Figure8 5...

Страница 100: ...99 STEP 3 Add a policy in Outgoing Policy and input the Address and Authentication of STEP1 2 Figure8 6 8 7 Figure8 6 Auth User Policy Setting Figure8 7 Complete the Policy Setting of Auth User...

Страница 101: ...ccess to Internet Figure8 8 STEP 5 If the user does not need to access to Internet anymore and is going to logout he she can click LOGOUT Auth User to logout the system Or enter the Logout Authenticat...

Страница 102: ...ect with internal network only before passing the authentication of VPN IPSec Autokey Adopt the built in Auth User Group Function STEP 1 Setup several Auth User in Authentication Figire8 10 Figure8 10...

Страница 103: ...entication function and enter the following settings Click New Entry Name Enter laboratory Select the Auth User you want and Add to Selected Auth User Click OK Complete the setting of Auth User Group...

Страница 104: ...of STEP 2 Figure8 12 Figure8 12 Compare Authentication with IPSec Autokey STEP 4 When external users try to connect with the PC of the ALL7008 by IPSec Autokey they must pass the authentication first...

Страница 105: ...need connection and is going to logout he she can click the LOGOUT Auth User button or enter the Logout Authentication WebUI http LAN Interface Authentication port number logout html to logout Figure...

Страница 106: ...DIUS Server built in Windows 2003 Server Authentication Windows 2003 RADIUS Server Setting Way STEP 1 Click Start Control Panel Add Remove Program Choose Add Remove Windows and then you can see Window...

Страница 107: ...106 STEP 3 Choose Internet Authentication Service IAS Figure8 16 Figure8 16 Add New Internet Authentication Services WebUI...

Страница 108: ...107 STEP 4 Click Start Control Panel Administrative Tools Choose Internet Authentication Service Figure8 17 Figure8 17 Choose Internet Authentication Service...

Страница 109: ...108 STEP 5 Press right button on RADIUS Clients and choose New RADIUS Client Figure8 18 Figure8 18 Add New RADIUS Client...

Страница 110: ...109 STEP 6 Enter the Name and Client Address also the ALL7008 IP Figure8 19 Figure8 19 Add New RADIUS Client Name and Address...

Страница 111: ...110 STEP 7 Choose RADIUS Standard enter Shared Secret and Confirm Shared Secret The settings must be the same as RADIUS of ALL7008 Figure8 20 Figure8 20 Add New RADIUS Client and Password WebUI...

Страница 112: ...111 STEP 8 Press the right button on Remote Access Policies and select to add New Remote Access Policy Figure8 21 Figure8 21 Add New Remote Access Policy...

Страница 113: ...112 STEP 9 Select Use the wizard to set up a typical policy for a common scenario and enter the Policy name Figure8 22 Figure8 22 Add Remote Access Policy and Name...

Страница 114: ...113 STEP 10 Select Ethernet Figure8 23 Figure8 23 Add New Remote Access Policy Method...

Страница 115: ...114 STEP 11 Choose User Figure8 24 Figure8 24 Add New Remote Access Policy of User or Group Access...

Страница 116: ...115 STEP 12 Select MD5 Challenge Figure8 25 Figure8 25 Authentication Methods of Adding New Remote Access Policy...

Страница 117: ...116 STEP 13 Press the right button on Radius and choose Properties Figure8 26 Figure8 26 Internet Authentication Service Setting WebUI...

Страница 118: ...117 STEP 14 Select Grant remote access permission and Remove the original setting click Add to add a new one Figure8 27 Figure8 27 RADIUS Properties Settings...

Страница 119: ...118 STEP 15 Add Service Type Figure8 28 Figure8 28 Add New RADIUS Attribute...

Страница 120: ...119 STEP 16 Add Authenticate Only from the left side Figure8 29 Figure8 29 Add RADIUS Service Type...

Страница 121: ...120 STEP 17 Press Edit Profile button and select Authentication and select Unencrypted authentication PAP SPAP Figure8 30 Figure8 30 Edit DADIUS Dial in Property...

Страница 122: ...121 STEP 18 Add Auth User Click Start Setting Control Panel Administrative Tools Choose Computer Management Figure8 31 Figure8 31 Enter Computer Management...

Страница 123: ...122 STEP 19 Press the right button on the Users and select New User Figure8 32 Figure8 32 Add New User STEP 20 Complete the setting of Windows 2003 RADIUS Server...

Страница 124: ...d Secret The setting must be the same as RADIUS Server in RADIUS of Authentication Figure8 33 Figure8 33 Setting RADIUS Server STEP 22 Add Radius User in Auth User Group of Authentication Figure8 34 F...

Страница 125: ...3 Add a policy of Auth User Group RADIUS that set by STEP 22 in Outgoing Policy Figure8 35 8 36 Figure8 35 RADIUS Authentication Policy Setting WebUI Figure8 36 Complete RADIUS Authentication of Polic...

Страница 126: ...nnect with Internet through browser the Authentication windows will appear in browser After entering the correct account and password can connect with Internet through ALL7008 Figure8 37 Figure8 37 Ac...

Страница 127: ...e authentication of policy Adopt the external POP3 Server Authentication STEP 1 Enter the following setting in POP3 in Authentication Figure8 38 Figure8 38 POP3 Server Setting WebUI STEP 2 Add POP3 Us...

Страница 128: ...Add a policy of Authentication User Group that set in STEP2 in Outgoing Policy Figure8 40 8 41 Figure8 40 POP3 Server Authentication Policy Setting Figure8 41 Complete POP3 Server Authentication Poli...

Страница 129: ...to access to Internet by browser the Authentication WebUI will display in the browser After entering correct account and password click on OK and then can access to Internet by ALL7008 Figure8 42 Fig...

Страница 130: ...and metacharacter and Script Blocking The access authority of Popup ActiveX Java Cookies P2P Blocking The authority of sending files by eDonkey eMule Bit Torrent IM Blocking To restrict the authority...

Страница 131: ...ng Prevent Java packets Cookies Blocking Prevent Cookies packets eDonkey Blocking Prevent users to deliver files by eDonkey and eMule BitTorrent Blocking Prevent users to deliver files by BitTorrent W...

Страница 132: ...131 Prevent users to deliver specific sub name file by http All Type Prevent users to send the Audio Video types and sub name file etc by http protocol...

Страница 133: ...strict the Internal Users to access to Script file of Website 136 Ex3 P2P Blocking Restrict the Internal Users to access to the file on Internet by P2P 138 Ex4 IM Blocking Restrict the Internal Users...

Страница 134: ...ant to open up in URL String While adding you must enter the symbol in front of the complete domain name or key word that represents to open these website to enter For example www kcg gov tw or gov 2...

Страница 135: ...ltering function Click New Entry URL String Enter yahoo and click OK Click New Entry URL String Enter google and click OK Click New Entry URL String Enter and click OK Complete setting a URL Blocking...

Страница 136: ...Policy Setting STEP 3 Complete the policy of permitting the internal users only can access to some specific website in Outgoing Policy function Figure9 3 Figure9 3 Complete Policy Settings Afterwards...

Страница 137: ...ebsite STEP 1 Select the following data in Script of Content Blocking function Select Popup Blocking Select ActiveX Blocking Select Java Blocking Select Cookies Blocking Click OK Complete the setting...

Страница 138: ...3 Complete the policy of restricting the internal users to access to Script file of Website in Outgoing Policy Figure9 6 Figure9 6 Complete Script Blocking Policy Setting The users may not use the spe...

Страница 139: ...ile on Internet by P2P STEP 1 Select the following data in P2P of Content Blocking function Select eDonkey Blocking Select BitTorrent Blocking Select WinMX Blocking Click OK Complete the setting of P2...

Страница 140: ...file on Internet by P2P in Outgoing Policy Figure9 9 Figure9 9 Complete P2P Blocking Policy Setting P2P Transfer will occupy large bandwidth so that it may influence other users And P2P Transfer can...

