background image

Symantec™ Gateway Security 1600 
Series v3.0

Installation Guide

Supported platforms:

1620, 1660

Содержание SGM 1600

Страница 1: ...Symantec Gateway Security 1600 Series v3 0 Installation Guide Supported platforms 1620 1660 ...

Страница 2: ... configuration as well as to author content for our Web accessible Knowledge Base The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion For example the Technical Support group works with Product Engineering as well as Symantec Security Response to provide Alerting Services and Virus Definition Updates for viru...

Страница 3: ...description Error messages log files Troubleshooting performed prior to contacting Symantec Recent software configuration changes and or network changes Contacting Customer Service To contact Enterprise Customer Service online go to www symantec com techsupp and access the Get Enterprise Support link for support in North American English For support in other languages select the language for the a...

Страница 4: ......

Страница 5: ...uninterruptible power supply 11 Resetting the appliance to factory defaults 12 Restoring the appliance firmware with the Symantec Gateway Security OS Restore CD ROM 13 Chapter 2 Developing a security plan Defining your security policy 15 Before writing your security plan 15 Becoming security conscious 16 Educating users 16 Involving the user community 16 Security policy worksheets 17 Defining your...

Страница 6: ...6 Contents ...

Страница 7: ...ng components into an appliance that protects networks at the gateway to the Internet or subnets of larger WANs and LANs Intended audience This manual is intended for system managers or system administrators responsible for installing and administering Symantec Gateway Security 1600 Series appliances Warning This is an electrically powered device You must adhere to warnings and cautions when insta...

Страница 8: ...horized security personnel Installing the Symantec Gateway Security 1600 Series appliance You can install the Symantec Gateway Security 1600 Series v 3 0 appliance as a free standing appliance or in a rack Installing as a free standing appliance The Symantec Gateway Security 1600 Series v3 0 can be installed as a free standing appliance on a flat surface such as a desktop or shelf Install the Syma...

Страница 9: ...front panel of the Symantec Gateway Security 1600 Series v3 0 contains status indicators to provide a quick visual status of the appliance Figure 1 1 shows the front panel status indicators Figure 1 1 Front panel status indicators Table 1 1 describes the front panel status indicators Table 1 1 Front panel status indicators Label Feature Description 1 Power On to indicate the power is on 2 Disk act...

Страница 10: ...tes Attention Ready Description on off Error during startup Check log messages for more information See the Symantec Gateway Security 1600 Series v3 0 Administration Guide for more information on log messages off slow blink Normal startup in progress slow blink slow blink Restoring appliance firmware slow blink on The power button was pushed and the security gateway is shutting down The reset butt...

Страница 11: ...hrough the Java based SGMI Making changes to the operating system is not supported See the Symantec Gateway Security 1600 Series v3 0 Administration Guide for more information on the serial console menu 4 USB ports Provides a modem connection for dialing pager phone numbers for delivering notifications Supports but does not include USB modems that use standard AT command set for notifications Comp...

Страница 12: ...the Symantec Gateway Security 1600 Series Administration Guide for more information Caution Any software patches including LiveUpdates that you may have applied are removed and must be reapplied All network information and configuration data is removed See the Symantec Gateway Security 1600 Series Administration Guide for more information about backing up and restoring configurations To use the re...

Страница 13: ...ifferent network interface type The requirements for the computer running the operating system restore program are as follows A computer with a BIOS that lets you boot from an IDE ATAPI CD ROM Intel x86 based Bootable from a CD ROM PII class processor with at least 64 MB of RAM A single installed 10 100 or 10 100 1000 MB network interface card such as the following Intel PRO 100 SGS Adapter PILA84...

Страница 14: ...s the ready indicator on the front panel begins to blink indicating that the appliance is waiting for a confirmation of the network boot command To confirm the network boot command press and hold the reset button for 1 2 seconds and then release it The network boot communication is attempted through the computer connected to eth0 If the network boot communication is successful the restore process ...

Страница 15: ...e resources include Host computers and servers Workstations Connection devices gateways routers bridges and repeaters Terminal servers and remote access servers Networking and applications software Information in files and databases The firewall component of Symantec Gateway Security 1600 Series v3 0 is the main tool for enforcing access security gateway access allowing you to define a set of rule...

Страница 16: ...nauthorized external users may be only one of your goals You may also need to limit internal access to certain systems to specific users and groups within specific time periods You will need to define these users and groups for the firewall and how to configure special services to be passed through these systems Review issues You should review your organization s specific issues in detail before y...

Страница 17: ...ation policies Network planning Security policy worksheets To aid you in the planning process we have provided a set of policy planning worksheets Use these worksheets to help implement the specific tasks of your security plan and to assist you during the installation process Defining your organization Begin by defining your organization Here is where you explore your existing security policy if a...

Страница 18: ..._____________________________________________________________________ ____________________________________ Table 2 1 Administrator names Name Email Phone Pager ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ __________...

Страница 19: ... collect hardware information 1 Record the number of host computers of each type that compose your network Before installation ensure that the host network connections are configured and tested properly Verify that you can ping the network interfaces of the server from clients on the same network 2 What kind of Internet access do you have What speed 3 Record the name of your Internet Service Provi...

Страница 20: ...to pass through your security gateway To collect your TCP IP address information 1 How is your Domain Name Service DNS provided 2 What type of domain structure is in use at your site 3 What type of name service do you provide 4 Do you have an internal name server 5 Do you have WINS configured _____ Yes _____ No _____ Yes _____ No ____________________________________________________________________...

Страница 21: ...r network ____________________________________________________________ ____________________________________________________________ 12 Will you be using network news services NNTP 13 If yes and you have your own internal NNTP server record its IP address and the address of the server that will be supplying you with news feeds Note Only IP can be directly handled by the security gateway Other proto...

Страница 22: ...___________ _______________________ _______________________ ______________________ _______________________ _______________________ _______________________ Telnet ______________________ _______________________ _______________________ _______________________ ______________________ _______________________ _______________________ _______________________ ______________________ _______________________ _...

Страница 23: ... that you use internal to your network for example Microsoft Outlook Defining your Web services Use the following section to define information about your Web services To define your Web services 1 Will you be using a Web server 2 If yes select the location of the Web server 3 Record the Web server name and IP address Name __________________________________ Address ____________________________ ___...

Страница 24: ... list all allowed entity identifications _____ Yes _____ No Proxy server name ___________ Address ______________ _____ Yes _____ No _____ Yes _____ No Table 2 4 Special services names Service name Service port Service type UDP TCP Server name _______________________ _______________________ _______________________ _______________________ _______________________ _______________________ _____________...

Страница 25: ...er name Group name Client VPN Clientless VPN ________________________________ _______________________ ______________ _________ _______________________ _______________________ ______________ _________ _______________________ _______________________ ______________ _________ _______________________ _______________________ ______________ _________ _______________________ _______________________ ______...

Страница 26: ..._______ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ ______________________ _...

Страница 27: ...______________________ _______________________________________ ______________________________________ _______________________________________ ______________________________________ _______________________________________ ______________________________________ _______________________________________ ______________________________________ _______________________________________ Table 2 11 External n...

Страница 28: ...28 Developing a security plan Security policy worksheets ...

Отзывы: