CyberGuard SG300 manuels

Manuels d'utilisation et guides de l'utilisateur pour Pare-feu matériel CyberGuard SG300.
Nous fournissons des manuels en pdf 1 CyberGuard SG300 à télécharger gratuitement par type de document : Manuel d'utilisateur


Table des matières

CyberGuard SG

1

User Manual

1

Contents

2

1. Introduction

5

Figure 1-1

6

Document Conventions

8

Rear panel

10

Internet link features

11

LAN link features

11

Enviromental features

11

Front panel LEDs

12

Front panel

13

LAN/DMZ link features

14

Figure 1-4

15

Network link features

16

Environmental features

16

2. Getting Started

17

Figure 2-1

20

Figure 2-2

21

Figure 2-3

23

Figure 2-4

24

Cable modem

25

Analog modem

25

DSL modem

25

Direct connection

25

LAN with a DHCP server

27

LAN with no DHCP server

27

Figure 2-6

30

Figure 2-7

33

Figure 2-8

34

Figure 2-9

35

Figure 2-10

36

Figure 2-12

42

CyberGuard SG PCI Appliances

43

Figure 2-13

44

Figure 2-14

45

Figure 2-15

47

Figure 2-16

48

Figure 2-17

49

Figure 2-18

50

Appliance

51

3. Network Connections

52

Switch A – B, Port C – F

53

Direct LAN

54

Bridged LAN

54

Internet

55

Internet Connection Methods

55

Direct Internet

57

Bridged Internet

57

COM/Modem

58

Services on the DMZ Network

60

Bridging

62

Load Balancing

63

Internet Failover

63

Figure 3-6

64

Figure 3-7

65

Additional routes

66

Route management

66

Figure 3-9

68

Dynamic DNS

69

Interface aliases

69

QoS Traffic Shaping

70

4. Dialin Setup

71

Dialin Setup

72

Dialin User Accounts

74

Account list

75

Figure 4-3

76

Remote User Configuration

77

Windows 2000/XP

79

Figure 4-7

80

Figure 4-8

80

Figure 4-9

81

Figure 4-10

81

5. DHCP Server

82

Figure 5-2

83

Figure 5-3

85

DHCP Proxy

86

6. Firewall

87

Administration services

88

Figure 6-2

89

SSL/HTTPS (Secure HTTP)

90

SSL Certificate Setup

91

Packet Filtering

92

Addresses

93

Service groups

94

Figure 6-6

95

Source NAT

97

1-to-1 NAT

98

Port Tunnels

100

User authentication

102

Figure 6-8

103

Browser setup

104

IP lists

105

Web lists

106

Content

107

Reports

108

Categories

108

ZoneAlarm

109

Policy enforcement

109

7. Intrusion Detection

110

The benefits of using an IDS

111

Figure 7-1

112

Advanced Intrusion Detection

114

Figure 7-2

115

Figure 7-3

116

8. Web Cache

119

Web Cache Setup

120

Network Shares

121

Create the network share

122

Figure 8-3

123

PPTP Client Setup

126

Figure 9-2

127

PPTP Server Setup

128

Figure 9-3

129

Figure 9-4

131

Figure 9-5

133

Figure 9-6

134

Windows 2000

135

Figure 9-9

136

Figure 9-10

136

Windows XP

137

IPSec Setup

139

Set up the Branch Office

139

Figure 9-13

140

Tunnel settings page

141

Local endpoint settings

144

Other options

146

Figure 9-16

147

Phase 1 settings

150

Phase 2 settings page

152

Enabling IPSec

153

Local endpoint settings page

155

Phase 1 settings page

155

Tunnel List

157

Figure 9-21

159

NAT Traversal Support

161

Dynamic DNS Support

161

Certificate Management

162

Creating certificates

163

Adding certificates

165

Figure 9-23

166

Adding a local certificate

167

Troubleshooting

168

Setting up a GRE tunnel

172

Figure 9-26

173

GRE over IPSec

174

Figure 9-28

175

Figure 9-29

176

L2TP VPN client

178

L2TP server

179

10. System

180

Locality

181

Figure 10-2

182

Administration

183

Diagnostic

183

Encrypted save/restore all

183

User settings

183

Diagnostics

184

Network tests

185

Advanced

186

Flash upgrade

187

Reset button

188

Technical Support

189

Appendix B – Terminology

191

Appendix C – System Log

198

Creating Custom Log Rules

200

Rate Limiting

203

Boot Log Messages

204

Practices and Precautions

205