Страница 141: ...and audio by Instant Messaging STEP 1 Enter as following in IM Blocking of Content Blocking function Select MSN Messenger Yahoo Messenger ICQ Messenger QQ Messenger and Skype Click OK Complete the set...

Страница 142: ...king function Figire9 11 Figure9 11 Add New IM Blocking Policy STEP 3 Complete the policy of restricting the internal users to send message files audio and video by instant messaging in Outgoing Polic...

Страница 143: ...ome specific sub name file from http or ftp protocol directly STEP 1 Enter the following settings in Download of Content Blocking function Select All Types Blocking Click OK Complete the setting of Do...

Страница 144: ...ure9 14 Figure9 14 Add New Download Blocking Policy Setting STEP 3 Complete the Outgoing Policy of restricting the internal users to access to video audio and some specific sub name file by http proto...

Страница 145: ...144...

Страница 146: ...tual Server function can solve this problem A Virtual Server has set the real IP address of the ALL7008 s WAN network interface to be the Virtual Server IP Through the Virtual Server function the ALL7...

Страница 147: ...external users cannot connect to its private IP Address directly The user must connect to the ALL7008 s WAN subnet s Real IP and then map Real IP to Private IP of LAN by the ALL7008 It is a one to on...

Страница 148: ...rt Number The service name that provided by the Virtual Server External Service Port The WAN Service Port that provided by the virtual server If the service you choose only have one port and then you...

Страница 149: ...hrough policy by Virtual Server Take Web service for example 152 Ex3 Virtual Server The external user use VoIP to connect with VoIP of LAN VoIP Port TCP 1720 TCP 15328 15333 UDP 15328 15333 155 Ex4 Vi...

Страница 150: ...is External DNS Server STEP 2 Enter the following setting in LAN of Address function Figure10 1 Figure10 1 Mapped IP Settings of Server in Address STEP 3 Enter the following data in Mapped IP of Virtu...

Страница 151: ...the same time Figure10 3 Figure10 3 Service Setting STEP 5 Add a policy that includes settings of STEP3 4 in Incoming Policy Figure10 4 Figure10 4 Complete the Incoming Policy STEP 6 Add a policy that...

Страница 152: ...by mapped IP Figure10 6 Figure10 6 A Single Server that Provides Several Services by Mapped IP Strong suggests not to choose ANY when setting Mapped IP and choosing service Otherwise the Mapped IP wil...

Страница 153: ...gle service to provide service through policy by Virtual Server Take Web service for example STEP 1 Setting several servers that provide Web service in LAN network which IP Address is 192 168 1 101 19...

Страница 154: ...assistance Click OK Figure10 7 Figure10 7 Virtual Server Real IP Setting Click New Entry Service Select HTTP 80 External Service Port Change to 8080 Load Balance Server1 Enter 192 168 1 101 Load Balan...

Страница 155: ...lete Virtual Server Policy Setting In this example the external users must change its port number to 8080 before entering the Website that set by the Web server STEP 4 Complete the setting of providin...

Страница 156: ...DP 15328 15333 STEP 1 Set up VoIP in LAN network and its IP is 192 168 1 100 STEP 2 Enter the following setting in LAN of Address function Figure10 11 Figure10 11 Setting LAN Address WebUI STEP 3 Add...

Страница 157: ...I Click New Entry Service Select Custom Service VoIP_Service External Service Port From Service Custom Load Balance Server1 Enter 192 168 1 100 Click OK Complete the setting of Virtual Server Figure10...

Страница 158: ...by STEP4 Figure10 15 Figure10 15 Complete the Policy includes Virtual Server Setting STEP 6 Enter the following setting of the internal users using VoIP to connect with external network VoIP in Outgoi...

Страница 159: ...xternal internal user using specific service to communicate with each other by Virtual Server Figure10 17 Figure10 17 Complete the Setting of the External Internal User using specific service to commu...

Страница 160: ...l servers that provide several services in LAN network Its network card s IP is 192 168 1 101 192 168 1 102 192 168 1 103 192 168 1 104 and the DNS setting is External DNS server STEP 2 Enter the foll...

Страница 161: ...160 STEP 3 Group the service of server in Custom of Service Add a Service Group for server to send e mail at the same time Figure10 20 Figure10 20 Add New Service Group...

Страница 162: ...al IP Enter 211 22 22 23 click Assist for assistance Click OK Figure10 21 Figure10 21 Virtual Server Real IP Setting Click New Entry Service Select Group Service Main_Service External Service Port Fro...

Страница 163: ...t by STEP 3 Figure10 23 Figure10 23 Complete Incoming Policy Setting STEP 6 Add a new policy that includes the settings of STEP2 3 in Outgoing Policy It makes server can send e mail to external mail s...

Страница 164: ...163 STEP 7 Complete the setting of providing several services by Virtual Server Figure10 25 Figure10 25 Complete the Setting of Providing Several Services by Several Virtual Server...

Страница 165: ...164...

Страница 166: ...ovides a standard method to negotiate keys between two security gateways Also set up IPSec Lifetime and Preshared Key of the ALL7008 PPTP Server The System Manager can set up VPN PPTP Server functions...

Страница 167: ...stablishment of Security Associations SAs Main Mode This is another first phase of the Oakley protocol in establishing a security association but instead of using three packets like in aggressive mode...

Страница 168: ...last for the next 20 to 30 years NULL Algorithm It is a fast and convenient connecting mode to make sure its privacy and authentication without encryption NULL Algorithm doesn t provide any other saf...

Страница 169: ...y Destination Subnet Destination network subnet Algorithm To display the Algorithm way Status To display the current situation of VPN Connect or Disconnect Configure Click Modify to change the argumen...

Страница 170: ...t user s name when connecting to PPTP Server Client IP Display the PPTP Client s IP address when connecting to PPTP Server Uptime Display the connection time between PPTP Server and Client Status Disp...

Страница 171: ...splays the connection time between PPTP Server and Client Status Displays current connection status between PPTP Server and PPTP client Configure Click Modify to change the argument of PPTP Client cli...

Страница 172: ...between two ALL7008 Connection adopts Aggressive Mode Algorithm Data adopts IPSec Algorithm Encryption 3DES Authentication MD5 236 Ex4 IPSec Autokey Setting IPSec VPN connection between two ALL7008 Co...

Страница 173: ...work platform Suppose Company A 192 168 10 100 create a VPN connection with Company B 192 168 20 100 for downloading the sharing file The Default Gateway of Company A is the LAN IP of the ALL7008 192...

Страница 174: ...IPSec VPN Autokey Tunnel Setting STEP 3 Select Remote Gateway Fixed IP In To Destination list and enter the IP Address Subnet 192 168 20 0 and Mask 255 255 255 0 of Company B Figure11 6 Figure11 6 IPS...

Страница 175: ...r ENC Algorithm MD5 for AUTH Algorithm and GROUP1 for group Figure11 8 Figure11 8 IPSec Encapsulation Setting STEP 6 You can choose Data Encryption Authentication or Authentication Only to communicate...

Страница 176: ...t disconnection Figure11 10 Figure11 10 IPSec Perfect Forward Secrecy Setting STEP 8 Select Schedule and if it is permissive to transfer data with each other by Show remote Network Neighborhood Figure...

Страница 177: ...way of Company B s ALL7008 192 168 20 1 and select IPSec Autokey in VPN Click New Entry Figure11 13 Figure11 13 IPSec Autokey WebUI STEP 2 In the list of IPSec Autokey fill in Name with VPN_B and sele...

Страница 178: ...ect Preshare in Authentication Method and enter the Preshared Key max 100 bits Figure11 16 Figure11 16 IPSec Authentication Method Setting STEP 5 Select ISAKMP Algorithm in Encapsulation list Choose t...

Страница 179: ...on way for data transmission Figure11 18 Figure11 18 IPSec Algorithm Setting STEP 7 After selecting Perfect Forward Secrecy and enter 28800 seconds in IPSec Lifetime also can enter the Keep Alive IP o...

Страница 180: ...179 STEP 9 Click OK to complete the setting of Company B Figure11 21 Figure11 21 Complete Company B IPSec VPN Setting STEP 10 Complete IPSec VPN Connection Figure11 22 Figure11 22 IPSec VPN Setting...

Страница 181: ...L7008 and Windows 2000 IPSec VPN as work platform Suppose Company B 211 22 22 22 create a VPN connection with Company A 192 168 10 100 for downloading the sharing file The Default Gateway of Company A...

Страница 182: ...255 0 Figure11 24 Figure11 24 IPSec VPN Auto keyed Tunnel Setting STEP 3 Select Remote Client Fixed IP or Dynamic IP In To Destination list Figure11 25 Figure11 25 IPSec To Destination Setting STEP 4...

Страница 183: ...ENC Algorithm MD5 for AUTH Algorithm and GROUP2 for Group Figure11 27 Figure11 27 IPSec Encapsulation Setting STEP 6 You can choose Data Encryption Authentication or Authentication Only to communicate...

Страница 184: ...Figure11 29 Figure11 29 IPSec Perfect Forward Secrecy Setting STEP 8 Select Schedule QoS and Authentication User and if it is permissive to transfer data with each other by Show remote Network Neighb...

Страница 185: ...184 The PC of Company B use Real IP Address 211 22 22 22 Follow the steps below STEP 1 Enter Windows2000 and select Run in Start Figure11 32 Figure11 32 Start Windows 2000 IPSec VPN Setting...

Страница 186: ...the command mmc in Open field Figure11 33 Figure11 33 Enable Windows 2000 IPSec VPN Setting STEP 3 Enter File in Console1 WebUI select File option and then select Add Remote Snap ins Option Figure11 3...

Страница 187: ...186 STEP 4 Enter Add in Add Remote Snap ins And add IP Security Policy Management in Add Standalone Snap in WebUI Figure11 35 Figure11 35 Add IP Security Policy Management...

Страница 188: ...187 STEP 5 Select Local computer to complete adding Figure11 36 Figure11 36 Select Computer or Domain...

Страница 189: ...188 STEP 6 Complete adding IP Security Policy Management Figure11 37 Figure11 37 Complete Adding IP Security Policy Management...

Страница 190: ...189 STEP 7 Press the right button of the mouse in IP Security Policies on Local Computer selection and select Create IP Security Policy Figure11 38 Figure11 38 Create IP Security Policy...

Страница 191: ...190 STEP 8 Click on Next Figure11 39 Figure11 39 Enable IP Security Policy...

Страница 192: ...191 STEP 9 Enter IP Security Policy Name and Description and click on Next in IP Security Policy Wizard WebUI Figure11 40 Figure11 40 Setting IP Security Policy Name and Description...

Страница 193: ...192 STEP 10 Please cancel Active the default response rule selection and click on Next Figure11 41 Figure11 41 Cancel Active the Default Response Rule Selection...

Страница 194: ...193 STEP 11 Complete setting IP Security Policy and click on Finish Select the Edit properties Figure11 42 Figure11 42 Complete the IP Security Policy Wizard...

Страница 195: ...194 STEP 12 Enter VPN_B Properties WebUI and do not select Use Add Wizard Select Add and enter Edit Properties Figure11 43 Figure11 43 VPN_B Properties WebUI...

Страница 196: ...195 STEP 13 Click on Add in New Rule Properties WebUI Figure11 44 Figure11 44 Add New IP Filter List...

Страница 197: ...196 STEP 14 Please do not select Use Add Wizard in IP Filter List Change the name as VPN_B WAN TO LAN and click Add Figure11 45 Figure11 45 IP Filter List WebUI...

Страница 198: ...ny B 211 22 22 22 Subnet Mask 255 255 255 255 And select A specific IP Subnet in Destination address and enter the LAN IP of Company A 192 168 10 0 Subnet Mask 255 255 255 0 Please do not select Mirro...

Страница 199: ...198 STEP 16 Complete the setting and close IP Filter List Window Figure11 47 Figure11 47 Complete IP Filter List...

Страница 200: ...199 STEP 17 Select Require Security in Filter Action WebUI and click Edit Figure11 48 Figure11 48 Filter Action Setting...

Страница 201: ...200 STEP 18 Enter Require Security Properties WebUI and select Negotiate security Figure11 49 Figure11 49 Select Session key perfect forward secrecy...

Страница 202: ...201 STEP 19 Please select Custom None 3DES MD5 and click Edit Figure11 50 Figure11 50 Edit Security Method...

Страница 203: ...202 STEP 20 Click Custom provide for professional users and select Settings Figure11 51 Figure11 51 Custom Security Method...

Страница 204: ...Please select ESP and choose MD5 and 3DES Also select Generate a new key every Enter 28800 seconds and click OK triple times to go back to Rule Properties Figure11 52 Figure11 52 Custom Security Meth...

Страница 205: ...204 STEP 22 Enter Connection Type and select All network connections Figure11 53 Figure11 53 Connection Type Setting...

Страница 206: ...205 STEP 23 Enter Tunnel Setting WebUI Select The tunnel endpoint is specified by this IP address and enter the WAN IP of Company A Figure11 54 Figure11 54 Tunnel Setting...

Страница 207: ...206 STEP 24 Enter Authentication Methods WebUI and select Edit Figure11 55 Figure11 55 Authentication Method Setting WebUI...

Страница 208: ...207 STEP 25 Select the item Use this string to protect preshared key and enter the preshared key 123456789 Figure11 56 Figure11 56 Setting VPN Connection Preshared Key...

Страница 209: ...208 STEP 26 Complete Setting and close the WebUI Figure11 57 Figure11 57 Complete Authentication Methods Setting...

Страница 210: ...209 STEP 27 Complete the VPN_B WAN TO LAN Settings Figure11 58 Figure11 58 Complete VPN_B WAN TO LAN Setting...

Страница 211: ...210 STEP 28 Please enter VPN_B Properties WebUI again and do not select Use Add Wizard Select Add to enter Edit Properties Figure11 59 Figure11 59 VPN_B Properties WebUI...

Страница 212: ...211 STEP 29 Please select Add in New Rule Properties WebUI Figure11 60 Figure11 60 Add New Rule Properties WebUI...

Страница 213: ...212 STEP 30 Please do not select Use Add Wizard in IP Filter List Please change the name as VPN_B LAN TO WAN and select Add Figure11 61 Figure11 61 IP Filter List WebUI...

Страница 214: ...192 168 10 0 Subnet mask 255 255 255 0 Select A specific IP Address in Destination address and enter the WAN IP of Company B 211 22 22 22 Subnet mask 255 255 255 255 Please do not select Mirrored Also...

Страница 215: ...214 STEP 32 Complete Setting and close IP Filter List WebUI Figure11 63 Figure11 63 Complete IP Filter List Setting...

Страница 216: ...215 STEP 33 Select Require Security in Filter Action WebUI and click Edit Figure11 64 Figure11 64 Filter Action WebUI...

Страница 217: ...216 STEP 34 Enter Require Security Properties WebUI and select Session key perfect forward secrecy PFS Figure11 65 Figure11 65 Select PFS...

Страница 218: ...217 STEP 35 Select Custom None 3DES MD5 and choose Edit Figure11 66 Figure11 66 Setting Security Methods...

Страница 219: ...218 STEP 36 Select Custom provide for professional users and click Settings Figure11 67 Figure11 67 Modify Security Method...

Страница 220: ...tegrity and encryption ESP and choose MD5 and 3DES Also select Generate a new key every Enter 28800 seconds and click OK triple times to go back to Rule Properties WebUI Figure11 68 Figure11 68 Comple...

Страница 221: ...220 STEP 38 Select All network connections in Connection Type Figure11 69 Figure11 69 Connection Type Setting...

Страница 222: ...221 STEP 39 Enter Tunnel Setting WebUI Select The tunnel endpoint is specified by this IP address and enter the WAN IP of Company B 211 22 22 22 Figure11 70 Figure11 70 Tunnel Setting WebUI...

Страница 223: ...222 STEP 40 Enter Authentication Methods WebUI and select Edit Figure11 71 Figure11 71 Authentication Methods Setting WebUI...

Страница 224: ...223 STEP 41 Select the item Use this string preshared key to protect the key exchange preshared key and enter the preshared key 123456789 Figure11 72 Figure11 72 Complete Authentication Method Setting...

Страница 225: ...224 STEP 42 Complete Setting and close the WebUI Figure11 73 Figure11 73 Complete New Rule Properties Setting...

Страница 226: ...225 STEP 43 Complete VPN_B LAN TO WAN Settings Figure11 74 Figure11 74 Complete VPN_B LAN TO WAN Setting...

Страница 227: ...226 STEP 44 Please enter General in VPN_B Properties WebUI and click Advanced Figure11 75 Figure11 75 VPN_B Properties General WebUI...

Страница 228: ...227 STEP 45 Please select Master key perfect forward secrecy PFS and click Methods Figure11 76 Figure11 76 Key Exchange Settings WebUI...

Страница 229: ...228 STEP 46 Please move IKE 3DES MD5 Medium 2 to the top and complete all the settings Figure11 77 Figure11 77 To Adjust Security Method Order...

Страница 230: ...229 STEP 47 Complete all the Window2000 VPN Setting of Company B Figure11 78 Figure11 78 Complete Windows2000 IPSec VPN Setting...

Страница 231: ...230 STEP 48 Please press the right button of the mouse on VPN_B and enable VPN_B Figure11 79 Figure11 79 Enable VPN_B Security Method...

Страница 232: ...231 STEP 49 To reboot IPSec Service please begin with Start and select Settings then enter Control Panel Figure11 80 Figure11 80 Enter Control Panel...

Страница 233: ...232 STEP 50 After entering Control Panel WebUI please enter Administrative Tools Figure11 81 Figure11 81 Enter Administrative Tools...

Страница 234: ...233 STEP 51 Please select Services item after entering Administrative Tools Figure11 82 Figure11 82 Enter Services item...

Страница 235: ...234 STEP 52 After entering Services please select IPSec Services to restart Figure11 83 Figure11 83 Restart IPSec Policy Agent...

Страница 236: ...235 STEP 53 Complete all of the settings Figure11 84 Figure11 84 The IPSec VPN Setting of ALL7008 and Windows 2000...

Страница 237: ...flattop Suppose Company A 192 168 10 100 is going to have VPN connection with Company B 192 168 20 100 and download the resource Connection adopts Aggressive Mode Algorithm The Default Gateway of Comp...

Страница 238: ...86 Figure11 86 IPSec VPN Autokey Tunnel Setting STEP 3 Select Remote Gateway Fixed IP In To Destination list and enter the IP Address Subnet 192 168 20 0 and Mask 255 255 255 0 of Company B Figure11 8...

Страница 239: ...u are going to input numbers or alphabets for detection add in the front For example 123A Abcd1 Figure11 89 Figure11 89 IPSec Aggressive Mode Setting STEP 6 Select Data Encryption Authentication in IP...

Страница 240: ...ction Figure11 91 Figure11 91 IPSec Perfect Forward Secrecy Setting STEP 8 Select Schedule QoS and Authentication User and if it is permissive to connect with each other by Show remote Network Neighbo...

Страница 241: ...ateway of the ALL7008 of Company B 192 168 20 1 and select IPSec Autokey in VPN Click New Entry Figure11 94 Figure11 94 IPSec Autokey WebUI STEP 2 In the list of IPSec Autokey fill in Name with VPN_B...

Страница 242: ...e Remote IP Address Subnet 192 168 10 0 and Mask 255 255 255 0 of Company A Figure11 96 Figure11 96 IPSec To Destination Setting STEP 4 Select Preshare in Authentication Method and enter the Preshared...

Страница 243: ...ou are going to input numbers or alphabets for detection add in the front For example 123A Abcd1 Figure11 98 Figure11 98 IPSec Aggressive Mode Setting STEP 6 Select Data Encryption Authentication in I...

Страница 244: ...on Figure11 100 Figure11 100 IPSec Perfect Forward Secrecy Setting STEP 8 Select Schedule QoS and Authentication User and if it is permissive to connect with each other by Show remote Network Neighbor...

Страница 245: ...244 STEP 10 Complete IPSec VPN Aggressive Mode Settings Figure11 103 Figure11 103 IPSec VPN Aggressive Mode Settings...

Страница 246: ...form Suppose Company A 192 168 10 100 is going to have VPN connection with Company B 192 168 20 100 and download the resource Connection adopts GRE IPSec Algorithm The Default Gateway of Company A is...

Страница 247: ...105 IPSec VPN Autokey Tunnel Setting STEP 3 Select Remote Gateway Fixed IP In To Destination list and enter the IP Address Subnet 192 168 20 0 and Mask 255 255 255 0 of Company B Figure11 106 Figure11...

Страница 248: ...UP1 2 5 Both sides have to choose the same group Here we select 3DES for ENC Algorithm MD5 for AUTH Algorithm and GROUP1 for connection Figure11 108 Figure11 108 IPSec Encapsulation Setting STEP 6 Sel...

Страница 249: ...e encapsulation way for connection Figure11 110 Figure11 110 IPSec Algorithm Setting STEP 8 After selecting Perfect Forward Secrecy and enter 28800 seconds in IPSec Lifetime but the Keep Alive IP fiel...

Страница 250: ...249 STEP 10 Click OK to complete the setting of Company A Figure11 113 Figure11 113 Complete IPSec VPN Setting of Company A...

Страница 251: ...Company B 192 168 20 1 and select IPSec Autokey in VPN Click New Entry Figure11 114 Figure11 114 IPSec Autokey WebUI STEP 2 In the list of IPSec Autokey fill in Name with VPN_B and select LAN in From...

Страница 252: ...enter the Preshared Key max 100 bits Figure11 117 Figure11 117 IPSec Authentication Method Setting STEP 5 Select ISAKMP Algorithm in Encapsulation Choose the Algorithm when setup connection Please se...

Страница 253: ...yption Authentication or Authentication Only to communicate ENC Algorithm 3DES DES AES NULL AUTH Algorithm MD5 SHA1 Here we select 3DES for ENC Algorithm and MD5 for AUTH Algorithm to make sure the en...

Страница 254: ...if it is permissive to connect with each other by Show remote Network Neighborhood Figure11 122 Figure11 122 IPSec Schedule and QoS Setting STEP 10 Click OK to complete the setting of Company B Figure...

Страница 255: ...254 STEP 11 Complete IPSec VPN GRE IPSec Setting Figure11 124 Figure11 124 IPSec VPN GRE IPSec Setting...

Страница 256: ...Company A WAN IP 61 11 11 11 LAN IP 192 168 10 X Company B WAN IP 211 22 22 22 LAN IP 192 168 20 X This example takes two ALL7008 as flattop Suppose Company B 192 168 20 100 is going to have VPN conn...

Страница 257: ...ect Modify Select Encryption Client IP Range Enter 192 44 75 1 254 Idle Time Enter 0 Schedule Select Schedule_1 Figure11 125 Figure11 125 Modify PPTP VPN Server Settings Idle Time the setting time tha...

Страница 258: ...ALL7008 of Company A Select New Entry User Name Enter PPTP_Connection Password Enter 123456789 Remote Client Select Multi Machine and enter 192 168 20 0 in IP Address Netmask 255 255 255 0 Client IP a...

Страница 259: ...ord Enter123456789 Server Address Enter 61 11 11 11 Select Encryption Remote Server Select Multi Machine and enter 192 168 10 0 in IP Address Netmask 255 255 255 0 Select Auto Connect when sending pac...

Страница 260: ...259 STEP 4 Complete PPTP VPN Connection Figure11 128 Figure11 128 PPTP VPN Connection Setting...

Страница 261: ...y A ALL7008 WAN IP 61 11 11 11 LAN IP 192 168 10 X Company B Windows 2000 PC WAN IP 211 22 22 22 This example takes one ALL7008 and one Windows 2000 VPN PPTP as flattop Suppose Company B 211 22 22 22...

Страница 262: ...VPN function in the ALL7008 of Company A Select Modify Select Encryption Client IP Range Enter 192 44 75 1 254 Idle Time Enter 0 Schedule Select Schedule_1 Figure11 129 Figure11 129 Modify PPTP VPN S...

Страница 263: ...VPN function in the ALL7008 of Company A Select New Entry User Name Enter PPTP_Connection Password Enter 123456789 Remote Client Select Single Machine Client IP assigned by Select IP Range Figure11 13...

Страница 264: ...lowing settings in Company B Real IP 211 22 22 22 STEP 1 Enter Windows 2000 press the right key of the mouse in My Network Place and select Properties Figure11 131 Figure11 131 Start out Windows 2000...

Страница 265: ...264 STEP 2 Enter Network and Dial up Connections WebUI and then enter Make New Connection Figure11 132 Figure11 132 Network and Dial up Connections WebUI...

Страница 266: ...265 STEP 3 In the Location Information WebUI enter country region city code and the phone system you use and then click OK Figure11 133 Figure11 133 Setup Location Information WebUI...

Страница 267: ...266 STEP 4 Click OK in Phone And Modem Options WebUI Figure11 134 Figure11 134 Phone and Modem Options WebUI...

Страница 268: ...267 STEP 5 Click on Next in Network Connection Wizard Figure11 135 Figure11 135 Network Connection Wizard WebUI...

Страница 269: ...STEP 6 Select Connect to a private network through the Internet in Network Connection Wizard WebUI and click on Next Figure11 136 Figrue11 136 Setup to connect to a private network through the Intern...

Страница 270: ...269 STEP 7 Enter IP Address in Network Connection Wizard WebUI and click Next Figure11 137 Figure11 137 Host Name or IP Address Setting...

Страница 271: ...270 STEP 8 In Network Connection Wizard WebUI create the connection For all users and click on Next Figure11 138 Figure11 138 Connection Availability Setting...

Страница 272: ...271 STEP 9 Click on Finish on Network Connection Wizard WebUI to Complete the New Connection Wizard setting Figure11 139 Figure11 139 Complete the Network Connection Wizard Setting...

Страница 273: ...User name Enter PPTP_Connection Password Enter 123456789 Select Save Password Click on Connect Connecting VPN_Connection WebUI show up Figure11 141 At last is Connection Complete WebUI Figure11 142 F...

Страница 274: ...273 Figure11 142 PPTP VPN Connection Complete...

Страница 275: ...274 STEP 11 Complete PPTP VPN Connection Settings Figure11 143 Figure11 143 PPTP VPN Connection Setting...

Страница 276: ...applications are able to pass through the ALL7008 How to use Policy The device uses policies to filter packets The policy settings are source address destination address services permission packet lo...

Страница 277: ...ork The system manager can set all the policy rules of DMZ to LAN packets in this function 6 DMZ to WAN The source IP is in DMZ network the destination is in WAN network The system manager can set all...

Страница 278: ...WAN Port Control actions to permit or reject packets that delivered between LAN network and WAN network when pass through ALL7008 See the chart and illustration below Chart Name Illustration Permit a...

Страница 279: ...tically execute the function in a certain time Content Blocking Enable Content Blocking QoS Enable QoS Alarm Threshold Enable Alarm Threshold Traffic Log Record all the packets that go through policy...

Страница 280: ...d by policy And if the sessions exceed the setting value the surplus connection cannot be set successfully QoS Setting the Guarantee Bandwidth and Maximum Bandwidth of the Policy the bandwidth is shar...

Страница 281: ...5 Ex3 Outgoing Only allow the users who pass Authentication to access to Internet in particular time 290 Ex4 Incoming The external user control the internal PC through remote control software Take pcA...

Страница 282: ...e internal users Take Logging Statistics and Alarm Threshold for example STEP 1 Enter the following setting in Outgoing Policy Click New Entry Select Traafic Log Select Statistics Click OK Figure12 1...

Страница 283: ...Log and Statistics in Outgoing Policy Figure12 2 Figure12 2 Complete Policy Setting STEP 3 Obtain the information in Traffic of Log function if you want to monitor all the packets of the ALL7008 Figur...

Страница 284: ...283 STEP 4 To display the traffic record that through Policy to access to Internet in Policy Statistics of Statistics function Figure12 4 Figure12 4 Statistics WebUI...

Страница 285: ...284 STEP 5 It will show up the policy rule when the internal users use exceeds the default Alarm Threshold in Traffic Alarm of Alarm function Figure12 5 Figure12 5 Traffic Alarm WebUI...

Страница 286: ...ing for example STEP 1 Enter the following setting in URL Blocking Script Blocking P2P Blocking IM Blocking and Download Blocking in Content Blocking function Figure12 6 12 7 12 8 12 9 12 10 Figure12...

Страница 287: ...ript file of Website Java Cookies etc 3 P2P Blocking can restrict the Internal Users to access to the file on Internet by P2P eDonkey BT 4 IM Blocking can restrict the Internal Users to send message f...

Страница 288: ...and WAN Group of Address function Figure12 11 12 12 Figure12 11 Setting the WAN IP that going to block Figure12 12 WAN Address Group The Administrator can group the custom address in Address It is mor...

Страница 289: ...r the following setting in Outgoing Policy Click New Entry Destination Address Select WAN_Group that set by STEP 2 Blocking by IP Action WAN Port Select Deny Click OK Figure12 13 Figure12 13 Setting B...

Страница 290: ...g Content Blocking Policy STEP 5 Complete the setting of forbidding the users to access to specific network Figure12 15 Figure12 15 Complete Policy Setting Deny in Policy can block the packets that co...

Страница 291: ...ng in Schedule function Figure12 16 Figure12 16 Add New Schedule STEP 2 Enter the following in Auth User and Auth User Group in Authentication function Figure12 17 Figure12 17 Setting Auth User Group...

Страница 292: ...elect laboratory Schedule Select WorkingTime Click OK Figure12 18 Figure12 18 Setting a Policy of Authentication and Schedule STEP 4 Complete the policy rule of only allows the users who pass authenti...

Страница 293: ...l software Take pcAnywhere for example STEP 1 Set up a Internal PC controlled by external user and Internal PC s IP Address is 192 168 1 2 STEP 2 Enter the following setting in Virtual Server1 of Virt...

Страница 294: ...ual Server1 61 11 11 12 Service Select PC Anywhere Click OK Figure12 21 Figure12 21 Setting the External User Control the Internal PC Policy STEP 4 Complete the policy for the external user to control...

Страница 295: ...ace Address is192 168 3 1 24 STEP 2 Enter the following setting in Virtual Server1 of Virtual Server function Figure12 23 Figure12 23 Setting up Virtual Server Corresponds to FTP Server When using the...

Страница 296: ...ct FTP 21 QoS Select FTP_QoS MAX Concurrent Sessions Enter 100 Quota Per Day Enter 100000 Mbytes Click OK Figure12 25 Figure12 25 Add New Policy STEP 5 Complete the policy of restricting the external...

Страница 297: ...IP Address as 61 11 11 12 The DNS setting is external DNS Server STEP 2 Add the following setting in DMZ of Address function Figure12 27 Figure12 27 the Mail Server s IP Address Corresponds to Name Se...

Страница 298: ...ion Address Select Mail_Server Service Select E mail Click OK Figure12 29 Figure12 29 Setting a Policy to access Mail Service by WAN to DMZ STEP 5 Complete the policy to access mail service by WAN to...

Страница 299: ...on Address Select Mail_Server Service Select E mail Click OK Figure12 31 Figure12 31 Setting a Policy to access Mail Service by LAN to DMZ STEP 7 Complete the policy to access mail service by LAN to D...

Страница 300: ...ce Address Select Mail_Server Service Select E mail Click OK Figure12 33 Figure12 33 Setting the Policy of Mail Service by DMZ to WAN STEP 9 Complete the policy access to mail service by DMZ to WAN Fi...

Страница 301: ...300...

Страница 302: ...it means the dealing standard towards mail of ALL7008 In this chapter it is defined as Setting and Mail Relay After scanning the mails that sent to Internal Mail Server by Anti Spam and Anti Virus fun...

Страница 303: ...can the mail or not Unscanned Mail Setting According to the unscanned mail it can add an unscanned message in the mail subject For example add the following setting in this function 1 The scanned mail...

Страница 304: ...303 When receive unscanned mail it will add the tag in front of the e mail subject Figure13 2 Figure13 2 The Unscanned Mail Subject WebUI...

Страница 305: ...lowing Mail Relay setting STEP 1 Add the following setting in Mail Relay function of Configure Select Domain Name of Internal Mail Server Domain Name of Mail Server Enter the Domain Name IP Address of...

Страница 306: ...AN Port IP 61 11 11 11 ALL7008 s WAN Port IP 172 16 1 12 Mail Server IP 172 16 1 13 Map the DNS Domain Name broadband com tw to DNS Server IP setup MX record is Mail Server IP When LAN 172 16 1 0 16 u...

Страница 307: ...er Enter the IP address that Mail Server s domain name mapped to Figure13 4 Figure13 4 The First Mail Relay Setting WebUI STEP 2 Add the second setting in Mail Relay function of Configure Select Allow...

Страница 308: ...ort IP of ALL7008 61 11 11 11 Mail Server IP 61 11 11 12 WAN Port IP of the Branch Company s Firewall 211 22 22 22 Map the DNS Domain Name broadband com tw to DNS Server IP setup MX record is Mail Ser...

Страница 309: ...er Enter the IP address that Mail Server s domain name mapped to Figure13 6 Figure13 6 The First Mail Relay Setting WebUI STEP 2 Add the second setting in Mail Relay function of Configure Select Allow...

Страница 310: ...dvertisement or Spam mail meanwhile it can reduce the burden of mail server Also can prevent the users to pick up the message he she needs from a mass of useless mails or delete the needed mail mistak...

Страница 311: ...inspect all of the mails that are sent to the enterprise Also can add score tag or message to the subject line of Spam mail while it exceeds the standard After filtering if the mails still don t reach...

Страница 312: ...e relevant settings in Mail Relay function of Configure add the following settings in this function 1 The Mail Server is placed in Internal LAN or DMZ 2 The threshold score Enter 5 3 Add the message t...

Страница 313: ...312 When receive Spam mail it will add score tag and message in front of the subject of the E mail Figure14 2 Figure14 2 the subject of the mail that considered as spam mail WebUI...

Страница 314: ...313 When receive Ham mail it will only add score tag in front of the e mail s subject Figure14 3 Figure14 3 the subject of the mail that considered as Spam mail WebUI...

Страница 315: ...one of the custom rule mails that would be considered as spam mail or ham mail Classification When setting as Spam it will classify the mails that correspond to the rule as spam mail When setting as...

Страница 316: ...ize of the mail The Header items to detect the mail are Received Envelope To Form To Cc Bcc Subject Sender Reply To Errors To Message ID and Date Condition When Item is set as Header and Body the avai...

Страница 317: ...mes from specific mail address that cannot be sent to the recipient Define the required fields of Training Training Database The System Manager can Import or Export Training Database here Spam Mail fo...

Страница 318: ...pam Mail Top Total Spam To show the top chart that represent the spam mail that recipient receive and send In Top Total Spam report you can choose to display the scanned mails that sent to Internal Ma...

Страница 319: ...rst If there is a mapped MX record and then the e mail will be delivered to the MX Master first and then be delivered to the destination yahoo com tw by MX Master means the Master of yahoo co tw If it...

Страница 320: ...the user sending or receiving mails they are both completed by MTA Basically its functions are as below 1 To receive the mail that sent by external master when receiving the mails from external only...

Страница 321: ...of MUA it will deliver the mail to the MTA you appoint to When MTA receive the mail from itself it will hand over to MDA to deliver the mail to the mailbox of the user s account In the received mail...

Страница 322: ...MTA and transfer mail from MTA to the next MTA At present most of the mail server uses SMTP Protocol Simple Mail Transfer Protocol and the Port Number is 25 2 Receiving e mail MUA connect to MTA user...

Страница 323: ...elay function So in the range of this setting the Client can send receive mail very free As for the mail from the IP source without standard will be blocked completely In this case there comes Simple...

Страница 324: ...elist and Blacklist to filter the mail Mail Server is in DMZ and use Transparent Mode 328 Ex 3 Place ALL7008 between the original Gateway and Mail Server to set up the Rule to filter the mail Mail Ser...

Страница 325: ...139 12 and the DNS setting is DNS server STEP 2 In LAN of Address function add the following settings Figure14 4 Figure14 4 Mapped IP of Internal User s PC in Address Book STEP 3 Add the following set...

Страница 326: ...325 STEP 5 Add the following setting in Setting of Anti Spam function Figure14 7 Figure14 7 Action of Spam Mail and Spam Setting...

Страница 327: ...or received from external mail server Figure14 8 Figure14 8 Default Value of Spam Setting When only filter the mail that internal users received from external server 1 In Action of Spam Mail no matter...

Страница 328: ...e mail at the same time and the chart will be in the Spam Mail in Anti Spam function At this time choose External to see the mail account chart Figure14 9 Figure14 9 Report Function Chart To setup the...

Страница 329: ...l DNS server and the Master name is broadband com tw STEP 2 Enter the following setting in DMZ of Address function Figure14 10 Figure14 10 Mapped Name Setting in Address of Mail Server STEP 3 Enter th...

Страница 330: ...AN Policy Setting STEP 6 Enter the following setting in Mail Relay function of Setting Figure14 14 Figure14 14 Mail Relay Setting of External Mail to Internal Mail Server Mail Relay function makes the...

Страница 331: ...te mail in Action of Spam Mail and then the other functions Deliver to the recipient or Forward to cannot be selected So when ALL7008 had scanned spam mail it will delete it directly But still can che...

Страница 332: ...are2k01 yahoo com tw Direction Select From Enable Auto Training Click OK Figure14 16 Enter New Entry again Whitelist Enter josh broadband com tw Direction Select To Enable Auto Training Click OK Figur...

Страница 333: ...re14 18 Complete Whitelist Setting When enable Auto Training function the mail that correspond to Whitelist setting will be trained as Ham Mail automatically according to the time setting in Training...

Страница 334: ...mail that correspond to Blacklist setting will be trained as Spam Mail automatically according to the time setting in Training function The address of Whitelist and Blacklist can be set as complete ma...

Страница 335: ...er yahoo sender account share2k003 yahoo com tw and then there will only be josh broadband com tw can receive the mail that sent from this sender account the mail that sent to steve broadband com tw w...

Страница 336: ...LL7008 172 16 1 12 STEP 1 Setup a Mail Server in DMZ and its network card IP is 172 16 1 13 The DNS setting is external DNS Server Its host name is broadband com tw STEP 2 Enter the following setting...

Страница 337: ...24 WAN to DMZ Policy Setting STEP 5 Enter the following setting in DMZ to WAN Policy Figure14 25 Figure14 25 DMZ to WAN Policy Setting STEP 6 Add the following setting in Mail Relay in Configure Figu...

Страница 338: ...em Select From Condition Select Contains Pattern share2k01 Click Next Row In the second Item field Select To Condition Select Contains Pattern josh Figure14 27 Press OK Figure14 28 Figure14 27 The Fir...

Страница 339: ...pam Action Select Deliver to the recipient Enable Auto Training Item Select From Condition Select Contains Pattern yahoo Figure14 29 Press OK Figure14 30 Figure14 29 The Second Rule Setting Figure14 3...

Страница 340: ...ule as filter standard first and then is Whitelist Blacklist is the last one be taken Select one of the mails in Outlook Express Press the right key of the mouse and select Content and select Details...

Страница 341: ...l receive the mail that sent by this sender account If it comes from other yahoo sender account share2k003 yahoo com tw and then there will only be josh broadband com tw can receive the mail that sent...

Страница 342: ...the spam mail that had not detected as spam mail be considered as spam mail after training STEP 1 Create a new folder SpamMail in Outlook Express Press the right key of the mouse and select New Folder...

Страница 343: ...342 Figure14 34 Create Folder WebUI...

Страница 344: ...to SpamMail Folder In Inbox select all of the spam mails that do not judge correctly and press the right key of the mouse and move to the folder Figure14 35 In Move WebUI select SpamMail Folder and cl...

Страница 345: ...344 Figure14 36 Select Folder for Spam Mail to move to...

Страница 346: ...SpamMail Folder in Outlook Express to shorten the data and upload to ALL7008 for training Select SpamMail Folder Figure14 37 Select Compact function in selection of the folder Figure14 38 Figure14 37...

Страница 347: ...346 Figure14 38 Compact SpamMail Folder...

Страница 348: ...ess to convenient to upload the training to ALL7008 Press the right key of the mouse in SpamMail file and select Properties function Figure14 39 Copy the file address in SpamMail Properties WebUI Figu...

Страница 349: ...348 Figure14 40 Copy the File Address that SpamMail File Store...

Страница 350: ...Training field in Training function of Anti Spam And press OK to deliver this file to ALL7008 instantly and to learn the uploaded mail file as spam mail in the appointed time Figure14 41 Figure14 41...

Страница 351: ...L7008 can be any data file and not restricted in its sub name but the file must be ACS11 form When the training file of ALL7008 is Microsoft Office Outlook exporting file pst it has to close Microsoft...

Страница 352: ...upload to ALL7008 to training directly next time Select all of the mails in SpamMail File and press the right key of the mouse to select Delete function Figure14 42 Make sure that all of the mails in...

Страница 353: ...352 Figure14 43 Confirm that All of the Mail in SpamMail File had been Deleted...

Страница 354: ...after training STEP 1 Add a new HamMail folder in Outlook Express Press the right key of the mouse in Local Folders and select New Folder Figure14 44 Enter HamMail in Folder Name in Create Folder WebU...

Страница 355: ...354 Figure14 45 Create Folder Function WebUI...

Страница 356: ...er In Inbox select the spam mail that all of the recipients need and press the right key of the mouse on the mail and choose Move to Folder function Figure14 46 Select HamMail folder in Move WebUI and...

Страница 357: ...356 Figure14 47 Select the Folder for Needed Spam Mail to Move to...

Страница 358: ...ct the HamMail folder in Outlook Express to shorten the data and upload to ALL7008 for training Select HamMail File Figure14 48 Select Compact function in selection of File Figure14 49 Figure14 48 Sel...

Страница 359: ...358 Figure14 49 Compact HamMail File...

Страница 360: ...press to convenient to upload the training to ALL7008 Press the right key of the mouse in HamMail file and select Properties function Figure14 50 Copy the file address in HamMail Properties WebUI Figu...

Страница 361: ...360 Figure14 51 Copy the File Address that HamMail File Store...

Страница 362: ...ning field in Training function of Anti Spam And press OK to transfer this file to the ALL7008 instantly and to learn the uploaded mail file as ham mail in the appointed time Figure14 52 Figure14 52 P...

Страница 363: ...sed and upload to ALL7008 to training directly next time Select all of the mails in HamMail and press the right key of the mouse to select Delete function Figure14 53 Make sure that all of the mails i...

Страница 364: ...363 Figure14 54 Make Sure all of the Mails in HamMail File had been Deleted...

Страница 365: ...364...

Страница 366: ...rnal Mail Server and prevent the e mail account of enterprise to receive mails include virus so that it will cause the internal PC be attacked by virus and lose the important message of enterprise In...

Страница 367: ...rver It will add warning message in front of the subject of the mail that had been detected have virus If after scanning and do not discover virus then it will not add any message in the subject field...

Страница 368: ...the relevant settings in Mail Relay function of Configure add the following settings in this function 1 Virus Scanner Select Clam 2 The Mail Server is placed in Internal LAN or DMZ 3 Add the message...

Страница 369: ...Add the message virus in the subject line of infected mail Figure15 2 Figure15 2 The Subject of Infected Mail WebUI When select Disable in Virus Scanner it will stop the virus detection function to e...

Страница 370: ...virus mail that the recipient receives and the sender sent In Top Total Virus Report it can choose to display the scanned mail that sent to Internal Mail Server or received from External Mail Server I...

Страница 371: ...es in this chapter No Example Page Ex 1 To detect if the mail that received from external Mail Server have virus or not 371 Ex 2 To detect the mail that send to Internal Mail Server have virus or not...

Страница 372: ...2 168 139 12 and the DNS setting is DNS server STEP 2 In LAN of Address function add the following settings Figure15 3 Figure15 3 Mapped IP of Internal User s PC in Address Book STEP 3 Add the followi...

Страница 373: ...i Virus function Figure15 6 Virus Scanner Select Clam The Mail Server is placed in External WAN Add the message to the subject line virus Select Remove virus mail and the attached file Figure15 6 Figu...

Страница 374: ...nt to the internal mail server or received from external mail server Figure15 7 Figure15 7 Default Value of Virus Mail Setting When only scan the mail that internal users received from external server...

Страница 375: ...mail at the same time and the chart will be in the Virus Mail in Anti Virus function At this time choose External to see the mail account chart Figure15 8 Figure15 8 Report Function Chart To setup th...

Страница 376: ...r in LAN and set its network card IP as 192 168 2 12 The DNS setting is external DNS server and the Master name is broadband com tw STEP 2 Enter the following setting in LAN of Address function Figure...

Страница 377: ...function Figure15 11 Figure15 11 Virtual Server Setting WebUI STEP 5 Enter the following setting in Incoming Policy Figure15 12 Figure15 12 Incoming Policy Setting STEP 6 Enter the following setting...

Страница 378: ...n Mail Relay function of Configure Figure15 14 Figure15 14 Mail Relay Setting of External Mail to Internal Mail Server Mail Relay function makes the mails that sent to LAN s mail server could be relay...

Страница 379: ...ttached file Action of Infected Mail Select Deliver to the recipient Figure15 15 Figure15 15 Infected Mail Definition and Action of Infected Mail When select Delete mail in Action of Infected Mail and...

Страница 380: ...in the attached file If it comes from other yahoo sender account share2k003 yahoo com tw which attached file is safe includes no virus After ALL7008 had scanned the mails above it will bring the chart...

Страница 381: ...380...

Страница 382: ...cks from hackers and the internal PC sending large DDoS attacks The Internal Alert and External Alert will start on blocking these packets to maintain the whole network In this chapter we will have th...

Страница 383: ...ng one and then the device will determine it as an attack SYN Flood Threshold Blocking Time Per Source IP Seconds When the ALL7008 determines as being attacked it will block the attacking source IP ad...

Страница 384: ...broadcasting your network is experiencing an UDP attack UDP Flood Threshold Total Pkts Sec The System Administrator can enter the maximum number of UDP packets per second that is allow to enter the ne...

Страница 385: ...ion to detect the port scans hackers use to continuously scan networks on the Internet to detect computers and vulnerable ports that are opened by those computers Detect Tear Drop Attack Select this o...

Страница 386: ...he TCP header is marked Enable this function to detect such abnormal packets After System Manager enable External Alert if the ALL7008 has detected any abnormal situation the alarm message will appear...

Страница 387: ...shold sessions of infected Blaster per Source IP the default value is 100 Sessions Sec Select Enable Blaster Blocking and enter the Blocking Time the default time is 600 seconds Select Enable E Mail A...

Страница 388: ...ear in the Internal Alarm in Attack Alarm or send NetBIOS Alert notification to the infected PC Administrator s PC Figure16 2 16 3 16 4 If the Administrator starts the E Mail Alert Notification in Set...

Страница 389: ...388 Figure16 4 NetBIOS Alert Notification to Administrator s PC...

Страница 390: ...389 Figure16 5 E mail Virus Alert...

Страница 391: ...390...

Страница 392: ...maintain the whole network External Alarm When ALL7008 detects attacks from hackers it writes attacking data in the External Alarm file and sends an e mail alert to the Administrator to take emergenc...

Страница 393: ...amples in the chapter No Suitable Situation Example Page Ex 1 Internal Alarm To record the DDoS attack alarm from internal PC 393 Ex 2 External Alarm To record the attack alarm about Hacker attacks th...

Страница 394: ...the DDoS attack alarm from internal PC STEP 1 Select Internal Alarm in Attack Alarm when the device detects DDoS attacks and then can know which computer is being affected Figure17 1 Figure17 1 Intern...

Страница 395: ...To record the attack alarm about Hacker attacks the ALL7008 and Intranet STEP 1 Select the following settings in External Alert in Alert Setting function Figure17 2 Figure17 2 External Alert Setting W...

Страница 396: ...395 STEP 2 When Hacker attacks the ALL7008 and Intranet select External Alarm in Attack Alarm function to have detailed records about the hacker attacks Figure17 3 Figure17 3 External Alarm WebUI...

Страница 397: ...396...

Страница 398: ...ted for each control policy Event Log record the contents of System Configurations changes made by the Administrator such as the time of change settings that change the IP address used to log in etc C...

Страница 399: ...that users use to access to Internet or Intranet by ALL7008 399 Ex 2 Event Log To record the detailed management events such as Interface and event description of ALL7008 of the Administrator 404 Ex...

Страница 400: ...to Internet or Intranet by ALL7008 STEP 1 Add new policy in DMZ to WAN of Policy and select Enable Logging Figure18 1 Figure18 1 Logging Policy Setting STEP 2 Complete the Logging Setting in DMZ to WA...

Страница 401: ...400 STEP 3 Click Traffic Log It will show up the packets records that pass this policy Figure18 3 Figure18 3 Traffic Log WebUI...

Страница 402: ...P 4 Click on a specific IP of Source IP or Destination IP in Figure18 3 it will prompt out a WebUI about Protocol and Port of the IP Figure18 4 Figure18 4 The WebUI of detecting the Traffic Log by IP...

Страница 403: ...5 Click on Download Logs and select Save in File Download WebUI And then choose the place to save in PC and click OK the records will be saved instantly Figure18 5 Figure18 5 Download Traffic Log Reco...

Страница 404: ...403 STEP 6 Click Clear Logs and click OK on the confirm WebUI the records will be deleted from the ALL7008 instantly Figure18 6 Figure18 6 Clearing Traffic Log Records WebUI...

Страница 405: ...ed management events such as Interface and event description of ALL7008 of the Administrator STEP 1 Click Event log of LOG The management event records of the administrator will show up Figure18 7 Fig...

Страница 406: ...2 Click on Download Logs and select Save in File Download WebUI And then choose the place to save in PC and click OK the records will be saved instantly Figure18 8 Figure18 8 Download Event Log Recor...

Страница 407: ...406 STEP 3 Click Clear Logs and click OK on the confirm WebUI the records will be deleted from the ALL7008 Figure18 9 Figure18 9 Clearing Event Log Records WebUI...

Страница 408: ...407 To Detect Event Description of WAN Connection STEP 1 Click Connection in LOG It can show up WAN Connection records of the ALL7008 Figure18 10 Figure18 10 Connection records WebUI...

Страница 409: ...lick on Download Logs and select Save in File Download WebUI And then choose the place to save in PC and click OK the records will be saved instantly Figure18 11 Figure18 11 Download Connection Log Re...

Страница 410: ...409 STEP 3 Click Clear Logs and click OK on the confirm WebUI the records will be deleted from the ALL7008 instantly Figure18 12 Figure18 12 Clearing Connection Log Records WebUI...

Страница 411: ...grue18 13 Figure18 13 E mail Setting WebUI STEP 2 Enter Log Backup in Log select Enable Log Mail Support and click OK Figure18 14 Figure18 14 Log Mail Configuration WebUI After Enable Log Mail Support...

Страница 412: ...ing settings in Syslog Settings Select Enable Syslog Messages Enter the IP in Syslog Host IP Address that can receive Syslog Enter the receive port in Syslog Host Port Click OK Complete the setting Fi...

Страница 413: ...412...

Страница 414: ...Alarm In control policies the Administrator set the threshold value for traffic alarm The System regularly checks whether the traffic for a policy exceeds its threshold value and adds a record to the...

Страница 415: ...the following setting in DMZ to WAN Policy Alarm Threshold Enter 10 Kbytes Sec Click OK Figure19 1 Figure19 1 Alarm Threshold Policy Setting STEP 2 Complete the Traffic Alarm setting in DMZ to WAN Pol...

Страница 416: ...l of policy will be listed when entering Traffic of Alarm function Figure19 3 Figure19 3 Traffic Alarm WebUI Traffic Alarm considers 15 minutes as one unit time Take the average traffic in one unit 15...

Страница 417: ...416...

Страница 418: ...ce Policy Statistics The statistics of Downstream Upstream packets and Downstream Upstream traffic record that pass Policy In this chapter the Administrator can inquire the ALL7008 for statistics of p...

Страница 419: ...r can know which Policy is the Policy Statistics belonged to Time To detect the statistics by minutes hours days months or years Bits sec Bytes sec Utilization Total The unit that used by Y Coordinate...

Страница 420: ...l function of WAN Interface When enable WAN Interface it will enable WAN Statistics too STEP 2 In the Statistics window find the network you want to check and click Minute on the right side and then y...

Страница 421: ...420 STEP 3 Statistics Chart Figure20 2 Y Coordinate Network Traffic Kbytes Sec X Coordinate Time Hour Minute Figure20 2 To Detect WAN Statistics...

Страница 422: ...ble the Statistics in Policy first STEP 2 In the Statistics WebUI find the network you want to check and click Minute on the right side and then you will be able to check the Statistics chart every mi...

Страница 423: ...422 STEP 3 Statistics Chart Figure20 4 Y Coordinate Network Traffic Kbytes Sec X Coordinate Time Hour Minute Day Figure20 4 To Detect Policy Statistics...

Страница 424: ...efault Gateway DNS Server Connection and its IP etc Interface Display all of the current Interface status of the ALL7008 Authentication The Authentication information of ALL7008 ARP Table Record all t...

Страница 425: ...f the Interface Ping WebUI To display whether the users can Ping to the ALL7008 from the Interface or not or enter its WebUI Forwarding Mode The connection mode of the Interface Connection Status To d...

Страница 426: ...425 Figure21 1 Interface Status...

Страница 427: ...tion it will display the record of login status Figure21 2 IP Address The authentication user IP Auth User Name The account of the auth user to login Login Time The login time of the user Year Month D...

Страница 428: ...MAC Address and the Interface information which is connecting to the ALL7008 Figure21 3 NetBIOS Name The identified name of the network IP Address The IP Address of the network MAC Address The identif...

Страница 429: ...DHCP Clients that are connected to the ALL7008 Figure21 4 IP Address The dynamic IP that provided by DHCP Server MAC Address The IP that corresponds to the dynamic IP Leased Time The valid time of th...

Страница 430: ...429...

Отзывы: